Cover of book: Digital Decade
Edited Book Open Access Full access

Digital Decade

How the EU Shapes Digitalisation Research
Authors:
Publisher:
 25.06.2025

Summary

Over the last ten years, numerous pieces of EU legislation have been adopted in the field of digital law, including the AI Act, the Digital Services Act and the Digital Markets Act. These complex but sometimes difficult to understand legal acts play an important role in research and everyday life. In this volume, legal scholars and experts present the key EU legal acts that are relevant to social scientists, students and the general public. The volume also aims to stimulate a greater exchange between the social sciences and law, from which both disciplines can benefit. With contributions byDr. Adelaida Afilipoaie | Valerie Albus | Dr. Lucie Antoine | Lena Auler | Dr. Jascha Bareis, M.A. | Prof. Dr. Catrien Bijleveld, LL.M. | Jorge Constantinos | Dr. Max van Drunen, M.Z. | Rita Gsenger, M.A., M.Sc.| Prisca von Hagen | Liza Herrmann | Julia Krämer | Eyup Kun | Dr. Lucas Lasota | Lisa Markschies | Prof. Dr. Heritiana Ranaivoson | Nik Roeingh | Prof. Dr. Hannah Ruschemeier | Dr. Pascal Schneiders | Marie-Therese Sekwenz | Lisa Völzmann | David Wagner

Keywords



Bibliographic data

Publication year
2025
Publication date
25.06.2025
ISBN-Print
978-3-7560-1741-6
ISBN-Online
978-3-7489-4399-0
Publisher
Nomos, Baden-Baden
Series
Normsetzung und Entscheidungsverfahren – Schriftenreihe des Weizenbaum-Instituts für normative Wissenschaften
Volume
3
Language
English
Pages
524
Product type
Edited Book

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis Pages 1 - 8 Download chapter (PDF)
  2. Rita Gsenger, Marie-Therese Sekwenz Download chapter (PDF)
    1. The principles of the Digital Decade Download chapter (PDF)
    2. Structural aspects of European Regulations and Acts Download chapter (PDF)
    3. The structure of this book Download chapter (PDF)
  3. Catrien Bijleveld Download chapter (PDF)
    1. 1. What are empirical legal studies Download chapter (PDF)
    2. 2. Doing empirical legal research Download chapter (PDF)
    3. 3. Empirical legal research: qualitative and quantitative methods Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Sample representativeness Download chapter (PDF)
      2. 4.2 Sample nonresponse Download chapter (PDF)
      3. 4.3 Testing Download chapter (PDF)
    5. 5. Causality Download chapter (PDF)
    6. 6. Special topic: Systematic case law analysis Download chapter (PDF)
    7. 7. Conclusion Download chapter (PDF)
  4. Hannah Ruschemeier, Jascha Bareis Download chapter (PDF)
    1. 1. Regulating AI: an introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 Regulating AI is regulating power Download chapter (PDF)
      2. 2.2 EU taking a stance in the geopolitical AI arena Download chapter (PDF)
      3. 2.3 Coming into being: from ethical guidelines to legal regulation Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Regulatory structure Download chapter (PDF)
      2. Download chapter (PDF)
        1. 3.2.1 Material scope of application Download chapter (PDF)
        2. 3.2.2 High-risk classification as the relevant regulatory definition Download chapter (PDF)
        3. 3.2.3 Exceptions in the material scope Download chapter (PDF)
      3. 3.3 Personal scope of application Download chapter (PDF)
      4. 3.4 Territorial scope of application Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Prohibited AI practices Download chapter (PDF)
      2. 4.2 High-risk systems Download chapter (PDF)
      3. 4.3 Systemic risks for general-purpose AI Download chapter (PDF)
    5. 5. Oversight and governance Download chapter (PDF)
    6. Download chapter (PDF)
      1. Download chapter (PDF)
        1. 6.1.1 Towards the final AI definition Download chapter (PDF)
        2. 6.1.2 Beyond technical AI: understanding AI as a socio-technical phenomenon Download chapter (PDF)
      2. Download chapter (PDF)
        1. 6.2.1 Physicality and actors: AI systems are no fixed products Download chapter (PDF)
