Latest blog articles
-
My dissertation was about the applicability of international children’s (human) rights to children living in Somaliland, an unrecognised state. Moreover, I studied how national laws protect children’s rights in Somaliland.
-
-
The debate on the implications of Dutch colonial rule in Indonesia recently intensified after a report concluded that the Dutch forces had used extreme violence. Reactions to the report reveal that the issue remains controversial and challenging to discuss. The findings in the report do however...
-
Questions surrounding how the EU budget is spent or audited have been, and will always be, of interest to EU citizens. Formally, the responsibility for the implementation of the budget rests with the Commission, but it is well known that the Member States have a crucial role to play, especially in...
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
Recently, the General Court in the HELL coffee case has confirmed that a descriptive foreign language term (German word HELL) can be granted protection under EU trade mark law (Hell Energy v. EUIPO, T-323/20).
-
When we talk about Trade Marks Trolls we don’t mean the ugly creature that might come to your mind. Instead, we speak about practices that constitute an abuse of trade mark law. So, how to defend yourself against such behaviour?
-
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.