Posted on Categories anti-money laundering, creative industry

Video games, virtual currencies, and money laundering

What could video games have in common with money laundering and terrorism financing? Not much, it might seem at first glance. The duties in the Anti Money Laundering and Counter Terrorism Financing Act are mainly addressed to entities involved in financial services, such as banks and payment institutions. The AML/CTF regulations don’t directly refer to video games or persons involved in their development and operation.

Continue reading “Video games, virtual currencies, and money laundering”
Posted on Categories changes in law

Websites of private joint-stock company or joint-stock limited partnership

Does a company or limited partnership have to have its own website? Does it have to operate the site itself? What information must be posted there? Practical pointers under the amended Commercial Companies Code

An amendment to the Commercial Companies Code entered into force at the start of 2020, imposing on joint-stock companies and joint-stock limited partnerships an obligation to operate a website and to post certain information there for stockholders (as we previously reported here).

Although the new regulation applies to all joint-stock companies, in practice it changes little for public companies, which were already subject to much more extensive requirements, and thus we do not discuss public companies further in this article.

The new regulation should be examined more closely, as it has generated (probably unintentionally) certain doubts as to what the new obligation entails.

Continue reading “Websites of private joint-stock company or joint-stock limited partnership”
Posted on Categories electronic identification

The hash – a computer file’s digital fingerprint

One of the many uses of hash functions is the identification and verification of computer files.

Everyone has experienced having to frantically search for an important document that was saved “somewhere in the computer” but is needed immediately. In such situations, we usually resort to the search function built into the operating system; but in the end, we just have to browse through the files, one at a time, until we find (or not) the right one. But what if we need to find a file among hundreds of thousands of others?

Continue reading “The hash – a computer file’s digital fingerprint”

Posted on Categories judicatureTags

Outsourcing no escape from liability for telemarketing without consent

The Supreme Court of Poland ruled on 17 February 2016 that an entity conducting direct marketing using automated generating systems (in that case SMS ads) is liable for failure to obtain consent from recipients also when it has contracted out the marketing to an external firm.

Continue reading “Outsourcing no escape from liability for telemarketing without consent”