\
&
Contact us
Tips and tricks to write a good proposal as well as the steps of the evaluation process are elaborated in this video series on Proposal Writing under Horizon Europe (only for registered users).
NCP Flanders’ Infosheets offers a deep dive into specific issues and answer to frequently asked questions. Several of our infosheets can be of help for preparing your proposal.
Under certain conditions, NCP Flanders reviews draft project proposals according to the EU selection criteria. Stakeholders based in Flanders can request a proposal review but should be aware we have limited capacity. The earlier in the process you send us your request, the more likely we will be able to answer positively.
Does you organisation has a European Liaison Office? First check with your support office as they might offer proofreading services.
What do we offer? Feedback on your draft proposal according to the relevant evaluation criteria for call topics under Pillar II of Horizon Europe main work programme and under the Digital Europe main work programme and cybersecurity work programme.
Elements to take into account if you consider to send us a request for proposal review:
Support during the proposal stage is also offered for EIC Accelerator. Find out more here.
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.