News
15th May 2018
21st April 2017
1st February 2017
Examples of Abuse
Want to know how this translate in the real world? Here is the latest example in the news. Zoom said it would deliver end-to-end encryption as one of a number of security enhancements to its service, but it will only be available to enterprise and business customers whose identity they can verify and not on the free service. The company says it wants to be able to work with law
Our Advocacy
Summary
In this briefing Privacy International outlines its analysis of some key provisions on the draft text of the UN Cybercrime Convention, with the aim to provide delegations of Member States and other stakeholders with our recommendations to strengthen the draft and bring it into line with human rights law. This briefing builds upon the submissions made by PI at the previous sessions of the Ad Hoc Committee and reflects upon some of the amendments proposed by Member States. While not aiming to be comprehensive, it covers in particular the following Articles: 2, 3, 5, 23, 24, 28, 29, 30, 35, 36, 47 and 54.