Author: Rafał Kuchta

He tracks technological progress with an equal mixture of fascination and concern. He is particularly interested in the role and activity of online platforms. A lawyer in the New Technologies practice at Wardyński & Partners. Write to the author: rafal.kuchta@wardynski.com.pl

Re-use of public sector information

The activity of public sector entities often involves generation and use of extensive sets of data. These datasets serve to perform public tasks, but often have measurable economic value. Here we will examine the rules under which entities from outside the public sector can gain access to data of this type and use them to create new products and services.

Continue reading

Video games, virtual currencies, and money laundering

What could video games have in common with money laundering and terrorism financing? Not much, it might seem at first glance. The duties in the Anti Money Laundering and Counter Terrorism Financing Act are mainly addressed to entities involved in financial services, such as banks and payment institutions. The AML/CTF regulations don’t directly refer to video games or persons involved in their development and operation.

Continue reading

Websites of private joint-stock company or joint-stock limited partnership

Does a company or limited partnership have to
have its own website? Does it have to operate the site itself? What information
must be posted there? Practical pointers under the amended Commercial Companies
Code

An amendment to the Commercial Companies Code entered into force at the start of 2020, imposing on joint-stock companies and joint-stock limited partnerships an obligation to operate a website and to post certain information there for stockholders (as we previously reported here).

Although
the new regulation applies to all joint-stock companies, in practice it changes
little for public companies, which were already subject to much more extensive
requirements, and thus we do not discuss public companies further in this
article.

The new regulation should be examined more closely, as it has generated (probably unintentionally) certain doubts as to what the new obligation entails.

Continue reading

The hash - a computer file’s digital fingerprint

One of the many uses of hash functions is the identification and verification of computer files.

Everyone has experienced having to frantically search for an important document that was saved “somewhere in the computer” but is needed immediately. In such situations, we usually resort to the search function built into the operating system; but in the end, we just have to browse through the files, one at a time, until we find (or not) the right one. But what if we need to find a file among hundreds of thousands of others?

Continue reading

New regulations on blocking websites

Last year we discussed, in the context of copyright infringement, whether an Internet service provider could be required to block access to a specific web page. The conclusion was that current law did not expressly provide for such measures but attempts to apply them could not be ruled out. But a number of legislative proposals have appeared recently calling for blocking of Internet content that does not infringe copyright.

Continue reading

No liability for free public WiFi?

According to an Advocate General at the Court of Justice, a provider of free WiFi is not responsible for the actions of its users.

Continue reading