Advanced Search
Content Type: Examples
On the day South Korea relaxed its social distancing measures, a 29-year-old man tested positive for COVID-19. The previous weekend, he had visited five nightclubs in the gay district of Itweon in Seoul, mingling with around 7,200 other people. After nearly 80 new COVID-19 cases have been linked to that one man's outing, the mayor ordered all clubs and bars closed indefinitely, and led officials to push back reopening schools by a week. Soon aftewards, another infected man was found to have…
Content Type: Examples
Contact tracing apps will only work effectively if people trust them and install them in sufficient numbers. Soon after its launch, however, the North Dakota contact tracing app people were already dropping it after posting complaints in the Google App store. In a survey of 798 Americans, researchers at Microsoft Research, Johns Hopkins University, and the University of Zurich found that nearly half said they would not install a COVID-19 contact tracing app that has false negatives or could…
Content Type: Examples
South Korea's second spike in coronavirus cases was curbed via a contact tracing regime that uses credit card records, mobile phone tracking, and GPS location data in order to track the previous movements of infected individuals working alongside efficient diagnostic testing. Successfully tracing an outbreak in Itaewon to a gay barhopper, however, led to reports of homophobic abuse targeted at the South Korean LGBTQIA community, and online criticism has led some who should be self-isolating to…
Content Type: Examples
The best contact tracers in US history were a group of mid-20th century venereal disease investigators working for a programme at the Centers for Disease Control and Prevention whose strategy eventually led to the eradication of smallpox in the 1970s. Talking to infected people and tracking down their vague descriptions of contacts at a time when VD was a source of shame was challenging; recruits were required to have a college degree, preferably in liberal arts, and a varied background of work…
Content Type: Examples
Local health authorities in Germany have relied on human contact tracers since the country confirmed its first COVID-19 cases early in 2020, and say that doing so has helped the country keep its death rate comparatively low even with a less restrictive lockdown than many other countries. Germany aims to have 16,000 contract tracers overall, or five for every 25,000 people. Tracing involves phoning each newly-diagnosed patient and asking their movements; those who have been in close contact for…
Content Type: Examples
NHS Digital has added facial recognition to its app, which allows people to order prescriptions, book appointments, and find health care data, in hopes it will also be usable as an "immunity passport" once at-home testing becomes available. The NHS facial recognition system was built by iProov, and is available in England for both Android and iOS devices; users enroll by submitting a photo of themselves from an official document such as a passport or driving licence and then using the phone to…
Content Type: Examples
Estonia has begun testing its Immuunsuspass app, which was developed for the Back to Work NGO by the Estonian technology firms Transferwise and Guardtime working with health specialists. The app, which is intended to help schools and employers make decisions, will have to pass scientific consensus before being approved for use. It allows users to access COVID-19 test results for an hour after proving their identity, and issues them with a QR code valid for one minute that they can use to show…
Content Type: Examples
Numerous companies are repurposing their body monitors, asset trackers, and electronic ankle monitors and marketing them to the newly-created market for strap-on surveillance bracelets to enforce quarantine and social distancing including companies such as AiRISTA Flow. Redpoint Positioning Corporation, Israel-based SuperCom.
https://theintercept.com/2020/05/25/coronavirus-tracking-bracelets-monitors-surveillance-supercom/
Writer: Sam Biddle
Publication: The Intercept
Content Type: Examples
Latvia became one of the first countries to use Apple's and Google's new joint toolkit to launch a smartphone contact tracing app, Apturi Covid. For now, the app will only work for Latvia's 2 million citizens, but the intention is that it should interoperate with the apps other countries to aid travellers.
https://www.euractiv.com/section/digital/short_news/latvia-to-launch-google-apple-friendly-coronavirus-contact-tracing-app/
Writer: Reuters
Publication: Euractiv
Content Type: Examples
An Ipsos MORI survey conducted on May 20-22 found generally high levels of compliance with lockdown restrictions, though many were suffering. While roughly three-quarters were confident they could download and operate a contact tracing app and would be willing to comply with its recommendations, only 40% were confident or fairly confident that they could trust the government to protect their and other people's data, and only 42% were confident or fairly confident that the app could help limit…
Content Type: Case Study
Students around the world are quickly turning into training-data for intrusive facial recognition technology. In Sweden, the national Data Protection Authority (DPA) ruled that students at Anderstorp High School in Skellefteå had their right to privacy violated by the testing of facial recognition software to take attendance.
The Skellefteå school board invited a private company, Tieto, to install facial recognition cameras across classrooms that would automatically register students’ class…
Content Type: Guide step
Es importante asegurarte de que solo permitas que accedan a Instagram las aplicaciones que verdaderamente lo necesitan.
Para ello, tendrás que utilizar la interfaz web con cualquier navegador en tu teléfono o computadora:
Después de iniciar la sesión, toca el ícono de persona en la esquina superior derecha de la pantalla, y luego toca el ícono de engranaje.
Ve a Apps autorizadas y revisa qué aplicaciones tienen acceso a tus datos.
Si ves una aplicación que no debería estar ahí, toca…
Content Type: Guide step
A lot of third-party apps ask you to get access to your Instagram data. This is the case with social media managing apps for example. The more apps have private information on you, the more likely it is that information can be misused. So it is important to make sure that you only allow Instagram access to apps that really need it. You can do this from your web browser or using the app.
On the Web:
After logging in, click the person icon on the upper-right corner of the screen, and then…
Content Type: Guide step
Avísale a la gente que no quieres que publiquen tu foto sin tu consentimiento.
No publiques fotos de otras personas sin su consentimiento.
No publiques información delicada en tus fotos o en las leyendas.
