Advanced Search
Content Type: Report
Following on from their 2009 discussion paper, in 2010 the European Commission published a Communication on changes to the 1995 European Union Directive on data protection. The European Union’s 1995 Directive on data protection is a leading regional instrument for privacy and is often the model for other countries across the globe. The Directive has been integral to pushing back against key surveillance and tracking initiaitives by governments and industry.
In this report we respond to that…
Content Type: Report
This report has been prepared by Privacy International following a six-month investigation into the privacy practices of key Internet based companies. The ranking lists the best and the worst performers both in Web 1.0 and Web 2.0 across the full spectrum of search, email, e-commerce and social networking sites.
The analysis employs a methodology comprising around twenty core parameters. We rank the major Internet players but we also discuss examples of best and worst privacy practice among…
Content Type: Report
This report has been prepared by Privacy International following a six-month investigation into the privacy practices of key Internet based companies. The ranking lists the best and the worst performers both in Web 1.0 and Web 2.0 across the full spectrum of search, email, e-commerce and social networking sites.
The analysis employs a methodology comprising around twenty core parameters. We rank the major Internet players but we also discuss examples of best and worst privacy practice among…
Content Type: Long Read
On June 22-23 2006 the New York Times ran a story uncovering an international financial surveillance programme run by the Bush Administration. In essence the Bush Administration is getting access to international transfer data and storing this in databases at the Treasury Department and/or CIA for access to investigate terrorist activity.
There are a number of inconsistencies in the accounts so far:
The U.S. claims that this is a narrowly focused programme that is compliant with the law,…
Content Type: Report
Race relations across European states are usually far from ideal. However in law, European countries appear to grant Europeans ideal protections against discrimination. There are mounting tensions with ethnic and minority communities in countless European countries, with particular suspicion and aggression pointed towards the Roma people, Travellers, Northern Africans, Turks, Jehovah’s Witnesses, and people of Islamic and other faiths. Increasingly these groups are finding safe havens behind…
Content Type: Report
Race relations across European states are usually far from ideal. However in law, European countries appear to grant Europeans ideal protections against discrimination. There are mounting tensions with ethnic and minority communities in countless European countries, with particular suspicion and aggression pointed towards the Roma people, Travellers, Northern Africans, Turks, Jehovah’s Witnesses, and people of Islamic and other faiths. Increasingly these groups are finding safe havens behind…
Content Type: Report
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial recognition, ngerprinting and iris scanning).
The Report provides a specific assessment of the recently published biometrics trial conducted by the UK Passport Service (UKPS), and compares these…
Content Type: Report
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial recognition, fingerprinting and iris scanning).
Content Type: Report
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning.
Some applications of biometric identification technology are now cost-effective, reliable, and highly accurate. As a result, biometric systems…
Content Type: Report
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning.
Some applications of biometric identification technology are now cost-effective, reliable, and highly accurate. As a result, biometric systems are…
Content Type: Report
Proposals for identity (ID) cards have provoked public outrage and political division in several countries. In this paper Simon Davies analyses the key elements of public opposition to ID Card schemes, and profiles the massive 1987 Australian campaign against a national ID card.
Content Type: Report
Proposals for identity (ID) cards have provoked public outrage and political division in several countries. In this paper Simon Davies analyses the key elements of public opposition to ID Card schemes, and profiles the massive 1987 Australian campaign against a national ID card.
Content Type: Report
This report presents a detailed analysis of the international trade in surveillance technology. Its’ primary concern is the ow of sophisticated computer-based technology from developed countries to developing countries – and particularly to non-democratic regimes. It is in this environment where surveillance technologies become technologies of political control.
Surveillance technologies can be de ned as technologies which can monitor, track and assess the movements, activities and…
Content Type: Report
The explosion of telecommunications services has improved the ability for human rights groups to disseminate information worldwide. New telephone, facsimile and computer communications have created opportunities for human rights groups to improve organizing and to promote human rights faster and at a lower cost than ever before. However, these new technologies can be monitored by governments and other groups seeking to monitor the activities of human rights advocates. For this reason, human…
Content Type: Report
The explosion of telecommunications services has improved the ability for human rights groups to disseminate information worldwide. New telephone, facsimile and computer communications have created opportunities for human rights groups to improve organizing and to promote human rights faster and at a lower cost than ever before. However, these new technologies can be monitored by governments and other groups seeking to monitor the activities of human rights advocates. For this reason, human…