<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>eIDAS - KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</title>
	<atom:link href="https://www.kg-legal.eu/info/tag/eidas/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kg-legal.eu/info/tag/eidas/</link>
	<description>KIELTYKA GLADKOWSKI LEGAL &#124; CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</description>
	<lastBuildDate>Wed, 20 Aug 2025 16:11:16 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Cybersecurity and GDPR Compliance in 2025</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 16:11:16 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[CRA]]></category>
		<category><![CDATA[eIDAS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[NIS2]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8192</guid>

					<description><![CDATA[<p>Publication date: August 20, 2025 In an era of dynamic digital technology development and a growing number of cyberthreats, cybersecurity and personal data protection are becoming key aspects of how organizations operate in the European Union. New regulations, such as NIS2, DORA, AI Act, CRA, and eIDAS 2.0, combined with the current GDPR, create a [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/">Cybersecurity and GDPR Compliance in 2025</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: August 20, 2025</mark></strong></p>



<p>In an era of dynamic digital technology development and a growing number of cyberthreats, cybersecurity and personal data protection are becoming key aspects of how organizations operate in the European Union. New regulations, such as NIS2, DORA, AI Act, CRA, and eIDAS 2.0, combined with the current GDPR, create a comprehensive security system aimed at raising protection standards and ensuring greater transparency in data processing.</p>



<span id="more-8192"></span>



<p><strong>NIS2 and GDPR: Strengthening Data Protection and Incident Response</strong></p>



<p>The Network and Information Security Directive (NIS2) is another step towards increasing the cyber resilience of entities operating in key economic sectors. In 2025, its implementation will require organizations to take a number of actions, including:</p>



<ul class="wp-block-list">
<li>Expanding security measures against cyberattacks,</li>



<li>Introducing more rigorous incident reporting procedures,</li>



<li>Strengthening cooperation between supervisory authorities and the private sector.</li>
</ul>



<p>NIS2, in conjunction with GDPR (Regulation 2016/679), means that businesses will not only have to protect personal data more effectively, but also implement new procedures for risk management and auditing of IT security activities.</p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>5 Things You Need to Know About NIS2</strong></p>



<p><strong>01 </strong>– Fines up to <strong>€10 million or 2% of total annual global turnover</strong></p>



<p><strong>02 </strong>– <strong>Expanded scope </strong>compared to NIS1, changing the way companies are classified and requiring more of them to comply with the directives</p>



<p><strong>03 </strong>– Management staff <strong>is liable for violations </strong>and the authorities may <strong>suspend activities or functions</strong></p>



<p><strong>04 </strong>– Broad <strong>security risk management measures </strong>and shift to a risk-based approach</p>



<p><strong>05 </strong>– Initial reporting <strong>of security incidents within 24 hours</strong>, further action within <strong>72 hours</strong>, and final summary <strong>within 1 month</strong></p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>DORA: Cyber Resilience and Personal Data Security in Finance</strong></p>



<p>DORA is the Regulation of the European Parliament and of the Council (EU) of 14 December 2022 on the digital operational resilience of the financial sector. This is another of many recent regulations concerning cybersecurity and the broadly defined security of information technology.</p>



<p>The Digital Operational Resilience Act (DORA) focuses on the financial sector, which is particularly vulnerable to cyberattacks. Key requirements imposed by DORA include:</p>



<ul class="wp-block-list">
<li>Testing the operational resilience of IT systems,</li>



<li>Implementing risk management strategies based on threat analysis,</li>



<li>Obligation to monitor and report digital incidents.</li>
</ul>



<p>DORA applies to:</p>



<ol style="list-style-type:lower-alpha" class="wp-block-list">
<li>credit institutions;</li>



<li>payment institutions, including payment institutions exempted under <a href="https://sip-1lex-1pl-18l00itm9016d.extranet.rajska.info/#/document/68589670?cm=DOCUMENT">Directive </a>(EU) 2015/2366;</li>



<li>providers of account information access services;</li>



<li>electronic money institutions, including electronic money institutions exempted under <a href="https://sip-1lex-1pl-18l00itm9016d.extranet.rajska.info/#/document/67903621?cm=DOCUMENT">Directive </a>2009/110/EC;</li>