      3. 6.3 Different understanding of risks and harms depict paradigms that are not compatible Download chapter (PDF)
      4. 6.4 Watered down Fundamental Rights Impact Assessment Download chapter (PDF)
    7. Download chapter (PDF)
      1. 7.1 Democratically unsupervised private standardisation procedures Download chapter (PDF)
      2. 7.2 Missing participation of affected subjects Download chapter (PDF)
      3. 7.3 The problem of algorithmic discrimination escaping the categories of anti-discrimination Download chapter (PDF)
      4. 7.4 The loophole of addressing recommendation systems on platforms as high-risk systems Download chapter (PDF)
      5. 7.5 Lobbying and the risk of tech-solutionism Download chapter (PDF)
    8. 8. Conclusion and outlook Download chapter (PDF)
  5. Jorge Constantino Download chapter (PDF)
    1. 1. An introduction to AI systems Download chapter (PDF)
    2. 2. AI systems in our societies: good and bad AI? Download chapter (PDF)
    3. 3. The approach of the EU AI Act to accountable AI Download chapter (PDF)
    4. 4. Conclusion Download chapter (PDF)
  6. Marie-Therese Sekwenz, Rita Gsenger Download chapter (PDF)
    1. 1. Introducing the DSA: Context and scope Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 A harmonised form of reporting through DSA transparency reports? Download chapter (PDF)
      2. 2.2 A place for all platform contracts – The terms and conditions database Download chapter (PDF)
      3. 2.3 Quick insights in content moderation decisions through the statement of reason database Download chapter (PDF)
      4. 2.4 Ad library Download chapter (PDF)
      5. 2.5 Data access for researchers Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Drop-down of user empowerment? Notice and action mechanisms Download chapter (PDF)
      2. 3.2 Trust me, I am a trusted flagger Download chapter (PDF)
      3. 3.3 The wronged user? Internal complaint-handling systems in the DSA Download chapter (PDF)
      4. 3.4 The right of a judge or the DSA’s answer to it: Out-of-court dispute settlements Download chapter (PDF)
    4. 4. In crisis – Please follow the Commission Download chapter (PDF)
    5. Download chapter (PDF)
      1. 5.1 That seems pretty risky: Risk assessment under the DSA Download chapter (PDF)
      2. 5.2 Better to avoid it – Risk mitigation under the DSA Download chapter (PDF)
      3. 5.3 Audits Download chapter (PDF)
      4. 5.4 The deluge of delegated regulations Download chapter (PDF)
    6. 6. Conclusion Download chapter (PDF)
  7. Pascal Schneiders, Lena Auler Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 Regulatory approach of the DSA for content moderation Download chapter (PDF)
      2. 2.2 Illegal content and hate speech Download chapter (PDF)
      3. Download chapter (PDF)
        1. 2.3.1 Notice and action procedure Download chapter (PDF)
        2. 2.3.2 Complaint and redress mechanisms Download chapter (PDF)
        3. 2.3.3 Cooperation with authorities Download chapter (PDF)
      4. Download chapter (PDF)
        1. 2.4.1 Risk assessment and mitigation Download chapter (PDF)
        2. 2.4.2 Data access Download chapter (PDF)
      5. 2.5 Transparency obligations Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Legitimacy and accuracy of content moderation Download chapter (PDF)
      2. 3.2 Involvement of state authorities Download chapter (PDF)
      3. 3.3 Effectiveness of content moderation Download chapter (PDF)
      4. 3.4 Data access Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Starting point and the DSA’s approach Download chapter (PDF)
      2. 4.2 Risks and opportunities in relation to the DSA Download chapter (PDF)
      3. 4.3 Implications Download chapter (PDF)
  8. Liza Herrmann Download chapter (PDF)
    1. 1. A fairy-tale introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 The (complicated) relationship between law and social science: a practical approach Download chapter (PDF)
      2. 2.2 What constitutes the social character of law? Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Background considerations on the development of the Regulation Download chapter (PDF)
