Polski English

Information on specific risks associated with the use of an electronically supplied service

Pursuant to Article 6(1) of the Act of 18 July 2002 on the provision of services by electronic means, the service provider informs about special risks related to the use by Users of electronically supplied services.

The information refers to threats identified by the Operator as potential threats, which should be taken into account despite the Operator’s application of systems protecting the infrastructure against unauthorized interference of third parties:

1) the possibility of receiving spam, i.e. unsolicited advertising (commercial) information transmitted electronically;
2) the presence and operation of malware, including: computer viruses, i.e. specific software that is able, when run, to infect files in a self-replicating manner, usually without being noticed by the user; viruses can be more or less harmful to the operating system in which they are located, but even in the least serious case they waste RAM, CPU and hard disk space;
3) the presence and operation of Internet worms, i.e. malicious software capable of self-replication; e-mail worm is a destructive attack, that collects all email addresses found in the local program (eg MS Outlook) and then sends hundreds of emails containing the worm as an attachment;
4) possibility of spyware, i.e. software that spyware the user’s actions on the Internet, installing itself without his knowledge, consent and control;
5) the possibility of being exposed to cracing, or phishing (password fishing) – in an IT context phishing is a technique of hacking (cracking), used to gain access to personal and confidential information for identity theft by means of fake emails that are deceptively authentic;
6) sniffing – illegal wiretapping, other than located within the notion of cracking and phising, relies on the use of sniffer – a computer program, whose task is to capture and analyze any data flowing on the network
http://pl.wikipedia.org/wiki/Malware and related articles, among others;
7) cryptanalysis activities, i.e. finding the weaknesses of the cryptographic system, and thus enabling its fracture or bypass;
8) the possibility of being exposed to other unwanted or “malicious” software that performs activities unintentionally by the user,
9) risk related to security gaps in the services of third parties such as PayPal and Facebook, which the User uses as part of the Application.