The activity of public sector entities often involves generation and use of extensive sets of data. These datasets serve to perform public tasks, but often have measurable economic value. Here we will examine the rules under which entities from outside the public sector can gain access to data of this type and use them to create new products and services.
Continue reading “Re-use of public sector information”Author: Rafał Kuchta
Video games, virtual currencies, and money laundering
What could video games have in common with money laundering and terrorism financing? Not much, it might seem at first glance. The duties in the Anti Money Laundering and Counter Terrorism Financing Act are mainly addressed to entities involved in financial services, such as banks and payment institutions. The AML/CTF regulations don’t directly refer to video games or persons involved in their development and operation.
Continue reading “Video games, virtual currencies, and money laundering”Websites of private joint-stock company or joint-stock limited partnership
Does a company or limited partnership have to have its own website? Does it have to operate the site itself? What information must be posted there? Practical pointers under the amended Commercial Companies Code
An amendment to the Commercial Companies Code entered into force at the start of 2020, imposing on joint-stock companies and joint-stock limited partnerships an obligation to operate a website and to post certain information there for stockholders (as we previously reported here).
Although the new regulation applies to all joint-stock companies, in practice it changes little for public companies, which were already subject to much more extensive requirements, and thus we do not discuss public companies further in this article.
The new regulation should be examined more closely, as it has generated (probably unintentionally) certain doubts as to what the new obligation entails.
Continue reading “Websites of private joint-stock company or joint-stock limited partnership”The hash – a computer file’s digital fingerprint
One of the many uses of hash functions is the identification and verification of computer files.
Everyone has experienced having to frantically search for an important document that was saved “somewhere in the computer” but is needed immediately. In such situations, we usually resort to the search function built into the operating system; but in the end, we just have to browse through the files, one at a time, until we find (or not) the right one. But what if we need to find a file among hundreds of thousands of others?
Continue reading “The hash – a computer file’s digital fingerprint”
No liability for free public WiFi?
According to an Advocate General at the Court of Justice, a provider of free WiFi is not responsible for the actions of its users.
Outsourcing no escape from liability for telemarketing without consent
The Supreme Court of Poland ruled on 17 February 2016 that an entity conducting direct marketing using automated generating systems (in that case SMS ads) is liable for failure to obtain consent from recipients also when it has contracted out the marketing to an external firm.
Continue reading “Outsourcing no escape from liability for telemarketing without consent”