      2. 3.2 The dual objectives of the DMA Download chapter (PDF)
      3. 3.3 The material and geographical scope Download chapter (PDF)
      4. 3.4 The gatekeeper’s obligations and prohibitions Download chapter (PDF)
      5. 3.5 Enforcement and penalties for non-compliance Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Explicit references to the principle of proportionality in the DMA Download chapter (PDF)
      2. 4.2 The recitals Download chapter (PDF)
      3. 4.3 The beneficiaries Download chapter (PDF)
      4. 4.4 The regulatory objectives Download chapter (PDF)
      5. 4.5 The ex ante control approach Download chapter (PDF)
      6. 4.6 Core platform services Download chapter (PDF)
    5. 5. Conclusion & considerations for further (interdisciplinary) research Download chapter (PDF)
  9. Valerie Albus Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 Legislative history Download chapter (PDF)
      2. 2.2 Legal basis Download chapter (PDF)
      3. 2.3 Scope of application Download chapter (PDF)
      4. 2.4 Definition of terrorist content Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Removal orders Download chapter (PDF)
      2. 3.2 Cross-border removal orders Download chapter (PDF)
      3. 3.3 Specific measures to address the dissemination of terrorist content Download chapter (PDF)
      4. 3.4 Transparency obligations Download chapter (PDF)
    4. 4. Conclusion Download chapter (PDF)
  10. Max van Drunen Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 What is political advertising? Download chapter (PDF)
      2. 2.2 Why does the Political Advertising Regulation empower researchers? Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Ad libraries Download chapter (PDF)
      2. Download chapter (PDF)
        1. 3.2.1 From whom can data be requested? Download chapter (PDF)
        2. 3.2.2 Who can request data? Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Defining political ads Download chapter (PDF)
      2. 4.2 When should political advertising be prohibited? Download chapter (PDF)
      3. 4.3 Effective labels for political advertisements Download chapter (PDF)
    5. 5. Conclusion Download chapter (PDF)
  11. Lisa Völzmann Download chapter (PDF)
    1. Download chapter (PDF)
      1. 1.1 Objective Download chapter (PDF)
      2. 1.2 Legal Nature Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 Scope Download chapter (PDF)
      2. Download chapter (PDF)
        1. 2.2.1 Research Organisations, Cultural Heritage Institutions, and Other Users Download chapter (PDF)
        2. 2.2.2 Rightholders Download chapter (PDF)
      3. Download chapter (PDF)
        1. 2.3.1 Creating Legal Certainty Download chapter (PDF)
        2. 2.3.2 Enhancing Innovation Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Scope Download chapter (PDF)
      2. Download chapter (PDF)
        1. 3.2.1 Press Publishers Download chapter (PDF)
        2. 3.2.2 Information Society Service Providers Download chapter (PDF)
        3. 3.2.3 Authors and Other Rightholders Download chapter (PDF)
        4. 3.3 Objectives and Perspectives Download chapter (PDF)
      3. 3.3.1 Protecting a Free and Pluralist Press Download chapter (PDF)
      4. 3.3.2 Shifting Power Dynamics Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Scope Download chapter (PDF)
      2. Download chapter (PDF)
        1. 4.2.1 Users Download chapter (PDF)
        2. 4.2.2 Rightholders Download chapter (PDF)
        3. 4.2.3 Online Content-Sharing Service Providers Download chapter (PDF)
      3. Download chapter (PDF)
        1. 4.3.1 Risking Overblocking Download chapter (PDF)
        2. 4.3.2 Strengthening Copyright Protection Download chapter (PDF)
    5. 5. Conclusion Download chapter (PDF)
  12. Adelaida Afilipoaie, Heritiana Ranaivoson Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. 2. Safeguarding media pluralism at the EU level Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Explaining Section 5 of the EMFA Download chapter (PDF)
      2. 3.2 The EMFA’s approach to media pluralism and the link with the Media Plurality Monitor Download chapter (PDF)
