Latest blog articles
-
An important part of becoming a fully-fledged academic is the development and curation of a research line. A research line is the main research topic and the thread throughout (large parts of) a career. It could be law and technology in private law, globalisation in public law, human rights in...
-
The European Union (EU) and Turkey have a long and multifaceted relationship. In this entry (based on a recent longer analysis) we focus on Turkey’s involvement with the EU’s decentralised agencies, and more particularly on whether and to what extent this involvement can be viewed as a part of a...
-
On 23 February 2022, the European Commission released the much anticipated proposal for the Directive on Corporate Sustainability Due Diligence. The aim of this Directive is to reduce human rights violations and environmental harms across the global value chain by making large companies carry out...
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
The Boards of Appeal established for the decision-making agencies perform a function that lies between exercising administrative review, at the one end, and offering judicial review, at the other. It is still unclear in which direction they will ultimately move, and more research in this fast...
-
Achieving a sustainable way of life requires massive societal changes and (private international) law should enable, rather than hamper, the realization of such essential goals.
-
The DSA reflects the issue of advertising in its draft Art. 24, mandating transparency in advertising displayed by platforms – the traditional ad archives, discussed above. However, the proposal makes no acknowledgement whatsoever of new advertising business models emerging from content monetization...
-
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.