Effective and compliant data storage is a fundamental part of how modern businesses operate. In an era of digital transformation, where the amount of information collected is growing exponentially, organizations face the challenge of not only managing these resources effectively, but also ensuring their security and compliance with increasingly stringent regulations. Differences in requirements between industries further complicate the picture, forcing companies to implement dedicated solutions tailored to the specific needs of the sector.
This article provides a guide to the legal requirements and technological solutions for data storage in various business sectors. It presents both common challenges and industry-specific aspects, with a focus on the Polish legal and business context.
Shortcuts
- Introduction
- What are the basic legal requirements for data storage in various industries?
- How does RODO affect the storage of personal data in companies?
- What are the specific regulations for data storage in the medical industry?
- What technologies support secure data storage in healthcare?
- What are the best practices for personal data retention?
- What dedicated technology solutions are available to the financial industry?
- What are the data storage challenges in the e-commerce industry?
- What are the requirements for data storage in the manufacturing sector?
- How to store data in the education sector in accordance with regulations?
- How does the public administration manage citizens’ data?
- What are the key differences in data storage between industries?
- What are the legal consequences of data retention violations?
- What innovative solutions, such as blockchain, can revolutionize data storage?
- What are the benefits of using cloud computing for data storage?
- What industries are most vulnerable to penalties for data breaches?
- What are the latest trends in data storage in specific industries?
Introduction
Effective and compliant data storage is a fundamental part of how modern businesses operate. In an era of digital transformation, where the amount of information collected is growing exponentially, organizations face the challenge of not only managing these resources effectively, but also ensuring their security and compliance with increasingly stringent regulations. Differences in requirements between industries further complicate the picture, forcing companies to implement dedicated solutions tailored to the specific needs of the sector.
According to IDC’s 2022 “Global DataSphere Forecast” report, global data volume is expected to reach 175 zettabytes by 2025, a threefold increase compared to 2020. In Poland, according to PARP’s 2023 “Monitoring Trends in Innovation” survey, 68% of medium and large enterprises consider data management a key factor in competitive advantage. At the same time, the 2022 DPA report indicates that the number of reported data protection violations increased by 27% compared to the previous year, highlighting the growing challenges in this area.
This article is a comprehensive guide to the legal requirements and technological solutions for data storage in various business sectors. It presents both common challenges and industry-specific aspects, with a focus on the Polish legal and business context.
📚 Read the complete guide: Backup: Zasada 3-2-1 i najlepsze praktyki backupu
What are the basic legal requirements for data storage in various industries?
The basic legal requirements for data storage in Poland stem from a number of national and international regulations that create a complex web of obligations for businesses. The fundamental piece of legislation is Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016. (RODO), which in Article 5(1)(e) establishes the principle of storage limitation, according to which personal data must be kept in a form that allows the identification of the data subject for no longer than is necessary for the purposes of processing.
At the national level, the key is the Act on Personal Data Protection of May 10, 2018. (Journal of Laws 2018 item 1000, as amended), which clarifies the implementation of RODO in the Polish legal order. In addition, industry-specific legal acts impose specific obligations, such as: Telecommunications Law of July 16, 2004 (Journal of Laws 2004 No. 171 item 1800, as amended), Law on Providing Electronic Services of July 18, 2002 (Journal of Laws 2002 No. 144 item 1204, as amended), Accounting Law of September 29, 1994 (Journal of Laws 1994 No. 121 item 591, as amended), and Law on National Cyber Security System of July 5, 2018. (Journal of Laws 2018 item 1560, as amended).
Under Article 32 of the RODO, controllers and processors are required to implement appropriate technical and organizational measures to ensure data security. This includes pseudonymization and encryption of personal data, the ability to continuously ensure the confidentiality, integrity, availability and resilience of processing systems and services, the ability to quickly restore data availability in the event of an incident, and regular testing and evaluation of the effectiveness of technical and organizational measures. CERT Polska’s 2023 research indicates that only 42% of Polish organizations regularly test the effectiveness of their security measures, a significant gap in terms of legal requirements.
Article 24 of the RODO introduces the principle of accountability, which requires the controller to be able to demonstrate compliance. In practice, this means the need for regular reviews and audits of data storage systems. According to Deloitte’s 2022 “State of Cyber Security in Polish Organizations” survey, only 36% of Polish companies conduct comprehensive data security audits more than once a year, while industry regulations often require more frequent verifications.
Basic legal requirements - summary:
-
Compliance with RODO (Articles 5, 24, 32) - limitation of storage, accountability, appropriate safeguards
-
National legal acts - Personal Data Protection Act and sector regulations
-
Regular audits - obligation to systematically verify compliance and effectiveness of safeguards
-
Documentation of processes - ability to demonstrate compliance with regulations
-
Technical and organizational protection measures - tailored to the risks and nature of the processing
How does RODO affect the storage of personal data in companies?
The RODO has introduced fundamental changes in the approach to storing personal data, significantly raising requirements for organizations. Article 5(2) of the RODO introduces the principle of accountability, according to which a controller must be able to demonstrate compliance with all data processing rules. At the same time, Article 5(1)(e) establishes the principle of limited retention, which requires that data be kept no longer than necessary.
In practice, this means the need for detailed documentation, including a register of processing activities (Article 30 RODO), data security and retention policies, data protection impact assessments (Article 35 RODO) for high-risk processes, and procedures for managing consents and exercising data subjects’ rights. According to the UODO’s 2022 report, failure to comply with the principle of limited retention accounted for 24% of all financial penalties imposed on Polish organizations.
Article 5(1)(c) of the RODO introduces the principle of data minimization, which requires that only data that is adequate, relevant and limited to what is necessary for the purposes of processing be collected. In the context of storage, this means implementing mechanisms for automatic deletion or anonymization of data at the end of the retention period, procedures for regular review of stored data for necessity, systems for classifying data by category and retention periods, and tools for identifying and managing data dispersed across different systems. KPMG’s Privacy Technology 2023 research indicates that only 31% of Polish companies have advanced tools for automated data lifecycle management, which poses a significant challenge in terms of RODO compliance.
The RODO grants data subjects a number of rights that directly affect information retention practices: the right of access (Article 15), the right to rectification (Article 16), the right to erasure (“right to be forgotten,” Article 17), the right to restrict processing (Article 18) and the right to data portability (Article 20). Implementing the technical capacity to realize these rights presents significant organizational and technological challenges. According to EY’s 2023 GDPR Compliance Survey, 42% of Polish organizations report difficulties in comprehensively implementing the right to be forgotten due to fragmented data environments.
Article 32 of the RODO requires the implementation of appropriate technical and organizational measures, taking into account “the state of the art, the cost of implementation and the nature, scope, context and purposes of the processing and the risk of violation of the rights or freedoms of natural persons.” These measures should include encryption and pseudonymization of personal data, mechanisms to ensure the confidentiality, integrity, availability and resilience of systems, procedures for regular testing and evaluation of the effectiveness of safeguards, and the ability to quickly restore access to data in the event of an incident. PWC’s 2023 Digital Trust Insights report indicates that Polish organizations are spending an average of 15% more on data security since the introduction of RODO, but still 47% do not perform regular penetration testing of their data storage systems.
Impact of RODO on data storage - summary:
-
Accountability principle (Article 5(2)) - need to demonstrate compliance through documentation and procedures
-
Storage limitation (Article 5(1)(e)) - storage of data only for the necessary period of time
-
Data minimization (Article 5(1)(c)) - collecting only necessary information
-
Fulfillment of subjects “rights (Articles 15-20) - technical feasibility of fulfilling data subjects” requests
-
Data security (Article 32) - technical and organizational measures appropriate to the risk
What are the specific regulations for data storage in the medical industry?
Medical data regulations
The medical industry is subject to particularly stringent data storage regulations due to the high level of sensitivity of health information. The main legal acts regulating this matter in Poland are:
- The Law on Patients “Rights and Patients” Ombudsman of November 6, 2008. (Journal of Laws 2009 No. 52 item 417, as amended) - Article 29 specifies that medical records should be kept by:
20 years for standard medical records
-
30 years for records in oncology, infectious diseases or related to the death of a patient as a result of injury or poisoning
-
10 years for X-rays stored outside medical records
-
5 years for test referrals or doctor’s orders
-
Ordinance of the Minister of Health of April 6, 2020 on types, scope and models of medical records and the manner of their processing (Journal of Laws 2020, item 666, as amended) - specifies detailed requirements for the form and content of medical records
-
Law on information system in health care of April 28, 2011. (Journal of Laws 2011 No. 113 item 657, as amended) - regulates the rules of operation of ICT systems in health care, including Electronic Medical Records (EMD).
In addition, in the case of conducting clinical trials, the provisions of Regulation (EU) No. 536/2014 of the European Parliament and of the Council of April 16, 2014 on clinical trials of medicinal products for human use apply, which requires the retention of trial records for at least 25 years.
Special protection for genetic data
Genetic data are subject to enhanced protection under both the RODO (Article 9) and national laws. According to Article 9(2)(h) of the RODO, the processing of genetic data is permitted for the purposes of, among others, preventive health care, medical diagnosis or the provision of health care, but provided that the data is processed by an employee subject to the obligation of professional secrecy.
In Poland, additional requirements are introduced by the Law on Laboratory Diagnostics of July 27, 2001 (Journal of Laws 2001 No. 100 item 1083, as amended), which regulates the storage of genetic material and genetic test results. Under its provisions, laboratories must ensure increased standards of security and confidentiality for such data.
