Advanced Search
Content Type: Examples
New US federal data released by the CDC in response to freedom of information requests show striking racial and ethnic disparities in all parts of the country in who gets infected and hospitalised with coronavirus. A survey of 640,000 infections in nearly 1,000 US counties found that Latino and African-American US residents are three times as likely to become infected and twice as likely to die of the virus as white people living the same places. In areas of Arizona and several other places,…
Content Type: Examples
After ORG asked questions via its legal representative, AWO’s Ravi Naik, the UK’s Department of Health and Social Care agreed to change the period it would retain Test and Trace data from 20 years to eight. Public Health England manager Yvonne Doyle explained that the novelty of COVID-19 was the reason for keeping the data longer, in case PHE needed to get back in touch with those who had tested positive with additional information.
Publication: ZDNet
Writer: Daphne Leprince-Ringuet…
Content Type: Examples
In early July the Open Rights Group issued a pre-action legal letter to UK health secretary Matt Hancock and the Department of Health and Social Care saying they have breached requirements under the Data Protection Act 2018 and GDPR by failing to conduct an impact assessment for the Test and Trace system. ORG and its lawyers, AWO, had been asking for details of the DPIA since the beginning of June, a few days after the system was launched. In their response, the DHSC’s lawyers said “there were…
Content Type: Examples
The October 2019 Presidential Decree 98/2019 granted the Hellenic Police the option of using drones in policing and border management for broad purposes; previously they were limited to using them for purposes such as preventing forest fires or helping rescue people after a natural disaster or an accident. By spring 2020, the Hellenic Police had begun using their new powers in cities such as Athens and Thessaloniki to enforce compliance with lockdown measures instituted to curb the spread of…
Content Type: Examples
Israel’s initial success in curbing the spread of the coronavirus in April was followed in June by a surge in cases that government advisers blamed on insufficient resources for ministries to implement an effective trace-and-trace programme and increase testing to the level that would show clearly where cases were appearing so outbreak could be suppressed quickly. Among the problems is the decision to use security service Shin Bet’s recently disclosed database of mobile phone location data to…
Content Type: Advocacy
Introduction
In February 2020, the Australian Competition and Consumer Commission (ACCC) commenced an investigation into the proposed acquisition of Fitbit by Google, which was originally announced in November 2019.
In March 2020, we made a submission to the ACCC, arguing that the acquisition would very likely have onerous implications for both consumers and markets. We asked the Australian regulator to apply strict scrutiny and not let hisory once again repeat itself. We concluded that the…
Content Type: Video
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Content Type: News & Analysis
The UN Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Professor Fionnuala Ní Aoláin together with Dr. Krisztina Huszti-Orbán, released today a key report on the “Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business?”.
The report explores the human rights risks involved in the deployment of biometrics emphasising that
in the absence of robust rights protections which are institutionally embedded…
Content Type: Guide step
Con cierta regularidad, borra las sesiones inactivas de Viber yendo a Configuración > Cuenta > Escritorio y tabletas.
Si un desconocido inicia una conversación contigo diciendo que es alguien que conoces, trata de asegurarte de que es quien dice ser antes de proporcionar cualquier tipo de información sobre ti
Cuando te unes a un grupo, todos los miembros del grupo podrán ver tu número telefónico. Recomendamos que antes de unirte a un grupo revises con cuidado quién puede ver esta…
Content Type: Guide step
From time to time, clear any inactive Viber sessions by going to Settings > Account > Desktop and Tablets.
If a stranger starts a conversation with you claiming to be someone you know try to ensure that they are who they claim they are before providing any information about yourself
Joining a group will make your phone number visible to all group members. Before joining a group we recommend you to be careful as to who might access this information
Messaging apps such as Viber are…
Content Type: Guide step
Si proteges tus tweets, no aceptes solicitudes de seguimiento de personas desconocidas.
Avísale a la gente que no quieres que publiquen tu foto sin tu consentimiento.
No publiques fotos de otras personas sin su consentimiento.
No publiques información delicada en tus fotos o en las leyendas.
No reveles tu ubicación/asegúrate de que los detalles en el fondo no revelen tu ubicación.
No uses hashtags que podrían revelar datos privados (o la ubicación).
Ten cautela cuando publiques fotos de…
Content Type: Guide step
If you protect your tweets, don't accept follow requests from unknown people.
Let people know that you don't want your picture posted without your consent.
Don’t post photos of other people without their consent.
Don’t post sensitive information in your photos or captions.
Don’t reveal your location/make sure the location is not revealed by background details.
Don’t use hashtags that may reveal private data (or the location).
Be wary when posting photos of children on social media.
