Latest blog articles
-
-
A male senior manager enthusiastically slapping a female colleague’s buttocks – is that acceptable? And what if a female staff member did this to her female supervisor? Or a manager who puts his arm around a colleague who is having a hard time? What is crossing the line? Who decides?
-
As course coordinator and tutor for the only mandatory law course in the Bachelor in European Studies, I typically start the course with a clear message to students: Law as a discipline has its own language and logic and you can only get the hang of it by doing it. This means attending and...
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
The Boards of Appeal established for the decision-making agencies perform a function that lies between exercising administrative review, at the one end, and offering judicial review, at the other. It is still unclear in which direction they will ultimately move, and more research in this fast...
-
While we fully agree with the main thrust of the editorial ‘The Exit Door’ on Verfassungsblog last Friday, we would like to warn against its seemingly fatalistic mindset. Yes, a Polexit from the EU is not on the table until the Polish government itself pushes the Article 50 TEU button, but the other...
-
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.
-
What was promised by the GDPR (Art. 80 and Rec. 142) is now a reality!