<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Polish law - KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</title>
	<atom:link href="https://www.kg-legal.eu/info/tag/polish-law/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kg-legal.eu/info/tag/polish-law/</link>
	<description>KIELTYKA GLADKOWSKI LEGAL &#124; CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</description>
	<lastBuildDate>Wed, 12 Nov 2025 11:58:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>What is a family foundation under Polish law?</title>
		<link>https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/what-is-a-family-foundation-under-polish-law/</link>
					<comments>https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/what-is-a-family-foundation-under-polish-law/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 11:58:50 +0000</pubDate>
				<category><![CDATA[INVESTMENT LAW AND PROCESSES IN POLAND]]></category>
		<category><![CDATA[family foundation]]></category>
		<category><![CDATA[Family Foundation Act]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[law firm in Krakow]]></category>
		<category><![CDATA[PIT exemption]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<category><![CDATA[Tax benefits]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8482</guid>

					<description><![CDATA[<p>Publication date: November 12, 2025 A family foundation is a relatively new institution in Polish law, introduced two years ago by the Act of January 26, 2023, on Family Foundations. The ability to establish such an entity was introduced primarily to enable entrepreneurs to secure the succession of their businesses in an undivided form, as [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/what-is-a-family-foundation-under-polish-law/">What is a family foundation under Polish law?</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Publication date: November 12, 2025</strong></p>



<p>A family foundation is a relatively new institution in Polish law, introduced two years ago by the Act of January 26, 2023, on Family Foundations. The ability to establish such an entity was introduced primarily to enable entrepreneurs to secure the succession of their businesses in an undivided form, as well as to ensure the implementation of their own vision for managing them even longer after the founder&#8217;s death. Only a natural person with full legal capacity can be the founder of a family foundation. They can establish the foundation and designate its beneficiaries—themselves, relatives, or public benefit organizations—in their will or deed of incorporation. Both deeds should be executed by a notary. Unlike an Anglo-Saxon trust, a family foundation is not a legal relationship but a separate legal entity. Upon establishment, it acquires legal capacity and becomes a so-called &#8220;imperfect legal person.&#8221;</p>



<p class="has-luminous-vivid-amber-background-color has-background has-large-font-size"><strong>Tax benefits</strong></p>



<span id="more-8482"></span>



<p>Some use foundations to reduce, or rather optimize, their tax liabilities. According to the Corporate Income Tax Act, a foundation is exempt from, among other things, corporate income tax (CIT) if it conducts business activities. However, permissible business activities are defined by the framework set forth in Article 5 of the Family Foundation Act. Permitted forms of activity include:</p>



<p>&#8211; disposal of property, unless the property was acquired solely for the purpose of further disposal;</p>



<p>&#8211; renting, leasing or making property available for use on another basis;</p>



<p>&#8211; joining commercial companies, investment funds, cooperatives and entities of a similar nature, having their registered office in the country or abroad, as well as participating in these companies, funds, cooperatives and entities;</p>



<p>&#8211; acquisition and sale of securities, derivative instruments and rights of a similar nature (and others).</p>



<p>Establishment of the Family Foundation</p>



<p>According to the law, the establishment of a family foundation requires:</p>



<p>1) submitting a declaration of establishment of a family foundation in the founding act or in the will;</p>



<p>The documents should be in the form of a notarial deed.</p>



<p>2) establishing a statute that</p>



<p>*mandatory includes:</p>



<p>-name of the family foundation;</p>



<p>-seat of the family foundation;</p>



<p>-detailed purpose of the family foundation;</p>



<p>&#8211; the beneficiary or the method of defining it and the scope of the beneficiary’s rights;</p>



<p>&#8211; rules for maintaining the list of beneficiaries;</p>



<p>&#8211; rules, including detailed procedures, for waiving rights by the beneficiary;</p>



<p>-duration of the family foundation, if specified;</p>



<p>-value of the founding fund;</p>



<p>&#8211; the principles of appointment and dismissal, as well as the rights and obligations of members of the bodies of a family foundation, as well as the principles of representation of the family foundation by the management board or by other bodies of the family foundation in cases specified in the Act;</p>



<p>&#8211; entity authorized to approve the activities of the management board of a family foundation in the organization;</p>



<p>-principles of amending the statute;</p>



<p>&#8211; the allocation of the property of a family foundation after its dissolution, including the designation of the beneficiary entitled to the property in connection with the dissolution of the family foundation.</p>



<p>*may additionally contain:</p>



<p>&#8211; principles of cooperation or collaboration between the bodies of a family foundation;</p>



<p>&#8211; detailed circumstances of the dissolution of the family foundation;</p>



<p>&#8211; guidelines for investing the assets of a family foundation;</p>



<p>-provide for the establishment of a field unit or field units.</p>



<p>3) preparing an inventory of property which includes:</p>



<p>&#8211; Property rights contributed by the founder or persons other than the founder to the family foundation, with the indication of the person contributing the property and the specification of the type and value of each of the contributed property components, in the amount determined according to the condition and prices at the time of their contribution and their tax value,</p>



<p>-determination of the proportions used to determine the PIT exemption</p>



<p>&#8211; a list of property contributed to the family foundation to cover the founding fund.</p>



<p>4) establishing the bodies of the family foundation required by law or the statute;</p>



<p>&#8211; the Act enumerates: the management board, the supervisory board and the meeting of beneficiaries.</p>



<p>&#8211; The management board is appointed, unless the statute provides otherwise, by the founder and, after his death, by the supervisory board. In the absence of a supervisory board, the election is made by the meeting of beneficiaries. The management board&#8217;s duties include:</p>



<ul class="wp-block-list">
<li>managing the affairs of the family foundation and representing it;</li>



<li>realization of the goals of the family foundation specified in the statute;</li>



<li>taking actions related to ensuring the financial liquidity and solvency of the family foundation;</li>



<li>creating, maintaining and updating the list of beneficiaries in accordance with the provisions of the Act and the principles contained in the statute;</li>



<li>informing the beneficiary about the benefit he or she is entitled to;</li>



<li>fulfillment of the benefit to which the beneficiary is entitled.</li>
</ul>



<p>&#8211; A supervisory board is not mandatory if there are 25 or fewer beneficiaries. Unless the statute provides otherwise, the appointment and dismissal of supervisory board members is made by the founder, and after the founder&#8217;s death, by the meeting of beneficiaries.</p>



<p>5) contribution of the founding fund</p>



<p>&nbsp;before entering the family foundation register in the case of establishing a family foundation in the founding act, or contributing the founding fund within two years from the date of entering the family foundation in the family foundation register in the case of establishing a family foundation in a will;</p>



<p>&#8211; the founding capital is specified in the statute, but cannot be lower than PLN 100,000</p>



<p>&#8211; the sole person obliged to contribute assets to cover the founding fund is the founder.</p>



<p>&#8211; property contributed to the founding fund cannot be returned.</p>



<p>&#8211; A foundation account may be established outside the territory of the Republic of Poland . This is not subject to restrictions in the European Union. Outside the EU, using such an account will constitute foreign exchange transactions and therefore require a foreign exchange permit from the President of the National Bank of Poland or a director authorized by him.</p>



<p>6) entry into the register of family foundations.</p>



<p>-The register of family foundations is maintained by the District Court in Piotrków Trybunalski, hereinafter referred to as the &#8220;registry court&#8221;.</p>



<p>-the proceedings are generally conducted in accordance with the provisions on non-contentious proceedings,</p>



<p>&#8211; the application for entry is submitted by submitting the foundation to the register by the founder or the board in the case of a foundation established in a will</p>



<p>-The application should include</p>



<ul class="wp-block-list">
<li>name of the family foundation, its registered office and address;</li>



<li>the amount of the founding fund of the family foundation;</li>



<li>names and surnames, PESEL numbers of the management board members, and in the absence of an obligation to have such a number &#8211; date of birth, and their addresses for correspondence, as well as the manner of representing the family foundation;</li>



<li>names and surnames, PESEL numbers of the members of the supervisory board, and in the absence of an obligation to have such a number &#8211; date of birth, and their addresses for correspondence, if a supervisory board is established in the family foundation, if a board has been established at all;</li>



<li>names and surnames, PESEL numbers of beneficiaries who are natural persons who are members of the group of beneficiaries, and in the absence of an obligation to have such a number &#8211; date of birth, and their addresses for service, and in the case of the beneficiary being an entity other than a natural person &#8211; name or company name and REGON identification number, and if the entity is registered in the National Court Register &#8211; also its number in that register;</li>



<li>name, surname and correspondence address of the founder, if the founder is entitled to appoint the management board;</li>



<li>duration of the family foundation, if specified.</li>
</ul>



<p>-The following must be attached to the registration of a family foundation in the register of family foundations:</p>



<p>&#8211; the foundation&#8217;s founding act or the protocol of opening and announcing the will in which the foundation was established;</p>



<p>-statute</p>



<p>&#8211; a declaration by the founder about contributing property to cover the founding fund, and in the case of establishing a family foundation in a will &#8211; a declaration by the members of the management board that the founding fund will be contributed within two years from the date of entering the foundation in the register;</p>



<p>&#8211; proof of establishment of the foundation&#8217;s bodies, specifying their composition, if the composition of the family foundation&#8217;s bodies does not result from its statute</p>



<p>&#8211; consent to serve as a member of a family foundation body.</p>



<p>The notification is subject to the payment of a fee of PLN 500 in accordance with Article 64 a of the Act of 28 July 2005 on court costs in civil cases ( i.e. Journal of Laws of 2025, item 1228, as amended ).</p>



<p>*Before entry in the register, a company does not have legal personality, so its obligations are the responsibility of the founder or his or her representative. This responsibility ceases upon approval of their actions by a resolution of the management board.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/what-is-a-family-foundation-under-polish-law/">What is a family foundation under Polish law?</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/what-is-a-family-foundation-under-polish-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DUE DILIGENCE CLAUSES IN LABORATORY EMPLOYMENT AGREEMENTS AND THE LEGAL CONSEQUENCES OF VIOLATING THEM VS. GOOD LABORATORY PRACTICE</title>
		<link>https://www.kg-legal.eu/info/pharmaceutical-healthcare-life-sciences-law/due-diligence-clauses-in-laboratory-employment-agreements-and-the-legal-consequences-of-violating-them-vs-good-laboratory-practice-2/</link>
					<comments>https://www.kg-legal.eu/info/pharmaceutical-healthcare-life-sciences-law/due-diligence-clauses-in-laboratory-employment-agreements-and-the-legal-consequences-of-violating-them-vs-good-laboratory-practice-2/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 11:37:14 +0000</pubDate>
				<category><![CDATA[PHARMACEUTICAL, HEALTHCARE & LIFE SCIENCES LAW]]></category>
		<category><![CDATA[DUE DILIGENCE CLAUSES]]></category>
		<category><![CDATA[glp]]></category>
		<category><![CDATA[GOOD LABORATORY PRACTICE]]></category>
		<category><![CDATA[LABORATORY EMPLOYMENT AGREEMENTS]]></category>
		<category><![CDATA[LABORATORY PRACTICE]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8480</guid>

					<description><![CDATA[<p>Publication date: November 12, 2025 What essentially is GLP? The problem of regulating diligence clauses in employment contracts in the laboratory industry is essential on the basis of Polish and EU law. These issues shall also consider the general consequences of breaching employee obligations in the form of the so-called Good Laboratory Practice (GLP) principles. [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/pharmaceutical-healthcare-life-sciences-law/due-diligence-clauses-in-laboratory-employment-agreements-and-the-legal-consequences-of-violating-them-vs-good-laboratory-practice-2/">DUE DILIGENCE CLAUSES IN LABORATORY EMPLOYMENT AGREEMENTS AND THE LEGAL CONSEQUENCES OF VIOLATING THEM VS. GOOD LABORATORY PRACTICE</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: November 12, 2025</mark></strong></p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>What essentially is GLP?</strong></p>



<p>The problem of regulating diligence clauses in employment contracts in the laboratory industry is essential on the basis of Polish and EU law. These issues shall also consider the general consequences of breaching employee obligations in the form of the so-called Good Laboratory Practice (GLP) principles.</p>



<p>For some time in the business turnover we can observe the practice of including in employment contracts clauses concerning professionalism and professional diligence in the actions of future employees. As a rule, the clause at issue imposes an obligation on the employee to perform their tasks in a professional manner, adequate to their position and in accordance with standard operating procedures. In addition, all actions of the prospective employee must conform to the recommendations and directives of the supervisor and comply with the applicable law.</p>



<p>The laboratory industry is no exception in this area. It imposes an obligation on employees and contractors to act not only diligently but also based on the principles of Good Laboratory Practice. These principles have been in place since 1978 and regulate issues such as quality assurance in drug testing and development, the prevention of pharmaceutical scandals, and ensuring performance standards for laboratory areas. In addition, the principles regulate such key issues as staffing, space requirements and the quality of equipment and inspection processes for laboratory areas.</p>



<span id="more-8480"></span>



<p><strong><em>Polish GLP regulation and the consequences of violating it</em></strong></p>



<p>On the grounds of domestic legislation, the issue of GLP is regulated in the Regulation of the Minister of Health of 3 August 2021 on <strong>Good Laboratory Practice</strong> and the performance of research in accordance with its scope. Annex I to the Regulation defines the standards of work required of the manager of a research center, the study director or members of the research staff. Attention should be paid to the last two categories, since the work standards specified for them determine the scope of diligence to which the employee may be obligated in a contractual clause. According to section 2(6) of the Annex to the said Regulation, the members of staff should be knowledgeable about the GLP of the specific research being conducted. They are required to act on the basis of the study plan and instructions contained in the documents, and to accurately record data obtained from the studies. Each employee should take care of his/her own safety and that of the environment, and report any deterioration of his/her health to his/her supervisor for the purpose of the possible removal from the study. Additional responsibilities are placed on the study supervisor as the person responsible for coordinating the team. These include, but are not limited to: overseeing the study and ensuring that it is conducted with care and accuracy; including cooperation with quality assurance programme officer, accepting the plan and standard operational procedures, and ensuring that adequate copies of the plan are available for the team to rely on when conducting the study.&nbsp;</p>



<p>Employee actions are subject to constant scrutiny &#8211; any deviation from work standards and failure to follow GLP principles is documented and reported to the study director, according to the Regulation. This may result in various employment law consequences for the employee, such as reprimand, disciplinary responsibility, or even termination of employment contract. The detailed rules of an employee&#8217;s liability for a breach of due diligence are always defined in an individual contract constructed for them. It is worth mentioning, however, that omissions of individual employees may negatively influence the outcome of an inspection of the entire testing unit by the Inspector of Chemical Substances &#8211; the body appointed to inspect testing units at the national level.</p>



<p><strong><em>European solutions</em></strong></p>



<p>The basis of the Regulation of the Polish Minister of Health is to be found in the EU legal acts, which have been implemented into Polish law. Therefore, it should not be surprising that the regulations contained in the acts (created before the regulation) do not differ significantly from those adopted in the Regulation. The first of them, Directive 2004/10/EC of the European Parliament and the UE Council from 11February 2004 in Article 1 imposes on Member States the obligation to ensure that laboratories conducting tests on chemical products act in accordance with the principles of the GLP act and the Directive of 1967 on the classification, labelling and packaging of dangerous substances (67/548/EEC). Annex I of the 2004 Directive defines GLP as a quality system that relates to the organizational process and conditions under which non-clinical health and environmental safety studies are planned, conducted, monitored, recorded, archived and reported. It has been determined that the purpose of the establishment of the GLP is to take care of the quality and conditions under which non-clinical safety studies for health and the environment are carried out for the registration or authorisation of products such as pharmaceuticals, pesticides, veterinary products, industrial chemicals or food additives.</p>



<p>Key issue is the regulation set out in Section II, para. 1.4. of the abovementioned act, which constitutes the duties of research personnel. It imposes on personnel the obligation to know the GLP principles applicable to their participation in study being conducted. It orders the personnel to act on the basis of instructions included in study documents, as well as to maintain health protection measures in order to care for the environment and their own safety. They should also record the raw data swiftly and thoroughly. The duties of the study director set forth in this act are similar to those of the Regulation of the Polish Ministry of Health, namely such a director is responsible for supervising the diligent performance of personnel, approves study programs and instructions, and certifies that qualified personnel, familiar with GLP principles and the study plan undertake their duties.</p>



<p>The issue of control of research units, and consequently &#8211; their employees and their compliance with GLP principles, was regulated in Directive 2004/9/EC of the European Parliament and the EU Council of 11February 2004. It stipulates that Member States shall appoint national inspection authorities to supervise the operation of entities in accordance with the principles of professional diligence. If irregularities are detected in the implementation of GLP principles in a given unit, and employees show ignorance in the application of its principles, there will entail negative consequences (ranging from questioning the validity of the tests carried out by the unit to its removal or undertaking legal action). These consequences do not preclude additional action by the national authority, based on the specific rules of a given Member State.</p>



<p>It should not come as a surprise that employers in the laboratory sector are striving to enforce the highest possible degree of professionalism, accuracy and attention to professional duties from their employees &#8211; the specificity of the described branch requires the highest possible diligence in performing tasks and marginalization of mistakes, which may have serious consequences in the environmental and health dimension. EU and Polish regulations enable employers to effectively implement these obligations in the contract, with individual sanctions for failure to do so.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/pharmaceutical-healthcare-life-sciences-law/due-diligence-clauses-in-laboratory-employment-agreements-and-the-legal-consequences-of-violating-them-vs-good-laboratory-practice-2/">DUE DILIGENCE CLAUSES IN LABORATORY EMPLOYMENT AGREEMENTS AND THE LEGAL CONSEQUENCES OF VIOLATING THEM VS. GOOD LABORATORY PRACTICE</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/pharmaceutical-healthcare-life-sciences-law/due-diligence-clauses-in-laboratory-employment-agreements-and-the-legal-consequences-of-violating-them-vs-good-laboratory-practice-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI algorithmic pricing and its assessment under Polish and EU competition law</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/ai-algorithmic-pricing-and-its-assessment-under-polish-and-eu-competition-law/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/ai-algorithmic-pricing-and-its-assessment-under-polish-and-eu-competition-law/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 13:38:31 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[algorithmic pricing]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[law firm in Krakow]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8352</guid>

					<description><![CDATA[<p>Publication date: October 10, 2025 The development of artificial intelligence Artificial intelligence is an interdisciplinary field of knowledge combining elements of computer science, mathematics, statistics, neuroscience, and cognitive science. Its goal is to create systems capable of performing tasks that previously required human intelligence. This includes the ability to learn from data, reason, make decisions, [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/ai-algorithmic-pricing-and-its-assessment-under-polish-and-eu-competition-law/">AI algorithmic pricing and its assessment under Polish and EU competition law</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[


<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: October 10, 2025</mark></strong></p>



