Advanced Search
Content Type: News & Analysis
The UK government has acknowledged that section 8(4) of the Regulation of Investigatory Powers Act (“RIPA”) (which has since been repealed) violated Articles 8 and 10 of the European Convention on Human Rights (ECHR). In relation to Article 10, it specifically acknowledged that the way in which security agencies handled confidential journalistic material violated fundamental rights protected by Article 10.
As part of a friendly settlement with two applicants, the UK government acknowledged…
Content Type: Explainer
Bluetooth
The majority of apps settled on using Bluetooth for proximity tracing.
Just what is Bluetooth?
Named after the 10th Century King Harald "Bluetooth" Gormsson who unified Scandinavia — and whose runic initials comprise the logo — Bluetooth is a wireless, low-power, and therefore short-distance, set of protocols used primarily to connect devices directly to each other in order to transfer data, such as video and audio.
Bluetooth for tracking?
Most of us who've encountered Bluetooth use…
Content Type: Press release
Today, the High Court ruled that the Home Secretary acted unlawfully and breached human rights and data protection laws by operating a secret, blanket policy of seizing, retaining and extracting data from the mobile phones of asylum seekers arriving by small boat.
This claim for judicial review was brought by three asylum seeking claimants: HM represented by Gold Jennings, and KA and MH represented by Deighton Pierce Glynn. The Claimants, like thousands of others arriving by small boat, all…
Content Type: News & Analysis
Background
Today judgment has been handed down in the landmark case of R (HM and MA and KH) v Secretary of State for the Home Department.
This is a Judicial Review decision concerning the UK Home Office’s secret and blanket policy of seizing mobile phones of all migrants who arrived to the UK by small boat between April 2020 and November 2020, and extracting data from all phones. PI was a third party intervener in the case.
The case revealed that migrants were searched on arrival at Tug Haven…
Content Type: Video
Links
Edin mentioned 'a journalist and her son' being targeted; their names are Carmen and Emilio Aristegui. You can find out more about people targeted in Mexico
Keep up to date with ongoing litigation against NSO Group around the globe
Read our report, together with Amnesty International and SOMO, on NSO Group's corporate structure
Find more examples of harm involving NSO group
As revelations about the abuses of NSO Group's spyware continue, we took a look at what…
Content Type: News & Analysis
In the midst of the atrocious war currently being waged by Russia on Ukraine, on 14 March 2022 Reuters reported that Clearview AI, the infamous online surveillance company, had offered its services to the Ukrainian defense ministry. A day later in an interview for TechCrunch, Ukraine's vice prime minister and minister for Digital Transformation confirmed that the partnership with Clearview AI was "currently in very early development".
Clearview is an online surveillance company that collects…
Content Type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
Digital health apps of all kinds are being used by people to better understand their bodies, their fertility, and to access health information. But there are concerns that the information people both knowingly and unknowing provide to the app, which can be very personal health…
Content Type: Video
Links
More information about how Bounty illegally exploited the data of 14 million mothers and babies: https://pvcy.org/podillegalexploitation
Sign up to our corporate exploitation email list to find out more about our work on brands and the advertising supply chain: https://pvcy.org/podsignup
Original podcast: https://privacyinternational.org/video/3787/podcast-marketing-and-maternity
----------
Orginally Recorded 12th March 2020.
We can’t believe we’re having to say…
Content Type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content Type: Video
Links
Teens and Facebook
Frances Haugen and Instagram
Facebook and Metaverse
Metaverse and Bandwidth
EFF on new Google replacement for cookies
Google's follow up plan to replace cookies
EV cars and the national grid
The gates of hell
South Africa, Omicron, and travel
Patent-free covid vaccine
Covid vaccine plastic bag shortage
James Webb telescope
Human trails for Elon Musks' brain chip
Content Type: Video
Links
Our predictions from 2021
Clearview UK provisional fine
Clearview legal trouble in France
Clearview investments
TRIPS waiver
Travel podcast
Patent-free vaccine
Mental health podcast
Dr David works for the Mental Health Foundation
Google unionise
The 'Great Resignation'
PI has been working with two unions on our managed by bots campaign
Complicated history of plagues and workers
Indian National Education Plan
Ugandan Election
Crypto mining trouble
US commitment…
Content Type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.
Index:
1. UK Border 2025
2. Super-complaint and judicial review challenge to data sharing
3. Mobile phone seizure and extraction
4. Freedom of Information Act requests
The dystopian future: UK Border 2025
To set the scene on how the…
Content Type: Advocacy
We wrote to the Home Office as part of our campaign ‘STOP SPYING ON ASYLUM SEEKERS’, opposing the draconian surveillance of asylum seekers taking place through the Aspen Card.
We asked detailed questions about how data collected from Aspen Card usage is used to monitor asylum seekers, and how the Home Office are alerted to any ‘breach of conditions’ of the card.
In their reply, the Home Office told us that:
“The Home Office can be alerted to a breach of conditions by several internal and…
Content Type: News & Analysis
Last week, Privacy International intervened in an important and long overdue Judicial Review into the UK Home Office’s secret and blanket policy of seizing mobile phones of all migrants who arrived to the UK by small boat between April 2020 and November 2020.
The case revealed that migrants were searched on arrival at Tug Haven in Dover and compelled to hand over their mobile phones and provide their PIN numbers. During the course of proceedings it came to light that the Home Office had self-…
Content Type: News & Analysis
In a ruling handed down on 14 October 2021 by the High Court of Kenya in relation to an application filed by Katiba Institute calling for a halt to the rollout of the Huduma card in the absence of a data impact assessment, the Kenyan High Court found that the Data Protection Act applied retrospectively.
Background to the case
Huduma Namba as initially proposed
In January 2019, the Kenyan Statute Law (Miscellaneous Amendment) Act No. 18 of 2018 came into effect, introducing a raft of amendments…
Content Type: Advocacy
The role that personal data plays in political campaigns https://privacyinternational.org/learn/data-and-elections and the risks of data abuse and exploitation only entered into the public discourse a few years ago, when Cambridge Analytica became a household name thanks to several scandals over the course of 2017 and 2018.
Since then, we have seen a flurry of initiatives that have helped shed light on the otherwise very opaque practices of digital campaigning. There have been public…
Content Type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Telegram for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content Type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Facebook for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content Type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like WhatsApp for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content Type: Guide step
Your Twitter app stores a lot of information about you in the cloud. Here we show you how to gain access to it.
It’s important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Twitter for your data and avoid getting a warrant. So the use of this technology means there is no limit…
Content Type: Advocacy
Privacy International (PI) welcomes the aim of the Digital Markets Act (DMA) to address some of the challenges posed by the way the current digital markets operate. As we noted in our preliminary assessment, the proposal put forward by the European Commission in December 2020 contains some shortcomings that need to be addressed, if the DMA were to be effective in tackling these challenges. Some of these shortcomings have been addressed, particularly by the European Parliament in its resolution…
Content Type: Guide step
Your Uber app stores a lot of information in the cloud. Here we show you how you can get access to it.
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Uber for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they…