Real Estate - Advertising and Technology in MD

¡Supera tus tareas y exámenes ahora con Quizwiz!

Allows you to create a "recipe" to monitor your online listings on Craigslist.

"if this, then that" alert

reducing risk to compuer systems

-don't leave clients unattended in office -lock desk -lock computer -encrypt email and internet activity -use secure http sites -back up files -software updates -don't click on weird links or attached files

tips

-dont advertise client possessions - just house -dont use word "Secluded" or "private"

websites

MLS, company website, personal website must have accurate info required contact info and disclosures must be provided many have disclaimeers that material on site is for info purposes and that no reps are being made

keylogger

capture users keystrokes to get passwords, etc

malware scans

causes damage to systems or data virus, worms, trojan horses, spyware

worms

copy and reproduces using email or transport tools

cloning

copying and trying to obtain money

adware

displays ads, may report info to marketer

email

don't make commitments over email - they can hold up in court as binding signature INTENT be carefula bout forwarding confidential

suspicious links

dont click

data disposal

dumping of data

back up

extra copy of computer files for recovering files

social media

facebook, twitter, youtube, linkedin instructions for social media get clients permission to post on social media licensees should monitor comments and shares

cookie

file placed on comp when user visits website

password

first line of protection prohibiting access to compe

Allows you to set up an alert to monitor your online listings.

google alert

Allows you to use an actual listing photo to search for other Internet sites where it appears.

google image search

firewall

hardware or software devices that control network access and communications between netowk and internet

http

hypertext transfer

legal considerations online

listings = exposure and liability *wrong info can lead to litigation brokerages should have policies and procedures for these areas 1. websites 2. social media 3. email

trojan horse

looks like lefit software but allows someone else to take over a comp cannot replicate themselves

phising

mislead ppl into divulging confidential info using text or email

Con artists use real estate listing information to fraudulently rent out a property.

online rental scam

hacker

programmer that gains unauthorized access to compuer

lock wireless network

protext wireless networks from hackers

bot or web bot

robot - auto program that stimulates human action on internet can control comps, launch attacks, compromise data

Software technique that harvests listing photos, addresses, and descriptions.

scraping

virus

self replicates and infect files, programs, systems

cloud

share and store data over internet

spyware

software that collects info about comp and how its used and sends info over internet

password vault

store encrypted passwords - requires user to create new password

email encryption

turn info into indecipherable code

data breach

unauthorized access to confidential info

software updates

used to plug security holes


Conjuntos de estudio relacionados

Physics II Test 1 Quiz questions

View Set

Mastering A& P chp 26 reproductive system

View Set

Chapter 7: Strict Liability and Product Liability

View Set

Psychology chapter 5 Consciousness

View Set

Bar Smarts 4 management and recipes

View Set