<li>investment companies;</li>



<li>crypto-asset service providers,</li>



<li>central securities depositories;</li>



<li>central counterparties;</li>



<li>trading systems;</li>



<li>transaction repositories;</li>



<li>alternative investment fund managers;</li>



<li>management companies;</li>



<li>information sharing service providers;</li>



<li>insurance and reinsurance undertakings;</li>



<li>insurance intermediaries, reinsurance intermediaries and ancillary insurance intermediaries;</li>



<li>institutions of occupational pension programs;</li>



<li>rating agencies;</li>



<li>administrators of critical benchmarks;</li>



<li>crowdfunding service providers;</li>



<li>securitization repositories;</li>



<li>external ICT service providers.</li>
</ol>



<p>In the context of GDPR compliance, financial institutions must ensure adequate security measures to protect customer data against unauthorized access and information leakage. GDPR also mandates cooperation with cloud service providers and external IT operators, which requires thorough verification of their security standards.</p>



<p>Article 33 of the DORA Directive requires personal data breaches to be reported without undue delay, and within 72 hours where possible. In the event of a delay, an explanation of the reason for the delay must be included.</p>



<p class="has-vivid-cyan-blue-background-color has-background has-medium-font-size"><strong><mark>AI Act and GDPR: Managing Artificial Intelligence and Data Protection</mark></strong></p>



<p>The AI Act regulations classify AI systems according to risk level and impose obligations on entities that implement them. In the context of data protection, the AI Act requires:</p>



<ul class="wp-block-list">
<li>Transparency of artificial intelligence algorithms and mechanisms,</li>



<li>Possibilities of controlling and auditing decisions made by AI,</li>



<li>Compliance with the principles of data minimization and limitation of the processing purpose.</li>
</ul>



<p>Companies that use AI to process personal data will have to meet stringent GDPR requirements, giving users greater control over their information and minimizing the risk of abuse.</p>



<p><strong>CRA: Cyber Resilience Act – Security of Digital Products</strong></p>



<p>The Cyber Resilience Act (CRA) introduces obligations related to the security of digital software and hardware. Its key requirements include:</p>



<ul class="wp-block-list">
<li>Designing secure digital products,</li>



<li>Monitoring vulnerabilities and updating them regularly,</li>



<li>Manufacturers&#8217; responsibility to ensure continued safety throughout the product life cycle.</li>
</ul>



<p>CRA aims to increase cybersecurity across the entire digital ecosystem, minimizing the risk of attacks based on device and application vulnerabilities.</p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>eIDAS 2.0: Strengthening digital identification</strong></p>



<p>The amendment to the eIDAS (electronic IDentification, Authentication and trust Services) regulation – known as eIDAS 2.0 – introduces a European digital identity wallet that:</p>



<ul class="wp-block-list">
<li>Allows citizens to securely store and share their identity data,</li>



<li>It enables public and private institutions to provide secure online services,</li>



<li>Strengthens authentication standards in digital transactions.</li>
</ul>



<p>In conjunction with GDPR, eIDAS 2.0 improves users&#8217; control over their identity data and increases the security of online transactions.</p>



<p><strong>Challenges and benefits of new regulations</strong></p>



<p>Adapting to new regulations poses numerous challenges for companies, including:</p>



<ul class="wp-block-list">
<li>The need to invest in modern security systems,</li>



<li>Employee training in cybersecurity and data protection,</li>



<li>Implementation of effective incident monitoring and reporting mechanisms.</li>
</ul>



<p>However, the new regulations also bring numerous benefits, such as:</p>



<ul class="wp-block-list">
<li>Better protection of customer data and greater trust in the organization,</li>



<li>Increased resistance to cyber attacks,</li>



<li>Possibility to avoid high fines for violating data protection regulations.</li>
</ul>



<p><strong>The impact of new regulations on small and medium-sized enterprises (SMEs)</strong></p>



<p>New regulations such as NIS2, DORA, AI Act, CRA, and eIDAS 2.0 can pose challenges for small and medium-sized enterprises (SMEs). Implementing these regulations requires investment in modern security systems and employee training in cybersecurity and data protection. SMEs may face challenges related to limited financial and human resources, which can make it difficult to fully comply with the new requirements.</p>