<p><strong>The development of artificial intelligence</strong></p>



<p class="has-medium-font-size">Artificial intelligence is an interdisciplinary field of knowledge combining elements of computer science, mathematics, statistics, neuroscience, and cognitive science. Its goal is to create systems capable of performing tasks that previously required human intelligence. This includes the ability to learn from data, reason, make decisions, recognize patterns, and process and generate natural language. Unlike traditional programming, in which a computer executes strictly defined instructions, artificial intelligence aims to grant machines a degree of autonomy, allowing them to independently adapt their strategies to changing conditions. Today, AI is no longer an abstract theoretical concept, but a practical tool.</p>



<span id="more-8352"></span>



<p>The development of artificial intelligence is one of the most dynamic phenomena in the history of science and technology. Its origins lie in simple deterministic algorithms, based on clearly defined logical and mathematical rules, used to automate repetitive calculations. However, the real breakthrough came in the second half of the 1990s, when, with the increasing availability of data and the development of computing power, machine learning began to be increasingly used. These methods allowed machines not only to perform pre-programmed tasks but, more importantly, to learn from input data and independently improve their results. The application of machine learning meant a shift from rule-based systems to statistical models capable of recognizing patterns and predicting future events. The next stage was the widespread adoption of deep learning, which gained practical significance in the second decade of the 21st century. These techniques utilize multi-layered neural networks capable of analyzing massive datasets in a manner similar to the perceptual processes occurring in the human brain. This enabled the recognition of images, speech, and natural language with unprecedented effectiveness. Deep learning is the basis of many modern solutions, such as recommendation systems.</p>



<p>The most recent phase of development is generative artificial intelligence, which became widely available around 2021. Unlike previous solutions, which focused on classifying and analyzing data, generative systems can create new content—text, images, sounds, and even complex economic strategies. The introduction of this type of technology has radically expanded the potential applications of AI, but it has also revealed new risks related to its impact on society and the economy. Generative models, capable of dynamically shaping information and influencing decision-making processes, can, for example, participate in market price manipulation.</p>



<p><strong>Price manipulation with the help of new technologies</strong></p>



<p>Price manipulation by sellers is unfair or illegal market practices that involve setting prices in a way that misleads consumers or restricts competition. One of the most commonly used strategies is price fixing. It involves agreements between independent businesses aimed at fixing or controlling prices. This can involve jointly setting minimum or maximum selling prices, coordinating price increases, or even fixing discounts. Such actions are automatically considered illegal – the mere fact of agreeing on prices is sufficient, even if the agreement is not fully implemented. The consequence of price fixing is the elimination of natural price competition. Consumers lose the opportunity to choose cheaper offers, and businesses lose the incentive to innovate.</p>



<p>Another form of manipulation is the abuse of a dominant position. A dominant position means that a business entity has an advantage in the relevant market, allowing it to operate largely independently of competitors, contractors, and consumers. Abuse occurs when a business entity uses its power to impose unfair pricing conditions. This can take various forms, such as setting prices that are excessively high relative to the value of the goods or using predatory pricing, i.e., underselling prices to eliminate competition. Each of these practices leads to market distortion, restricting access for new entrants, and worsening consumer conditions.</p>



<p><strong>Pricing algorithms</strong> are computer programs that provide pricing recommendations or, in some cases, automatically adjust prices based on current and historical data on market conditions. These algorithms consider much of the same data that companies have always considered when making pricing decisions, including historical data as well as current supply and demand indicators. Compared to human price managers, algorithms can process significantly more data in a much shorter time. This efficiency allows companies using algorithmic pricing strategies to respond more quickly to changes in supply and demand and make pricing decisions based on a more accurate, real-time understanding of market conditions.</p>



<p><strong>Ways to use algorithms</strong></p>



<p>Algorithms can be used in various ways. One is to use the algorithm as a tool to achieve a goal set by the companies. In such a situation, the parties to the agreement make certain arrangements between themselves, and only their implementation is left to the algorithms. For example, two companies could agree to eliminate price competition between them. Simply using a software function that allows them to retrieve data on the prices of other market participants would be sufficient. A strategy would therefore be to automatically set prices slightly lower than other companies while simultaneously ignoring the prices of the colluding company. However, in this case, the mere fact of detecting the existence of such collusion does not raise any doubts under current competition law, as it is possible to attribute the concept of an agreement to this situation.</p>



<p>Another technique involves the joint use of a single price-response algorithm by several traders. This shared use of the same algorithm can lead to price alignment and less competition. One element of this type of agreement is the awareness of the participants that the information being shared will reach their competitors. Consequently, transparency regarding the future behavior of competitors is established between the recipients. Recipients are aware of the participation of their competitors at the same level of trade in the agreement and that their prices are disclosed to their competitors. However, in such cases, the use of algorithms remains a technical activity and can be assessed through the lens of the underlying conduct, to which existing provisions on anticompetitive agreements can be applied.</p>



<p>However, there does not always have to be any agreement between market players regarding the use of artificial intelligence in sales to raise legal concerns. An example would be the configuration of these modern tools to automatically respond to changes in competitors&#8217; prices. This can take the form of faster price reductions, mimicking price increases, or simply adapting to current market price levels. The increasing use of specialized software by businesses that monitors websites and collects price data is making the online sales market increasingly transparent. This transparency allows for easy tracking of competitors&#8217; pricing policies, quick detection of deviations from established price levels, and immediate response to such situations. This allows companies using algorithms to adjust their prices to rivals&#8217; actions almost in real time. Consequently, traditional price reductions aimed at attracting customers often lose their purpose – competitors can offer the same reduction in a fraction of a second. The situation is different with price increases – if one seller decides to increase prices, others are likely to follow suit, leading to an overall price increase. As a result, prices naturally drift towards a level higher than fully competitive.</p>



<p>The most theoretical scenario is a situation in which <strong>self-learning algorithms</strong>, used independently by different companies, independently conclude that joint coordination is the most profitable strategy. This does not imply a formal agreement or explicit exchange of information, but rather the spontaneous development of behaviors akin to collusion. This could be facilitated by a combination of two factors: on the one hand, the vast amount of available data on competitors and consumers (e.g., thanks to the Internet of Things, transaction analysis, or online behavior tracking), and on the other, the growing capabilities of artificial intelligence algorithms that learn market strategies through experience.</p>



<p>Experimental environments have already demonstrated that algorithms using reinforcement learning are capable of developing stable pricing strategies that reduce competition, even when they are not explicitly programmed to do so. Research shows that such systems can gradually coordinate their behavior, balancing between exploration and exploitation of the environment in a manner resembling tacit collusion. Importantly, this phenomenon can occur even under conditions that hinder cooperation &#8211; for example, when new players enter the market or when demand fluctuates.</p>



<p><strong>What is an AI algorithm?</strong></p>



<p>An AI algorithm is a set of advanced mathematical rules and processes designed to solve tasks, make decisions, or imitate human behavior and thinking using a computer. An AI algorithm often leverages machine learning capabilities to analyze, process, and learn from data. This allows AI tools to more efficiently perform various tasks (predicting patterns, assessing trends, optimizing processes, etc.) that would otherwise require human intervention. AI algorithms form the foundation of artificial intelligence systems, enabling them to learn, reason, recognize patterns, process natural language, and make decisions.</p>



<p>AI algorithms can self-improve by adapting their actions based on the analysis of vast amounts of data. There are three major categories of AI algorithms: supervised learning, unsupervised learning, and reinforcement learning. The key differences between these algorithms lie in how they are trained and how they function.</p>



<p><strong>Competition concerns – communication of algoritms</strong></p>



<p>A problem that raises particular concerns among competition authorities is the potential ability of algorithms to communicate. Although there is currently no evidence that systems learn this type of interaction without human intervention, it theoretically cannot be ruled out that in the future, algorithms will develop their own mechanisms for exchanging information. The European Commission points to the risk of &#8220;novel forms of coordination&#8221; between computer systems. If such a situation were to occur, it would be easier to classify the companies&#8217; actions as prohibited cooperation – similar to traditional information exchange between competitors.</p>



<p>The issue of legal liability, however, remains controversial. If algorithms merely anticipate competitors&#8217; reactions and adapt their own strategies accordingly, companies can be said to have permitted market autonomy (pursuant to Article 101 of the TFEU). However, it is more difficult to assess cases in which the systems themselves create a &#8220;communication channel&#8221; leading to actual price coordination. Some legal doctrine proposes adopting an approach similar to that used in the case of unauthorized employee actions – the company would be liable for the tools used. This was aptly put by EU Competition Commissioner, emphasizing that &#8220;companies cannot hide behind computer code<a href="#_ftn1" id="_ftnref1">[1]</a>&#8220;.</p>



<p>The current state of technology indicates that algorithms are not yet capable of concluding lasting cartel agreements in dynamic market conditions. However, the rapid development of artificial intelligence and the increasing complexity of predictive systems may enable the emergence of such practices in the future. Therefore, regulators are increasingly emphasizing the need to modernize competition law tools to effectively counter not only classic cartels but also &#8220;algorithmic collusion&#8221;. Failure to address this could lead to significant losses for consumers, a reduction in innovation, and the concentration of economic power in the hands of a few technological entities – creating a kind of &#8220;digital plutocracy.&#8221;</p>



<p><strong>The effects of AI algorithmic pricing</strong></p>



<p>One of the key problems with algorithmic pricing is the asymmetry in the speed of response to market changes. Companies with more advanced algorithms can update prices much more frequently—even continuously—while those with less advanced technological tools only make price adjustments at longer intervals, such as weekly. This leads to a structural competitive advantage for the former, as they can flexibly adapt to supply and demand and react almost immediately to competitive price movements. In practice, this means that companies with more advanced systems can aggressively lower prices before competitors have time to adapt their offerings, effectively driving them out of the market. This imbalance not only distorts the principles of fair competition but also leads to deeper market concentration, as smaller or technologically weaker companies gradually lose the ability to maintain their position against dominant players investing in advanced algorithmic solutions.</p>



<p>Predatory pricing, in which a dominant firm incurs short-term losses by deliberately pricing goods and services below cost to eliminate competitors or new entrants, is another practice that modern technology is currently employing. This strategy typically involves two stages: first, the dominant firm aggressively undercuts competitors&#8217; prices to drive them out of the market (the predation phase), and then uses its market power to raise prices to recoup losses and generate profits after the competitors disappear (the loss recovery phase). For predatory pricing strategies to be effective, a firm must maintain low prices long enough to eliminate competitors. Pricing algorithms can help firms target specific customers of competitors by offering them prices even below cost. For example, an established firm might do this to avoid losing customers to a new competitor. An established firm might use an algorithm to target customers most likely to switch suppliers, seeking to retain them rather than offering lower prices to all its customers. This could help an established company minimize losses. These algorithms can also help companies pursue predatory pricing strategies and build a reputation for lowering prices in the future if new entrants struggle. Pricing algorithms can also help companies raise prices for consumers who are more willing to pay or less sensitive to price changes. They enable companies to simultaneously engage in predatory pricing and recover losses without the need for a human intervention, using automated means.</p>



<p>Finally, algorithmic pricing introduces a significant element of uncertainty for consumers, who are unable to predict how much they will ultimately pay for a product or service. These mechanisms, based on automated supply and demand analyses, lead to constant and opaque price fluctuations, undermining market trust and limiting the ability to make rational purchasing decisions. Price instability often causes consumers to feel compelled to buy quickly for fear of further cost increases, which encourages impulsive and economically unfavorable choices. In the long term, such practices destabilize the market, hinder healthy competition, and strengthen the position of dominant players who exploit technological advantages at the expense of weaker market participants.</p>



<p><strong>The question of legality</strong></p>



<p>However, a fundamental question arises regarding the legality of such practices under Polish law. The Act of 9 May 2014 on Information on the Prices of Goods and Services<a href="#_ftn2" id="_ftnref2">[2]</a> imposes on businesses the obligation to clearly and unambiguously disclose the prices of their products. According to the Act, the price should be clearly displayed and allow for comparison with other market offers. However, dynamic price changes, even occurring several times a day, can raise interpretational questions regarding compliance with the requirement of unambiguous price presentation. A consumer who sees significantly different prices for the same product or service within a short period of time may be deprived of the ability to make a rational economic choice. It should be emphasized that the legislator also introduced the obligation to disclose the lowest price applicable within thirty days prior to the discount. In the context of algorithmic pricing, the question arises as to whether every short-term price change resulting from the operation of an algorithm should be treated as a discount within the meaning of the Act, or whether it should be classified as a normal market fluctuation. The lack of clear regulations in this area leads to legal uncertainty for both entrepreneurs and consumers.</p>



<p>The Act of 16 February 2007 on Competition and Consumer Protection<a href="#_ftn3" id="_ftnref3">[3]</a> opens up an even wider field of interpretation. This Act provides both instruments for counteracting practices that violate the collective interests of consumers and protection against anti-competitive practices. In this context, the problem of so-called tacit algorithmic collusion is particularly significant. In this context, independently operating algorithmic systems of various businesses, monitoring and reacting to competitors&#8217; prices, can stabilize them at an inflated level without the need for a formal agreement. This type of phenomenon, although difficult to detect and prove, can be classified as a violation of fair competition principles, potentially subject to intervention by market protection authorities. The literature indicates that the increasing automation of decision-making processes in price setting raises the risk of developing anti-competitive coordination mechanisms that fall outside the traditional categories of antitrust law.</p>



<p>At the same time, the Competition and Consumer Protection Act imposes an obligation on businesses to avoid misleading practices. In the case of dynamic pricing, the lack of full transparency becomes a problem. If consumers are not informed upfront that prices may fluctuate significantly depending on demand or transaction time, they may be deemed misleading, and the practice itself may be deemed to violate collective consumer interests. In this sense, the obligation of transparency takes on particular significance and should also include information about the pricing mechanism, not just the current price level.</p>



<p>An analysis of the applicable regulations leads to the conclusion that algorithmic pricing per se is not a prohibited practice in Poland. However, its legality depends on whether the entrepreneur complies with the obligations arising from specific laws, as well as on whether the use of algorithms does not lead to practices that restrict competition or violate consumer rights. Entrepreneurs are obligated to provide consumers with reliable and complete information and to avoid practices that may destabilize the market. In the event of a violation of these obligations, sanctions may be imposed by both the Trade Inspection Authority (in the case of incorrect pricing information) and the President of the Office of Competition and Consumer Protection (in the case of practices that violate competition rules or are misleading).</p>



<p><strong>Case law review</strong></p>



<p>It is also worth taking a closer look at decisions issued on algorithmic pricing by state and EU authorities.</p>



<p>In the Eturas case, the contested agreement was supported by a digital platform (software for selling travel online), where the system&#8217;s administrator proposed to competing travel agencies the use of a technical instrument imposing a ceiling on discounts on packages offered. The EU Court found it reasonable to assume that travel agencies that were aware of the content of messages sent via the system were participants in an anticompetitive agreement, unless they rebutted that presumption. The Commission also states that the prohibition under Article 101(1) TFEU is likely to cover cases in which &#8220;pricing rules&#8221; were defined by undertakings &#8220;in a common algorithmic tool (e.g., rules for adjusting the price to the lowest price on a specific online platform or in a specific online store), and this qualification would be accepted &#8220;even in the absence of an express agreement to adjust future prices”<a href="#_ftn4" id="_ftnref4">[4]</a>.</p>



<p>In commercial transactions, there are also cases in which entrepreneurs use the same algorithm to set prices for their services, yet there are no grounds to conclude that they have entered into an anticompetitive agreement. An example of a case assessed by the President of the Office of Competition and Consumer Protection (UOKiK) is the UBER app. Its use does result in the restriction or even elimination of price competition between UBER drivers, which is, after all, centrally determined by the app. This also constitutes an agreement between UBER and individual drivers. In this case, however, such algorithmic pricing is necessary for the proper functioning of the UBER system, and at the same time, it does not lead to the elimination of competition, being a proportionate measure. This justifies treating such an agreement as not violating the prohibition of Article 6, Section 1 of the UOKiK based on the construction of ancillary restrictions.</p>



<p>A problematic scenario can arise when a large number of businesses utilize the same or similarly functioning algorithm without any collusion between them regarding the selection of one algorithm over another. In this situation, each of these businesses uses a specific program as a tool to inform them about the market situation and enable a rapid response. In this scenario, there is a significant increase in market transparency, which can have anti-competitive effects, as the use of an algorithm allows businesses to react much more quickly to any market changes, including price reductions by competitors, which can reduce their incentive to make such reductions. In such a case, businesses merely adjust their prices to those of their competitors. Such conduct &#8211; so-called parallel conduct &#8211; has for years been viewed by EU and Polish jurisprudence as not violating antitrust rules. In fact, in this case, it cannot be said that an agreement was concluded. Moreover, under the soft law provisions issued regarding vertical relationships, the Commission itself has indicated that price monitoring using computer programs is not prohibited, or more precisely, it may benefit from an exemption from the prohibition of anticompetitive agreements. Therefore, from the Commission&#8217;s position, it can be deduced that the antitrust permissibility of such algorithmic price monitoring is determined by the lack of grounds for attributing such conduct the status of an agreement, and that it constitutes a manifestation of the parallel conduct mentioned above.</p>



<p>According to the authorities, it would also be possible to attribute antitrust liability to the creator of the algorithm. The VM- Remonts formula, developed in EU case law, could be particularly applicable to this. In this case, while the Court recognized as a rule that an undertaking cannot &#8220;be held liable for participating in a concerted practice on the basis of the actions of an independent service provider”<a href="#_ftn5" id="_ftnref5">[5]</a>, it also identified exceptions to this rule. Fulfilling one of these exceptions justifies the application of Article 101(1) TFEU also to the service provider, for example, the software developer. Polish legal literature also argues that the constructions of extended liability for competition law infringements developed in EU case law (especially the concept of cartel accessory liability) could also be used to attribute antitrust liability to an undertaking that provides participants in an agreement with tools (including digital tools) enabling the conclusion or implementation of a prohibited agreement.</p>



<p><strong>Summary</strong></p>



<p>Dynamic, algorithmic pricing lies at the intersection of two key areas of law: consumer law and competition law. This practice, while permissible, requires particular caution on the part of businesses and the development of consistent interpretative guidelines by the legislature. The lack of clear regulations creates a risk not only for consumers, who may be exposed to non-transparent and unfair practices, but also for businesses themselves, who may suffer severe financial consequences if they violate fair competition regulations. Given the growing importance of algorithmic technologies, it seems necessary to further develop and clarify the legal framework to enable businesses to use innovative price management tools, while also ensuring an adequate level of consumer protection and the integrity of market mechanisms.</p>



<p>The most serious challenge for competition authorities is when algorithms maintain elevated prices without formal information exchange between companies. In such cases, the classic dogmatics of antitrust law may prove insufficient, and consumers will bear the cost in the form of a loss of some of their well-being. Therefore, developing technical competencies of supervisory authorities, enabling them to understand and analyze the mechanisms of algorithms used in business practice, is particularly important.</p>



<p>At this stage, it seems premature to introduce new regulations on algorithmic pricing, as this could hinder the development of innovative technologies and limit their beneficial applications. Further interdisciplinary research combining law, economics, and computer science, as well as careful observation of market practice and case law, is essential.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><a href="#_ftnref1" id="_ftn1">[1]</a> Speech of the European Commissioner for Competition M. Vestager, Berlin, 16/03/2017.</p>



