Search
Content type: Long Read
Go back to the full report page Flo, headquartered in London, UK, is one of the most popular period-tracking apps on the market with over 380 million downloads. The app was previously accused of sharing data with Facebook, such as informing Facebook whenever a Flo user was on their period or if they intended to get pregnant. In 2021, the U.S. Federal Trade Commission (FTC) reached a settlement with Flo to undergo an audit of their privacy policy and to obtain user permissions before…
Content type: Long Read
Go back to the full report pagePeriod Tracker by Simple Design is another popular period tracking app that has over 150 million users. To begin using this app the user answers a set of three onboarding questions for about their cycle pattern. The user has the option to answer 'I'm not sure' for each question. After answering 'I'm not sure' for these three questions, we were able to proceed on the app without having to create an account. Throughout our experience inputting our cycle…
Content type: Long Read
Go back to the full report pageThe Maya app is a period tracker app by Plackal Tech based in India. In our previous investigation, we revealed Maya was sharing a plethora of user input data to Facebook. However, in response to our 2019 research, the app claimed it had since ‘removed both the Facebook core SDK and Analytics SDK from Maya’ while ‘continu[ing] to use the Facebook Ad SDK, post opt-in to our terms and conditions and privacy policy’ for revenue purposes, the latter of which 'does not…
Content type: Long Read
Go back to the full report pagePeriod Tracker by GP Apps is another popularly downloaded app we previously looked at in 2019. In our original research, we determined that this app did not appear to share any user input data with Facebook. This time, we examined the third parties that the app appeared to integrate and what kind of data was being shared with these third parties, as well as what user data the app was storing on its own or external services. It’s worth noting that the…
Content type: Long Read
Go back to the full report pageThe WomanLog app, developed by Pro Active App SIA, is a Latvia-based period tracking app with over 10 million downloads that features an 'Intelligent Assistant' chatbot (more on this below). To get started on the app, we completed a short onboarding questionnaire about which app mode we intended to use (e.g., standard) and the length of our cycle and period. Our answers to these questions were sent across the web traffic to the app developer's API:
Content type: Long Read
Go back to the full report pageThe last app we looked at was Euki, which has been recognised among privacy advocates. The app is a U.S. non-profit privacy-by-default period tracker app founded by a group of social tech and sexual and reproductive health organisations like Digital Defense Fund and Ibis Reproductive Health. The app has recently become open-source. We ran the Euki app through the DIAAS environment to observe its web traffic as for the above apps. There were no onboarding…
Content type: Long Read
Go back to the full report pageLimitationsBefore our analysis, we note the technical limitations (and the scope of our research) meant we did not test certain features mentioned, such as Google Fit integrations offered by some apps. We also mention the limitations of our DIAS environment, which only allows us to see web (client-side) interactions, rather than server-side interactions, the latter of which are increasingly common among more advanced platforms that utilise cloud computing (e.…
Content type: Long Read
Our research has introduced questions about the right to privacy when apps have the potential to share a range of user-related data. This is a particular concern for people using apps in countries where there are restrictions on access to abortion. In the US, after the overturning of Roe v Wade, concerns around the privacy practices of period-tracking apps have been raised in states that have introduced restrictions and bans on access to abortion. It could be very possible for some period…
Content type: Long Read
The security of our devices, applications and infrastructure is paramount to the safe functioning of our digital lives. Good security enables trust in our systems, it is fundamental to protecting the critical information we store and exchange through networks and devices. Similar to how we physically secure our homes, offices and schools, securing devices and software allows us to operate in safe and trusted environments where our security is guaranteed and protected.Security for information…
Content type: Long Read
“Hey [enter AI assistant name here], can you book me a table at the nearest good tapas restaurant next week, and invite everyone from the book club?” Billions of dollars are invested in companies to deliver on this. While this is a dream that their marketing departments want to sell, this is a potential nightmare in the making.Major tech companies have all announced flavours of such assistants: Amazon’s Alexa+, Google’s Gemini inspired by Project Astra, Microsoft’s Copilot AI companion and…
Content type: Opportunities
