Search
Content type: Explainer
The ‘Guide to Digital Safety and Privacy at Peaceful Protests’ has been produced by 7amleh - The Arab Center for the Advancement of Social Media.
7amleh has adapted the content of PI's UK Free to Protest guide to fit the Palestinian context. The guide is organized in three sub-guides: (1) a guide to digital safety and privacy at peaceful protests; (2) a guide to surveillance of protesters’ faces and bodies; and (3) a guide to policing databases and predictive policing tools.
This guide was…
Content type: Explainer
La 'Guía de Protesta' es un documento que buscar concientizar sobre las herramientas tecnológicas que las fuerzas de seguridad podrían utilizar para monitorear e identificar personas en una protesta en Argentina. Encontrarás en esta guía explicaciones de cómo las tecnologías de vigilancia están siendo utilizadas para vigilar las protestas, y cómo puedes protegerte de las mismas.
Puedes descargar la guía desde esta página, de la sección más abajo titulada "Attachments".
This guide was…
Content type: Advocacy
In line with WHO's commitment to a human rights-based approach to health, Privacy International believes the following elements procedural and substantive elements must be included:
Open, inclusive and multi-stakeholder process
The drafting and negotiation process of this international instrument must allow for the meaningful participation of a wide range of civil society organisations (CSOs) and reflect the commitment from the WHO and Member States to receive and respond to CSOs…
Content type: News & Analysis
The UK government has acknowledged that section 8(4) of the Regulation of Investigatory Powers Act (“RIPA”) (which has since been repealed) violated Articles 8 and 10 of the European Convention on Human Rights (ECHR). In relation to Article 10, it specifically acknowledged that the way in which security agencies handled confidential journalistic material violated fundamental rights protected by Article 10.
As part of a friendly settlement with two applicants, the UK government acknowledged…
Content type: Explainer
Bluetooth
The majority of apps settled on using Bluetooth for proximity tracing.
Just what is Bluetooth?
Named after the 10th Century King Harald "Bluetooth" Gormsson who unified Scandinavia — and whose runic initials comprise the logo — Bluetooth is a wireless, low-power, and therefore short-distance, set of protocols used primarily to connect devices directly to each other in order to transfer data, such as video and audio.
Bluetooth for tracking?
Most of us who've encountered Bluetooth use…
Content type: Video
Links
Edin mentioned 'a journalist and her son' being targeted; their names are Carmen and Emilio Aristegui. You can find out more about people targeted in Mexico
Keep up to date with ongoing litigation against NSO Group around the globe
Read our report, together with Amnesty International and SOMO, on NSO Group's corporate structure
Find more examples of harm involving NSO group
As revelations about the abuses of NSO Group's spyware continue, we took a look at what…
Content type: News & Analysis
In the midst of the atrocious war currently being waged by Russia on Ukraine, on 14 March 2022 Reuters reported that Clearview AI, the infamous online surveillance company, had offered its services to the Ukrainian defense ministry. A day later in an interview for TechCrunch, Ukraine's vice prime minister and minister for Digital Transformation confirmed that the partnership with Clearview AI was "currently in very early development".
Clearview is an online surveillance company that collects…
Content type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.Index:1. UK Border 20252. Super-complaint and judicial review challenge to data sharing3. Mobile phone seizure and extraction4. Freedom of Information Act requestsThe dystopian future: UK Border 2025To set the scene on how the future may look…
Content type: Advocacy
We wrote to the Home Office as part of our campaign ‘STOP SPYING ON ASYLUM SEEKERS’, opposing the draconian surveillance of asylum seekers taking place through the Aspen Card.
We asked detailed questions about how data collected from Aspen Card usage is used to monitor asylum seekers, and how the Home Office are alerted to any ‘breach of conditions’ of the card.
In their reply, the Home Office told us that:
“The Home Office can be alerted to a breach of conditions by several internal and…
Content type: News & Analysis
In a ruling handed down on 14 October 2021 by the High Court of Kenya in relation to an application filed by Katiba Institute calling for a halt to the rollout of the Huduma card in the absence of a data impact assessment, the Kenyan High Court found that the Data Protection Act applied retrospectively.
Background to the case
Huduma Namba as initially proposed
In January 2019, the Kenyan Statute Law (Miscellaneous Amendment) Act No. 18 of 2018 came into effect, introducing a raft of amendments…
Content type: News & Analysis
2022 will see a raft of high tech surveillance tools emerging in the UK government’s arsenal, which will further entrench a ‘hostile environment’ for migrants. Compounding this further, immigration officers will increasingly be using digital forensic tools such as 'mobile phone extraction' under a veil of secrecy. This raises serious concerns about overreach, misuse and abuse of power, the actual quality and integrity of the data they gather, and independent oversight of these powers. But it…
Content type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
What are they?
Short Message Services (SMS) are being used in mobile health (MHealth) initiatives which aim to deliver crucial information to expecting and new mothers. These initiatives are being implemented in developing countries experiencing a large percentage of maternal and…