Daniel Dimov

Daniel Dimov, LLB, LL.M., PhD, Attorney-at-law (RBA/BG)

Rasa Juzenaite, MA, LL.M., CIPP/E











For Daniel’s full CV, please click here.

For Rasa’s full CV, please click here.




Press (selected articles)

Dimov, D. V., ‘Voluntary agreements on blocking are interfering with human rights’, European Digital Rights (EDRi), Brussels, Belgium, 27 July 2011. Available at: https://edri.org/edrigramnumber9-15voluntary-blocking-interfere-human-rights/.

Dimov, D.V. and McNamee, J., ‘Draft Council conclusions on Net Neutrality’, European Digital Rights (EDRi), Brussels, Belgium, 27 July 2011. Available at: https://edri.org/edrigramnumber9-15net-neutrality-council-conclusions/.

Dimov, D.V., ‘EP study on ‘Consumer Behaviour in a Digital Environment’, European Digital Rights (EDRi), Brussels, Belgium, 7 September 2011. Available at: https://edri.org/edrigramnumber9-17consumer-behaviour-digital-environment/.

Dimov, D.V. and Bradwell, P., ‘New rules on term of protection of music recordings’, European Digital Rights (EDRi), Brussels, Belgium, 21 September 2011. Available at: https://edri.org/edrigramnumber9-18term-extension-music-copyright/.

McNamee J., Fiedler, K., Humeau, M., Dimov, D.V., ‘EU Surveillance: A summary of current EU surveillance and security measures’ (booklet), European Digital Rights (EDRi), http://www.statewatch.org/news/2012/jan/eu-surveillance-edri.pdf.

Dimov, D.V. and Van den Herik, J., ‘Използване на краудсоурсинг за разрешаване на спорове’, Bulgarian Legal World Magazine, 22 June 2012. Available at http://www.legalworld.bg/show.php?storyid=27076.

Dimov, D.V., ‘Legal and Technological Concerns Regarding the Use of BIOS Anti-theft Technologies’, InfoSec Institute, 31 October 2012. Available at http://resources.infosecinstitute.com/bios-anti-theft-technologies/.

Dimov, D.V., ‘Legal Aspects of Online Gambling’, InfoSec Institute, 13 March 2013. Available at http://resources.infosecinstitute.com/legal-aspects-of-online-gambling/.

Dimov, D.V., ‘Software Patent Law: EU, New Zealand, and the US compared’, InfoSec Institute, 19 April 2013. Available at http://resources.infosecinstitute.com/software-patent-law-eu-new-zealand-and-the-us-compared/.

Dimov, D.V., ‘E-Money Fraud’, InfoSec Institute, 9 May 2013. Available at http://resources.infosecinstitute.com/e-money-fraud/.

Dimov, D.V., ‘PayPal: Chargebacks and Dispute Resolution’, InfoSec Institute, 23 May 2013. Available at http://resources.infosecinstitute.com/paypal-chargebacks-and-dispute-resolution/.

Dimov, D.V., ‘The new Google Maps: a perfect place for review fraud’, InfoSec Institute, 19 June 2013. Available at http://resources.infosecinstitute.com/the-new-google-maps-a-perfect-place-for-review-fraud/.

Dimov, D.V., ‘The Debate Over Network Neutrality in the EU and the USA,’ InfoSec Institute, 11 February 2014. Available at http://resources.infosecinstitute.com/debate-network-neutrality-eu-usa/.

Dimov, D.V., ‘Ten Important Privacy Threats,’ InfoSec Institute, 18 February 2014. Available at http://resources.infosecinstitute.com/ten-important-privacy-threats/.

Dimov, D.V., ‘Human-implanted RFID chips,’ InfoSec Institute, 17 April 2014. Available at http://resources.infosecinstitute.com/human-implanted-rfid-chips/.

Dimov, D.V., ‘Crowdsensing: State of the Art and Privacy Aspects,’ InfoSec Institute, 29 July 2014. Available at http://resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/.

Dimov, D.V., ‘Privacy Risks of Sleep-Tracking Devices,’ InfoSec Institute, 12 September 2014. Available at http://resources.infosecinstitute.com/privacy-risks-sleep-tracking-devices/.

