{"id":232709,"date":"2025-06-05T12:25:31","date_gmt":"2025-06-05T10:25:31","guid":{"rendered":"https:\/\/us.edu.pl\/?page_id=232709"},"modified":"2025-06-11T16:05:38","modified_gmt":"2025-06-11T14:05:38","slug":"bezpieczenstwo-i-ochrona-danych-osobowych","status":"publish","type":"page","link":"https:\/\/us.edu.pl\/en\/bezpieczenstwo\/bezpieczenstwo-i-ochrona-danych-osobowych\/","title":{"rendered":"Security and protection of personal data"},"content":{"rendered":"<p><\/p>\n<p>[vc_row][vc_column]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        <h3 class=\"page-title text__title\">Security and protection of personal data<\/h3>\r\n                        <div class=\"text-modules__content\"><\/p>\n<p>The protection of personal data is crucial to our fundamental rights and freedoms.<br \/>\nAn adequate level of personal data protection must be ensured at all stages of processing in order to guarantee the continuity of the University of Silesia in Katowice and minimise the risk of infringement of the rights or freedoms of natural persons and the risks associated with processing, in particular those resulting from accidental or unlawful destruction, loss, modification, unauthorised disclosure or unauthorised access to personal data transmitted, stored or otherwise processed.<br \/>\nThe Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation), abbreviated as GDPR, introduced basic mechanisms to ensure an adequate level of security of the rights and freedoms of natural persons, including personal data. Data protection prevents identity theft, fraud and other abuses. By protecting data, we protect our privacy and security.<\/p>\n<h3><span style=\"font-size: 16px;\"><strong>What is personal data?<\/strong><\/span><\/h3>\n<p>Personal data is any information relating to an identified or identifiable natural person (data subject). An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific and sufficient to identify uniquely the physical, physiological, physiological, genetic, mental, economic, cultural or social identity of that natural person.<\/p>\n<h3><span style=\"font-size: 16px;\"><strong>Personal data breach<\/strong><\/span><\/h3>\n<p>A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed. A breach may result in the risk of identity theft, blackmail or fraud, loss of trust in the University of Silesia in Katowice, or legal and financial consequences (e.g. penalties imposed by the President of the Personal Data Protection Office).<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][\/vc_row][vc_row el_class=&#8221;container&#8221;][vc_column][vc_tta_accordion style=&#8221;modern&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; c_icon=&#8221;chevron&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; el_id=&#8221;container&#8221;][vc_tta_section title=&#8221;Examples of personal data breaches&#8221; tab_id=&#8221;1749118917071-7b86e605-a62c&#8221;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<ul>\n<li>Sending emails to multiple recipients without using the UDW \u2018blind copy\u2019 function.\u00a0<strong>This applies in particular to sending emails to private addresses;<\/strong><\/li>\n<li>Sending an email or paper correspondence containing personal data <strong>to the wrong recipient;<\/strong><\/li>\n<li>Unauthorised \u2013 caused by error or intentional action \u2013 deletion of personal data without proper authorisation\/request;<\/li>\n<li>Loss\/theft\/misplacement of media such as USB sticks, memory cards, portable drives, laptops, mobile phones on which personal data is stored, including the loss of paper documentation containing personal data;<\/li>\n<li>Disposal of documents containing personal data without permanent destruction (failure to use a shredder or secure bin);<\/li>\n<li>Disclosure of personal data to an unauthorised entity or person\/lack of legal basis for disclosure;<\/li>\n<li>Lack of access to personal data (e.g. in IT systems, on hard drives, servers) through, for example, a <strong>ransomware attack<\/strong>, which involves a hacker encrypting drives in order to obtain a ransom;<\/li>\n<li>Intentional or accidental damage to the system, resulting in the loss of access to personal data.<\/li>\n<\/ul>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_tta_section][vc_tta_section title=&#8221;What to do in the event of a personal data breach&#8221; tab_id=&#8221;1749118917081-65137491-c55d&#8221;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<p>If you suspect or discover a personal data breach in your environment, you should report it <strong><u>immediately<\/u><\/strong>, without undue delay.<\/p>\n<p>Please remember that the University of Silesia in Katowice, as the data administrator, is obliged to report any data breach to the President of the Personal Data Protection Office no later than <strong>72 hours<\/strong> after discovering the breach.<\/p>\n<p>In the absence of an adequate and rapid response, a personal data breach may result in physical injury, material or non-material damage to individuals, such as loss of control over their personal data or restriction of rights, discrimination, identity theft or fraud, financial loss, unauthorised reversal of pseudonymisation, damage to reputation, breach of confidentiality of personal data protected by professional secrecy, or any other significant economic or social damage.<\/p>\n<h3><span style=\"font-size: 16px;\"><strong><u>REPORTS SHOULD BE MADE \u2013 PREFERABLY IN WRITING<\/u><\/strong><\/span><\/h3>\n<ul>\n<li>to the Data Protection Officer at the following e-mail address: <a href=\"mailto:dariusz.pawelczak@us.edu.pl\">dariusz.pawelczak@us.edu.pl<\/a>\u00a0or\u00a0<a href=\"mailto:iod@us.edu.pl\">iod@us.edu.pl<\/a>, tel. 32\u00a0359 24 36;<\/li>\n<li>or to the Data Protection Officer&#8217;s Team at the following e-mail address: <a href=\"mailto:aneta.landrat@us.edu.pl\">aneta.landrat@us.edu.pl<\/a>, tel. 32\u00a0359 24 33;<\/li>\n<li>Reports can also be made in person at the Data Protection Officer&#8217;s office at the following address: Katowice, ul. Bankowa 14, room no. 334, 2nd floor.