      3. 3.3 Delving into Art. 22 of the EMFA: assessment of media market concentrations Download chapter (PDF)
    4. Download chapter (PDF)
      1. Download chapter (PDF)
        1. 4.1.1 Ownership and beyond Download chapter (PDF)
        2. 4.1.2 Diversity and opinion-formation power Download chapter (PDF)
      2. Download chapter (PDF)
        1. 4.2.1 Editorial independence Download chapter (PDF)
        2. 4.2.2 Editorial independence in practice Download chapter (PDF)
      3. Download chapter (PDF)
        1. 4.3.1 Economic sustainability Download chapter (PDF)
        2. 4.3.2 Assessment of economic sustainability Download chapter (PDF)
      4. 4.4 Art. 22(2)(d) Download chapter (PDF)
      5. 4.5 Art. 22(2)(e) Download chapter (PDF)
    5. 5. Conclusion Download chapter (PDF)
  13. Lucie Antoine Download chapter (PDF)
    1. 1. The role of trust for data sharing Download chapter (PDF)
    2. 2. Law and trust Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 The DGA: background, legal nature, and overview Download chapter (PDF)
      2. Download chapter (PDF)
        1. 3.2.1 Scope and covered data categories Download chapter (PDF)
        2. 3.2.2 General conditions for re-use Download chapter (PDF)
        3. 3.2.3 Additional safeguards Download chapter (PDF)
        4. 3.2.4 Safeguards for the transfer of non-personal data to third countries Download chapter (PDF)
        5. 3.2.5 Transparent and effective framework for re-use requests Download chapter (PDF)
        6. 3.2.6 Summary, guiding principles and perspective Download chapter (PDF)
      3. Download chapter (PDF)
        1. Download chapter (PDF)
          1. 3.3.2 Definition of data intermediation service Download chapter (PDF)
          2. 3.3.3 Notification process and public register Download chapter (PDF)
          3. 3.3.4 Conditions for providing data intermediation services Download chapter (PDF)
          4. 3.3.5 Summary, guiding principles, and perspective Download chapter (PDF)
        2. Download chapter (PDF)
          1. 3.3.7 Definition of data altruism Download chapter (PDF)
          2. 3.3.8 Registration process and public register Download chapter (PDF)
          3. 3.3.9 Further obligations for recognised data altruism organisations Download chapter (PDF)
          4. 3.3.10 Consent and permission Download chapter (PDF)
          5. 3.3.11 Summary, guiding principles, and perspective Download chapter (PDF)
    4. 4. The role of trust in business and consumer decisions? Download chapter (PDF)
    5. 5. Concluding remarks Download chapter (PDF)
  14. Nik Roeingh, David Wagner Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 Understanding open government data through its rationale Download chapter (PDF)
      2. 2.2 Understanding open government data as a data state Download chapter (PDF)
      3. Download chapter (PDF)
        1. 2.3.1 Openness Download chapter (PDF)
        2. 2.3.2 Data Download chapter (PDF)
        3. 2.3.3 Government Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 A brief history of internal market regulation for open public sector data Download chapter (PDF)
      2. Download chapter (PDF)
        1. 3.2.1 Standard licences (Art. 8 ODD) Download chapter (PDF)
        2. 3.2.2 Available formats (Art. 5 ODD) Download chapter (PDF)
        3. 3.2.3 Charging (Art. 6 ODD) Download chapter (PDF)
        4. 3.2.4 Non-discrimination (Art. 11 ODD) Download chapter (PDF)
        5. 3.2.5 Exclusivity arrangements (Art. 12 ODD) Download chapter (PDF)
    4. Download chapter (PDF)
      1. Download chapter (PDF)
        1. 4.1.1 High value datasets Download chapter (PDF)
        2. 4.1.2 Public sector bodies’ data Download chapter (PDF)
        3. 4.1.3 Public undertakings’ data Download chapter (PDF)
      2. Download chapter (PDF)
        1. 4.2.1 Dividing lines within Art. 10 ODD Download chapter (PDF)
        2. 4.2.2 Research data Download chapter (PDF)
        3. 4.2.3 Covered data Download chapter (PDF)
        4. 4.2.4 Exclusion: scientific publications Download chapter (PDF)
