KG LEGAL \ INFO
BLOG

The use of ChatGPT and artificial intelligence in education

Publication date: October 25, 2023

ChatGPT and artificial intelligence

According to many descriptions, artificial intelligence (AI) is “the ability of machines to demonstrate human skills, the ability to spontaneously adapt to changing conditions, make complex decisions, learn, and undertake abstract reasoning.” However, this is not a completely precise description, because it is difficult to define something that has so many possibilities and applications and has such a wide range of uses. This is even more difficult because there is no single specific definition of the word “intelligence.”

Currently, some of the most interesting applications of artificial intelligence are:

– games in which artificial intelligence is the opponent of the player who plays “against the computer”, not other players;

– all types of home appliances connected to the WI-FI network, such as cleaning robots, refrigerators or air purifiers;

– autonomous cars that can move without a driver inside;

– online stores where “customer assistants” in the form of chat with artificial intelligence (so-called chat bots) are available.

More

Next Generation Virtual Worlds – what challenges will they bring?

Publication date: October 25, 2023

The advent of conception Next Generation Virtual Worlds has ushered in a new era of technological innovation and transformative possibilities. However, with these opportunities come a myriad of challenges that span across various dimensions. From societal implications to technical complexities, economic considerations to legal intricacies, as well as management-related hurdles and political dynamics, next generation virtual worlds present a multifaceted landscape of hurdles to navigate. In this article, we delve into the diverse challenges that accompany the rise of next generation virtual worlds, examining the social, technical, economic, legal, managerial, and political aspects that require careful consideration in order to harness the full potential of these immersive digital realms.

More

The techno-economic ecosystem of next generation virtual worlds

Publication date: October 25, 2023

Something about DGTES

The rapid advancements in digital technology are accelerating the process of digital transformation, not only within the traditional information and communication technology (ICT) sector but across all industrial ecosystems. This is fundamentally reshaping the global landscape of technological, social, and economic progress and presenting numerous challenges to the EU’s competitive standing. Achieving and bolstering digital leadership has now become a pivotal driver for the EU’s competitiveness, as well as a prerequisite for successfully navigating the twin transitions and ensuring future prosperity within the EU. Consequently, the mastery of essential and emerging digital technologies is deemed vital for the EU to maintain its strategic independence.

More

Changes to electronic invoices in Poland

Publication date: May 29, 2023

What is e-invoice?

Structured invoice (e-invoice) is a type of electronic invoice introduced in 2021. It enables entrepreneurs to issue invoices through the ICT system (Polish KseF), i.e. the National System of e-Invoices. For now, the system is not mandatory in Poland. Currently, the logical structure of the electronic invoice FA( 1) is used, and from September 1, 2023 it will be replaced by the new structure FA(2). The obligation to apply them comes into force on July 1, 2024.

More

Pseudo-anonymisation in the aspect of GDPR

Publication date: April 11, 2023

In the light of the GDPR, the principles of data protection do not apply to data whose links between personal data and the persons concerned have been irreversibly removed. Consequently, anonymization is not subject to the provisions of the GDPR Regulation. However, the measure that the GDPR directly indicates as a method of data protection is pseudo-anonymization. In this case, personal data is replaced in such a way that with the use of appropriate information it is possible to identify the persons to whom data relates.

The main mechanism on which pseudo-anonymization is based is the replacement of sensitive information with identifiers, which are then properly encrypted, but in a way that allows the possible reversal of this procedure. Therefore, in the whole process, we receive two sets of information, the first is a set of data that we cannot associate with any natural person, and the second is information containing identifiers that allow the data to be assigned to a specific person. Only authorized users have the ability to reconstruct data. According to the findings of The Article 29 Working Party, we can distinguish five anonymization techniques. They are secret key encryption, hash function, hash function with key, deterministic encryption and tokenization.

More

UP