Search
Content type: Report
Privacy International partnered with the International Human Rights Clinic at Harvard Law School to guide the reader through a simple presentation of the legal arguments explored by national courts around the world who have been tasked with national courts that discuss the negative implications of identity systems, particularly on human rights, and to present their judgement.
This argumentation guide seeks to fill that gap by providing a clear, centralised source of the arguments advanced in…
Content type: Report
Many countries in the world have existing ID cards - of varying types and prevalence - there has been a new wave in recent years of state “digital identity” initiatives.
The systems that states put in place to identify citizens and non-citizens bring with them a great deal of risks.
This is particularly the case when they involve biometrics - the physical characteristics of a person, like fingerprints, iris scans, and facial photographs.
Activists and civil society organisations around the…
Content type: Report
A common theme of all major pieces of national jurisprudence analyzing the rights implications of national identity system is an analysis of the systems’ impacts on the right to privacy.
The use of any data by the State including the implementation of an ID system must be done against this backdrop with respect for all fundamental human rights. The collection of data to be used in the system and the storage of data can each independently implicate privacy rights and involve overlapping and…
Content type: Report
Identity systems frequently rely on the collection and storage of biometric data during system registration, to be compared with biometric data collected at the point of a given transaction requiring identity system verification.
While courts have arguably overstated the effectiveness and necessity of biometric data for identity verification in the past, the frequency of biometric authentication failure is frequently overlooked. These failures have the potential to have profoundly…
Content type: Report
National identity systems naturally implicate data protection issues, given the high volume of data necessary for the systems’ functioning.
This wide range and high volume of data implicates raises the following issues:
consent as individuals should be aware and approve of their data’s collection, storage, and use if the system is to function lawfully. Despite this, identity systems often lack necessary safeguards requiring consent and the mandatory nature of systems ignores consent…
Content type: Report
While identity systems pose grave dangers to the right to privacy, based on the particularities of the design and implementation of the ID system, they can also impact upon other fundamental rights and freedoms upheld by other international human rights instruments including the International Covenant on Civil and Political Right and the International Covenant on Economic, Social and Cultural Rights such as the right to be free from unlawful discrimination, the right to liberty, the right to…
Content type: Report
Rather than providing a list of arguments, as is the case in the other sections of this guide, the fifth section provides a general overview describing the absence of consideration of these themes in existing jurisprudence and the reasons why these themes warrant future consideration including identity systems’ implications for the rule of law, the role of international human rights law, and considerations of gender identity.
Democracy, the Rule of Law and Access to Justice: This analysis of…
Content type: Video
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Episode notes
Useful info
How to minimise targeted ads: privacyinternational.org/act/minimise-targeted-ads
Protect yourself from online tracking: privacyinternational.org/act/protect-yourself-online-tracking
Social media account settings: privacyinternational.org/act/protect-…
Content type: Explainer
The internet is filled with guides on how to file a Freedom of Information (FOI) request. Depending on the country you are in, it is likely that a local NGO – or your national freedom of information authority. – will have come up with one. The Global Investigative Journalism Network has an excellent list of FOI resources available in many countries across every continent. We really recommend you take a look at it; many of the FOI guides we love are in that repository.At PI we equally spend much…
Content type: Guide step
Other devices on which you might be logged inYou might have used Telegram on another phone or a computer. A good practice after doing so is to logout to make sure nobody can use your account without your permission. If you ever forget, Telegram allows you to terminate any session that is not on the current device you are using. We recommend checking this on a regular basis and removing everything you don't recognise. If you only use one device (such as your phone), this list should be empty.To…
Content type: Guide step
Otros dispositivos en los que puede haber iniciado sesión
Es posible que haya usado Telegram en otro teléfono o computadora. Una buena práctica después de hacerlo es cerrar la sesión para asegurarse de que nadie pueda usar su cuenta sin su permiso. Si alguna vez lo olvidas, Telegram te permite terminar cualquier sesión que no esté en el dispositivo actual que estás usando. Recomendamos verificar esto con regularidad y eliminar todo lo que no reconozca. Si solo usa un dispositivo (como su…
Content type: Guide step
Aceso al teléfono
Telegram te va a pedir permiso para usar el teléfono la primera vez que utilices esta aplicación. Esto sirve para el proceso de verificación, pero no debe ser usado después. Sin embargo, si no cambias este permiso, en teoría Telegram puede pasar llamadas a nombre tuyo. Recomendamos que revises los permisos de la aplicación para desactivar las funciones que no utilices, como el permiso para acceder a tu teléfono o tu ubicación. Probablemente vas a encontrar esto en la…
Content type: Guide step
PhoneThe first time you use Telegram it will ask for permissions to use your phone. This is used for the verification process but shouldn't be used later on. However, if you don't change this permission, Telegram is theoretically able to make phone calls on your behalf. We recommend you check the app's permissions to disable anything you don't use within the app, such as permission to access phone calls or location. You will likely find this in your phone settings rather than the app.To access…
Content type: Call to Action
You might have read our investigation into advertisers who upload your data on Facebook and found out some companies doing the same to you. Well, you can join us and hold them accountable by sending your own Data Subject Access Request (DSAR)!
