Search
Content type: Report
End-to-end encryption (E2EE) contributes significantly to security and privacy. For that reason, PI has long been in favour of the deployment of robust E2EE.
Encryption is a way of securing digital communications using mathematical algorithms that protect the content of a communication while in transmission or storage. It has become essential to our modern digital communications, from personal emails to bank transactions. End-to-end encryption is a form of encryption that is even more private…
Content type: Advocacy
En mai 2021, nous avons fait une soumission pour la 132ème session du Comité des droits de l’homme qui a eu lieu entre le 28 juin 2021 et le 23 juillet 2021 en relation avec la conformité de la France avec le Pacte international relatif aux droits civils et politiques (PIDCP) avant l’adoption de la liste de points à traiter avant présentation de rapports (LoIPR).
Nous avons appelé le Comité des droits de l’homme de l’ONU à inclure dans la liste des questions au gouvernement français les points…
Content type: Advocacy
On May 2021, we made a submission for the 132nd Session of the Human Rights Committee that took place between 28 June 2021 and 23 July 2021 in relation to France’s compliance with the International Covenant on Civil and Political Rights (ICCPR) before the adoption of the List of issues prior to reporting (LoIPR).
We called the UN Human Rights Committee to include in the list of issues to the French government the following:
Emergency measures taken in response to the Covid-19 pandemic, and…
Content type: News & Analysis
Around the world, we see migration authorities use technology to analyse the devices of asylum seekers. The UK via the Policing Bill includes immigration officers amongst those who can exercise powers to extract information from electronic devices. There are two overarching reasons why this is problematic:
The sole provision in the Policing Bill to extract information rests on voluntary provision and agreement, which fails to account for the power imbalance between individual and state. This…
Content type: News & Analysis
It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer ... when connected to the internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world.
R v Vu 2013 SCC 60, [2013] 3 SCR 657 at [40] and [41].
The controversial Police Crime Sentencing and Courts Bill includes provision for extracting data from electronic devices.
The Bill…
Content type: Case Study
Anyone who is arrested should be informed of the reasons for their arrest and any charges against them. Anyone who is detained is also entitled to a trial within a reasonable time, or to be released if no charges are held against them.
Privacy enhances these protections. It provides limitations on the manner in which information can be obtained about you, and the kind of information that can be accessed about you by law enforcement, who can access that information and how they can use it.…