Full time and permanent from London officeSalary: £40,500 full time and permanent from London officeBenefits: 26 days annual leave (plus bank holidays), generous workplace pension, wellbeing support, resources for learning & development, and we can offer a modest relocation fund.Join us: You’re curious about how technologies affect power and shape the future. You’re an advocate who wants to speak out for change with a voice that is both nuanced and engaging. You want to help build…
Content type: News & Analysis
We’ve been asked a lot lately about whether it is safe to travel, particularly to the US. And it’s not surprising why: the US Government is increasing their cruelty at borders.Border management today is fueled by our data, but government officials want more. They want as much data as they can get to catch you out. They’ve reportedly detained or deported people based on their free speech activities, denying entry on tenuous grounds like having the wrong photos on phones (including in in the ‘…
Content type: Long Read
It’s important to us at PI that we continue to create real change in the world. We want our work to matter, and we challenge ourselves continuously to verify that it does.In 2024 we made substantial progress towards concrete systemic change. We challenged governments and corporations that exploit data and technology, pushed for new national and international policy standards, drove standard-setting action by courts and regulators. We educated and campaigned with others.As a result, we produced…
Content type: Long Read
In 2024, Privacy International (PI) continued to produce real change by challenging governments and corporations that use data and technology to exploit us.Since the beginning of the year, we’ve achieved some wins and would like to share the most recent ones with you.Creating change is hard, and takes time. We have to uncover problems, draw attention to them, and pressure for change. In the latest quarter, we've been able to push regulators for stronger standards on generative AI systems, draw…
Content type: Long Read
On 13 March 2025, we filed a complaint against the UK government challenging their use of dangerous, disproportionate and intrusive surveillance powers to undermine the privacy and security of people all over the world. Here, we answer some key questions about the case and the recent events that led to this development.Note: This post was last updated on 13 March 2025.What’s the fuss about?A month ago, it was reported that the UK government demanded Apple Inc – maker of the iPhone, iPads, Macs…
Content type: Explainer
Imagine this: a power that secretly orders someone anywhere in the world to abide and the receiver can’t tell anyone, can’t even publicly say if they disagree, and can’t really question the power in open court because the secret order is, well, secret. Oh and that power affects billions of people’s security and their data. And despite being affected, we too can’t question the secret order.In this piece we will outline what’s ridiculous, the absurd, and the downright disturbing about what’s…
Content type: Long Read
Intrusive surveillance technology is increasingly used during protests around the world, and we’ve been tracking its use around the world for years.This technology is often being deployed in secret, without a clear legal basis and without the safeguards and oversight applied to other surveillance technologies under international human rights law.We’ve increasingly observed the use of unlawfully generated and collected data from these technologies being used in court against people exercising…
Content type: Long Read
What happened?On 19 July 2024, American cybersecurity company CrowdStrike released an update to its CrowdStrike Falcon software that ultimately caused 8.5 million computers running Microsoft Windows to crash. The damage done was both deep and wide: deep because the computers affected were unable to recover without direct user intervention. Wide because a whole range of companies - from airlines to healthcare to media - across a whole range of countries - from Sweden to India to New Zealand -…
Content type: Long Read
18th December is International Migrants Day, a day to recognize both the contributions and continued struggles of migrants across the world.Migrants continue to face an increased level of human rights violations through hostile immigration policies and practices. At borders and beyond, their fundamental human rights and dignity are being violated through old and new technologies. These systems in place reinforce the dehumanising rhetoric of migrants, who are merely seeking asylum and a better…
Content type: Long Read
In this new briefing, we identify the most significant concerns on the UN Countering Terrorist Travel Programme (CTTP), and put forward a range of recommendations to mitigate some of the human rights risks associated with the surveillance of travellers. We based our briefing on publicly available information and our own research, outlining the purposes and activities of this UN programme. We shared a draft of this briefing with the United Nations Office of Counter- Terrorism (OCT), which…
