Search
Content type: Report
Privacy International partnered with the International Human Rights Clinic at Harvard Law School to guide the reader through a simple presentation of the legal arguments explored by national courts around the world who have been tasked with national courts that discuss the negative implications of identity systems, particularly on human rights, and to present their judgement.
This argumentation guide seeks to fill that gap by providing a clear, centralised source of the arguments advanced in…
Content type: Report
Many countries in the world have existing ID cards - of varying types and prevalence - there has been a new wave in recent years of state “digital identity” initiatives.
The systems that states put in place to identify citizens and non-citizens bring with them a great deal of risks.
This is particularly the case when they involve biometrics - the physical characteristics of a person, like fingerprints, iris scans, and facial photographs.
Activists and civil society organisations around the…
Content type: Report
A common theme of all major pieces of national jurisprudence analyzing the rights implications of national identity system is an analysis of the systems’ impacts on the right to privacy.
The use of any data by the State including the implementation of an ID system must be done against this backdrop with respect for all fundamental human rights. The collection of data to be used in the system and the storage of data can each independently implicate privacy rights and involve overlapping and…
Content type: Report
Identity systems frequently rely on the collection and storage of biometric data during system registration, to be compared with biometric data collected at the point of a given transaction requiring identity system verification.
While courts have arguably overstated the effectiveness and necessity of biometric data for identity verification in the past, the frequency of biometric authentication failure is frequently overlooked. These failures have the potential to have profoundly…
Content type: Report
National identity systems naturally implicate data protection issues, given the high volume of data necessary for the systems’ functioning.
This wide range and high volume of data implicates raises the following issues:
consent as individuals should be aware and approve of their data’s collection, storage, and use if the system is to function lawfully. Despite this, identity systems often lack necessary safeguards requiring consent and the mandatory nature of systems ignores consent…
Content type: Report
While identity systems pose grave dangers to the right to privacy, based on the particularities of the design and implementation of the ID system, they can also impact upon other fundamental rights and freedoms upheld by other international human rights instruments including the International Covenant on Civil and Political Right and the International Covenant on Economic, Social and Cultural Rights such as the right to be free from unlawful discrimination, the right to liberty, the right to…
Content type: Report
Rather than providing a list of arguments, as is the case in the other sections of this guide, the fifth section provides a general overview describing the absence of consideration of these themes in existing jurisprudence and the reasons why these themes warrant future consideration including identity systems’ implications for the rule of law, the role of international human rights law, and considerations of gender identity.
Democracy, the Rule of Law and Access to Justice: This analysis of…
Content type: Video
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Episode notes
Useful info
How to minimise targeted ads: privacyinternational.org/act/minimise-targeted-ads
Protect yourself from online tracking: privacyinternational.org/act/protect-yourself-online-tracking
Social media account settings: privacyinternational.org/act/protect-…
Content type: Explainer
The internet is filled with guides on how to file a Freedom of Information (FOI) request. Depending on the country you are in, it is likely that a local NGO – or your national freedom of information authority. – will have come up with one. The Global Investigative Journalism Network has an excellent list of FOI resources available in many countries across every continent. We really recommend you take a look at it; many of the FOI guides we love are in that repository.
At PI we equally spend…
Content type: Guide step
Don’t accept friend requests from unknown people.
Let people know that you don’t want your picture posted without your consent.
Don’t post photos of other people without their consent.
Don’t post sensitive information in your photos or captions.
Don’t reveal your location/make sure the location is not revealed by background details.
Don’t use hashtags that may reveal private data (or the location).
Be wary when posting photos of your kids on social media.
If you log into your Facebook…
Content type: Guide step
No aceptes solicitudes de amistad de gente desconocida.
Avísale a la gente que no quieres que publiquen tu sin tu consentimiento.
No publiques fotos de otras personas sin su consentimiento.
No publiques información delicada en tus fotos o en las leyendas.
