KG LEGAL \ INFO
BLOG

The European Data Protection Board criteria of territorial competence of supervisory authorities to enforce Article 5(3) of the ePrivacy Directive

On 18 June 2021, the EDPB adopted internal document No. 04/2021 on the criteria for the territorial competence of supervisory authorities for the enforcement of Article 5(3) of the ePrivacy Directive.

Problem of territorial application

In view of recent decisions adopted by some SAs that are competent to enforce Article 5(3)
of the ePrivacy Directive[1], the EDPB has issued an Opinion aimed at establishing a uniform interpretation regulations of the territorial jurisdiction of SAs responsible for the enforcement of Article 5(3). Decisions adopted by SAs have shown that the territorial scope of application of the Directive may vary between different SAs, particularly where the controller/service provider is established in several Member States. Uncertainties on this issue could jeopardize decisions adopted by SAs across the Union.

Jurisprudence of the CJEU

More

KIELTYKA GLADKOWSKI KG LEGAL TAKES PART IN THE FUTURE OF BEAUTY FESTIVAL – WSJ THE FUTURE OF EVERYTHING

On 22 February 2022 KIELTYKA KG LEGAL will take place in the Future of Beauty Festival as a part of Wall Street Journal Festival of Everything. The participants of the event will learn about the latest innovations shaping the future of beauty, from cosmetic industry giants harnessing the power of data analytics and artificial intelligence, to wellness technologies prompting consumers to take a more expansive view of beauty that includes mindfulness, nutrition and lifestyle choices. The speakers will also focus on the impact of the pandemic on these trends. The speakers will include Katie Sturino, Founder, Megababe, The Future of Beauty; Ellie Austin, News Editor, Live Journalism, The Wall Street Journal; Sara Castellanos, News Editor, Live Journalism, The Wall Street Journal Future of Beauty

https://x.em.dowjones.com/ats/msg.aspx?sg1=d02ac9c19316bc7aef1ddaa731d7dd49

More

PENALTIES FOR PROMOTING PYRAMID SCHEMES IN POLAND – DECISIONS OF THE PRESIDENT OF THE POLISH OFFICE FOR THE PROTECTION OF COMPETITION AND CONSUMERS

HOW TO RECOGNIZE A PYRAMID SCHEME?

Pyramid promotional schemes involve consumers being persuaded to participate in a “project” in exchange for the promise of remuneration or other benefits, which depend primarily on bringing more people into the scheme rather than on the sale or consumption of products. Such schemes most often offer investments in tokens, cryptocurrencies, educational or language packages, apartments, etc.

The scheme of operation of a pyramid scheme is basically as follows: you put money into a supposed investment, you refer other people, and you get paid for introducing them. Your money is not actually invested, it is used to compensate the people who brought you into the system. At the same time, your compensation comes from the contributions of people you have directly and indirectly referred. In this way, it is you, your friends and your friends of friends who are funding a system that is not really investing anything. Therefore, after a period of time, the system has to fail because the money paid in is not invested in any assets and does not make a profit. The money goes to the organizers and the highest position in the chain. The system works as long as the number of people joining and contributing money increases exponentially, which is not sustainable. As a result, the system collapses and the money invested is lost.

More

KIELTYKA GLADKOWSKI TOOK PART IN IOE&IT WEBINAR ABOUT KIELTYKA GLADKOWSKI TOOK PART IN IOE&IT WEBINAR ABOUT TRADING WITH POLAND AND THE UK UNDER THE UK-EU AGREEMENT – NEW CUSTOMS RULES UNDER THE UK-EU AGREEMENT – NEW CUSTOMS RULES

On October 28, 2021 KIELTYKA GLADKOWSKI participated in a webinar hosted by the IOE&IT and Digital Trader Services.

From the start of 2022, all British importers will need to complete declarations for imports from the EU. The deadline for transportation inspections, including sanitary inspections of food, animal products and plant-based goods, has been delayed until 2022. Despite this, importers must be prepared to fill out declarations from January 1, 2022.

The webinar therefore explained the new timeline for import controls and what this means for traders. Experts provided practical advice about what traders can do to prepare for these changes.

The webinar covered the following topics:

  • The customs controls and checks that are being introduced on 1 January 2022
  • The requirement to use the new Goods Vehicle Movement Service (GVMS) and how this works
  • When pre-notification and health certification will be introduced for agri-foods and steps traders can take
  • When physical checks will be introduced at Border Control Posts.

More

Spoofing as a form of cybercrime

Along with the development of technology, which gives us more and more opportunities, the risk of cyber-attacks on our personal data is also growing. Hackers are using more and more sophisticated methods of compromising security to achieve their goal. One of the forms of cybercrime is spoofing, i.e. a group of attacks on ICT systems consisting in impersonating another element of the IT system, the effect of which is achieved by placing prepared data packets on the network or incorrect use of protocols.

Spoofing definition

The term “spoof” dates back over a century and refers to any form of trickery. However, today it is mostly used when talking about cybercrime. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source, which can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server. It can be used to gain access to a target’s personal information, spread malware through infected links or attachments, bypass network access controls, or redistribute traffic to conduct a denial-of-service attack. Also it is a good way to gains access to someone’s device in order to execute a larger cyber-attack. Successful attacks can lead to infected computer systems and networks, data breaches, and loss of revenue – all liable to affect the organization’s public reputation. In addition, spoofing that leads to the rerouting of internet traffic can overwhelm networks or lead customers to malicious sites aimed at stealing information or distributing malware.

How spoofing works?

More

UP