What do data security technologies include?
What action in your office is undertaken to ensure the security of data?
What does the UK General Data Protection and the Data Protection Act 2018 cover?
What key requirements does it include?
Principles of UK GDPR
What are the 8 individual rights under GDPR?
What does the freedom of information act do?
Gives individuals the right of access to information held by public bodies
- The public body must tell any individual requesting sight of information whether it holds it
How can the security of data be improved?
What does the Proposed RICS Professional Standard on Data Handling and Prevention of Cyber on Data Handling and Prevention of Cybercrime set out?
Non Disclosure Agreement (NDA)
What internal and external databases have you used to collect data?
I have used the likes of Costar and EIG to check for comparables. I have also used the Auction internal comparable database which contains all the information on lots. I know how to filter these searches appropriately so I can collect the relevant data
Why is it important to verify data?
It is important to carry out you due diligence and check that data is correct. An example of this would be calling up the agents to confirm information on comparable you have searched on Costar. The information needs to be correct as you may be advising your clients on this.
It is also important to verify and store data correctly as auditors are able to look at the evidence trail within your file.
Why should you lock your laptop away and what other resources would you lock away if left unsupervised?
Items that hold secure information are your responsibility and in order to prevent them being lost or damaged it is important to have the necessary protocols such as locking laptops and day books away if unattended.