KG LEGAL \ INFO
BLOG

KIELTYKA GLADKOWSKI KG LEGAL participated in the training devoted to “Polish National Electronic Invoicing System” – obligatory system for entrepreneurs in Poland from 2023, voluntary in 2022

The workshop devoted to the new Polish system of electronic invoicing took place on 27 January 2022, it was organized by the Business Trends Academy, a joint project of Soneta LLC, software developer ENOVA 365, Microsoft and Intel.

About the Polish National e-Invoice System (KSeF)

The Polish National e-Invoice System (KSeF) is operated by the Polish Head of the National Fiscal Administration, who is the administrator of all data in the National e-Invoice System.

Functionality of the Polish National e-Invoice System:

  • granting, modifying and withdrawing permissions and notification of possession or withdrawal of permissions
  • verification of permissions at login attempt
  • issuing, accessing, receiving, storing and assigning identification numbers to structured invoices
  • verification of the compliance of the sent invoice with the template (scheme).
  • notification of temporary non-functioning of the system and of attempted login by an unauthorised person.

Who can use the Polish National e-Invoice System:

  • Taxpayer
  • Entities designated by the taxpayer (e.g. an accounting office)
  • Enforcement bodies, bailiffs
  • Natural persons designated by the above-mentioned entities.

Important note: The Polish National e-Invoice System does not exclude foreign contractors, so they can also receive structured invoices, although they may wish to receive it in the traditional way.

More

Screening algorithms used by Facebook – 2% of effectiveness. Is it an open legal problem?

So far, users have uploaded an enormous amount of 350 billion photos, and nearly 35 million people update their status every day on Facebook platform. With such numbers, it is very difficult to verify the content posted on the platform, which in a considerable number of cases violates community standards. In order to stop this dangerous process, the company had to undertake more technologically demanding solutions, so that it operates in accordance with legal and ethical standards.

Facebook Community Standards

The aforementioned Community Standards are the key for fighting with abuses on the platform. They are simply guidelines developed by Facebook’s employees, which list what is allowed and what is forbidden. They are based on user feedback and expert advice in areas such as technology, public safety and human rights. They apply to all users, are valid worldwide, and apply to all types of content. They have been divided into categories concerning: violence and illegal behaviour, security, objectionable content, integrity and authenticity, and even protection of intellectual property. Each of them describes specific behaviours/content that are strictly prohibited, and the catalogue itself grows with emerging socials problems. The most significant and widespread problem with violations of these standards is hate speech.

Classifiers – screening algorithms

More

Spoofing as a form of cybercrime

Along with the development of technology, which gives us more and more opportunities, the risk of cyber-attacks on our personal data is also growing. Hackers are using more and more sophisticated methods of compromising security to achieve their goal. One of the forms of cybercrime is spoofing, i.e. a group of attacks on ICT systems consisting in impersonating another element of the IT system, the effect of which is achieved by placing prepared data packets on the network or incorrect use of protocols.

Spoofing definition

The term “spoof” dates back over a century and refers to any form of trickery. However, today it is mostly used when talking about cybercrime. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source, which can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server. It can be used to gain access to a target’s personal information, spread malware through infected links or attachments, bypass network access controls, or redistribute traffic to conduct a denial-of-service attack. Also it is a good way to gains access to someone’s device in order to execute a larger cyber-attack. Successful attacks can lead to infected computer systems and networks, data breaches, and loss of revenue – all liable to affect the organization’s public reputation. In addition, spoofing that leads to the rerouting of internet traffic can overwhelm networks or lead customers to malicious sites aimed at stealing information or distributing malware.

How spoofing works?

More

KIELTYKA GLADKOWSKI KG LEGAL participated in the training devoted to “Polish National Electronic Invoicing System” – obligatory system for entrepreneurs in Poland from 2023, voluntary in 2022

Electronic Invoicing System

The workshop devoted to the new Polish system of electronic invoicing took place on 27 January 2022, it was organized by the Business Trends Academy, a joint project of Soneta LLC, software developer ENOVA 365, Microsoft and Intel.

About the Polish National e-Invoice System (KSeF)

The Polish National e-Invoice System (KSeF) is operated by the Polish Head of the National Fiscal Administration, who is the administrator of all data in the National e-Invoice System.

Functionality of the Polish National e-Invoice System:

  • granting, modifying and withdrawing permissions and notification of possession or withdrawal of permissions
  • verification of permissions at login attempt
  • issuing, accessing, receiving, storing and assigning identification numbers to structured invoices
  • verification of the compliance of the sent invoice with the template (scheme).
  • notification of temporary non-functioning of the system and of attempted login by an unauthorised person.

More

KIELTYKA GLADKOWSKI KG LEGAL will participate in “Healthtronics EU-Israel bridge”

On 27 January 2022 there will take place the event “Healthtronics EU – Israel bridge”, organized by LifeScience Cluster Krakow, which will be attended by partners from KG LEGAL. The meeting is aimed at establishing cooperation between Polish, European and Israeli entities within the framework of a virtual business mission and their familiarisation with the health sector in the European Union countries and Israel. In addition, it aims to broaden the horizons of the high-tech industry, provide practical knowledge on the commercialisation of products and inspire projects in the field of health and biotechnology. The meeting will discuss topics related to value chains in the health sector, the e-health ecosystem in Israel and the Israeli medical device sector. During the meeting, a three-hour networking event is planned for representatives of companies from the European Union countries and Israel, who will have the opportunity to present themselves during the meeting and establish contacts between each other. Companies such as ARANET, BIO-T, BORN, PERCEPTUS, DARWIN BIOMEDICAL, TYTOCARE, VIRUSIGHT, VITALERTER, YSIUM MEDICAL, ZAYA ARTIFICIAL INTELLIGENCE will participate in the meeting.

More

UP