According to the NIK’s 2022 report “Personal Data Protection in Medical Facilities,” only 56% of audited medical entities have implemented special procedures for processing genetic data, despite the growing volume of such tests.
Electronic Medical Records (EMD).
The implementation of EDM in Poland is regulated by the Law on the Health Care Information System and implementing regulations. According to these regulations, as of January 1, 2022, medical records should be kept in electronic form, using data exchange standards defined by the e-Health Center.
Key EDM requirements include:
-
Ensure the integrity and authenticity of documentation through the use of electronic signature, electronic seal or trusted profile
-
Guarantee of availability of documentation for the required retention period, regardless of technological changes
-
Ensure interoperability of systems in accordance with HL7 CDA or HL7 FHIR standards
-
Implement mechanisms to control access to documentation in accordance with the principle of minimum privileges
The Center for e-Health’s 2023 report “The State of EDM Implementation in Poland” indicates that 78% of healthcare entities maintain electronic records, but only 43% fully comply with interoperability requirements, which is a significant barrier to the effective exchange of medical data.
Compliance challenges and audits
Medical entities must regularly conduct compliance audits for data storage. According to Article 39.1.1(a) of the Health Information System Law, administrators of health care information systems are required to periodically audit the security of those systems.
In addition, facilities processing health data are required to conduct data protection impact assessments (DPIAs) in accordance with Article 35 of the RODO, as large-scale processing of health data poses risks to the rights and freedoms of individuals.
A survey conducted by the Polish Information Technology Association in 2023 found that only 38% of medical facilities conduct comprehensive data security audits more than once a year, indicating a significant area for improvement.
Specifics of the medical industry - summary:
-
Extended retention periods - obligation to keep medical records for 20-30 years (Article 29 of the Law on Patients’ Rights).
-
Electronic Medical Records - requirements for electronic form, signature and interoperability
-
Special protection of genetic data - increased security standards in accordance with Article 9 of the RODO
-
Regular security audits - obligation to periodically verify health care information systems
-
Access control - strict requirements for medical data authorization
What technologies support secure data storage in healthcare?
Integrated information systems in medicine
The healthcare sector is increasingly turning to advanced technology solutions to securely store and process vast amounts of sensitive data. Key solutions include:
-
Hospital Information System (HIS) - comprehensive medical facility management systems that integrate administrative, clinical and diagnostic modules. According to PMR’s report “Healthcare IT Market in Poland 2023,” the penetration of HIS systems in Polish hospitals is currently 89%, but the degree of functional sophistication varies greatly.
-
Electronic Health Record (EHR) - systems that store a patient’s complete medical history in electronic form. Examples of Polish solutions include AMMS (Asseco), Medicus Online (Kamsoft) or CliniNET (CompuGroup Medical).
-
Picture Archiving and Communication System (PACS) - systems for storing and sharing medical images. According to the e-Health Center, 76% of Polish hospitals will be using PACS systems in 2023.
A key aspect of these systems is Role-Based Access Control (RBAC), which restricts access to data according to the principle of minimum privileges. However, a 2022 report by the Supreme Audit Office (NIK) indicates that 28% of inspected medical facilities were found to have irregularities in managing access privileges to IT systems.
Encryption technologies in health care
Protecting medical data requires advanced cryptographic solutions that ensure the confidentiality of information during both storage and transmission:
-
End-to-end encryption - ensures that data can only be read by authorized parties. In the context of telemedicine, which according to the Central Statistical Office (CSO) already accounted for 18% of all medical services in Poland in 2022, end-to-end encryption is becoming a security standard.
-
Database-level encryption - Technologies such as Transparent Data Encryption (TDE) in Oracle or SQL Server systems enable automatic encryption and decryption of data without application intervention.
-
Homomorphic encryption - enables analysis on encrypted data without decryption. This technology is particularly important in the context of scientific research and medical analytics, although according to Deloitte’s 2023 Healthcare Innovation report, only 7% of Polish medical facilities have implemented or are testing such solutions.
The challenge of implementing advanced cryptographic solutions is the performance of the systems - encryption increases the load on IT infrastructure, which, given the limited budgets of medical facilities, is a significant barrier to adoption. According to a 2022 CSIOZ survey, 32% of Polish hospitals cite insufficient infrastructure performance as a major obstacle to implementing end-to-end encryption solutions.
Blockchain in medical records
Blockchain technology finds application in ensuring the integrity and non-repudiation of medical records. Distributed records make it possible to create immutable records of medical events, which is especially important in the context of long record retention periods.
Benefits of using blockchain in medicine:
-
Guarantee of immutability of medical records
-
Audibility of data access
-
Ability to share data securely between facilities
-
Patient control over access to their data
Implementation challenges:
-
High cost of infrastructure implementation and maintenance
-
Scalability problems with large amounts of data
-
RODO compliance issues (right to erasure vs. immutability of blockchain)
-
Lack of uniform standards
According to the Digital Poland Foundation’s 2023 report “Blockchain in Poland,” only 4% of medical entities in the country have implemented solutions based on the technology, mostly in pilot and research projects. The report also indicates that the average cost of implementing a blockchain system for a medium-sized hospital ranges from PLN 800,000 to PLN 1.2 million, which is a significant barrier to adoption.
Cloud solutions dedicated to medicine
Cloud services dedicated to the medical sector are gaining popularity due to their scalability and flexibility. Key solutions available on the Polish market include:
-
Microsoft Azure for Healthcare - offers compliance with international security standards (ISO 27001, HIPAA) and dedicated tools for medical data management.
-
Google Cloud Healthcare API - enables storage and management of medical data in FHIR, DICOM and HL7v2 standards.
-
Comarch Healthcare Cloud - a Polish cloud solution tailored to local legal and regulatory requirements.
However, the implementation of cloud solutions in health care faces barriers:
-
Concerns about security and confidentiality of medical data
-
Uncertainty regarding compliance with local regulations
-
Limited internet connectivity in some facilities
-
The cost of migrating existing systems to the cloud
The 2023 OSOZ (Nationwide Healthcare System) survey indicates that only 23% of Polish medical facilities use advanced cloud services to store medical data, while 41% say they plan to migrate some of their systems to the cloud in the next 2 years.
Technology in health care - summary:
-
Integrated information systems - HIS, EHR and PACS with role-based access control
-
Advanced encryption - protecting data at rest and during transmission, with performance challenges
-
Blockchain - ensuring documentation immutability with high implementation costs
-
Cloud solutions - scalability and flexibility with security and compliance challenges
-
Cost of technology - a significant barrier to implementing advanced solutions in Polish facilities
What are the best practices for personal data retention?
Data retention policy
Effective management of personal data retention requires a comprehensive approach, starting with the development of a detailed retention policy. This document should clearly define:
-
Categories of data stored - according to Article 30 of the RODO, the register of processing activities should include categories of data, which is the starting point for determining retention strategies.
-
Retention periods - specific deadlines for different types of data, taking into account legal requirements and legitimate business needs.
-
Review procedures - in accordance with the principle of accountability (Article 5(2) of the RODO), the organization should regularly review the timeliness of stored data.
-
Deletion methods - technical procedures to ensure permanent and secure deletion of data after the retention period.
EY’s 2023 Data Privacy Benchmark study indicates that 74% of large Polish companies have a formal data retention policy, but only 38% of small and medium-sized companies have such a document. At the same time, according to the UODO report, irregularities in data retention policies accounted for 19% of all fines imposed in 2022.
Automation of data lifecycle management
With the increasing amount of data being processed, automating retention processes is becoming essential for compliance. Key elements of automation include:
-
Information lifecycle management (ILM) systems - tools that enable automatic transfer of inactive data to archives and their deletion after the retention period.
-
Data classification technologies - solutions, often using artificial intelligence, that automatically categorize data by sensitivity level and retention requirements.
-
Personal data detection tools - systems that scan repositories for information subject to RODO regulations.
Automation challenges:
-
High cost of advanced tools
-
Implementation complexity in heterogeneous IT environments
-
Risk of data misclassification
-
Need to regularly update automation rules
According to Deloitte’s 2023 Technology Trends in Data Management report, Polish organizations spend on average 34% less on data retention automation tools than the European average, which translates into a higher risk of regulatory non-compliance.
Methods of secure data deletion
Proper deletion of data requires methods to ensure that it cannot be recovered. Depending on the category of data and media, different techniques are used:
-
Software overwrite - repeatedly overwriting areas of a disk containing deleted data. Standards such as DoD 5220.22-M and NIST 800-88 define standards for secure overwriting.
-
Degaussing - demagnetization of magnetic media, effectively removing all data.
-
Physical destruction - for media containing particularly sensitive information, such as hard drives storing medical or financial data.
-
Cryptographic deletion - encrypting the data and then destroying the encryption key, making the data unrecoverable.
CERT Polska’s 2023 survey indicates that 41% of Polish organizations do not use any advanced data deletion methods, limiting themselves to standard file deletion, which does not ensure the actual removal of information from media.
Audit and documentation of the retention process
Regular retention policy compliance audits are a key component of data management. Organizations should systematically review:
-
Compliance with specified deadlines - whether data is stored in accordance with accepted retention periods.
-
Efficiency of deletion processes - whether procedures for permanent deletion of data are effectively implemented.
