Search Taxonomy Terms

The use of data and new technologies are driving a revolution in immigration enforcement, and affected people are going to be at greater risk.

People all over the world share with menstruation apps their deeply intimate data - the date of their last periods, dates and details pertaining to their sex lives, their moods, their health. This data is being ruthlessly exploited and shared with third parties to target and profile people. 

Increasingly counter-terrorism strategies and policies are decided at the international level, most notably by the UN Security Council, and are used to erode human rights, with no accountability.

Exploiting new technologies that are in our homes and on our bodies as part of criminal investigations and for use as evidence, raises new challenges and risks that have not been sufficiently explored. 

We look at how apps are exposing peoples' activities and behaviours to Facebook.

After months of research, we filed complaints against seven of data broker companies: Acxiom, Criteo, Equifax, Experian, Oracle, Quantcast, and Tapad.

Effective competition is necessary for privacy and innovation. Increasingly the digital economy is characterised by a few companies in dominant positions. These companies are able to impose terms and conditions that exploit our data and violate our freedoms.

Powerful governments are financing, training and equipping countries — including authoritarian regimes — with surveillance capabilities.
 

Privacy International filed an amicus brief to the United States Court of Appeals for the Ninth Circuit in a case challenging the use of Cisco technology for the persecution of the Falun Gong minority in China.

Aerial surveillance can impose widespread systematic monitoring on specific individuals, groups, and populations infringing upon their right to privacy and associated freedoms, including freedoms of assembly, movement, and protest.