Latest blog articles
-
Reflecting on the M-EPLI Interns' Thesis Workshop: Can institutions benefit from reassessing their priorities in terms of what they incentivize and analyzing why these types of events offering an opportunity for students to write and get substantive feedback so rare?
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
During the Easter weekend there was a lack of clarity about what the rules are at the German-Dutch border. What is actually still allowed when it comes to travelling from the Netherlands to Germany and vice versa? Both the government in North Rhine-Westphalia (NRW) and in the Netherlands have...
-
The workshop will focus on different contributions that identify potential legal wrongs arising out of decentralization, with the goal of exploring old and new remedies (both substantive and procedural) that could correct them, while emphasizing the role of technology in delivering these potential...
-
Last February, the Court of Justice (CoJ) received a notable appeal against an order of the General Court (GC) in Case T-479/14 Kendrion. There are various notable and interesting aspects to the appeal case but the most eye-catching one concerns the appellant: the Court of Justice of the European...