Published on | 3 months ago
Programmes Research Infrastructures Health Culture and society Security Digital, Industry & Space Climate, Energy, Mobility Agro-Food, Environment EIE MissionsDuring the past months, the Commission has published updated versions of several key documents for application to the call topics of the main Horizon Europe Work Programme (WP) 2025:
The updates mostly relate to cross-cutting principles of the programme which stakeholders need to take into account when developing a proposal. Therefore, it is important for (potential) applicants to read these key documents carefully and to make sure you are aware of the changes introduced by the Commission. Herewith an overview:
Important notice: the only correct application form is the one connected to the call topic you will apply to, which is available in the submission system. This may differ from the information in the standard application form.
We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).
Stay informed about what matters to you.
By signing up, you can opt in for e-mail notifications and get access to
a personalised dashboard that groups all news updates and event announcements in your domain(s).
Only for stakeholders located in Flanders
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.