Search
Content type: Examples
Latvia became one of the first countries to use Apple's and Google's new joint toolkit to launch a smartphone contact tracing app, Apturi Covid. For now, the app will only work for Latvia's 2 million citizens, but the intention is that it should interoperate with the apps other countries to aid travellers.
https://www.euractiv.com/section/digital/short_news/latvia-to-launch-google-apple-friendly-coronavirus-contact-tracing-app/
Writer: Reuters
Publication: Euractiv
Content type: Examples
An Ipsos MORI survey conducted on May 20-22 found generally high levels of compliance with lockdown restrictions, though many were suffering. While roughly three-quarters were confident they could download and operate a contact tracing app and would be willing to comply with its recommendations, only 40% were confident or fairly confident that they could trust the government to protect their and other people's data, and only 42% were confident or fairly confident that the app could help limit…
Content type: Case Study
Students around the world are quickly turning into training-data for intrusive facial recognition technology. In Sweden, the national Data Protection Authority (DPA) ruled that students at Anderstorp High School in Skellefteå had their right to privacy violated by the testing of facial recognition software to take attendance.
The Skellefteå school board invited a private company, Tieto, to install facial recognition cameras across classrooms that would automatically register students’ class…
Content type: Guide step
A lot of third-party apps ask you to get access to your Instagram data. This is the case with social media managing apps for example. The more apps have private information on you, the more likely it is that information can be misused. So it is important to make sure that you only allow Instagram access to apps that really need it. You can do this from your web browser or using the app.
On the Web:
After logging in, click the person icon on the upper-right corner of the screen, and then…
Content type: Guide step
Es importante asegurarte de que solo permitas que accedan a Instagram las aplicaciones que verdaderamente lo necesitan.
Para ello, tendrás que utilizar la interfaz web con cualquier navegador en tu teléfono o computadora:
Después de iniciar la sesión, toca el ícono de persona en la esquina superior derecha de la pantalla, y luego toca el ícono de engranaje.
Ve a Apps autorizadas y revisa qué aplicaciones tienen acceso a tus datos.
Si ves una aplicación que no debería estar ahí, toca…
Content type: Guide step
Even with the tightest privacy settings it's important to acknowledge that the way you and others use the app can still be compromising in terms of sensitive data being shared. In addition to in-app settings there's a few good practices that you should keep in mind:
Let people know that you don't want your picture posted without your consent - if you make your profile private because you don't want unknown people to have access to photos of you, then you should make sure there are no…
Content type: Guide step
Avísale a la gente que no quieres que publiquen tu foto sin tu consentimiento.
No publiques fotos de otras personas sin su consentimiento.
No publiques información delicada en tus fotos o en las leyendas.
No reveles tu ubicación/asegúrate de que los detalles en el fondo no revelen tu ubicación.
No uses hashtags que podrían revelar datos privados (o la ubicación).
Ten cautela cuando publiques fotos de tus hijos en las redes sociales.
Si inicias una sesión de tu cuenta Instagram en otros…
Content type: Guide step
We suggest using Two-Factor authentication, as it provides an extra security step in order to access your account. This way, besides asking for your username and password, Instagram will verify your identity by sending a unique code to your device.
This can be done using an authentication app or by SMS (text message). Let's go through both although you should be wary that SMS might not be the most secure.
On mobile app:
Go to your profile by clicking the bottom right corner icon. Then tap…
Content type: Guide step
Sugerimos que utilices la autenticación de dos factores, porque implica un paso adicional de seguridad para entrar a tu cuenta. Al hacerlo, además de pedir tu nombre de usuario y contraseña, Instagram verificará tu identidad enviando un código exclusivo a tu dispositivo.
Esto se puede hacer por SMS (mensaje de texto) o utilizando una aplicación de autenticación que sugiera Instagram. Veamos las dos maneras.
En la aplicación móvil:
Ve a tu perfil tocando el ícono de la esquina inferior…
Content type: Guide step
Si quieres tomar medidas más fuertes, bloquear a alguien en Instagram impedirá que encuentre tu perfil, tus historias y tus mensajes. Cuando bloqueas a alguien, Instagram no le notificará tu acción a esa persona. Cuando bloqueas a alguien dejarás de recibir las notificaciones que vengan de esa persona. No podrás seguir cuentas que hayas bloqueado. Ten en cuenta que si tu cuenta está configurada como pública, las personas que hayas bloqueado podrán encontrarte si se conectan con otra cuenta.
En…
Content type: Guide step
Blocking someone on Instagram will make them unable to find your profile, stories and posts. When you block someone, they do not get a notification about your action. Blocking someone means you will stop getting notifications from that person. You cannot follow an account you have blocked. Keep in mind that if your profile is set to public, anyone that you have blocked can find you if they login through another account.
On the mobile app or on your browser (procedure is exactly the same):…
Content type: News & Analysis
Traduction réalisée par Nadine Blum.
Le 29 mai, le Congrès nigérien a voté une loi permettant au gouvernement d’intercepter largement certaines communications électroniques. La loi rend légale l’interception de communications, autorisée par le gouvernement, sans protections appropriées ni mécanismes de contrôle.
