Data management - Level 1 Flashcards

1
Q

What do data security technologies include?

A
  • Disk encryption – encrypting data on a secure hard disk drive
  • Regular back ups off site
  • Password protection and use of antivirus software protection
  • Firewalls and disaster recovery procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What action in your office is undertaken to ensure the security of data?

A
  • Password protected files
  • Regular IT updates to help prevent files being damaged
  • Cyber security and phishing training programmes to help prevent the loss or corruption of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the UK General Data Protection and the Data Protection Act 2018 cover?

A
  • UK GDPR is covered by the Data Protection Act 2018
  • It aims to create a single data protection regime affecting businesses, and empower individuals to take control of how their data is used by third parties.
  • It gives people rights to be informed about how their personal information is used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What key requirements does it include?

A
  • An obligation to conduct data protection impact assessments for high risk holding of data
  • Rights for individuals to have access to information on what personal data is held
  • A data controller decides how and why personal data is processed
  • A data controller decides how and why personal data is processed
  • Data accountability – ensuring that organisations can prove to the information commissioners (ICO) how they comply with the new regulations
  • Data security breaches need to be reported to ICO within 72 hours where loss of data or hard to individuals
  • Fines up to 4% of companies global turnover or £17.5mil
  • Policed by ICO – Allsop must prove to ICO of data accountability and how they comply with new regs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Principles of UK GDPR

A
  • Article 5(1) Principles relating to the storage of personal data states that data must be:
  • Processed lawfully, fairly and in a transparent manner in relation to individuals
  • Legitimate: Collected for specified, explicit and legitimate purpose
  • Relevant: Adequate, relevant and limited to what is necessary
  • Accurate: Kept up to date & if inaccurate erased immediately
  • Time: kept no longer than necessary.
  • Secure: held to ensure security against unlawful process & accidental loss, destruction or
  • Article 5(2) ‘ the controller shall be responsible for and be able to demonstrate, compliance with the principles’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 8 individual rights under GDPR?

A
  1. Right to be informed
  2. Right of access
  3. Right to rectify
  4. Right to erase
  5. Right to restrict processing
  6. Right to data portability
  7. Right to object
  8. Rights to automated decision making and profiling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the freedom of information act do?

A

Gives individuals the right of access to information held by public bodies
- The public body must tell any individual requesting sight of information whether it holds it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can the security of data be improved?

A
  • Security of electronic data can be improved using firewalls , encryption and passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Proposed RICS Professional Standard on Data Handling and Prevention of Cyber on Data Handling and Prevention of Cybercrime set out?

A
  • Data Handling and Prevention of Cybercrime Professional Standard is proposed covering best practice and mandatory obligations with which RICS professionals and regulated firms must comply
  • It is proposed to address how surveyors capture, store and share data appropriately and securely and is likely to mandate policies, practices and training for all regulated firms and members.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non Disclosure Agreement (NDA)

A
  • This is a legally enforceable contract between two parties relating to sensitive information
  • The agreement will create a confidential relationship between a person who has sensitive information and a person who has access to that information.
  • The party that was harmed by the breach of the NDA can take legal action to enforce agreement and seek damages for any losses that were incurred.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What internal and external databases have you used to collect data?

A

I have used the likes of Costar and EIG to check for comparables. I have also used the Auction internal comparable database which contains all the information on lots. I know how to filter these searches appropriately so I can collect the relevant data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is it important to verify data?

A

It is important to carry out you due diligence and check that data is correct. An example of this would be calling up the agents to confirm information on comparable you have searched on Costar. The information needs to be correct as you may be advising your clients on this.
It is also important to verify and store data correctly as auditors are able to look at the evidence trail within your file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why should you lock your laptop away and what other resources would you lock away if left unsupervised?

A

Items that hold secure information are your responsibility and in order to prevent them being lost or damaged it is important to have the necessary protocols such as locking laptops and day books away if unattended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly