Support for Legal & Financial issues (Horizon Europe)
Not sure how to deal with a cost category? Questions on the project implementation? We'll clarify the situation for you.

Grant Management

In the Online Manual extensive details can be found regarding the application process as well as the Grant Management, thus in-depth explanations about reporting, amendments, deliverables, dissemination&exploitation, etc. The manual is expected to be complemented throughout the programming period.

All available reference documents of Horizon Europe can be found on the Funding and Tender Portal.

 

Your NCP contacts for this programme

Image of Ann Van Hauwaert

Ann Van Hauwaert

ann.vanhauwaert@fwo.be

+32 2 550 15 60

Image of Ria De Breucker

Ria De Breucker

Ria.debreucker@vlaio.be

+32 2 553 13 77

Your PC contact for this programme

Find the contact info on the site of WEWIS

The National Contact Points (NCPs) provide support, guidance, and practical information to potential applicants, helping them navigate funding opportunities and application processes.

The Programme Committee (PC) members represent their country in decision-making about the work programmes, evaluate implementation, and provide strategic input on priorities and calls.

 

Testimonial

image of EITHOS - European Identity Theft Observatory System

EITHOS - European Identity Theft Observatory System

The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.