Advanced Search
Content Type: News & Analysis
11 November 2014
With a draft United Nations General Assembly resolution on the right to privacy in the digital age expected to come in a mere few weeks, negotiations on this key international document have reached a critical stage.
This year's resolution creates a significant opportunity to build upon two important developments at the United Nations – the 2013 UN General Assembly (UNGA) resolution on the right to privacy in the digital age, and the July 2014 authoritative…
Content Type: Case Study
What happened
As we traveled the world we saw alarming use and spread of surveillance capabilities. From country to country we saw the same policy ideas, and the same kit. The role of industry to the growth of surveillance capability had never been exposed before.
What we did
In 1996 we published the first ‘Big Brother Incorporated’ study, identifying the vast numbers of technology firms who were investing in surveillance technologies. We were particularly surprised by the rise of German…
Content Type: Long Read
To celebrate International Data Privacy Day (28 January), PI and its International Network have shared a full week of stories and research, exploring how countries are addressing data governance in light of innovations in technology and policy, and implications for the security and privacy of individuals.
Content Type: Long Read
“FISA section 702 reauthorisation” might not sound like it matters very much to very many people, but it’s pretty dramatic: in short, last month US lawmakers rejected a bill which would have provided protections for US citizens – constitutionally protected against being spied on by US spy agencies – from being spied on, and instead voted to extend their powers to do so.
In the fall out, it’s worth considering just why such mass surveillance powers are such a big issue, how the promise of…
Content Type: News & Analysis
The recent announcement by the Minister for Justice that serious and organised crime will receive legislative attention from the Government and the Oireachtas is most welcome. However, the stated means of achieving this are deeply concerning for the Irish public and larger digital economy. The statements indicate that the Government intends to follow the British model of surveillance where Irish companies can be compelled to betray their users. Why would any user engage with a…
Content Type: News & Analysis
7 October 2013
The following is an English version of an article in the September issue of Cuestión de Derechos, written by Privacy International's Head of International Advocacy, Carly Nyst.
To read the whole article (in Spanish), please go here.
The Chinese government installs software that monitors and censors certain anti-government websites. Journalists and human rights defenders from Bahrain to Morocco have their phones tapped and their emails read by security services. Facebook…
Content Type: News & Analysis
15 October 2014
The following was written by Carly Nyst, Legal Director for Privacy International, and originally appeared in the Guardian's Comment is Free section:
Until the fall of the Berlin wall in 1989, the East German state security service – the Stasi – conducted surveillance and kept files on a third of the country’s population. One of those people was activist and dissident Ulrike Poppe, whose communications and activities were spied on by Stasi operatives constantly for 15 years.…
Content Type: News & Analysis
What we can achieve. What we are doing.
A week to discuss global privacy
Throughout these last days, in the context of the #dataprivacyweek, we have been talking about privacy from a global perspective, while showcasing the research done by Privacy International and the organisations who are part of its International Network.
The right to privacy is a particularly multifaceted human right, which manifests in diverse and nuanced ways. As we said when we set the tone for this week, privacy is…
Content Type: Long Read
To celebrate Data Privacy Week, we spent the week discussing privacy and issues related to control, data protection, surveillance, and identity. Join the conversation on Twitter using #dataprivacyweek.
Do you live in a “smart city”? Chances are, you probably do (or at least your city claims to be). But do you know what exactly makes your city “smart”, beyond the marketing term? And what does this have to do with privacy?
Companies and governments will tell you that the more cameras, sensors…
Content Type: Long Read
To celebrate International Data Privacy Day (28 January), PI and its International Network have shared a full week of stories and research, exploring how countries are addressing data governance in light of innovations in technology and policy, and implications for the security and privacy of individuals.
According to the World Bank, identity “provides a foundation for other rights and gives a voice to the voiceless”. The UN Deputy Secretary-General has called it a tool for “advancing…
Content Type: News & Analysis
Privacy International is celebrating Data Privacy Week, where we’ll be talking about privacy and issues related to control, data protection, surveillance and identity. Join the conversation on Twitter using #dataprivacyweek.
If you were looking for a loan, what kind of information would you be happy with the lender using to make the decision? You might expect data about your earnings, or whether you’ve repaid a loan before. But, in the changing financial sector, we are seeing more and more…
Content Type: Report
¿Existen ciudades inteligentes? ¿O son un pretexto para recolectar y procesar más datos? Este informe examina la realidad del mercado de las ciudades inteligentes más allá del uso del término de marketing "inteligente" y las iniciativas existentes. También consideramos las consecuencias y las importantes preocupaciones que surgen en términos de privacidad y otros derechos humanos.
Content Type: Long Read
To celebrate International Data Privacy Day (28 January), PI and its International Network have shared a full week of stories and research, exploring how countries are addressing data governance in light of innovations in technology and policy, and implications for the security and privacy of individuals.
At the core of data protection debates, there is a power play between empowering individuals to control their data and empowering those who use (or want to) use their data.
By…
Content Type: Long Read
Privacy International is celebrating Data Privacy Week, where we’ll be talking about privacy and issues related to control, data protection, surveillance and identity. Join the conversation on Twitter using #dataprivacyweek.
Exercising the right to privacy extends to the ability of accessing and controlling our data and information, the way it is being handled, by whom, and for what purpose. This right is particularly important when it comes to control of how States perform these activities.…
Content Type: News & Analysis
It has been almost 40 years since the Council of Europe’s Convention 108 for the Protection of Individuals with regard to Automatic Processing of Personal Data was signed. The Convention was the first binding treaty dealing with privacy and data protection that recognised the necessity to “reconcile the fundamental values of the respect for privacy and the free flow of information between peoples” and is the reason why we celebrate Data Protection Day annually on 28 January.
