\
&
Contact us
Published on | 3 weeks ago
ProgrammesIt has been reported that when involving stakeholders from recently associated countries (e.g. Switzerland and South Korea) in a proposal, a warning may appear in the Funding & Tenders Portal submission system though the eligibility conditions are met: “The call requires at least three participants from three different EU Member States or associated countries”.
The European Commission confirmed that this warning is linked to the current technical configuration of the submission system and does not reflect the respective associated country status. You can always revise the Country eligibility tool on our website to revise the status of countries. If indeed the country is associated, then the warning can be ignored, provided that the final consortium complies with the minimum eligibility conditions at submission stage.
We offer news and event updates, covering all domains and topics of Horizon Europe, Digital Europe & EDF (and occasionally, for ongoing projects, Horizon 2020).
Stay informed about what matters to you.
By signing up, you can opt in for e-mail notifications and get access to
a personalised dashboard that groups all news updates and event announcements in your domain(s).
Only for stakeholders located in Flanders
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.