Latest blog articles

  • What is the perspective of several countries on punitive damages in and outside of Europe? What issues arise from the recognition and enforcement of foreign (mostly US) punitive damages judgments? How do different countries view the public policy exception?

    These questions and more were among the...

  • I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...

  • When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...

  • SMECC stands for School, Minimum standard, Education, Child-friendly policy and care-Continuum. Imagine SMECC as a flat drawing of a house. The regulatory backstop is the minimum standard in family litigation for competent parenthood – far on the horizon, however, a necessary fundament of human...

  • Asylum seekers usually do not cross borders with a bag of documents. They have lost their personal belongings or have been confiscated by smugglers. Oral statements are therefore the only proof of origin. (Dutch only) 

  • Rethinking how we make our value judgments, not just by asking a litany of “why questions”, but through a more systematic process – as advocated by Hage – enables us to debate with one another at a much deeper level, rather than settling for a superficial conversation based on our (sometimes flawed)...