\
&
Contact us
Most Horizon Europe calls are open to participants from non-EU countries, also called Third Countries. If they are not automatically eligible for funding, they can still get funding in certain circumstances.
If a third country is allowed to participate but is not eligible for Horizon funding, then the organisations can still participate with own funding, and be included in the project as Associated partners.
Specific third countries can also be excluded from participation to the programme or to a part of the programme and/or to specific call topics mainly in order to safeguard the EU’s strategic assets, interests, autonomy or security.
A third country can participate as an associated partner with own funding. Associated partners have the following characteristics:
Third countries can get exceptionally funding if
Be aware that some third countries have created co-funding mechanisms which provide funding for the participants from their country in a successful submitted Horizon Europe proposal. In this document you will find an overview of the complementary funding of some third countries. The organisations of these countries participate as Associated Partners with own funding.
All details regarding country eligibility is compiled in the infosheet “International cooperation".
The EITHOS project, funded under Horizon Europe Cluster 3 call “Online identity theft is countered”, aims to develop a “European Identity Theft Observatory System” (EITHOS). The system will provide easy access to information and intelligence about previous and current identity theft related trends to empower EU citizens, Law Enforcements Agencies (LEAs), and policy makers to further contribute to the prevention, detection, and investigation of crimes related to online identity theft. The Cyber and Data Security Lab (CDSL), part of the Law, Science, Technology and Society (LSTS) Research Group at Vrije Universiteit Brussel (VUB), is one of the 12 partners in the EITHOS consortium, contributing its vast expertise on legal aspects of data protection, cybersecurity and information security law and policy.