Dimov, D.V., ‘Information Security of Nanorobots,’ InfoSec Institute, 14 October 2014. Available at http://resources.infosecinstitute.com/information-security-nanorobots/.

Dimov, D.V., ‘Chinese Social Media Censorship,’ InfoSec Institute, 15 October 2014. Available at http://resources.infosecinstitute.com/chinese-social-media-censorship/.

Dimov, D.V., ‘Cyber Attack Protection via Crowdsourcing,’ InfoSec Institute, 23 October 2014. Available at http://resources.infosecinstitute.com/cyber-attack-protection-via-crowdsourcing/.

Dimov, D.V., ‘Privacy Risks of Beacons,’ InfoSec Institute, 8 December 2014. Available at http://resources.infosecinstitute.com/privacy-risks-beacons/.

Dimov, D.V., ‘Legality of Jailbreaking Mobile Phones,’ InfoSec Institute, 16 December 2014. Available at http://resources.infosecinstitute.com/legality-jailbreaking-mobile-phones/.

Dimov, D.V., ‘Information Security Vulnerabilities of Automobiles,’ InfoSec Institute, 13 January 2015. Available at http://resources.infosecinstitute.com/information-security-vulnerabilities-automobiles/.

Dimov, D.V., ‘What US Companies Need to Know about EU Privacy Laws,’ InfoSec Institute, 2 February 2015. Available at http://resources.infosecinstitute.com/us-companies-need-know-eu-privacy-laws/.

Dimov, D.V., ‘Legality of Electronic Signatures in the EU and the US,’ InfoSec Institute, 5 March 2015. Available at http://resources.infosecinstitute.com/legality-electronic-signatures-eu-us/.

Dimov, D.V., ‘Side Effects of the New US Net Neutrality Rules,’ InfoSec Institute, 16 April 2015. Available at http://resources.infosecinstitute.com/side-effects-of-the-new-us-net-neutrality-rules/.

Dimov, D.V., ‘How to Prevent a Domain Name Theft,’ InfoSec Institute, 19 June 2015. Available at http://resources.infosecinstitute.com/how-to-prevent-a-domain-name-theft/.

Dimov, D.V., ‘How to Deal with Reverse Domain Name Hijacking,’ InfoSec Institute, 6 July 2015. Available at http://resources.infosecinstitute.com/how-to-deal-with-reverse-domain-name-hijacking/.

Juzenaite, R., Dimov, D.V., ‘The Most Hacker-Active Countries – Part I,’ InfoSec Institute, 5 August 2015. Available at http://resources.infosecinstitute.com/the-most-hacker-active-countries-part-i/.

Juzenaite, R., Dimov, D.V., ‘The Most Hacker-Active Countries – Part II,’ InfoSec Institute, 19 August 2015. Available at http://resources.infosecinstitute.com/the-most-hacker-active-countries-part-ii/.

Juzenaite, R., Dimov, D.V., ‘How Security Awareness Can Prevent Romance Fraud,’ InfoSec Institute, 4 September 2015. Available at http://resources.infosecinstitute.com/how-security-awareness-can-prevent-romance-fraud/.

Juzenaite, R., Dimov, D.V., ‘Crowdsourcing Cybersecurity: How to Raise Security Awareness Through Crowdsourcing,’ InfoSec Institute, 22 September 2015. Available at http://resources.infosecinstitute.com/crowdsourcing-cybersecurity-how-to-raise-security-awareness-through-crowdsourcing/.

Juzenaite, R., Dimov, D.V., ‘Online Rental Scams,’ InfoSec Institute, 29 September 2015. Available at http://resources.infosecinstitute.com/online-rental-scams/.

Juzenaite, R., Dimov, D.V., ‘Top 5 Snapchat Security Vulnerabilities,’ InfoSec Institute, 1 October 2015. Available at http://resources.infosecinstitute.com/top-5-snapchat-security-vulnerabilities-how-the-app-learned-its-lessons/.

Juzenaite, R., Dimov, D.V., ‘Top 7 Types of Hacking Tutorials on YouTube,’ InfoSec Institute, 5 October 2015. Available at http://resources.infosecinstitute.com/top-7-types-of-hacking-tutorials-on-youtube/.