<p><a href="#_ftnref2" id="_ftn2">[2]</a> Act of 9 May 2014 on providing information on prices of goods and services (consolidated text: Journal of Laws of 2023, item 168).</p>



<p><a href="#_ftnref3" id="_ftn3">[3]</a> Act of 16 February 2007 on competition and consumer protection (consolidated text: Journal of Laws of 2024, item 1616, as amended).</p>



<p><a href="#_ftnref4" id="_ftn4">[4]</a> Point 397 of Guidelines 2023/C 259/01.</p>



<p><a href="#_ftnref5" id="_ftn5">[5]</a> Point 33 of the judgment of the Court of Justice of July 21, 2016, C-542/14, SIA &#8220;VM Remonts&#8221; (formerly SIA &#8220;DIV un KO&#8221;) and others. v. Konkurences padom, ECLI:EU:C:2016:578.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/ai-algorithmic-pricing-and-its-assessment-under-polish-and-eu-competition-law/">AI algorithmic pricing and its assessment under Polish and EU competition law</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/ai-algorithmic-pricing-and-its-assessment-under-polish-and-eu-competition-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>KIELTYKA GLADKOWSKI KG LEGAL – KIMES 2026. EU TRADE MISSION TO JAPAN AND KOREA</title>
		<link>https://www.kg-legal.eu/info/kg-legal-news/kieltyka-gladkowski-kg-legal-kimes-2026-eu-trade-mission-to-japan-and-korea/</link>
					<comments>https://www.kg-legal.eu/info/kg-legal-news/kieltyka-gladkowski-kg-legal-kimes-2026-eu-trade-mission-to-japan-and-korea/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 17 Sep 2025 12:17:07 +0000</pubDate>
				<category><![CDATA[KG LEGAL NEWS]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[Polish law]]></category>
		<category><![CDATA[The EU Business Hub - Japan and the Republic of Korea i]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8333</guid>

					<description><![CDATA[<p>Publication date: September 17, 2025 The lawyers of KIELTYKA GLADKOWSKI KG LEGAL participate in the EU Info Day &#8211; EU Business Hub @ KIMES 2026 on 23 September 2025. Topic: EU Info Day &#8211; EU Business Hub @ KIMES 2026 The EU Business Hub &#8211; Japan and the Republic of Korea is an EU-funded programme [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/kg-legal-news/kieltyka-gladkowski-kg-legal-kimes-2026-eu-trade-mission-to-japan-and-korea/">KIELTYKA GLADKOWSKI KG LEGAL – KIMES 2026. EU TRADE MISSION TO JAPAN AND KOREA</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark class="has-inline-color has-vivid-cyan-blue-color" style="background-color: rgba(0, 0, 0, 0);">Publication date: September 17, 2025</mark></strong></p>



<figure class="wp-block-image size-large"><a href="https://eubusinesshub.eu/en" target="_blank" rel=" noreferrer noopener"><img fetchpriority="high" decoding="async" width="1024" height="372" src="https://www.kg-legal.eu/wp-content/uploads/2025/09/Bez-tytulu-1024x372.png" alt="" class="wp-image-8334" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/09/Bez-tytulu-1024x372.png 1024w, https://www.kg-legal.eu/wp-content/uploads/2025/09/Bez-tytulu-300x109.png 300w, https://www.kg-legal.eu/wp-content/uploads/2025/09/Bez-tytulu-768x279.png 768w, https://www.kg-legal.eu/wp-content/uploads/2025/09/Bez-tytulu-1536x558.png 1536w, https://www.kg-legal.eu/wp-content/uploads/2025/09/Bez-tytulu.png 1675w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="has-luminous-vivid-amber-background-color has-background"><strong>The lawyers of KIELTYKA GLADKOWSKI KG LEGAL participate in the EU Info Day &#8211; EU Business Hub @ KIMES 2026 on 23 September 2025.</strong></p>



<span id="more-8333"></span>



<p>Topic: EU Info Day &#8211; EU Business Hub @ KIMES 2026</p>



<p>The EU Business Hub &#8211; Japan and the Republic of Korea is an EU-funded programme that supports EU Small and Medium-Sized Enterprises (SMEs) in the green, digital, and healthcare sectors to enter the markets of Japan and the Republic of Korea. The programme aims to strengthen EU businesses&#8217; export and investment activities and to foster more resilient, sustainable, and technologically advanced value chains with both markets.</p>



<p><a href="https://eubusinesshub.eu/en">https://eubusinesshub.eu/en</a></p>



<p>The programme is organising 10 business missions in Japan and 10 in the Republic of Korea between 2024 and 2027, each business mission allowing a group of 50 innovative EU companies to benefit from extensive business coaching.</p>



<p>The Asia-Pacific region is the largest destination of Foreign Direct Investments (FDIs) globally and it is a powerhouse for global trade. The EU Business Hub &#8211; Japan and the Republic of Korea aims to boost the presence and visibility of EU companies operating in the green, digital, and healthcare sectors where potential for increased cooperation between European and Japanese and European and Korean companies exists.</p>



<p>The programme aims to strengthen EU businesses&#8217; internationalisation, export and investment activities, as well as foster more resilient, sustainable, and technologically advanced value chains with the two Asian markets. Thus, significantly supporting the implementation of EU-RoK Free Trade Agreement (FTA) and the EU-Japan Economic Partnership Agreement (EPA).</p>
<p> </p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/kg-legal-news/kieltyka-gladkowski-kg-legal-kimes-2026-eu-trade-mission-to-japan-and-korea/">KIELTYKA GLADKOWSKI KG LEGAL – KIMES 2026. EU TRADE MISSION TO JAPAN AND KOREA</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/kg-legal-news/kieltyka-gladkowski-kg-legal-kimes-2026-eu-trade-mission-to-japan-and-korea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Optical Illusions in AI Systems, the Danger of Adversarial Attacks, Biological Technologies, Explainable AI – topics discussed during Futurology Congress 2025</title>
		<link>https://www.kg-legal.eu/info/kg-legal-news/optical-illusions-in-ai-systems-the-danger-of-adversarial-attacks-biological-technologies-explainable-ai-topics-discussed-during-futurology-congress-2025/</link>
					<comments>https://www.kg-legal.eu/info/kg-legal-news/optical-illusions-in-ai-systems-the-danger-of-adversarial-attacks-biological-technologies-explainable-ai-topics-discussed-during-futurology-congress-2025/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 12:29:23 +0000</pubDate>
				<category><![CDATA[KG LEGAL NEWS]]></category>
		<category><![CDATA[ai ac]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[Biological Technologies]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Explainable AI – topics discussed during Futurology Congress 2025]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[Optical Illusions in AI Systems]]></category>
		<category><![CDATA[Polish law]]></category>
		<category><![CDATA[the Danger of Adversarial Attacks]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8324</guid>

					<description><![CDATA[<p>Publication date: September 15, 2025 On September 12-14, 2025, lawyers from KIELTYKA GLADKOWSKI KG LEGAL participated in the annual Futurology Congress in Krakow. The participants, among which there was AGH University of Science and Technology&#8217;s Artificial Intelligence Center of Excellence discussed aspects of new technologies, including: • Optical Illusions in AI Systems: The Danger of [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/kg-legal-news/optical-illusions-in-ai-systems-the-danger-of-adversarial-attacks-biological-technologies-explainable-ai-topics-discussed-during-futurology-congress-2025/">Optical Illusions in AI Systems, the Danger of Adversarial Attacks, Biological Technologies, Explainable AI – topics discussed during Futurology Congress 2025</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: September 15, 2025</mark></strong></p>



<figure class="wp-block-image size-large"><a href="https://kongres.pffn.org.pl/nauka/" target="_blank" rel=" noreferrer noopener"><img decoding="async" width="1024" height="536" src="https://www.kg-legal.eu/wp-content/uploads/2025/09/wydarzenie-FB-1024x536.png" alt="" class="wp-image-8325" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/09/wydarzenie-FB-1024x536.png 1024w, https://www.kg-legal.eu/wp-content/uploads/2025/09/wydarzenie-FB-300x157.png 300w, https://www.kg-legal.eu/wp-content/uploads/2025/09/wydarzenie-FB-768x402.png 768w, https://www.kg-legal.eu/wp-content/uploads/2025/09/wydarzenie-FB-1536x804.png 1536w, https://www.kg-legal.eu/wp-content/uploads/2025/09/wydarzenie-FB.png 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>On September 12-14, 2025, lawyers from KIELTYKA GLADKOWSKI KG LEGAL participated in the annual Futurology Congress in Krakow.</p>



<span id="more-8324"></span>



<p>The participants, among which there was AGH University of Science and Technology&#8217;s Artificial Intelligence Center of Excellence discussed aspects of new technologies, including:</p>



<p>• Optical Illusions in AI Systems: The Danger of Adversarial Attacks. Adversarial attacks on vision systems are a topic of growing interest in both science and the technology industry – not only due to autonomous vehicles but also medical systems. The panelists demonstrated how subtle, almost invisible image modifications can completely confuse AI algorithms, leading to situations where the algorithm fails to recognize a STOP road sign or makes an error when analyzing medical images. Examples of such attacks from both transportation and medicine were presented, highlighting their impact on everyday life and safety. There were explained the mechanisms behind these phenomena and their consequences for machine learning-based systems. In this area, there is a constant race between the creators of such attacks and the engineers developing protection methods, and ensuring complete security remains a major challenge for the AI industry.</p>



<p>• The development of the Polish space sector, combining engineering, science, and modern technologies. Domestic entities are among the leaders building Poland&#8217;s position in the global space industry supply chain. During the panel, there were discussed the most important achievements and participation of Polish teams in prestigious international missions. Representatives of key companies discussed their projects, challenges, and role in the global space ecosystem. There were also considered barriers to sector development and legislative and financial needs. The panel was an opportunity to look to the future and attempt to answer the question of Poland&#8217;s potential role in the exploration and use of space. Participants shared their experiences collaborating with the European Space Agency and other international partners.</p>



<p>• Modern biotechnology. Biotechnology is becoming one of the pillars of modern civilization, offering breakthrough solutions in medicine, diagnostics, agriculture, and environmental protection. Faced with global challenges such as aging societies, the growing number of lifestyle diseases, and the need for sustainable development, the dynamic development of biotechnology is opening up new opportunities to improve the quality of life. The panel discussed the potential of gene and cell therapies, the importance of innovative drugs in the fight against cancer, and the role of collaboration between science, the investment sector, and industry. Guests addressed ethical, regulatory, and social issues related to the implementation of new biological technologies. The discussion explored how biotechnology can truly benefit humanity in the coming decades.</p>



<p>The Congress lectures are related to specific examples and problems that scientists are struggling with in daily lives – for example, how to easily delude artificial intelligence in software in an unmanned vehicle resulting in a failure to recognize a STOP sign</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="483" src="https://www.kg-legal.eu/wp-content/uploads/2025/09/17mzrsqhz99v3xkgvk2gwyzoxvvm-1024x483.png" alt="" class="wp-image-8326" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/09/17mzrsqhz99v3xkgvk2gwyzoxvvm-1024x483.png 1024w, https://www.kg-legal.eu/wp-content/uploads/2025/09/17mzrsqhz99v3xkgvk2gwyzoxvvm-300x142.png 300w, https://www.kg-legal.eu/wp-content/uploads/2025/09/17mzrsqhz99v3xkgvk2gwyzoxvvm-768x362.png 768w, https://www.kg-legal.eu/wp-content/uploads/2025/09/17mzrsqhz99v3xkgvk2gwyzoxvvm.png 1034w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>source: <a href="https://www.drmalinowski.edu.pl/posts/2824-adwersarialne-ataki-na-sztuczna-inteligencje">https://www.drmalinowski.edu.pl/posts/2824-adwersarialne-ataki-na-sztuczna-inteligencje</a></p>



<p></p>


<p>Artykuł <a href="https://www.kg-legal.eu/info/kg-legal-news/optical-illusions-in-ai-systems-the-danger-of-adversarial-attacks-biological-technologies-explainable-ai-topics-discussed-during-futurology-congress-2025/">Optical Illusions in AI Systems, the Danger of Adversarial Attacks, Biological Technologies, Explainable AI – topics discussed during Futurology Congress 2025</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/kg-legal-news/optical-illusions-in-ai-systems-the-danger-of-adversarial-attacks-biological-technologies-explainable-ai-topics-discussed-during-futurology-congress-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CSIRT GOV Poland – Computer Security Incident Response Team recently published a very interesting and insightful report on the state of cybersecurity in Poland in 2024.</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/csirt-gov-poland-computer-security-incident-response-team-recently-published-a-very-interesting-and-insightful-report-on-the-state-of-cybersecurity-in-poland-in-2024/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/csirt-gov-poland-computer-security-incident-response-team-recently-published-a-very-interesting-and-insightful-report-on-the-state-of-cybersecurity-in-poland-in-2024/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Tue, 26 Aug 2025 17:47:08 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[cross border cases]]></category>
		<category><![CDATA[CSIRT GOV]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8219</guid>

					<description><![CDATA[<p>Publication date: August 26, 2025 What is CSIRT GOV and what is its legislative environment The Polish Computer Security Incident Response Team (CSIRT GOV), led by the Head of the Internal Security Agency, serves as the national CSIRT. The CSIRT GOV is responsible for coordinating the response process to computer incidents occurring in the area [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/csirt-gov-poland-computer-security-incident-response-team-recently-published-a-very-interesting-and-insightful-report-on-the-state-of-cybersecurity-in-poland-in-2024/">CSIRT GOV Poland – Computer Security Incident Response Team recently published a very interesting and insightful report on the state of cybersecurity in Poland in 2024.</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color"><strong>Publication date: August 26, 2025</strong></mark></p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>What is CSIRT GOV and what is its legislative environment</strong></p>



<p>The Polish Computer Security Incident Response Team (CSIRT GOV), led by the Head of the Internal Security Agency, serves as the national CSIRT. The CSIRT GOV is responsible for coordinating the response process to computer incidents occurring in the area specified in Article 26, Section 7 of the Act of 5 July 2018 on the National Cybersecurity System.</p>



<span id="more-8219"></span>



<p>The first European cybersecurity regulation is Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the European Union, known as the <strong><u>Network and Information System Directive (NIS)</u></strong>. The directive imposes numerous obligations on Member States, primarily involving the establishment of appropriate institutions, the adoption of a national strategy for the security of network and information systems, and the introduction of cooperation mechanisms. This directive established a network of computer security incident response teams (CSIRTs).</p>



<p>The Act on the National Cybersecurity System, adopted by the Polish legislator on 28 August 2018, serves to achieve the objectives set out in the NIS Directive. Pursuant to Article 1 of the Act on the National Cybersecurity System, the act specifies: the organization of the national cybersecurity system and the tasks and responsibilities of the entities comprising this system, the method of exercising supervision and control over the application of the provisions of the act, as well as the scope of the Cybersecurity Strategy of the Republic of Poland.</p>



<h2 class="wp-block-heading">The legislator, in principle, decided to create three teams:</h2>



<p>• CSIRT GOV – Computer Security Incident Response Team operating at the national level, led by the Head of the Internal Security Agency,</p>



<p>• CSIRT MON – Computer Security Incident Response Team operating at the national level, led by the Minister of National Defence and</p>



<p>• CSIRT NASK – Computer Security Incident Response Team operating at the national level, led by the Scientific and Academic Computer Network – National Research Institute (Article 2 of the Act on the National Cybersecurity System).</p>



<p>The competence of CSIRT GOV and CSIRT MON is defined in Article 27 of the Act on the national cybersecurity system as follows: &#8220;CSIRT GOV is competent in the scope of incidents related to events of a terrorist nature, referred to in Article 2 point 7 of the Act of June 10, 2016 on counter-terrorist activities (Journal of Laws of 2024, item 92); CSIRT MON is competent in the scope of incidents related to events of a terrorist nature, referred to in Article 5 paragraph 1 point 2a of the Act of June 9, 2006 on the Military Counterintelligence Service and the Military Intelligence Service (Journal of Laws of 2023, items 81, 1834 and 1860).</p>



<p>One of the basic <strong><u>tasks of CSIRT NASK is to recognize, prevent, and detect threats to the security of public administration bodies&#8217; ICT systems or ICT systems and networks</u></strong> covered by the uniform list of facilities, installations, devices, and services constituting critical infrastructure, as well as ICT systems of owners and holders of critical infrastructure facilities, installations, or devices, referred to in Art. 5b paragraph 7 item 1 of the Act of 26 April 2007 on Crisis Management.</p>



<h2 class="wp-block-heading"><strong>CSIRT GOV Annual Report</strong></h2>



<p>CSIRT GOV has just published a report on the state of cybersecurity in 2024. The document comprehensively presents statistics on the number and types of incidents and threats, comparing them with data from previous years. It presents the most significant threats and undesirable cyber activity targeting the IT infrastructure of public authorities, critical infrastructure operators, and entities providing essential services. The report is based on an analysis of IT security incidents reported and identified by CSIRT GOV, data obtained using systems enabling autonomous threat detection, and information obtained from the Team&#8217;s active activities. The study also includes analyses of the changing cybersecurity landscape, significant trends, and potential security weaknesses.</p>



<p>The Report highlights at least two interconnected circumstances that seem to force reflection on the significance of cybersecurity threats and the systems designed to eliminate or mitigate them. On the one hand, it highlights the technological trend that is increasingly permeating our lives with each passing moment. The result is rapid digitization, which is taking place through the transfer of increasing amounts of data relating to citizens, public services, communications, and finances to the digital sphere. The undeniable convenience of such applications also means that cyberspace can be increasingly effectively used to launch attacks on a scale that seriously threatens the security of the state and its citizens.</p>



<p>The second factor is the geopolitical environment and context. On March 1, 2024, the CRP alert level for cyber threats was lowered from the previously applicable <strong>CHARLIE-CRP</strong>, the third of four alert levels, to the currently applicable <strong>BRAVO-CRP</strong>, the second alert level. This, however, means that we are still dealing with a state of heightened threat in Polish cyberspace, despite a slight reduction in the intensity of this threat. The changing landscape of conflicts between states was also highlighted. Unlike in the past, conflicts take the form of not only kinetic clashes but also involve the use of a full spectrum of tools, including those extending into cyberspace. Ultimately, they most often take the form of &#8220;hybrid operations or wars,&#8221; which can complement military actions, serve as an alternative, or serve as a precursor to a kinetic strike. For this reason, it is important to consider the broader context of emerging incidents.</p>



<p>2024 was a year of dual elections: local government and the European Parliament, which each time requires vigilance on the part of bodies like CSIRT GOV due to the much more widespread threat of disinformation. It is also necessary to ensure the proper functioning of the IT systems used to conduct elections, with citizens&#8217; trust in the democratic process ultimately at stake.</p>



<h2 class="wp-block-heading"><strong>CSIRT GOV Coordinated Incident Statistics</strong></h2>



