Search
Content type: News & Analysis
Photo by Sharon McCutcheon on Unsplash
In May, the United Nations Special Rapporteur on extreme poverty and human rights, Philip Alston invited all interested governments, civil society organisations, academics, international organisations, activists, corporations and others, to provide written input for his thematic report on the human rights impacts, especially on those living in poverty, of the introduction of digital technologies in the implementation of national social protection…
Content type: News & Analysis
The global counter-terrorism agenda is driven by a group of powerful governments and industry with a vested political and economic interest in pushing for security solutions that increasingly rely on surveillance technologies at the expenses of human rights.
To facilitate the adoption of these measures, a plethora of bodies, groups and networks of governments and other interested private stakeholders develop norms, standards and ‘good practices’ which often end up becoming hard national laws…
Content type: Long Read
In December 2018, Privacy international exposed the dubious practices of some of the most popular apps in the world.Out of the 36 apps we tested, we found that 61% automatically transfer data to Facebook the moment a user opens the app. This happens whether the user has a Facebook account or not, and whether they are logged into Facebook or not. We also found that some of those apps routinely send Facebook incredibly detailed and sometimes sensitive personal data. Again, it didn’t matter if…
Content type: Long Read
A new study by Privacy International reveals how popular websites about depression in France, Germany and the UK share user data with advertisers, data brokers and large tech companies, while some depression test websites leak answers and test results with third parties. The findings raise serious concerns about compliance with European data protection and privacy laws.
This article is part of a research led by Privacy International on mental health websites and tracking. Read our…
Content type: Long Read
It is common ground that bulk collection of content would be a deprivation of the right to privacy. That is an inexcusable or unjustifiable step too far. Repeatedly the Government whether in litigation or legislating, has emphasised that they are not taking content in bulk. Content is the forbidden ground.
This has resulted in the Government seeking to explain, for example, what parts of an email would constitute content and meta data. Within the Investigatory Powers Act it has led to the…
Content type: Long Read
This blog is about our new Twitter bot, called @adversarybot. If you want to follow the account, please do watch the pinned 'Privacy Policy' tweet before you do so.
Content type: News & Analysis
The Watson/Tele2 decision of the CJEU concerned section 1 and 2 of DRIPA and the Data Retention Regulations 2014. This contained the legislative scheme concerning the power of the Secretary of State to require communications service providers to retain communications data. Part 3 of the Counter-Terrorism and Security Act 2015 amended DRIPA so that an additional category of data - that necessary to resolve Internet Protocol addresses - could be included in a requirement to retain…
Content type: Advocacy
RESPONSE OF PRIVACY INTERNATIONAL TO THE CONSULTATION ON THE GOVERNMENT’S PROPOSED RESPONSE TO THE RULING OF THE COURT OF JUSTICE OF THE EUROPEAN UNION ON 21 DECEMBER 2016 REGARDING THE RETENTION OF COMMUNICATIONS DATA
[Full response below]
Introduction
The consultation is in response to the judgment in Tele2 Sverige AB v Post-och telestyrelsen (Case-203/15) and R (Watson) v Secretary of State for the Home Department (Case C-698/15) [“Watson judgment”].
