Publication date: November 18, 2025
With technological advancements, scams involving phishing, smishing, spoofing, and CLI spoofing are gaining popularity. While they are not a new phenomenon, AI technologies certainly allow for increasingly faster and more effective image and voice impersonation, making impersonation easier. Furthermore, the latest tools help perpetrators tailor their manipulation techniques to specific individuals. Such activities serve a variety of purposes, from extorting personal data or stealing logins and passwords to persuading or intimidating victims into unfavorable financial transactions. The Polish Act on Combating Abuse in Electronic Communications aims to create mechanisms to limit these harmful phenomena. It aims to increase user protection against harmful activities carried out via communication technologies, such as text message fraud, data theft, and unfavorable financial transactions.
More
Publication date: October 29, 2025
The Polish defense technology sector (defense-tech) is developing dynamically, with a growing number of startups engaging in dual-use projects—civilian and military. Collaboration between these entities and public institutions and acceleration programs is becoming increasingly common, fostering innovation and strengthening the country’s defense potential. In its 2030 strategy, the North Atlantic Alliance recognized dual- use technologies as the foundation of its future strategic advantage, launching initiatives such as the NATO Innovation Fund and the DIANA program. Meanwhile, the European Commission presented the Digital Europe program and Horizon Europe. Furthermore, in 2022, the European Investment Bank introduced significant policy changes by including dual- use projects in its portfolio. The Polish Ministry of National Defence implements programmes such as “Urgent Innovation Need” and “East Shield”, and the Polish Development Fund supports projects with dual-use potential by implementing the IDA project together with the Ministry of National Defence, PGZ SA, the Kraków Technology Park and the Gdańsk Science and Technology Park.
More
Publication date: October 23, 2025
Using a specific image without the author’s consent means using images, photos, illustrations, or other graphic materials created by someone else without obtaining the appropriate consent for such use. Examples of illegal use of a graphic include sharing graphic materials without the author’s consent, using a graphic for commercial purposes (on websites) without obtaining the appropriate license, using someone else’s work as your own (posting it on your own social media profile), or modifying a graphic without obtaining the author’s consent.
More
Publication date: October 23, 2025
Personal data breach – definition
Any activity that involves the processing of personally identifiable information is considered personal data processing. However, it’s important to remember that GDPR regulations do not apply to activities undertaken solely for personal or household purposes.
More
Publication date: October 23, 2025
Recently, administrative courts have been considering the possibility of imposing VAT obligations on individuals and companies providing services via the SaaS model. This article provides an analysis of the nature of the SaaS model, its advantages and disadvantages, the legal obligations associated with it for both users and service providers and the latest administrative court case law related to this model.
More