    5. 5. Overall assessment of the Open Data Directive Download chapter (PDF)
  15. Prisca von Hagen Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. 2.1 Reasons for the lack of data sharing Download chapter (PDF)
      2. 2.2 Effects of the lack of data sharing Download chapter (PDF)
      3. Download chapter (PDF)
        1. 2.3.1 The European Data Strategy Download chapter (PDF)
        2. 2.3.2 Basic idea of the DA with regard to IoT data Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Scope of application: what data are covered? Download chapter (PDF)
      2. 3.2 Relevant actors Download chapter (PDF)
      3. Download chapter (PDF)
        1. 3.3.1 Data access of the user Download chapter (PDF)
        2. 3.3.2 Data access for data recipients Download chapter (PDF)
        3. 3.3.3 Restrictions for the use by the data holder Download chapter (PDF)
    4. Download chapter (PDF)
      1. Download chapter (PDF)
        1. Download chapter (PDF)
          1. Legal Basis for Data Processing Download chapter (PDF)
          2. Relationship between the right to data portability and Article 4 (1) and Article 5 (1) DA Download chapter (PDF)
          3. Criticism of the creation of user accounts Download chapter (PDF)
        2. Download chapter (PDF)
          1. Data as trade secret Download chapter (PDF)
          2. Approaches of the DA with regard to trade secrets Download chapter (PDF)
        3. 4.1.3 Relationship to database protection Download chapter (PDF)
        4. 4.1.4 Relationship to other existing legal instruments Download chapter (PDF)
      2. 4.2 Independent decision by the user? Download chapter (PDF)
      3. Download chapter (PDF)
        1. 4.3.1 “Ownership-like” position of the user? Download chapter (PDF)
        2. 4.3.2 (Exclusive) de facto position of the data holder? Download chapter (PDF)
    5. 5. Conclusion Download chapter (PDF)
  16. Julia Krämer Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. Download chapter (PDF)
      1. Download chapter (PDF)
        1. 2.1.1 Processing Download chapter (PDF)
        2. 2.1.2 Personal data Download chapter (PDF)
        3. 2.1.3 Controllership Download chapter (PDF)
      2. 2.2 Principles of data processing Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 Art 6 GDPR – lawful grounds for processing Download chapter (PDF)
      2. 3.2 Art. 7 GDPR – conditions for valid consent Download chapter (PDF)
      3. 3.3 Art. 9 GDPR – Data revealing special categories of personal data Download chapter (PDF)
      4. Download chapter (PDF)
        1. 3.4.1 Privacy policies (Arts. 12, 13, 14 GDPR) Download chapter (PDF)
        2. 3.4.2 Privacy labels and standardised icons (Art. 12(7) GDPR) Download chapter (PDF)
      5. 3.5 Measuring data flows and tracking – transparency and data minimisation Download chapter (PDF)
      6. 3.6 Art. 15 GDPR – right of access Download chapter (PDF)
      7. 3.7 Art. 17 GDPR – right to be forgotten Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Challenges for empirical (legal) studies in the context of the GDPR Download chapter (PDF)
    5. 5. Conclusion Download chapter (PDF)
  17. Lisa Markschies Download chapter (PDF)
    1. 1. Introduction Download chapter (PDF)
    2. 2. Legislative history Download chapter (PDF)
    3. Download chapter (PDF)
      1. 3.1 More control over the individual’s electronic health data Download chapter (PDF)
      2. 3.2 Better treatment through better data Download chapter (PDF)
      3. 3.3 Data access made easy? Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Application process Download chapter (PDF)
      2. 4.2 Purposes Download chapter (PDF)
      3. Download chapter (PDF)
        1. 4.3.1 Categories Download chapter (PDF)
        2. 4.3.2 Patient protection through anonymisation and pseudonymisation Download chapter (PDF)
      4. 4.4 Prohibited secondary uses Download chapter (PDF)
    5. 5. To consent or not to consent Download chapter (PDF)
    6. Download chapter (PDF)
      1. 6.1 Relation to the GDPR Download chapter (PDF)
      2. 6.2 Differences between the Member States Download chapter (PDF)