-
Completeness of documentation - whether the organization is able to demonstrate compliance with the principle of accountability.
-
Backup environments - whether backups are included in retention and deletion processes.
Audit results should be documented and analyzed for potential improvements. According to PWC’s 2023 Cybersecurity and Privacy Survey, only 29% of Polish companies conduct comprehensive data retention policy compliance audits more than once a year.
The cost of non-compliance can be significant - according to an analysis by law firm Maruta Wachta, the average cost of legal services for proceedings before the DPA in cases involving improper data retention ranges from PLN 15,000 to 45,000, not including potential financial penalties.
Data retention strategies - summary:
-
Comprehensive retention policy - clear definition of data categories and retention periods
-
Process automation - implementation of information lifecycle management systems
-
Secure deletion methods - using techniques that prevent data recovery
-
Regular audits - systematic verification of compliance with retention policy
-
Documentation of compliance - ability to demonstrate compliance with the principle of accountability
What dedicated technology solutions are available to the financial industry?
The financial sector, due to particularly high regulatory requirements and the critical importance of data security, uses advanced, dedicated technological solutions. The legal basis for these solutions includes the Anti-Money Laundering and Countering the Financing of Terrorism Act of March 1, 2018 (Journal of Laws 2018 item 723, as amended) - Article 49 (1) and (2) requires that records of transactions and financial security measures be kept for 5 years from the first day of the year following the year in which the business relationship was terminated or the occasional transaction was carried out. The Banking Law of August 29, 1997 (Journal of Laws 1997 No. 140, item 939, as amended) - Article 105a (4) specifies that institutions may process information constituting bank secrets concerning individuals after the expiration of the obligation for a period of no more than 5 years. Regulation (EU) 2014/65/EU of the European Parliament and of the Council of May 15, 2014 on Markets in Financial Instruments (MiFID II) - Article 16(7) requires records of telephone conversations and electronic correspondence related to transactions to be retained for at least 5 years. Also, the Accounting Act of September 29, 1994 (Journal of Laws 1994 No. 121, item 591, as amended) - Article 74 specifies retention periods for accounting records (5 years for most documents, 3 years for payroll records). According to the FSC’s 2023 report “Information Security in the Financial Sector,” 12% of audited financial institutions were found to have irregularities in compliance with regulations regarding retention periods.
Transaction data management (TDM) systems are the backbone of financial institutions’ IT infrastructure, ensuring not only the secure storage of financial operations information, but also its integrity and non-repudiation. These solutions use advanced data validation mechanisms, transaction logs and multi-layered security features that minimize the risk of unauthorized modification or loss of critical financial information. Solutions such as Oracle Financial Services Analytical Applications and SAS Anti-Money Laundering are used by Poland’s largest banks. In the area of Anti-Money Laundering and Fraud (AML/CFT), modern solutions use artificial intelligence and machine learning to analyze transaction patterns, identifying anomalies that may indicate criminal activity. According to a 2023 survey by the Polish Bank Association (ZBP), 83% of Polish banks have invested in advanced AML/CFT solutions in the past 3 years. Implementation challenges include the high cost of implementation and maintenance (an average of PLN 3-5 million for a medium-sized bank), the need to integrate with existing systems (average implementation time of 12-18 months), complex regulatory compliance requirements, and the need for continuous updates in response to new criminal techniques.
Compliant archiving solutions address the requirements for long-term storage of financial data. WORM (Write Once Read Many) technology ensures the immutability of archived data, required by many financial sector regulations, including the Regulation of the Minister of Development and Finance of March 6, 2017 on ICT systems for brokerage activities. Archiving with timestamping is timestamping that provides proof of data existence at a specific point in time, using trust services that comply with the eIDAS Regulation. Enterprise content management (ECM) systems are comprehensive platforms for document lifecycle management, with functionality to ensure regulatory compliance. According to IDC’s 2023 report “Data Archiving in the Polish Financial Sector,” the average cost of implementing a comprehensive regulatory-compliant archiving system at a medium-sized financial institution is between PLN 800,000 and PLN 1.5 million, and annual maintenance costs account for about 15-20% of this amount.
Tokenization of sensitive data is becoming a standard in protecting financial information, especially in the context of payment card numbers or customer identification data. It involves replacing sensitive data with irreversible tokens that retain the format of the original, but have no value to potential attackers. The benefits of this technology include reducing the scope of the environment subject to PCI DSS, minimizing the risk of a personal data breach, preserving the functionality of business systems, and complying with the principle of data minimization (Article 5(1)(c) of the RODO). Challenges associated with tokenization include the cost of implementation (PLN 300-700k for a medium-sized institution), the impact on the performance of transaction systems, and the need to modify existing applications. A 2023 study by the Foundation for the Development of Non-Cash Transactions indicates that 67% of Polish payment institutions and banks have implemented tokenization solutions, an increase of 22 percentage points compared to 2020.
Solutions for the financial sector - summary:
-
Strict regulations - data retention requirements for 5 years (AML, MiFID II, accounting)
-
Advanced systems - TDM and AML/CFT with high implementation costs (PLN 3-5 million)
-
Regulatory-compliant archiving - WORM and timestamping technologies (PLN 800 thousand - 1.5 million)
-
Tokenization of sensitive data - protection of financial information (PLN 300-700 thousand).
-
Compliance challenges - complex integration with existing systems (12-18 months of implementation)
What are the data storage challenges in the e-commerce industry?
The eCommerce industry faces unique data storage challenges due to the massive amount of information generated by commerce platforms and high expectations for system availability and performance. The scale of data is impressive - according to the 2023 eCommerce Poland report, an average-sized online store in Poland generates between 10 and 50 GB of new transactional and behavioral data per month, and large platforms even generate more than 1 TB. This data is characterized by a wide variety of types: transactional data (orders, payments), customer profiles and purchase history, behavioral data (navigation paths, time spent on pages), product feedback and reviews, and marketing and analytics data. Load volatility is also a challenge - e-commerce is characterized by large fluctuations in traffic, especially during promotional periods and holidays. According to a Gemius PBI study, during Black Friday 2022, traffic on Polish e-commerce platforms increased by 312% on average compared to a normal day. Solutions to these challenges include hybrid database architectures, combining traditional relational systems (SQL) with modern NoSQL solutions and real-time databases. However, it is important to keep in mind the significant cost of infrastructure - the average monthly cost of maintaining a data infrastructure for a medium-sized store is PLN 15-30 thousand (IAB Poland data).
The global nature of e-commerce generates complex challenges with international data protection regulations. The mosaic of regulations includes RODO in Europe (requires consent, data minimization, right to be forgotten), CCPA/CPRA in California (right to opt-out of data sharing), LGPD in Brazil (similar to RODO, but with local distinctions), APPI in Japan (specific data transfer requirements), and POPIA in South Africa (strict consent and notice requirements). Location requirements present additional challenges - some countries (Russia, China, Vietnam) require citizens’ data to be stored on local servers, forcing the maintenance of distributed infrastructure. Different regulations also introduce different requirements for data retention periods: tax records - 5 years in Poland (Tax Ordinance), 7 years in the US (IRS); marketing data - until consent is withdrawn in the EU, 3-4 years in other regions; payment information - different requirements from PCI DSS and local regulators. The consequences of these challenges include the need to implement geographic segmentation of data (average implementation cost of PLN 250-500k), complex systems for managing consents and user preferences, the need for continuous monitoring of regulatory changes (average annual legal cost of PLN 80-150k), and the risk of financial penalties in case of non-compliance (up to 4% of global turnover in the case of RODO).
Personalizing the shopping experience is a key element of competitive advantage in e-commerce, but must be balanced with respect for privacy. Personalization requirements include detailed data on user behavior, browsing and purchase history, demographics and location, and product preferences. At the same time, there are high expectations of privacy: transparent information about the data collected (Article 13 of the DPA), control over the use of personal data, the right to object to profiling (Article 21 of the DPA), and minimization of the data processed (Article 5(1)(c) of the DPA). Solutions balancing these conflicting needs include personalization based on anonymized or pseudonymized data, edge computing - analyzing data locally on the user’s device, recommendation systems using federated learning (without central data collection), and clear privacy policies with granular control over consent. A 2023 CBOS survey indicates that 72% of Polish online consumers value personalized shopping experiences, but at the same time 68% express concerns about the privacy of their data. This contradiction poses a key challenge for the e-commerce industry.
Ensuring business continuity and protecting against data loss is a critical challenge for an industry where even short interruptions in availability can lead to significant losses. According to a 2023 e-Izba report, an hour of unavailability of an online store costs an average of between PLN 5,000 for small stores and more than PLN 100,000 for large e-commerce platforms in Poland. Protection strategies include geographically distributed data centers (active-active or active-passive), automatic real-time data replication, multi-level backup systems (full, differential, incremental) and disaster recovery testing (on average 2-4 times per year). Challenges in this area include the cost of comprehensive DR (Disaster Recovery) solutions - 15% to 30% of total IT spending, the complexity of testing disaster scenarios, the need to maintain data integrity across distributed systems, and balancing cost and protection levels (RPO/RTO). According to PMR’s 2023 “IT in e-commerce” study, only 48% of Polish e-commerce companies have comprehensive business continuity plans regularly tested in practice, which is a significant business risk.
E-commerce challenges - summary:
-
Huge data volumes - 10-50 GB per month for medium-sized stores, more than 1 TB for large platforms
-
International compliance - a complex patchwork of regulations with implementation costs of 250-500K.