<p>In 2024, a decrease in reports registered by the CSIRT GOV Team regarding potential ICT incidents was observed. Of the 17,439 reports, 3,991 were classified as <strong>actual ICT security incidents</strong>. In 2022, 26,753 reports and 4,959 incidents were recorded, followed by 19,888 reports and 4,676 incidents in 2023. These statistics do not include reports from the ARAKIS GOV system. The lack of data from ARAKIS, a dedicated, distributed early warning system for ICT threats occurring at the interface between internal networks and the internet, may be due to the need to separate these statistics, which will be discussed later in this article.</p>



<p>There are no significant differences in registered reports and incidents between individual quarters in 2024. However, the highest number of incidents was recorded in the second quarter, which was related to an increase in resource unavailability and <strong>the publication of sensitive data in open sources, i.e., leaks</strong>.</p>



<p>The CSIRT GOV team indicates that the factors that led to the decrease in incidents include: 1) proactive activities conducted by CSIRT GOV to increase user awareness through training; 2) reporting on identified vulnerabilities within the area of competence; 3) ongoing issuance of CSIRT GOV recommendations – appropriate to the CRP threat level; 4) regular distribution of compromise indicators for monitored campaigns; 5) periodic security assessments of IT systems; 6) the institution&#8217;s implementation of security solutions that mitigate attacks in their early stages.</p>



<h2 class="wp-block-heading"><strong>Division of incidents reported by entities of the national cybersecurity system into categories</strong></h2>



<p>The highest percentage of recorded incidents, and the most significant increase, occurred in the <strong>Vulnerability category. </strong>The numbers for incidents in this category are as follows: 1,105 incidents compared to 993 in the previous year. This category refers to security vulnerabilities identified by the CSIRT GOV Team resulting from the vulnerability of resources and services accessible via the Internet by entities under the CSIRT GOV&#8217;s jurisdiction.</p>



<p>Vulnerability refers to a weakness in an IT system, e.g., in procedures, design, implementation, or internal controls, that can be exploited for unauthorized access, data destruction or disclosure, data alteration, system weakening, etc.</p>



<p>The next category is <strong>Publication. </strong>In this regard, there was a decrease in such incidents from 1,052 in 2023 to 902 in 2024. Publication refers to the disclosure of sensitive data through leaks, including login credentials for electronic services, private PGP keys, or information about the specifications of an institution&#8217;s IT infrastructure.</p>



<p>Among the activities recorded in the <strong>Social Engineering category</strong>, the GOV CSIRT Team identified phishing emails aimed at obtaining login credentials for electronic services or other sensitive data, infecting them with malware, or extorting funds. There was a noticeable and significant decline in incidents in this category. In 2024, 815 such incidents were recorded, compared to 1,362 in the previous year. A decrease was also noted in the</p>



<p><strong>Unavailability </strong>category, which includes DoS / DDoS attacks (773 incidents in 2023 and 478 in 2024). The remaining, smaller categories, to which a similar number of incidents were assigned as in 2023, are <strong>Attack </strong>(325 in 2023 to 261 in 2024) – events recorded in this category included attempts to break security by exploiting vulnerabilities, bruteforce attacks, compromise of accounts and systems, and exfiltration of data from adopted IT resources, <strong>Cascade </strong>(235 incidents in 2024, category not presented in previous years) – referring to reports and incidents related to terrorist events, based on Article 27 of the Act on the National Cybersecurity System. These include all activities aimed at minimizing terrorist threats undertaken by CSIRT GOV in coordinating incident management.</p>



<p><strong>Scanning</strong>, or reconnaissance of IT infrastructure to identify vulnerable systems and services, is a category that has seen an increase compared to the previous year (108 incidents in 2024, compared to 101 in 2023). This category includes incidents indicating the possibility of preparing offensive actions aimed at breaching security or compromising the availability of services. The two smallest incidents in terms of number of incidents are <strong>Content </strong>(53 incidents in 2023, 56 in 2024) and <strong>Virus </strong>(37 incidents in 2023, 31 in 2024). The former concerns incidents violating broadly understood public goods, such as information damaging the image of state entities or publishing disinformation content. This primarily includes the mass use of the image of persons holding leadership positions in the state, for example, to extort funds from citizens. <strong>The Virus </strong>category classifies incidents involving malware identified on workstations, servers, and network devices.</p>



<p>The report also includes data on the number of incidents reported by entities within the national cybersecurity system in 2024, broken down by sector. According to this data, the largest number of incidents occurred in the Institutions and Critical Infrastructure Operators sectors. The next sectors in terms of the number of recorded incidents were: State Authority, Office, Ministry, Other, and Service.</p>



<p><strong>Social engineering campaigns in 2024</strong></p>



<p>Social engineering campaigns identified by CSIRT GOV in 2024 most often involve attempts to obtain confidential data, such as login credentials, by impersonating various institutions (phishing), while creating various fictitious scenarios to lend credibility to requests, such as a password reset via a hyperlink sent in an email that led to a fake website. Among the most interesting social engineering campaigns cited by CSIRT GOV in the Report was a phishing campaign involving the sending of messages from a compromised email address belonging to a district office, with a terse subject line and content intended to give the impression that it was part of prior arrangements or correspondence between the sender and recipient. The messages contained attachments named <em>additional (02).docx.exe </em>or <em>additional (03).docx.exe</em>, which contained <strong>the Agent Tesla Trojan malware</strong>.</p>



<p>Another social engineering campaign, based on a similar theme, also stands out. The goal was to infect recipients&#8217; devices with malware. The sender impersonated PGNiG Obrót Detaliczny sp. z o. o. in the email. The email, titled &#8220;PGNiG – Request for Offer: Suwalki Project 2025/2026,&#8221; was intended to intrigue the recipient and persuade them to interact with the attachment. The attached archive, titled &#8220;PGNIG Request for Offer: Suwalki Project 20252026.gz,&#8221; contained a VBS file with the same name. Analysis conducted by the CSIRT GOV team revealed that the script was responsible for downloading malware classified as the GuLoader Trojan from the mobiera.ro domain.</p>



<p>Since the end of August 2024, the CSIRT GOV team has received information about a phishing campaign in which an adversary impersonates the Chancellery of the Prime Minister to obtain login credentials for banking portals (officially used as a login method for government e-services such as mObywatel and Trusted Profile). The website in question was located in the environment.odszkodowanie-gov.com domain. The website used the image of the Chancellery of the Prime Minister and the style of the official government website, which is used by the state administration within the gov.pl domain. The website displayed information about a supposed compensation that every household was entitled to in excess of PLN 400. To receive these funds, users had to authenticate using a bank of their choice. After selecting a financial institution from the list, the fake bank&#8217;s website loaded, displaying a login panel.</p>



<p>The most important trends in social engineering attacks in 2024 include: the use of compromised email accounts of local, provincial, national or international institutions, including the takeover of government email accounts (including those in the gov.pl domain), the use of QR codes instead of classic links, allowing the bypassing of automatic scanning of potentially malicious content by email security filters, signing documents using services such as DocuSign and encouraging the display of shared documents on real services such as Microsoft SharePoint or Google Drive, and the use of the image (e.g. logo) of Polish and European law enforcement agencies to intimidate the recipient into taking appropriate action.</p>



<p><strong>The threat from sponsored and hacktivist groups</strong></p>



<p>Threats stemming from sponsored groups are typically characterized by a high level of technical sophistication and sophistication. A key characteristic of these groups is remaining hidden while simultaneously ensuring access to compromised infrastructure. Due to its geopolitical location, Poland is particularly vulnerable to these threats, stemming primarily from the activity of adversaries supporting primarily Russian goals or narratives. Furthermore, in 2024, attacks attributed to hacktivist groups continued to be a constant feature of the cyberthreat landscape. Unlike sponsored groups, these groups intensively published information about their activities on social media to reach the widest possible audience and thus promote their ideological goals. These groups focused their activities on DDoS attacks aimed at disrupting the availability of services and websites, a continuation of the activities from 2022 and 2023. In 2024, a wide range of APT activity was recorded, with the dominant actor in the CRP being the APT group known as APT28, also known as Fancy Bear, which, according to some sources, was actually part of the Russian GRU. ATPs pose a serious threat to the Polish state. ATP28&#8217;s mission is primarily to conduct espionage operations, and its targets primarily include government and military institutions, international organizations, and strategic sectors of the economy. ATP activity was characterized by the use of advanced, multi-stage techniques aimed at obtaining credentials, installing malware, and providing persistent access to victim systems.</p>



<p><strong>Example of an ATP28 attack using&#8230; Windows Calculator</strong></p>



<p>Perhaps the most spectacular attack involved the distribution of the HEADLACE malware. According to the report, the attack began with an email containing a malicious link, simulating an offer to sell a car from the diplomatic fleet. The email was sent from an email address in the bigmir.net domain, which indicated a Ukrainian email provider. The message encouraged users to open a link under the guise of an Audi car for sale, when in reality the link referred to a webhook.site website. The website&#8217;s script verified the value of the browser&#8217;s UserAgent header. If the victim was using a non-Windows system, a benign image was displayed; otherwise, a ZIP archive containing three files was downloaded to the victim&#8217;s computer: EXE, DLL, and BAT. The executable file had a double.jpg.exe extension to imitate a graphic file, as in previous campaigns. The image in question was a so-called decoy file:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="605" height="375" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-12.png" alt="" class="wp-image-8220" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-12.png 605w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-12-300x186.png 300w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>



<p>Most interestingly, the file with the .jpg.exe extension was a copy of the authentic Windows Calculator application. However, the Windows Calculator was vulnerable to the so-called DLL Side-Loading technique. (Malware readily exploits the characteristics of dynamic link libraries ( .dll ). The fundamental characteristic of dll libraries is that they require a process to execute the code contained within them. This is where all the abuses in the form of injecting malicious .dll libraries into trusted program processes occur. If Windows or an installed application only checks the name of the .dll library to be loaded, without verifying the checksum or digital signature, it is possible to replace such a .dll library with a malicious one). The purpose of the library in question was to execute the last of the three files, a BAT script. As a result of executing the BAT file, a file with the .jpg20 extension was downloaded from a resource in the webhook [.] site domain using Microsoft Edge. This file was then transferred to another location, changing the file extension to .cmd using the script for execution. Following the attack, some artifacts were deleted to minimize the risk of detection. The final payload returned information from the victim&#8217;s workstation, including a list of files from the Desktop and Downloads folders, as well as the IP address.</p>



<p><strong>What else is the ATP28 group responsible for?</strong></p>



<p>ATP28 activity also included another type of phishing activity, involving impersonating email administrators and persuading users to provide their login credentials in a fake Outlook Web Access panel. In 2024, several such campaigns targeted government administrations, including password change panels in both Polish and English, as well as those designed to increase the size of email inboxes. This type of phishing is a classic method of obtaining sensitive data, and the effectiveness of the attack is related to the maturity of individual entities in terms of their cybersecurity measures, which are also within the actor&#8217;s area of interest.</p>



<p>Among the activities that most likely fit into the APT28 cluster of activity were password bruteforce attacks, spraying and credential stuffing email accounts and VPN services27 to gain access to email and other resources processed by employees of entities targeted by Russian-sounding APT groups. To conceal the attempted breach, the actor used access through anonymizing networks and residential proxies, using compromised network devices belonging to private users or small businesses, usually geolocated in the same country. In 2024, the actor also reportedly used the DCSync technique to mass replicate user login data within a domain controller, the so-called credential dump. This may result in ensuring the actor&#8217;s long-term access to the infrastructure by creating the so-called Golden Ticket -ui to carry out the Pass the Ticket attack. These activities are consistent with the group&#8217;s modus operandi, which, after gaining access to infrastructure, employs so-called living- off-the-land techniques, involving the use of available system tools to escalate privileges or exfiltrate data.</p>



<h2 class="wp-block-heading"><strong>Hacktivists and Cybercrime</strong></h2>



<p>Following the outbreak of the war in Ukraine, numerous groups and collectives emerged, conducting a kind of guerrilla activity in cyberspace. The term &#8220;hacktivism&#8221; itself comes from a combination of the words &#8220;hack&#8221; and &#8220;activism,&#8221; and is—as the name suggests—the transference to cyberspace of the activities of activists fighting for various political or ideological goals. In the case of pro-Russian &#8221; hacktivists ,&#8221; the motivation they present on social media is primarily support for Russian military actions and &#8220;punishing&#8221; NATO alliance members for their military support of Ukraine. The most well-known groups include Killnet , Anonymous Sudan (despite its name, it aligns with Russia&#8217;s narrative), Cyber Army of Russia Reborn , XAKNET, Solntsepek , UserSec , NoName057(16), Zarya , Beregini, and Z- Pentest. Their primary method of operation is DDoS attacks, usually technically unsophisticated but heavily publicized for propaganda purposes. In 2024, the CSIRT GOV team also recorded malicious activity targeting domestic entities, including attempted hacks into IIoT ( Industrial Internet of Things ) systems with remote access over the internet, including through HMI (Human-Machine Interface) panels. This is a new manifestation of hacktivist threats, which have somehow become a focus of interest for these groups. Attacks on such devices were often due to the lack of adequate remote access protection. These weaknesses were also noticed by hacktivist groups. These groups, taking advantage of online login panels, engaged in activities aimed at gaining unauthorized access, primarily through the use of default login credentials. This threat particularly affected facilities such as sewage treatment plants, water treatment plants, waste incineration plants, and facility management facilities.</p>



<p>In 2024, CSIRT GOV also noted cybercriminal activity, including Chinese groups belonging to the Quad7 botnet using vulnerable TP-Link devices. The botnet was used to anonymize attacks, including attempts to take over Microsoft 365 accounts. The UAC-0050 ( DaVinci Group) group also operated, conducting widespread phishing campaigns, including in Poland. Unlike APT groups, which strive to remain hidden and attack precisely selected targets, the DaVinci Group&#8217;s modus operandi is different. The group prefers broad attacks and pays little attention to effectiveness. An example of this type of attacks was a campaign recorded in 2024, in which messages were sent to recipients in Poland in Kazakh, which did not fit into any Polish context. This group was also responsible for a disinformation campaign from the end of 2024, in which false threats were sent to plant explosives on government buildings in Poland and Ukraine (as Fire Cells Group). It was a psychological operation intended to cause panic, not an actual attack.</p>



<h2 class="wp-block-heading"><strong>Malware</strong></h2>



<p>The CSIRT GOV team analyzed over 15,000 files reported by entities in the national cybersecurity system, 650 of which were deemed malicious. The dominant categories among the analyzed malware samples in 2024 were HTML Phisher, Snake Keylogger, Formbook, and Remcos. HTML Phisher is used in phishing attacks. This type of software is most often distributed by sending victims spoofed emails containing HTML/HTM attachments. After opening the attachment, the user sees a page imitating the service (e.g., online banking or an email login panel). The page is designed to closely resemble the original website. An HTML Phisher attack is also dangerous because it is often able to bypass spam filters and can operate partially offline, as it is opened locally on the victim&#8217;s device. Snake Keylogger is software that records all keyboard input by the user. Of course, this also includes login credentials. Snake Keylogger is often distributed via malicious email attachments or as part of a bundle with other software. Once installed, it runs in the background and is often able to evade detection by standard antivirus programs.</p>



<p>Formbook is a popular infostealer malware that focuses on stealing user data, such as login credentials, files, and information stored in web browsers (e.g., saved passwords and cookies). Formbook is sold, among other things, as malware -as-a-service, making it easily accessible to cybercriminals. It is primarily distributed via infected attachments (e.g., PDF files, Office documents) or links in phishing emails. Once a computer is infected, Formbook saves data in hidden files and uploads it to attacker-controlled servers. This type of malware supports functions such as keylogging, taking screenshots, and downloading and executing additional files sent by the attacker. Another malware family is Remcos. Remcos is a remote administration tool that can be used to gain complete control over an infected system. This software allows it to perform a range of actions, such as keylogging, screenshots, webcam and microphone monitoring, and even run arbitrary programs and commands on the victim&#8217;s computer. Remcos was initially promoted as a legitimate computer management tool, but quickly became a popular tool used by cybercriminal groups. It is most commonly distributed through phishing campaigns, where victims are tricked into opening infected attachments. Its features include the ability to run in stealth mode, making it difficult for standard security systems to detect.</p>



<p><strong>ARAKIS GOV</strong></p>



<p>The ARAKIS GOV system, mentioned earlier, is included separately in the statistics for a reason. The system&#8217;s primary purpose is to detect and automatically describe threats occurring in IT networks based on the aggregation, analysis, and correlation of data from various sources. In 2024, the system generated 5,446,734 alerts, including 3,322,068 with urgent priority, meaning they required an immediate response from administrators. A small percentage of alerts were high and medium priority, while nearly 40% were low priority, meaning they were purely informational alerts regarding the current situation at the interface between the internal network and the internet. Each recorded alert has precise technical data allowing for its verification and is classified in detail by the system. 56.60% of alerts were type 1 (communication to malicious addresses). These alerts resulted from attempts to establish communication with IP addresses or domains deemed malicious or potentially posing a threat.</p>



<h2 class="wp-block-heading"><strong>Safety Assessment Summary</strong></h2>



<p>One of the tasks carried out by the CSIRT GOV Team is to assess the security of government administration institutions&#8217; information and communication systems and critical infrastructure. In 2024, in accordance with the plan adopted for this year, assessments were conducted at 14 institutions, assessing a total of 64 network/IT system segments and 26 domains/subdomains and websites. As part of the security assessments, the CSIRT GOV Team conducted a series of tests to identify significant vulnerabilities affecting the security of the assessed entities&#8217; information and communication infrastructure. These tests included passive and active data collection, identifying vulnerabilities in the architecture of network systems and services, web applications, exploiting vulnerabilities, and analyzing the impact of social engineering. As a result of the security assessments, the CSIRT GOV Team identified a range of vulnerabilities, ranging from low to critical. Critical and high threats were identified as the most important groups of vulnerabilities. These vulnerabilities included, for example: outdated software versions present in a number of systems and services used by entities, primarily concerning Apache HTTP Server, OpenSSL, VMware, use of unsupported software versions (Microsoft Windows 2008 R2 std . – end of support January 14, 2020, Microsoft SQL Server 2008 R2 – end of support July 9, 2019, VMware 6.7.x – end of support November 15, 2023), anonymous access, without required authentication or based on default passwords, etc.</p>



<h2 class="wp-block-heading"><strong>Security Assessment &#8211; Examples of detected vulnerabilities:</strong></h2>



<p><strong>1. Unsecured access to the Docker API</strong> &#8211; Access equivalent to accessing the server as a user with the highest privileges – root.</p>



<p><strong>2.</strong> <strong>Discovery of the primary domain administrator&#8217;s credentials on the sysvol share.</strong></p>



<p><strong>3. High-privilege MSSQL user</strong> &#8211; As a result of a Password Spraying attack, access was gained to a network share containing the source code of a web application. A configuration file containing the credentials of the MSSQL service user was found within the code structure. During reconnaissance of the database engine using the compromised credentials, it was discovered that this user had high privileges, allowing them to reconfigure the database server. This was used to execute commands directly on the operating system.</p>



