{"id":598,"date":"2022-12-16T13:24:08","date_gmt":"2022-12-16T12:24:08","guid":{"rendered":"https:\/\/www.outsourcing-iod.pl\/?page_id=598"},"modified":"2023-03-08T12:27:38","modified_gmt":"2023-03-08T11:27:38","slug":"co-to-sa-dane-osobowe","status":"publish","type":"page","link":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/","title":{"rendered":"<h1>Co to s\u0105\u00a0dane osobowe?<\/h1>"},"content":{"rendered":"<p>Danymi osobowymi nazywamy wszelkie informacje kt\u00f3re pozwol\u0105 nam w spos\u00f3b po\u015bredni lub bezpo\u015bredni zidentyfikowa\u0107 osob\u0119 fizyczn\u0105. Nale\u017cy mie\u0107 na uwadze i\u017c dan\u0105 osobow\u0105 b\u0119dzie r\u00f3wnie\u017c informacja kt\u00f3ra umo\u017cliwi nam zidentyfikowanie danej osoby fizycznej, bez wzgl\u0119du na to czy zamierzamy j\u0105 zidentyfikowa\u0107 czy te\u017c nie. Sama mo\u017cliwo\u015b\u0107 identyfikacji danej np.: poprzez wykazanie swojego interesu prawnego powoduje i\u017c mamy do czynienia z dan\u0105 osobow\u0105. Za dan\u0105 osobow\u0105 mog\u0105 by\u0107&nbsp;r\u00f3wnie\u017c uznane dany nieprawdziwe, kt\u00f3re gromadzimy w odniesieniu do danej osoby. Pami\u0119tajmy i\u017c w o danych osobowych m\u00f3wimy tylko w odniesieniu do os\u00f3b \u017cyj\u0105cych.<\/p>\n<p>Dane osobowe dzielimy na dane zwyk\u0142e oraz dane sensytywne. W <em>art. 9 ust. 1 RODO<\/em> zosta\u0142a sformu\u0142owany katalog zamkni\u0119ty danych sensytywnych. S\u0105 to:<br \/>\n\u2013 pochodzenie rasowe lub etniczne,<br \/>\n\u2013 pogl\u0105dy polityczne,<br \/>\n\u2013 przekonania religijne lub \u015bwiatopogl\u0105dowe,<br \/>\n\u2013 przynale\u017cno\u015b\u0107 do zwi\u0105zk\u00f3w zawodowych oraz<br \/>\n\u2013 dane genetyczne,<br \/>\n\u2013 dane biometryczne przetwarzane w celu jednoznacznego zidentyfikowania osoby fizycznej<br \/>\nlub dane dotycz\u0105ce zdrowia, seksualno\u015bci lub orientacji seksualnej danej osoby.<br \/>\nPozosta\u0142e dane osobowe kt\u00f3re nie wyst\u0119puj\u0105 w art. 9 ust. 1 RODO kwalifikujemy jako dane zwyk\u0142e.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Danymi osobowymi nazywamy wszelkie informacje kt\u00f3re pozwol\u0105 nam w spos\u00f3b po\u015bredni lub bezpo\u015bredni zidentyfikowa\u0107 osob\u0119 fizyczn\u0105. Nale\u017cy mie\u0107 na uwadze i\u017c dan\u0105 osobow\u0105 b\u0119dzie r\u00f3wnie\u017c informacja kt\u00f3ra umo\u017cliwi nam zidentyfikowanie danej osoby fizycznej, bez wzgl\u0119du na to czy zamierzamy j\u0105 zidentyfikowa\u0107 czy te\u017c nie. Sama mo\u017cliwo\u015b\u0107 identyfikacji danej np.: poprzez wykazanie swojego interesu prawnego powoduje<a href=\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"categories":[],"tags":[67,68],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.2.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Co to s\u0105\u00a0dane osobowe?<\/title>\n<meta name=\"description\" content=\"Co to s\u0105\u00a0dane osobowe? - w artykule znajdziemy odpowiedz na to pytanie, jak r\u00f3wnie\u017c podzia\u0142 danych osobowych na kategorie.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Co to s\u0105\u00a0dane osobowe?\" \/>\n<meta property=\"og:description\" content=\"Co to s\u0105\u00a0dane osobowe? - w artykule znajdziemy odpowiedz na to pytanie, jak r\u00f3wnie\u017c podzia\u0142 danych osobowych na kategorie.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/\" \/>\n<meta property=\"og:site_name\" content=\"Outsourcing IOD Inspektor Ochrony Danych\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/firma.nformatyczna\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T11:27:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/\",\"url\":\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/\",\"name\":\"Co to s\u0105\u00a0dane osobowe?\",\"isPartOf\":{\"@id\":\"https:\/\/www.outsourcing-iod.pl\/#website\"},\"datePublished\":\"2022-12-16T12:24:08+00:00\",\"dateModified\":\"2023-03-08T11:27:38+00:00\",\"description\":\"Co to s\u0105\u00a0dane osobowe? - w artykule znajdziemy odpowiedz na to pytanie, jak r\u00f3wnie\u017c podzia\u0142 danych osobowych na kategorie.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.outsourcing-iod.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Co to s\u0105\u00a0dane osobowe?