If you log…
Content Type: Guide step
You might sometimes connect from a device that is not yours, for example someone else's computer. We recommend you always log out after doing so, but if you forgot, you can view all active sessions in Account > Apps and sessions
Content Type: Guide step
Puede que a veces te conectes desde un dispositivo diferente al tuyo, por ejemplo, la computadora de otra persona. Recomendamos que siempre cierres la sesión cuando hagas esto. Pero si se te olvida, puedes ver todas las sesiones activas en Cuenta > Aplicaciones y sesiones
Content Type: Guide step
Sugerimos utilizar la autenticación en dos fases, ya que ofrece un paso de seguridad adicional para ingresar a tu cuenta. Así, cuando te conectes, Twitter verificará tu identidad solicitando un código además de tu nombre de usuario y contraseña.
Este código (el segundo factor) puede ser recibido por SMS, una aplicación o una clave de seguridad. Ten en cuenta que por defecto Twitter te obliga a utilizar un número telefónico y a recibir un SMS. Más adelante puedes activar la autenticación en dos…
Content Type: Guide step
We suggest using Two-Factor authentication, as it provides an extra security step in order to access your account. This way, when you connect, Twitter will verify your identity by requesting a code in addition to your username and password.
This code (the second factor) can be received either by SMS, an app or a security key. Note that by default Twitter forces you to use a phone number to receive an SMS. You can later enable Two-factor authentication with an app and remove the SMS option.
Go…
Content Type: Guide step
Protege tus tweets
Configuración y privacidad > Privacidad y seguridad > Proteger tus tweets
Lo primero que puedes hacer para que tu cuenta de twitter sea más privada es proteger tus tweets. Activar esta función hace que tus tweets solo puedan ser vistos por quienes te siguen en la aplicación. Cuando esta función está activada, tienes que aprobar cada seguidor nuevo.
Esta es una solución interesante si tu intención es que tu cuenta no sea pública sino para amigos, familiares o una…
Content Type: Guide step
Protect your tweets
Settings & Privacy > Privacy and Safety > Protect your tweets
The first action you can take to make your twitter account more private is to protect your tweets. Enabling this option will make your tweets visible only to people who follow you. If selected, you will need to approve each new follower.
This is an interesting solution if your account is not meant to be public and is rather for friends, family or for a specific community. It gives you great control on…
Content Type: Guide step
Para entrar en la configuración discutida aquí, en la aplicación Viber:
Toca los tres puntos de la esquina inferior derecha de la pantalla
Toca Configuración > Privacidad
Content Type: Guide step
To access the settings discussed here, on the Viber app:
Tap the three dots on the bottom right corner of the screen
Tap Settings > Privacy
Content Type: Long Read
Immunity Passports have become a much hyped tool to cope with this pandemic and the economic crisis. Essentially, with immunity passports those who are 'immune' to the virus would have some kind of certified document - whether physical or digital. This 'passport' would give them rights and privileges that other members of the community do not have.
This is yet another example of a crisis-response that depends on technology, as we saw with contact-tracing apps. And it is also yet another…
Content Type: Explainer
Definition
An immunity passport (also known as a 'risk-free certificate' or 'immunity certificate') is a credential given to a person who is assumed to be immune from COVID-19 and so protected against re-infection. This 'passport' would give them rights and privileges that other members of the community do not have such as to work or travel.
For Covid-19 this requires a process through which people are reliably tested for immunity and there is a secure process of issuing a document or other…
Content Type: Examples
Human Rights Watch finds problems with immunity passports
Human Rights Watch considers the first proposals for immunity passports and suggests that although antibody testing is useful for ensuring the safety of frontline workers or giving a good idea of the percentage of a population that remains vulnerable to infection, using them to issuing immunity passports poses numerous threats to equality. Among them: forcing people to get tested as a condition of employment, enabling new forms of…
Content Type: Examples
In a policy briefing, the Nuffield Council on Bioethics concludes that there is too much scientific uncertainty and too many ethical issues for to support immunity certification as a way of easing restrictions on travel, work, and other activities. While testing can be useful, the negative impacts of a certification system are likely to fall disproportionately on those who are already disadvantaged.
https://www.nuffieldbioethics.org/news/new-briefing-covid-19-antibody-testing-and-immunity-…
Content Type: Examples
In advice issued to corporates, Deloitte considers the options for protecting workforces and suggests that immunity tests are available as a tool in any of three possible scenarios: the government ordered testing; the company adopts testing as a strategic initiative; employees take private action. Deloitte offers help in avoiding fraud risks in procurement, helping organise the workforce and support change; provide advice and support in managing employee medical data; and setting up secure and…
Content Type: Examples
Even before anything like an official immunity passport has become available, users of online dating sites are finding that some prospective dates are pushing for in-person meetups by claiming that either they’ve tested negative for the coronavirus or have positive antibody tests showing that they’ve recovered from it and presume that they are now immune. Estonia and Chile are both planning immunity passport systems. However, Robert West, a professor of health, psychology, and behavioural…