<p><strong>4. Credential disclosure through fuzzing and directory listing:</strong> The HP Web Jetadmin service version 10.5.114213 (10.5 SR1) was detected on port 8085/tcp. As a result of the fuzzing tools (wfuzz), unsecure access to the log directory was detected. By enabling the Directory listing option, it was possible to quickly identify resources in a given path and proceed directly to further analysis and attacks on subsequent resources.</p>



<p>5<strong>. RCE &#8211; Java DebugWireProtocol (JDWP)</strong>: Java DebugWireProtocol (JDWP) is a protocol used for communication between the debugger and the Java virtual machine. It does not use any authentication and can be exploited to execute remote commands (Remote Code Execution, RCE).</p>



<p><strong>6. Cross-Site Scripting (XSS):</strong> By sending a POST request to https://[redacted]/4ses/servlet/</p>



<p>MainServlet?wbts:page=core.search.results.list, it was possible to inject JavaScript code into the search_text parameter. The lack of server-side validation caused the injected code returned in the HTTP response to be executed by the victim&#8217;s browser (Reflected XSS).</p>



<p><strong>7. Sensitive data was included in the application logs.</strong></p>



<p><strong>8. DEBUG mode was enabled in the production application.</strong></p>



<p>To properly protect an organization against incidents related to supply chain attacks (depending on the type of cooperation between entities), appropriate security measures may include:</p>



<p>● Risk assessment – a process aimed at identifying, assessing, and managing risks in the existing supply chain, as well as its new/potential connections;</p>



<p>● Regular audits and inspections – tasks confirming or denying the supplier&#8217;s ability to safely perform contractual activities;</p>



<p>● Controlling necessary authorizations – an activity involving regular verification of granted resource authorizations, solely on the basis of the so-called Least Privilege;</p>



<p>● Business continuity planning – developing business continuity plans and mitigating the effects of an incident should it occur;</p>



<p>● Data encryption – encrypting data during transmission and storage to ensure its proper security;</p>



<p>● Continuous monitoring – the use of threat and incident monitoring and reporting systems to ensure prompt action;</p>



<p>● Selection of suppliers who meet standards, such as those developed by the International Organization for Standardization (ISO).</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/csirt-gov-poland-computer-security-incident-response-team-recently-published-a-very-interesting-and-insightful-report-on-the-state-of-cybersecurity-in-poland-in-2024/">CSIRT GOV Poland – Computer Security Incident Response Team recently published a very interesting and insightful report on the state of cybersecurity in Poland in 2024.</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/csirt-gov-poland-computer-security-incident-response-team-recently-published-a-very-interesting-and-insightful-report-on-the-state-of-cybersecurity-in-poland-in-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Communication and contact between international companies and Polish Agencies regarding regulatory matters in Poland only via electronic means</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/communication-and-contact-between-international-companies-and-polish-agencies-regarding-regulatory-matters-in-poland-only-via-electronic-means/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/communication-and-contact-between-international-companies-and-polish-agencies-regarding-regulatory-matters-in-poland-only-via-electronic-means/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 19:43:12 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[electronic means]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish Agencies]]></category>
		<category><![CDATA[Polish law]]></category>
		<category><![CDATA[regulatory matters in Poland]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8213</guid>

					<description><![CDATA[<p>Publication date: August 20, 2025 Traditionally, Polish administrative procedures guaranteed the ability to communicate with the public authorities through conventional and traditional channels, i.e., in writing or in person. However, Poland has recently made a significant technological leap in the way businesses communicate with regulatory authorities. After January 1, 2025, in accordance with applicable regulations, [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/communication-and-contact-between-international-companies-and-polish-agencies-regarding-regulatory-matters-in-poland-only-via-electronic-means/">Communication and contact between international companies and Polish Agencies regarding regulatory matters in Poland only via electronic means</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: August 20, 2025</mark></strong></p>



<p>Traditionally, Polish administrative procedures guaranteed the ability to communicate with the public authorities through conventional and traditional channels, i.e., in writing or in person. However, Poland has recently made a significant technological leap in the way businesses communicate with regulatory authorities. After January 1, 2025, in accordance with applicable regulations, this communication relies largely on electronic communication – both with the central government administration, central offices, and institutions regulating the modern technology, industrial, financial, pharmaceutical, energy, and, above all, TMT sectors.</p>



<h2 class="wp-block-heading">Act on Electronic Delivery</h2>



<span id="more-8213"></span>



<p>The legal basis is the Electronic Delivery Act, which introduces two delivery methods: a public registered electronic delivery service and a public hybrid service. In practice, this means that deliveries are made exclusively electronically – to a designated electronic delivery address, which is linked to an IT system enabling electronic communication, particularly via email (Article 2, point 1 of the Act on Providing Services by Electronic Means). According to Article 5, a public entity may deliver correspondence requiring confirmation of sending or receipt using a public hybrid service if delivery to an electronic delivery address is not possible in accordance with Article 4, or if it is known that the individual holding such an address has been deprived of liberty. The delivery box allows for sending, receiving, and storing documents in accordance with the Trust Services and Electronic Identification Act. These regulations do not apply to correspondence containing classified information.</p>



<h2 class="wp-block-heading">Example of the recent case handled by KIELTYKA GLADKOWSKI KG Legal</h2>



<p>In one of the cases conducted by KIELTYKA GLADKOWSKI, the essence of which was the proceedings arising from the cybersecurity regulations, the core problem was a situation interfering with the economic freedom of the supplier and creator of a trading platform operating on the FOREX market, including the CFD market, covering derivative securities, including instruments corresponding to Polish subscription warrants for shares, classic securities, and speculative assets of the crypto market. In this case, communication with the Office of Electronic Communications took place separately from that with the CERT Polska – NASK CSIRT Team (Computer Security Incident Response Team), operating within the Scientific and Academic Computer Network – National Research Institute NASK. In practice, in accordance with new regulations, in particular the Act on the National Cybersecurity System implementing Directive (EU) 2016/1138 (NIS 1) and Directive (EU) 2022/2555 (NIS 2), it is only possible to file a case electronically. Communication by other means remains unresolved. Furthermore, the Act on Combating Abuse in Electronic Communications, implementing the European Electronic Communications Code, also reinforces the importance of the exclusive electronic channel as the applicable standard in relations with public offices. Importantly, electronic confirmations of sending and receipt of letters – issued by the operator of the public registered electronic delivery service – have the status of proof of delivery within the meaning of Article 40 of the Act on Electronic Delivery. Such a document is secured with the electronic seal of the trust service provider.</p>



<h2 class="wp-block-heading">ePUAP</h2>



<p>The Electronic Platform of Public Administration Services (ePUAP) is a nationwide IT platform used to facilitate communication between citizens and public administration in a uniform manner, in accordance with the Act on the Computerization of Entities Performing Public Tasks (Article 19a). This system allows for many official matters to be handled online. However, a trusted profile can only be created by an individual with a PESEL number and full or limited legal capacity (Article 20c of the Act on the Computerization of Entities Performing Public Tasks). Therefore, creating a trusted profile directly for a company is not possible. However, an individual can set up an ePUAP mailbox for an organization and act on its behalf. It is also possible to grant power of attorney to other individuals, such as partners, to use the mailbox. Under the amendment to the Electronic Delivery Act (Article 147), delivery of correspondence sent by an individual or non-public entity that uses an ePUAP account to a public entity with an electronic mailbox in ePUAP, as part of the service provided by ePUAP, is legally equivalent to delivery using the public registered electronic delivery service until December 31, 2025. Similarly, delivery of correspondence by a public entity with an electronic mailbox in ePUAP to an individual or non-public entity, if the correspondence is a response to an application or request submitted through ePUAP, or if that individual or entity requested delivery to an ePUAP account, will also have the same legal effects as delivery using the public registered electronic delivery service until the end of 2025.</p>



<h2 class="wp-block-heading">e-Delivery</h2>



<p>e-Delivery, in turn, is a registered electronic delivery service, based on Regulation (EU) 910/2014 eIDAS and the Electronic Delivery Act. It enables the exchange of official correspondence in a manner equivalent to registered mail with acknowledgment of receipt. The e-Delivery address becomes the official communication channel between companies and the administration. From January 1, 2025, offices will exclusively use this system (Article 155, Section 11 of the Electronic Delivery Act). The obligation to have an e-Delivery address applies to entrepreneurs registered in the CEIDG and the National Court Register, regardless of their legal form (this includes general partnerships, joint-stock companies, cooperatives, foundations, etc.). The obligation to use e-Delivery also applies to members of professions of public trust, such as attorneys, legal counselors, tax advisors, patent attorneys, restructuring advisors, and notaries (Article 9, Section 1 of the Electronic Delivery Act). During the transitional period until the end of 2025, a public entity will forward correspondence to a non-public entity at the electronic delivery address – if such an address has been provided. Otherwise, traditional delivery remains permissible. However, from 2026, e-Delivery will become the only permissible channel for all entities subject to the obligation, and from 2029 – also for courts, bailiffs, and prosecutors&#8217; offices.</p>



<h2 class="wp-block-heading">Summary</h2>



<p>The new regulations on electronic delivery clearly establish electronic communication as the primary and often exclusive means of contact with public administration. Each office publishes both its electronic delivery address and ePUAP mailbox in the Public Information Bulletin. Failure to have an active e-Delivery address or failure to submit a document electronically when required will result in the case being left unprocessed. This means that businesses and their representatives must not only implement appropriate technical solutions but also ensure the ongoing operation of electronic delivery mailboxes, in accordance with the rigors of laws and implementing regulations. Digitizing delivery is no longer a matter of choice, but a statutory obligation.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/communication-and-contact-between-international-companies-and-polish-agencies-regarding-regulatory-matters-in-poland-only-via-electronic-means/">Communication and contact between international companies and Polish Agencies regarding regulatory matters in Poland only via electronic means</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/communication-and-contact-between-international-companies-and-polish-agencies-regarding-regulatory-matters-in-poland-only-via-electronic-means/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Valuation of company shares &#8211; analysis from the economic point of view</title>
		<link>https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/valuation-of-company-shares-analysis-from-the-economic-point-of-view/</link>
					<comments>https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/valuation-of-company-shares-analysis-from-the-economic-point-of-view/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 19:16:22 +0000</pubDate>
				<category><![CDATA[INVESTMENT LAW AND PROCESSES IN POLAND]]></category>
		<category><![CDATA[Asset valuation]]></category>
		<category><![CDATA[cross border cases]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[law firm in Cracow]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<category><![CDATA[Valuation of company shares]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8198</guid>

					<description><![CDATA[<p>Publication date: August 20, 2025 In this article attention will be paid to the valuation of the company&#8217;s shares: When is a stock valued at the day&#8217;s price? When is a stock valued at its mid-year average price? The topic will be analyzed from an economic perspective. Additionally, these aspects will include situations in which [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/valuation-of-company-shares-analysis-from-the-economic-point-of-view/">Valuation of company shares &#8211; analysis from the economic point of view</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: August 20, 2025</mark></strong></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="605" height="153" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-11.png" alt="" class="wp-image-8211" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-11.png 605w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-11-300x76.png 300w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>


<div class="wp-block-image">
<figure class="alignleft size-full is-resized"><img loading="lazy" decoding="async" width="527" height="300" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-10.png" alt="" class="wp-image-8210" style="width:343px;height:auto" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-10.png 527w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-10-300x171.png 300w" sizes="auto, (max-width: 527px) 100vw, 527px" /></figure></div>


<p>In this article attention will be paid to the valuation of the company&#8217;s shares:</p>



<p>When is a stock valued at the day&#8217;s price?</p>



<p>When is a stock valued at its mid-year average price?</p>





<p>The topic will be analyzed from an economic perspective. Additionally, these aspects will include situations in which one of the previously mentioned valuations is used and why it works well in those situations.</p>





<h2 class="wp-block-heading"><strong>Stock Valuation </strong></h2>



<p class="has-luminous-vivid-amber-background-color has-background">Stock valuation is a key process for investors, allowing them to assess investment risk and helping them decide whether to buy or sell a stock. There are several stock valuation methods that provide information about whether a company is undervalued or overvalued.</p>



<span id="more-8198"></span>



<p><strong>The most popular share valuation methods:</strong></p>



<p><strong>1. The accounting method (net asset value) </strong>estimates the value of a company&#8217;s assets after subtracting liabilities, and divides the result by the number of shares outstanding. This method does not take into account future growth prospects and is therefore rarely used.</p>



<p><strong>2. Liquidation method </strong>– assesses the value of a company’s assets in the event of its liquidation, i.e. the sale of all assets after paying off liabilities.</p>



<p><strong>3. Multiples (comparative) method </strong>– this method relies on valuing the company relative to other companies in the same sector. Ratios such as price/earnings and price/book value are key here.</p>



<p><strong>4. The DCF method </strong>assumes that the value of a company is equal to the sum of discounted future cash flows. This model is more complex, taking into account all relevant economic variables.</p>



<p><strong>Intrinsic value of shares</strong></p>



<p>If the IVA is higher than the market price, the stock is undervalued, suggesting a buy. If it is lower, the stock is overvalued, suggesting a sell.</p>



<p><strong>Company valuation</strong></p>



<p>A company valuation is necessary in many situations, such as during a sale, merger, creditworthiness assessment, or liquidation. Three main categories of valuation methods are used: asset-based, income-based, and comparable. Each method can be selected depending on the company&#8217;s business activity and economic conditions. Among the asset-based methods are the adjusted net asset method and the liquidation value method, which are particularly useful in the event of a company liquidation.</p>



<p>In summary, stock valuation is an important tool for investors to help them assess the true value of a company and make informed investment decisions.</p>



<p>Assets and liabilities are valued at least once per balance sheet date in accordance with the Accounting Act. Valuation methods depend on the type of assets and liabilities.</p>



<p><strong>Asset valuation principles:</strong></p>



<ul class="wp-block-list">
<li><strong>Fixed assets and intangible assets</strong>: are valued at acquisition price or production cost, less depreciation and impairment losses.</li>



<li><strong>Real estate and intangible assets classified as investments</strong>: valued according to the principles relating to fixed assets or at market value.</li>



<li><strong>Fixed assets under construction</strong>: the valuation includes costs related to acquisition or production, taking into account write-offs for permanent impairment.</li>



<li><strong>Long-term shares and investments</strong>: valued at cost, adjusted for impairment losses or fair value.</li>



<li><strong>Short-term investments</strong>: valued at market value or cost, whichever is lower.</li>



<li><strong>Material current assets</strong>: at acquisition price or production cost, which cannot be higher than their net selling price.</li>



<li><strong>Receivables and loans granted</strong>: are valued at the amount due, in accordance with the prudence principle.</li>
</ul>



<p><strong>Principles of valuation of liabilities:</strong></p>



<ul class="wp-block-list">
<li><strong>Liabilities</strong>: are valued at the amount due, unless they are financial liabilities that can be valued at market value.</li>



<li><strong>Reserves</strong>: are valued at a reliably estimated value.</li>



<li><strong>Equity</strong>: valued at nominal value.</li>
</ul>



<p>Additionally, assets and liabilities denominated in foreign currencies are valued at the average NBP exchange rate as at the balance sheet date.</p>



<p>If an entity is unable to continue as a going concern, assets are valued at their net realisable prices and a provision is made for potential losses associated with the liquidation of the business.</p>



<p>Stock valuation involves determining a stock&#8217;s value to identify which stocks are undervalued (to buy) or overvalued (to sell). There are several main valuation methods:</p>



<p><strong>1. Income Methods</strong>: These rely on the company&#8217;s future earnings and project future cash flows to assess the value of a stock.</p>



<p><strong>2. Cost and asset-based methods</strong>: These take into account the company&#8217;s assets, value of assets and liabilities to determine the value of shares.</p>



<p><strong>3. Mixed methods</strong>: They combine different approaches, taking into account both the value of the assets and future income.</p>



<p>The key concept is <strong>the stock&#8217;s intrinsic value (IVA)</strong>, which may differ from the market price due to market imperfections. Stocks are:</p>



<ul class="wp-block-list">
<li><strong>Undervalued </strong>(market price is lower than PAH) – worth buying.</li>



<li><strong>Overvalued </strong>(market price is higher than PAH) – worth selling.</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="527" height="300" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image.png" alt="" class="wp-image-8199" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image.png 527w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-300x171.png 300w" sizes="auto, (max-width: 527px) 100vw, 527px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Stock valuation boils down to determining the value of a company, also known as <strong>its intrinsic value</strong>. The value of a single share is obtained by dividing the value of the company by the number of shares outstanding. For new share issues, the arithmetic or weighted average of the number of shares outstanding at the beginning and end of the reporting period is used.</p>



<p>The basis for company valuation is to take into account two values:</p>



<p><strong>1. Company assets</strong>.</p>



<p><strong>2. The company&#8217;s ability to generate future profits </strong>(goodwill).</p>



<p>Business valuation methods are divided into four groups:</p>



<p><strong>1. Income methods </strong>– based on forecasting the company’s future income, updated as of the valuation date.</p>



<p><strong>2. Cost- and asset-based methods </strong>– focus on valuing a company’s assets.</p>



<p><strong>3. Comparative methods </strong>– based on market values of equity and debt.</p>



<p><strong>4. Mixed methods </strong>– combine elements of the income and asset approaches.</p>



<p><strong>Income-based valuation methods </strong>are based on forecasting the financial benefits a company can generate for its owner. Key steps include determining the company&#8217;s ability to generate income and forecasting this income in the future. These valuation methods include the <strong>discounted cash flow method </strong>, future earnings valuation, and dividend-based methods.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="605" height="153" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-1.png" alt="" class="wp-image-8200" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-1.png 605w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-1-300x76.png 300w" sizes="auto, (max-width: 605px) 100vw, 605px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Where:</p>



<ul class="wp-block-list">
<li>W <sub>D </sub>&#8211; income value of the enterprise being valued</li>



<li>W <sub>P </sub>&#8211; capital inflows in the nature of returns to investors</li>



<li>W <sub>W </sub>&#8211; capital expenditure of investors for the enterprise</li>



<li>D <sub>D </sub>&#8211; dividends</li>



<li>D <sub>I </sub>&#8211; other income of investors related to owning the enterprise</li>



<li>q &#8211; discount factor</li>



<li>t &#8211; years</li>
</ul>



<p>The formula presented above is considered the only true one, although its practical implementation is unlikely. Therefore, solutions are used to simplify the general value formula.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="613" height="203" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-2.png" alt="" class="wp-image-8201" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-2.png 613w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-2-300x99.png 300w" sizes="auto, (max-width: 613px) 100vw, 613px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Where:</p>



<ul class="wp-block-list">
<li>P &#8211; value of an ordinary share</li>



<li>C <sub>t </sub>&#8211; income from owning shares obtained in the t-th period</li>



<li>r &#8211; required rate of return of the investor</li>



<li>n &#8211; number of share holding periods</li>
</ul>



<p>Income from owning common stock comes from two sources:</p>



<ul class="wp-block-list">
<li>changes in the share price during the investment period</li>



