Advanced Search
Content Type: Examples
Human Rights Watch reports that drug cartels and rebel groups are imposing their own lockdowns in rural areas of Colombia and using WhatsApp chats and pamphlets to advise local residents of curfew hours, transport shutdowns, and other bans that are far more strict than those imposed by the government. They have murdered at least eight civilians. In some areas, violent gangs are preventing people from leaving their homes at all, in two provinces armed groups have punished violators by torching…
Content Type: Examples
Immunity passports would impose artificial restrictions on who can and cannot participate in social, civic, and economic activities, and create a perverse incentive for individuals, particularly those who can’t afford a period of exclusion, to seek out infection, posing a health risk to anyone they come into contact with. Both governments and individuals may be under pressure to return employees to the workforce, and immunity passports may lead governments to believe they have a quick fix that…
Content Type: Examples
The French data protection authority, CNIL, has examined the French contact tracing app and ruled that it is not fully compliant with the provisions of GDPR and the French data protection law. CNIL’s primary complaint was that the app transferred the news that a user had been infected to all their contacts, not just those who had been in recent proximity, and the privacy policy was insufficiently specific about the categories of data that were being processed and its recipients. Finally, the…
Content Type: Long Read
An edited version of this article was originally published on the EDRi website in September 2020.
Introduction
Monopolies, mergers and acquisitions, anti-trust laws. These may seem like tangential or irrelevant issues for privacy and digital rights organisations. But having run our first public petition opposing a big tech merger, we wanted to set out why we think this is an important frontier for people's rights across Europe and indeed across the world.
In June, Google notified the…
Content Type: Examples
Hundreds of trucks carrying goods and humanitarian aid from Cameroon’s Douala sea port to Central African Republic are stranded at the border because testing kits are in short supply; under an agreement, Cameroon drivers who test negative are supposed to be granted access. Results of tests completed at local hospitals inside Cameroon are being rejected even though the CAR transport ministers assured drivers they would be honoured. CAR depends on the Douala seaport for about 95% of its goods and…
Content Type: Examples
Following trials in Leicester, Luton, and Blackburn with Darwen, the UK government will assign teams of health care professionals to more than ten local authorities and offer them Public Health England’s near real-time data on infections and a dedicated team of contact tracers, shifting away from its £10 billion centralised national system run under contract by Serco. As of early August, the Serco scheme was still failing to reach a significant proportion of those who had been in close contact…
Content Type: Examples
Several people have been arrested in Bangladesh for issuing bogus documentation to people who have not been tested for the coronavirus showing they are not infected. Such documents are required for migrant workers, who need to show that they are virus-free when they arrive at their overseas destination, and whose remittances back to their families are an important source of income for the country ($19 billion in 2019). Criminal gangs advertise on social media to find potential buyers; in one…
Content Type: Examples
Egyptian doctors are reporting that they are being threatened for speaking and posting publicly about working conditions as they struggle in a medical system overwhelmed by the coronavirus. At least seven members of the Egyptian Medical Syndicate, a quasi-governmental body that represents health care workers, are being detained for discussing COVID-19 on social media, which the government characterised as spreading false news; syndicate board member was arrested after criticising prime minister…
Content Type: Video
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Content Type: Advocacy
Privacy International responded to a call for submissions of the Working Group on Discrimination Against Women and Girls on the sexual and reproductive health and rights of women and girls in situations of crisis.
This submission builds on PI’s research highlighting the ways in which data exploitative technologies can obstruct the realisation of sexual and reproductive rights, and research carried out by our partners on the specific manifestations of these obstacles in multiple countries of…
Content Type: Case Study
The Peruvian government has a history of collaboration with the private sector in developing technology with the alleged purpose of providing greater security to citizens. The most recent example, the smartphone application "Peru En Tus Manos" launched in the context of the Covid-19 crisis, has been developed in a similar fashion and currently collects geolocation data on more than a million users. Although Peru has a proper legal framework for public private partnerships, developments are…
Content Type: Case Study
Como is one of the most advanced cities in Italy in the use of facial recognition technology (FRT). An investigation for the Italian Wired magazine published in June 2020 exposed how the system had been bought, installed and tested for months with little transparency and despite the lack of a clear legal framework.
The investigation was entirely based on tools available to everyone, such as Freedom of Information requests (FOI requests. Similar to PI’s campaign 'Unmasking policing, inc', it…
Content Type: Report
Privacy International partnered with the International Human Rights Clinic at Harvard Law School to guide the reader through a simple presentation of the legal arguments explored by national courts around the world who have been tasked with national courts that discuss the negative implications of identity systems, particularly on human rights, and to present their judgement.
This argumentation guide seeks to fill that gap by providing a clear, centralised source of the arguments advanced in…
Content Type: Examples
Human rights experts have accused the home secretary, Priti Patel, of ignoring legal guidance in an attempt to target child asylum seekers who cannot prove they are under 18.
