By Plenary Sessions: Mario Kadastik

Total Sessions: 4

Fully Profiled: 4

2024-04-18
15th Riigikogu, 3rd session, plenary sitting
The speaker demonstrates profound expertise in the field of nuclear energy, addressing technical aspects such as SMRs (Small Modular Reactors), the plant's operational lifespan (60–100 years), and dual usage (electricity generation and district heating). He/She uses statistics to compare the volume of waste with oil shale ash (citing the Kiviõli example) and emphasizes that the construction of a nuclear power plant does not preclude achieving the 2030 renewable energy targets.
2024-04-17
15th Riigikogu, 3rd session, plenary sitting
The speaker demonstrates deep technical expertise in the fields of e-voting, cybersecurity, and cryptography, having personally gained hands-on experience with the technological aspects. Specific terms are used, such as code auditing, the two-envelope system, encrypted data, and hashes, to explain the system's control mechanisms. This expertise is further highlighted by references to training sessions organized by RIA and VVK, as well as the availability of Estonian cybersecurity experts.
2024-04-10
15th Estonian Parliament, 3rd session, plenary session
The speaker demonstrates a high level of expertise in the legislative process, providing detailed accounts of committee sessions, voting outcomes, and the handling of proposed amendments. Their knowledge of competition law is particularly thorough, as they explain the differences between administrative and misdemeanour proceedings during the transposition of the EU directive and reference the accumulated sums of fines. Technical language is used (e.g., "lead committee," "infringement procedure," "consensus-based").
2024-04-03
15th Estonian Parliament, 3rd sitting, plenary session
The speaker demonstrates technical proficiency in the fields of telecommunications and data protection, differentiating between device positioning and mass notification via the cell tower. He/She employs technical arguments to dispute the prior assumptions regarding privacy breaches made by the legal department and the Data Protection Inspectorate. The expert analysis focuses on linking technical details with their corresponding legal ramifications.