<li>dividends (or other income, e.g. from subscription rights) obtained during the investment period</li>
</ul>



<p>The disadvantage of this model is the difficulty of estimating future changes in the dividend and share price on the stock exchange.</p>



<p>In the case of an investor holding shares indefinitely, the formula becomes:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="604" height="586" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-3.png" alt="" class="wp-image-8202" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-3.png 604w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-3-300x291.png 300w" sizes="auto, (max-width: 604px) 100vw, 604px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>The dividend growth rate is crucial for stock valuation using the discounted dividend model. In practice, the Gordon-Shapiro model is most commonly used. In addition to estimating the required rate of return, there is also the issue of determining the dividend growth rate, denoted by g. Typically, past data is used and the formula: g = r <sub>t </sub>r <sub>e </sub>,</p>



<p>Where:</p>



<ul class="wp-block-list">
<li>r <sub>t </sub>&#8211; retention ratio calculated as the share of retained earnings in the company&#8217;s total profit</li>



<li>r <sub>e </sub>&#8211; rate of return on retained earnings, determined e.g. by the <a href="https://bossa.pl/edukacja/slownik/return-equity">ROE </a>(Return On Equity) ratio</li>
</ul>



<p>The discounted dividend model, presented in formula (III), does not account for the fact that the value of a dividend received in the distant future is more uncertain than the value of a dividend received in the near future. This fact should be reflected in the stock valuation model.</p>



<p>One indirect way to account for this fact is to assume that the required rate of return is not constant but increases over time. This will cause the value of the dividend in subsequent periods to be reduced even more than would be implied by the time value of money at a constant interest rate. This reduction reflects uncertainty. The result is a model (called Gordon&#8217;s &#8220;bird in the hand&#8221; model ) , which is a generalization of the discounted dividend model:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="569" height="170" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-4.png" alt="" class="wp-image-8203" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-4.png 569w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-4-300x90.png 300w" sizes="auto, (max-width: 569px) 100vw, 569px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>The discounted cash flow (DCF) method is one of the most popular business valuation methods, which is based on the future cash flows generated by the company. Cash flow (Cash flows reflect the cash flows between the company and its environment (suppliers, customers, employees), excluding owners. If these cash flows are positive, they can be reinvested or paid out as dividends; negative cash flows require the use of reserves, which leads to a decrease in the company&#8217;s assets.</p>



<p>The DCF method assumes that a company&#8217;s value is equal to the sum of future, discounted cash flows available to equity holders. It comprises free operating cash flow (FOCF) and non-operating free cash flow (NCF), which together constitute free cash flow (FCF). Non-operating assets and residual value are added to this, leading to an estimate of the company&#8217;s gross value. After subtracting the market value of debt, we obtain net value, or the intrinsic value of equity.</p>



<p>One of the key elements of the DCF method is the discount rate, which is most often determined based on the weighted average cost of capital (WACC). Cash flows are forecasted for several years, after which a residual value is calculated, which takes into account the company&#8217;s future earnings after the forecast period ends.</p>



<p>Although the DCF method is widely used in business valuation, including during mergers and acquisitions, it has its drawbacks. Forecasting future cash flows and adopting an appropriate discount rate can be difficult and risky.</p>



<p>Fundamental analysis also uses other metrics, such as P/E ( price -to- earnings ratio), P/BV, P/S, P/CF, and D/S. These metrics help investors evaluate a company in comparison to its competitors and market trends.</p>



<p>Approaches such as EVA (Economic Value Added), which measures residual income after covering all costs of capital, and SVA (Shareholder Value Added), which focuses on the added value for shareholders resulting from investments exceeding the cost of capital, are also used to value companies.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="474" height="344" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-6.png" alt="" class="wp-image-8205" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-6.png 474w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-6-300x218.png 300w" sizes="auto, (max-width: 474px) 100vw, 474px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="487" height="272" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-5.png" alt="" class="wp-image-8204" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-5.png 487w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-5-300x168.png 300w" sizes="auto, (max-width: 487px) 100vw, 487px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Cost-based and asset-based methods, the oldest in the history of valuation, rely on assessing the value of a company&#8217;s assets, i.e., its assets less liabilities. This value is referred to as the company&#8217;s net asset value. These methods focus on analyzing net assets, i.e., the difference between total assets and debt.</p>



<p>The most important methods in this group include:</p>



<ol class="wp-block-list">
<li><strong>The balance sheet net asset valuation method </strong>measures equity based on the balance sheet, as the difference between assets and liabilities. This value often underestimates the true market value of a company, particularly its ability to generate profits. The market value of intangible assets, such as patents, licenses, or trademarks, can differ significantly from their book value.</li>



<li><strong>The adjusted net asset method </strong>is a more advanced version of the balance sheet method. Here, the net asset value is adjusted for items whose balance sheet value requires updating. This takes into account, for example, differences between the book and market values of fixed and current assets.</li>
</ol>



<p>These methods, despite their simplicity, often do not reflect the full market value of a company, especially in the context of its ability to generate future profits.</p>



<p><img loading="lazy" decoding="async" width="305" height="44" src="blob:https://www.kg-legal.eu/28043cbb-f4c8-4144-9161-1b5f52d5baab"><br>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Where:</p>



<ul class="wp-block-list">
<li>W <sub>P </sub>&#8211; company value</li>



<li>A &#8211; carrying amount of assets (property components)</li>



<li>K <sub>A </sub>&#8211; adjustment to the carrying amount of assets</li>



<li>P <sub>O </sub>&#8211; external liabilities (carrying amount of external liabilities)</li>



<li>K <sub>Po </sub>&#8211; adjustment of the carrying amount of external liabilities</li>
</ul>



<ul class="wp-block-list">
<li><strong>The replacement method </strong>&#8211; informs about the amount of expenditure that must be incurred to recreate the existing potential in a given company.</li>
</ul>



<p>The value of an enterprise using this method is calculated based on the formula:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="269" height="63" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-9.png" alt="" class="wp-image-8208"/></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Where:</p>



<ul class="wp-block-list">
<li>Wp &#8211; enterprise value,</li>



<li>W <sub>A </sub>&#8211; carrying amount of assets,</li>



<li>△ <sub>C </sub>&#8211; the difference between the amount of expenditure that must be incurred to create a new material potential and the balance sheet value of the assets,</li>



<li>U <sub>M </sub>&#8211; degree of technical wear and tear expressed by the degree of depreciation of assets.</li>



<li><strong>Liquidation method </strong>&#8211; allows us to answer the question of what net proceeds the company&#8217;s owners would have achieved if they had decided to liquidate it at the time of valuation.</li>
</ul>



<p>In this method, the value of the company is calculated according to the following formula:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="236" height="44" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-7.png" alt="" class="wp-image-8206"/></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Where:</p>



<ul class="wp-block-list">
<li>W <sub>p </sub>&#8211; enterprise value,</li>



<li>W <sub>LA </sub>&#8211; liquidation value of assets (the sum of funds that can be obtained from the sale of individual assets),</li>



<li>Z &#8211; balance sheet monetary liabilities to be repaid,</li>



<li>K <sub>L </sub>&#8211; liquidation costs.</li>
</ul>



<p>The method of valuing a company based on its asset value involves several difficulties:</p>



<ol class="wp-block-list">
<li><strong>Valuation of assets</strong>, especially intangible assets, is complicated.</li>



<li><strong>The approach of treating a company as the sum of its components </strong>ignores the connections between them, which can lead to an incomplete assessment of value.</li>



<li><strong>Focusing on asset replacement costs</strong>, rather than potential benefits, limits the valuation perspective.</li>
</ol>



<p><strong>Mixed methods </strong>combine asset and income approaches, assuming that the value of a company depends on both its assets and its ability to generate income.</p>



<p>The general concept of this relationship is expressed by the formula:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="305" height="89" src="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-8.png" alt="" class="wp-image-8207" srcset="https://www.kg-legal.eu/wp-content/uploads/2025/08/image-8.png 305w, https://www.kg-legal.eu/wp-content/uploads/2025/08/image-8-300x88.png 300w" sizes="auto, (max-width: 305px) 100vw, 305px" /></figure>



<p>Source: <a href="https://bossa.pl/edukacja/analiza-fundamentalna/metody-wyceny">Valuation Methods | Brokerage House of Bank Ochrony Środowiska (bossa.pl)</a></p>



<p>Where:</p>



<ul class="wp-block-list">
<li>W &#8211; enterprise value</li>



<li>W <sup>M </sup>&#8211; property value</li>



<li>Z &#8211; standardized annual profit</li>



<li>r &#8211; capitalization rate</li>



<li>a &#8211; weight factor</li>
</ul>



<p>The most well-known <strong>mixed methods </strong>are:</p>



<ol class="wp-block-list">
<li><strong>Average value method </strong>– combines the asset and income approaches to obtain the average value of the company.</li>



<li><strong>Additional profit methods </strong>– these include, among others, the year&#8217;s method purchase, Stuttgart and UEC, which are based on the additional profit of the company.</li>



<li><strong>Methods of valuing unprofitable companies </strong>– such as the Schnettler method and methods taking into account badwill, which refer to companies generating losses.</li>
</ol>



<p>Choosing the right method depends on several key factors:</p>



<ul class="wp-block-list">
<li>purpose and function of valuation,</li>



<li>perspectives of the valuation entity,</li>



<li>the economic situation of the enterprise,</li>



<li>socio-economic conditions in the region where the company operates.</li>
</ul>



<p>Stock valuation is crucial for investors to assess whether a stock is expensive or cheap. Stock analysts use various methods to perform this valuation and create recommendations, such as &#8220;buy&#8221; or &#8220;sell.&#8221; The main valuation approaches are income, comparative, and asset-based.</p>



<p><strong>Income-based valuation methods </strong>focus on assessing a company&#8217;s future financial health, assuming that its value depends on future cash flows. Analysts forecast future earnings, revenues, and dividends, which allows them to estimate the stock&#8217;s value. The more accurate the forecasts, the more reliable the valuation. An example is the future dividend valuation method, which is based on the value of dividends the company will pay to investors.</p>



<p><strong>Comparative methods </strong>involve analyzing ratios such as price to earnings per share (P/E) or price to book value (P/BV). These ratios are compared to other companies in the same industry, allowing us to determine how a given company&#8217;s stock compares to its competitors. Choosing the right companies for comparison is crucial, as discrepancies can distort valuation results.</p>



<p><strong>Asset-based valuation methods </strong>are based on valuing a company&#8217;s assets less liabilities. This is the simplest approach, although it has been criticized for failing to consider the company&#8217;s ability to generate future profits. In some cases, a liquidation valuation is used, which estimates how much money shareholders would receive in the event of a company liquidation.</p>



<p>When analyzing stock valuations, it&#8217;s worth considering not only analyst recommendations but also carefully examining the company&#8217;s development plans and forecasts for the industry it operates in. This will help you better understand investment prospects.</p>



<p>When it comes to valuing shares on the balance sheet date, an entity that has not adopted micro status is entitled to more flexible asset valuation methods. According to the Accounting Act, micro entities must value their assets and liabilities at historical values, i.e., at purchase price, which excludes the possibility of using market value. To achieve micro status, an entity would have to decide to prepare simplified financial statements.</p>



<p>Since the entity in question did not opt for simplifications, it has the option of valuing shares classified as long-term assets in accordance with Article 28, Section 1, Item 3 of the Act. This means that financial assets should be valued at purchase price, with the option of revaluing to market value. If the value of the shares increases, this difference can increase the revaluation reserve, whereas if the value decreases, the effects of this action will have to be recorded as financial costs.</p>



<p>This approach allows an entity to adjust its share valuation to current market prices, which facilitates a more accurate representation of asset values in financial statements. This is crucial for making informed investment decisions based on realistic data about the value of shares held.</p>



<p>Valuing shares on the balance sheet date is a complex process that depends on their classification as short-term or long-term financial assets. For both categories, in accordance with the Accounting Act, shares are valued at purchase price less impairment losses or at fair value, which translates to market valuation.</p>



<p>Shares are issued by joint-stock companies and provide investors with property rights (e.g., the right to dividends) and non-property rights (e.g., the right to vote at the general meeting). The Act defines investments as assets acquired for the purpose of achieving economic benefits, which includes both appreciation in value and dividend income. Shares qualified for investment are classified according to their intended holding period: short-term (sale within 12 months) or long-term (sale after that period).</p>



<p>Pursuant to Article 28, Section 1, Item 3 of the Accounting Act, shares should be valued at cost or fair value no less frequently than on the balance sheet date. Costs associated with the purchase of shares, such as brokerage commissions, are included in the purchase price, while other costs, such as investment analyses, are classified as operating expenses.</p>



<p>If the value of shares changes, a revaluation must be performed on the balance sheet date. An increase in the value of shares to the market price increases the revaluation reserve, while a decrease in value reduces this reserve if the difference has not been previously settled. Otherwise, the effects of the decrease in value are recognized as financial expenses.</p>



<p>The examples illustrate the valuation principles. In the first case, the company holds shares with a market value below the acquisition price; the valuation effects are recognized as write-downs. In the second case, when the market value of the shares increases, the valuation effects are recognized as financial income.</p>



<p>The classification of shares as short-term or long-term financial assets influences their valuation. Entities that cannot or do not wish to apply detailed valuation principles can use the general provisions of the Accounting Act, which is advantageous for small entities.</p>



<p>Selling or buying a company is a process that requires precise decisions based on reliable data.</p>



<p><strong>The Importance of Company Valuation</strong></p>



<p>Company valuation is crucial in the context of purchases, sales, mergers, acquisitions, and tax procedures. This process includes analysis of the company&#8217;s financial condition, sector potential, customer structure, resources, and growth opportunities. A professional valuation increases the chances of attracting buyers and allows for informed investment decisions.</p>



<p><strong>Valuation Methods</strong></p>



<ol class="wp-block-list">
<li><strong>Income Method (DCF)</strong>:<ol><li>It is based on future cash flows.</li></ol>
<ol class="wp-block-list">
<li>Considered one of the most reliable methods, it uses financial forecasts and analyzes the company&#8217;s risk.</li>
</ol>
</li>



<li><strong>Market-Transaction Method</strong>:
<ol class="wp-block-list">
<li>Compares the valued company with similar ones using market ratios (e.g. P/E, P/BV, EV/EBITDA).</li>
</ol>
</li>
</ol>



<p><strong>Valuation Process:</strong></p>



<ol class="wp-block-list">
<li><strong>Selecting the Valuation Objective</strong>:
<ol class="wp-block-list">
<li>Key to further proceedings and method selection.</li>
</ol>
</li>



<li><strong>Data Acquisition</strong>:
<ol class="wp-block-list">
<li>Collecting relevant information regarding the business model, finances and market environment.</li>
</ol>
</li>



<li><strong>Creating a Report</strong>:
<ol class="wp-block-list">
<li>It includes a detailed analysis and valuation, as well as answers to customer questions.</li>
</ol>
</li>
</ol>



<p><strong>DCF Valuation – Stages</strong></p>



<ul class="wp-block-list">
<li>Business model analysis.</li>



<li>Micro-environment and market research.</li>



<li>Preparation of a financial model.</li>



<li>Financial analysis and macroeconomic indicators.</li>



<li>Valuation summary and report preparation.</li>
</ul>



<p><strong>Valuation Report</strong></p>



<p>Contains:</p>



<ul class="wp-block-list">
<li>Valuation assumptions.</li>



<li>Methodology.</li>



<li>Key company data.</li>



<li>Detailed financial analyses.</li>



<li>Estimated value of the company and justification.</li>
</ul>



<p>For a proper valuation, there need to be considered the following aspects:</p>



<ul class="wp-block-list">
<li>Do they have extensive experience in transaction advisory?</li>



<li>Is it possible to adapt activities to individual needs?</li>



<li>High quality and reliable valuations &#8211; what exactly does it look like?</li>



<li>Identification of risks related to transactions – whether they are identified, and even more so whether the detection is carried out reliably.</li>
</ul>



<p>Valuing a company&#8217;s shares based on the daily price and the six-month average is a key consideration in investment analysis and speculation. Each of these valuation methods has different applications and implications for investment decisions.</p>



<p>The spot price is the current market price of a stock, which reflects current market sentiment and reaction to news. Investors who follow the spot price typically have a more short-term perspective. This valuation method is preferred in situations where a dynamic response to market changes is important, such as during a day trading or short-term speculation.</p>



<p><strong><u>Daily price / current price:</u></strong></p>



<p>&#8211; It reflects current market conditions such as company news, macroeconomic changes, political decisions, and speculation.</p>



<p>&#8211; It is more volatile and can be susceptible to manipulation in the short term, which is important in the context of speculation.</p>



<p>&#8211; Used in transactional valuation, i.e. when selling or buying shares, where the current price is important.</p>



<p><strong><u>Average price for half a year ( average Price ) </u></strong>is a method that smooths out short-term volatility and allows to take a longer-term view of a stock. It is a more conservative approach, often used in longer-term valuations, such as in financial reports or when assessing a company&#8217;s fundamental value.</p>



<p><strong><u>Half-year average:</u></strong></p>



<ul class="wp-block-list">
<li>It provides a broader market perspective, which means that investment decisions are based on more average data, which can reduce the risk of making decisions based on momentary price fluctuations.</li>



<li>Minimizes the impact of short-term anomalies, such as one-off events affecting the stock price (e.g., crises, quarterly results).</li>



<li>It may be a more stable indicator for long-term investors, pension funds or M&amp;A transaction valuations.</li>
</ul>



<p>Speculation and practical applications</p>



<p>From a speculator&#8217;s perspective, the choice between the daily price and the six-month average directly impacts investment strategy. Here are some examples:</p>



<ul class="wp-block-list">
<li>The daily price is ideal for short-term speculation, where investors try to capitalize on market volatility. Decisions based on this price are quick and responsive to current changes, increasing profit potential but also increasing risk.</li>



<li>The six-month average is more appropriate for long-term investments because it minimizes the risk of momentary price fluctuations. This method is often used by investors who want to avoid short-term volatility.</li>



<li>Speculators can manipulate the market based on the difference between the daily price and the six-month average. For example, they can push up or down stock prices for a short period of time, triggering reactions from investors who base their decisions on current prices.</li>
</ul>



<p>Arbitrage – Investors can profit from differences in stock valuations based on the divergence between the current market price and its historical average, a common strategy among hedge funds.</p>



<p><strong>When should a company&#8217;s shares be valued at the current price and when at the six-month average?</strong></p>



<p>Valuing a company&#8217;s shares is a key element of market analysis, and choosing the right method influences investment results and strategic decisions. In practice, we most often encounter two approaches: valuation at the daily price (known as the market price or current price) and valuation at the six-month average. Each of these methods has its specific applications, and the choice depends on the investment context and the desired goal.</p>



<p>Valuation of shares at the current price</p>



<p>The daily price, also known as the spot price, reflects the current market valuation of a stock at a given moment. It is the price at which shares are bought or sold during a trading session.</p>



