Search
Content type: Advocacy
Privacy International (PI) welcomes the opportunity to provide input to the forthcoming report the Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related tolerance to the 56th session of Human Rights Council which will examine and analyse the relationship between artificial intelligence (AI) and non-discrimination and racial equality, as well as other international human rights standards.AI applications are becoming a part of everyday life:…
Content type: Advocacy
Dejusticia, Fundación Karisma, and Privacy International submitted a joint stakeholder report on Colombia to the 44th session of the Universal Periodic Review at the UN Human Rights Council.Our submission raised concerns regarding the protection of the rights to freedom of expression and opinion, to privacy, and to personal data protection; the shutdown of civil society spaces; protection of the right to protest; and protection of the rights of the Venezuelan migrant and refugee population.…
Content type: Long Read
Introduction
The 28th of September marks International Safe Abortion Day. It remains a day necessary to mobilise and raise awareness of the continued struggles women and girls face when accessing reproductive healthcare, including access to safe abortion. Across the world, abortion continues to be criminalised, restricted and in some places under attack. All of which constitute severe obstacles for women and girls to fully exercise their human rights, particularly their right to privacy, which…
Content type: News & Analysis
The relationship between privacy and access to abortion care
In 1973, in the state of Texas, it was a criminal offence to “procure or attempt” an abortion except if the purpose was “saving the life of the mother.” This law was enacted in 1854 by the Texas state legislature, and was part of a wave of provisions criminalising access to abortion care that was gaining ground across the U.S in the mid-1800s. It is worth highlighting that these laws were being passed at a time when women in the U.S…
Content type: Long Read
In the wake of the recent news of the US Supreme Court’s decision to overturn the ruling of Roe v Wade in its ruling in Dobbs v Jackson Women's Health Organization, headlines have been dominated by conversations around privacy and fears of how the criminalisation of abortion care and surveillance by law enforcement will play out in a tech driven world.
This discussion is increasingly important as governments move towards digitising their healthcare systems and as more individuals choose to…
Content type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
What are they?
Short Message Services (SMS) are being used in mobile health (MHealth) initiatives which aim to deliver crucial information to expecting and new mothers. These initiatives are being implemented in developing countries experiencing a large percentage of maternal and…
Content type: Long Read
India’s Mother and Child Tracking System (MCTS) is a system that collects vast amounts of data about pregnant people, children, and families. It is an initiative by the Ministry of Health and Family Welfare in India, and was first trialled in 2009. It was then rolled out nation-wide in 2011. Its declared purpose, as stated in the press release accompanying it, was to facilitate “ensuring timely delivery of full spectrum of health care services to pregnant women and children up to 5 years of age…
Content type: Advocacy
Privacy International and Hiperderecho made a joint submission to the UN Committee on the Elimination of all Forms of Discrimination Against Women (CEDAW) ahead of the Committee finalising the list of issues for the examination of Peru.
The submission builds on research commissioned by Privacy International and carried out by Hiperderecho on the state of reproductive rights in Peru, and how their exercise intersects with privacy and tech.
The submission is available in…
Content type: Long Read
1. What are the barriers to access safe and legal abortion care?
Abortion is considered a crime in Brazil, except in cases of pregnancy resulting from rape, when it puts the woman's life at risk or, most recently, in cases of fetal anencephaly. Article 273 of the Penal Code also forbids the sale or distribution of medication that is not registered at Anvisa (National Health Agency), which is the case for abortion pills in Brazil. Misoprostol, the active substance of abortive medicines in the…
Content type: Long Read
1. What are the barriers to access safe and legal abortion care?
The Indian state’s approach to reproductive rights historically has focused on population control rather than enhancing individual autonomy and removing structural barriers to reproductive health services, which is reflected in the barriers to provision of services. As a consequence of the early adoption of family planning and population control measures in the 1950s, India was one of the first countries to legislate on abortion…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
In Kenya, access to abortion care is restricted by the Constitution, which provides that: “…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Even though abortion is legal in certain cases in Argentina, different types of barriers restrict the access to legal abortions, contribute…
Content type: Long Read
This research was produced by Paz Peña as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion?
According to figures from the Ministry of Health, more than 33 thousand clandestine abortions are…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Legal barriers
To identify the barriers experienced by women to access safe and legal abortion care, we have to understand the legal picture…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
Content type: Long Read
This piece was written by Aayush Rathi and Ambika Tandon, who are policy officers at the Centre for Internet and Society (CIS) in India. The piece was originally published on the website Economic Policy Weekly India here.
In order to bring out certain conceptual and procedural problems with health monitoring in the Indian context, this article posits health monitoring as surveillance and not merely as a “data problem.” Casting a critical feminist lens, the historicity of surveillance practices…
Content type: Advocacy
TEDIC, InternetLab, Derechos Digitales, Fundación Karisma, Dejusticia, Asociación por los Derechos Civiles and Privacy International welcome the call made by the Special Rapporteurship on Economic, Social, Cultural and Environmental Rights (ESCER) of the Inter-American Commission on Human Rights (IACHR) to inform the preparation of the Annual Report of the ESCER for the year 2019, which will be presented to the Organization of American States (OAS) during 2020.
This submission aims to outline…
Content type: Case Study
Slavery, servitude, and forced labour are absolutely forbidden today, as is anything that seeks to undermine or limit that restriction. The horrific reality, however, is that modern slavery remains a significant global issue.
Human trafficking is one form of modern slavery. It involves the recruitment, harbouring or transporting of people into a situation of exploitation through the use of violence, deception or coercion and forcing them to work against their will.
Human traffickers do…
Content type: Long Read
In December 2018, Privacy international exposed the dubious practices of some of the most popular apps in the world.
Out of the 36 apps we tested, we found that 61% automatically transfer data to Facebook the moment a user opens the app. This happens whether the user has a Facebook account or not, and whether they are logged into Facebook or not. We also found that some of those apps routinely send Facebook incredibly detailed and sometimes sensitive personal data. Again, it didn’t matter if…
Content type: Explainer
What is SOCMINT?
Social media intelligence (SOCMINT) refers to the techniques and technologies that allow companies or governments to monitor social media networking sites (SNSs), such as Facebook or Twitter.
SOCMINT includes monitoring of content, such as messages or images posted, and other data, which is generated when someone uses a social media networking site. This information involves person-to-person, person-to-group, group-to-group, and includes interactions that are private and…
Content type: Case Study
Our connected devices carry and communicate vast amounts of personal information, both visible and invisible.
What three things would you grab if your house was on fire? It’s a sure bet your mobile is going to rank pretty high. It’s our identity, saying more about us than we perhaps realise. It contains our photos, calendar, internet browsing, locations of where we go, where we’ve been, our emails, social media. It holds our online banking, notes with half written poems, shopping lists, shows…