Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
May the US President appoint his son in law as advisor to the White House? For quite a lot formal appointments the President needs the advice and consent (permission) from the senate, but not here. Is it permissible?
-
What is the role of the law in addressing the issues faced by the contemporary consumer, and who should be its maker?
-
The Symposium is organised by the ULEP research project and LeCTra Research School (the University of Lapland) in cooperation with M-EPLI (the University of Maastricht).
-
The need for a uniform interpretation of patent law need not be satisfied by a European Patent Court.