<p>Applications:</p>



<ol class="wp-block-list">
<li>Short-term speculation:</li>



<li>Speculative investors often use the daily price because it is the most accurate and reflects the current state of the market.</li>



<li>Quick reaction to changes in stock prices allows speculators to take advantage of sudden price spikes to make profits.</li>



<li>Decisions based on current price are often correlated with technical analysis, trend indicators and market analysis tools.</li>



<li>Investment portfolio valuation:</li>



<li>In actively managed portfolios, where investors frequently trade, the daily price is the primary parameter for valuing assets. In such cases, quick adaptation to changing market conditions is crucial.</li>



<li>Settlement of stock exchange transactions:</li>



<li>For the settlement of purchase and sale transactions on the public market, the daily price is the basis for calculating the transaction value and commission.</li>
</ol>



<p>Disadvantages and risks:</p>



<ol style="list-style-type:upper-alpha" class="wp-block-list">
<li>High volatility: Daily prices are susceptible to changes due to speculation, investor sentiment, and macroeconomic events. This can lead to wild fluctuations, making long-term forecasting difficult.</li>



<li>Emotional decisions: Investors, observing current price movements, may make decisions influenced by emotions, which leads to incorrect investment steps.</li>
</ol>



<p>Share valuation at the half-year average</p>



<p>The six-month average price measures the average value of a stock over a specified period, which helps smooth out market volatility. This method is particularly useful for minimizing the impact of short-term market fluctuations on investment decisions.</p>



<p>Applications:</p>



<ol class="wp-block-list">
<li>Long-term investing:</li>



<li>For long-term investors, a valuation based on a six-month average provides a more stable picture of the company&#8217;s value, avoiding sudden fluctuations.</li>



<li>The average price allows to better assess a company&#8217;s fundamentals while avoiding short-term market disruptions such as sudden corrections, political events, or other factors that may temporarily impact prices.</li>



<li>Planning the company&#8217;s strategy:</li>



<li>For company management or financial advisors, average-based valuation is useful for long-term planning and growth analysis. It offers a more balanced approach, helping assess financial health without being influenced by short-term fluctuations.</li>



<li>Valuation of management options and bonuses:</li>



<li>When executives are compensated through stock options, the average price is fairer because it eliminates the element of speculation and is more reflective of the long-term success of the company.</li>
</ol>



<p>Disadvantages and risks:</p>



<ul class="wp-block-list">
<li>Limited response to changes: Using an average price can delay the response to dynamic market changes. This can lead to over- or underestimation during significant events, such as economic changes or mergers and acquisitions.</li>



<li>Averaging: A valuation based on the average can mask serious problems for a company if the market currently values it significantly lower. This approach does not always reflect market reality.</li>
</ul>



<p>Speculation and valuation – practical aspects</p>



<p>Choosing between the daily price and the six-month average price can also be a speculative strategy. Speculators, familiar with market dynamics, can use different valuation methods depending on their goals.</p>



<p>Short-term play: When a stock is trading at its current price, speculators may try to capitalize on short-term fluctuations, allowing them to make a quick profit at high risk.</p>



<p>Long-term speculation: Valuation at the six-month average can be used for more conservative speculation, where the investor hopes that the market price will return to the historical average.</p>



<p>Conclusions</p>



<p>Valuing stocks at the daily price and the six-month average are tools used in various investment contexts. The daily price is crucial for speculators and short-term investors, while the six-month average price is preferred for long-term investors, where stability is paramount. Choosing the right method depends on your investment goals, risk, and attitude toward market volatility.</p>



<p>Mark -to-market valuation of a company&#8217;s shares is a method of determining the value of assets (including shares) based on their current market price. This type of valuation has many applications in economics and finance, and the decision to use it depends on specific market conditions and the objectives of investors and fund managers.</p>



<p>Here are the main economic aspects to consider when analyzing the valuation of a stock at its current price:</p>



<ol class="wp-block-list">
<li>Transparency and ongoing market value assessment</li>
</ol>



<p>Daily price valuation provides the most up-to-date assessment of a company&#8217;s stock value. This is useful when:</p>



<ul class="wp-block-list">
<li>You want to know the exact value of your investment portfolio.</li>



<li>You follow current market changes, which may influence your decisions to buy or sell shares.</li>



<li>You analyze the current state of the market for management purposes, e.g. in investment funds or capital reserves.</li>
</ul>



<ul class="wp-block-list">
<li>Application in short-term investment strategies</li>
</ul>



<p>Daily price pricing is particularly important for speculators and short-term investors. It&#8217;s linked to dynamic share price movements, allowing for:</p>



<ul class="wp-block-list">
<li>Quick response to changing market conditions.</li>



<li>Using day trading, swing trading or other short-term investment techniques that require quick decision-making based on current prices.
<ul class="wp-block-list">
<li>High volatility and market risk</li>
</ul>
</li>
</ul>



<p>High market volatility means that stock prices can change rapidly, which impacts investment decisions. Investors who use the price of:</p>



<ul class="wp-block-list">
<li>They can better adapt their decisions to current changes and reduce the risk of losses resulting from sudden price drops.</li>



<li>However, they must be prepared to take higher risks arising from these fluctuations, which may lead to the need to monitor their investments more frequently.</li>
</ul>



<ul class="wp-block-list">
<li>Financial reporting and regulations</li>
</ul>



<p>Daily valuation is often required for asset valuations for financial reporting purposes, particularly by financial institutions such as investment funds and pension funds. Using this valuation method allows for:</p>



<ul class="wp-block-list">
<li>Better transparency for investors and regulators.</li>



<li>Real-time assessment of the true value of assets.</li>
</ul>



<ul class="wp-block-list">
<li>Comparison with long-term valuation (e.g. after a six-month average)</li>
</ul>



<p>For long-term investments, daily valuation may not be appropriate because:</p>



<ul class="wp-block-list">
<li>It can introduce large fluctuations in portfolio value over short periods that do not reflect long-term trends.</li>



<li>Long-term investors may prefer to value the stock at a six-month average, which helps mitigate the impact of short-term market movements and better reflect the company&#8217;s long-term potential.</li>
</ul>



<ul class="wp-block-list">
<li>Speculation and valuation stability</li>
</ul>



<p>For speculators looking to maximize profits in the short term, intraday pricing is more useful. It allows them to:</p>



<ul class="wp-block-list">
<li>Immediate response to market events, such as company financial results, macroeconomic or political changes.</li>



<li>But it also carries greater risk due to sudden, unpredictable price changes.</li>
</ul>



<p>In general, daily stock valuation is crucial when a current, market-based assessment of a stock&#8217;s value is needed. It is particularly useful for short-term investors and speculators who capitalize on dynamic market movements. However, its use also involves higher risk and greater volatility of asset values.</p>



<p>Examples of using daily price pricing can help illustrate how different approaches to this method impact investment decisions and portfolio management. Here are some specific examples from different markets and strategies:</p>



<ol class="wp-block-list">
<li>Short-term speculator in tech stocks</li>
</ol>



<p>Let&#8217;s assume an investor focuses on technology stocks such as Apple, Amazon, or Tesla, which are often characterized by high price volatility.</p>



<p>Example:</p>



<p>An investor buys Tesla stock on Monday morning at $240 per share. Later in the day, news breaks that Tesla is launching a new electric car model with revolutionary technology. Tesla&#8217;s share price jumps to $270 by market close.</p>



<p>By valuing the shares at the daily price, the investor can immediately estimate the profit:</p>



<p>Purchase price: $240</p>



<p>Closing Price: $270</p>



<p>Earnings per share: $30 ($270 &#8211; $240)</p>



<p>The investor decides to sell the stock at the end of the day, realizing an immediate profit. In this case, the daily price allowed him to react quickly to new information and realize a profit in the short term.</p>



<p>2. Investment fund monitoring portfolio daily</p>



<p>Investment funds, especially those managing highly liquid assets, often use overnight pricing to keep investors informed about the value of their portfolio.</p>



<p>Example:</p>



<p>The investment fund holds shares of several large companies from the S&amp;P 500 index, including Microsoft, Apple, Alphabet (Google), and Johnson &amp; Johnson. Following Apple&#8217;s quarterly earnings announcement, the company&#8217;s share price fell 5% overnight.</p>



<p>At the end of the day, the fund must mark -to-market all of its assets:</p>



<p>Apple shares fall from $190 to $180.</p>



<p>Microsoft shares rise from $300 to $305.</p>



<p>Other shares remain stable.</p>



<p>The fund&#8217;s management may inform its investors that the value of the portfolio has changed as a result of the decline in Apple prices, which may influence decisions on possible adjustments to the fund&#8217;s strategy.</p>



<p>3. Management of financial reserves by the company</p>



<p>For large companies that hold shares as part of their financial reserves, day-of valuation allows for accurate monitoring of the value of those reserves and for making management decisions.</p>



<p>Example:</p>



<p>The company has a $10 million investment in shares of energy company ExxonMobil . As a result of the changes in the oil market, ExxonMobil&#8217;s share price is down 3% on the day.</p>



<p>Portfolio value at the beginning of the day: $10 million</p>



<p>3% share price drop: $10 million * 0.03 = $300,000</p>



<p>End-of-day portfolio value: $9.7 million</p>



<p>Thanks to the day&#8217;s valuation, the company&#8217;s management knows that the value of the reserves has decreased by USD 300,000, which may prompt the company to decide to sell the shares or hedge against further declines, for example through derivatives.</p>



<p>4. Asset management in high volatility conditions</p>



<p>Investors who trade in highly volatile markets, such as cryptocurrency markets , often rely on day-of-the-day pricing.</p>



<p>Example:</p>



<p>An investor buys Bitcoin on Monday morning for $20,000. During the day, the price of Bitcoin rises to $22,000, but by the end of the day, it falls back to $19,500.</p>



<p>Purchase price: $20,000</p>



<p>Closing Price: $19,500</p>



<p>Loss per unit: $500 ($20,000 &#8211; $19,500)</p>



<p>An investor who values the price daily can decide whether to hold Bitcoin for an extended period (hoping for a trend reversal) or minimize losses and sell at closing. High volatility in the short term is a risk that investors must consider.</p>



<p>5. Regulations on the valuation of financial assets</p>



<p>Regulated pension and insurance funds often need to use spot pricing to provide current data on their investment portfolios to regulators.</p>



<p>Example:</p>



<p>The pension fund has 20% of its assets in healthcare stocks. Due to changes in drug reimbursement regulations, the share price of the pharmaceutical company Pfizer is falling 6% in a single day.</p>



<p>The fund must update its financial statements at the end of the day:</p>



<p>Pfizer stock value before the drop: $5 million</p>



<p>6% decrease: $5 million * 0.06 = $300,000</p>



<p>Value after probate: $4.7 million</p>



<p>In accordance with regulatory requirements, the fund must immediately update its reports and inform the supervisor of changes in the value of its assets.</p>



<p>Summary</p>



<p>In each of these examples, daily pricing enables rapid response to market changes. This is useful for portfolio management in volatile and speculative environments, as well as for asset monitoring by companies and funds that need to provide current information to investors and regulators.</p>



<p>Let&#8217;s look at each example in more detail, expanding on market mechanisms and practical implications.</p>



<p>1. Short-Term Tech Stock Speculator</p>



<p>Details:</p>



<p>Short-term speculators, also known as day traders operate in highly volatile markets, such as the technology sector. These types of investors rely on intraday price movements, reacting to news that can suddenly change the value of a stock. In the Tesla example above, the sudden announcement of a new car model with advanced technology triggered a rapid increase in demand for the company&#8217;s shares.</p>



<p>Economic explanation:</p>



<p>Short-term market valuations: In this situation, the stock price is directly influenced by newly emerging information and the immediate market reaction. Investors try to predict how a given event will affect the company&#8217;s future earnings and, consequently, the value of its shares.</p>



<p>Market psychology: Short-term speculators often use technical analysis tools (charts, indicators) to track trend direction. When Tesla announces a new product, the price increases are linked to expectations of increased sales and profitability for the company.</p>



<p>Timing: Daily pricing is key because the investor needs to know the exact value of their assets in real time to decide when to sell the shares and take a profit.</p>



<p>2. Investment fund monitoring portfolio daily</p>



<p>Details:</p>



<p>Investment funds that manage stock portfolios for individual and institutional investors must report the value of their portfolios on an ongoing basis. If a fund holds a variety of stocks, such as Microsoft, Apple, or Alphabet, earnings announcements can trigger changes in their valuations.</p>



<p>Economic explanation:</p>



<p>Mark-to-market: Investment funds must value their assets based on current market prices. This regulatory requirement allows investors to track the fund&#8217;s value on an ongoing basis. In the event of price volatility resulting from quarterly earnings releases, as in the Apple example, the value of the fund&#8217;s portfolio can change significantly.</p>



<p>Risk management: Changes in the value of individual company shares require portfolio managers to make decisions about whether to sell, buy, or rebalance their portfolio to minimize losses or maximize gains.</p>



<p>Investor Communication: Investors in mutual funds are kept up-to-date on the value of their shares. If the price of a stock, such as Apple, falls by 5%, fund managers must provide investors with information about the decline in the value of their shares, which may influence investors&#8217; decisions about whether to continue investing in the fund.</p>



<p>3. Management of financial reserves by the company</p>



<p>Details:</p>



<p>Companies often hold investment portfolios as part of their financial reserves. By investing excess capital in stocks or other financial instruments, the company must monitor the value of these investments in real time to make appropriate financial decisions.</p>



<p>Economic explanation:</p>



<p>Liquidity Control: For large companies, the value of their investment portfolio directly impacts their cash flow and operating reserves. A 3% decline in ExxonMobil&#8217;s stock price reduces the value of their reserves, which can impact their ability to invest in other projects or meet current liabilities.</p>



<p>Diversification Strategy: Companies often diversify their portfolios by investing in different sectors (energy, technology, healthcare, etc.) to minimize the risk of a single sector declining in value. However, daily valuation provides them with a picture of how price changes in one segment impact their overall financial reserves.</p>



<p>Managing losses and gains: If there are significant declines in the value of shares, the company may decide to sell assets to realize capital losses (which may have tax benefits) or to protect itself against further declines.</p>



<p>4. Asset management in high volatility conditions</p>



<p>Details:</p>



<p>In highly volatile markets like cryptocurrencies , overnight pricing is a key tool for monitoring portfolio value and making quick investment decisions.</p>



<p>Economic explanation:</p>



<p>High volatility: The cryptocurrency market is characterized by significant price fluctuations over short periods. Investors purchasing Bitcoin can see its value fluctuate by several percent in a single day. By valuing it at the daily price, they can continuously monitor whether their investment is generating profits or losses.</p>



<p>Risk Management: High volatility also means high risk. Investors must react quickly to changing market conditions, for example, by selling assets when their value falls below a certain threshold (e.g., $19,500 in the example). Daily pricing allows for immediate action, which is crucial in such a dynamic environment.</p>



<p>Cryptocurrency investors often use short-term strategies like day trading or swing trading to capitalize on short-term price fluctuations. Daily pricing is an essential tool for monitoring the value of an investment and making buy or sell decisions.</p>



<p>5. Regulations on the valuation of financial assets</p>



<p>Details:</p>



<p>Regulated pension and insurance funds must use spot pricing to provide regulators and investors with current asset values.</p>



<p>Economic explanation:</p>



<p>Regulatory: Pension and insurance funds are required to report the value of their assets on an ongoing basis to ensure they have sufficient resources to cover future liabilities. Daily valuation provides them with an accurate picture of their portfolio&#8217;s value on a given day, which is crucial for meeting regulatory requirements.</p>



<p>Risk management: When a pension fund invests in stocks, such as those in the healthcare sector, and there is a 6% decline in Pfizer shares, the fund must update the portfolio value and potentially adjust its investment strategy to minimize the risk of further losses.</p>



<p>Transparency for investors: These funds must provide current information about the value of their assets to their clients. As stock market prices fluctuate, daily valuation ensures that investors and fund clients are informed about the current value of their investments.</p>



<p>Each of these examples demonstrates the importance of monitoring stock prices on an ongoing basis, especially in times of high volatility or regulatory constraints. Daily pricing allows for quicker responses to market changes, risk management, and better investment decision-making.</p>



<p>Analyzing a company&#8217;s stock valuation using the six-month or annual average price has many practical applications, particularly in the context of long-term investment decisions, assessing a company&#8217;s financial health, and risk management. Using the average price allows for a more balanced assessment of a stock&#8217;s value by eliminating the impact of short-term price fluctuations. Let&#8217;s look at a few situations when this method is worthwhile.</p>



<p><strong><u>When do we use the half-year (or yearly) average price for stock valuation?</u></strong></p>



<p>1. Fundamental analysis of long-term trends</p>



<p>In long-term fundamental analysis, the average share price over six months (or longer) is used to assess a company&#8217;s overall financial health and growth potential. Instead of focusing on short-term fluctuations, which may be the result of speculation or short-lived events, the average price provides a more stable picture.</p>



<p>Example: An investor is analyzing a company in the energy sector, which is subject to periodic fluctuations in commodity prices. Using the average price over the past six months, they can assess whether the company&#8217;s value is growing steadily or is subject to cyclical fluctuations. The average price allows them to assess whether the current trend (upward/downward) is part of a larger, long-term picture or a short-term anomaly.</p>



<p>Economic explanation:</p>



<p>Balancing fluctuations: The six-month average price allows investors to ignore momentary fluctuations that may be the result of speculation, unexpected news, or seasonal changes.</p>



<p>Assessing Long-Term Trends: A company&#8217;s value should be assessed based on its performance over the long term. The average price better reflects the overall direction of a company, as opposed to sudden spikes or declines.</p>



<p>2. Risk management by financial institutions</p>



<p>Banks and pension funds often use average stock prices to reduce the impact of short-term fluctuations on their portfolios. This allows them to better plan long-term investment strategies and protect themselves from excessive risk.</p>



<p>Example: A pension fund invests in shares of large, stable companies. Using the average share price over a six-month period, the fund can monitor the stability of its investments, reducing the risk associated with temporary fluctuations, such as those caused by speculation or temporary stock market declines. This helps avoid panic-driven investment decisions.</p>



<p>Economic explanation:</p>



<p>Portfolio stability: Pension and investment funds have long-term commitments to their investors. Analyzing average prices over a longer period allows for more stable asset management.</p>



<p>Avoiding overreactions: Using price averages reduces emotional or momentary market events that can lead to unsuccessful investments.</p>



<p>3. Calculating value for long-term transactions (e.g. acquisitions, mergers)</p>



<p>The average share price is also often used in calculations in mergers and acquisitions. A stock&#8217;s value based on an average price over six months or longer is more representative than the daily price, as it eliminates momentary fluctuations that can result from market sentiment.</p>



<p>Example: Company A plans to acquire Company B. Instead of basing the valuation on the current share price, which may be inflated by takeover rumors, the parties may agree to a valuation based on the average share price over six months to achieve a fairer deal value.</p>



<p>Economic explanation:</p>



<p>Representativeness: The average price better reflects the true value of a company over the long term, especially when the current share price may be inflated or deflated by speculation.</p>



