Reports

Reports, Long Reads, Country Reports

Report
The US does not have a general overarching privacy law like European Data Directive or the sweeping privacy protections contained in the European declarations of rights. The EU-US accord cites several laws, which it claims, give privacy rights to non-US persons. None of the cited laws offer any real
Report
When we think of privacy in the political system we tend to recall historic events like Watergate, secret files held by governments in war-time, and blacklists. Modern political surveillance is more advanced and sophisticated. In this report we identify some of the modern political surveillance
Report
New technologies such as mobile phones and electronic medical record (EMR) systems promise to transform the provision and management of medicine all over the world. In the U.S. alone, billions are being spent on information technologies for healthcare. This eHealth revolution could be a boon for
Report
When we think of privacy in the political system we tend to recall historic events like Watergate, secret files held by governments in war-time, and blacklists. Modern political surveillance is more advanced and sophisticated. In this report we identify some of the modern political surveillance
Report
This is a memo prepared by Barry Steinhardt of Friends of Privacy USA for Members of the European Parliament regarding the proposed EU-US Agreement PNR. The proposed agreement regarding Passenger Name Records (PNR) between the United States and the European Union is riddled with faulty assertions
Report
Following on from their 2009 discussion paper, in 2010 the European Commission published a Communication on changes to the 1995 European Union Directive on data protection. The European Union’s 1995 Directive on data protection is a leading regional instrument for privacy and is often the model for
Report
This report has been prepared by Privacy International following a six-month investigation into the privacy practices of key Internet based companies. The ranking lists the best and the worst performers both in Web 1.0 and Web 2.0 across the full spectrum of search, email, e-commerce and social
Report
This report has been prepared by Privacy International following a six-month investigation into the privacy practices of key Internet based companies. The ranking lists the best and the worst performers both in Web 1.0 and Web 2.0 across the full spectrum of search, email, e-commerce and social
Long Read
On June 22-23 2006 the New York Times ran a story uncovering an international financial surveillance programme run by the Bush Administration. In essence the Bush Administration is getting access to international transfer data and storing this in databases at the Treasury Department and/or CIA for
Report
Race relations across European states are usually far from ideal. However in law, European countries appear to grant Europeans ideal protections against discrimination. There are mounting tensions with ethnic and minority communities in countless European countries, with particular suspicion and
Report
Race relations across European states are usually far from ideal. However in law, European countries appear to grant Europeans ideal protections against discrimination. There are mounting tensions with ethnic and minority communities in countless European countries, with particular suspicion and
Report
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial
Report
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial
Report
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies
Report
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies
Report
Proposals for identity (ID) cards have provoked public outrage and political division in several countries. In this paper Simon Davies analyses the key elements of public opposition to ID Card schemes, and profiles the massive 1987 Australian campaign against a national ID card.