Juzenaite, R., Dimov, D.V., ‘Smartwatch – A Fashionable and Dangerous Gadget,’ InfoSec Institute, 22 October 2015. Available at http://resources.infosecinstitute.com/smartwatch-a-fashionable-and-dangerous-gadget-10-tips-to-protect-your-smartwatch/.

Juzenaite, R., Dimov, D.V., ‘Interplanetary Hacking: How the space industry mitigates cyber-threats,’ InfoSec Institute, 27 October 2015. Available at http://resources.infosecinstitute.com/interplanetary-hacking-how-the-space-industry-mitigates-cyber-threats/.

Juzenaite, R., Dimov, D.V., ‘Password Security: Efficient Protection of Digital Identities,’ InfoSec Institute, 30 October 2015. Available at http://resources.infosecinstitute.com/password-security-efficient-protection-of-digital-identities/.

Dimov, D.V.,  Juzenaite, R., ‘The Most Popular Social Network Phishing Schemes,’ InfoSec Institute, 10 November 2015. Available at http://resources.infosecinstitute.com/password-security-efficient-protection-of-digital-identities/.

Juzenaite, R., Dimov, D.V., ‘Security Vulnerabilities of Voice Recognition Technologies’, InfoSec Institute, 7 December 2015. Available at http://resources.infosecinstitute.com/security-vulnerabilities-of-voice-recognition-technologies/.

Dimov, D.V., Juzenaite, R., ‘Budgeting for Security Awareness: Who – What – When – Where – Why – How much’, InfoSec Institute, 10 December 2015. Available at http://resources.infosecinstitute.com/budgeting-for-security-awareness-who-what-when-where-why-how-much/.

Dimov, D.V., Juzenaite, R., ‘Attacks on Hotel Wi-Fi Networks’, InfoSec Institute, 11 December 2015. Available at http://resources.infosecinstitute.com/attacks-on-hotel-wi-fi-networks/.

Dimov, D.V., Juzenaite, R., ‘Phishing Attacks Using Public Data’, InfoSec Institute, 6 January 2016. Available at http://resources.infosecinstitute.com/phishing-attacks-using-public-data/.

Dimov, D.V., Juzenaite, R., ‘Legal Issues of New and Emerging Technologies’, InfoSec Institute, 3 February 2016. Available at http://resources.infosecinstitute.com/legal-issues-of-new-and-emerging-technologies/.

Dimov, D.V., Juzenaite, R., ‘Security Vulnerabilities of Internet-Connected Homes’, InfoSec Institute, 30 March 2016. Available at http://resources.infosecinstitute.com/security-vulnerabilities-of-internet-connected-homes/.

Dimov, D.V., Juzenaite, R., ‘Tax-Evasion Hacks’, InfoSec Institute, 19 April 2016. Available at http://resources.infosecinstitute.com/tax-evasion-hacks/.

Dimov, D.V., Juzenaite, R., ‘Information Security Vulnerabilities of Trains’, InfoSec Institute, 25 April 2016. Available at http://resources.infosecinstitute.com/information-security-vulnerabilities-of-trains/.

Dimov, D.V., Juzenaite, R., ‘New Wave of Cyber-attacks on Banks’, InfoSec Institute, 9 June 2016. Available at http://resources.infosecinstitute.com/new-wave-of-cyber-attacks-on-banks/.

Dimov, D.V., Juzenaite, R., ‘Ransomware Attacks on Law Firms’, InfoSec Institute, 11 July 2016. Available at http://resources.infosecinstitute.com/ransomware-attacks-on-law-firms/.

Dimov, D.V., Juzenaite, R., ‘Privacy Concerns about Pokémon GO’, InfoSec Institute, 1 August 2016. Available at http://resources.infosecinstitute.com/privacy-concerns-about-pokemon-go/.

Dimov, D.V., Juzenaite, R., ‘Security of Smart Contracts’, InfoSec Institute, 17 August 2016. Available at http://resources.infosecinstitute.com/security-smart-contracts/.

Dimov, D.V., Juzenaite, R., ‘The End of Bitcoin Ransomware?’, InfoSec Institute, 14 October 2016. Available at http://resources.infosecinstitute.com/the-end-of-bitcoin-ransomware/.

