4-Legaltech-Class-Activity
4-Legaltech-Class-Activity
4-Legaltech-Class-Activity
Digital technologies are electronic tools, systems,……………………… that generate, store or process
data.
a) devices
b) devices and resources
c) resource data
d) digital systems
2. Lawyers, D octors and Paper -eliminating Te chnologies a re
a) Digitalisation
b) 5G technology
c) Industry 4.0
d) AI Artificial Intelligence
3. C y b e r se c u r i t y i s t h e r e s p o n s i b i l i t y o f e v e r y o n e , b u t - - - - - - - - - - - - - - - - a r e o u r
w o r st d e f e n c e .
a) cryptography
b) Passwords
c) Bio-matric
d) block chain
4. To transfer messages, telecommunications has depended on
a) digital techniques
b) digitalization
c) data integrity
d) technological changes
5. All electronic instruments, automated systems, technical equipment, and resources that produce,
process or store information are included in the definition of…………….
a) Industry 4.0
b) Industry revolution
c) digital technology
d) AI Artificial Intelligence
6. The interconnection of these high-tech innovations creates a -------------------that necessitates a
thorough rethinking of how resources and manufacturing techniques of labour are used.
a) cyber-physical
b) cyber-physical environment
c) physical
d) None of the Above.
7. ………………………….frontier technologies in the health sector are assisting in the saving of lives, the
diagnosis of illnesses, and the extension of life expectancy.
a) AI-enabled
b) Robotics
c) Advanced technologies
d) Sensor Devices
8. ------------------------are the main reason why Digital technology has grown at such a pace
a) Digitalisation
b) Data Transformation
c) smartphones
d) Data Analytics
9. …………….is a method of storing data in such a manner that it is difficult or impossible to alter,
hack, or defraud it. Digital technologies
a) Artificial Intelligence
b) 5G technology
c) Blockchain
d) Cloud computing
10. The regulation was put into effect on May 25, 2018. The -------------------------- is the toughest
privacy and security law in the world …..
a) small and medium-sized enterprises (SMEs)
b) privacy tools
c) European Convention on Human Rights,
d) General Data Protection Regulation (GDPR)
11. Names and email addresses and Location information, ethnicity, gender, biometric data,
religious beliefs, web cookies, and political opinions can be consider as a ------------
1. Personal data.
2. Process data
3. Permanent data
4. Produced data
a) 1
b) 1 and 2
c) 3 and 4
d) 1,2,3,4
12. Contrary to popular belief, not every data controller or processor needs to appoint a,
a) GDPR –Protection Officer
b) GDPR- Service Officer
c) EC – GDPR Council
d) Data Protection Officer (DPO)
13. What is the purpose of having secure policies and procedures in legaltech?
a. To make the technology easier to use
b. To reduce costs
c. To increase efficiency
d. To protect sensitive information and prevent security breaches
14. What are some examples of secure policies and procedures in legaltech?
a. Regular software updates and patching
b. Limiting access to confidential information
c. Implementing two-factor authentication
d. All of the above
15. Why is it important for legaltech companies to have secure policies and procedures in place?
a. To comply with legal regulations
b. To protect their reputation
c. To prevent data breaches and legal liability
d. All of the above
16. What is the role of employees in maintaining secure policies and procedures in legaltech?
a. They are not involved in the process
b. They are responsible for implementing and following the policies and procedures
c. They only need to be trained once and then they can ignore the policies and procedures
d. They are responsible for creating the policies and procedures
17. How can legaltech companies ensure that their secure policies and procedures are effective?
a. Protecting confidential information from unauthorized access, use, disclosure, and destruction
b. Ensuring that technology is easy to use
c. Protecting the company's reputation
d. Reducing costs
19. What are some examples of information security measures that can be used in legaltech?
22. How can legaltech companies ensure that their information security measures are effective?
a. Laws that protect individuals' personal information from unauthorized access, use, and disclosure
b. Laws that regulate how technology is used in legal processes
c. Laws that protect companies' confidential information
d. Laws that regulate how legal documents are stored and shared
Answer: a. Laws that protect individuals' personal information from unauthorized access, use, and
disclosure
24. How do privacy laws affect legaltech?
25. What are some examples of privacy laws that impact legaltech?
26. What are some best practices for legaltech companies to comply with privacy laws?