<p>However, compliance with these regulations also brings benefits, such as better protection of customer data, increased trust in the organization, and the ability to avoid significant fines for violating data protection regulations. Therefore, it is worthwhile for SMEs to consider partnering with external IT service providers and cybersecurity specialists to effectively implement the required security measures.</p>



<p><strong>The future of cybersecurity in the EU</strong></p>



<p>In the coming years, we can expect further development of regulations regarding cybersecurity and personal data protection. The European Union will continue to work on strengthening the legal framework to address growing cyber threats and ensure a high level of data protection. Organizations will need to be prepared to continuously adapt to new requirements and invest in modern security technologies and procedures.</p>



<p><strong>Summary</strong></p>



<p>In 2025, organizations will have to comply with a range of regulations regarding cybersecurity and personal data protection. NIS2, DORA, AI Act, CRA, and eIDAS 2.0, combined with the GDPR, create a modern legal framework aimed at improving data protection and increasing resilience to cyber threats across various economic sectors. Implementing these regulations will be a challenge, but also an opportunity, to build a more secure and digitally resilient business environment in the EU.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/">Cybersecurity and GDPR Compliance in 2025</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>POLISH REGULATIONS ON E-CERTIFICATE</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/polish-regulations-on-e-certificate/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/polish-regulations-on-e-certificate/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Mon, 04 Oct 2021 14:56:26 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[E-CERTIFICATE]]></category>
		<category><![CDATA[eIDAS]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[Poland]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=3905</guid>

					<description><![CDATA[<p>POLISH REGULATIONS ON E-CERTIFICATE</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/polish-regulations-on-e-certificate/">POLISH REGULATIONS ON E-CERTIFICATE</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="alignleft size-large is-resized"><img decoding="async" src="https://www.kg-legal.eu/wp-content/uploads/2016/12/pay-per-view.jpg" alt="" style="width:330px;height:auto"/></figure></div>


<p>European Union legislator, considering the previous Member States’ experiences, modified the professionalization of electronic communication idea and passed the new law – REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC <a href="#_ftn1">[1]</a>, so-called eIDAS Regulation. </p>



<p>The aim of this Regulation was to increase
confidence in the electronic trade market area in extent of e-business and
contact with public entities by the introduction of the unified IT solutions
legal frames for the entire European Union. These legal frames provide a
reliable determination of the natural persons’ and organizational units’
identity.</p>



<span id="more-3905"></span>



<p>The eIDAS Regulation repealed the previous Polish
regulation, namely the Act of 18 September 2001 on Electronic Signature and the
(EU) Directive 1999/93 implemented to this Act. After passing the Resolution
910/2014, previous Acts and Directives are repealed and the Regulation is
directly applicable to the national law. </p>



<p>In this respect the current legal acts consist
of:</p>



<ol class="wp-block-list">
<li>(EU) eIDAS Regulation,</li>



<li>The Act of 5 September 2016 on Trust Services and Electronic
Identification.</li>
</ol>



<h4 class="wp-block-heading"><strong>SUBJECT MATTER of eIDAS Regulation</strong></h4>



<p>Article 1 of the Regulation reads that:</p>



<p><em>With a view to ensuring the proper functioning
of the internal market while aiming at an adequate level of security of electronic
identification means and trust services this Regulation:</em></p>



<p><em>(a) lays down the conditions under which Member
States recognise electronic identification means of natural and legal persons
falling under a notified electronic identification scheme of another Member
State;</em></p>



<p><em>(b) lays down rules for trust services, in
particular for electronic transactions; and</em></p>



<p><em>(c) establishes a legal framework for
electronic signatures, electronic seals, electronic time stamps, electronic
documents, electronic registered delivery services and certificate services for
website authentication.</em><a href="#_ftn2">[2]</a><em></em></p>



<p>The
main aim of this Regulation and the legislator intentions are coincided with
the (abovementioned) genesis of the regulation. </p>



<h4 class="wp-block-heading"><strong>LEGAL
DEFINITIONS</strong></h4>



<p>In
order to provide a sufficient protection and clarity in interpretation, eIDAS Regulation
has a sizeable catalogue of legal definitions. There should be indicated
crucial ones, namely electronic signature definition and qualified electronic
signature definition:</p>