Dimov, D.V., Juzenaite, R., ‘Technologies for Conducting Privacy Compliance Assessments’, InfoSec Institute, 17 October 2016. Available at http://resources.infosecinstitute.com/technologies-for-conducting-privacy-compliance-assessments/.

Juzenaite, R., Dimov, D.V., ‘Latest Trends in Cybersquatting,’ InfoSec Institute, 11 January 2017. Available at http://resources.infosecinstitute.com/latest-trends-in-cybersquatting/.

Juzenaite, R., Dimov, D.V., ‘Insurance Against Ransomware Threats,’ InfoSec Institute, 24 February 2017. Available at http://resources.infosecinstitute.com/insurance-ransomware-threats/.

Juzenaite, R., Dimov, D.V., ‘Security Concerns of Flying Motorcycles,’ InfoSec Institute, 7 April 2017. Available at http://resources.infosecinstitute.com/security-concerns-flying-motorcycles/.

Dimov, D.V., Juzenaite, R., ‘Why Was Wanacrypt0r 2.0 So Successful?’, InfoSec Institute, 22 May 2017. Available at http://resources.infosecinstitute.com/wanacrypt0r-2-0-successful/.

Dimov, D.V., Juzenaite, R., ‘Risks and Benefits of Security Policy Templates’, InfoSec Institute, 24 May 2017. Available at http://resources.infosecinstitute.com/risks-benefits-security-policy-templates/.

Juzenaite, R., Dimov, D.V., ‘Security Risks of Smart E-cigarettes’, InfoSec Institute, 26 May 2017. Available at http://resources.infosecinstitute.com/security-risks-smart-e-cigarettes/.

Juzenaite, R., Dimov, D.V., ‘How to Recognize Phishing Emails’, InfoSec Institute, 30 May 2017. Available at http://resources.infosecinstitute.com/recognize-phishing-emails/.

Dimov, D.V., Juzenaite, R., ‘Malware-as-a-service’, InfoSec Institute, 5 June 2017. Available at http://resources.infosecinstitute.com/malware-as-a-service/.

Dimov, D.V., Juzenaite, R., ‘US Regions Most Vulnerable to a Cyber Attack’, InfoSec Institute, 26 June 2017. Available at http://resources.infosecinstitute.com/us-regions-vulnerable-cyber-attack/.

Dimov, D.V., Juzenaite, R., ‘“Robin Hood” Ransomware and Psychological Manipulation Techniques’, InfoSec Institute, 29 June 2017. Available at http://resources.infosecinstitute.com/robin-hood-ransomware-psychological-manipulation-techniques/.

Dimov, D.V., Juzenaite, R., ‘How to Hire Information Security Professionals’, InfoSec Institute, 6 July 2017. Available at http://resources.infosecinstitute.com/hire-information-security-professionals/.

Dimov, D.V., Juzenaite, R., ‘Innovative Methods of Information Security Training’, InfoSec Institute, 15 September 2017. Available at http://resources.infosecinstitute.com/innovative-methods-information-security-training/.

Juzenaite, R., Dimov, D.V., ‘How to Draft an Incident Response Policy’, InfoSec Institute, 18 September 2017. Available at http://resources.infosecinstitute.com/draft-incident-response-policy/.

Dimov, D.V., Juzenaite, R., ‘Cybersecurity as an ethical obligation’, InfoSec Institute, 22 September 2017. Available at http://resources.infosecinstitute.com/cybersecurity-ethical-obligation/.

Dimov, D.V., Juzenaite, R., ‘US-Russia Cyber-Security Unit: Future Reality or Pipe Dream’, InfoSec Institute, 1 October 2017. Available at http://resources.infosecinstitute.com/us-russia-cyber-security-unit-future-reality-pipe-dream/.

Dimov, D.V., Juzenaite, R., ‘The Future of Information Security’, InfoSec Institute, 6 November 2017. Available at https://resources.infosecinstitute.com/future-information-security/.

Dimov, D.V., Juzenaite, R., ‘Top 5 Smartest Malware Programs’, InfoSec Institute, 22 November 2017. Available at https://resources.infosecinstitute.com/top-5-smartest-malware-programs/.

