Search
Content type: Video
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Content type: Advocacy
Privacy International responded to a call for submissions of the Working Group on Discrimination Against Women and Girls on the sexual and reproductive health and rights of women and girls in situations of crisis.
This submission builds on PI’s research highlighting the ways in which data exploitative technologies can obstruct the realisation of sexual and reproductive rights, and research carried out by our partners on the specific manifestations of these obstacles in multiple countries of…
Content type: Case Study
The Peruvian government has a history of collaboration with the private sector in developing technology with the alleged purpose of providing greater security to citizens. The most recent example, the smartphone application "Peru En Tus Manos" launched in the context of the Covid-19 crisis, has been developed in a similar fashion and currently collects geolocation data on more than a million users. Although Peru has a proper legal framework for public private partnerships, developments are…
Content type: Case Study
Como is one of the most advanced cities in Italy in the use of facial recognition technology (FRT). An investigation for the Italian Wired magazine published in June 2020 exposed how the system had been bought, installed and tested for months with little transparency and despite the lack of a clear legal framework.
The investigation was entirely based on tools available to everyone, such as Freedom of Information requests (FOI requests. Similar to PI’s campaign 'Unmasking policing, inc', it…
Content type: Report
Privacy International partnered with the International Human Rights Clinic at Harvard Law School to guide the reader through a simple presentation of the legal arguments explored by national courts around the world who have been tasked with national courts that discuss the negative implications of identity systems, particularly on human rights, and to present their judgement.
This argumentation guide seeks to fill that gap by providing a clear, centralised source of the arguments advanced in…
Content type: Examples
Human rights experts have accused the home secretary, Priti Patel, of ignoring legal guidance in an attempt to target child asylum seekers who cannot prove they are under 18.
A letter from the Home Office, seen by the Observer, reveals that the government is putting pressure on social workers to speed up the age assessment of unaccompanied minors, and offering to bankroll councils that face legal challenges as a result. The move comes as new evidence shows that hundreds of people were deported…
Content type: Examples
Around 8,800 children have been deported from the United States along the Mexican border thanks to a new pandemic-related measure that functionally stripped the rights of those seeking asylum.
Donald Trump’s administration has expelled nearly 160,000 people since the emergency order proclaimed by the CDC took effect in March including roughly 7,600 adults and children who came to the US in families. The emergency order temporarily suspends citizens, regardless of their country of origin, from…
Content type: Report
Many countries in the world have existing ID cards - of varying types and prevalence - there has been a new wave in recent years of state “digital identity” initiatives.
The systems that states put in place to identify citizens and non-citizens bring with them a great deal of risks.
This is particularly the case when they involve biometrics - the physical characteristics of a person, like fingerprints, iris scans, and facial photographs.
Activists and civil society organisations around the…
Content type: Report
A common theme of all major pieces of national jurisprudence analyzing the rights implications of national identity system is an analysis of the systems’ impacts on the right to privacy.
The use of any data by the State including the implementation of an ID system must be done against this backdrop with respect for all fundamental human rights. The collection of data to be used in the system and the storage of data can each independently implicate privacy rights and involve overlapping and…
Content type: Report
Identity systems frequently rely on the collection and storage of biometric data during system registration, to be compared with biometric data collected at the point of a given transaction requiring identity system verification.
While courts have arguably overstated the effectiveness and necessity of biometric data for identity verification in the past, the frequency of biometric authentication failure is frequently overlooked. These failures have the potential to have profoundly…
Content type: Report
National identity systems naturally implicate data protection issues, given the high volume of data necessary for the systems’ functioning.
This wide range and high volume of data implicates raises the following issues:
consent as individuals should be aware and approve of their data’s collection, storage, and use if the system is to function lawfully. Despite this, identity systems often lack necessary safeguards requiring consent and the mandatory nature of systems ignores consent…
Content type: Report
While identity systems pose grave dangers to the right to privacy, based on the particularities of the design and implementation of the ID system, they can also impact upon other fundamental rights and freedoms upheld by other international human rights instruments including the International Covenant on Civil and Political Right and the International Covenant on Economic, Social and Cultural Rights such as the right to be free from unlawful discrimination, the right to liberty, the right to…
Content type: Report
Rather than providing a list of arguments, as is the case in the other sections of this guide, the fifth section provides a general overview describing the absence of consideration of these themes in existing jurisprudence and the reasons why these themes warrant future consideration including identity systems’ implications for the rule of law, the role of international human rights law, and considerations of gender identity.
Democracy, the Rule of Law and Access to Justice: This analysis of…
Content type: Press release
Today, the European Court of Human Rights (ECtHR) has handed down a decision in a case brought by Privacy International and a coalition of internet and communications service providers and campaign groups including the Chaos Computer Club (Germany), GreenNet (UK), Jinbonet (Korea), May First/People Link (US), and Riseup (US) (the “coalition”).
