Scott was a member of the board of directors of Buffalo Corporation. Officers of Buffalo were considering the purchase of new equipment to produce a new product. The board of directors had not been consulted about the new venture, but Scott found out about the plan and objected to its implementation. He sought to inspect the corporate books and records to gain factual information supportive of his position. The officers refused his inspection request, asserting that Scott had no management function or power. Under these circumstances, Scott:
A. is barred from examination of the books and records of the corporation under the business judgment rule.
B. is barred from examination of the books and records of the corporation under the doctrine of respondeat superior.
C. has the right to inspect corporate books and records, as information regarding the corporation and its affairs is essential to perform his duties.
D. has the right to inspect corporate books only if he is also a majority shareholder.
Answer: C
You might also like to view...
With a modular structure, a firm _____. An example of the modular structure is the massive 787 Dreamliner project, in which Boeing contracted with many suppliers, each responsible for one component or assembly, which were then integrated to make the aircraft.
A. is a company outside a company that is created specifically to respond to an exceptional market opportunity B. assembles portions of product provided by outside contractors C. is an organization whose members are geographically apart, usually working via e-mail D. has a central core of key functions and outsources production E. consists of a company with many divisions
Sales reps gave selected customers ____ tickets to special sports events
A) complimentary B) complementary
If your firm wanted to determine the relative worth of various jobs within the firm it would:
a. conduct a job analysis b. develop a job evaluation system c. develop a job specification d. develop a job description e. conduct job enrichment
A(n) ______works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end
a. firewall b. social network c. intrusion detection device d. virtual private network