Data Management Flashcards

(23 cards)

1
Q

What does the term ‘Confidentiality’ mean?

A

Keeping information private and secure

Preventing unauthorized access or disclosure

Not sharing that information without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is data management governed and legislated in the UK?

A

Data Protection Act 1998
GDPR
Freedom of Information Act 2005
NDAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Data Protection Act?

A

The UK’s primary legislation governing how personal data is handled

It sets out rules for collecting, storing, and using personal information to protect individuals’ privacy

The Act ensures that data is processed fairly, lawfully, and transparently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between the Data Protection Act 1998 and updated 2018 Act?

A

The main difference is that the 2018 DPA incorporates GDPR into UK statue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is GDPR?

A

General Data Protection Regulations

An EU directive, which came into enforce in the UK in May 2018 - GDPR governs use of personal data and applies to all companies holding personal data

The key principles of GDPR are:-
- Consent (explicit consent) is required to gather personal data
- You must delete personal data you are no longer using for its original purpose
- People can revoke their consent, and you must comply
- You have 72 hours to notify of a data breach
- You need a Data Protection Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 8 Individual Rights under UK GDPR?

A
  1. Right to be informed
  2. Right to access
  3. Right to rectification
  4. Right to erasure
  5. Right to restrict processing
  6. Right to data portability
  7. Right to object
  8. Right to automated decision making and profiling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are penalties for GDPR breaches?

A

Heavy fines for worst offences - up to 4% of annual global turnover (max. £17.5m)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key principles of the Data Protection Act 2018?

A

The act ensures that data is:-

  • Used fairly, lawfully and transparently
  • Used in a way that is adequate, relevant and limited to only the purpose it is intended
  • Is retained for no longer than is necessary
  • Processed securely including the protection against unlawful use, loss or destruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who are the key persons outlined within GDPR?

A

The controller is the person or legal entity that determines the purposes and means of processing of personal data for example when processing an employee’s personal data, the employer is considered to be the controller

The processor is a person or legal entity that processes personal data on behalf of the controller for example a call centre acting on behalf of its client is considered to be a processor

The data protection officer (DPO) is a leadership role required by EU GDPR. This role exists within companies that process the personal data of EU citizens. A DPO is responsible for overseeing the data protection approach, strategy, and its implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Freedom of Information Act 2005?

A

This is the primary piece of UK legislation that controls the access to official information

The act permits the public right of access to information held by public authorities

The act covers all information held and not just information since the act came into effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Non-Disclosure Agreement (NDA)?

A

A legally enforceable contract between two parties relating to sensitive information

The agreement will create a confidential relationship between a person with sensitive info, and a person who has access to that info

The party that was harmed by the breach of the NDA can take legal action to enforce the agreement and seek damages for any losses that were incurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is your understanding of ‘Intellectual Property’ and ‘Copyright’?

A

This is the right to control the use and ownership of original works

Work generally created by an employee usually belongs to their employer unless copyrights are put in place

It is common within construction for a client to be granted license for use and reproduction of copyright material which should be clearly defined

This could be the right to use a particular design by a subcontracting specialist who retains control of the original copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If two separate departments/surveyors within your firm were working for two rival clients how would you ensure client sensitive data was managed?

A

I would make the client aware of the risks involved and check their understanding of the conflict of interest, and I would ensure a letter of instruction to continue was obtained from the client

Possibly use an NDA
Exclusivity of staff would be arranged

Separate working locations from each of the teams would need to be put in place

Secure document and data storage would be arranged to be used exclusively for the separate teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do companies ensure compliance with the Data Protection legislation generally?

A

They should only retain data they need to perform their day-to-day operations

If they are retaining someone’s data they should ensure the person is kept informed and advised on why they have it

They should hold the data securely

They should also keep the information up to date and delete information they no longer need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are your company’s policies for data protection breaches?

A

Report to my line manager or the company’s data protection officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you store data securely? What does TFT do?

A

It is essential that data is kept safe from corruption and that access to it is suitably controlled to ensure privacy and protection

At TFT we have:-
- Two Factor Authentication to access secure information
- Regular software updates to ensure the latest security & anti-virus software
- Annual compliance training
- Staff training with spotting Phishing emails (spam)
- Director approval to be granted access to email inboxes and sharepoints for specific projects

17
Q

What different sources of information do you use in your day-to-day surveying?

A

I use trusted sources for the data I use, particularly cost information - such as previous tenders, BCIS, cost plans

Other sources include photographs, videos, RICS guidance documents, contract documents, industry journals

18
Q

How do you manage these sources of information to ensure compliance with the legislation?

A

If signed up to an NDA with a client I ensure complete confidentiality and am not able to talk about these projects with colleagues who are not party to the project

I ensure that the electronic information I used is kept securely on encrypted servers

I lock my computer when away from my desk and comply with my firms IT security policies for example attendance at Cyber security courses and regularly updating my passwords

If I am sharing or processing information not available in the public domain from a previous project I always obtain the clients written permission to do so

19
Q

What are the benefits of cloud-based storage systems?

A

Information is backed up securely on encrypted servers

Accessibility can be managed via online settings

Cloud systems are often cheaper than the costs of physically storing, sharing and managing files

Cloud systems are environmentally friendly

Multiple users can access the same documents

20
Q

What are the RICSs best practice guidance points for data management?

A

Conduct data review

Anonymise and encrypt data where possible

Understand data processing

Treat commercial data in the same as you would treat personal data although it is not covered by GDPR

21
Q

What does encryption mean?

A

It is a security mechanism where information or data is converted into a code, especially to prevent unauthorized access

22
Q

What is your understanding of the term ‘Meta Data’ and why is this important?

A

Meta Data is ‘data about data’

An example would be when sharing an excel document, the Meta Data associated with this could consist of information about the author, file size, date the document was created and keywords to describe the document

We must ensure that this Meta Data is afforded the same level of care as all other confidential data.
In a scenario where we are sharing a document or removing confidential components of a document
we should ensure that any confidential meta data is not shared inadvertently

23
Q

What is BIM?

A

Building Information Modelling
A collaborative process for creating and managing information for a construction project throughout its lifecycle

The aim is to improve co-ordination and efficiency

Benefits can include more effective operation and maintenance of a built assessment, optimised design