
The Future of the European Security Architecture
- Marketing, Recruitment and Events
- Admission: Please see the website.
- Event website
- Book now
Add this event to my calendar
Click on "Create a calendar file" and your browser will download a .ics file for this event.
Microsoft Outlook: Download the file, double-click it to open it in Outlook, then click on "Save & Close" to save it to your calendar. If that doesn't work go into Outlook, click on the File tab, then on Open & Export, then Open Calendar. Select your .ics file then click on "Save & Close".
Google Calendar: download the file, then go into your calendar. On the left where it says "Other calendars" click on the arrow icon and then click on Import calendar. Click on Browse and select the .ics file, then click on Import.
Apple Calendar: The file may open automatically with an option to save it to your calendar. If not, download the file, then you can either drag it to Calendar or import the file by going to File >Import > Import and choosing the .ics file.
The EU Directive on the use of Passenger Name Records (PNR Directive) is at the heart of this emerging European security architecture. It instrumentalizes private air carriers for the indiscriminate collection and state-led automated analysis of PNR datasets relating to hundreds of millions of air passengers. Hence, when the Court of Justice of the EU decided in Ligue des droits humains (Case C-817/19) on the PNR Directive’s compatibility with EU law, it simultaneously rendered a landmark decision on this emerging European security architecture.
The objective of this conference is to explore from a multi-disciplinary perspective the far-reaching consequences that the PNR decision has on the future of the European security architecture, the protection of fundamental rights, and the accountability of different actors, including EU agencies. In light of the PNR decision, the conference seeks to address four themes:
The role of Artificial Intelligence in EU security governance
The requirements for independent oversight mechanisms and judicial review
The limits of national security exceptions
Public-private collaborations and the protection of privacy and other fundamental rights