No reveles tu ubicación/asegúrate de que los detalles en el fondo no revelen tu ubicación.
No uses hashtags que podrían revelar datos privados (o la ubicación).
Ten cautela cuando publiques fotos de tus hijos en las redes sociales.
Si…
Content type: Guide step
On your browser head to the upper right corner of the Facebook page. Click Settings and Privacy > Privacy. On the left side you should be able to see a field named Apps and Websites where you will see which apps currently have access to your data. If you click View and edit you can make changes on this list. We recommend removing any apps that you don’t know or that you no longer use.
Content type: Guide step
En tu navegador ve a la esquina superior derecha de la página de Facebook. Haz clic en Configuración y Privacidad y luego en Privacidad. A la izquierda vas a ver un campo llamado Apps y sitios web donde podrás ver cuáles aplicaciones tienen acceso a tus datos actualmente. Puedes modificar la lista si seleccionas Ver y editar. Recomendamos mantener la lista al mínimo y eliminar cualquier aplicación que no reconozcas o que hayas dejado de usar.
Content type: Guide step
If you are accessing Facebook through your browser, go to your profile and then select About. You will see a summary of the information you have provided to Facebook under Overview.
Content type: Guide step
En tu navegador, si vas a tu perfil y luego seleccionas Información verás un resumen de la información que le has dado a Facebook en Información general.
Content type: Guide step
Let’s start by checking your default post sharing settings.
If you are accessing Facebook through your browser go to Settings > Privacy > Your Activity > Who can see future posts. We recommend setting your default to Friends or Friends except… which is the same setting with exceptions you can manually add in case you don’t want some friends to be able to see your posts. When set to Public, all your posts can be seen by anyone on or off Facebook.
Content type: Guide step
Empecemos por repasar la configuración preestablecida por defecto para compartir tus publicaciones.
En la web ve a Configuración > Privacidad > Tu actividad > ¿Quién puede ver tus publicaciones futuras?. Recomendamos que establezcas tu configuración por defecto a Amigos o Amigos excepto…, que es la misma configuración solo que con excepciones que puedes añadir manualmente si no quieres que alguna amistad pueda ver tus publicaciones. Cuando seleccionas Público, todas tus publicaciones…
Content type: Guide step
Other devices on which you might be logged in
You might have used Telegram on another phone or a computer. A good practice after doing so is to logout to make sure nobody can use your account without your permission. If you ever forget, Telegram allows you to terminate any session that is not on the current device you are using. We recommend checking this on a regular basis and removing everything you don't recognise. If you only use one device (such as your phone), this list should be empty…
Content type: Guide step
Otros dispositivos en los que puede haber iniciado sesión
Es posible que haya usado Telegram en otro teléfono o computadora. Una buena práctica después de hacerlo es cerrar la sesión para asegurarse de que nadie pueda usar su cuenta sin su permiso. Si alguna vez lo olvidas, Telegram te permite terminar cualquier sesión que no esté en el dispositivo actual que estás usando. Recomendamos verificar esto con regularidad y eliminar todo lo que no reconozca. Si solo usa un dispositivo (como su…
Content type: Guide step
Aceso al teléfono
Telegram te va a pedir permiso para usar el teléfono la primera vez que utilices esta aplicación. Esto sirve para el proceso de verificación, pero no debe ser usado después. Sin embargo, si no cambias este permiso, en teoría Telegram puede pasar llamadas a nombre tuyo. Recomendamos que revises los permisos de la aplicación para desactivar las funciones que no utilices, como el permiso para acceder a tu teléfono o tu ubicación. Probablemente vas a encontrar esto en la…
Content type: Guide step
Phone
The first time you use Telegram it will ask for permissions to use your phone. This is used for the verification process but shouldn't be used later on. However, if you don't change this permission, Telegram is theoretically able to make phone calls on your behalf. We recommend you check the app's permissions to disable anything you don't use within the app, such as permission to access phone calls or location. You will likely find this in your phone settings rather than the app.