No reveles tu ubicación/asegúrate de que los detalles en el fondo no revelen tu ubicación.
No uses hashtags que podrían revelar datos privados (o la ubicación).
Ten cautela cuando publiques fotos de tus hijos en las redes sociales.
Si inicias una sesión de tu cuenta Instagram en otros…
Content Type: Guide step
Even with the tightest privacy settings it's important to acknowledge that the way you and others use the app can still be compromising in terms of sensitive data being shared. In addition to in-app settings there's a few good practices that you should keep in mind:
Let people know that you don't want your picture posted without your consent - if you make your profile private because you don't want unknown people to have access to photos of you, then you should make sure there are no…
Content Type: Guide step
Sugerimos que utilices la autenticación de dos factores, porque implica un paso adicional de seguridad para entrar a tu cuenta. Al hacerlo, además de pedir tu nombre de usuario y contraseña, Instagram verificará tu identidad enviando un código exclusivo a tu dispositivo.
Esto se puede hacer por SMS (mensaje de texto) o utilizando una aplicación de autenticación que sugiera Instagram. Veamos las dos maneras.
En la aplicación móvil:
Ve a tu perfil tocando el ícono de la esquina inferior…
Content Type: Guide step
We suggest using Two-Factor authentication, as it provides an extra security step in order to access your account. This way, besides asking for your username and password, Instagram will verify your identity by sending a unique code to your device.
This can be done using an authentication app or by SMS (text message). Let's go through both although you should be wary that SMS might not be the most secure.
On mobile app:
Go to your profile by clicking the bottom right corner icon. Then tap…
Content Type: Guide step
Blocking an account on Instagram will make them unable to find your profile, stories and posts. When you block a profile, they do not get a notification about your action. Blocking an account means you will stop getting notifications from that same account and it also means you cannot follow an account you have blocked. Keep in mind that if your profile is set to public, anyone that you have blocked can find you if they login through another account.
On the mobile app or on your browser (…
Content Type: Guide step
Si quieres tomar medidas más fuertes, bloquear a alguien en Instagram impedirá que encuentre tu perfil, tus historias y tus mensajes. Cuando bloqueas a alguien, Instagram no le notificará tu acción a esa persona. Cuando bloqueas a alguien dejarás de recibir las notificaciones que vengan de esa persona. No podrás seguir cuentas que hayas bloqueado. Ten en cuenta que si tu cuenta está configurada como pública, las personas que hayas bloqueado podrán encontrarte si se conectan con otra cuenta.
En…
Content Type: News & Analysis
Traduction réalisée par Nadine Blum.
Le 29 mai, le Congrès nigérien a voté une loi permettant au gouvernement d’intercepter largement certaines communications électroniques. La loi rend légale l’interception de communications, autorisée par le gouvernement, sans protections appropriées ni mécanismes de contrôle.
La loi a été adoptée avec 104 votes pour – le Parlement nigérien compte 171 membres – et sans la participation de l’opposition qui a boycotté la loi. L’opposition a affirmé…
Content Type: Long Read
1. What are the barriers to access safe and legal abortion care?
The Indian state’s approach to reproductive rights historically has focused on population control rather than enhancing individual autonomy and removing structural barriers to reproductive health services, which is reflected in the barriers to provision of services. As a consequence of the early adoption of family planning and population control measures in the 1950s, India was one of the first countries to legislate on abortion…
Content Type: Guide step
En la aplicación móvil:
Ve a tu perfil tocando el ícono de la esquina inferior derecha. Luego toca el icono de las tres franjas en la parte superior derecha y elige Configuración.
Ve a Privacidad y entonces podrás cambiar la Privacidad de la cuenta de pública a privada.
En la web:
En la página web de Instagram toca el ícono superior derecho para ir a tu perfil. Después, toca el ícono de engranaje para ir a Configuración.
Selecciona Privacidad y seguridad y luego podrás…
Content Type: Guide step
This is the first step in improving your privacy on Instagram. When you first create your account, it is set as "public" by default, meaning anybody can find it and see what you share.
Making your account private lets you share your content with a select group of people that you care about. Anyone else that might want to access it needs to send you a follow request to get your approval first.
On mobile app:
Go to your profile by clicking the bottom right corner icon. Then tap the three…
Content Type: Video
Given everything that's happening at the moment around the world, we've decided to postpone our episode on ID in Kenya until next week.
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Some of the resources we mentioned in the episode can be found here:
ACLU: know your rights: https://www.aclu.org/know-your-rights/protesters-…
Content Type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
In Kenya, access to abortion care is restricted by the Constitution, which provides that: “…
Content Type: News & Analysis
Humanitarian organisations are defined by their commitment to core, apolitical principles, including: humanity, impartiality, neutrality, independence and to “do no harm”.
And yet the ways data and technology are being used in the world today are often far from being apolitical, humane, impartial, neutral and independent, and in many instances many actors are using technology to exploit people, failing to protect and empower many individuals and communities - in particular those most in need…
Content Type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Even though abortion is legal in certain cases in Argentina, different types of barriers restrict the access to legal abortions, contribute…
Content Type: Long Read
This research was produced by Paz Peña as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion?
According to figures from the Ministry of Health, more than 33 thousand clandestine abortions are…
Content Type: News & Analysis
On 29 May, Niger’s Congress voted on a law allowing for broad interception powers of certain electronic communications by the government. The bill makes it lawful for the government to approve the interception of communications without appropriate safeguards or oversight mechanisms.
The law passed with 104 votes – the Nigerien parliament has 171 members – without the participation of the opposition that boycotted the law. The opposition claimed that
the law will allow those, for…
Content Type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Legal barriers
To identify the barriers experienced by women to access safe and legal abortion care, we have to understand the legal picture…