Publication date: August 26, 2025
What is CSIRT GOV and what is its legislative environment
The Polish Computer Security Incident Response Team (CSIRT GOV), led by the Head of the Internal Security Agency, serves as the national CSIRT. The CSIRT GOV is responsible for coordinating the response process to computer incidents occurring in the area specified in Article 26, Section 7 of the Act of 5 July 2018 on the National Cybersecurity System.
More
Publication date: August 22, 2025
The Polish Ministry of Digital Affairs is responsible for creating and implementing state policy in the areas of computerization, telecommunications, and digital security. It conducts activities aimed at modernizing public administration by implementing modern technological solutions and supporting investments in the digital sector. Its goal is to simplify contacts between citizens and businesses with the administration and increase the efficiency of public services. The ministry is also responsible for developing personal data protection policies, expanding digital services, and eliminating barriers to accessing technology. It manages key state registers, such as the PESEL (Polish National Identification Number), ID cards, identity documents, and vehicle and driver records. It oversees electronic identification systems and trust services, enabling citizens to safely use e-government. The ministry implements Poland’s international commitments in the field of digitalization and participates in shaping EU digital policy. Additionally, it oversees the activities of the President of the Office of Electronic Communications, ensuring the sustainability and development of the telecommunications market. All these activities aim to ensure a modern, innovation-friendly, and user-friendly digital state. The Minister of Digital Affairs supervises the Central Information Technology Centre, the Institute of Telecommunications, the Scientific and Academic Computer Network in Warsaw and the IDEAS Research Institute.
More
Publication date: August 20, 2025
Traditionally, Polish administrative procedures guaranteed the ability to communicate with the public authorities through conventional and traditional channels, i.e., in writing or in person. However, Poland has recently made a significant technological leap in the way businesses communicate with regulatory authorities. After January 1, 2025, in accordance with applicable regulations, this communication relies largely on electronic communication – both with the central government administration, central offices, and institutions regulating the modern technology, industrial, financial, pharmaceutical, energy, and, above all, TMT sectors.
Act on Electronic Delivery
More
Publication date: August 20, 2025
- The essence of the EMIR regulation
EMIR (European Market Infrastructure Regulation (EU) 2017/1899 is a regulation of the Council of the European Union and of the European Parliament on over-the-counter (OTC) derivatives, central counterparties and trade repositories. The regulation aims to increase the safety and stability of financial markets in Europe and prevent financial crises.
More
Publication date: August 20, 2025
Dynamic technological advancements have led modern businesses to operate in ways unforeseen decades ago. Computerization, in particular, without which modern business operations are inconceivable, has effectively broadened the horizons of many entrepreneurs, while simultaneously leaving room for abuse by cybercriminals. The protection of data stored on companies’ internal servers has become crucial. It should be noted that despite the efforts of both EU and national authorities, new threats are emerging in the field of personal data protection law, which may lead to violations not only of general provisions on the protection of personal rights but also of many other legal disciplines, such as copyright. The unprecedented mass digitization of artistic works has resulted in the inclusion of records of paintings, photographs, films, music, architectural designs, and many other manifestations of creative activity as data. From this perspective, the phenomenon of data laundering takes on a unique character and carries with it new threats.
More