Ten blog korzysta z plików cookies na zasadach określonych here
Close
Key legal challenges of the Internet of Things (IoT)

The Internet of Things (IoT) is a technology that accompanies people in almost all areas of their lives. Home appliances, smart home systems, smartwatches, medical equipment, vehicles and traffic lights – all these items, referred to in legal terms as connected products, are textbook examples of the wide application of the Internet of Things. Thanks [...]
The Electronic Communications Law or the ‘Constitution of the Telecommunications Market’

On Sunday, 10 November this year, the long-awaited Polish regulation - the Electronic Communications Law (‘ECL Act’) came into force. ECL Act implements the provisions of two directives into the Polish legal system: Directive 2018/1972 of the European Parliament and of the Council (EU) of 11 December 2018 establishing the European Electronic Communications Code and [...]
The new rules for the processing of personal data by online pharmacies

On 4 October 2024, the Court of Justice of the EU ruled in Case C-21/23, which will significantly impact e-commerce businesses, particularly pharmacies selling online. The Court decided that the information entered in ordering medicines online, such as name, delivery address and elements necessary for the individualisation of medicinal products, constitutes 'health data' within the [...]
Two weeks after the implementation of the Omnibus Directive

Amendments to the law came into force as of 1 January 2023, which aim to implement into Polish law three EU directives commonly referred to as the Omnibus Directive, the Directive on the sale of goods (2019/771), and the Digital Directive (2019/770). The purpose of the changes is to better protect consumers, in particular against [...]
A chance for the secure transfer of personal data to the USA (?)

In a press statement on 7 October 2022, the White House indicated that: "Transatlantic data flows are critical to enabling the $7.1 trillion U.S.-EU economic relationship". The problem, however, is that the legality of the transfer of personal data overseas is being questioned - due to virtually unrestricted access to personal data by US services [...]
The use of facial recognition technology. An ease or a threat?

Face recognition technology is nothing else than the possibility of automatic identification of a person on the basis of their photo (digital image). It is based on comparing a recorded or continuously registered image to a previously collected database. Let's consider the benefits but also the risks of this technology and whether it is worth [...]
Robotisation and automation. Who can be held responsible for what in implementations?

The implementation of automation and robotics in an enterprise is an extremely complex process, which includes the supply of a number of installations, elements, and devices, implementation and commissioning of the system, and supply of the necessary software. It also includes the preparation of the system installation site, which should meet the relevant criteria and [...]
Decompilation of a computer program to remove errors

There are no computer programs that run faultlessly. Sooner or later there will be errors that need to be fixed. In many cases this will mean that changes will have to be made to the source code of the software, i.e. the original form of writing a computer program. However, except in the case of [...]
Acceptance, guarantee, and system maintenance in contracts for the implementation of automation and robotics

Implementation of automation and robotization in the enterprise is a complex and extremely expensive process, that takes a long time and is associated with several risks. The consequences of project failure and possible litigation may exceed the value of the contract itself and become painful for both parties. That is why it is so important [...]
Cybercrime. DDoS attacks

Banks, airlines, auction websites, online game services and even government websites and universities increasingly become victims of cybercriminals. One of the most popular methods of paralyzing servers and websites is the so called DoS attack (Denial of Service), that is the deliberate overloading of a network or end user devices with traffic. If a large [...]
Liability of an event organizer for damages

Event organization is in most cases a complex undertaking preceded by long preparation. But even the best planning can not prevent liability from the possible damages and financial consequences associated with them. The organization's liability for  damages from  the event is a very broad subject. This article only covers selected cases of damage and basic [...]
Are instructions for an insurance package a copywritable work?

The Supreme Court has found that the idea of an insurance package written in the form of instructions for its use is a work and is subject to copyright protection. It is worth noting that a concept or an idea does not constitute a work within the meaning of the provisions of the Copyright and [...]
1 2

Would you like to be informed about the latest blog posts?

  • - Just provide your e-mail address and receive notifications about the latest posts on the SKP/IPblog blog directly to your inbox
  • - We will not send you spam messages

The administrator of your personal data is a SKP Ślusarek Kubiak Pieczyk sp.k. with its registered office in Warsaw, at ul. Ks. Skorupki 5, 00-546 Warszawa.

We respect your privacy, therefore the data provided to us will not be processed and made available outside the SKP for purposes other than those included in the Terms of Service. Detailed provisions regarding our IP Blog, including a catalog of your rights related to the processing of personal data, can be found in the Privacy Policy.