Skip to main content
Activity Menu
Join Us
Donate
Your Data
Search form
Search
Privacy International
Main navigation
WHERE WE WORK
WHAT WE DO
TOPICS
IMPACT
ABOUT
Explainers
Video
Video: Government Hacking 101
Video
Video: How Companies Exploit Your Data
Video
Video: What Is Big Data?
Video
Video: What Is Communications Surveillance?
Video
Video: What is Data Exploitation?
Video
Video: What Is Data Protection?
Video
Video: What Is Metadata?
Video
Video: What Is Privacy?
Report
Privacy as a Political Right
Feature
A Brief Guide: How To Talk About Privacy At the UN
Feature
Algorithms, Intelligence, and Learning Oh My
Feature
An Open Source Guide to Researching Surveillance Transfers
Feature
Cambridge Analytica Explained: Data and Elections
Feature
How Bulk Interception Works
Feature
Q&A: European Court of Human Rights Rules UK Mass Surveillance Laws Violate Rights
Feature
The Guide to International Law and Surveillance
How Bulk Interception Works
Explainer graphic
Explainer
101: Data Protection
Explainer
101: Integrated Policing
Explainer
101: SIM Card Registration
Explainer
Big Data
Explainer
Communications Surveillance
Explainer
Competition and Data
Explainer
IMSI Catchers
Explainer
Phone Monitoring
Explainer
Social Media Intelligence
Explainer
The Global Surveillance Industry
Explainer
Understanding Identity Systems Part 1: Why ID?
Explainer
Understanding Identity Systems Part 2: Discrimination and Identity
Explainer
Understanding Identity Systems Part 3: The Risks of ID
Explainer
Video surveillance
Explainer
What Is Privacy?
Blog
Winning the debate on encryption — a 101 guide for politicians