Latest blog articles
-
In early 2021, Europe’s twelve leading football clubs joined hands to create the European Super League. Despite the presence of notable clubs such as Liverpool, Manchester United, Milan, Barcelona and Real Madrid, the League soon fell apart. Unable to convince those on the football field, the three...
-
“I don’t hate Facebook. I love Facebook. I want to save it”, wrote Frances Haugen as she resigned from Facebook and revealed tens of thousands of documents alleging Facebook has time and again prioritized profit over people.
-
The EU recently introduced text and data mining exceptions to copyright infringement. However, they are too narrow and situation-specific to enable scientific development. In my master thesis, I suggest adopting a non-enjoyment exception for new technological uses, including text and data mining.
-
While the trade mark system seems to embrace the expansion of trade marks to Virtual Reality, an intervention is required when an interplay between the virtual and real-world exists.
-
What can we learn from the ‘Great Debates’ in legal history? Or more specific, what could the participants of the Workshop Ius Commune in the Making: Great Debates in the History of Law (25 November 2021) learn about these debates? What shaped and still shapes great debates?
-
Language plays a fundamental role as a channel for law. It can enable members of society to access justice. Conversely, an inadequate use of language may result in a dissociation of law from a specific society. Language is a fundamental means to convey messages, to know the law, and to shape the law...
-
I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...
-
This blog post is a re-elaboration of my interview this morning with Luca Bertuzzi, Digital & Media Editor from EurActiv, available here.
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Over the last 20 years, access to cheap computational capacity has increasingly led to the harvesting of more and more personal data, without having to worry too much about costs related to data storage and processing activities.