<p><em>Article
3 </em></p>



<p><em>Definitions
</em></p>



<p><em>For
the purposes of this Regulation, the following definitions apply:</em></p>



<p><em>(10)
‘electronic signature’ means data in electronic form which is attached to or
logically associated with other data in electronic form and which is used by
the signatory to sign;</em></p>



<p><em>(11)
‘advanced electronic signature’ means an electronic signature which meets the
requirements set out in Article 26;</em></p>



<p><em>(12)
‘qualified electronic signature’ means an advanced electronic signature that is
created by a qualified electronic signature creation device, and which is based
on a qualified certificate for electronic signatures;</em></p>



<p><em>(27)
‘qualified electronic seal’ means an advanced electronic seal, which is created
by a qualified electronic seal creation device, and that is based on a
qualified certificate for electronic seal;<a href="#_ftn3"><strong>[3]</strong></a></em></p>



<p>also
there is a definition of electronic identification which is a crucial term in
the electronic signature area. It is proper to say that this definition
constitutes the Regulation matter:</p>



<ul class="wp-block-list">
<li><em>‘electronic
identification’ means the process of using person identification data in
electronic form uniquely representing either a natural or legal person, or a
natural person representing a legal person;<a href="#_ftn4"><strong>[4]</strong></a></em></li>
</ul>



<h4 class="wp-block-heading"><strong>PROTECTION
LEVELS</strong></h4>



<p>Article
8 requires to introduce various electronic security levels.</p>



<p><em>Article
8</em></p>



<p><em>Assurance
levels of electronic identification schemes</em></p>



<p><em>1.
An electronic identification scheme notified pursuant to Article 9(1) shall
specify assurance levels low, substantial and/or high for electronic
identification means issued under that scheme.</em></p>



<p><em>2.
The assurance levels low, substantial and high shall meet respectively the
following criteria:</em><a href="#_ftn5">[5]</a><em></em></p>



<p>Having
regard to this division of assurance levels of electronic identification,
article 3 distinguishes 3 types of electronic signatures:</p>



<ol class="wp-block-list">
<li>Electronic
signature;</li>



<li>Advanced
electronic signature;</li>



<li>Qualified
electronic signature. </li>
</ol>



<h4 class="wp-block-heading"><strong>EUROPEAN
LEGISLATURE PRESUMPTIONS</strong></h4>



<p>The
idea of the EU legislator is that the eIDAS Regulation:</p>



<ol class="wp-block-list">
<li>sets
out the legal conditions for the member states acknowledgement of the
electronic identifications measures for natural and legal persons covered by
the notified electronic identification notification of another Member State;</li>



<li>sets
out the laws concerning the trusts services including establishing legal frames
for: i) electronic signature, ii) electronic seal, iii) electronic registered
delivery service, etc. </li>
</ol>



<p>Thus
the eIDAS Regulation concerns 2 issues: </p>



<ol class="wp-block-list">
<li>Electronic
identification system;</li>



<li>Trust
services. </li>
</ol>



<p>European
legal act applies to the electronic identification schemes notified by Member
States and applies to the trust service providers based in the European Union.
Although the eIDAS Regulation with the EU secondary legislation is a comprehensive
legal solution it is necessary to concretise certain issues in the national
law. Thereby the Polish legislator has passed the Act of 5 September 2016 on Trust
Services and Electronic Identification concretizing and specifying the European
act.<a href="#_ftn6">[6]</a>
The Polish Act introduces as follows:</p>



<ol class="wp-block-list">
<li>National
trust infrastructure;</li>



<li>Trust
services providers business activity;</li>



<li>National
electronic identification scheme;</li>



<li>Trust
services providers supervision;</li>



<li>National
electronic identification scheme supervision;</li>



<li>Criminal
provisions;</li>



<li>Pecuniary
penalties provisions.</li>
</ol>



<h4 class="wp-block-heading"><strong>TYPES
OF ELECTRONIC SIGNATURE</strong></h4>



<p>There
are 3 types of electronic signature: i) electronic signature; ii) advanced
electronic signature and iii) qualified electronic signature. </p>



