illustration: Bing/CopilotWillingness to share data depends on age, gender, education, and place of residence. Younger individuals and those with higher education are more likely to disclose information, as are men when it comes to permanent discounts and women for one-time promotions. Residents of large cities are more cautious than those from smaller towns.
The most popular benefits that encourage individuals to provide sensitive data include:
- permanent (35%) or one-time (31%) discounts/promotions.
- free products/services (27%),
- free apps/accounts (22%),
- exclusive content (16%),
- personalized offers (15%).
What Data Do We Share and What Are the Risks?
The study by ChronPESEL.pl and the National Debt Register shows that the prospect of gaining additional benefits encourages Polish internet users to share:
- email address (80%),
- first and last name (59%),
- phone number (55%),
- residential address (33%),
- PESEL number (8%),
- identity card number (7%).
Experts warn that sharing email addresses, names, and phone numbers can create risks of phishing and account takeover.
– If this is a special email address that we use, for example, only for shopping or using services, it`s not a problem. It’s worse if we use the same address daily and have provided it, for example, to our bank – warns Bartłomiej Drozd, an expert from ChronPESEL.pl, as quoted by the NEWSERIA agency. – If an email, name, and phone number leak into the hands of cybercriminals, they may attempt to reset passwords and use recovery procedures to take over a bank account.
Despite educational campaigns, 2.4 million Poles do not see the dangers associated with sharing their PESEL number. Some mistakenly believe that blocking their PESEL protects them from all obligations.
A study conducted in April 2024 on a representative group of 1,016 Poles shows that Poles are increasingly aware of the need to protect their personal data, but there is still a need for education regarding the risks associated with sharing data, especially their PESEL number.
COMMERCIAL BREAK
New articles in section Law in media
Blood in the world of media. The IFJ report on journalists killed in 2025
KFi
The International Federation of Journalists has published a shocking document titled 2025 Killed List Report. The increase in violence against media workers is visible all over the world. Last year, 128 people lost their lives. They die because of their courage in revealing facts that authorities try to hide.
Ai in disinformation. Operation Matryoshka and personalization of fakes
Anna Mikołajczyk-Kłębek
The increasing use of artificial intelligence to generate false content and profiled disinformation are trends that will shape the disinformation landscape in the coming years, according to Dr. Wojciech Kotowicz, an expert from the University of Warmia and Mazury (UWM) in Olsztyn, Poland.
Dietary supplement ads in Poland. Who keeps influencers in check?
Newseria, KFi
One in three Polish internet users considers influencer recommendations when deciding on medicines and dietary supplements. Although promotion of such products is regulated, there are still cases of advertising that skirt the law.
See articles on a similar topic:
Illusory Security. Small and Medium Enterprises Easy Targets for Cybercrime
KF
35% of micro, small, and medium enterprises (SMEs) fear the theft of their employees' personal data. This comes from research conducted on behalf of ChronPESEL.pl and the National Debt Register of Poland.
Children’s Online Safety. Clickmeeting Analysis
KrzysztoF
Over half of surveyed parents believe their children are aware of the dangers lurking online. At the same time, just over 40 percent of respondents admit to taking steps to protect their children’s privacy online.
Cyberwarfare on the Internet. The ESET Report
KF
Governments, corporations, and even the education sector are becoming targets of advanced cyber attacks. The report for the period from October 2023 to March 2024, prepared by ESET, sheds light on the intensification of activities by Advanced Persistent Threat (APT) groups, which conduct espionage, sabotage, and destabilization operations in key sectors on behalf of states.
How to Detect Pegasus on Your Phone and Protect Against Spying
RINF
The nature of spyware is to remain as hidden as possible, making it difficult to detect on a device. However, some mechanisms can help verify if a smartphone has been compromised.




























