Latest blog articles
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...
-
Published on MLR blogs. What do documents about negotiations of the Transatlantic Trade and Investment Partnership (TTIP), oversight of the EU’s Food Safety Authority or Tax-Justice have in common? In order to access these documents, (selected) Members of the European Parliament are requested to...
-
On Tuesday, the Grand Chamber of the Court of Justice of the European Union declared the Commission’s US Safe Harbour Decision invalid. The Court’s ruling in Case C-362/14 of the Austrian Internet activist Maximillian Schrems v the Irish Data Protection Commissioner is a milestone in the...
-
In today’s (15 september 2015) King’s speech the King said that the government will have as a point of departure for its presidency in 2016 of the Council of Ministers, a Europe which functions better and aims at essentials. Furthermore it will work towards an innovative Europe with a well...
-
On September 9th 2015 the president of the Commission, Juncker, adressed for his first time the European Parliament in his State of the Union. This year’s State of the Union was entitled: Time for Honesty, Unity and Solidarity. And the key concepts were: more Europe in the Union, and more Union in...
-
The EU is negotiating trade agreements in secret because orthodoxy, mysticism and a wishful thinking-based approach to policymaking have returned to power in Europe.