Advanced Search
Content Type: Long Read
To celebrate Data Privacy Week, we spent the week discussing privacy and issues related to control, data protection, surveillance, and identity. Join the conversation on Twitter using #dataprivacyweek.
Do you live in a “smart city”? Chances are, you probably do (or at least your city claims to be). But do you know what exactly makes your city “smart”, beyond the marketing term? And what does this have to do with privacy?
Companies and governments will tell you that the more cameras, sensors…
Content Type: Long Read
To celebrate International Data Privacy Day (28 January), PI and its International Network have shared a full week of stories and research, exploring how countries are addressing data governance in light of innovations in technology and policy, and implications for the security and privacy of individuals.
According to the World Bank, identity “provides a foundation for other rights and gives a voice to the voiceless”. The UN Deputy Secretary-General has called it a tool for “advancing…
Content Type: News & Analysis
Privacy International is celebrating Data Privacy Week, where we’ll be talking about privacy and issues related to control, data protection, surveillance and identity. Join the conversation on Twitter using #dataprivacyweek.
If you were looking for a loan, what kind of information would you be happy with the lender using to make the decision? You might expect data about your earnings, or whether you’ve repaid a loan before. But, in the changing financial sector, we are seeing more and more…
Content Type: Report
¿Existen ciudades inteligentes? ¿O son un pretexto para recolectar y procesar más datos? Este informe examina la realidad del mercado de las ciudades inteligentes más allá del uso del término de marketing "inteligente" y las iniciativas existentes. También consideramos las consecuencias y las importantes preocupaciones que surgen en términos de privacidad y otros derechos humanos.
Content Type: Long Read
To celebrate International Data Privacy Day (28 January), PI and its International Network have shared a full week of stories and research, exploring how countries are addressing data governance in light of innovations in technology and policy, and implications for the security and privacy of individuals.
At the core of data protection debates, there is a power play between empowering individuals to control their data and empowering those who use (or want to) use their data.
By…
Content Type: Long Read
Privacy International is celebrating Data Privacy Week, where we’ll be talking about privacy and issues related to control, data protection, surveillance and identity. Join the conversation on Twitter using #dataprivacyweek.
Exercising the right to privacy extends to the ability of accessing and controlling our data and information, the way it is being handled, by whom, and for what purpose. This right is particularly important when it comes to control of how States perform these activities.…
Content Type: News & Analysis
It has been almost 40 years since the Council of Europe’s Convention 108 for the Protection of Individuals with regard to Automatic Processing of Personal Data was signed. The Convention was the first binding treaty dealing with privacy and data protection that recognised the necessity to “reconcile the fundamental values of the respect for privacy and the free flow of information between peoples” and is the reason why we celebrate Data Protection Day annually on 28 January.
It has since been…
Content Type: News & Analysis
2017 begun with a progressive Human Rights Council resolution on the right to privacy in the digital age, noting that profiling of individuals may lead to discrimination. It ended with a Security Council resolution on counter-terrorism, calling for profiling of all air travellers and widespread collection and sharing of personal data, as well as introducing biometric technologies on a mass scale.
May this be another example of the tension between human rights laws and counter-terrorism…
Content Type: News & Analysis
15 November 2013
The following is an excerpt from a Comment originally published by The Guardian, written by Privacy International's Head of Advocacy, Carly Nyst:
From databases to mobile phone apps and SMS systems, GPS tracking and humanitarian drones to biometric registration, new technologies are rapidly becoming central to the delivery of humanitarian and development aid.
Refugees fleeing the Syrian conflict are having their irises scanned and their identity documents digitised…
Content Type: News & Analysis
13 October 2013
The following is an excerpt from a guest article which appeared on openDemocracy, written by Privacy International's Research Officer, Anna Crowe:
Humanitarian actors often forsake the right to privacy in favour of promoting programmes utilising phones to deliver services, either through a lack of understanding or wilful ignorance as to the risks involved.
It is clear that the massive uptake of mobile phones in developing countries has played a crucial role in the…
Content Type: Press release
26 March 2015
The UN's top human rights body, the Human Rights Council, today has passed a landmark resolution endorsing the appointment of an independent expert on the right to privacy. For the first time in the UN's history, an individual will be appointed to monitor, investigate and report on privacy issues and alleged violations in States across the world.
The resolution, which appoints a Special Rapporteur on the right to privacy for an initial period of three years, was spearheaded…
Content Type: Long Read
The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. Below we outline 10 ways in which this exploitation and…
Content Type: Key Resources
Introduction
Why We Are So Concerned about Government Hacking for Surveillance
Scope of Our Safeguards
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4. Judicial Authorisation
5. Integrity of information
6. Notification
7. Destruction and Return of Data
8. Oversight and Transparency
9. Extraterritoriality
10. Effective Remedy
Commentary on each
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4.…
Content Type: News & Analysis
This post was written by Chair Emeritus of PI’s Board of Trustees, Anna Fielder.
The UK Data Protection Bill is currently making its way through the genteel debates of the House of Lords. We at Privacy International welcome its stated intent to provide a holistic regime for the protection of personal information and to set the “gold standard on data protection”. To make that promise a reality, one of the commitments in this government’s ‘statement of intent’ was to enhance…
Content Type: News & Analysis
This post was written by PI Technologist Ed Geraghty.
