Data Mangment Flashcards

1
Q

What acts govern data management?

A

Data Protection Act 2018
Freedom of Information Act 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define what the Freedom of Info act (2000) does?

A

-Provides public access to info held by public authorities - Members of the public entitled to request info (not personal info like health records tho)
-Public authorities obliged to publish certain info about their activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define GDPR

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 7 key principles of GDPR

A

-Lawfullness, fairness & transparency
-Purpose Limitation
-Data minimisation
-Integrity & confidentiality
-Accuracy
-Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ISO

A

International Organisation for Standardisation

A worldwide federation of national standard bodies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ISO 9001?

A

Quality management system

Helps improve companies performance, meet customer expectations and demonstrate their commitment to quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ISO 14001?

A

Environmental Management System

Provides a framework for organisations to design and implement EMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How much can you be fined for a data breach?

A

£17.5mill or 4% of annual turnover under the Data Protection Act 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the eight principles of GDPR UK?

FAT SPAMS

A

Fairness, Accuracy, Transparency
Storage, Purpose limitation, Accountability, Minimisation & Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the individual rights under the UK GDPR act?

A

Right to;

be informed, access, rectification, erasure, restrict processing, data portability, to object, automated decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How should a data breach be dealt with?

A

-Personal data breaches have to be reported to the ICO (information commissioners office) without undue delay - within 72 hours.

-Determine what’s happened

-Try to contain the breach - i.e try to recover data if possible

-Assess the risk and if necessary inform those affected

-Put steps in place to reduce the risk of a repeat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meta data?

A

The data title of smaller data but not the content of the data.

I.e- author is the meta data but the books are the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the different methods of collecting data?

A

Quantitative: questionnaires, surveys, documents and records

Qualitative: Interviews, focus groups, observations and oral histories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where do you collect data from?

A

Data sources i.e Agency Pilot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you analyse data?

(Five steps)

A
  1. Identify questions
  2. Collect and store data
  3. Clean and prepare data
  4. Analyse data
  5. Visualise and communicate data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is your companies data stored?

A

Our data is stored in the cloud, remotely meaning it is accessible from multiple locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do you ensure data is reliable?

A

-Use trusted sources
-use up to date sources
-Unbiased analysis of data
-Repeat data collection over multiple days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How long should data be kept for?

A

6 years from when service was provided
6 years from when loss was suffered
A long stop of 15 years if claimant didn’t know loss was suffered earlier
12 years depending on type of instruction and type of claim

19
Q

How can you protect you system from cyber attacks?

A

-Update systems as and when needed
-Softwear patches on flaws
-Encrypt data
-Add firerwalls
-Add cyber insurance
-Regular password changes
-Multifactor authentication

20
Q

How can you insure an installed system is secured?

A

-Install security updates
-Install anti virus softwear
-Make sure there are no leaks in firer wall
-Schedule regular backup of data or hold in the cloud

21
Q

Who does the privacy and electronic communications regulations 2003 apply to?

A

Everyone - aims to protect consumers right to privacy (companies and businesses)

Regulates digital marketing & cookies
Works alongside GDPR to provide greater protection
Latest amendment bans cold calling

22
Q

What is copyright?

A

ownership of control of the rights to the use and distribution of certain works of creative expression

23
Q

What is intellectual property?

A

Intangible creations of the human intellect (i.e literally works, images, designs etc…)

24
Q

What are the limitations of primary and secondary data sources?

A

Primary data is more accurate and reliable while secondary data is relatively less reliable and accurate. This is mainly because the secondary data sources are not regulated and are subject to personal bias.

25
Q

What is the difference between primary and secondary data?

A

Primary data refers to the first hand data gathered by the researcher themselves.
Secondary data means data collected by someone else earlier

26
Q

Whats the difference between a deed and registerd title?

A

A deed is a document that states you own a property, when a title is the concept of legal ownership that the deed grants.

27
Q

What is an index map?

A

Index map is a finding aid for a set of maps covering regions of interest along with a name or number of the relevant map sheet.

Squares on maps giving reference to other maps like an index

28
Q

What is blockchain?

A

Introduced in 1991. Gained popularity with the rise of crypto currencies to stop ‘double spending’

A shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.

29
Q

How have you advised on data storage?

A

I advised my client in regards to my example Chi Tev that our data are secured on files protected by two factor authentication and firer wall

30
Q

How do you benchmark from anaylsed historic data?

A

Define scope and criteria for analysis before analysing data

31
Q

How does blockchaining create greater transparency?

A

Once data (i.e- a transaction) is uploaded to the systems it can’t be deleted, another block has to be added to the thread.

No one organisation has control over the system

32
Q

Where are your companies servers

A

Our servers are located within the UK server base of Microsoft with all VH data being stored and backed up within the UK.

We can only access our data within the UK

33
Q

What is an Electronic Data System?

A

All information/data that is received, sent, stored, created, processed, transferred or communicated in any way.

Includes computer files, email , voicemail and internet

34
Q

How do electronic data systems work?

A

I.e sharepoint or emails

Primarily cloud based

A system for storing and processing data

35
Q

What is a centralised database?

A

A network architecture where all processing is conduct on a mainframe.

I.e sharepoint

36
Q

What are technical libraries?

A

*mainly used for construction

Library of documentation maintenance by the contractor containing documentation relating to contractor deliverables

37
Q

What are Property Information Tools?

A

Things like Business rates register, EPC register, companies house, nimbus, AP

38
Q

What is BIM?

A

Building Information Modelling

A process for creating and managing information on a construction project

39
Q

Define benchmarking?

A

A standard or point of reference against which things can be compared.

The benchmark is often set from historic data ie financial predictions from historic accounts

40
Q

How would you comply with a clients data security requirement?

A

Understand what their requirement is
Check it against the system/practices
Come up with a plan to be compliant

41
Q

What is agency pilot?

A

A customer relationship management system

42
Q

What’s the difference between the Data Protection act and GDPR?

A

GDPR= Personal data
DPA= All data

The acts work together to protect data

43
Q

What data system would you recommend?

A

Sharepoint because it is what I have had experience with.

Would suggest they seek professional advice from an expert

44
Q

How can you send documents securely?

A

Password protected files
Encrypted email
Encrypted cloud storage