Latest blog articles
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...
-
In a reaction to an EJIL: Talk! post by Baetens et al., Arcuri et al. claim that the Dutch parliament has the right to reject CETA and also argue in favour of it doing so. The post by Arcuri et al. raises important points that merit further discussion, among legal academics and practitioners...
-
Maastricht University’s cross-syllabus approach could point the way forward, say Herco Fonteijn and Teun Dekker.
Read the full blog on Times Higher Education.
-
As I step out of the station, a drizzle is falling from the grey and cloudy sky. I wrap the thick black woollen scarf slightly tighter around my head. Having to cross the Sint Servaasbridge means being subject to the whims of winter winds which travel over the river Maas. How often have I there not...
-
During the period of July to October 2016, the Comprehensive Economic and Trade Agreement with Canada was up for approval at the National States... This blog is only available in Dutch.
-
How should we describe last week's situation, when the Canadians headed home after the Walloons torpedoed CETA? ... This blog is only available in Dutch.
-
The CETA trade agreement between the EU and Canada is, according to the initial judgment by the Commission, a treaty that fits within the exclusive jurisdiction of the EU (trade!) and can be made by the EU after approval from the European Parliament and the Council of Ministers... This blog is only...