-
Personalization-privacy balance - 72% of consumers value personalization, 68% are concerned about privacy
-
Business continuity - cost of downtime 5-100k/hr, DR expenses 15-30% of IT budget
-
Variable loads - traffic growth of up to 312% during sales peaks
What are the requirements for data storage in the manufacturing sector?
The manufacturing and industrial sector is subject to specific regulations on data retention, which stem from both general legislation and industry-specific regulations. The Act of August 30, 2002 on the conformity assessment system (Journal of Laws 2002 No. 166 item 1360, as amended) in Article 13(1) obliges manufacturers to store technical documentation and declarations of conformity for a period of 10 years from the date the product is placed on the market. Regulation (EU) 2016/425 of the European Parliament and of the Council of March 9, 2016 on personal protective equipment in Article 8 (3) requires technical documentation to be kept for a period of 10 years after the PPE is placed on the market. The General Product Safety Act of December 12, 2003 (Journal of Laws 2003 No. 229, item 2275, as amended) requires the retention of information enabling the identification of products and their origin. For the pharmaceutical industry, the Ordinance of the Minister of Health of November 9, 2015 on the requirements of Good Manufacturing Practice (Journal of Laws 2015 item 1979) requires certain documents to be kept for at least one year after the expiration date of the batch or at least five years after the release of the batch. According to Siemens Industry’s 2023 “Digitization of Polish Industry” report, 47% of Polish manufacturing companies report difficulties in ensuring data storage compliance with regulatory requirements. The average cost of implementing systems to ensure compliance is PLN 180-350 thousand for a medium-sized manufacturing plant.
The industrial sector is seeing rapid growth in solutions for storing and analyzing data from operational systems (OT) and the Industrial Internet of Things (IIoT). Data sources and types include SCADA and DCS systems generating process data, IIoT sensors monitoring machine and process parameters, production quality monitoring systems, and industrial automation data. The scale of data is significant - according to ABB’s 2023 report “Industrial IoT in Poland,” a medium-sized manufacturing plant generates 2 to 5 TB of data per month, of which only 15-20% is currently being effectively analyzed and used. Key challenges in this area include integrating IT and OT systems (different protocols, security standards), ensuring process data security, storing high-resolution historical data, and real-time analytics. Platforms such as Siemens MindSphere, ABB Ability, GE Predix, SAP IoT or Microsoft Azure IoT are used to manage industrial data. The cost of implementing a comprehensive IIoT platform for a medium-sized manufacturing plant in Poland ranges from PLN 500,000 to 1.2 million, with an annual maintenance cost of PLN 120-280,000 (data from the Polish Chamber of Commerce for Advanced Technologies, 2023).
An important trend is the implementation of edge computing architecture, which allows pre-processing of data close to its source. Benefits of this approach include reduction of process-critical latency, reduced cost of transferring data to the cloud, increased resilience to connectivity issues, and local processing of sensitive data. Applications include predictive machine maintenance, real-time quality control, automated process optimization and occupational safety systems. Challenges of edge computing include management of distributed infrastructure, synchronization of data between edge and center, limited computing resources at the edge, and security issues of distributed systems. Digital Poland’s 2023 study “Industry 4.0 in Poland” indicates that 28% of Polish manufacturing companies have implemented edge computing solutions, with another 32% planning such implementations in the next 24 months. The average return on investment (ROI) for such projects is 14-26 months.
Szczególnym wyzwaniem jest zabezpieczanie styku między systemami IT i OT, które tradycyjnie funkcjonowały w izolacji. Zagrożenia obejmują ataki na infrastrukturę krytyczną przez podatne systemy OT, rozprzestrzenianie się złośliwego oprogramowania między sieciami, nieautoryzowany dostęp do systemów sterowania produkcją oraz manipulację danymi procesowymi wpływającą na decyzje biznesowe. Strategie ochrony obejmują segmentację sieci i strefy zdemilitaryzowane (DMZ), kontrolery bram przemysłowych (Industrial Gateway), jednokierunkowe diody danych dla krytycznych systemów oraz zaawansowane systemy wykrywania anomalii. Koszty i wyzwania w tym obszarze to kompleksowe zabezpieczenie styku IT/OT (250-750 tys. zł), konieczność zaangażowania specjalistów z obu dziedzin, równoważenie bezpieczeństwa i wydajności operacyjnej oraz regularne testy penetracyjne i audyty (100-180 tys. zł rocznie). Raport NASK “Bezpieczeństwo OT w Polsce” z 2023 roku wskazuje, że 53% polskich przedsiębiorstw przemysłowych doświadczyło incydentów bezpieczeństwa na styku IT/OT w ciągu ostatnich 24 miesięcy, a średni koszt poważnego incydentu wyniósł 1,7 mln złotych.
Specifics of the industrial sector - summary:
-
Industry regulations - obligation to keep technical documentation for 10 years
-
Huge data volumes - 2-5 TB per month from OT and IIoT systems, only 15-20% utilized
-
Edge computing - implemented in 28% of enterprises, ROI 14-26 months
-
IT/OT security - incidents in 53% of companies, average cost of major incident PLN 1.7 million
-
Data management platforms - implementation costs 500 thousand - 1.2 million zlotys, maintenance 120-280 thousand zlotys per year.
How to store data in the education sector in accordance with regulations?
The education sector is subject to specific regulations regarding the storage of personal data of pupils, students and employees. The legal basis is the Law of December 14, 2016. - Education Law (Journal of Laws 2017, item 59, as amended), together with implementing regulations governing the scope of data collected and the manner of keeping educational records. The Ordinance of the Minister of National Education of August 25, 2017 on the manner in which public kindergartens, schools and institutions keep records of the course of teaching, educational and caring activities, as well as the types of such documentation (Journal of Laws 2017 item 1646) stipulates that grade sheets are kept for 50 years, lesson diaries for 5 years, and resolutions of the board of education for 50 years. Law of July 20, 2018. - Law on Higher Education and Science (Journal of Laws 2018 item 1668, as amended) - Article 347 regulates the functioning of the POL-on Integrated Information System for Higher Education and Science and the scope of data to be processed. Ordinance of the Minister of Science and Higher Education of September 27, 2018 on studies (Journal of Laws 2018, item 1861) - § 15 stipulates that records of the course of studies shall be kept for 50 years. According to the NIK’s 2022 report “Personal Data Protection in Educational Institutions,” 64% of inspected schools showed significant irregularities in the storage of student data, indicating significant challenges in ensuring compliance.
Educational institutions face unique data retention challenges. A key problem is long retention periods - the need to keep records for decades (up to 50 years) while technology changes. The variety of data includes personal data of students and their guardians, educational results and coursework, behavioral data from e-learning systems, data of a special nature (e.g., health information), and copyrighted educational materials. Limited IT budgets are also a significant challenge - according to the FRSE (Foundation for the Development of the Education System) 2023 report, Polish educational institutions spend on average 68% less on IT infrastructure and data security than similar institutions in Western Europe. Fragmentation of systems is also a problem - a lack of uniform standards and technological solutions, leading to inefficiencies and interoperability problems.
Educational institutions process special categories of personal data that require higher standards of protection. These include health information (e.g., disabilities, chronic diseases), data on ethnic and national origin, information on family and economic situation, biometric data (in access control systems), and information on religious beliefs. The legal basis for processing this data is Article 9(2)(g) of the RODO, according to which the processing of special categories of data is possible when it is necessary for reasons of important public interest. In the Polish legal system, such a basis is provided, among others, by Article 155 of the Education Law regarding information about the health of a student. Required safeguards include limiting access to sensitive data, encryption of databases and transmissions, pseudonymization in analytical processes, and special retention and deletion procedures. According to a 2023 survey by the Polish Educational Association, only 37% of educational institutions have implemented dedicated procedures for processing special categories of data, while 86% process such data in their daily operations.
Educational institutions are using dedicated data management systems. Electronic diaries, such as Librus, Vulcan, MobiReg and ProgMan, are used by 92% of primary and secondary schools, according to 2023 MEN data. Universities are dominated by the University Student Service System (USOS), used by most Polish public universities. E-learning platforms - Moodle, Microsoft Teams for Education, Google Classroom, as well as knowledge and library management systems - dLibra, Alma, Koha - are gaining popularity. Technological challenges include implementation costs (PLN 150-400 thousand for a medium-sized school), integrating different systems and ensuring data flow, training staff (often with limited digital competencies), and ensuring regulatory compliance when migrating to new systems.
Requirements for the education sector - summary:
-
Long retention periods - records kept for up to 50 years (grade sheets, student records)
-
Sensitive data - 86% of facilities process special category data, only 37% have dedicated procedures
-
Limited budgets - IT spending 68% lower than in Western Europe
-
Widespread systems - 92% of schools use electronic diaries
-
Irregularities - 64% of inspected schools showed problems with storing student data
How does the public administration manage citizens’ data?
