Latest blog articles
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
In his written answers to the European Parliament as well as orally during the hearing to establish his suitability to become first Vice-President of the European Commission, Commissioner Designate Frans Timmermans promises to ensure a common-sense test for all future legislation. I offer some legal...
-
Published on MLR blogs. What do documents about negotiations of the Transatlantic Trade and Investment Partnership (TTIP), oversight of the EU’s Food Safety Authority or Tax-Justice have in common? In order to access these documents, (selected) Members of the European Parliament are requested to...
-
The CETA trade agreement between the EU and Canada is, according to the initial judgment by the Commission, a treaty that fits within the exclusive jurisdiction of the EU (trade!) and can be made by the EU after approval from the European Parliament and the Council of Ministers... This blog is only...