The case concerned…
Content type: Long Read
Six years after NSA contractor Edward Snowden leaked documents providing details about how states' mass surveillance programmes function, two states – the UK and South Africa – publicly admit using bulk interception capabilities.Both governments have been conducting bulk interception of internet traffic by tapping undersea fibre optic cables landing in the UK and South Africa respectively in secret for years.Both admissions came during and as a result of legal proceedings brought by Privacy…
Content type: Examples
In 2018, Brian Hofer, the chair of Oakland's Privacy Advisory Commission, filed suit after police wrongfully stopped him at gunpoint because their automated license plate recognition system, supplied by Vigilant Solutions, indicated that the rental car he was driving had been stolen. The car had in fact been stolen some months earlier, but been recovered. Despite such errors, police claim that the technology has helped reduce crime, identify stolen vehicles, and identify and arrest suspects.…
Content type: Examples
New workplace technologies are generating mountains of data on workers despite a lack of clarity over how the data is used and who owns it. In offices, smart badges track interactions and sensors track fitness and health; in trucks sensors monitor drivers' performance in the name of safety. In the US state of Illinois, between July and October 2017 26 lawsuits were filed by employees alleging that their employers had violated the state's Biometric Information Privacy Act, which requires a…
Content type: Examples
After four years of negotiation, in 2017 Google began paying Mastercard millions of dollars for access to the latter's piles of transaction data as part of its "Stores Sales Measurement" service. Google, which claimed to have access to 70% of US credit and debit cards through partners, said that double-blind encryption prevents both partners from seeing the other's users' personally identifiable information. Mastercard said the company shares transaction trends with merchants and their service…
Content type: Examples
In November 2018, 112 civil liberties, immigrant rights groups, child welfare advocates, and privacy activists wrote a letter to the heads of the US Department of Health and Human Services and the Department of Homeland Security demanding an immediate halt to the HHS Office for Refugee Resettlement's practice of using information given them by detained migrant children to arrest and deport their US-based relatives and other sponsors. The policy began in April 2018, and the result has been that…
Content type: Examples
After an 18-month investigation involving interviews with 160 life insurance companies, in January 2019 New York Financial Services, the state's top financial regulator, announced it would allow life insurers to use data from social media and other non-traditional sources to set premium rates for its customers. Insurers will be required to demonstrate that their use of the information doesn't unfairly discriminate against specific customers. New York is the first state to issue specific…
Content type: News & Analysis
Picture: Antti T. Nissinen, CC BY 2.0
In addition to the issues we highlighted in stage 1, where intrusive personal information is required in order to apply for social benefits, recipients who seek to maintain their social benefits are required to regularly disclose similar information and are also subjected to the numerous forms of surveillance described above.
1. Social benefits systems use monitoring to exert control over recipients. These systems are imbued with the…
Content type: News & Analysis
Picture: Christian Schnettelker
1. The process of applying for social benefits subjects people to humiliating and punishing scrutiny. It is gruelling and harmful in and of itself. It requires people to invest significant time and resources, and to disclose vast amounts of personal information. For example, people may be required to turn over troves of personal documents (such as documents that show people’s financial status, housing, income, family structure, and identity), provide biometric…
Content type: Long Read
Image credit: Emil Sjöblom [ShareAlike 2.0 Generic (CC BY-SA 2.0)]
Prepaid SIM card use and mandatory SIM card registration laws are especially widespread in countries in Africa: these two factors can allow for a more pervasive system of mass surveillance of people who can access prepaid SIM cards, as well as exclusion from important civic spaces, social networks, and education and health care for people who cannot.
Mandatory SIM card registration laws require that people provide personal…
Content type: Advocacy
Privacy International provided comments to the UK Financial Conduct Authority on the Terms of Reference to its Credit Information Market Study.
We highlighted that:
Credit data (whether ‘traditional’ credit data; data from Open Banking sources, or other sources of data like social media) are hugely revealing of people’s lives far beyond the state of their financial affairs.
The affects upon consumer behaviour of this use of data in the credit sector extends beyond the choices they…
Content type: Advocacy
Dear Chair and Committee colleagues,
Privacy International is an international NGO, based in London, which works with partners around the world to challenge state and corporate surveillance and data exploitation. As part of our work, we have a dedicated programme “Defending Democracy and Dissent” where we advocate for limits on data exploitation throughout the electoral cycle.
We have been closely following the important work of the Committee. Prompted by the additional evidence provided…
Content type: News & Analysis
Privacy International has joined over 30 organisations working with migrants and refugees to write to the newly appointed British Home Secretary to raise a number of pressing issues, which require action if the immigration and asylum system is to regain the trust of the public.
The letter below was sent to the Home Secretary on Wednesday, 30 July 2019.