Content type: Advocacy
In the wake of Privacy International’s (PI) campaign against the unfettered use of Facial Recognition Technology in the UK, MPs gave inadequate responses to concerns raised by members of the public about the roll-out of this pernicious mass-surveillance technology in public spaces. Their responses also sidestep calls on them to take action.The UK is sleepwalking towards the end of privacy in public. The spread of insidious Facial Recognition Technology (FRT) in public spaces across the country…
Content type: Advocacy
The rapid expansion of educational technologies (EdTech) has introduced serious concerns about human rights protection in educational spaces. This briefing explores the impact of facial recognition technology (FRT) and heightened surveillance in these settings, highlighting many complex and multifaceted issues that demand careful consideration from a human rights perspective. From the erosion of privacy and the securitisation of educational spaces - that undermines the learning and growth…
Content type: Long Read
Increasingly, EdTech systems are less about teaching than about monitoring, security and ‘safety’ – although those aims are often mixed with wider educational claims.For instance, one company offering “high quality surveillance systems and CCTV for schools including sophisticated infra-red cameras which record in the darkest areas” claimed that these both deter “bad or antisocial behaviour from pupils, parents and visitors” and improve the concentration, productivity and attainment of the…
Content type: Long Read
IntroductionHarnessing new digital technology to improve people’s health is now commonplace across the world. Countries and international organisations alike are devising digital health strategies and looking to emerging technology to help solve tricky problems within healthcare. At the same time, more and more start-ups and established tech companies are bringing out new, and at times innovative, digital tools aimed at health and wellbeing.
Content type: Long Read
IntroductionWith the ongoing expansion of GPS tagging under the UK Home Office's electronic monitoring programme, it has increasingly deployed non-fitted devices (NFDs) that track a person's GPS location and request frequent biometric verification in the form of fingerprint scans.The NFDs deployed by the UK Home Office are small handheld devices with a fingerprint scanner that record a person's location 24/7 (referred to as their trail data). They alert the person at random intervals throughout…
Content type: Long Read
Education is a fundamental human right outlined in the Universal Declaration of Human Rights (Article 26), which states that everyone has the right to education. Schools play a core role in the education of children, but it’s also in schools that children are encouraged to learn to work with others, and to develop their own identities and emotional skills. The education process doesn’t stop there, it continues as children grow and make their way through different higher educational spaces such…
Content type: Long Read
1. What is the issue?Governments and international organisations are developing and accessing databases to pursue a range of vague and ever-expanding aims, from countering terrorism and investigating crimes to border management and migration control.These databases hold personal, including biometric, data of millions if not billions of people, and such data is processed by technologies, including Artificial Intelligence (AI), to surveil, profile, predict future behaviour, and ultimately make…
Content type: Long Read
Elections and political campaigns are increasingly mediated by digital technologies. These technologies rely on collecting, storing, and analysing personal information to operate. They have enabled the proliferation of tailor-made political advertising. The recent proliferation of AI technologies is enabling ever more sophisticated content creation and manipulation in the context of elections.In parallel, governments are continuing to invest in digital technologies for the running of elections…
Content type: News & Analysis
We’ve published a new tech explainer on election technologies in Kenya. The explainer takes a deep dive into the technologies employed to manage and administer the election process in Kenya, such as biometric voter registration (BVR), voter identification, results transmission, and candidate management systems.Electoral processes - along with elections themselves - are one of the largest government data-gathering exercises undertaken, making them susceptible to data exploitation and privacy…
Content type: Advocacy
When it comes to elections around the world, we find ourselves in a terrain that is more and more populated by digital technologies, which have an increasingly critical impact upon the realisation of democracy. Digital technologies used in the context of elections offer new opportunities to support voter participation, whilst simultaneously posing increasing challenges for voters and those who manage and oversee elections. The introduction of technologies into electoral systems in countries…