Advanced Search
Content Type: News & Analysis
Unless this is the first time you’ve come to our website, you will notice that it looks very different today. We have a new logo and new brighter colours (read more about our new visual identity here). But our rebrand isn’t just a new visual identity, it’s a new way of talking about our work, and a new way of working with you. We asked ourselves two questions - ’What does PI stand for?’ and 'What kind of future is PI campaigning for?’ Our rebrand is the culmination of a year of critical…
Content Type: Case Study
The increasing deployment of highly intrusive technologies in public and private spaces such as facial recognition technologies (FRT) threaten to impair our freedom of movement. These systems track and monitor millions of people without any regulation or oversight.
Tens of thousands of people pass through the Kings Cross Estate in London every day. Since 2015, Argent - the group that runs the Kings Cross Estate - were using FRT to track all of those people.
Police authorities rushed in secret…
Content Type: News & Analysis
Unlikely as it may seem, the UN institution that has one of the greatest potential to impact upon people’s rights around the world is now the UN Statistics Division. And why is that?
Last week, they had a crucial meeting where they endorsed the UN’s Legal Identity Agenda and the UN’s Legal Identity Task Force. The stakes could hardly be higher. One of the UN’s Sustainable Development Goals, SDG 16.9, states that “by 2030 provide legal identity for all including free birth…
Content Type: Report
In December 2019 Privacy International made submissions to Police Scotland in relation to documents designed to explain to the public how cyber kiosks will work and what information will be given to victims when Police Scotland extract data from their phone.
Police Scotland rely on 'consent' to seize a phone from a victim. We believe the lack of information provided to the individual regarding extraction, examination, retention, deletion, sharing and search parameters undermines that any…
Content Type: Video
You’re a witness or a victim or a suspect of a crime; or even just travelling going on holiday. Officials demand your phone, then disappear with it. What happened to your phone? What happened to your data? What will happen to you?
We all generate vast amounts of data using our mobile phones - more than most of us are aware of - and that data has become increasingly attractive to law enforcement agencies around the world, enabled by ‘extraction technologies’ supplied by companies like…
Content Type: Guide step
Ad Blockers aim to prevent your browser from connecting to Ad servers and loading ads on webpages you are visiting. They can also block some parts of webpages that likely display ads. Blocking ads and connections to ad servers can help minimise the amount of data that the Adtech industry collects about you for targeted advertising.
Warning: Using an ad-blocker may cause some pages to display incorrectly or not at all. This guide also shows how you can modify the Ad Blocker's behaviour to allow…
Content Type: Guide step
uBlock Origin (que no debe confundirse con uBlock, que es un proyecto diferente) es un bloqueador de anuncios independiente y de código abierto que utiliza una lista depurada de servidores y evita que tu navegador se conecte a estos servidores y evita que tu navegador se conecte a estos servidores con el propósito mostrarte anuncios.
Nota: En el mercado hay muchos bloqueadores de anuncios y puedes ensayar alternativas. Al utilizar un bloqueador de anuncios independiente, de código abierto y…
Content Type: Long Read
Commercial interests seem to often overshadow the EU’s stance as a global privacy leader. After looking at Europes's shady funds to border forces in the Sahel area, Niger's new biometric voting system, and attempts to dismantle smugglers networks powered by Europe's gifts of surveillance, freelance journalist Giacomo Zandonini looks at the battle for data protection and digital rights in the continent.
What do a teenage labourer on a marijuana farm in Lesotho, a…
Content Type: Long Read
The UK’s Metropolitan Police have began formally deploying Live Facial Recognition technology across London, claiming that it will only be used to identify serious criminals on “bespoke ‘watch lists’” and on “small, targeted” areas.
Yet, at the same time, the UK’s largest police force is also listed as a collaborator in a UK government-funded research programme explicitly intended to "develop unconstrained face recognition technology", aimed “at making face…
Content Type: Case Study
The right to privacy is one of the precedents used to establish reproductive rights. Laws and policies which impede upon individuals’ rights to access sexual and reproductive health services may also interfere with individuals’ right to privacy and to make autonomous decisions as it pertains to their health and fertility, meaning the two are linked. Reproductive rights are necessary for bodily autonomy.
Reproductive rights have, more recently, been put at risk by one of the most concerning…
Content Type: Case Study
In 2015, James Bates was charged with first-degree murder in the death of Victor Collins. Collins was found floating face down in Bates’ hot tub in November 2015. Bentonville police served two search warrants ordering Amazon to turn over the “electronic data in the form of audio recordings, transcribed records, text records and other data contained on the Amazon Echo device” in Bates’ home.
The reason for the warrants? According to the police, just because the device was in the house that…
Content Type: News & Analysis
This piece was originally published by Unwanted Witness here.
Today marks exactly one year since Uganda passed its data protection law, becoming the first East African country to recognize privacy as a fundamental human right, as enshrined in Art 27 of the 1995 Uganda Constitution as well as in regional and International laws.
The Data Protection and Privacy Act, 2019 aims to protect individuals and their personal data by regulating processing of personal information by state and non-state…
Content Type: Long Read
Background
Kenya’s National Integrated Identity Management Scheme (NIIMS) is a biometric database of the Kenyan population, that will eventually be used to give every person in the country a unique “Huduma Namba” for accessing services. This system has the aim of being the “single point of truth”, a biometric population register of every citizen and resident in the country, that then links to multiple databases across government and, potentially, the private sector.