Find out more about PI’s work to demand a more humane approach to immigration based on the principles of fairness, accessibility, and respect…
Content type: News & Analysis
Picture Credit: US AID
US President Trump has been cutting aid to Central America, including a surprise cut of approximately $500m in aid to the “Northern Triangle” countries of El Salvador, Guatemala, and Honduras, apparently as punishment for “doing absolutely nothing” to prevent emigration to the US.
What remains of the funds is largely and deliberately being repurposed for spending on the US’s own security interests: indeed, one area which his…
Content type: News & Analysis
Foto: US AID
El presidente estadounidense Trump ha estado recortando la ayuda a Centroamérica, incluyendo un recorte sorpresivo de aproximadamente 500 millones de dólares a los países del “Triángulo del Norte” (El Salvador, Guatemala y Honduras), al parecer como castigo por “no haber hecho absolutamente nada” para impedir la emigración hacia los Estados Unidos.
Los fondos restantes están siendo reorientados,en su gran mayoría y deliberadamente, al gasto para…
Content type: Long Read
image from portal gda (cc)
Many people are still confused by what is 5G and what it means for them. With cities like London, New York or San Francisco now plastered with ads, talks about national security, and the deployment of 5G protocols being treated like an arms race, what happens to our privacy and security?
5G is the next generation of mobile networks, which is meant to be an evolution of the current 4G protocols that mobile providers have deployed over the last decade, and there are…
Content type: Long Read
Photo by David Werbrouck on Unsplash
This is an ongoing series about the ways in which those searching for abortion information and procedures are being traced and tracked online. This work is part of a broader programme of work aimed at safeguarding the dignity of people by challenging current power dynamics, and redefining our relationship with governments, companies, and within our own communities. As an enabling right, privacy plays an important role in supporting the exercise of…
Content type: News & Analysis
While people may think that providing their photos and data is a small price to pay for the entertainment FaceApp offers, the app raises concerns about privacy, manipulation, and data exploitation—although these concerns are not necessarily unique to FaceApp.According to FaceApp's terms of use and privacy policy, people are giving FaceApp "a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid, transferable sub-licensable license" to use or publish the…
Content type: Long Read
By Valentina Pavel, PI Mozilla-Ford Fellow, 2018-2019
Our digital environment is changing, fast. Nobody knows exactly what it’ll look like in five to ten years’ time, but we know that how we produce and share our data will change where we end up. We have to decide how to protect, enhance, and preserve our rights in a world where technology is everywhere and data is generated by every action. Key battles will be fought over who can access our data and how they may use it. It’s time to take…
Content type: Advocacy
During its 98th session, from 23 April to 10 May 2019, the UN Committee on the Elimination of Racial Discrimination (CERD) initiated the drafting process of general recommendation n° 36 on preventing and combatting racial profiling.
As part of this process, CERD invited stakeholders, including States, UN and regional human rights mechanisms, UN organisations or specialised agencies, National Human Rights Institutions, Non-Governmental Organisations (NGOs), research…
Content type: Advocacy
Faced with the transnational dimension of terrorist-related activities, United Nations Security Council resolutions have emphasized the need for international cooperation in information-sharing, both for the purposes of collecting intelligence and judicial assistance.
Privacy International recognises the importance and benefit of intelligence sharing in the context of preventing and investigating terrorism or other genuine, serious threats to national security. The organisation is concerned,…
Content type: Long Read
Photo By: Cpl. Joel Abshier
‘Biometrics’ describes the physiological and behavioural characteristics of individuals. This could be fingerprints, voice, face, retina and iris patterns, hand geometry, gait or DNA profiles. Because biometric data is particularly sensitive and revealing of individual’s characteristics and identity, it can be applied in a massive number of ways – and has the potential to be gravely abused.
Identification systems across the world increasingly rely on…
Content type: Advocacy
Identification system across the world increasingly rely on biometric data. In the context of border management, security and law enforcement, biometric data can play an important role in supporting the investigation and prevention of acts of terrorism.
This is clearly reflected in UN Security Council resolutions on counter- terrorism. Notably, Resolution 2396 (2017) the UN Security Council decided that states shall develop and implement systems to collect and share biometrics data for…