Pursuant to Art. 6 point 1 of the Act of 18 July 2002 on the provision of services by electronic means, the service provider informs about specific risks related to the use by Users of the services it provides electronically.
The information concerns threats that the Operator identifies as potential threats that should be taken into account despite the Operator's use of systems securing the infrastructure against unauthorized influence of third parties:
1) possibility of receiving spam, i.e. unsolicited advertising (commercial) information sent electronically;
2) the presence and operation of malware, including: computer viruses, i.e. special software that, when launched, is able to infect files in a self-replicating manner, usually without being noticed by the user; viruses may be more or less harmful to the operating system in which they reside, but even in the least serious case they are a waste of RAM, CPU and hard drive space;
3) the presence and operation of Internet worms, i.e. malicious software capable of self-replication; e-mail worm is a devastating attack against a network that collects all e-mail addresses in a local program (for example, MS Outlook) and sends hundreds of e-mails containing a worm in an invisible attachment;
4) the possibility of spyware, i.e. software that spying on the user's activities on the Internet, installing itself without the user's knowledge, consent or control;
5) the possibility of being exposed to cracking or phishing (password fishing) - in the IT context, phishing means a security breaking technique (cracking) used to obtain personal and confidential information for the purpose of identity theft by sending false electronic messages that look deceptively authentic;
6) sniffing - unauthorized eavesdropping, other than the concepts of cracking and phishing, involving the use of a sniffer - a computer program whose task is to intercept and possibly analyze data flowing in the network http://pl.wikipedia.org/wiki/Malware and related articles, among others;
7) cryptanalysis activities, i.e. finding weaknesses in the cryptographic system and thus enabling its breaking or bypass;
8) the possibility of being exposed to other unwanted or "malicious" software that performs actions unintended by the user,
9) risk related to security gaps in third-party PayPal and Facebook services that the User uses as part of the Application.