Search Taxonomy Terms
As digital communications grow, governments continue to seek new ways of getting access to content and metadata.
Buying a brand new low-cost phone can leave you with an outdated operating system and exploitative apps.
Our data stored in the cloud is increasingly sought after by law enforcement agencies. Increasingly, it is obtained using ‘cloud extraction technologies’.
Powerful countries encourage and enable other governments to deploy advanced surveillance capabilities without adequate safeguards.
Privacy International filed complaints with multiple data protection regulators to investigate potential GDPR infringements by data brokers, ad-tech companies and credit referencing agencies.
You might think you own your phone - but there is data on there you can't access, you can't delete, and possibly is being silently leaked to companies you've never heard of.
Reproductive rights are necessary for bodily autonomy. Bodily autonomy is necessary for equality.
People all over the world share with menstruation apps their deeply intimate data - the date of their last periods, dates and details pertaining to their sex lives, their moods, their health. This data is being ruthlessly exploited and shared with third parties to target and profile people.
Increasingly counter-terrorism strategies and policies are decided at the international level, most notably by the UN Security Council, and are used to erode human rights, with no accountability.
Exploiting new technologies that are in our homes and on our bodies as part of criminal investigations and for use as evidence, raises new challenges and risks that have not been sufficiently explored.