Search
Content type: Report
… encryption (E2EE) contributes significantly to security and privacy. For that reason, PI has long been in favour of the … to recreate, in the digital world, the guarantees of privacy that have traditionally applied in private … but rarely secures the metadata of communications. Some states also place restrictions, including criminal …
Content type: Long Read
… requiring enhanced safeguards to protect the rights to privacy and freedom of expression against abuse. It is a … who uses online communications. In this context, the Court stated that “the independent authorising body should be … afforded by the Convention would be rendered nugatory if States could circumvent their Convention obligations by …
Content type: Long Read
… used by South African authorities must be explicitly stated in law so they can be considered and debated. Long … parte; 4) lacked appropriate procedures to be followed when state officials examine, copy, share, sort through, use, … Following up on our joint submission before the High Court, Privacy International submitted an amicus curiae before the …
Content type: Long Read
… technologies prioritises corporate profits over peoples’ privacy There are solutions that can be used to address … organise, and protest without unlawful interference by the state authorities. Most of these surveillance technologies … of wrongdoing. This has happened in the past. In the United States, the now defunct National Security Entry-Exit …