Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Impact Search
Our impact in the world
Content type:
Examples
Acxiom sets up site to allow individuals to see their data
26th October 2018
Content type:
Examples
Facebook ends advertising relationship with Acxiom
26th October 2018
Content type:
Examples
Acxiom shares data with marketing intelligence company Valassis
26th October 2018
Content type:
Examples
Acxiom builds links across channels, devices, and applications
26th October 2018
Content type:
Examples
Acxiom hack exposes 1.6 billion customer records
26th October 2018
Content type:
Examples
Acxiom data intercepted by hacker
26th October 2018
Content type:
Examples
Google Plus vulnerability exposed 500,000 users' data
9th October 2018
Content type:
Examples
Apple pulls Facebook-owned VPN app for allowing Facebook to analyse user data
1st October 2018
Content type:
Examples
30 million Facebook users' accounts breached
1st October 2018
Content type:
Explainer
Competition and Data
26th September 2018
Content type:
Examples
HIV Positive people dropping out of treatment programmes because they fear Aadhaar data leaks
26th September 2018
Content type:
Examples
A data leak on a utility company website made details of every Aadhaar holder available
26th September 2018
Content type:
Examples
Large telco secretly opens bank accounts using Aadhaar-linked eKYC
26th September 2018
Content type:
Examples
Access to the details of 1 billion entries of the Aadhaar database available for only 500 rupees
26th September 2018
Content type:
Examples
Widely-available software patch enables the creation of new people on the Aadhaar database
26th September 2018
Content type:
Explainer graphic
Understanding the Difference between Cyber Security and Cyber Crime
1st October 2018
Content type:
Explainer graphic
Understanding the Difference between Cyber Security and Cyber Crime
1st October 2018
Content type:
Report
Data Protection Guide (Complete Guide in full)
5th September 2018
Content type:
Video
A Guide for Policy Engagement Video
5th September 2018
Content type:
Examples
Moveon experiments with low-cost digital persuasion
14th April 2019
Content type:
Examples
Facebook boasts of 2015 Tory party electoral success
14th April 2019
Content type:
Examples
Le Pen bank loan demonstrates Russian methods of spreading influence
14th April 2019
Content type:
Examples
Fakery and the internet
14th April 2019
Content type:
Examples
LinkedIn founder linked to groups using political manipulation
14th April 2019
Content type:
Examples
FinCEN Russian backchannel compromises agency effectiveness
14th April 2019
Content type:
Examples
Indian political party uses subsidized phones to target voters
14th April 2019
Content type:
Examples
US Senate reports find social media is a threat to democracy
14th April 2019
Content type:
Examples
Italian election study finds social media helps populist politicians
14th April 2019
Content type:
Examples
Facebook political transparency rules block charities and small businesses
14th April 2019
Content type:
Examples
Hackers surveil National Republican Congressional Committee during 2018 midterm election campaign
14th April 2019
Pagination
First page
« First
Previous page
‹‹
…
Page
36
Page
37
Page
38
Page
39
Current page
40
Page
41
Page
42
Page
43
Page
44
…
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join