The DSA reflects the issue of advertising in its draft Art. 24, mandating transparency in advertising displayed by platforms – the traditional ad archives, discussed above. However, the proposal makes no acknowledgement whatsoever of new advertising business models emerging from content monetization.
Trade marks trolls: how to prevent abusive practice?
- Law
When we talk about Trade Marks Trolls we don’t mean the ugly creature that might come to your mind. Instead, we speak about practices that constitute an abuse of trade mark law. So, how to defend yourself against such behaviour?

The UK’s “data challenge” to the EU
- Law
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.


A tale of three cities and international law
- Law
Last July, an international organization meeting in an Asian city took historic decisions that will influence the fate of three European cities for years to come. At its 44th session, held in Fuzhou and online, the World Heritage Committee (WHC) stripped Liverpool of its World Heritage List (WHL) title. The same day, Vienna was removed from the List of World Heritage in Danger, and Venice narrowly escaped being included in it.

Supporting roles in comparative legal history
- Law
Law is a social science that is subject to mutation. Scholars devote efforts to reconstruct the events and the activities of actors behind those changes. These efforts are many times materialized in comparative legal historical studies that trigger new trends and lines of research. These efforts further assist in attaining a legal and cultural repository for future studies, since they also develop valuable contexts.

"The next great financial crisis could come from a cyber attack”: 5 critical cybersecurity measures you should put in place today
- Law
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded inside a legitimate product, and because supply chain attacks can allow an attacker to access the networks of many organizations in a single stroke.”

How data minimization, data quality, and storage limitation can help in the fight against climate change
- Law
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.

Freedom of expression & content moderation on social media: the promises and challenges of experimental accountability
- Law
This blog post is part of a collaborative education project on social media and platform governance undertaken by Prof. Nicolo Zingales (Fundação Getulio Vargas), Thales Bertaglia (Studio Europa/Institute of Data Science, UM) and Dr. Catalina Goanta (UM).

Is ‘MOCCA’ in class 30 generic in China?
- Law
What does the term ‘MOCCA’ evoke in your mind, a kind of coffee or a specific brand? This Kat randomly asked this question to her friends currently at the Max Planck Institute for Innovation and Competition Munich. Most of them regarded ‘MOCCA’ as a kind of coffee instead of a specific brand except one Italian colleague who also saw ‘MOCCA (almost phonetically identical to ‘Moka’)’ as referring to the Moka Pot (Italian wiki page). The diverged answers could be interpreted as showing different opinions on where the term is standing on the slope of trade mark genericide (certainly the slope will not be as smooth, or even could have a U-turn).