At the very heart of ThornSec’s design is that we assume our security will fail. There is nothing perfect on this earth (except kittens). The entire point is to fail well. For charities and NGOs that are fragile, poorly resourced, and often at risk, this is relatively novel thinking. We prepare for that with a strict adherence to good security practice.
It is exactly this element of novelty that makes us more open than your…
Content Type: News & Analysis
This post was written by PI Policy Officer Lucy Purdon.
In 1956, US Presidential hopeful Adlai Stevenson remarked that the hardest part of any political campaign is how to win without proving you are unworthy of winning. Political campaigning has always been a messy affair and now the online space is where elections are truly won and lost. Highly targeted campaign messages and adverts flood online searches and social media feeds. Click, share, repeat; this is what political engagement looks…
Content Type: Advocacy
Privacy International's comments to the Article 29 Working Party Guidelines on automated individual decision-making and profiling are here.
Content Type: News & Analysis
We work to collect the minimum amount of data that we need from you to do our jobs within the resources we have, and to protect and use that data in an ethical manner. We are expanding the ways we engage with our supporters, by rebuilding our tech services to ensure that we continue to live up to that commitment.
Here we explain what data we have access to, what we collect, and how we work to protect your data. This piece is more explanatory than our policy statement which is available here.…
Content Type: News & Analysis
Overview
CIPIT is currently investigating how the privacy of Kenyan citizens was affected by the use of biometric data during the just concluded 2017 general and repeat elections. The IEBC is mandated by law to register voters, verify their registration details and conduct elections. Accordingly, the IEBC is the custodian of the public voter register. There have been reports that individuals received SMS texts from candidates vying for various political seats during the campaign period of the…
Content Type: Advocacy
This briefing consolidates Privacy International's concerns on the UK Data Protection Bill as it reached Report Stage in the House of Lords.
Content Type: People
Holly has over 20 years of experience promoting election integrity and democratic reform worldwide.
She has served previously as Director of the Election Observation Democracy Support project, which develops methodology for EU election observation missions, and has also worked for the Organisation for Security and Cooperation in Europe’s Office for Democratic Institutions and Human Rights and the National Democratic Institute.
Holly has participated in election observation missions in over 20…
Content Type: Long Read
The battle for Kenyan voters’ allegiance in the 2017 Presidential election was fought on social media and the blogosphere. Paid advertisements for two mysterious, anonymous sites in particular started to dominate Google searches for dozens of election-related terms in the months leading up to the vote. All linked back to either “The Real Raila”, a virulent attack campaign against presidential hopeful Raila Odinga, or Uhuru for Us, a site showcasing President Uhuru Kenyatta’s accomplishments. As…
Content Type: Long Read
Introduction
Why We Are So Concerned about Government Hacking for Surveillance
Scope of Our Safeguards
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4. Judicial Authorisation
5. Integrity of information
6. Notification
7. Destruction and Return of Data
8. Oversight and Transparency
9. Extraterritoriality
10. Effective Remedy
Commentary on each
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4.…
Content Type: Press release
A new investigation published today by Privacy International reveals the role of an American data-based digital advertising company in the highly divisive online re-election campaign of Kenyan president Uhuru Kenyatta.
In the run-up to Kenya's presidential election in August 2017, paid advertisements for two mysterious sites dominated Google searches for election-related terms and flooded Kenyans' social media feeds. All linked back to either 'The Real Raila', a virulent attack campaign…
Content Type: People
Joanna Oniszk is our Resources Director. She joined us in 2015 to take on donor coordination and financial management of the organisation. She has over ten years of experience in variety of finance and management roles in corporate sector, international organisations and charities and holds an MA in Economics.
Content Type: News & Analysis
Recently, a text from a local telecommunications company inquired whether its subscribers knew that they could now enroll their voice so they could access various services securely and conveniently. This added a further dynamic to the on-going debate in several quarters on the accelerated adoption of biometrics in Kenya. Does Kenya have the necessary framework in place to safeguard the privacy and security of its citizens? The reality is, innovators will not wait for an optimal…
Content Type: People
Tom is a Research Officer with Privacy International and is responsible for research and dissemination in the Global South. He leads our research on fintech and identity. He has a PhD in African Studies from the University of Edinburgh, exploring ethnicity and politics in East Africa. He has a MSc in African Studies fro the University of Edinburgh, and a BA in Politics and Philosophy from the University of York. He has taught in Tanzanian universities, and has a particular interest in…
Content Type: People
Ed is a Senior Technologist at Privacy International. He is responsible for our technical security and research, and leads the development of our security framework and tech engagement with our International Network.
Content Type: People
Caroline is Privacy International’s Legal Director and General Counsel. She leads the legal advocacy at PI and counsels PI’s programmes on legal strategy and risk. Caroline is a US-qualified lawyer who previously specialised in privacy and intellectual property litigation at a prominent US law firm. Caroline received her law degree from Yale Law School and her undergraduate degree in Anthropology from the University of California, Berkeley. After law school, Caroline…