• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Research & Expertise

Illustration for news: Seminar on the topic of "International Regulation of Cybersecurity – New Paths and New Problems"

Seminar on the topic of "International Regulation of Cybersecurity – New Paths and New Problems"

Due to the increasing number of cyberattacks globally, legislators in various countries have committed themselves to increase legal regulation of cybersecurity. But what exactly are the laws, and where are the limits of legal regulation? Professor Dennis-Kenji Kipker shared his opinions on this matter.

Illustration for news: Seminar on the topic of “Right to privacy in the age of cyber: positive obligations of states with respect to mass surveillance”

Seminar on the topic of “Right to privacy in the age of cyber: positive obligations of states with respect to mass surveillance”

In her report presenter gave an overview of positive obligations of states with respect to mass surveillance.

Illustration for news: Scientific seminar on the topic "Territorial Sovereignty in the Age of Cyber"

Scientific seminar on the topic "Territorial Sovereignty in the Age of Cyber"

In their report, the presenters (Alaa N. Assaf and Daniil Moshnikov) gave an overview of the theories and the practice regarding territorial sovereignty in cyberspace under international law.

Illustration for news: Seminar on the topic of ‘ The International Legal Principle of Non-Interference and Deterence of Cyber-Operations’

Seminar on the topic of ‘ The International Legal Principle of Non-Interference and Deterence of Cyber-Operations’

A semninar on the topic «The International Legal Principle of Non-Interference and Deterence of Cyber-Operations» was held. In her talk the speaker - Vera Rusinova - tackled the question of whether and to what extent the principle of non-interference in matters within the domestic jurisdiction, being one of the basic principles of International Law, is applicable and able to effectively deter these ‘low-intensity cyber-operations’.