<ol class="wp-block-list">
<li>Non-qualified
electronic signature certificate (non-qualified signature) is the common term
for any electronic signature (other than qualified). It is used for signing
emails and for logging into a domain. It can be also used to sign documents,
but a signature created using this type of certificate does not have the same
legal force as oleographic signature. </li>



<li>Qualified
electronic signature (certificated). Qualified signature certificate (qualified
electronic signature) is a certificate issued by a qualified trust services
provider. This type of electronic signature fulfills the eIDAS requirements. A
signature made with this type of certificate is equivalent to oleographic
signature. </li>
</ol>



<h4 class="wp-block-heading"><strong>WHAT IS THE QUALIFIED ELECTRONIC SIGNATURE
&#8211; PRACTICAL INFORMATION</strong></h4>



<ol class="wp-block-list">
<li>Definition</li>
</ol>



<p>A
qualified signature is an electronic signature which has the same legal force
as oleographic signature.</p>



<p>This
legal force can be found in the Polish Civil Code:</p>



<p><em>Article
78(1) [Electronic form]</em></p>



<p><em>§&nbsp; 1. To meet the written form requirement of a
legal act of law, it is sufficient to submit a declaration of will in
electronic form and caption it with a qualified electronic signature.</em></p>



<p><em>§&nbsp; 2. The declaration of will submitted in
electronic form is equivalent to the declaration of will submitted in a written
form.</em> <a href="#_ftn7">[7]</a></p>



<ul class="wp-block-list">
<li>How
to obtain a qualified electronic signature</li>
</ul>



<p>A
qualified electronic signature can be bought from one of the certified
providers (entities). The list of the certificate providers can be found under
this link (on the National Certification Centre website): <a href="https://www.nccert.pl/">https://www.nccert.pl/</a>.</p>



<p>The
most popular qualified signatures (certificates) include:</p>



<ul class="wp-block-list">
<li>Sigilium Sign,</li>



<li>Szafir 2.0.</li>



<li>proCentrum SmartSign,</li>



<li>PEN- HEART 3.9,</li>



<li>SecureDoc2</li>



<li>EuroCert</li>



<li>What
can be done with the use of the qualified electronic signature</li>
</ul>



<p>For
instance:</p>



<ul class="wp-block-list">
<li>Executing an agreement; </li>



<li>Participation in auctions
on electronic tendering platforms;</li>



<li>Remote conclusion of
civil law contracts;</li>



<li>Signing and filing of
financial statements sent to the National Court Register;</li>



<li>Sending electronic
invoices online.</li>
</ul>



<p>To
see full list of qualified electronic signature utilization: <a href="https://www.biznes.gov.pl/pl/firma/sprawy-urzedowe/chce-zalatwic-sprawe-przez-internet/podpis-kwalifikowany">https://www.biznes.gov.pl/pl/firma/sprawy-urzedowe/chce-zalatwic-sprawe-przez-internet/podpis-kwalifikowany</a>.</p>



<p>To
see the detailed information about technology used in the construction of the
qualified electronic signature: </p>



<p><a href="file:///C:/Users/OEM/Downloads/WP2016%203-2%2016%20Relying%20Parties%20QSig.pdf">file:///C:/Users/OEM/Downloads/WP2016%203-2%2016%20Relying%20Parties%20QSig.pdf</a>
</p>



<p><a href="https://www.zealid.com/en/the-definitive-guide-to-qualified-electronic-signatures">https://www.zealid.com/en/the-definitive-guide-to-qualified-electronic-signatures</a></p>



<p><a href="https://www.electronicid.eu/en/blog/post/eidas-regulation-electronic-signature/en">https://www.electronicid.eu/en/blog/post/eidas-regulation-electronic-signature/en</a></p>



<p>Sources:</p>



<p><a href="https://eur-lex.europa.eu/legal-content/PL/TXT/PDF/?uri=CELEX:32014R0910&amp;from=PL">https://eur-lex.europa.eu/legal-content/PL/TXT/PDF/?uri=CELEX:32014R0910&amp;from=PL</a></p>



<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;qid=1628666235807&amp;from=PL">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;qid=1628666235807&amp;from=PL</a></p>



