Data Management Flashcards

1
Q
  • What are the details of the Data Protection Act 2018?
A
  • Sets out a framework for data protection law in the UK
  • Was amended following Brexit
  • Comprises 3 parts:
    o UK GDPR (general)
    o Law Enforcement Processing
    o Intelligence Services Processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • What are the details of the UK’s General Data Protection Regulations 2016 (GDPR)?
A
  • EU’s GDPR no longer applies in UK
  • Empowers individuals to have power over their personal data and its use

Some of rights under the UK GDPR:
1. Right to be informed
2. Access
3. Erasure

SW have Data Protection Policy applying to all information processed by the firm. Disciplinary methods in place for breaches of the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • What do you know about the Freedom of Information Act 2000?
A
  • Right to access information held by public bodies
  • Public body required to provide in 20 working days
  • Can charge fee for information
  • Right to deny if contrary to GDPR protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • How do you securely store files?
A
  • Files secure for each department
  • Password protected files sometimes
  • Backup storage of files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • How do you protect confidentiality and why is it important?
A

Confidentiality is important in relation to Data Protection and the Data Protection Act 2018.

We are required to keep client information securely protected from breaches.

Confidentiality relates more to not disclosing information, i.e. offers for properties, valuation figures etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • How does data management relate to the RICS Rules of Conduct?
A

Responsibility to maintain integrity

Provide a diligent service

Act in the public interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Why is data collection and management essential in your role?
A

At the centre of everything we do. Have a responsibility over data:

To store data securely - maintain data protection.

To analyse and process data

To gather data and present data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • How do you validate data from Costar, Land Reg etc?
A

Data from Costar can be checked with Land Registry titles if available. A more accurate way of cross-checking data is to identify the agent involved and contact them directly to gain any clarity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Can you give examples of quantitative and qualitative data?
A

Quantitative:
- Value – sales and lettings figures, lease terms, rent free periods
- BCIS – cost figures

Qualitative:
- Opinions on values
- Information gained from inspections
- Contact details of clients and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Why do SW have strict data management procedures?
A

Organisations are governed by UK law such as the Data Protection Act 2018 and UK GDPR.

Company’s must provide details that they are in line with GDPR and can be fined for data breaches.

Up to 4% of global turnover of company or £17.5M (whichever is greater).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • What makes a secure password?
A

Something that doesn’t comprise words relating to yourself, has numbers and special figures and is regularly updated and not used multiple times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • How and why does the two-factor authentication work?
A

Two-factor authentication requires you to have the mobile phone and its login details of the person responsible for the account you are gaining access to. E.G. If your laptop is stolen, without your mobile phone and unlocked, can’t authenticate the laptop login making it more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • What do ransomware and phishing software do?
A

Ransomware and phishing software act almost as a firewall to prevent emails coming in that are designed to con people into submitting important information. When an illegitimate email reaches your inbox, you may be fooled into entering important details. This software limits the emails coming in and also allow you to dispose of such emails safely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • How were the comparables securely saved within the spreadsheet?
A

Use a template for all reports – separate tables for each valuation basis.

Includes address, description, date of sale and sale price, and comments (compare to subject)

Provide in date order

Store print screens of each comparable

Saved within secure and backed up filing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • What parties were shown the report?
A

As per the Terms of Engagement Disclosure Section and instruction letter, the report is only for the attention of the parties detailed here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • What is the protocol with third party access to reports?
A

Not for use by third parties and we accept no liability for the use of other parties without prior written approval.

17
Q

How is your firm protective of data?

A
  • Protect data by secure storage
  • Do not disclose the information of potential purchasers
  • Blind copy clients into emails
18
Q

What is required if there is a data breach?

A
  • Data breaches must be reported to the ICO within 72 hours when there is a risk of harm to individuals
19
Q

How do you record conversations with agents for your comparables?

A
  • Make notes within the comparable on the saved spreadsheet