Before you get started we suggest you read our FAQ and take a look at our 7+1 tips to make the most out of your DSAR before and after.
To do so you simply need to copy the message bellow and send it to the companies that uploaded your data…
Content type: Explainer
Hello friend,
You may have found your way here because you are thinking about, or have just submitted, a Data Subject Access Request, maybe to your Facebook advertisers like we did. Or maybe you are curious to see if Policing, Inc. has your personal data.
The right to access your personal data (or access right) is just one of a number of data rights that may be found in data protection law, including the European Union's General Data Protection Regulation, better known as "GDPR", which took…
Content type: Guide step
Twitter plays an increasingly important role as a space facilitating democratic engagement, debate and dissent. However, Twitter's track record in relation to protecting people's data has in some instances fallen short of expectations. In August 2019, for example, Twitter revealed that it had shared with advertisers the data of users who had opted-out of personalised ads. More recently, Twitter admitted that data which had been given by users for safety security purposes had been "…
Content type: Guide step
Like other tech platforms, TikTok (which is owned by ByteDance) makes most of its money from advertising. TikTok allows advertisers to target ads on the basis of custom or lookalike audiences, namely targeting users on the basis of pre-defined characteristics.
The screenshots below outline some of the steps you can take to minimise the data you share on TikTok.
1. Once signed into the app, click on the three bars in the upper right-hand corner.
Content type: Guide step
See the below screenshots to learn how to reduce targeted ads on Instagram.Generally though, it’s tough to minimise targeted ads on phones because ads can be delivered based on data from the device level (such as what operating system your phone is using or based on unique numbers that identify your phone), browser level (what you search for within a browser), and within the apps you use. An app could target ads at you based on your location (tied to your unique device id number(s)) for example…
Content type: Guide step
Facebook can be an important tool for individuals to spread messages and ideas around the globe. For these reasons, it’s not possible for some people to simply stop using Facebook. However, we continue to be very concerned about the company’s conduct.This guide shows you how you can minimise the usage of your data for advertising recommendations on Facebook.1. Go to facebook.com and log in
Content type: Guide step
Google is enormous and is expert at accumulating data. Its main source of revenue is advertising. The company dominates search, has a dominant web browser Chrome, owns YouTube (and many other companies), is the designer/develop of Android, the operating system that runs on nearly 75% of global smart phones.Below is a set of steps you can take if you wish to minimise ad targeting when using Google.1. Go to gmail.com and sign in
Content type: Long Read
Valentine’s Day is traditionally a day to celebrate relationships, but many relationships that begin romantically can quickly become controlling, with partners reading emails, checking texts and locations of social media posts. This can be just the beginning.
Today, Friday 14th February, Privacy International and Women’s Aid are launching a series of digital social media cards giving women practical information on how to help stay safe digitally from control and abuse.
Did you know…