Dimov, D.V., Juzenaite, R., ‘How to Avoid Phishing on LinkedIn’, InfoSec Institute, 14 December 2017. Available at https://resources.infosecinstitute.com/avoid-phishing-linkedin/.

Dimov, D.V., Juzenaite, R., ‘Tips for Drafting Efficient Employee Information Security Policies’, InfoSec Institute, 15 December 2017. Available at https://resources.infosecinstitute.com/tips-drafting-efficient-employee-information-security-policies/.

Dimov, D.V., Juzenaite, R., ‘Consequences of the Late Announcement of Cyber-security Incidents’, InfoSec Institute, 16 February 2018. Available at  https://resources.infosecinstitute.com/tips-drafting-efficient-employee-information-security-policies/.

Dimov, D.V., Juzenaite, R., ‘Privacy Concerns About Emotional Chatbots’, InfoSec Institute, 16 February 2018. Available at https://resources.infosecinstitute.com/privacy-concerns-emotional-chatbots/.

Dimov, D.V., Juzenaite, R., ‘GDPR Trolls’, InfoSec Institute, 31 May 2018. Available at https://resources.infosecinstitute.com/gdpr-trolls/.

Dimov, D.V., Juzenaite, R., ‘The Decline of Ransomware and the Rise of Cryptocurrency Mining Malware’, InfoSec Institute, 14 June 2018. Available at  https://resources.infosecinstitute.com/the-decline-of-ransomware-and-the-rise-of-cryptocurrency-mining-malware/.

Dimov, D.V., Juzenaite, R., ‘Federal agencies are at high information security risk’, InfoSec Institute, 15 June 2018. Available at https://resources.infosecinstitute.com/federal-agencies-are-at-high-information-security-risk/.

Dimov, D.V., Juzenaite, R., ‘The EU Plans to Adopt a Cybersecurity Certification Framework’, InfoSec Institute, 15 June 2018. Available at https://resources.infosecinstitute.com/the-eu-plans-to-adopt-a-cybersecurity-certification-framework/.

Dimov, D.V., Juzenaite, R., ‘Does the GDPR Threaten the Development of Blockchain?’, InfoSec Institute, 21 June 2018. Available at https://resources.infosecinstitute.com/does-the-gdpr-threaten-the-development-of-blockchain/.

Dimov, D.V., Juzenaite, R., ‘Security vulnerabilities of cryptocurrency exchanges’, InfoSec Institute, 26 June 2018. Available at https://resources.infosecinstitute.com/security-vulnerabilities-of-cryptocurrency-exchanges/.

Dimov, D.V., Juzenaite, R., ‘BabaYaga and the Rise of Malware-Destroying Malware’, InfoSec Institute, 3 July 2018. Available at https://resources.infosecinstitute.com/babayaga-and-the-rise-of-malware-destroying-malware/.

Ast, F., Dimov, D.V., ‘Is Kleros a Fair Dispute Resolution System?’, Kleros.io, 18 October 2018. Available at https://blog.kleros.io/is-kleros-a-fair-dispute-resolution-system/.

Dimov, D.V., ‘5 Common Myths About the GDPR’, Techopedia, 7 June 2019. Available at https://www.techopedia.com/5-common-myths-about-the-gdpr/2/33840.

Dimov, D.V., Juzenaite, R., ‘Information Security in Conflict Zones’, InfoSec Institute, 29 November 2018. Available at https://resources.infosecinstitute.com/information-security-in-conflict-zones/.

Dimov, D.V., Juzenaite, R., ‘An Overview of the Proposed DIGIT Act’, InfoSec Institute, 11 February 2019. Available at https://resources.infosecinstitute.com/overview-proposed-digit-act/.

Dimov, D.V., ‘What do Linux system administrators need to know about the GDPR?’, InfoSec Institute, 11 April 2019. Available at https://resources.infosecinstitute.com/what-do-linux-system-administrators-need-to-know-about-the-gdpr/.

Dimov, D.V., ‘How to ensure Windows Server is GDPR-compliant’, InfoSec Institute, 14 May 2019. Available at https://resources.infosecinstitute.com/how-to-ensure-windows-server-is-gdpr-compliant/.

Dimov, D.V., Juzenaite, R., ‘How to identify and eliminate VPN vulnerabilities’, InfoSec Institute, 8 July 2019. Available at https://resources.infosecinstitute.com/how-to-identify-eliminate-vpn-vulnerabilities/.