A letter from the Home Office, seen by the Observer, reveals that the government is putting pressure on social workers to speed up the age assessment of unaccompanied minors, and offering to bankroll councils that face legal challenges as a result. The move comes as new evidence shows that hundreds of people were deported…
Content Type: Examples
Around 8,800 children have been deported from the United States along the Mexican border thanks to a new pandemic-related measure that functionally stripped the rights of those seeking asylum.
Donald Trump’s administration has expelled nearly 160,000 people since the emergency order proclaimed by the CDC took effect in March including roughly 7,600 adults and children who came to the US in families. The emergency order temporarily suspends citizens, regardless of their country of origin, from…
Content Type: Report
Many countries in the world have existing ID cards - of varying types and prevalence - there has been a new wave in recent years of state “digital identity” initiatives.
The systems that states put in place to identify citizens and non-citizens bring with them a great deal of risks.
This is particularly the case when they involve biometrics - the physical characteristics of a person, like fingerprints, iris scans, and facial photographs.
Activists and civil society organisations around the…
Content Type: Report
A common theme of all major pieces of national jurisprudence analyzing the rights implications of national identity system is an analysis of the systems’ impacts on the right to privacy.
The use of any data by the State including the implementation of an ID system must be done against this backdrop with respect for all fundamental human rights. The collection of data to be used in the system and the storage of data can each independently implicate privacy rights and involve overlapping and…
Content Type: Report
Identity systems frequently rely on the collection and storage of biometric data during system registration, to be compared with biometric data collected at the point of a given transaction requiring identity system verification.
While courts have arguably overstated the effectiveness and necessity of biometric data for identity verification in the past, the frequency of biometric authentication failure is frequently overlooked. These failures have the potential to have profoundly…
Content Type: Report
National identity systems naturally implicate data protection issues, given the high volume of data necessary for the systems’ functioning.
This wide range and high volume of data implicates raises the following issues:
consent as individuals should be aware and approve of their data’s collection, storage, and use if the system is to function lawfully. Despite this, identity systems often lack necessary safeguards requiring consent and the mandatory nature of systems ignores consent…
Content Type: Report
While identity systems pose grave dangers to the right to privacy, based on the particularities of the design and implementation of the ID system, they can also impact upon other fundamental rights and freedoms upheld by other international human rights instruments including the International Covenant on Civil and Political Right and the International Covenant on Economic, Social and Cultural Rights such as the right to be free from unlawful discrimination, the right to liberty, the right to…
Content Type: Report
Rather than providing a list of arguments, as is the case in the other sections of this guide, the fifth section provides a general overview describing the absence of consideration of these themes in existing jurisprudence and the reasons why these themes warrant future consideration including identity systems’ implications for the rule of law, the role of international human rights law, and considerations of gender identity.
Democracy, the Rule of Law and Access to Justice: This analysis of…
Content Type: Press release
Today, the European Court of Human Rights (ECtHR) has handed down a decision in a case brought by Privacy International and a coalition of internet and communications service providers and campaign groups including the Chaos Computer Club (Germany), GreenNet (UK), Jinbonet (Korea), May First/People Link (US), and Riseup (US) (the “coalition”).
The case challenges the conduct of hacking operations abroad by one of the UK’s intelligence agencies, the Government Communications…
Content Type: News & Analysis
The Law Enforcement Data Service (LEDS) is a unified, common interface to a new mega-database currently being developed by the Home Office National Law Enforcement Data Programme (NLEDP). We believe that the development of the programme poses a threat to privacy and other rights and must be subjected to strong oversight, safeguards, and transparency measures.
As we explained in our analysis, the data in LEDS is vast, ever-increasing, worryingly mixes both evidential and intelligence material –…
Content Type: Report
Madhewoo (Appellant) v The State of Mauritius and another (Respondents) (Mauritius)
The first case in the recent line of national identity systems cases is Madhewoo v. The State of Mauritius and Anor. This case, decided by the Mauritian Supreme Court in 2015, upheld the collection of fingerprint data as part of a national identity card scheme, but rejected a centralised database for the storage of this data in the system. The Mauritian court found that privacy rights guaranteed by the…
Content Type: Guide step
What: the Referer (a misspelling of referrer) header contains the address of the previous web page from which a link to the currently requested page was followed. In more simple terms, the referer is the URL from which came a request received by a server. A good example is if you click a link on the page site.com/page to go to another-site.com/link, the HTTP Referer received by another-site.com/link will have the value site.com/page.
Why it's important: While the referer header can have begnign…
Content Type: News & Analysis
A new report by the UN Working Group on mercenaries analyses the impact of the use of private military and security services in immigration and border management on the rights of migrants, and highlights the responsibilities of private actors in human rights abuses as well as lack of oversight and, ultimately, of accountability of the system.
Governments worldwide have prioritised an approach to immigration that criminalises the act of migration and focuses on security.
Today, borders are not…