Public administration is subject to specific regulations regarding the preservation of citizen records and official documents. The Act of July 14, 1983 on the national archival resource and archives (Journal of Laws 1983 No. 38, item 173, as amended) is the basic legal act regulating the rules for handling documentation in public administration. The Ordinance of the Prime Minister of January 18, 2011 on the Registry Instruction, Uniform Material File Lists and the Instruction on the Organization and Scope of Operation of Company Archives (Journal of Laws 2011 No. 14, item 67) specifies specific retention periods for individual categories of documents: category A are documents of permanent historical value, stored in perpetuity, and category B (with a number) are documents of temporary practical value, e.g. B5 means storage for 5 years. The Law of February 17, 2005 on the computerization of the activities of entities performing public tasks (Journal of Laws 2005 No. 64, item 565, as amended) regulates electronic record keeping in the administration. The Act of September 5, 2016 on trust services and electronic identification (Journal of Laws 2016 item 1579) sets out the rules for verifying identity in electronic communications. According to the NIK report “Informatization of Public Administration” of 2023, 47% of audited units do not fully comply with the requirements for electronic records management, which leads to irregularities in the storage of citizens’ data.
The Electronic Document Management System is a key element of the digitization of public administration in Poland. The legal basis is Article 6(1a) of the Act on National Archive Resources and Archives, which allows records to be maintained in electronic form. According to NASK’s 2023 data, 68% of government and 41% of local government units use EZD as the primary means of documenting matters. Key systems include EZD PUW (developed by the Podlaskie Voivodship Office), EZD RP (a nationwide system developed by NASK) and commercial systems (e.g. FINN, PROTON, eDokument). Challenges of implementation include cost (PLN 500,000 - 2 million for a medium-sized office), migration of archived paper documents, interoperability with domain systems, and long-term storage of electronic documents. NASK’s 2023 report “The State of Computerization of Public Administration” indicates that full implementation of EZD leads to a 30-40% reduction in document handling costs and a reduction in case handling time by an average of 35%, which represents significant business value.
Public administration, as the depository of critical data of citizens and the state, is subject to special security requirements. The National Cyber Security Framework and the National Cyber Security System Act of July 5, 2018. (Journal of Laws 2018 item 1560) impose specific obligations on operators of critical services, including public administration units. Required safeguards include multi-level authentication systems, advanced encryption of sensitive data, dedicated, isolated government networks, regular penetration tests and security audits, and business continuity and disaster recovery plans. Security challenges include limited IT budgets (an average of 2-4% of an entity’s budget), difficulty in recruiting and retaining cyber security specialists, aging infrastructure in some entities, and a growing number of targeted attacks on government. According to CERT Polska’s 2022 report, public administration units were the target of 27% of all advanced cyberattacks in Poland, highlighting the scale of the threat.
Administrative units must balance their obligation to provide public information with the protection of personal data. The legal bases are the Law of September 6, 2001 on Access to Public Information (Journal of Laws 2001 No. 112 item 1198), the Law of February 25, 2016 on Re-use of Public Sector Information (Journal of Laws 2016 item 352), as well as RODO and the Law on Personal Data Protection. Data sharing requirements include anonymizing or pseudonymizing personal data, verifying the legal basis for processing, and assessing the proportionality of sharing. Technical challenges include automatic identification of personal data in documents, effective anonymization while preserving information value, and managing access to data with different classifications. A 2023 study by the eState Foundation indicates that 73% of analyzed BIPs (Public Information Bulletins) contain inadequacies in the anonymization of personal data, demonstrating the difficulty of balancing transparency and privacy in practice.
Public administration - summary:
-
Varied retention periods - from category B documents (several years) to category A (perpetual)
-
Electronic Records Management - 68% of government entities, cost reduction of 30-40%
-
High threat of cyber attacks - 27% of advanced attacks targeting administration
-
Security challenges - limited IT budgets (2-4% of entity budget)
-
Problems with anonymization - irregularities in 73% of public information bulletins
What are the key differences in data storage between industries?
Requirements for data retention periods represent one of the most pronounced differences between sectors. In the medical industry, patient records must be retained for 20-30 years, requiring the implementation of solutions to ensure long-term data availability and readability, even in the face of changing technology. In contrast, the e-commerce sector can delete some transaction data after just a few years, retaining only the information required by tax or accounting regulations. Financial institutions must retain transaction records for periods specified by sector regulations (e.g., 5 years for AML records), while ensuring that they are unassailable and auditable. The table below provides a detailed comparison:
| Industry | Data type | Retention period | Legal basis |
|---|---|---|---|
| Medical | Standard documentation | 20 years | Article 29 of the Law on Patients’ Rights |
| Oncology/infectious disease records | 30 years | Article 29 (1) (4) of the Law on Patients’ Rights | |
| X-rays | 10 years | Article 29 (1) (2) of the Law on Patients’ Rights | |
| Financial | AML documentation | 5 years | Article 49 of the Anti-Money Laundering Law |
| Accounting records | 5 years | Article 74 of the Accounting Law | |
| Call recordings (MiFID II) | 5 years | Article 16(7) of MiFID II | |
| E-commerce | Transaction data | 5 years | Tax regulations |
| Marketing data | To withdraw consent | Article 6(1)(a) of the RODO | |
| System logs | 1-2 years | Internal policies | |
| Education | Evaluation sheets | 50 years | MEN Regulation on documentation |
| Classroom diaries | 5 years | MEN Regulation on documentation | |
| Student documentation | 50 years | Regulation of the Ministry of Science and Higher Education on studies | |
| Administration | Cat A documents | Perpetually | Law on Archives |
| Cat B documents | By category (e.g., B5 - 5 years) | Ordinance on the Registry Instruction |
The UODO’s 2023 report “Data Retention Practices in Poland” indicates that 42% of organizations keep data longer than required by regulations, which generates additional costs and increases the risk of breaches.
The level of sensitivity and categories of data stored vary significantly between industries, which translates into different security requirements. The healthcare sector operates on particularly sensitive medical data that requires the highest level of protection, including advanced encryption, strict access control and comprehensive auditing mechanisms. The financial industry processes critical transactional data, the compromise of which could lead to direct financial losses, necessitating the implementation of multi-layered security and anomaly detection systems. The e-commerce sector, while also processing financial data, focuses more on protecting information about consumer behavior, which is a key business resource. Education collects performance and achievement data, behavioral and developmental information, and sometimes health (e.g., disability) data. Public administration operates on citizen identification data, legal status information, property information, and tax, health and court data. Data on security costs from IDC’s 2023 report “Data Security in Poland” shows significant differences: health care - 350-700 PLN/patient record, finance - 280-550 PLN/customer, e-commerce - 120-300 PLN/customer, education - 80-180 PLN/pupil, public administration - 200-450 PLN/citizen.
The approach to the use of cloud technologies also varies significantly between industries. Healthcare shows the lowest adoption, with 23% of facilities (CSIOZ 2023 report), preferring private and hybrid clouds due to concerns about medical data security and regulatory compliance. The average budget for migration is 400-900K for the average facility. The financial sector shows moderate adoption, with 47% of institutions (ZBP 2023 report) preferring dedicated clouds that meet FSA requirements. The main barriers are stringent regulations and the need to control data, and the average budget for migration is PLN 1.2-3 million for the average institution. E-commerce is leading the way in cloud adoption, with 78% of companies (e-Isba 2023 report) preferring public global clouds due to scalability, flexibility and global availability. The average migration budget is 250-650K for the average platform. Education shows 56% adoption (FRSE 2023 report), preferring public clouds with education suites due to low cost and ease of deployment. The average budget for migration is PLN 80-250k for the average institution. Public administration has the lowest adoption after medicine - 31% of units (NASK 2023 report), preferring government clouds and national solutions due to security requirements and data sovereignty. The average budget for migration is PLN 500k - PLN 1.5 million for the average unit.
Inter-industry comparison - summary:
-
Retention periods - from a few years in e-commerce to 50 years in education and perpetual in government
-
Data sensitivity - highest security costs in medicine (£350-700/record) and finance (£280-550/client)
-
Cloud adoption - highest in e-commerce (78%), lowest in medicine (23%) and administration (31%)
-
Migration budgets - from PLN 80-250 thousand in education to PLN 1.2-3 million in the financial sector
-
Preferred models - from public global clouds (e-commerce) to dedicated national clouds (administration)
What are the legal consequences of data retention violations?
Violations of data retention rules can result in severe financial penalties, which have increased significantly following the introduction of RODO and similar regulations around the world. In the European Union, maximum fines can reach 20 million euros or 4% of an organization’s global annual turnover (whichever is higher), according to Article 83 of RODO. In practice, this means that even for large corporations, potential penalties pose a serious financial risk. According to the UODO’s report for 2018-2023, the total amount of fines imposed in Poland amounted to more than 12 million zlotys, a significant part of which concerned improper data storage. Selected examples of fines in Poland include PLN 2.8 million for a telecommunications company for improperly securing customer data (2019), PLN 1.9 million for a bank for violating the principle of transparency and data minimization (2020), PLN 1.1 million for an e-commerce platform for insufficient data security measures (2021), and PLN 856,000 for an energy company for violating the principle of limited storage (2022). The amount of fines imposed depends on a number of factors: the nature, severity and duration of the breach, willfulness or negligence, actions taken to minimize the damage, previous violations and the degree of cooperation with the supervisory authority, the categories of personal data affected. According to an analysis by the law firm Maruta Wachta, the average amount of fines for data storage violations in Poland in 2021-2022 was around PLN 450,000, with an upward trend evident.