<p><a href="https://sip.lex.pl/#/act/18344658/2870950/uslugi-zaufania-oraz-identyfikacja-elektroniczna?keyword=ustawa%20o%20podpisie%20elektronicznym&amp;cm=SFIRST">https://sip.lex.pl/#/act/18344658/2870950/uslugi-zaufania-oraz-identyfikacja-elektroniczna?keyword=ustawa%20o%20podpisie%20elektronicznym&amp;cm=SFIRST</a></p>



<p><a href="https://sip.lex.pl/#/act/16785996/2827383?directHit=true&amp;directHitQuery=kc">https://sip.lex.pl/#/act/16785996/2827383?directHit=true&amp;directHitQuery=kc</a></p>



<p><a href="https://msp.money.pl/wiadomosci/poradniki/artykul/podpis-elektroniczny-8211;-czym-jest-i-w,242,0,2414578.html">https://msp.money.pl/wiadomosci/poradniki/artykul/podpis-elektroniczny-8211;-czym-jest-i-w,242,0,2414578.html</a></p>



<p><a href="https://www.gov.pl/web/cyfryzacja/obowiazek-stosowania-rozporzadzenia-parlamentu-europejskiego-i-rady-ue-nr-910/2014-od-1-lipca-2016-roku">https://www.gov.pl/web/cyfryzacja/obowiazek-stosowania-rozporzadzenia-parlamentu-europejskiego-i-rady-ue-nr-910/2014-od-1-lipca-2016-roku</a></p>



<p><a href="https://www.biznes.gov.pl/pl/firma/sprawy-urzedowe/chce-zalatwic-sprawe-przez-internet/podpis-kwalifikowany">https://www.biznes.gov.pl/pl/firma/sprawy-urzedowe/chce-zalatwic-sprawe-przez-internet/podpis-kwalifikowany</a></p>



<p><a href="https://www.parp.gov.pl/component/content/article/53930:rozporzadzenie-eidas-nowe-ramy-prawne-elektronicznej-gospodarki-i-zinformatyzowanych-urzedow">https://www.parp.gov.pl/component/content/article/53930:rozporzadzenie-eidas-nowe-ramy-prawne-elektronicznej-gospodarki-i-zinformatyzowanych-urzedow</a></p>



<p><a href="https://www.nccert.pl/">https://www.nccert.pl/</a></p>



<hr class="wp-block-separator has-css-opacity"/>



<p><a href="#_ftnref1">[1]</a> <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN</a>, (access date: 11<sup>th</sup>
August, 2021). </p>



<p><a href="#_ftnref2">[2]</a> <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN</a>, (access date: 11<sup>th</sup>
August, 2021). </p>



<p><a href="#_ftnref3">[3]</a> <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN</a>, (access date: 11<sup>th</sup>
August, 2021). </p>



<p><a href="#_ftnref4">[4]</a> <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN</a>, (access date: 11<sup>th</sup>
August, 2021). </p>



<p><a href="#_ftnref5">[5]</a> To see full list of
criteria: <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32014R0910&amp;from=EN</a>, (access date: 11<sup>th</sup>
August, 2021). </p>



<p><a href="#_ftnref6">[6]</a> To see full Act: <a href="https://sip.lex.pl/#/act/18344658/2870950/uslugi-zaufania-oraz-identyfikacja-elektroniczna?keyword=ustawa%20o%20podpisie%20elektronicznym&amp;cm=SFIRST">https://sip.lex.pl/#/act/18344658/2870950/uslugi-zaufania-oraz-identyfikacja-elektroniczna?keyword=ustawa%20o%20podpisie%20elektronicznym&amp;cm=SFIRST</a>, (access date: 11<sup>th</sup>
August, 2021).</p>



<p><a href="#_ftnref7">[7]</a> <a href="https://sip.lex.pl/#/act/16785996/2827383?directHit=true&amp;directHitQuery=kc">https://sip.lex.pl/#/act/16785996/2827383?directHit=true&amp;directHitQuery=kc</a>,
(access date: 11<sup>th</sup> August, 2021).</p>



<p></p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/polish-regulations-on-e-certificate/">POLISH REGULATIONS ON E-CERTIFICATE</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/polish-regulations-on-e-certificate/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
