0% found this document useful (0 votes)
0 views4 pages

4-Legaltech-Class-Activity

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 4

1.

Digital technologies are electronic tools, systems,……………………… that generate, store or process
data.
a) devices
b) devices and resources
c) resource data
d) digital systems
2. Lawyers, D octors and Paper -eliminating Te chnologies a re
a) Digitalisation
b) 5G technology
c) Industry 4.0
d) AI Artificial Intelligence
3. C y b e r se c u r i t y i s t h e r e s p o n s i b i l i t y o f e v e r y o n e , b u t - - - - - - - - - - - - - - - - a r e o u r
w o r st d e f e n c e .
a) cryptography
b) Passwords
c) Bio-matric
d) block chain
4. To transfer messages, telecommunications has depended on

a) digital techniques
b) digitalization
c) data integrity
d) technological changes
5. All electronic instruments, automated systems, technical equipment, and resources that produce,
process or store information are included in the definition of…………….
a) Industry 4.0
b) Industry revolution
c) digital technology
d) AI Artificial Intelligence
6. The interconnection of these high-tech innovations creates a -------------------that necessitates a
thorough rethinking of how resources and manufacturing techniques of labour are used.
a) cyber-physical
b) cyber-physical environment
c) physical
d) None of the Above.
7. ………………………….frontier technologies in the health sector are assisting in the saving of lives, the
diagnosis of illnesses, and the extension of life expectancy.
a) AI-enabled
b) Robotics
c) Advanced technologies
d) Sensor Devices
8. ------------------------are the main reason why Digital technology has grown at such a pace
a) Digitalisation
b) Data Transformation
c) smartphones
d) Data Analytics
9. …………….is a method of storing data in such a manner that it is difficult or impossible to alter,
hack, or defraud it. Digital technologies
a) Artificial Intelligence
b) 5G technology
c) Blockchain
d) Cloud computing
10. The regulation was put into effect on May 25, 2018. The -------------------------- is the toughest
privacy and security law in the world …..
a) small and medium-sized enterprises (SMEs)
b) privacy tools
c) European Convention on Human Rights,
d) General Data Protection Regulation (GDPR)
11. Names and email addresses and Location information, ethnicity, gender, biometric data,
religious beliefs, web cookies, and political opinions can be consider as a ------------
1. Personal data.
2. Process data
3. Permanent data
4. Produced data

a) 1
b) 1 and 2
c) 3 and 4
d) 1,2,3,4
12. Contrary to popular belief, not every data controller or processor needs to appoint a,
a) GDPR –Protection Officer
b) GDPR- Service Officer
c) EC – GDPR Council
d) Data Protection Officer (DPO)
13. What is the purpose of having secure policies and procedures in legaltech?
a. To make the technology easier to use
b. To reduce costs
c. To increase efficiency
d. To protect sensitive information and prevent security breaches
14. What are some examples of secure policies and procedures in legaltech?
a. Regular software updates and patching
b. Limiting access to confidential information
c. Implementing two-factor authentication
d. All of the above
15. Why is it important for legaltech companies to have secure policies and procedures in place?
a. To comply with legal regulations
b. To protect their reputation
c. To prevent data breaches and legal liability
d. All of the above
16. What is the role of employees in maintaining secure policies and procedures in legaltech?
a. They are not involved in the process
b. They are responsible for implementing and following the policies and procedures
c. They only need to be trained once and then they can ignore the policies and procedures
d. They are responsible for creating the policies and procedures
17. How can legaltech companies ensure that their secure policies and procedures are effective?

a. By regularly testing and updating them


b. By ignoring feedback from employees and customers
c. By cutting costs and reducing resources d. By never changing them once they are implemented

18. What is information security in the context of legaltech?

a. Protecting confidential information from unauthorized access, use, disclosure, and destruction
b. Ensuring that technology is easy to use
c. Protecting the company's reputation
d. Reducing costs

19. What are some examples of information security measures that can be used in legaltech?

a. Firewalls and antivirus software


b. Encryption
c. Secure file sharing platforms
d. All of the above

20. Why is information security important in legaltech?

a. To protect sensitive client information


b. To comply with legal regulations
c. To prevent data breaches and legal liability
d. All of the above

21. What is the role of employees in maintaining information security in legaltech?

a. They are not involved in the process


b. They are responsible for implementing and following security protocols
c. They only need to be trained once and then they can ignore the security protocols d. They are
responsible for creating the security protocols

22. How can legaltech companies ensure that their information security measures are effective?

a. By regularly testing and updating them


b. By ignoring feedback from employees and customers
c. By reducing resources and cutting costs
d. By never changing them once they are implemented

23. What are privacy laws?

a. Laws that protect individuals' personal information from unauthorized access, use, and disclosure
b. Laws that regulate how technology is used in legal processes
c. Laws that protect companies' confidential information
d. Laws that regulate how legal documents are stored and shared
Answer: a. Laws that protect individuals' personal information from unauthorized access, use, and
disclosure
24. How do privacy laws affect legaltech?

a. They limit the use of technology in legal processes


b. They require legaltech companies to comply with certain security and privacy standards
c. They do not have any impact on legaltech
d. They make legaltech more expensive to implement

25. What are some examples of privacy laws that impact legaltech?

a. GDPR and CCPA


b. HIPAA
c. FERPA
d. All of the above

26. What are some best practices for legaltech companies to comply with privacy laws?

a. Implementing strong data security measures


b. Limiting the collection and use of personal information
c. Providing individuals with the right to access, correct, and delete their personal information
d. All of the above
27. What are the consequences of non-compliance with privacy laws in legaltech?

a. Legal liability and financial penalties


b. Increased efficiency and cost savings
c. Improved customer satisfaction
d. Enhanced reputation and brand image

You might also like