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outsourcing-iod.pl\/#website\",\"url\":\"https:\/\/www.outsourcing-iod.pl\/\",\"name\":\"Outsourcing IOD Inspektor Ochrony Danych\",\"description\":\"Pe\u0142nimy zewn\u0119trzn\u0105 funkcj\u0119 inspektora ochrony danych\",\"publisher\":{\"@id\":\"https:\/\/www.outsourcing-iod.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outsourcing-iod.pl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outsourcing-iod.pl\/#organization\",\"name\":\"Outsourcing IOD Inspektor Ochrony Danych\",\"url\":\"https:\/\/www.outsourcing-iod.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.outsourcing-iod.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.outsourcing-iod.pl\/wp-content\/uploads\/2023\/03\/logo.png\",\"contentUrl\":\"https:\/\/www.outsourcing-iod.pl\/wp-content\/uploads\/2023\/03\/logo.png\",\"width\":300,\"height\":200,\"caption\":\"Outsourcing IOD Inspektor Ochrony Danych\"},\"image\":{\"@id\":\"https:\/\/www.outsourcing-iod.pl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/firma.nformatyczna\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Co to s\u0105\u00a0dane osobowe?","description":"Co to s\u0105\u00a0dane osobowe? - w artykule znajdziemy odpowiedz na to pytanie, jak r\u00f3wnie\u017c podzia\u0142 danych osobowych na kategorie.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/","og_locale":"pl_PL","og_type":"article","og_title":"Co to s\u0105\u00a0dane osobowe?","og_description":"Co to s\u0105\u00a0dane osobowe? - w artykule znajdziemy odpowiedz na to pytanie, jak r\u00f3wnie\u017c podzia\u0142 danych osobowych na kategorie.","og_url":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/","og_site_name":"Outsourcing IOD Inspektor Ochrony Danych","article_publisher":"https:\/\/www.facebook.com\/firma.nformatyczna","article_modified_time":"2023-03-08T11:27:38+00:00","twitter_card":"summary_large_image","twitter_misc":{"Szacowany czas czytania":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/","url":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/","name":"Co to s\u0105\u00a0dane osobowe?","isPartOf":{"@id":"https:\/\/www.outsourcing-iod.pl\/#website"},"datePublished":"2022-12-16T12:24:08+00:00","dateModified":"2023-03-08T11:27:38+00:00","description":"Co to s\u0105\u00a0dane osobowe? - w artykule znajdziemy odpowiedz na to pytanie, jak r\u00f3wnie\u017c podzia\u0142 danych osobowych na kategorie.","breadcrumb":{"@id":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.outsourcing-iod.pl\/index.php\/co-to-sa-dane-osobowe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.outsourcing-iod.pl\/"},{"@type":"ListItem","position":2,"name":"Co to s\u0105\u00a0dane osobowe?"}]},{"@type":"WebSite","@id":"https:\/\/www.outsourcing-iod.pl\/#website","url":"https:\/\/www.outsourcing-iod.pl\/","name":"Outsourcing IOD Inspektor Ochrony Danych","description":"Pe\u0142nimy zewn\u0119trzn\u0105 funkcj\u0119 inspektora ochrony danych","publisher":{"@id":"https:\/\/www.outsourcing-iod.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outsourcing-iod.pl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/www.outsourcing-iod.pl\/#organization","name":"Outsourcing IOD Inspektor Ochrony Danych","url":"https:\/\/www.outsourcing-iod.pl\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.outsourcing-iod.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.outsourcing-iod.pl\/wp-content\/uploads\/2023\/03\/logo.png","contentUrl":"https:\/\/www.outsourcing-iod.pl\/wp-content\/uploads\/2023\/03\/logo.png","width":300,"height":200,"caption":"Outsourcing IOD Inspektor Ochrony Danych"},"image":{"@id":"https:\/\/www.outsourcing-iod.pl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/firma.nformatyczna"]}]}},"_links":{"self":[{"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/pages\/598"}],"collection":[{"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/comments?post=598"}],"version-history":[{"count":4,"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/pages\/598\/revisions"}],"predecessor-version":[{"id":699,"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/pages\/598\/revisions\/699"}],"wp:attachment":[{"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/media?parent=598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/categories?post=598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outsourcing-iod.pl\/index.php\/wp-json\/wp\/v2\/tags?post=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}