Regulatory Compliance
- Compliance with all relevant Horizon Europe rules, including those for participation and dissemination, is mandatory.
- Adherence to EU financial regulations, specifically Regulation (EU, Euratom) No 2018/1046, is required.
- Applicants must obtain and maintain any required permits and authorizations relevant to their research and innovation activities.
Data Protection & Ethical Standards
- Projects must integrate principles that respect privacy and other fundamental rights, contributing to a secure online environment.
- All activities must adhere to high ethical standards and principles of research integrity.
Intellectual Property Policies
- Specific policies regarding the management of intellectual property (IP) are outlined in the Work Programme General Annexes and must be followed.
Risk Management & Security
- A critical requirement is the safeguarding of the Union's strategic assets, interests, autonomy, and security.
- Entities directly or indirectly controlled by non-eligible countries or entities are strictly prohibited from participation to mitigate security risks.
- Projects are expected to contribute to robust digital infrastructures capable of resisting and countering cyber-attacks and hybrid threats.
Unique Aspects & Strategic Opportunities
- Lump Sum Funding Model: This grant utilizes a lump sum contribution model, which significantly simplifies the administrative burden for beneficiaries by removing the need for detailed cost reporting and ex-post financial audits. Payments are strictly tied to the successful completion of predefined work packages.
- Specific Focus on PQC Integration: The grant specifically targets the integration of Post-Quantum Cryptography into high-level protocols and ensuring backward compatibility, rather than just fundamental PQC research. This highlights a critical need for practical application.
- EU Strategic Alignment: The opportunity strongly aligns with the EU's strategic objectives of strengthening its technological capabilities, achieving digital sovereignty, and enhancing cybersecurity resilience, particularly relevant in the current geopolitical climate.
- SME Participation Encouraged: Special attention is given to SMEs, recognizing their vital role in the cybersecurity ecosystem and broader digital single market competitiveness, encouraging their involvement in developing security and privacy 'by design' solutions.