Real Estate - Advertising and Technology in MD
Allows you to create a "recipe" to monitor your online listings on Craigslist.
"if this, then that" alert
reducing risk to compuer systems
-don't leave clients unattended in office -lock desk -lock computer -encrypt email and internet activity -use secure http sites -back up files -software updates -don't click on weird links or attached files
tips
-dont advertise client possessions - just house -dont use word "Secluded" or "private"
websites
MLS, company website, personal website must have accurate info required contact info and disclosures must be provided many have disclaimeers that material on site is for info purposes and that no reps are being made
keylogger
capture users keystrokes to get passwords, etc
malware scans
causes damage to systems or data virus, worms, trojan horses, spyware
worms
copy and reproduces using email or transport tools
cloning
copying and trying to obtain money
adware
displays ads, may report info to marketer
don't make commitments over email - they can hold up in court as binding signature INTENT be carefula bout forwarding confidential
suspicious links
dont click
data disposal
dumping of data
back up
extra copy of computer files for recovering files
social media
facebook, twitter, youtube, linkedin instructions for social media get clients permission to post on social media licensees should monitor comments and shares
cookie
file placed on comp when user visits website
password
first line of protection prohibiting access to compe
Allows you to set up an alert to monitor your online listings.
google alert
Allows you to use an actual listing photo to search for other Internet sites where it appears.
google image search
firewall
hardware or software devices that control network access and communications between netowk and internet
http
hypertext transfer
legal considerations online
listings = exposure and liability *wrong info can lead to litigation brokerages should have policies and procedures for these areas 1. websites 2. social media 3. email
trojan horse
looks like lefit software but allows someone else to take over a comp cannot replicate themselves
phising
mislead ppl into divulging confidential info using text or email
Con artists use real estate listing information to fraudulently rent out a property.
online rental scam
hacker
programmer that gains unauthorized access to compuer
lock wireless network
protext wireless networks from hackers
bot or web bot
robot - auto program that stimulates human action on internet can control comps, launch attacks, compromise data
Software technique that harvests listing photos, addresses, and descriptions.
scraping
virus
self replicates and infect files, programs, systems
cloud
share and store data over internet
spyware
software that collects info about comp and how its used and sends info over internet
password vault
store encrypted passwords - requires user to create new password
email encryption
turn info into indecipherable code
data breach
unauthorized access to confidential info
software updates
used to plug security holes