Latest blog articles

  • I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...

  • When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...

  • Plant varieties are difficult to make but easy to reproduce. Proving that someone reproduced a plant variety, however, is extremely hard. For organized crime, infringing plant variety rights therefore presents low-hanging fruit, with consequences far beyond the infringement of IP rights. 

  • What happens if the Netherlands rejects the EU-Ukraine association agreement? If they reach the participation quorum of 30%, it is up to the government to present a legislative proposal to the States-General by which the special legislation will be withdrawn. This article is only available in Dutch...