Search
Content type: Long Read
… societies into patterns of discriminatory targeting and exclusion with little possibility for redress. This concern …
Content type: Long Read
Period tracking apps and the rollback of reproductive rightsThe aftermath of the overturning of Roe v. Wade in the United States (US) sparked widespread debate and concern that data from period tracking apps could be use to criminalise those seeking abortion care.While the surveillance and criminalisation of reproductive choices are neither new nor unique to the US, the scale and intensity of today’s crisis continue to grow. To put it into perspective, 22 million women and girls of reproductive…
Content type: Long Read
… methodology should not lead to automatic or immediate exclusion, particularly of vulnerable populations. What this …
Content type: Guide step
In the current digital landscape, passwords are the predominant method for user authentication across most platforms. From a privacy perspective, passwords present a advantage over some other methods like biometrics, as they do not disclose any additional or unique data about you – apart from the selected username
Given the widespread adoption of passwords, manually managing multiple, unique passwords for each online account becomes more difficult. Having unique random passwords for each…
Content type: Advocacy
… adopts legal, policy and technical safeguards to prevent exclusion, unlawful surveillance and exploitation of the …
Content type: Advocacy
… adopts legal, policy and technical safeguards to prevent exclusion and marginalisation. Ensure that measures taken to …
Content type: Advocacy
… methodology should not lead to automatic or immediate exclusion, particularly of vulnerable populations. Advocacy … and our submission raises the following issues: Sisbén is exclusionary by design. Its inefficiency in accurately …
Content type: Legal Case Files
… Constitution, particularly until it addresses problems of exclusion of marginalised communities. You can find out more … these issues. Key topics addressed include biometrics, exclusion, unique identifiers, data breaches, security, …