<p>Minimizing risk: Using an average price eliminates the impact of short-term fluctuations, which is important for large transactions such as acquisitions or mergers where the stakes are very high.</p>



<p>4. Assessment of investment attractiveness in low-liquidity markets</p>



<p>In illiquid markets, where stock prices can fluctuate significantly over short periods, using the six-month average price helps investors assess how stable a company is. This can be especially important for small companies whose shares aren&#8217;t traded frequently.</p>



<p>Example: An investor is considering buying shares of a small company in the local market. Because the number of transactions is low, the share price often fluctuates due to single, large transactions. By analyzing the average price over six months, the investor can gain a more objective picture of the company&#8217;s value.</p>



<p>Economic explanation:</p>



<p>Avoiding the Impact of Low Liquidity: In low-liquidity markets, single trades can cause large price swings. Average prices over a longer period provide a better understanding of a stock&#8217;s true value by eliminating the impact of small, individual trades.</p>



<p>Reliable risk assessment: Average-price pricing gives investors greater certainty about the value of their investment, especially in less liquid and riskier environments.</p>



<p>5. Assessment of value for tax and accounting purposes</p>



<p>In some cases, particularly for companies and funds, valuing shares based on the six-month average price may be used for tax or accounting purposes. This helps avoid value spikes that could impact tax liabilities or reported profits.</p>



<p>Example: A company has an investment portfolio and must reconcile its value for accounting purposes at the end of the year. Using the average share price over the six-month period avoids a situation where a high price on the valuation date would inflate the portfolio&#8217;s value, which could lead to higher tax liabilities.</p>



<p>Economic explanation:</p>



<p>Minimizing the effect of volatility: Average-price valuation eliminates the impact of one-time events that could disproportionately impact the portfolio value and tax liability of the company.</p>



<p>Reliable asset valuation: The average price is more representative for accounting purposes because it provides a more stable picture of the asset value over the long term.</p>



<p><strong><u>Summary</u></strong></p>



<p>Valuing stocks based on the six-month (or annual) average price is particularly useful when investors or institutions want to avoid the influence of short-term fluctuations on their decisions. This method is often used in long-term analysis, risk management, mergers and acquisitions, in illiquid markets, and for accounting and tax purposes. Choosing this valuation method allows for more balanced investment decisions and minimizes the risk of short-term market anomalies.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/valuation-of-company-shares-analysis-from-the-economic-point-of-view/">Valuation of company shares &#8211; analysis from the economic point of view</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/investment-law-and-processes-in-poland/valuation-of-company-shares-analysis-from-the-economic-point-of-view/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data laundering and the threat it poses under copyright law</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/data-laundering-and-the-threat-it-poses-under-copyright-law/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/data-laundering-and-the-threat-it-poses-under-copyright-law/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 16:37:44 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[cross border cases]]></category>
		<category><![CDATA[Data laundering]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8194</guid>

					<description><![CDATA[<p>Publication date: August 20, 2025 Dynamic technological advancements have led modern businesses to operate in ways unforeseen decades ago. Computerization, in particular, without which modern business operations are inconceivable, has effectively broadened the horizons of many entrepreneurs, while simultaneously leaving room for abuse by cybercriminals. The protection of data stored on companies&#8217; internal servers has [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/data-laundering-and-the-threat-it-poses-under-copyright-law/">Data laundering and the threat it poses under copyright law</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><span style="color: #00ccff;">Publication date: August 20, 2025</span></strong></p>



<p>Dynamic technological advancements have led modern businesses to operate in ways unforeseen decades ago. Computerization, in particular, without which modern business operations are inconceivable, has effectively broadened the horizons of many entrepreneurs, while simultaneously leaving room for abuse by cybercriminals. The protection of data stored on companies&#8217; internal servers has become crucial. It should be noted that despite the efforts of both EU and national authorities, new threats are emerging in the field of personal data protection law, which may lead to violations not only of general provisions on the protection of personal rights but also of many other legal disciplines, such as copyright. The unprecedented mass digitization of artistic works has resulted in the inclusion of records of paintings, photographs, films, music, architectural designs, and many other manifestations of creative activity as data. From this perspective, the phenomenon <em>of data laundering </em>takes on a unique character and carries with it new threats.</p>



<span id="more-8194"></span>



<p><strong><u>What is <em>data laundering</em>?</u></strong></p>



<p>Data laundering essentially involves transforming stolen data so that it can be sold or used by ostensibly legitimate databases. For such transformation to be possible, an organization must first obtain the data illegally, either by fraud or theft via malware. The <em>laundering process itself </em>boils down to three stages:</p>



<p>1. Establishing an organization that will face relatively few restrictions related to data processing due to its use for non-commercial or scientific purposes. These are most often non-profit organizations.</p>



<p>2. Perform data manipulation operations using new technologies (for example, randomizers). The goal of these operations is to modify the data in such a way as to make it more credible to potential buyers.</p>



<p>3. Selling data to other businesses or making it available to for-profit organizations that will then use it for commercial purposes.</p>



<p>It can therefore be seen that the entire process aims to make illegally obtained data appear devoid of any suspicion regarding its origin. It is important to note that <em>data laundering </em>can have a significant impact on individual rights, as expressed not only in the Personal Data Protection Act but also in the Copyright and Related Rights Act.</p>



<p>A specific type <em>of data laundering </em>involves exploiting artists&#8217; creative work. Specifically, it involves processing data containing information about a work without the required authorization, in such a way that its reuse would be unrecognizable to others.</p>



<p><strong><u>Controversy over <em>data laundering </em>under copyright law</u></strong></p>



<p>It is worth pointing out from the outset that processing data related to works, as defined by the Copyright and Related Rights Act, creates an entirely new work, the disclosure of which would not constitute a direct infringement of the author&#8217;s moral rights. This is problematic, as in this situation, it is difficult to define the boundary beyond which the author would be able to bring a copyright lawsuit and effectively pursue claims.</p>



<p>The problem of defining the limits of using someone else&#8217;s work to create an entirely new work has become particularly pressing with the development of AI-based tools. These tools operate on the basis of a database composed of multiple works—a crucial element for ensuring the effective functioning of such tools in the future. Therefore, it is impossible to deny the significant contribution of authors to the existence of such models, for which they receive no remuneration. The key question becomes: how did the organizations training the AI tool obtain this data?</p>



<p>Under Polish law, an artist can freely dispose of their rights to their work unless the law provides other restrictions. Therefore, if they grant a license to an organization using an AI tool, it does not constitute an infringement of the artist&#8217;s copyright, as, in accordance with the principle of freedom of contract, the artist may authorize the use of their work for the purpose of training an AI tool.</p>



<p>The problem arises, however, when it comes to so-called fair use, regulated in Articles 23-35 of the Copyright and Related Rights Act. These provisions are based on vague terms that require appropriate interpretation. In such a situation, it is necessary to examine the specific case based on the evidence collected. To date, there are no judgments in Poland that would establish a specific line of jurisprudence regarding fair use based on AI tools, but certain conclusions can be drawn from the rulings of foreign courts.</p>



<p>One of the rulings addressing the issue of fair use for someone else&#8217;s work that may impact the legal situation of organizations using AI-based tools is the U.S. Supreme Court ruling of May 18, 2023, in the case of <em>Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith et al</em>. The Supreme Court emphasized that when determining the legality of fair use, the similarity between the original and secondary works is not the only factor that matters. The manner in which the resulting copy is used is also crucial – its use solely for research purposes or by a non-profit organization will be considered differently than if the direct or indirect purpose is to generate profit.</p>



<p>Another lawsuit, this time closely related to the use of AI-based tools to create new works based on a database containing information about existing, original works by artists, is <em>Andersen et al. v. Stability AI Ltd et al. </em>The lawsuit was filed by artists accusing three companies – Stability AI, Deviant Art, and Midjourney – using their works without the creators&#8217; consent to train AI-based tools. According to the plaintiffs, the works created using these models are derivative of the artists&#8217; original works and are essentially copies, the use of which constitutes copyright infringement. The main counterargument that the court will have to consider is the aforementioned fair use issue, because despite the artists&#8217; position that the generated works are merely copies of existing works, the defendants will attempt to prove that AI-based tools create transformative results that differ significantly from the original works.</p>



<p><strong><u>Conclusions</u></strong></p>



<p><em>Data laundering </em>in copyright law is a problematic phenomenon. The primary reason for this is the novelty of AI technology and the insufficiently precise legal provisions that could be applied to determine the legality of using works created using AI tools based on datasets containing information about the works of other creators. Undoubtedly, recognizing the dynamic development of AI, legislators should strive to shape regulations so that courts can issue the most equitable judgments possible. It cannot be denied that without artists&#8217; contributions to their work, tools like Stable Diffusion would be unable to function due to the lack of sufficient data needed to train the model. At the same time, it is important to note the partially valid argument that the resulting work is not a copy in the strict sense of the word. Therefore, defining the boundaries of fair use is crucial in this matter, because without clear criteria, the market for tools generating works will remain a gray area, which is never desirable.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/data-laundering-and-the-threat-it-poses-under-copyright-law/">Data laundering and the threat it poses under copyright law</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/data-laundering-and-the-threat-it-poses-under-copyright-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity and GDPR Compliance in 2025</title>
		<link>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/</link>
					<comments>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/#respond</comments>
		
		<dc:creator><![CDATA[jakub]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 16:11:16 +0000</pubDate>
				<category><![CDATA[IT, NEW TECHNOLOGIES, MEDIA AND COMMUNICATION TECHNOLOGY LAW]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[CRA]]></category>
		<category><![CDATA[eIDAS]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[KG Legal]]></category>
		<category><![CDATA[NIS2]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Polish law]]></category>
		<guid isPermaLink="false">https://www.kg-legal.eu/?p=8192</guid>

					<description><![CDATA[<p>Publication date: August 20, 2025 In an era of dynamic digital technology development and a growing number of cyberthreats, cybersecurity and personal data protection are becoming key aspects of how organizations operate in the European Union. New regulations, such as NIS2, DORA, AI Act, CRA, and eIDAS 2.0, combined with the current GDPR, create a [&#8230;]</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/">Cybersecurity and GDPR Compliance in 2025</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">Publication date: August 20, 2025</mark></strong></p>



<p>In an era of dynamic digital technology development and a growing number of cyberthreats, cybersecurity and personal data protection are becoming key aspects of how organizations operate in the European Union. New regulations, such as NIS2, DORA, AI Act, CRA, and eIDAS 2.0, combined with the current GDPR, create a comprehensive security system aimed at raising protection standards and ensuring greater transparency in data processing.</p>



<span id="more-8192"></span>



<p><strong>NIS2 and GDPR: Strengthening Data Protection and Incident Response</strong></p>



<p>The Network and Information Security Directive (NIS2) is another step towards increasing the cyber resilience of entities operating in key economic sectors. In 2025, its implementation will require organizations to take a number of actions, including:</p>



<ul class="wp-block-list">
<li>Expanding security measures against cyberattacks,</li>



<li>Introducing more rigorous incident reporting procedures,</li>



<li>Strengthening cooperation between supervisory authorities and the private sector.</li>
</ul>



<p>NIS2, in conjunction with GDPR (Regulation 2016/679), means that businesses will not only have to protect personal data more effectively, but also implement new procedures for risk management and auditing of IT security activities.</p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>5 Things You Need to Know About NIS2</strong></p>



<p><strong>01 </strong>– Fines up to <strong>€10 million or 2% of total annual global turnover</strong></p>



<p><strong>02 </strong>– <strong>Expanded scope </strong>compared to NIS1, changing the way companies are classified and requiring more of them to comply with the directives</p>



<p><strong>03 </strong>– Management staff <strong>is liable for violations </strong>and the authorities may <strong>suspend activities or functions</strong></p>



<p><strong>04 </strong>– Broad <strong>security risk management measures </strong>and shift to a risk-based approach</p>



<p><strong>05 </strong>– Initial reporting <strong>of security incidents within 24 hours</strong>, further action within <strong>72 hours</strong>, and final summary <strong>within 1 month</strong></p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>DORA: Cyber Resilience and Personal Data Security in Finance</strong></p>



<p>DORA is the Regulation of the European Parliament and of the Council (EU) of 14 December 2022 on the digital operational resilience of the financial sector. This is another of many recent regulations concerning cybersecurity and the broadly defined security of information technology.</p>



<p>The Digital Operational Resilience Act (DORA) focuses on the financial sector, which is particularly vulnerable to cyberattacks. Key requirements imposed by DORA include:</p>



<ul class="wp-block-list">
<li>Testing the operational resilience of IT systems,</li>



<li>Implementing risk management strategies based on threat analysis,</li>



<li>Obligation to monitor and report digital incidents.</li>
</ul>



<p>DORA applies to:</p>



<ol style="list-style-type:lower-alpha" class="wp-block-list">
<li>credit institutions;</li>



<li>payment institutions, including payment institutions exempted under <a href="https://sip-1lex-1pl-18l00itm9016d.extranet.rajska.info/#/document/68589670?cm=DOCUMENT">Directive </a>(EU) 2015/2366;</li>



<li>providers of account information access services;</li>



<li>electronic money institutions, including electronic money institutions exempted under <a href="https://sip-1lex-1pl-18l00itm9016d.extranet.rajska.info/#/document/67903621?cm=DOCUMENT">Directive </a>2009/110/EC;</li>



<li>investment companies;</li>



<li>crypto-asset service providers,</li>



<li>central securities depositories;</li>



<li>central counterparties;</li>



<li>trading systems;</li>



<li>transaction repositories;</li>



<li>alternative investment fund managers;</li>



<li>management companies;</li>



<li>information sharing service providers;</li>



<li>insurance and reinsurance undertakings;</li>



<li>insurance intermediaries, reinsurance intermediaries and ancillary insurance intermediaries;</li>



<li>institutions of occupational pension programs;</li>



<li>rating agencies;</li>



<li>administrators of critical benchmarks;</li>



<li>crowdfunding service providers;</li>



<li>securitization repositories;</li>



<li>external ICT service providers.</li>
</ol>



<p>In the context of GDPR compliance, financial institutions must ensure adequate security measures to protect customer data against unauthorized access and information leakage. GDPR also mandates cooperation with cloud service providers and external IT operators, which requires thorough verification of their security standards.</p>



<p>Article 33 of the DORA Directive requires personal data breaches to be reported without undue delay, and within 72 hours where possible. In the event of a delay, an explanation of the reason for the delay must be included.</p>



<p class="has-vivid-cyan-blue-background-color has-background has-medium-font-size"><strong><mark>AI Act and GDPR: Managing Artificial Intelligence and Data Protection</mark></strong></p>



<p>The AI Act regulations classify AI systems according to risk level and impose obligations on entities that implement them. In the context of data protection, the AI Act requires:</p>



<ul class="wp-block-list">
<li>Transparency of artificial intelligence algorithms and mechanisms,</li>



<li>Possibilities of controlling and auditing decisions made by AI,</li>



<li>Compliance with the principles of data minimization and limitation of the processing purpose.</li>
</ul>



<p>Companies that use AI to process personal data will have to meet stringent GDPR requirements, giving users greater control over their information and minimizing the risk of abuse.</p>



<p><strong>CRA: Cyber Resilience Act – Security of Digital Products</strong></p>



<p>The Cyber Resilience Act (CRA) introduces obligations related to the security of digital software and hardware. Its key requirements include:</p>



<ul class="wp-block-list">
<li>Designing secure digital products,</li>



<li>Monitoring vulnerabilities and updating them regularly,</li>



<li>Manufacturers&#8217; responsibility to ensure continued safety throughout the product life cycle.</li>
</ul>



<p>CRA aims to increase cybersecurity across the entire digital ecosystem, minimizing the risk of attacks based on device and application vulnerabilities.</p>



<p class="has-luminous-vivid-amber-background-color has-background has-medium-font-size"><strong>eIDAS 2.0: Strengthening digital identification</strong></p>



<p>The amendment to the eIDAS (electronic IDentification, Authentication and trust Services) regulation – known as eIDAS 2.0 – introduces a European digital identity wallet that:</p>



<ul class="wp-block-list">
<li>Allows citizens to securely store and share their identity data,</li>



<li>It enables public and private institutions to provide secure online services,</li>



<li>Strengthens authentication standards in digital transactions.</li>
</ul>



<p>In conjunction with GDPR, eIDAS 2.0 improves users&#8217; control over their identity data and increases the security of online transactions.</p>



<p><strong>Challenges and benefits of new regulations</strong></p>



<p>Adapting to new regulations poses numerous challenges for companies, including:</p>



<ul class="wp-block-list">
<li>The need to invest in modern security systems,</li>



<li>Employee training in cybersecurity and data protection,</li>



<li>Implementation of effective incident monitoring and reporting mechanisms.</li>
</ul>



<p>However, the new regulations also bring numerous benefits, such as:</p>



<ul class="wp-block-list">
<li>Better protection of customer data and greater trust in the organization,</li>



<li>Increased resistance to cyber attacks,</li>



<li>Possibility to avoid high fines for violating data protection regulations.</li>
</ul>



<p><strong>The impact of new regulations on small and medium-sized enterprises (SMEs)</strong></p>



<p>New regulations such as NIS2, DORA, AI Act, CRA, and eIDAS 2.0 can pose challenges for small and medium-sized enterprises (SMEs). Implementing these regulations requires investment in modern security systems and employee training in cybersecurity and data protection. SMEs may face challenges related to limited financial and human resources, which can make it difficult to fully comply with the new requirements.</p>



<p>However, compliance with these regulations also brings benefits, such as better protection of customer data, increased trust in the organization, and the ability to avoid significant fines for violating data protection regulations. Therefore, it is worthwhile for SMEs to consider partnering with external IT service providers and cybersecurity specialists to effectively implement the required security measures.</p>



<p><strong>The future of cybersecurity in the EU</strong></p>



<p>In the coming years, we can expect further development of regulations regarding cybersecurity and personal data protection. The European Union will continue to work on strengthening the legal framework to address growing cyber threats and ensure a high level of data protection. Organizations will need to be prepared to continuously adapt to new requirements and invest in modern security technologies and procedures.</p>



<p><strong>Summary</strong></p>



<p>In 2025, organizations will have to comply with a range of regulations regarding cybersecurity and personal data protection. NIS2, DORA, AI Act, CRA, and eIDAS 2.0, combined with the GDPR, create a modern legal framework aimed at improving data protection and increasing resilience to cyber threats across various economic sectors. Implementing these regulations will be a challenge, but also an opportunity, to build a more secure and digitally resilient business environment in the EU.</p>
<p>Artykuł <a href="https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/">Cybersecurity and GDPR Compliance in 2025</a> pochodzi z serwisu <a href="https://www.kg-legal.eu">KIELTYKA GLADKOWSKI LEGAL | CROSS BORDER POLISH LAW FIRM RANKED IN THE LEGAL 500 EMEA SINCE 2019</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.kg-legal.eu/info/it-new-technologies-media-and-communication-technology-law/cybersecurity-and-gdpr-compliance-in-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