In addition to administrative penalties, civil lawsuits brought by those affected by violations are a serious risk. Article 82 of the RODO grants data subjects the right to compensation for tangible and intangible damages resulting from violations. Types of claims include compensation for tangible harm (e.g., loss of funds), compensation for intangible harm (e.g., stress, invasion of privacy), and class action lawsuits in cases of mass violations. According to the 2022 report of the Warsaw District Court, the number of lawsuits for data protection violations increased by 37% compared to the previous year. The cost of damages is the average value of damages in individual cases: PLN 5-15 thousand, potential costs of class actions: from several hundred thousand to several million, and additional legal fees: PLN 50-150 thousand per case. According to an analysis by the law firm Traple Konarski Podrecki and Partners in 2023, the total cost of a major data breach (taking into account the DPA’s penalties, damages and legal fees) could be between PLN 2-7 million for a medium-sized organization in Poland.
The reputational consequences of a data breach can be as severe as legal sanctions. According to the 2023 CBOS survey “Trust in Institutions,” 76% of Poles say they would stop using a company after a serious breach of their personal data. PwC’s 2023 “Cybersecurity & Privacy Impact” analysis indicates that Polish listed companies affected by major data breaches experienced an average 8.7% decrease in capitalization in the 6 months following the incident. Reputation restoration costs include communication and PR campaigns (PLN 200-700K), remediation programs for those affected (PLN 100-300/person), enhanced security measures (PLN 300-800K) and external audits (PLN 100-250K). According to the Institute for Reputation Management’s 2023 report, the average time to rebuild full trust after a major data breach is 18-24 months, and 15% of companies never regain their previous level of trust. The 2023 IBRiS study indicates that the industries most at risk of losing trust after data breaches are banking (57% drop in trust), health care (53% drop) and e-commerce (41% drop).
In industries subject to specific sector regulations, violations of data retention rules can lead to additional administrative sanctions. In the financial sector, these can include penalties imposed by the FSC (up to 10% of annual revenue), temporary restriction or suspension of operations, mandatory external audits (costing PLN 150-400 thousand), and increased supervision by the regulator (monthly/quarterly reports). For example, in 2022, the FSA imposed a fine of PLN 5 million on a bank for violations related to customer data security, regardless of the proceedings of the DPA. In healthcare, consequences may include fines imposed by the National Health Service (up to 2% of the contract value), exclusion from reimbursement programs, extraordinary inspections (an average of 3-5 additional inspections per year) and mandatory patient notification (costing PLN 50-100/patient). The telecommunications sector may experience fines imposed by the UKE (up to 3% of revenue), additional reporting obligations, and restrictions on frequency and numbering allocations. In the capital market, these may include sanctions from ESMA or the FSA, an obligation to publish information about the violation (current report), and an impact on ratings and access to financial instruments. Data from the Association of Polish Banks 2023 indicates that the additional costs associated with industry sanctions can increase the total cost of a data breach by up to 40-70% compared to standard DPA penalties.
Consequences of violations - summary:
-
RODO penalties - up to €20 million/4% of turnover, in Poland an average of PLN 450,000 for data storage violations
-
Damages - individual 5-15 thousand zlotys, potential class actions up to several million zlotys
-
Loss of reputation - loss of trust by 41-57% depending on industry, recovery time 18-24 months
-
Industry sanctions - additional penalties that increase the cost of a violation by 40-70%
-
Total cost - from PLN 2 to 7 million for a medium-sized organization in Poland
What innovative solutions, such as blockchain, can revolutionize data storage?
Blockchain in data integrity protection
Blockchain technology introduces a revolutionary approach to data storage, offering indisputability and transparency of records without relying on a central administrator:
- Principle of operation - blockchain creates a distributed database in which each new “block” of information contains a cryptographic hash of the previous block, creating an unalterable chain. Modification of any block would require changing all subsequent blocks in the chain, which is virtually impossible with the distributed nature of the register.
- Applications in data management:
Ensure the integrity of electronic documentation
-
Verifiable data access records
-
Unchangeable audit records
-
Managing user consents and preferences
-
Benefits to the organization:
Reduced risk of data manipulation (by 87% according to IBM’s 2023 study)
-
Easier to demonstrate compliance with regulatory requirements
-
Reduction in audit costs (by 30-45% according to PwC)
-
Increase stakeholder confidence
-
Implementation challenges:
High cost of implementation (PLN 700,000 - 1.5 million for a medium-sized organization)
-
Energy consumption (especially for Proof of Work mechanisms)
-
Scalability problems with large data volumes
-
Challenges of RODO compliance (especially the right to erasure)
According to Blockchain Poland’s 2023 report, only 6% of Polish organizations have implemented blockchain-based solutions to manage data integrity, but 23% plan to do so in the next 24 months.
Confidential Computing (Confidential Computing)
Confidential computing is a groundbreaking approach to protecting data during processing, complementing traditional safeguards that protect data at rest and during transmission:
- Working principle - the technology uses hardware-based security enclaves (TEE - Trusted Execution Environment), such as Intel SGX, AMD SEV or ARM TrustZone, which isolate sensitive computing operations. These enclaves create an isolated environment where data is encrypted even during processing, preventing even system administrators or service providers from accessing it.
- Key applications:
Secure analysis of sensitive data in shared environments
-
Protection of cryptographic keys and authentication processes
-
Inter-organizational cooperation on confidential data
-
Processing of regulated data (e.g., medical, financial)
-
Leading solutions:
Microsoft Azure Confidential Computing
-
Google Cloud Confidential VMs
-
IBM Cloud Hyper Protect Services
-
Fortanix Confidential Computing Platform
-
Implementation costs:
Application migration: PLN 150-450k.
- Additional infrastructure costs: +15-30% compared to standard services
- Team training: PLN 25-60 thousand.
According to IDC’s 2023 “Confidential Computing Adoption” survey, only 4% of Polish organizations have implemented solutions based on confidential computing, placing Poland well below the European average (11%). The main barriers to adoption are high costs (indicated by 68% of respondents) and lack of specialists (54%).
Decentralized data storage systems
Decentralized File Storage (DFS) systems offer an alternative to traditional centralized repositories, providing increased resilience and security:
- Principle of operation - files are split into fragments, encrypted and distributed across a network of independent nodes, eliminating a single point of failure.
- Key technologies:
IPFS (InterPlanetary File System) - a communication protocol and P2P network for distributed storage
-
Filecoin - cryptocurrency incentive system for storage space providers
-
Storj - distributed, encrypted cloud storage
-
Sia - decentralized storage platform using blockchain
-
Benefits:
Enhanced resilience to failures and DDoS attacks
-
Reduction in storage costs (30-60% according to Deloitte report)
-
Protection from censorship and central control
-
Potential efficiency improvements due to geographic dispersion
-
Challenges:
Variable data access latency
-
Limited throughput compared to central solutions
-
Problems with deletion of data (right to be forgotten)
-
The complexity of managing encryption keys
Business applications are mainly focused on storing data not subject to strict time constraints, such as long-term archives, backups and multimedia assets. According to Gartner’s 2023 Storage Futures report, decentralized data storage will reach an adoption tipping point in 3-5 years, when costs and performance will equal traditional solutions.
AI in data management
Artificial intelligence and machine learning technologies are revolutionizing data lifecycle management, enabling automated classification, anonymization and storage optimization:
- Key AI applications:
Automatic classification of data by sensitivity and regulatory requirements
-
Intelligent analysis of unstructured data to identify personal information
-
Active monitoring and detection of data access anomalies
-
Anticipate storage needs and optimize resources
-
Automation of anonymization and pseudonymization
-
Effectiveness of AI solutions - according to the McKinsey study “AI in Data Governance,” 2023:
Reduction in data classification time by 75-85%
-
Increase accuracy of sensitive data identification by 35-45%
-
Reduce data management costs by 20-30%
-
Speed up the process of responding to data requests by 60-70%
-
Examples:
Microsoft Purview (formerly Azure Data Catalog)
-
Google Cloud Data Catalog
-
IBM Watson Knowledge Catalog
-
BigID Data Intelligence Platform
-
Collibra Data Intelligence Cloud
-
Implementation costs:
Small organizations: PLN 120-300 thousand.
- Medium-sized organizations: PLN 300-800 thousand.
- Large organizations: 800 thousand - 2 million zloty
Digital Poland’s 2023 report “AI in Polish enterprises” indicates that 23% of Polish medium and large companies are using AI solutions for data management, and another 35% are considering implementing them in the next 12-18 months. The highest adoption is observed in the financial (37%) and telecommunications (31%) sectors.
Innovative technologies - summary:
-
Blockchain - implemented in 6% of Polish organizations, cost of implementation 700 thousand - 1.5 million PLN
-
Confidential calculations - adoption at 4% (below the EU average of 11%), high costs a barrier (according to 68% of companies)
-
Decentralized storage - adoption tipping point projected in 3-5 years
-
AI in data management - 75-85% reduction in classification time, used by 23% of Polish companies
-
AI implementation costs - from PLN 120 thousand for small to PLN 2 million for large organizations
What are the benefits of using cloud computing for data storage?
Cloud service models for data storage
Flexible scalability is one of the most tangible benefits of cloud computing. A variety of service models are available, tailored to an organization’s specific needs:
- Infrastructure as a Service (IaaS) - provides a virtual infrastructure on which an organization deploys and manages its own data storage systems:
Examples: Amazon EC2 + EBS, Microsoft Azure Virtual Machines + Disk Storage, Google Compute Engine + Persistent Disks.
