Advanced Search
Content Type: News & Analysis
Picture: Christian Schnettelker
1. The process of applying for social benefits subjects people to humiliating and punishing scrutiny. It is gruelling and harmful in and of itself. It requires people to invest significant time and resources, and to disclose vast amounts of personal information. For example, people may be required to turn over troves of personal documents (such as documents that show people’s financial status, housing, income, family structure, and identity), provide biometric…
Content Type: Long Read
Whilst innovation in technology and data processing have provided individuals and communities with new opportunities to exercise their fundamental rights and freedoms, this has not come without risks, and these opportunities have not been enjoyed by all equally and freely.
Our relationships and interactions with governments and industry have become increasingly dependent on us providing more and more data and information about ourselves. And, it’s not only the information we provide knowingly…
Content Type: News & Analysis
Today, the British Health Secretary Matt Hancock announced a partnership between the NHS and Amazon to use the NHS’s website content as the source for the answer given to medical question, such as “Alexa, how do I treat a migraine?”
While we welcome Amazon’s use of a trusted source of information for medical queries, we are however extremely concerned about the nature and the implications of this partnership. Amazon is a company with a worrying track record when it comes to the way they…
Content Type: News & Analysis
By Ailidh Callander, Legal Officer
This piece first appeared in the 500th edition of the Scottish Legal Action Group Journal (2019 SCOLAG (500, June) 124
Political scandal, stronger regulation on privacy but what about social protection?
In an increasingly digitalised and data driven world, an era of government and corporate mass data exploitation, the right to privacy and data protection and what this means in practice is more important than ever. Surveillance is a power generator and…
Content Type: Advocacy
The United Nations Special Rapporteur on extreme poverty and human rights, Philip Alston, is preparing a thematic report to the UN General Assembly on the human rights impacts, especially on those living in poverty, of the introduction of digital technologies in the implementation of national social protection systems. The report will be presented to the General Assembly in New York in October 2019.
As part of this process, the Special Rapporteur invited all interested governments, civil…
Content Type: Examples
The New York City public benefits system has been criticized for its punitive design, how it too often disciplines, rather than helps, people who are legally entitled to benefits. According to Mariana Chilton, the public benefits system is designed to control, surveil, and penalize low-income people, and it is women of colour who disproportionately bear these burdens. Chilton highlights how the violent treatment of Jazmine Headley and her baby in a public assistance waiting room in December…
Content Type: Examples
The DWP relies on anti-fraud officers who go and spy on benefit claimants to verify their claims. For instance, claimants who declare that they are a lone parent may end up with an officer trying to verify there is no one else living in the house. And once they are confident that the alleged lone parent is not actually single, their next step will be to find out if the other person is employed. In order to decide which household to target, the DWP relies on a “tip-off” system. People are in…
Content Type: Examples
In Israel, the National Insurance Institute – in charge of granting benefits – eventually dropped a tender that had caused outrage in the country after being uncovered by Haaretz and Channel 13. The tender revealed the NII was trying to collect online data about benefits claimants – including from social media – to detect cases of frauds. The tender used wheelchair users as an example, suggesting that finding pictures of alleged wheelchair users using bikes on social media could contribute to…
Content Type: Examples
The rise of social media has also been a game changer in the tracking of benefits claimants. In the UK in 2019, a woman was jailed after she was jailed for five months after pictures of her partying in Ibiza emerged on social media. She had previously sued the NHS for £2.5 million, after surviving a botched operation. She had argued the operation had left her disabled and the “shadow of a former self” but judges argued that the pictures suggested otherwise.
https://www.dailymail.co.uk/news/…
Content Type: Examples
The rise of social media has also been a game changer in the tracking of benefits claimants. Back in 2009, the case of Nathalie Blanchard a woman in Quebec who had lost her disability insurance benefits for depression because she looked “too happy” on her Facebook pictures had made the news.
https://abcnews.go.com/Technology/AheadoftheCurve/woman-loses-insurance-benefits-facebook-pics/story?id=9154741
Author: Ki Mae Heussner
Publication: ABC News
Content Type: Examples
The National Board of Scholarships and School Aid (Junaeb) in Chile was also heavily criticised for its use of facial recognition programmes to deliver meals at thirty schools in three cities across the country. After the Supreme Court requested in 2017 that the system must not be applied without the consent of the parents, in February 2019 it was the Council for Transparency that declared that: “The use of biometric identification systems to certify the delivery of food rations at schools…
Content Type: Examples
In this 2013 piece, Virginia Eubanks discuss the move in Indiana from relying on caseworkers to automating the distribution of benefits and how through the use of performance metrics to speed up the decision-making process, the system ended up being incentivising the non-distribution of benefits.
https://virginia-eubanks.com/2013/12/11/caseworkers-vs-computers/
Author: Virginia Eubanks
Publication: virginia-eubanks.com
Content Type: Long Read
The Privacy International Network is celebrating Data Privacy Week, where we’ll be talking about how trends in surveillance and data exploitation are increasingly affecting our right to privacy. Join the conversation on Twitter using #dataprivacyweek.
It is no mystery that data exploitation is part of most consumer-oriented tech companies’ business models. A big part of our lives is recorded and exploited, from our web searches, to our personal communications, location, and our shopping habits…
Content Type: Long Read
Image attribution: By Legaleagle86 at en.wikipedia, CC BY-SA 3.0.
In a long-anticipated judgment, the Indian Supreme Court has ruled that India's controversial identification system Aadhaar is Constitutional. They based their conclusion on notes that there are sufficient measures in place to protect data, and that it is difficult to undertake surveillance of citizens on the basis of Aadhaar.
But there is some good in this ruling. The court has demanded that the Government introduce…
Content Type: News & Analysis
Below is the introduction to Privacy International's 2017 International Women's Day report, which highlights the recent work of the PI Network on privacy, surveillance, and gender.
Many of the challenges at the intersection of women’s rights and technology as it relates to privacy and surveillance, come down to control. Such challenges have come sharply into focus as societies trend toward surveillance by default and foster data exploitative ecosystem.
And whilst control, in the context of…
Content Type: Explainer
What is SOCMINT?
Social media intelligence (SOCMINT) refers to the techniques and technologies that allow companies or governments to monitor social media networking sites (SNSs), such as Facebook or Twitter.
SOCMINT includes monitoring of content, such as messages or images posted, and other data, which is generated when someone uses a social media networking site. This information involves person-to-person, person-to-group, group-to-group, and includes interactions that are private and…