24.06.2024 Law in media
Data for Benefits: What Encourages Sharing Personal Information Online
Krzysztof Fiedorek
Most Poles are aware of the value of their personal data and do not share it without reason. However, one in five is willing to share data in exchange for benefits, and 16% of us do not remember if we have done so. These are the results of a study conducted by ChronPESEL.pl and the National Debt Register under the patronage of the UODO.

Willingness to share data depends on age, gender, education, and place of residence. Younger individuals and those with higher education are more likely to disclose information, as are men when it comes to permanent discounts and women for one-time promotions. Residents of large cities are more cautious than those from smaller towns.
The most popular benefits that encourage individuals to provide sensitive data include:
- permanent (35%) or one-time (31%) discounts/promotions.
- free products/services (27%),
- free apps/accounts (22%),
- exclusive content (16%),
- personalized offers (15%).
What Data Do We Share and What Are the Risks?
The study by ChronPESEL.pl and the National Debt Register shows that the prospect of gaining additional benefits encourages Polish internet users to share:
- email address (80%),
- first and last name (59%),
- phone number (55%),
- residential address (33%),
- PESEL number (8%),
- identity card number (7%).
Experts warn that sharing email addresses, names, and phone numbers can create risks of phishing and account takeover.
– If this is a special email address that we use, for example, only for shopping or using services, it`s not a problem. It’s worse if we use the same address daily and have provided it, for example, to our bank – warns Bartłomiej Drozd, an expert from ChronPESEL.pl, as quoted by the NEWSERIA agency. – If an email, name, and phone number leak into the hands of cybercriminals, they may attempt to reset passwords and use recovery procedures to take over a bank account.
Despite educational campaigns, 2.4 million Poles do not see the dangers associated with sharing their PESEL number. Some mistakenly believe that blocking their PESEL protects them from all obligations.
A study conducted in April 2024 on a representative group of 1,016 Poles shows that Poles are increasingly aware of the need to protect their personal data, but there is still a need for education regarding the risks associated with sharing data, especially their PESEL number.
COMMERCIAL BREAK
New articles in section Law in media
SEO Poisoning. Hackers Use Search Engines to Target Businesses
Piotr Rozmiarek
Search engines help us quickly find information, but they can also be used by cybercriminals. SEO poisoning is a tactic where attackers manipulate search engine rankings to place harmful websites at the top of search results.
Phishing in the Cryptocurrency Industry. Fake Recruitments Steal Data
Piotr Rozmiarek
Security researchers have detected a social engineering campaign targeting job seekers in the Web3 industry. The attack aims to conduct fake job interviews via a meeting application that installs information-stealing malware.
SLAPP Lawsuits in Europe. How Journalists and Activists Are Silenced
Krzysztof Fiedorek
The number of strategic lawsuits aimed at intimidating journalists, activists, and civil society organizations is increasing in Europe. According to the CASE SLAPPs Report 2024, as many as 1,049 such cases were identified between 2010 and 2023.
See articles on a similar topic:
Children’s Online Safety. Clickmeeting Analysis
KrzysztoF
Over half of surveyed parents believe their children are aware of the dangers lurking online. At the same time, just over 40 percent of respondents admit to taking steps to protect their children’s privacy online.
GDPR in Media. Regulations Complicate Campaign Planning and Execution
BARD
Most Polish news portals and online stores have adopted consent mechanisms designed in a way that makes it hard to refuse consent
How to Detect Pegasus on Your Phone and Protect Against Spying
RINF
The nature of spyware is to remain as hidden as possible, making it difficult to detect on a device. However, some mechanisms can help verify if a smartphone has been compromised.
Cyber Attack on a Corporate Smartphone. How to Protect Yourself
KrzysztoF
Internet-connected mobile devices are an attractive target for cybercriminals. The key to protecting sensitive business data is employee awareness, hardware solutions, and appropriate software. This mini-guide provides a quick overview of how to protect each of these areas.