Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
The annual Ius Commune conference and its contract law workshop on “Contract law in times of corona and other sanitary crises”.
-
“What kind of skills do we want our graduates to have?” was the main topic of discussion during a recent staff meeting, which got me thinking.
As the faculty of law, perhaps the “right” answer would entail something along the lines of: “Our graduates need to be capable of arguing logically, writing...
-
SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...
-
Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only)
-
What is the role of the law in addressing the issues faced by the contemporary consumer, and who should be its maker?
-
What is the role of the law in addressing the issues faced by the contemporary consumer, and who should be its maker?
-
What is the basis for the claim of the ‘remaining’ EUR 4.875.000?
-
M-EPLI Talk entitled ‘A Multidimensional System of Commercial Law’.
-
Depicting a legal dispute arising out of the enforcement of a surrogacy agreement.