Ten blog korzysta z plików cookies na zasadach określonych here
Close
NEW TECH & INNOVATIONS
The use of facial recognition technology. An ease or a threat?
Face recognition technology is nothing else than the possibility of automatic identification of a person on the basis of their photo (digital image). It is based on comparing a recorded or continuously registered image to a previously collected database. Let's consider the benefits but also the risks of this technology and whether it is worth [...]


ADVERTISING & EVENTS
Virtual meetings - how to keep your data safe
In the era of the epidemic threat, virtual meetings have strongly increased in popularity. The growth of this form of organising training and conferences has created new challenges for agencies and their clients regarding the security of personal data and the preparation of events in a way that complies with RODO regulations. The source of [...]


NEW TECH & INNOVATIONS
Apple vs social media - the great war on user privacy
New Apple policy "You're being tracked" was a phrase once known only from spy movies. Now it's an everyday occurrence for practically everyone who uses the Internet. On the surface, it's a win-win deal - Internet companies earn money on our data (mainly through profiled advertising), and Internet users get free services in return (social [...]


NEW TECH & INNOVATIONS
Privacy and personal data in business automation processes
Robotization and automation have been a part of developed economies for several decades now. Further development of these areas through the implementation of artificial intelligence and other forms of automation is an inevitable process and provides a unique opportunity for a technological leap and improved efficiency not only for individual entrepreneurs but also for countries. [...]


NEW TECH & INNOVATIONS
An EU-centric country with a Kafkaesque discriminatory algorithm targeting its citizens. The story of how a lack of oversight of new technologies brought down the government in the Netherlands.
The technology used by the government to deter social crime and improve the efficiency of government offices can lead to unwarranted exclusion and violations of privacy rights. The Prime Minister of the Netherlands, who resigned from the government as a consequence of a malfunctioning algorithm, experienced this. There has been a lot of public discussion [...]


NEW TECH & INNOVATIONS
Protecting children's privacy - will we follow the UK's lead?
On 2 September 2020. The ICO (Information Commissioner's Office - the UK equivalent of the Polish UODO) published a code for online services on age-appropriate design. It aims to ensure that the Internet becomes a safe place for children to learn and play, even though it was created as a tool for adults. The idea [...]


NEW TECH & INNOVATIONS
With the shield or on the shield (of privacy)?
During the press conference, which took place on February 2nd, 2016 r., The European Commission announced the establishment of an agreement referred to as the “EU – US Privacy Shield”, which aims at imposing new, strengthened obligations on American entrepreneurs for transmitting personal data of European Union citizens to the United States. Privacy Shield instead [...]


PERSONAL RIGHTS AND MEDIA CRISES
“Smile! You’re on candid camera!” Journalistic provocations versus privacy protection in the ECHR’s decision in Bremner v. Turkey
A hidden camera in the hands of a journalist is a controversial tool. Such methods of gathering materials may raise objections as to their compliance with the journalistic ethics and standards. On the other hand, it is often the only way to gather information on important matters. Many would have never seen the light of [...]


NEW TECH & INNOVATIONS
Un(safe) harbor?
The judgement of the Court of Justice of 6 October 2015 (case No C-362/14) on the “Safe Harbor ” program still resounds. We provided the background for this case earlier on our blog when the Court initiated the procedure.The Safe Harbor program was developed between the US Trade Department and the European Commission to enable certified [...]


FASHION, CULTURE & ART
Permitted photography part 2 – pictures and the image of persons photographed
In contrast with the citizens of North Korea and some other similar places on the globe, we are living in a legal system in which photography is, as a rule, permitted. When taking pictures on the street, we shouldn’t expect being charged with the disclosure of state secrets or propagating foreign, unacceptable values. In the [...]


FASHION, CULTURE & ART
Permitted photography, part 1 – Preface
There is no legal act in Polish law that comprehensively cover legal matters related to photography. What’s more, the law provides no answer to some of the most pressing issues that emerge in practice. This leaves a lot of room for interpretation, oftentimes substantially dependent on the facts of a given case. Considering such issues [...]


FILM, MEDIA & GAMING
Let’s play… or what does a Latin American dictator have to do with a virtual sword and what does the law say about all this?
Many people associate video games with computer programs. A common approach reduces the legal issue of video games to the analysis of the provisions of the Copyright Act in the scope of Section 7 of the Act – i.e. special rules regarding computer programs. In the case of modern games, this approach is, however, too [...]


Would you like to be informed about the latest blog posts?

  • - Just provide your e-mail address and receive notifications about the latest posts on the SKP/IPblog blog directly to your inbox
  • - We will not send you spam messages

The administrator of your personal data is a SKP Ślusarek Kubiak Pieczyk sp.k. with its registered office in Warsaw, at ul. Ks. Skorupki 5, 00-546 Warszawa.

We respect your privacy, therefore the data provided to us will not be processed and made available outside the SKP for purposes other than those included in the Terms of Service. Detailed provisions regarding our IP Blog, including a catalog of your rights related to the processing of personal data, can be found in the Privacy Policy.