Latest blog articles
-
-
-
Questions surrounding how the EU budget is spent or audited have been, and will always be, of interest to EU citizens. Formally, the responsibility for the implementation of the budget rests with the Commission, but it is well known that the Member States have a crucial role to play, especially in...
-
Breath in, breath out. Yes, the judgment of the (unlawfully composed) Polish Constitutional Tribunal is a serious challenge to the European Union’s legal system and to the principle of primacy of EU law. No, Poland has not activated the process of withdrawal from the EU under Article 50 TEU. Yes, EU...
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
Recently, the General Court in the HELL coffee case has confirmed that a descriptive foreign language term (German word HELL) can be granted protection under EU trade mark law (Hell Energy v. EUIPO, T-323/20).
-
What does the term ‘MOCCA’ evoke in your mind, a kind of coffee or a specific brand? This Kat randomly asked this question to her friends currently at the Max Planck Institute for Innovation and Competition Munich. Most of them regarded ‘MOCCA’ as a kind of coffee instead of a specific brand except...
-
Geographical indications (hereinafter GIs) are signs used to safeguard the existence of a link between a product and its place of origin, focusing on quality and tradition.
-
For more than 40 years now, the harmonisation and unification of the European patent law have been discussed. So far, the only European legal instrument regulating substantive patent matters is a European Patent Convention (EPC) signed in 1973. The EPC, however, is outside the EU’s legislative and...
-
When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...