Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
With the Royal Decree of 12 December 2018, Belgium has solved the problem for the cross-border worker where the unemployment benefit does not match the Dutch pension. The new decision states that Belgian unemployment benefit for frontier workers does not stop at the age of 65 but continues until...
-
SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...
-
Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only)
-
As bills don’t pay themselves an income is required, some obtain it by working for a wage, others by starting up their own business and some are so talented that they can make an income out of their hobby. In this column ‘My Way to Make Money’ we interview a student or a university employee about...
-
As bills don’t pay themselves an income is required, some obtain it by working for a wage, others by starting up their own business and some are so talented that they can make an income out of their hobby. In the Weekly column ‘My Way to Make Money’ we interview a student or a university employee...