Latest blog articles
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...
-
Over the few past years, there has been a professionalization of social media content creators. These creators now have the power to sway their followers, start trends, or serve as role models for their audiences. These individuals, that have such online persuasive power, are called “influencers”...
-
On 15 October, the Swedish Consumer Agency, its Scientific Council and Maastricht University (in particular the Law & Tech Lab) hosted the webinar 'Consumers and businesses in digital markets – An unequal relationship?’, focused on bringing together the perspectives of national consumer authorities...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
The 30%-facility is regularly discussed in both case-law and politics. The facility is currently under pressure and facing turbulent times. With a potential abolition, which may become reality, particular attention must be paid to the effects and possible alternatives. This blog is only available in...