To…
Content type: Guide step
Chat history
If you know your device might be accessed and your Whatsapp conversations might be used against you, the chat history feature offers the opportunity to clean all your chats. “Delete all chats” will effectively delete all your conversations. Note that if you have chat backups enabled (we don’t recommend this), these conversations might still be available in the cloud. This setting also lets you export specific chats should you want to save it locally.
To access chat history:…
Content type: Guide step
Ajustes > Chats
Historial de chats: Esta función ofrece la oportunidad de limpiar todos tus chats si sabes que alguien podría acceder a tu dispositivo y tus conversaciones de Whatsapp podrían ser usadas en tu contra. “Eliminar todos los chats” eliminará efectivamente todas tus conversaciones. Ten en cuenta que si tienes activada la copia de seguridad de los chats (lo que no recomendamos), es posible que estas conversaciones todavía estén disponibles en la nube. Esta función también permite…
Content type: Call to Action
You might have read our investigation into advertisers who upload your data on Facebook and found out some companies doing the same to you. Well, you can join us and hold them accountable by sending your own Data Subject Access Request (DSAR)!
Before you get started we suggest you read our FAQ and take a look at our 7+1 tips to make the most out of your DSAR before and after.
To do so you simply need to copy the message bellow and send it to the companies that uploaded your data…
Content type: Explainer
Hello friend,
You may have found your way here because you are thinking about, or have just submitted, a Data Subject Access Request, maybe to your Facebook advertisers like we did. Or maybe you are curious to see if Policing, Inc. has your personal data.
The right to access your personal data (or access right) is just one of a number of data rights that may be found in data protection law, including the European Union's General Data Protection Regulation, better known as "GDPR", which took…
Content type: Guide step
A lot of third-party apps ask you to get access to your Instagram data. This is the case with social media managing apps for example. The more apps have private information on you, the more likely it is that information can be misused. So it is important to make sure that you only allow Instagram access to apps that really need it. You can do this from your web browser or using the app.
On the Web:
After logging in, click the person icon on the upper-right corner of the screen, and then…
Content type: Guide step
Es importante asegurarte de que solo permitas que accedan a Instagram las aplicaciones que verdaderamente lo necesitan.
Para ello, tendrás que utilizar la interfaz web con cualquier navegador en tu teléfono o computadora:
Después de iniciar la sesión, toca el ícono de persona en la esquina superior derecha de la pantalla, y luego toca el ícono de engranaje.
Ve a Apps autorizadas y revisa qué aplicaciones tienen acceso a tus datos.
Si ves una aplicación que no debería estar ahí, toca…
Content type: Guide step
Even with the tightest privacy settings it's important to acknowledge that the way you and others use the app can still be compromising in terms of sensitive data being shared. In addition to in-app settings there's a few good practices that you should keep in mind:
Let people know that you don't want your picture posted without your consent - if you make your profile private because you don't want unknown people to have access to photos of you, then you should make sure there are no…
Content type: Guide step
Avísale a la gente que no quieres que publiquen tu foto sin tu consentimiento.
No publiques fotos de otras personas sin su consentimiento.
No publiques información delicada en tus fotos o en las leyendas.
No reveles tu ubicación/asegúrate de que los detalles en el fondo no revelen tu ubicación.
No uses hashtags que podrían revelar datos privados (o la ubicación).
Ten cautela cuando publiques fotos de tus hijos en las redes sociales.
Si inicias una sesión de tu cuenta Instagram en otros…
Content type: Guide step
We suggest using Two-Factor authentication, as it provides an extra security step in order to access your account. This way, besides asking for your username and password, Instagram will verify your identity by sending a unique code to your device.
This can be done using an authentication app or by SMS (text message). Let's go through both although you should be wary that SMS might not be the most secure.
On mobile app:
Go to your profile by clicking the bottom right corner icon. Then tap…