Skip to main content
Home

Sign up to Newsletter

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE
PI logo graphic

Metadata

Reports and Analysis

Long Read
Tents and sign "Welcome to Greece"

10 threats to migrants and refugees

This article presents some of the tools and techniques deployed as part surveillance practices and data-driven immigration policies routinely leading to discriminatory treatment of peoplee and undermining peoples’ dignity, with a particular focus on the UK.

Continue reading
Long Read
Map with pins on a board

Covid Contact tracing apps are a complicated mess: what you need to know

As Governments, Apple and Google compete in proximity tracing, here’s our take on building tech in times of crisis. 

Continue reading
Long Read
New Cover

Guide to International Law and Surveillance (2.0)

This guide covers an array of topics, including the legality of mass surveillance operations, the law surrounding data retention, the extraterritorial application of human rights law and digital surveillance, and the international law on hacking for surveillance purposes. It is a handy reference
Continue reading

News

6th April 2020

We must protect people in vulnerable situations during lockdown or quarantine

24th February 2020

PI and Liberty submit a new legal challenge after MI5 admits that vast troves of personal data was held in “ungoverned spaces”

11th April 2019

Communities at risk: How governments are using tech to target migrants

11th December 2018

“Do no harm” in the digital age: Privacy and security cannot be ignored

12th June 2018

Protecting the digital beneficiary

1st December 2017

GCHQ Makes Brazen Attempt To Undermine The Independence Of Its New Regulator

Examples of Abuse

Want to know how this translate in the real world? Here is the latest example in the news.

Design flaw leaves Bluetooth devices vulnerable

An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.

Read more
See more examples of abuse

Get Involved

  • Act with Us
  • Donate
  • Join
Back to top button

Newsletter

Click here to sign-up to our mailing-list!

Follow Us

  • Facebook
  • Instagram
  • Mastodon
  • RSS
  • Twitter
  • Youtube

Navigation

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE

How We Fight

  • Our Global Reach
  • Advocacy and Litigation
  • Research
  • Legal Action
  • Our Demands

About

  • Our Impact
  • Governance
  • People
  • Opportunities
  • Financial
  • Service Status

Privacy

  • Why We Use Your Data
  • How We Use Your Data
  • How We Learned
  • Why Cookies?!

Resources

  • Why Privacy Matters
  • Learn about issues
  • Learn about Data Protection
  • Browse Examples of Abuse
  • Listen to our podcast

Contact Us

62 Britton Street,
London, EC1M 5UY
UK

Charity Registration No: 1147471

Click here to contact us.

Click here for media and press enquiries.