The case challenges the conduct of hacking operations abroad by one of the UK’s intelligence agencies, the Government Communications…
Content type: News & Analysis
The Law Enforcement Data Service (LEDS) is a unified, common interface to a new mega-database currently being developed by the Home Office National Law Enforcement Data Programme (NLEDP). We believe that the development of the programme poses a threat to privacy and other rights and must be subjected to strong oversight, safeguards, and transparency measures.
As we explained in our analysis, the data in LEDS is vast, ever-increasing, worryingly mixes both evidential and intelligence material –…
Content type: Report
Madhewoo (Appellant) v The State of Mauritius and another (Respondents) (Mauritius)
The first case in the recent line of national identity systems cases is Madhewoo v. The State of Mauritius and Anor. This case, decided by the Mauritian Supreme Court in 2015, upheld the collection of fingerprint data as part of a national identity card scheme, but rejected a centralised database for the storage of this data in the system. The Mauritian court found that privacy rights guaranteed by the…
Content type: Guide step
What: the Referer (a misspelling of referrer) header contains the address of the previous web page from which a link to the currently requested page was followed. In more simple terms, the referer is the URL from which came a request received by a server. A good example is if you click a link on the page site.com/page to go to another-site.com/link, the HTTP Referer received by another-site.com/link will have the value site.com/page.
Why it's important: While the referer header can have begnign…
Content type: News & Analysis
A new report by the UN Working Group on mercenaries analyses the impact of the use of private military and security services in immigration and border management on the rights of migrants, and highlights the responsibilities of private actors in human rights abuses as well as lack of oversight and, ultimately, of accountability of the system.
Governments worldwide have prioritised an approach to immigration that criminalises the act of migration and focuses on security.
Today, borders are not…
Content type: Video
Find out more here: https://privacyinternational.org/long-read/3669/documentation-data-exploitation-sexual-and-reproductive-rights
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Content type: News & Analysis
Samsung has announced that the company will commit to providing major software updates for three generations of the Android operating system, but only for its flagship models: the S10, S20, Note 10 and Note 20.
From our reading of the available information, this means that these models will be getting support, including the latest operating system, features and security updates, for three years (as new Android operating systems are released every year).
While this is welcome news, it only…
Content type: Examples
The Australian government reported soon after releasing its CovidSafe contact tracing app that the app doesn’t work properly on iPhones because it doesn’t use Apple’s Exposure Notification framework and the Bluetooth functions deteriorate if the app isn’t kept running in the foreground. The government will update the app to use Apple’s framework. The app will store data on Amazon Web Services servers within Australia, although critics have expressed concern that the data could be handed over to…
Content type: Examples
Colombia will adopt the Apple-Google contact tracing platform after finding it necessary to remove the contact tracing functions from CoronApp, the official Colombian coronavirus information app because they didn’t work. CoronApp was downloaded by 4.3 million people, and includes features to report symptoms and locate cases on a map. The contact tracing features, which were supposed to be able to overcome the limitations of the iPhone’s Bluetooth implementation, were provided by the Portuguese…
Content type: Examples
Many of India’s informal workforce of 450 million people - 90% of the total workforce - were abruptly closed out of their places of employment when prime minister Narendra Modi abruptly ordered a lockdown in April. Left without pay, unable to stay in their living conditions, and with only limited train service available, many workers began walking back to their home states. Along the way, police are punishing them for failing to obey the quarantine and social distancing rules; others are dying…
Content type: Examples
After governments in many parts of the world began mandating wearing masks when out in public, researchers in China and the US published datasets of images of masked faces scraped from social media sites to use as training data for AI facial recognition models. Researchers from the startup Workaround, who published the COVID19 Mask image Dataset to Github in April 2020 claimed the images were not private because they were posted on Instagram and therefore permission from the posters was not…
Content type: Examples
As part of its pandemic-related emergency measures, in April the Scottish government extended the deadline for public bodies to respond to freedom of information requests to 40 days. A month later, it was forced to withdraw the changes after opposition parties on the Scottish parliament's COVID-19 committee voted them down. FoI deadlines will revert to 20 working days, as previously. MSPs also passed an amendment requiring the Scottish government to report to parliament every two months on its…
Content type: Examples
The outsourcing company Serco, which the UK government has contracted to perform contact tracing, accidentally shared the email addresses of almost 300 of the contact tracers it hired when a staff member sent an introductory email and used CC rather than blind CC. Serco does not intend to refer itself to the Information Commissioner's office.
Writer: Ross Hawkins
Publication: BBC