<\/li>\n<\/ul>\n<h3><span style=\"font-size: 16px;\"><strong><u>A report of a personal data breach should include:<\/u><\/strong><\/span><\/h3>\n<ul>\n<li>the date of the incident (optionally the time of the incident);<\/li>\n<li>description of the nature of the breach, detailed description of the incident;<\/li>\n<li>description of the circumstances of the incident;<\/li>\n<li>category and approximate number of persons concerned;<\/li>\n<li>contact details of the person reporting the breach (telephone number, e-mail address, USil unit).<\/li>\n<\/ul>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_tta_section][vc_tta_section title=&#8221;Basic data security rules&#8221; tab_id=&#8221;1749119156483-f7dcc20a-5d1d&#8221;]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<ul>\n<li>Only work on your own account in the IT system<br \/>\nto which you have been granted access;<\/li>\n<li>Create strong passwords for systems consisting of at least several characters, including lowercase and uppercase letters, numbers and special characters. Do not use words that can be found in dictionaries to create passwords, do not use your personal data such as first names, surname, date of birth, etc.;<\/li>\n<li>Keep your passwords and IDs to yourself: do not share your passwords with anyone, do not write them down in a visible place, keep your IDs for accessing IT systems safe;<\/li>\n<li>Follow the clean screen, clean desk and clean printer rule:<br \/>\n\u2013 do not save files on your computer desktop, keep only standard desktop icons;<br \/>\n\u2013 lock your computer if you leave your workplace even for a moment (Windows key + L);<br \/>\n\u2013 collect printouts and copies from printers\/photocopiers immediately after printing\/copying;<br \/>\n\u2013 when you finish work, put documents away in lockable cabinets and desks;<\/li>\n<li>Protect media containing personal data from loss, theft or damage;<\/li>\n<li>Destroy media containing data that you no longer need \u2013 destroy paper documents in a shredder or put them in a \u2018secure bin\u2019;<\/li>\n<li>Be careful when discussing work matters \u2013 do not disclose<br \/>\ninformation about work in public places (e.g. public transport, restaurants, telephone conversations in public places, etc.) or in private conversations. Maintain the good image of the University of Silesia;<\/li>\n<li>Lock your office when you leave it if no one else is there;<\/li>\n<li>Be careful when using online resources \u2013 email, websites, social media;<\/li>\n<li>Watch out for suspicious text messages;<\/li>\n<li>Protect your personal data by pseudonymising and anonymising it wherever possible.<\/li>\n<\/ul>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column]\r\n                <div class=\"text-modules\">\r\n                    <div class=\"container\">\r\n                        \r\n                        <div class=\"text-modules__content\"><\/p>\n<h3><span style=\"font-size: 16px;\"><strong>Mandatory training on security and personal data protection<\/strong><\/span><\/h3>\n<p><strong>ATTENTION!<\/strong><\/p>\n<p>In order to continuously raise employee awareness of personal data protection, the Data Protection Officer Team recommends regular participation<br \/>\nin available training courses on information security and data protection.<\/p>\n<p>E-learning courses are available on our <a href=\"https:\/\/el.us.edu.pl\/\">Moodle training platform<\/a>.<\/p>\n<p>Links to training courses:<\/p>\n<ul>\n<li><a href=\"https:\/\/el.us.edu.pl\/sw\/course\/view.php?id=2\">Personal data protection \u2013 part 1<\/a>\u00a0(GDPR1)<\/li>\n<li><a href=\"https:\/\/el.us.edu.pl\/sw\/course\/view.php?id=14\">Personal data protection \u2013 part 2<\/a>\u00a0(GDPR2)<\/li>\n<\/ul>\n<p>In addition to the training courses available on the platform, we encourage you to participate in on-site training courses organised by the Data Protection Officer Team.<\/p>\n<p>The training courses are organised on a regular basis. Additionally, the head of a USil unit may request the Data Protection Officer Team to organise a training course.<\/p>\n<p>\n<\/div>\r\n                    <\/div>\r\n                <\/div>[\/vc_column][\/vc_row]<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row el_class=&#8221;container&#8221;][vc_column][vc_tta_accordion style=&#8221;modern&#8221; shape=&#8221;square&#8221; color=&#8221;white&#8221; c_icon=&#8221;chevron&#8221; active_section=&#8221;0&#8243; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221; el_id=&#8221;container&#8221;][vc_tta_section title=&#8221;Examples of personal data breaches&#8221; tab_id=&#8221;1749118917071-7b86e605-a62c&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;What to do in the event of a personal data breach&#8221; tab_id=&#8221;1749118917081-65137491-c55d&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;Basic data security rules&#8221; tab_id=&#8221;1749119156483-f7dcc20a-5d1d&#8221;][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row] [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/us.edu.pl\/en\/bezpieczenstwo\/bezpieczenstwo-i-ochrona-danych-osobowych\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":28,"featured_media":0,"parent":224881,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_expiration-date-status":"","_expiration-date":0,"_expiration-date-type":"","_expiration-date-categories":[],"_expiration-date-options":[]},"acf":[],"_links":{"self":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/232709"}],"collection":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/comments?post=232709"}],"version-history":[{"count":2,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/232709\/revisions"}],"predecessor-version":[{"id":234384,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/232709\/revisions\/234384"}],"up":[{"embeddable":true,"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/pages\/224881"}],"wp:attachment":[{"href":"https:\/\/us.edu.pl\/en\/wp-json\/wp\/v2\/media?parent=232709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}