Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
“Bartleby,” said I, “Ginger Nut is away; just step round to the Post Office, won’t you? (it was but a three minute walk,) and see if there is anything for me.” “I would prefer not to.” “You will not?” “I prefer not.”
-
SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...
-
Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only)
-
This post is co-written by Dr. Jill Robbie (Glasgow University) and Anna Berlee (MEPLI fellow). It is a cross-post from the University of Glasgow School of Law Blog.