Players hunting for virtual creatures could end up facing real-life civil or even criminal liability.
Recent terrorist attacks have revealed the dark side of new information technologies. Organiz¬ers of attacks, or fighters for the “Islamic State,” have ruthlessly exploited the latest communica¬tions technologies. For example, according to media reports, terrorists have arranged attacks via PlayStation tools or encrypted instant messaging services. Polish lawmakers decided to respond to this phenomenon by passing the Anti-Terrorism Act of 10 June 2016.
Operators of crowdfunding platforms should carefully follow the work on the Network and Information Security Directive. The last draft of the proposal suggests that crowdfunding platforms could be covered by the directive.
A software manufacturer’s role in criminal investigations and hacking its own programming
According to an Advocate General at the Court of Justice, a provider of free WiFi is not responsible for the actions of its users.
The EU’s eIDAS Regulation enters into force on 1 July 2016. The importance of this somewhat mysterious act is not yet widely appreciated. It opens up new possibilities and creates space for very interesting new services.