Reports

Reports, Long Reads, Country Reports

Long Read
The European Court of Human Rights ruled today that the UK government's mass interception program violates the rights to privacy and freedom of expression. The Court held that the program "is incapable of keeping the 'interference' to what is 'necessary in a democratic society'". This finding is an
Report
Intelligence sharing between countries is one of the most pervasive and least regulated surveillance practices carried out by governments across the world. It is facilitated by rapidly evolving surveillance technologies that enable intelligence agencies to collect, store, analyse and share ever
Report

This guide was designed for our partners across the world who want to see strong data protection laws in their countries. We identify some key points that they can use in their advocacy.

This version of the guide is the full guide that you can download as a single resource.

Long Read
National and International civil society organisations (CSOs) play vital roles in many aspects of our societies as watchdogs of state powers, as representatives of the voices of the people, as experts to inform and educate an array of stakeholders. One of our key lessons learned from three decades
Report
This part of “The Keys to Data Protection” provides links to further resources and outlines avenues for engagement which we hope will encourage more civil society organisations to engage in policy developments and legal processes on data protection.
Report
This part of “The Keys to Data Protection” outlines the models and structures as well as powers and functions of an independent supervisory authority, which plays an essential role as an independent oversight and enforcement mechanism of data protection law.
Report
This part of “The Keys to Data Protection” presents the responsibilities, obligations, and liability of those who process personal data, to ensure data controllers and processors are held accountable under the law.
Report
This part of “The Keys to Data Protection” outlines and explains the legal basis permitted for the processing of personal data, which should be limited and clearly articulated in law.
Report
This part of “The Keys to Data Protection” presents eight key rights for individuals (also known as ‘data subjects’) that should be followed and enforced by those who process personal data, including the right to access, the right to object, and the right to an effective remedy.
Report
This part of “The Keys to Data Protection” presents what should be provided for in the general provisions of a data protection law including the object and purpose of the law and definitions.
Report
This part of “The Keys to Data Protection” presents and explains seven key data protection principles, derived from regional and international frameworks, covering elements such as minimisation, storage limitation, and accountability.
Report
This part of “The Keys to Data Protection” explains what data protection is, why it is needed, and how to works. It also outlines why it is essential for the exercise of the right to privacy. This part also provides a brief outline of data protection in practice.
Long Read
The Sustainable Development Goals (SDGs) are the United Nations-led initiative to define the development agenda. Building on the eight Millennium Development Goals, the SDG’s 17 goals – and the 169 targets – serve as an opportunity to tackle many of the most pressing issues in the world today. The
Long Read
Privacy International’s new report shows how countries with powerful security agencies are training, equipping, and directly financing foreign surveillance agencies. Driven by advances in technology, increased surveillance is both powered by and empowering rising authoritarianism globally, as well
Long Read
The idea of a “smart city” is primarily a marketing concept, used to sell data-intensive technologies under the pretext of improving the functioning of cities. This could include injecting ‘smart’ tech into delivering services, public safety, environmental monitoring, traffic control, among other