Dimov, D.V., Juzenaite, R., ‘An overview of the new security framework for Windows 10’, InfoSec Institute, 9 July 2019. Available at https://resources.infosecinstitute.com/overview-of-new-security-framework-for-windows-10/.

Dimov, D.V., ‘What does a director of fraud and identity do?’, InfoSec Institute, 9 July 2019. Available at https://resources.infosecinstitute.com/what-does-a-director-of-fraud-and-identity-do-2/.

Dimov, D.V., Juzenaite, R., ‘Anti-spam legislation for system administrators’, InfoSec Institute, 15 July 2019. Available at https://resources.infosecinstitute.com/anti-spam-legislation-for-system-administrators/.

Dimov, D.V., ‘5 Can We Expect a U.S. Federal Consumer Privacy Law?’, Techopedia, 17 July 2019. Available at https://www.techopedia.com/can-we-expect-a-us-federal-consumer-privacy-law/2/33888.

Dimov, D.V., ‘The State of the Art and the Future of GDPR Compliance Software’, Techopedia, 21 August 2019. Available at https://www.techopedia.com/the-state-of-the-art-and-the-future-of-gdpr-compliance-software/2/33942.

Dimov, D.V., ‘The importance of end-to-end encryption for ensuring GDPR compliance’, FortKnoxster.com, 23 September 2019. Available at https://fortknoxster.com/blog/the-importance-of-end-to-end-encryption-for-ensuring-gdpr-compliance/.


Academic publications

Van den Herik, J., Dimov, D.V., ‘Towards Crowdsourced Online Dispute Resolution’, Law Across Nations: Governance, Policy & Statutes, Kierkegaard, S. (Ed.), Kierkegaard, P. (Assoc. Ed.), International Association of IT Lawyers (IAITL), 19 September 2011, pp. 244 – 257. Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1933392.

Van den Herik, J., Dimov, D.V., ‘Can eBay’s Community Review Forum fairly resolve disputes?’, BNAIC proceedings, the 23rd Benelux Conference on Artificial Intelligence (BNAIC 2011), 3 November 2011.

Van den Herik, J., Dimov, D.V., ‘Een Crowdsourcing Model voor eBay’, in ‘Samen Slimmer: Hoe de ‘wisdom of crowds’ onze samenleving zal veranderen’, Kreijveld, M. (Ed.), Stichting Toekomstbeeld der Techniek, April 2012.

Van den Herik, J., Dimov, D.V., ‘Geschilbeslechting door crowdsourcing’, Tijdschrift conflicthantering, 11 October 2012.

Van den Herik, J., Levy, D., Plaat, A., Dimov, D.V., ‘Plagiarism in Game Programming Competitions’, Entertainment Computing, Volume 5, Issue 3, August 2014. Available at http://www.sciencedirect.com/science/article/pii/S1875952114000093.

Dimov, D.V., ‘Crowdsourced Online Dispute Resolution’, E.M. Meijers Instituut, 2017.

Dimov, D.V., Ast, F., van den Herik, H.J., ‘The role of CODR in future smart contracts’, Boom juridish, 2019.


Other publications

53 summaries of competition law decisions /1-2 A4 pages per summary/ published at www.caselex.com.

18 summaries of Bulgarian case law with EU relevance published at www.caselex.com.

Reports published in the Intranet of the European Commission.


Attended conferences

2011 The 6th International Conference on Legal, Security, and Privacy Issues in IT Law (LSPI), Nicosia, Cyprus

2011 The 23rd Benelux Conference on Artificial Intelligence, Gent, Belgium

2017 Digital Festival 2017, Brussels, Belgium

2017 The 3rd International Conference New Horizons in Basic and Applied Science (ICNHBAS 2017), Hurghada, Egypt

2018 The International Category Theory Conference, the University of Azores, Ponta Delgada, Portugal

2018 IXth International Conference on Business, Economics, Law, Language & Psychology (ICBELLP), Dec 25-26, Dubai, the United Arab Emirates.

2019 10th GRUR meets Brussels Workshop on the Future of Intellectual Property in the EU, Brussels, Belgium.