Data Management Flashcards

(40 cards)

1
Q

What are some benefits to a cloud based storage system?

A

Information is backed up second, accessibility can be managed via online settings, multiple uses can access the same documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who are the key persons outlined within GDPR?

A
  1. Controller, the person who determines the purposes and means of processing personal data.
  2. Processor, the person who processes the personal data on behalf of the controller.
  3. Data protection officer, the leadership role required by EU GDPR, they are responsible tor over seeing the data protection approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 8 rights under GDPR?

A

BARE CORD
1. The right to be informed
2. The right of access
3. The right of rectification
4. The right to erasure

  1. Rights concerning automated decision making and profiling
  2. The right to object
  3. Right to restrict processing
  4. Rights to data portability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the VOA’s primary disclosure for data legislation?

A

CRCA 2005

Commissioners for Revenue and Customs Act 2005

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the CRCA

A

Commissioners for revenue and customs act 2005

It ensures all information held by the VOA is covered by the duty of confidentiality

It specifies when that information may be disclosed

Sections 17-23 relate to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Freedom of Information Act

A
  • primary piece of legislation that controls access to information
  • it permits the public right of access to information he’d by public authorities
  • it cover all information held not just since the act came into place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the meaning of a non disclosure agreement?

A
  • used to protect against the disclosure of any confidential data
  • typically clients request that the recipient signs a non-disclosure agreement
  • used to prevent information being used by competitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If 2 separate departments within your firm were working for 2 rival companies, how would you ensure client sensitive data was managed?

A
  • make the client aware of the risks
  • make the clients aware of the conflict of interest
  • obtain letter of instruction to continue from the client
  • non-disclosure agreement considered
  • separate working locations
  • secure data locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some benefits of cloud based storage?

A
  • information is backed up securely
  • encrypted servers
  • accessibility can be managed
  • environmentally friendly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is you understanding of the term confidentiality?

A

Where information is provided but subject to confidence and not shared without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are your organisation strategies to protect against a data breach?

A
  1. Password protection
  2. Multifactor authentication
  3. Anti virus and malware
  4. Access passes into the office
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why would you not be permitted to take a photograph with a person in the photo?

A

Under UK GDPR and the data protection act you would not be allowed to take a photograph identifying a person and then use this photo for a business purpose or publish it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the data protection principles?

A

SAIL PAD
1. Storage limitation
2. Accuracy
3. Integrity
4. Lawful

  1. Purpose limitation
  2. Accountability
  3. Data minimisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You state you have to be mindful on confidentiality what does that term mean?

A

Keeping sensitive information private and protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How would you respond if you took a photograph and realised that this contained something confidential?

A

Securely delete the photograph and ensure that it is not within any reports or used for business purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You raised a data breach with your manager, who would you escalate this to if they were not available?

A

Data protection officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who is the data protection officer within your organisation?

18
Q

How would you deal with a data breach if you were the one who committed it?

A

Contact the data protection officer within 72 hours but my organisation advise 48 hours.

Contact who i have sent data to and request they delete the email and confirm when done

19
Q

Why is it important to stored data securely?

A
  • allows data to remain confidential
  • prevents data breaches occurring
20
Q

In what manner should data be processed?

A

In a necessary, proportionate and responsible manner

21
Q

What measured are in place in your organisation to ensure data is stored securely?

A
  1. Regular back ups
  2. Encryption
  3. Access controls
  4. Password protection
  5. Lock screens when away from desk
  6. Antivirus and malware software
22
Q

Under what section of the CRCA 2005 can the VOA disclose information externally and what are these circumstances?

A

Section 18 of the CRCA 2005
1. Taxpayer consent
2. Essential function
3. As part of civil proceedings

23
Q

What are the penalties outlined under CRCA?

A

Section 19 outlines up to 2 years imprisonment and / or unlimited fine

24
Q

Does the freedom of information act 2000 apply to your organisation?

A
  • yes, it gives individuals the right to request information held by public sector and the request must be in writing
25
Under what circumstances can a freedom of information request be denied?
- too timely or costly - repeat request - contravenes with GDPR
26
Give an example of a freedom of information request that might apply to your organisation?
Request information on other properties along the street
27
How would you proceed with a freedom of information request?
Forwards to the freedom of information team They then issue a response in writing within 20 working days
28
Why is it important to store data securely?
Prevents data breaches or leaks occurring. Allows data to remain confidential.
29
What is the difference between a leak and a breach?
Breach is deliberate where someone with unauthorised access gains access to data. However, a leak is an accidental release of data.
30
Under what section of CRCA 2005 can the VOA disclose information externally and what are these circumstances?
S18 CRCA 2005 - Taxpayer consent - Essential function - As part of civil proceedings etc
31
Under what circumstances can a FOI request be denied?
- Too timely or costly - Repeat request - Contravenes from GDPR
32
Give an example of a FOI request that might apply to your organisation
Request information on other properties along the street
33
How would you proceed with an FOI request?
Forward to FOI inbox in which we have a designated team to issue a response in writing within 20 working days.
34
What is GDPR
GDPR (General Data Protection Regulation) is a strict 2018 EU law governing how organizations handle personal data
35
What is the data protection act?
2018 The Data Protection Act 2018 is the UK’s implementation of the General Data Protection Regulation (UK GDPR), controlling how personal information is used by organisations, businesses, and the government.
36
What are the 6 principles of the bribery act 2010?
1 proportionate procedures 2 top level commitment 3 Risk assessment 4 due diligence 5 communication 6 monitoring and review
37
What is the bribery act?
Its a law which criminalisies bribery with imprisonment and fines
38
what should data be?
VAUR verified accurate up to date reliable
39
name some ways to keep data secure?
fire walls passwords not leaving devices unattended encryption virus protection
40
what are some data security threats you may face?
phishing ransomware hacking loss or theft