Data management - level 1 Flashcards

(22 cards)

1
Q

Why is good data management important in construction projects?

A
  • it supports project efficiency because domecuments are easily located
  • it protects sensitivity and confidentiality when documents are strored appropriately
  • it helps accurate decisions and project developed because the correct data is being used for project activities
  • it helps future audits or lessons learned because the data is well filed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is document control?

A
  • it is the process of managaing storing and updating projects appropriately to ensure the information is
    -readily available
  • up to date and correct
  • secured as required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What risks arise from poor data management?

A
  • using incorrect information that can lead to errors or disputes
  • confidentiality breaches
  • legal non-compliance
  • project delays when the right information cannot be sourced.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you ensure confidentiality of project information?

A
  • i ensure access is restricted to thecorrect individuals
  • i follow organisation policy and label documents accordingly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are security clearance policies?

Why are they important?

A
  • they define the level of sensitivity and and who is authorised to access certain information based on their clearance level.
  • They protect sensitive information and ensure compliance with organisational and legal requirement
  • different levels may apply for different aspect and stages of the project.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Non-Disclosure Agreement (NDA)?

A
  • A contractual agreement preventing parties from sharing confidential information.
  • usually between a company and employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Official Secrets Act 1989?

A
  • A UK law that protects sensitive government information from unauthorised disclosure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between and NDA and the Official Secrets Act 1989?

A
  • NDAs are civil contracts between the signed parties and may only last a specific period of time.
  • The OSA is a crimilar law to protect estate security, applies to all those who work for the government and work wtih sensitive information, it is life binding and can apply to family members of the individuals.
  • breaching NDAs leads to civil lawsuits, whereas breaching the OSA is a criminal act, that can lead to imprisonment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is GDPR?

A
  • Is a legislation and legal framework governing how personal data is collected, processed, and stored.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is personal data?

what isn’t personal data?

A
  • Any information that can identify a living individual, such as names or contact details.
  • Information that has been permanently and irreversibly stripped of all identifiers so the person can no longer be identified. General information about companies or public authorities, e.g., a business’s registered office address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are key principles of GDPR?

A

1- Lawfulness & Transparency: Have a legal reason for using data and be honest about it.

2- Purpose Limitation: Only use data for the specific reason you collected it.

3- Data Minimisation: Only collect the data you actually need—nothing extra.

4- Accuracy: Keep information correct and up to date.

5- Storage Limitation: Delete data as soon as you no longer need it.

6- Security: Keep data safe from hackers, leaks, or accidental loss.

7- Accountability: Be able to prove you are following all these rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the risks of non-compliance?

A
  • severe fines linked to company turnover
  • legal action for compensation
  • reputation damage
  • regulators may ban you from processing personal data again
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are information barriers?

A
  • are policies and technical controls used to restrict access to sensitive information and data between individuals or teams within an organization.
  • They prevent conflicts of interest and protect confidential data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When would you use them?

A
  • When managing confidential or commercially sensitive information across different stakeholders.
  • to avoid or mitigate conflicts of interest.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What other data management controls are used?

A
  • Access permissions
  • password secure document systems
  • version control processes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a document control process

A

the systematic process of managing, tracking, and organizing multiple iterations of a document throughout its lifecycle to ensure accuracy and auditability

Key Aspects of the Process
Agreed Version Numbering:
Centralized Storage: Storing documents in one place (e.g., SharePoint, Google Drive, Document Management System) to avoid fragmented versions.
Audit Trail: Maintaining a history of modifications for accountability and compliance, including the author, date, and nature of changes.
Check-in/Check-out: Locking documents while in use to prevent overwriting someone else’s work.

17
Q

How do you manage sensitive project data?

A
  • ensure that documents and information is only shared with the correct individuals
  • i clearly lable my emails with the correct sensitivity labale
  • i use secure systems to store the documents, no personal memory sticks or saving to folders where it can be deleted or easily accessed.
18
Q

What would you do if data was shared incorrectly?

A
  • i would escalate it to my manager and report to a security officer as a security breach, detailing the nature of of the breach and what documents were involved.
19
Q

How do you ensure version control of documents?

A
  • By maintaining a document register
  • ensuring only approved versions are used.
20
Q

What is the difference between confidential and personal data?

A

Confidential data relates to sensitive project or commercial information,

while personal data relates to information about living individuals.

21
Q

Is all project data covered by GDPR?

A

No, only personal data relating to individuals.

22
Q

Who is responsible for data protection?

A

All individuals handling data have responsibility, supported by organisational policies.