{"id":4340,"date":"2024-07-02T08:26:20","date_gmt":"2024-07-02T08:26:20","guid":{"rendered":"https:\/\/aplaw.pl\/?p=4340"},"modified":"2026-05-13T14:35:53","modified_gmt":"2026-05-13T14:35:53","slug":"artur-piechocki-will-conduct-the-training-it-legal-legal-aspects-of-it-contracts-organized-by-the-publisher-of-the-rzeczpospolita-daily","status":"publish","type":"post","link":"https:\/\/aplaw.pl\/en\/events\/artur-piechocki-will-conduct-the-training-it-legal-legal-aspects-of-it-contracts-organized-by-the-publisher-of-the-rzeczpospolita-daily\/","title":{"rendered":"Artur Piechocki conducted the training &#8220;IT LEGAL \u2013 Legal Aspects of IT Contracts&#8221; organized by the publisher of the &#8220;Rzeczpospolita&#8221; daily"},"content":{"rendered":"<p data-start=\"0\" data-end=\"288\">On August 27, 2024, an online training titled \u201cIT LEGAL \u2013 Legal Aspects of IT Contracts\u201d took place, featuring attorney-at-law <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Artur Piechocki<\/span><\/span>. <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">APLaw<\/span><\/span> was a partner of the event organized by the publisher of the \u201cRzeczpospolita\u201d daily.<\/p>\n<p data-start=\"290\" data-end=\"421\">The training was aimed at professionals seeking to deepen their knowledge of the specifics of IT contracts. The presenters covered:<\/p>\n<ul data-start=\"423\" data-end=\"688\">\n<li data-section-id=\"wgbnbj\" data-start=\"423\" data-end=\"468\">priority topics in the field of Legal IT,<\/li>\n<li data-section-id=\"xv1rr5\" data-start=\"469\" data-end=\"539\">common issues and legal regulations related to contract formation,<\/li>\n<li data-section-id=\"1914eu4\" data-start=\"540\" data-end=\"625\">practical matters supporting better protection of contracting parties\u2019 interests,<\/li>\n<li data-section-id=\"pgifis\" data-start=\"626\" data-end=\"688\">common pitfalls in IT contracts and methods to avoid them.<\/li>\n<\/ul>\n<p data-start=\"690\" data-end=\"862\"><span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Artur Piechocki<\/span><\/span>\u2019s presentation, titled \u201cCybersecurity Outsourcing,\u201d started at 11:00 AM and focused on cybersecurity. During the lecture, he detailed:<\/p>\n<ul data-start=\"864\" data-end=\"1360\">\n<li data-section-id=\"14ong4d\" data-start=\"864\" data-end=\"900\">basic concepts of <a href=\"https:\/\/aplaw.pl\/services\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a>,<\/li>\n<li data-section-id=\"v7ap8s\" data-start=\"901\" data-end=\"966\">current obligations of entities covered by cybersecurity law,<\/li>\n<li data-section-id=\"fcfuhj\" data-start=\"967\" data-end=\"1011\">planned regulatory changes (NIS2, KSC2),<\/li>\n<li data-section-id=\"16hzyn\" data-start=\"1012\" data-end=\"1078\">risk management at the intersection of GDPR and cybersecurity,<\/li>\n<li data-section-id=\"u4s47e\" data-start=\"1079\" data-end=\"1119\">examples of cybersecurity incidents,<\/li>\n<li data-section-id=\"brjex0\" data-start=\"1120\" data-end=\"1173\">cybersecurity outsourcing vs. in-house solutions,<\/li>\n<li data-section-id=\"zll9n5\" data-start=\"1174\" data-end=\"1235\">construction of outsourcing agreements for cybersecurity,<\/li>\n<li data-section-id=\"15325nz\" data-start=\"1236\" data-end=\"1294\">types of services provided by cybersecurity providers,<\/li>\n<li data-section-id=\"1mmma8i\" data-start=\"1295\" data-end=\"1333\">cyber threats arising from AI use,<\/li>\n<li data-section-id=\"1uxgd7d\" data-start=\"1334\" data-end=\"1360\">responsibility for <a href=\"https:\/\/aplaw.pl\/services\/ai-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener\">AI<\/a>.<\/li>\n<\/ul>\n<p data-start=\"1362\" data-end=\"1544\" data-is-last-node=\"\" data-is-only-node=\"\">The training, led by experienced experts in IT law and cybersecurity, provided an opportunity to acquire advanced knowledge and skills necessary for effective IT contract management.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":4,"featured_media":4346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-4340","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/posts\/4340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/comments?post=4340"}],"version-history":[{"count":2,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/posts\/4340\/revisions"}],"predecessor-version":[{"id":5904,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/posts\/4340\/revisions\/5904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/media\/4346"}],"wp:attachment":[{"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/media?parent=4340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/categories?post=4340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aplaw.pl\/en\/wp-json\/wp\/v2\/tags?post=4340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}