      3. 6.3 Garbage in/garbage out? Download chapter (PDF)
    7. 7. Outlook Download chapter (PDF)
  18. Lucas Lasota Download chapter (PDF)
    1. 1. Introduction – making cybersecurity a priority for digital markets Download chapter (PDF)
    2. 2. Cybersecurity is broader than computer security Download chapter (PDF)
    3. 3. Vulnerabilities are inescapable in the digital world Download chapter (PDF)
    4. 4. From safety to security – understanding the EU’s cybersecurity regulatory path Download chapter (PDF)
    5. 5. CRA: setting far-reaching cybersecurity rules for digital products Download chapter (PDF)
    6. 6. The challenge of regulating FOSS cybersecurity Download chapter (PDF)
    7. 7. Conclusion and future research Download chapter (PDF)
  19. Eyup Kun Download chapter (PDF)
    1. 1. Introduction: evolution from the NIS Directive to NIS 2 Directive Download chapter (PDF)
    2. Download chapter (PDF)
      1. Download chapter (PDF)
        1. 2.1.1 Bifurcation of entities under the NIS 2 Directive: Essential and important entities Download chapter (PDF)
        2. 2.1.2 The different supervision and enforcement regime for essential and important entities Download chapter (PDF)
      2. 2.2 Jurisdictional scope of Member States under the NIS 2 Directive Download chapter (PDF)
      3. 2.3 Material scope of the NIS 2 Directive: data and availability of services as proxies to protect individuals and society Download chapter (PDF)
      4. 2.4 Objective of the NIS 2 Directive: solving underinvestment problem in cybersecurity Download chapter (PDF)
    3. Download chapter (PDF)
      1. Download chapter (PDF)
        1. 3.1.1 Cybersecurity strategies Download chapter (PDF)
        2. 3.1.2 National cyber crisis management frameworks Download chapter (PDF)
        3. 3.1.3 Establishment of competent authorities and single points of contact for cybersecurity Download chapter (PDF)
        4. 3.1.4 Computer Security Incident Response Teams (CSIRTS) Download chapter (PDF)
        5. 3.1.5 Cooperation at the national level Download chapter (PDF)
      2. Download chapter (PDF)
        1. 3.2.1 European vulnerability database Download chapter (PDF)
        2. 3.2.2 EU-level cooperation Download chapter (PDF)
    4. Download chapter (PDF)
      1. 4.1 Responsibilities of managerial boards Download chapter (PDF)
      2. 4.2 Risk management responsibility Download chapter (PDF)
      3. Download chapter (PDF)
        1. 4.3.1 Notification to CSIRT or competent authorities Download chapter (PDF)
        2. Download chapter (PDF)
          1. 4.3.3 Notification of the incident to the recipients of services Download chapter (PDF)
          2. 4.3.4 The communication of significant cyber threats to the recipients of services Download chapter (PDF)
        3. Download chapter (PDF)
          1. 4.3.6 Information sharing on voluntary basis Download chapter (PDF)
    5. 5. Conclusion Download chapter (PDF)
  20. Author Biographies Pages 513 - 520 Download chapter (PDF)
  21. Abbreviations and Acronyms Pages 521 - 524 Download chapter (PDF)

Similar publications

from the topics "Commercial Law & Business Law & Corporate Law", "Law General, Comprehensive Works and Collections", "Economics General"
Cover of book: Wettbewerbs- und Kartellrecht
Educational Book No access
Wettbewerbs- und Kartellrecht
Cover of book: Sportmanagement
Edited Book No access
Praxishandbuch
Sportmanagement
Cover of book: Kartellschadensersatz bei Missbrauch einer beherrschenden Stellung auf den Postmärkten
Book Titles No access
Zum Einfluss der Postregulierung auf die parallele Durchsetzung kartellrechtlicher Schadensersatzansprüche
Kartellschadensersatz bei Missbrauch einer beherrschenden Stellung auf den Postmärkten
Cover of book: Uncertain Journeys into Digital Futures
Edited Book Full access
Inter- and Transdisciplinary Research for Mitigating Wicked Societal and Environmental Problems
Uncertain Journeys into Digital Futures
Cover of book: Das Plattformverfahren
Book Titles Full access
Ausbalancierte Rechtsdurchsetzung mittels Verfahrensgrundsätzen
Das Plattformverfahren