Latest blog articles

  • How does EU consumer laws address dark patterns on the Internet? This topic has been part of the scholarly debate during the panel discussion “The AI-assisted consumer”, organized on 6 December 2022 in collaboration with Glaw-Net and IGIR.

    by:
    • Esra Kaplan
    in Law
  • The widespread use of AI-assisted technologies in the digital sphere has given rise to the concept of digital vulnerability, as a contextual vulnerability experienced by internet users. This phenomenon sparks debate about whether the current legislative framework is sufficient to ensure effective...

  • I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...

  • When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...

  • SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...

  • Current developments in the area of cross-country joint audits could reduce administrative burdens and enhance legal certainty. But, what are joint audits? This contribution shortly elaborates on the concept and the current developments of joint audits that could facilitate a cross-country concept...

  • Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only)