JURI 615 Quiz 3
JURI Quiz 3 Key Persons and Information Security
Covers the Learn material from Module 5: Week 5 — Module 6: Week 6.
- There are generally two conceptual models for the gatekeeper’s role
- The rules that govern lawyers generally adhere and follow the public servant model
- Under rules of professional conduct, lawyers may only represent natural persons, not legal entities.
- If a lawyer that represents an organization undercovers wrongdoing, confidentiality prevents the lawyer from telling that to others in the organization
- The “up-the-ladder” provision, always requires a lawyer to report wrongdoing to a higher level of corporate management.
- Based on the rules of professional conduct, if a lawyer is discharged for exercising an up-the- ladder reporting, what should the lawyer do?
- As a default rule, because an employee works for a company, the company’s lawyer can always talk to an employee, regardless if that employee has their own lawyer.
- The lawyer’s duty of confidentiality applies only to client communications
- Which of the following is not an exception to the lawyer’s duty of confidentiality?
- Like the duty of confidentiality, the attorney-client privilege covers both facts and communications
- By its very nature, the attorney-client privilege covers all communications between a person and his or her lawyer
- The attorney-client privilege is inviolable and impenetrable.
- Ordinarily, documents prepared for litigation by a lawyer or agent of the lawyer can be discovered.
- Which of the following groups exercises regulatory authority over the auditors of public companies?
- Which of the following is not a matter that must be communicated about a critical audit matter in an auditor’s report:
- Which of the following is not an additional matter required of auditors in the European Union?
- Which of the following is not a service that independent auditor may not offer to its publicly traded audit clients:
- Under Gramm-Leach-Bliley issued Security Guidelines, which is not a required step of a risk assessment:
- HIPAA protects healthcare information in the hands of any company
- Which of the following is likely not protected health information?
- Which of the following is not a HHS principal rule that implements HIPAA?
- Under the HHS Security Rule, which is not a proper factor when analyzing security measures
- There is an individual private right of action for a HIPAA violation
- Poor cyber-security protocols may constitute an unfair consumer trade practice
- Due to their unique roles, lawyers do not need to worry about cyber risks