Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
There was great anger and protest among Dutch politicians after a nuanced interview with Juncker in NRC Handelsblad van January 9th, 2016, about the referendum on the EU-Ukraine association agreement. The general opinion was: how does Juncker have the courage to participate in the Dutch discussion...
-
What is the role of the law in addressing the issues faced by the contemporary consumer, and who should be its maker?
-
The Symposium is organised by the ULEP research project and LeCTra Research School (the University of Lapland) in cooperation with M-EPLI (the University of Maastricht).
-
The need for a uniform interpretation of patent law need not be satisfied by a European Patent Court.