Skip to main content
Home

Sign up to Newsletter

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE
PI logo graphic

Metadata

Report and Analysis

Report
International Law Guide cover screenshot

PI’s Guide to International Law and Surveillance

PI’s Guide to International Law and Surveillance aims to provide the most hard-hitting results that reinforce and strengthen the core principles and standards of international law on surveillance. You can find UN resolutions, independent expert reports and international human rights bodies jurisprudence.

Continue reading
Long Read
report cover

Briefing on Privacy International Legal Case: Bulk personal datasets and bulk communications data challenge

A brief summary and timeline of legal proceedings of PI's bulk personal datasets and bulk communications data challenge in the UK

Continue reading
Long Read
crowd

UK mass interception laws violates human rights and the fight continues...

On 25 May 2021, a Grand Chamber judgment against the UK broke new ground in the regulation of bulk interception capabilities requiring enhanced safeguards to protect the rights to privacy and freedom of expression against abuse. It is a complex judgment with lights and shades, and the fight against mass surveillance is not over. Find here our initial take on the judgment and what comes next.

Continue reading
View more

News

19th August 2021

Afghanistan: What Now After Two Decades of Building Data-Intensive Systems?

4th February 2021

South African Constitutional Court declares bulk surveillance powers unlawful

6th April 2020

We must protect people in vulnerable situations during lockdown or quarantine

24th February 2020

PI and Liberty submit a new legal challenge after MI5 admits that vast troves of personal data was held in “ungoverned spaces”

11th April 2019

Communities at risk: How governments are using tech to target migrants

11th December 2018

“Do no harm” in the digital age: Privacy and security cannot be ignored

See more

Examples of Abuse

Want to know how this translate in the real world? Here is the latest example in the news.

Design flaw leaves Bluetooth devices vulnerable

An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.

Read more
See more examples of abuse

Get Involved

  • Act with Us
  • Donate
  • Join
Back to top button

Newsletter

Click here to sign-up to our mailing-list!

Follow Us

  • Facebook
  • Instagram
  • Mastodon
  • RSS
  • Twitter
  • Youtube

Navigation

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE

How We Fight

  • Our Global Reach
  • Advocacy and Litigation
  • Research
  • Legal Action
  • Our Demands

About

  • Our Impact
  • Governance
  • People
  • Opportunities
  • Financial
  • Service Status

Privacy

  • How We Use Your Data
  • How We Learned
  • Why Cookies?!

Resources

  • Why Privacy Matters
  • Learn about issues
  • Learn about Data Protection
  • Browse Examples of Abuse
  • Listen to our podcast

Contact Us

62 Britton Street,
London, EC1M 5UY
UK

Charity Registration No: 1147471

Click here to contact us.

Click here for media and press enquiries.