This infosheet on security-related aspects within the Digital Europe programme summarises relevant aspects regarding restricted participation in certain call topics and the correct handling of classified information.
Published on | 2 years ago
Last updated on | 3 months ago
marie.timmermann@fwo.be
For certain actions under the Digital Europe Programme referring to Cybersecurity, High-Performance Computing and AI, Data & Cloud, the participation of legal entities controlled from non-EU country can be restricted, according to art. 12(5) and 12(6) of the Digital Europe Regulation. This is also the case for legal entities established in the territory of an eligible country but controlled by a third country or by a third country legal entity. The specific requirements for the individual call topics can be found in the respective call documents.
EEA EFTA countries (Ijsland, Liechtenstein and Norway) are fully associated to the Digital Europe Programme and benefit from a status equivalent to that of the Member States.
For duly justified security reasons legal entities established in associated countries and legal entities that are established in the Union but controlled from third countries can be excluded to participate in actions on Cybersecurity (Art. 12(5) Digital Europe Regulation). Calls for proposals and calls for tenders are in these cases restricted to legal entities established or deemed to be established in Member States and controlled by Member States or by Member State nationals. There are very few exceptional call topics that would allow legal entities established in associated countries and legal entities that are established in the Union but controlled from a third country to participate provided they comply with specific conditions as laid out in annex 3 of the Cybersecurity work programme.
For duly justified security reasons legal entities established in associated countries and legal entities that are established in the Union but are controlled from third countries may be eligible to participate in specific actions on High-Performance Computing and on Artificial Intelligence, Data & Cloud only if they comply with specific requirements (Art. 12(6) Digital Europe Regulation). Requirements include guarantees on the protection of the essential security interests of the Union and the Member States and the protection of classified documents information.
Guidance: Participation in Digital Europe programme restricted calls
Templates of the ownership control declaration and the Security issues table can be found under the Reference documents on the Funding & Tenders Portal.
We offer news and event updates, covering all domains and topics of Horizon 2020 & Horizon Europe.
Stay informed about what matters to you.
By signing up, you can opt in for e-mail notifications and get access to
a personalised dashboard that groups all news updates and event announcements in your domain(s).
Only for stakeholders located in Flanders
Professor Lieven Eeckhout’s main research interests include computer architecture and the hardware/software interface with a specific emphasis on performance evaluation and modeling, and dynamic resource management.
Professor Eeckhout is the recipient of a European Research Council (ERC) Starting grant, Advanced grant and three Proof of Concept grants. Two of his former PhD students founded in 2013 CoScale, a spin-off in data center monitoring, which was acquired by New Relic.