La loi a été adoptée avec 104 votes pour – le Parlement nigérien compte 171 membres – et sans la participation de l’opposition qui a boycotté la loi. L’opposition a affirmé…
Content type: Long Read
1. What are the barriers to access safe and legal abortion care?
The Indian state’s approach to reproductive rights historically has focused on population control rather than enhancing individual autonomy and removing structural barriers to reproductive health services, which is reflected in the barriers to provision of services. As a consequence of the early adoption of family planning and population control measures in the 1950s, India was one of the first countries to legislate on abortion…
Content type: Guide step
This is the first step in improving your privacy on Instagram. When you first create your account, it is set as "public" by default, meaning anybody can find it and see what you share.
Making your account private lets you share your content with a select group of people that you care about. Anyone else that might want to access it needs to send you a follow request to get your approval first.
On mobile app:
Go to your profile by clicking the bottom right corner icon. Then tap the three…
Content type: Guide step
En la aplicación móvil:
Ve a tu perfil tocando el ícono de la esquina inferior derecha. Luego toca el icono de las tres franjas en la parte superior derecha y elige Configuración.
Ve a Privacidad y entonces podrás cambiar la Privacidad de la cuenta de pública a privada.
En la web:
En la página web de Instagram toca el ícono superior derecho para ir a tu perfil. Después, toca el ícono de engranaje para ir a Configuración.
Selecciona Privacidad y seguridad y luego podrás…
Content type: Video
Given everything that's happening at the moment around the world, we've decided to postpone our episode on ID in Kenya until next week.
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Some of the resources we mentioned in the episode can be found here:
ACLU: know your rights: https://www.aclu.org/know-your-rights/protesters-…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
In Kenya, access to abortion care is restricted by the Constitution, which provides that: “…
Content type: News & Analysis
Humanitarian organisations are defined by their commitment to core, apolitical principles, including: humanity, impartiality, neutrality, independence and to “do no harm”.
And yet the ways data and technology are being used in the world today are often far from being apolitical, humane, impartial, neutral and independent, and in many instances many actors are using technology to exploit people, failing to protect and empower many individuals and communities - in particular those most in need…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Even though abortion is legal in certain cases in Argentina, different types of barriers restrict the access to legal abortions, contribute…
Content type: Long Read
This research was produced by Paz Peña as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion?
According to figures from the Ministry of Health, more than 33 thousand clandestine abortions are…
Content type: News & Analysis
On 29 May, Niger’s Congress voted on a law allowing for broad interception powers of certain electronic communications by the government. The bill makes it lawful for the government to approve the interception of communications without appropriate safeguards or oversight mechanisms.
The law passed with 104 votes – the Nigerien parliament has 171 members – without the participation of the opposition that boycotted the law. The opposition claimed that
the law will allow those, for…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Legal barriers
To identify the barriers experienced by women to access safe and legal abortion care, we have to understand the legal picture…
Content type: Advocacy
Last week, Privacy International joined more than 30 UK charities in a letter addressed to the British Prime Minister Boris Johnson, following his recent declaration, asking him to lift No Recourse to Public Funds (NRPF) restrictions.
Since 2012, a ‘NRPF condition’ has been imposed on all migrants granted the legal right to live and work in the UK. They are required to pay taxes, but they are not permitted to access the public safety net funded by those taxes.
This is not a topic we are known…
Content type: News & Analysis
As countries around the world develop contact tracing apps to contain the spread of Coronavirus, they keep facing a problem: for them to be effective a certain percentage of the population has to download them. Something like 60% is the threshold for the app to be effective. So far only Iceland has gotten close with 38% of their country downloading it.
The UK is currently trialling an app, which is designed to notify people if they've been close to someone with symptoms of covid-19 for 15…
Content type: Frequently Asked Questions
The right to access your personal data (or access right) is just one of a number of data rights that may be found in data protection law, including the European Union's General Data Protection Regulation. Data Subject Access Requests, or DSARs, have helped us several times understand the extent of data companies and governments might hold on us, how this data might be shared among various recipients, or what other third parties a company might be using to obtain additional data and enrich their…
Content type: Case Study
In the UK, asylum seekers cannot claim benefits. Some of them are entitled to an ASPEN card, a pre-paid payment card that allocates them a weekly sum of money. Most of them are allowed to use it the way we would use any debit card. But people, whose applications have been refused but who cannot return to their countries, aren’t allowed to withdraw cash. That means that every single payment they make can be monitored by the Home Office.
Evidence has started emerging that this monitoring has led…
Content type: Case Study
As working from home is becoming the new normal, employees’ monitoring becomes the new norm.
Companies around the globe are increasingly using software to monitor how long we spend in front of our computer, what websites we visit and what apps we use, when we type, for how long and how fast, how long our mouse stay inactive — any more than 15 seconds away can shift us from ‘active’ to ‘idle’ — and require us to keep our camera and microphone on at all times. These systems pit us against our…
Content type: Video
A quick catch-up on the state of play of apps round the world - though we end up mostly discussing India and the UK - and we celebrate a very special birthday.
You can find a much deeper and more detailed look at the various questions and concerns around coronavirus apps on our website: https://privacyinternational.org/long-read/3792/covid-contact-tracing-apps-are-complicated-mess-what-you-need-know and all the latest news in our tracker https://privacyinternational.org/examples/tracking-…