11.07.2015 Views

Book 4 - Appraisal Institute of Canada

Book 4 - Appraisal Institute of Canada

Book 4 - Appraisal Institute of Canada

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PACCElectronic datasecurity and privacyThe Pr<strong>of</strong>essional Practice Group is occasionallyfaced with a situation wherean appraiser pleads a catastrophicloss <strong>of</strong> data and work files from flooding, datacorruption and even s<strong>of</strong>tware obsolescence toexplain the non-existence <strong>of</strong> a work file andcompleted report. As a business person, the loss<strong>of</strong> client lists, research data, and files representsperhaps the single greatest risk to your business.Such a loss also creates more difficulty ifrequired to respond to civil claims and complaints,and is as disastrous as losing your clientlists that are the focal point <strong>of</strong> your marketingand advertising campaigns.In his article Cyber crime, liability and theappraiser, 1 Mark Fredericks discussed the legalimpact <strong>of</strong> losing data and cyber crime andoutlined key security issues <strong>of</strong> importance toappraisers. Further to his recommendations, thefollowing should also be considered.From a best practices point <strong>of</strong> view, thereare some simple preventative measures youcan take to protect your electronic data againstthe most common threats. These suggestedmethods can be incorporated relatively easily,and at little or no cost.1. Install the latest updates to eliminate securityvulnerabilities. Protect yourself by usinglicensed s<strong>of</strong>tware and installing the latestsecurity patches and updates. This minimizesthe risk <strong>of</strong> someone hacking into your system.Older s<strong>of</strong>tware has likely been long compromisedby hackers and, without updates andpatches, you increase your vulnerability.2. Use passwords. If your password is one <strong>of</strong> thetop 10 passwords in use, it is not very secure. iIdeally, use capital letters and numbers – thelonger the better. Changing passwords <strong>of</strong>tenwill also thwart hackers. This applies to files,as well as access to your computer, laptop, PDA,or Blackberry.3. Antivirus s<strong>of</strong>tware. As simple as a ‘cookie’ thattracks your website visits and internet habits, tospying on you, to recording keystrokes, spywareand adware can track practically everything youdo on your computer. Install reputable antiviruss<strong>of</strong>tware and update the virus databank regularly,otherwise you risk losing your personalinformation, as well as compromising that <strong>of</strong>clients as well.4. Install a firewall. This is essential to act as agatekeeper to prevent unauthorized access toyour computers and network.5. Use email wisely. Email is a common tool tosend viruses around the world. Aside frominadvertent confidentiality breaches that canarise, check the source address and destinationaddress as well as the attachments to ensureyou know where emails come from and towhom they are being sent. ii6. Metadata. If you do not know what it is, and therisk it poses to you, then maybe it is somethingto learn about. iii7. Develop an <strong>of</strong>fice policy. This is a good practicefor you, as well as your staff and contractors,and should set out where your passwords arestored and who can access your systems if youare unavailable for health or personal reasons.Think <strong>of</strong> it as being akin to a ‘Power <strong>of</strong> Attorney.’8. Back up data. As costs for hard-drive backupand online backup systems continue to comedown, it makes sense in today’s businessenvironment to have a backup system in place.It would be good to test the backup by conductinga recovery test at least annually. ivThe Standards set out the minimum retentionrequirements for your work files and reports. Theyalso give the appraiser the discretion to keep theBy George Ward, AACIChair, Pr<strong>of</strong>essional Affairs Coordinating Committeetraditional paper files, or take full advantage <strong>of</strong>technology to retain digital copies, either onsiteor <strong>of</strong>fsite. The key is to ensure that you can accessthe data and that the confidentiality <strong>of</strong> the data isnot compromised.End notes1http://www.aicanada.ca/images/content/file/CPV_2010_<strong>Book</strong>3(aug5).pdfiA celebrity once used ‘Tinkerbell,’ whichelevated it to Number 3 spot. It was the name<strong>of</strong> her pet.iiWho can forget this recent blooper:“Please disregard this email, it was intended formy client.Sent wirelesslySubject: Re: Disclosure …I am not supposed to tell you the value, keep itbetween us, the value was …”www.AppraiserChat.comiiihttp://en.wikipedia.org/wiki/Metadataivhttp://en.wikipedia.org/wiki/Remote_backup_servicePr<strong>of</strong>essional AffairsCoordinating CommitteeGeorge Ward, AACI – ChairBrian Varner, AACIDarrell Thorvaldson, AACILeonard Lee, AACIJohn Ingram, AACITo contact this committee, email:pr<strong>of</strong>essionalaffairs@aicanada.caclick here to return to table 0f contentsCanadian Property Valuation Volume 54 | book 4 | 2010 Évaluation Immobilière au <strong>Canada</strong> 39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!