-
Benefits: maximum control and configuration flexibility
-
Challenges: requires competence in infrastructure management
-
Costs: on average PLN 700-1500 per month per TB of stored data (including infrastructure)
-
Platform as a Service (PaaS) - provides a platform for storing and managing data without managing infrastructure:
Examples: Amazon RDS, Azure SQL Database, Google Cloud SQL, database services like MongoDB Atlas
-
Benefits: reduced administrative burden, automatic updates
-
Challenges: limited control over configuration of lower layers
-
Costs: on average £900-2000 per month per TB of data (higher than IaaS, but with lower personnel costs)
-
Storage as a Service (STaaS) - dedicated data storage services:
Examples: Amazon S3, Azure Blob Storage, Google Cloud Storage
-
Types: object-oriented, block-based, file-based
-
Benefits: high scalability, simple API, optimized costs
-
Challenges: integration with existing applications
-
Costs: from £80 per month per TB for infrequently used data to £450 per TB for frequently used data
According to PMR’s report “Cloud Computing Market in Poland 2023,” 63% of Polish medium and large companies use at least one form of cloud services for data storage, an increase of 17 percentage points over the past 2 years.
Data security in the cloud
The advanced security features offered by leading cloud providers often outstrip the capabilities of in-house IT teams, especially in smaller organizations:
- Key security mechanisms:
Data encryption at rest and during transmission
-
Advanced cryptographic key management systems (KMS)
-
Multi-factor authentication and role-based access control (RBAC)
-
Protection against DDoS attacks
-
Regular pentesting and vulnerability scanning of the infrastructure
-
Physical data center security (biometric access control, 24/7 monitoring)
-
Regulatory Compliance:
ISO 27001, 27017, 27018 certifications
-
Compliance with SOC 1/2/3
-
Industry-specific certifications (PCI DSS, HIPAA, GDPR Compliance)
-
Compliance monitoring and reporting tools
-
Security Challenges:
Shared responsibility model (supplier vs. customer)
-
Risk of improper configuration (main cause of 65% of breaches according to McAfee)
-
Access control of cloud provider administrators
-
Vendor lock-in and dependence on a single supplier
According to KPMG’s 2023 “Cloud Security in Poland” survey, 56% of Polish organizations believe their data is better secured in the cloud than in local data centers, a significant increase from 34% in 2020.
Data redundancy and availability
Global availability and data redundancy are other key benefits of cloud computing:
- Mechanisms for ensuring accessibility:
Multi-Region Replication - automatic replication of data between geographically distant data centers
-
Zone-Redundant Storage - storing copies of data in independent availability zones within a single region
-
Service Level Agreements (SLAs) - 99.9% - 99.999% availability guarantees (a few minutes to a few hours of unavailability per year)
-
Automatic failover - switching to backup systems in case of failure
-
Key parameters:
RTO (Recovery Time Objective) - the time it takes to restore a service after a disaster
-
RPO (Recovery Point Objective) - maximum acceptable period of data loss in case of failure
-
Geographic redundancy costs - an additional 30-70% compared to standard storage
-
Practical applications:
Critical business systems: multi-region, RPO < 5 minutes, RTO < 15 minutes
- Standard business applications: single-region/multi-zone, RPO < 1 hour, RTO < 4 hours
- Archival data: basic redundancy, RPO/RTO in days
Oktawave’s report “Polish Business Cloud 2023” indicates that only 29% of Polish organizations have implemented full geographic redundancy for their critical data, indicating a potential underestimation of the risks associated with local disasters.
**Cost analysis of cloud vs. on-premise solutions **
The pay-as-you-go economic model is a significant advantage of cloud solutions, but a comprehensive cost comparison requires consideration of many factors:
- Cost elements in the traditional (on-premise) model:
CAPEX: hardware infrastructure (servers, arrays, network) - amortization 3-5 years
-
Data center costs (power, cooling, space)
-
Software licenses
-
Personnel costs of the IT team
-
Upgrade and replace equipment (every 3-5 years)
-
Cost elements in the cloud model:
OPEX: monthly charges for resources used
-
Data transfer charges (especially outgoing)
-
Cloud migration costs (one-time)
-
Training and certification of the team
-
Additional services (monitoring, backup, security)
-
Total Cost of Ownership (TCO) analysis - according to Computerworld’s 2023 report “Cloud TCO in Polish Enterprises.”
For small businesses (< 50 employees): cloud cheaper by 35-55%
-
For medium-sized companies (50-250 employees): cloud cheaper by 15-30%
-
For large companies (> 250 employees): mixed results, from savings of 10% to higher costs of 15%
-
Factors affecting profitability:
Load variability (higher benefits with variable load)
-
Scale of operations (economies of scale for large on-premise deployments)
-
Specific performance and regulatory requirements
-
Migration costs of existing systems
Cloud computing - summary:
-
Service models - IaaS (£700-1500/TB), PaaS (£900-2000/TB), STaaS (£80-450/TB)
-
Adoption in Poland - 63% of medium and large companies, up 17 p.p. in 2 years
-
Security - 56% of organizations consider the cloud more secure than local data centers
-
Geographic redundancy - implemented in only 29% of Polish organizations
-
Cost analysis - savings of 35-55% for small companies, 15-30% for medium-sized companies
What industries are most vulnerable to penalties for data breaches?
Health sector
The healthcare sector is at particularly high risk, processing vast amounts of sensitive personal and medical data while operating on an often outdated IT infrastructure:
- Major risk factors:
High sensitivity of medical data (Article 9 of the RODO).
-
Long documentation retention periods (20-30 years)
-
Distributed processing environment (hospitals, clinics, laboratories)
-
Often outdated IT infrastructure (38% of facilities use systems older than 10 years according to the Supreme Audit Office)
-
Shortage of cyber security specialists (average of 0.7 FTEs per facility)
-
Incident statistics:
27% of all data breaches in Poland are in the medical sector (UODO, 2022)
-
Average cost of medical data breach: PLN 1.2 million (PwC, 2023)
-
64% of medical facilities have experienced at least one security incident in the last 24 months (CERT Poland)
-
Key compliance challenges:
Integration of RODO with medical records regulations
-
Management of patient consents (including e-consent)
-
Secure data sharing between healthcare providers
-
Control of access to IT systems (an average of 43 applications in a facility)
-
Recommended actions:
Implementation of dedicated systems for medical records management (EDM)
-
Rigorous staff training (60% of incidents are due to human error)
-
Regular security audits (at least twice a year)
-
Categorize data by sensitivity and specific retention requirements
According to the NIK’s 2023 report “Cyber Security in Health Care,” the average level of security maturity in Polish medical facilities is 2.1 on a 5-point scale, indicating a significant gap from the required level (min. 3.5).
Financial institutions
Financial institutions, due to the nature of the data they process and the potential consequences of data leakage, are also under special oversight by regulators:
- Sector-specific regulations:
Recommendation D of the FSC on the management of information technology and security areas of the information and communications environment
-
Banking Law of August 29, 1997, Articles 9-9f (risk management system).
-
EBA guidelines on ICT and security risk management (EBA/GL/2019/04)
-
DORA (Digital Operational Resilience Act) regulation - new EU requirements coming into force in 2025.
-
Key data categories:
Transaction data (history of operations, balances)
-
Customer identification data (KYC, AML).
-
Credit ratings and scoring
-
Access data to electronic banking systems
-
Incident statistics:
19% of all data breaches in Poland are in the financial sector (UODO, 2022)
-
Average cost of violation: PLN 3.7 million (more than 3x the average for all industries)
-
86% of incidents in the financial sector are detected within 24 hours (vs. 62% average for other industries)
-
Security maturity:
IT security spending: 12-18% of IT budget (vs. average of 8% for other industries)
- Average security maturity level: 3.8/5 (highest among all sectors)
- Dedicated security teams: an average of 8.3 FTEs in a medium-sized bank
Mimo wysokiego poziomu dojrzałości zabezpieczeń, instytucje finansowe pozostają głównym celem zaawansowanych ataków cyberprzestępczych. Według raportu ZBP “Bezpieczeństwo bankowości elektronicznej” z 2023 roku, liczba prób wyłudzeń danych w sektorze bankowym wzrosła o 43% w porównaniu do roku poprzedniego.
Telecommunications and Internet platforms
The telecommunications sector and online platforms process huge amounts of personal and communications data, making them a frequent target of regulators:
- Specific regulations:
Telecommunications Law (Journal of Laws 2004 No. 171 item 1800, as amended).
-
Act on providing services by electronic means (Journal of Laws 2002 No. 144 item 1204, as amended).
-
The e-Privacy Directive (2002/58/EC) and the forthcoming e-Privacy Regulation
-
Articles 174-175 of the Telecommunications Law (data retention)
-
Sensitive sector data:
Communication metadata (who, when, with whom communicated)
-
Location data of users (movement history)
-
Detailed behavioral and demographic profiles
-
Communication content (messages, conversations)
-
Violation statistics:
24% of all DPA penalties apply to the telecommunications sector (2018-2023)
-
Average penalty amount: PLN 1.4 million (second highest after the financial sector)
-
Most common violations: insufficient technical and organizational measures (38%), excessive data retention period (27%)
-
Characteristic challenges:
Huge data volumes (average of 5-12 TB per day for a large operator)
-
Complex technology ecosystems (140+ systems on average in a large telco)
-
Need to balance data retention obligations for law enforcement with privacy protection
-
High expectations of service availability (99.99%) while maintaining security
The UKE’s 2023 “Security of Telecommunications Networks and Services” report indicates that telecom operators reported a total of 423 serious security incidents, 37% of which involved the security of personal data.
