Unless exceptional circumstances (e.g. grants with humanitarian purposes), and with the exception of some calls, no legal entity established in Russia, Belarus or non-government controlled territories of Ukraine is eligible to participate in any capacity in any HE grant for calls with deadline after 10 May 2022.
This includes all types of participation or involvement, e.g. as beneficiaries, linked third parties/affiliated entities, subcontractors, in-kind contributors, international partners/associated partners, third parties receiving financial support, fellows and visiting researchers.
This also includes private Russian and Belarusian legal persons and natural persons (whatever their nationality) who have their habitual residence in one of the areas mentioned.
Most Horizon Europe calls are open to participants from non-EU countries, also called Third Countries. But funding is only automatically available if they are associated or if they appear in the list of Low and Middle Income Countries as listed in the Horizon Europe Programme Guide
Specific third countries can also be excluded from participation to the programme or to a part of the programme and/or to specific call topics mainly in order to safeguard the EU’s strategic assets, interests, autonomy or security.
N/A
All details regarding country eligibility is compiled in the infosheet “International cooperation".
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.