Latest blog articles
-
Today it has become impossible for one single person to master the whole field of environmental law, given its complexity and dynamic developments. Indeed, with the increasing manifestation of environmental crisis, law, being a powerful tool to address polluting behaviour, has become utterly complex...
-
Frank Dobbin and Alexandra Kalev’s new book, Getting to Diversity, offers data-backed evidence to substantiate what I have long suspected to be true: Many diversity and inclusivity trainings (e.g. mandatory implicit bias training, active allyship training, etc.) not only have little to no effect...
-
Reflecting on the M-EPLI Interns' Thesis Workshop: Can institutions benefit from reassessing their priorities in terms of what they incentivize and analyzing why these types of events offering an opportunity for students to write and get substantive feedback so rare?
-
On 23 February 2022, the European Commission released the much anticipated proposal for the Directive on Corporate Sustainability Due Diligence. The aim of this Directive is to reduce human rights violations and environmental harms across the global value chain by making large companies carry out...
-
What can we learn from the ‘Great Debates’ in legal history? Or more specific, what could the participants of the Workshop Ius Commune in the Making: Great Debates in the History of Law (25 November 2021) learn about these debates? What shaped and still shapes great debates?
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
German courts have been on the news a lot lately and for good reasons: From siding with young environmental activists fighting against climate change to prosecuting war criminals and terrorists that other jurisdictions have failed to prosecute, the German courts are actively trying to fight...
-
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.