E-commerce and retail
E-commerce and retail, due to the processing of payment data and detailed consumer profiles, are also among the high-risk industries:
- Specific regulations:
PCI DSS standard (Payment Card Industry Data Security Standard) - requirements of payment organizations
-
PSD2 Directive and Delegated Regulation on strong customer authentication
-
Law on Consumer Rights (Journal of Laws 2014 item 827 as amended).
-
Geoblocking Regulation (2018/302) on unjustified geoblocking
-
Key data categories:
Payment card data (PAN, CVV, expiration date)
-
Purchase history and buying behavior
-
Address and contact details of customers
-
Information about preferences and interests
-
Incident statistics:
17% of all data breaches in Poland are in the e-commerce sector (UODO, 2022)
-
Average cost of violation: PLN 890,000.
-
73% of payment card-related breaches involve small and medium-sized online stores
-
Industry Challenges:
Seasonality of traffic (increases of 200-400% during promotional periods)
-
The need for rapid integration of multiple systems (an average of 23 integrations in a medium-sized store)
-
Balancing personalization with privacy
-
Growing consumer expectations regarding security (70% of those surveyed cite data security as a key factor in choosing an e-retailer)
According to the e-Isba study “E-commerce in Poland 2023,” only 42% of Polish online stores conduct regular security audits, indicating a significant area for improvement.
High-risk industries - summary:
-
Health care - 27% of all breaches, average cost 1.2 million, security maturity 2.1/5
-
Financial sector - 19% of violations, average cost 3.7 million, highest security maturity 3.8/5
-
Telecommunications - 24% of all DPA fines, average fine of PLN 1.4 million, 423 serious incidents in 2022
-
E-commerce - 17% of violations, average cost of 890K, only 42% of companies conduct regular audits
-
Key difference - security spending: 12-18% of IT budget in finance vs. 4-6% in e-commerce
What are the latest trends in data storage in specific industries?
Trends in health care
In the healthcare sector, we are seeing the rapid development of Federated Medical Data Storage Systems, which allow the secure exchange of information without a central repository:
- Medical data federation:
Based on HL7 FHIR (Fast Healthcare Interoperability Resources) standard.
-
Allows access to data remaining in their original locations
-
Supports standardized API with advanced authorization mechanisms
-
Examples of implementations: P1 (Electronic Platform for Collection, Analysis and Sharing of Digital Resources on Medical Events), regional e-health platforms
-
Genomic platforms:
Dedicated systems for storage and analysis of genetic data
-
Require special security protocols and encryption
-
Handle petabytes of data (a single genome is ~150GB of data)
-
Examples: ABM Genomics Platform, commercial solutions like DNAnexus
-
Advanced anonymization for medical research:
Synthetic medical data techniques (generation of artificial but statistically faithful records)
-
Federated learning (learning models without raw data transfer)
-
Differential privacy adding controlled noise to data
-
Average cost of implementation: PLN 350-750 thousand for a medium-sized research institution
-
Development prospects:
By 2025, 75% of Polish medical facilities will participate in at least one data exchange system
- Medical data volume growth of 36% per year (mainly through imaging and device data)
- Development of regulations for secondary use of medical data
According to PMR’s report “Informatization of Healthcare in Poland 2023,” the market for medical data management solutions will reach PLN 1.2 billion in 2024, growing at an annual rate of 14%.
Trends in the financial sector
The financial industry is increasingly bold in exploring the potential of advanced data processing technologies while prioritizing security and regulatory compliance:
- Homomorphic processing:
Allows analysis of encrypted data without decryption
-
Applications: credit risk analysis, fraud detection, customer segmentation
-
Maintains data confidentiality while enabling advanced analysis
-
Examples of solutions: IBM Security Homomorphic Encryption Services, Microsoft SEAL
-
Challenge: high computational requirements (10-100x greater than standard processing)
-
Data Mesh and Data Fabric:
Decentralized data management architectures
-
Domain approach (data managed by business teams)
-
Standardization of data exchange interfaces between domains
-
Governance federalism with consideration of local regulations
-
Implemented by 23% of Polish financial institutions (ZBP, 2023)
-
Consent Management platforms:
Central repositories of customer consents for data processing
-
Integration with CRM and marketing systems
-
Automatic enforcement of privacy preferences
-
APIs that allow customers to manage their consents
-
Average cost of implementation: PLN 400-900 thousand.
-
Tokenization as a standard:
Replacing sensitive data with tokens without business value
-
Reduction in the scope of the environment subject to PCI DSS by 60-80%
-
Implemented by 84% of banks and 52% of payment institutions
-
Expanding applications beyond payment data (personal data, identification documents)
According to Accenture’s “Banking Technology Vision 2023” report, 76% of Polish financial institutions consider advanced data storage and analysis technologies a key investment priority for the next three years.
Trends in e-commerce and commerce
The dominant trend in the e-commerce industry is hyper-personalization based on advanced data analytics, while respecting users’ privacy:
- Privacy-First Analytics:
Processing behavioral data locally, on the user’s device
-
Mechanisms to limit the transfer of sensitive information to central servers
-
Edge computing technologies and local recommendation systems
-
Examples of solutions: Google Privacy Sandbox, Apple Privacy Framework, Web API-based solutions.
-
Omnichannel data integration:
Unification of data from online and offline channels
-
Customer Data Platforms (CDPs) as central hubs for customer data
-
Identification of cross-device and cross-channel customers
-
Challenges: compliance with RODO (data binding), quality of data from different sources
-
Average cost of CDP implementation: 350-800K for a medium-sized retailer.
-
Product Data Management (PIM):
Centralization of product information in dedicated systems
-
Automation of publishing across multiple sales channels
-
Digital asset management (DAM) integrated with PIM
-
Implemented by 47% of medium and large e-commerce companies (e-Isba report, 2023)
-
ROI of implementation: an average of 127% in 18 months
-
Real-time Data Processing:
Real-time analysis of user behavior
-
Dynamic customization of offerings and content
-
Use of stream processing technologies (Apache Kafka, Amazon Kinesis)
-
Time from event to response less than 200ms
-
Implemented by 31% of e-commerce platforms
According to Santander Consumer Bank’s “E-commerce in Poland 2023” study, companies effectively implementing advanced data management technologies record on average a 23% higher conversion rate and a 17% higher shopping cart value than competitors using traditional solutions.
Cross-industry trends
Some innovative approaches to data storage and management transcend individual industries to offer universal benefits:
- Data Spaces:
A concept promoted by the European Union (European Data Strategy)
-
Secure data sharing environments between organizations
-
Standardization of interoperability mechanisms
-
Maintain owner control over shared data
-
Examples: GAIA-X, International Data Spaces, Catena-X (automotive)
-
Potential economic benefits for the EU: €1.3 trillion by 2027 (EC, 2022)
-
Active management of data archives:
Intelligent categorization of data by access frequency
-
Automatic transfer between storage layers (hot, warm, cold, archive)
-
Optimize costs while maintaining availability
-
Reduces storage costs by 40-65% (Deloitte, 2023)
-
Implemented by 37% of Polish large enterprises
-
Zero-Trust Data Security:
Moving away from a security model based on a trusted internal network
-
Verification of any access to data, regardless of the source
-
Microsegmentation of data resources
-
End-to-end encryption as standard
-
Contextual access risk analysis
-
Average cost of implementation: PLN 250-700 thousand for a medium-sized organization
-
Advanced robotics for data management:
Automate routine data lifecycle management tasks
-
Intelligent bots for data classification and tagging
-
RPA (Robotic Process Automation) in governance processes
-
Average reduction in data management labor: 45-60%
-
ROI of implementation: 180-250% over 2 years
Latest industry trends - summary:
Zero-Trust - a new standard for data security (cost of implementation 250-700 thousand zlotys).
Health care - medical data federation, genomic platforms (1.2 billion market in 2024)
Financial sector - homomorphic processing, data mesh, tokenization (priority for 76% of institutions)
E-commerce - privacy-first analytics, CDP and omnichannel (23% higher conversion)
Cross-industry trends - data spaces, active archives (savings of 40-65%)
Related Terms
Learn key terms related to this article in our cybersecurity glossary:
- Mass Storage System — A mass storage system is a technological infrastructure designed for storing,…
- Cybersecurity — Cybersecurity is a collection of techniques, processes, and practices used to…
- Cybersecurity Incident Management — Cybersecurity incident management is the process of identifying, analyzing,…
- Storage Virtualization — Storage virtualization is a technology that enables consolidation and…
- NIST Cybersecurity Framework — NIST Cybersecurity Framework (NIST CSF) is a set of standards and best…
Learn More
Explore related articles in our knowledge base:
- Integrated IBM Solutions for Data Protection and Resilience: IBM Safeguarded Copy and IBM Storage Sentinel
- Cloud or local data storage - A guide to choosing a solution
- Data storage infrastructure audit: Identify vulnerabilities, optimize performance and security
- How IBM Storage Sentinel Works: Detection, Analysis, and Data Recovery Mechanisms
- What Is Storage and How to Choose the Right Data Storage Solution?
Explore Our Services
Need cybersecurity support? Check out:
- Security Audits - comprehensive security assessment
- Penetration Testing - identify vulnerabilities in your infrastructure
- SOC as a Service - 24/7 security monitoring