NIIMS was introduced…
Content Type: Long Read
In 2018, following the Cambridge Analytica scandal, Facebook announced the “Download Your Information” feature allowing users to download all the information that the company have on them since the creation of the account. All of it? It doesn’t seem so. Concerns were quickly raised when Facebook released the feature, that the information was inaccurate and incomplete.
Privacy International recently tested the feature to download all ‘Ads and Business’ related information (You can accessed it…
Content Type: Case Study
In 2015, a man in Connecticut was charged with murdering his wife based on evidence from her Fitbit. Richard Dabate, the accused, told the police that a masked assailant came into the couple’s suburban home at around 9am on 23 December 2015, overpowering Dabate then shooting his wife as she returned through the garage.
However, the victim’s fitness tracker told a different story. According to data from the device, which uses a digital pedometer to track the wearer’s steps, Dabate’s wife was…
Content Type: Case Study
Anyone who is arrested should be informed of the reasons for their arrest and any charges against them. Anyone who is detained is also entitled to a trial within a reasonable time, or to be released if no charges are held against them.
Privacy enhances these protections. It provides limitations on the manner in which information can be obtained about you, and the kind of information that can be accessed about you by law enforcement, who can access that information and how they can use it.…
Content Type: Long Read
This piece was written by Aayush Rathi and Ambika Tandon, who are policy officers at the Centre for Internet and Society (CIS) in India. The piece was originally published on the website Economic Policy Weekly India here.
In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices…
Content Type: Long Read
The UN Committee on the Elimination of Discrimination against Women (CEDAW) is meeting from 10-28 February to review the progress of women’s rights in Afghanistan, Bulgaria, Eritrea, Kiribati, Latvia, Pakistan, Republic of Moldova, and Zimbabwe. At forums like this, the attempts of Heartbeat International to curtail reproductive rights internationally must be highlighted. Heartbeat International is a US-based organisation that is developing and promoting a suite of data intensive technologies…
Content Type: Long Read
Valentine’s Day is traditionally a day to celebrate relationships, but many relationships that begin romantically can quickly become controlling, with partners reading emails, checking texts and locations of social media posts. This can be just the beginning.
Today, Friday 14th February, Privacy International and Women’s Aid are launching a series of digital social media cards giving women practical information on how to help stay safe digitally from control and abuse.
Did you know…
Content Type: News & Analysis
Today, the District Court of the Hague ruled that the right to privacy prevailed over the hunt against alleged benefits fraudsters. The ruling could have huge implications for the future of digital welfare around the world.
In NJCM cs/ De Staat der Nederlanden (NJCM vs the Netherlands), also known as the SyRI case, the court considered the legality of the System Risk Indication (SyRI), a system designed by the Dutch government to process large amounts of data collected by various Dutch public…
Content Type: Advocacy
TEDIC, InternetLab, Derechos Digitales, la Fundación Karisma, Dejusticia, la Asociación por los Derechos Civiles y Privacy International acogen el llamado de la Relatoría Especial sobre Derechos Económicos, Sociales, Culturales y Ambientales (DESCA) de la Comisión Interamericana de Derechos Humanos (CIDH) de enviar información para la elaboración del Informe Anual sobre DESCA del año 2019, que se presentará ante la Organización de los Estados Americanos (OEA) en 2020.
El objeto de este…
Content Type: Advocacy
TEDIC, InternetLab, Derechos Digitales, Fundación Karisma, Dejusticia, Asociación por los Derechos Civiles and Privacy International welcome the call made by the Special Rapporteurship on Economic, Social, Cultural and Environmental Rights (ESCER) of the Inter-American Commission on Human Rights (IACHR) to inform the preparation of the Annual Report of the ESCER for the year 2019, which will be presented to the Organization of American States (OAS) during 2020.
This submission aims to outline…
Content Type: Advocacy
Privacy International welcomes this opportunity to submit comments to the FATF consultation. The draft recommendation is an improvement on existing guidance that we have reviewed.
We also welcome the calls of the FATF for accommodations that will relieve burdens upon individuals who are being excluded from the financial sector, as a result of the FATF’s prior recommendations.
PI believes that identity systems must empower people. The initial question surrounding the development of any…
Content Type: Advocacy
In order to ensure free and fair elections, it is essential that there be safeguards and protections applied to prevent the exploitation of personal data. It is important that those with responsibilities for protecting our data be transparent in order to ensure that there are effective safeguards in place, and civil society plays an important role in holding them accountable.
At Privacy International we developed the attached questions to help obtain information from bodies/authorities…
Content Type: Explainer
Television offers some of the earliest instances of digital marketing. The majority of television channels rely on commercials and advertisements to maintain their operations. For the past 75 years, TV adverts have been passive transmissions broadcast to viewers, the demographics of the channels audience guiding the kinds of products and services shown during commercial breaks and intermissions. With the changes in the way individuals are now consuming content however, broadcasters are trying…
Content Type: Case Study
In early May 2019, it was revealed that a spyware, exploiting a vulnerability in Facebook’s WhatsApp messaging app, had been installed onto Android and iOS phones. The spyware could be used to turn on the camera and mic of the targeted phones and collect emails, messages, and location data. Citizen Lab, the organization that discovered the vulnerability, said that the spyware was being used to target journalists and human rights advocates in different countries around the world. The spyware…