It has since been…
Content Type: News & Analysis
2017 begun with a progressive Human Rights Council resolution on the right to privacy in the digital age, noting that profiling of individuals may lead to discrimination. It ended with a Security Council resolution on counter-terrorism, calling for profiling of all air travellers and widespread collection and sharing of personal data, as well as introducing biometric technologies on a mass scale.
May this be another example of the tension between human rights laws and counter-terrorism…
Content Type: News & Analysis
15 November 2013
The following is an excerpt from a Comment originally published by The Guardian, written by Privacy International's Head of Advocacy, Carly Nyst:
From databases to mobile phone apps and SMS systems, GPS tracking and humanitarian drones to biometric registration, new technologies are rapidly becoming central to the delivery of humanitarian and development aid.
Refugees fleeing the Syrian conflict are having their irises scanned and their identity documents digitised…
Content Type: News & Analysis
13 October 2013
The following is an excerpt from a guest article which appeared on openDemocracy, written by Privacy International's Research Officer, Anna Crowe:
Humanitarian actors often forsake the right to privacy in favour of promoting programmes utilising phones to deliver services, either through a lack of understanding or wilful ignorance as to the risks involved.
It is clear that the massive uptake of mobile phones in developing countries has played a crucial role in the…
Content Type: Press release
26 March 2015
The UN's top human rights body, the Human Rights Council, today has passed a landmark resolution endorsing the appointment of an independent expert on the right to privacy. For the first time in the UN's history, an individual will be appointed to monitor, investigate and report on privacy issues and alleged violations in States across the world.
The resolution, which appoints a Special Rapporteur on the right to privacy for an initial period of three years, was spearheaded…
Content Type: Long Read
The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. Below we outline 10 ways in which this exploitation and…
Content Type: Key Resources
Introduction
Why We Are So Concerned about Government Hacking for Surveillance
Scope of Our Safeguards
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4. Judicial Authorisation
5. Integrity of information
6. Notification
7. Destruction and Return of Data
8. Oversight and Transparency
9. Extraterritoriality
10. Effective Remedy
Commentary on each
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4.…
Content Type: News & Analysis
This post was written by Chair Emeritus of PI’s Board of Trustees, Anna Fielder.
The UK Data Protection Bill is currently making its way through the genteel debates of the House of Lords. We at Privacy International welcome its stated intent to provide a holistic regime for the protection of personal information and to set the “gold standard on data protection”. To make that promise a reality, one of the commitments in this government’s ‘statement of intent’ was to enhance…
Content Type: News & Analysis
This post was written by PI Technologist Ed Geraghty.
At the very heart of ThornSec’s design is that we assume our security will fail. There is nothing perfect on this earth (except kittens). The entire point is to fail well. For charities and NGOs that are fragile, poorly resourced, and often at risk, this is relatively novel thinking. We prepare for that with a strict adherence to good security practice.
It is exactly this element of novelty that makes us more open than your…
Content Type: News & Analysis
This post was written by PI Policy Officer Lucy Purdon.
In 1956, US Presidential hopeful Adlai Stevenson remarked that the hardest part of any political campaign is how to win without proving you are unworthy of winning. Political campaigning has always been a messy affair and now the online space is where elections are truly won and lost. Highly targeted campaign messages and adverts flood online searches and social media feeds. Click, share, repeat; this is what political engagement looks…
Content Type: Advocacy
Privacy International's comments to the Article 29 Working Party Guidelines on automated individual decision-making and profiling are here.
Content Type: News & Analysis
We work to collect the minimum amount of data that we need from you to do our jobs within the resources we have, and to protect and use that data in an ethical manner. We are expanding the ways we engage with our supporters, by rebuilding our tech services to ensure that we continue to live up to that commitment.
Here we explain what data we have access to, what we collect, and how we work to protect your data. This piece is more explanatory than our policy statement which is available here.…
Content Type: News & Analysis
Overview
CIPIT is currently investigating how the privacy of Kenyan citizens was affected by the use of biometric data during the just concluded 2017 general and repeat elections. The IEBC is mandated by law to register voters, verify their registration details and conduct elections. Accordingly, the IEBC is the custodian of the public voter register. There have been reports that individuals received SMS texts from candidates vying for various political seats during the campaign period of the…
Content Type: Advocacy
This briefing consolidates Privacy International's concerns on the UK Data Protection Bill as it reached Report Stage in the House of Lords.
Content Type: People
Holly has over 20 years of experience promoting election integrity and democratic reform worldwide.
She has served previously as Director of the Election Observation Democracy Support project, which develops methodology for EU election observation missions, and has also worked for the Organisation for Security and Cooperation in Europe’s Office for Democratic Institutions and Human Rights and the National Democratic Institute.
Holly has participated in election observation missions in over 20…
Content Type: Long Read
The battle for Kenyan voters’ allegiance in the 2017 Presidential election was fought on social media and the blogosphere. Paid advertisements for two mysterious, anonymous sites in particular started to dominate Google searches for dozens of election-related terms in the months leading up to the vote. All linked back to either “The Real Raila”, a virulent attack campaign against presidential hopeful Raila Odinga, or Uhuru for Us, a site showcasing President Uhuru Kenyatta’s accomplishments. As…