Ten blog korzysta z plików cookies na zasadach określonych here
Open-Source - open software, but within limits
WordPress, Linux, and Android are examples of the most popular open-source software. This means they are freely available to the public and operate on open-source code, which users can often edit. The popularity of this software type not only reduces costs for users but also provides access to the source code, empowering users to develop [...]

Introduction to blockchain
Blockchain technology is an essential pillar of the Web 3.0 (Web 3.0) concept and, alongside machine learning and the internet of things, is seen as a critical innovation that will change the existing face of the internet. The idea of Web 3.0, unlike its predecessors 1.0 and 2.0, assumes a decentralised and propertarian nature of [...]

A chance for the secure transfer of personal data to the USA (?)
In a press statement on 7 October 2022, the White House indicated that: "Transatlantic data flows are critical to enabling the $7.1 trillion U.S.-EU economic relationship". The problem, however, is that the legality of the transfer of personal data overseas is being questioned - due to virtually unrestricted access to personal data by US services [...]

Implementing AI-based automation - practical challenges
There is an anecdote circulating in the IT industry and among lawyers dealing with artificial intelligence. A contractor talking about the advantages of his solution focuses on how smart it is and repeatedly refers to the term 'artificial intelligence'. After the presentation, the contracting authority asks if the contractor is following the development of the [...]

The use of facial recognition technology. An ease or a threat?
Face recognition technology is nothing else than the possibility of automatic identification of a person on the basis of their photo (digital image). It is based on comparing a recorded or continuously registered image to a previously collected database. Let's consider the benefits but also the risks of this technology and whether it is worth [...]

Virtual meetings - how to keep your data safe
In the era of the epidemic threat, virtual meetings have strongly increased in popularity. The growth of this form of organising training and conferences has created new challenges for agencies and their clients regarding the security of personal data and the preparation of events in a way that complies with RODO regulations. The source of [...]

Apple vs social media - the great war on user privacy
New Apple policy "You're being tracked" was a phrase once known only from spy movies. Now it's an everyday occurrence for practically everyone who uses the Internet. On the surface, it's a win-win deal - Internet companies earn money on our data (mainly through profiled advertising), and Internet users get free services in return (social [...]

Robotisation and automation. Who can be held responsible for what in implementations?
The implementation of automation and robotics in an enterprise is an extremely complex process, which includes the supply of a number of installations, elements, and devices, implementation and commissioning of the system, and supply of the necessary software. It also includes the preparation of the system installation site, which should meet the relevant criteria and [...]

Decompilation of a computer program to remove errors
There are no computer programs that run faultlessly. Sooner or later there will be errors that need to be fixed. In many cases this will mean that changes will have to be made to the source code of the software, i.e. the original form of writing a computer program. However, except in the case of [...]

Commercial communications in the light of the amended Broadcasting Act
On 1 November 2021, an amendment to the Broadcasting Act came into force. The changes are due to the need to implement Directive 2018/1808 of the European Parliament and of the Council of 14 November 2018[1]. In addition to the provisions on the operation of video sharing platforms, or changes to the labelling of content [...]

How to tax plan the implementation of company automation and robotisation
Investments in the field of automation and robotisation are connected with significant outlays incurred by entrepreneurs. Therefore, any movement in this area should be absolutely preceded by an extensive analysis, not only legal, but also financial, including tax aspects. Tax issues related to investments in innovation are becoming increasingly important, which seems to be noticed [...]

Acceptance, guarantee, and system maintenance in contracts for the implementation of automation and robotics
Implementation of automation and robotization in the enterprise is a complex and extremely expensive process, that takes a long time and is associated with several risks. The consequences of project failure and possible litigation may exceed the value of the contract itself and become painful for both parties. That is why it is so important [...]

Would you like to be informed about the latest blog posts?

  • - Just provide your e-mail address and receive notifications about the latest posts on the SKP/IPblog blog directly to your inbox
  • - We will not send you spam messages

The administrator of your personal data is a SKP Ślusarek Kubiak Pieczyk sp.k. with its registered office in Warsaw, at ul. Ks. Skorupki 5, 00-546 Warszawa.

We respect your privacy, therefore the data provided to us will not be processed and made available outside the SKP for purposes other than those included in the Terms of Service. Detailed provisions regarding our IP Blog, including a catalog of your rights related to the processing of personal data, can be found in the Privacy Policy.