Document center

Deep Tech Europe – European Innovation Council pilot – Impact Report 2020

Published on | 4 years ago

Programmes EIC Pilot

The report focuses on the results and impacts of the European Innovation Council (EIC) Pilot (2018 – 2020) and its predecessor programmes since 2014, against a set of Key Performance Indicators. The EIC supports both breakthrough research (the EIC Pathfinder, building on the Future and Emerging Technologies programme) and the scale up of innovative startups and SMEs (the EIC Accelerator, building on the former SME instrument). The report offers insights into the profiles of the beneficiaries funded under the European Innovation Council.

myOverview - sign up for personalised information

We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).

Stay informed about what matters to you. By signing up, you can opt in for e-mail notifications and get access to a personalised dashboard that groups all news updates and event announcements in your domain(s).

Only for stakeholders located in Flanders

Testimonial

image of EITHOS - European Identity Theft Observatory System

EITHOS - European Identity Theft Observatory System

The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.