Search
Content type: News & Analysis
The relationship between privacy and access to abortion care
In 1973, in the state of Texas, it was a criminal offence to “procure or attempt” an abortion except if the purpose was “saving the life of the mother.” This law was enacted in 1854 by the Texas state legislature, and was part of a wave of provisions criminalising access to abortion care that was gaining ground across the U.S in the mid-1800s. It is worth highlighting that these laws were being passed at a time when women in the U.S…
Content type: Examples
A new requirement to wear wear masks in public in order to curb the spread of the coronavirus poses a problem in France and Belgium, where laws prohibit wearing face coverings, with health as the only allowed exception.
In France, where the law was passed in 2010, between 2011 and 2017 1,830 Muslim women were fined for wearing veils and 145 were warned. The law does not state how to distinguish when face coverings are worn for health reasons rather than religious belief.
This leaves…
Content type: Examples
Domestic abuse campaigners and victims have accused the government of not valuing the lives of migrant women in forthcoming legislation on the issue.They are urging the government to make “life-saving” changes to the domestic abuse bill, which will be debated for its final stage in parliament on Monday.
A spokesperson for the Home Office called the bill “a game-changing piece of legislation that will transform how we deal with this horrific crime”, adding that the government had announced £76m…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Even though abortion is legal in certain cases in Argentina, different types of barriers restrict the access to legal abortions, contribute…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Legal barriers
To identify the barriers experienced by women to access safe and legal abortion care, we have to understand the legal picture…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
Content type: Examples
US campaigners supported by the Catholic church are promoting the app Femm, which collects sensitive data about women's sexual lives and aim to scare women from using hormonal birth control, in rural Nigeria. Femm received a $100,000 from the Papal Foundation to promote their app.
https://www.theguardian.com/society/2019/jul/15/femm-menstruation-tracking-app-nigeria-anti-pill-campaignersus-
Author: Jessica Glenza
Publication: The Guardian
Content type: Examples
Following pressure from civil society and pro-abortion groups, Facebook announced on May 8th 208 a ban on foreign ads related to the Irish referendum on abortion. Facebook said they were being consistent with Irish electoral law.
https://www.irishtimes.com/business/technology/facebook-bans-foreign-ads-for-eighth-amendment-referendum-1.3487895
Author: Ciara O'Brien
Publication: Irish Times
Content type: Examples
Una Mullally writes about the online campaign led by the anti-abortion groups Protect the 8th and Undecided8 and their targeting of undecided voters in Ireland. She spoke to Facebook about their role in the spreading of those campaign and to campaigner Gavin Sheridan, who has demanded transparency to control the role of big tech platforms in democratic processes in Ireland.
https://www.irishtimes.com/opinion/the-poisonous-online-campaign-to-defeat-the-abortion-referendum-1.3486236
Author: Una…
Content type: Examples
In this piece Gavin Sheridan, transparency campaigner and CEO of legal intelligence company Vizlegal, argues for the need for a regulatory oversight to control the impact big tech companies and force them to be more transparent.
https://www.theguardian.com/commentisfree/2018/may/13/ireland-abortion-mark-zuckerberg-referendum
Author: Gavin Sheridan
Publication: The Guardian
Content type: Examples
Le Monde exposed anti-IVG (anti-abortion) advertising on Facebook as part of a borader campaign led by anti-abortion website IVG.net. The advertisement relied on stock photos and fake testimonies posted in public Facebook groups and promoted to young women. Most of the posts attempt to promote the idea that abortion leads to mental health issues, a fact that has been proved to be falacious.
https://www.lemonde.fr/les-decodeurs/article/2018/07/11/les-anti-ivg-ciblent-les-jeunes-femmes-grace-aux…
Content type: Examples
Absher, an online platform and mobile phone app created by the Saudi Arabian government, can allow men to restrict women’s ability to travel, live in Saudi Arabia, or access government services. This app, which is available in the Google and Apple app stores, supports and enables the discriminatory male guardianship system in Saudi Arabia and violations of womens’ rights, including the right to leave and return to one’s own country. Because women in Saudi Arabia are required to have a male…
Content type: Explainer
What is SOCMINT?
Social media intelligence (SOCMINT) refers to the techniques and technologies that allow companies or governments to monitor social media networking sites (SNSs), such as Facebook or Twitter.
SOCMINT includes monitoring of content, such as messages or images posted, and other data, which is generated when someone uses a social media networking site. This information involves person-to-person, person-to-group, group-to-group, and includes interactions that are private and…
Content type: Case Study
Our connected devices carry and communicate vast amounts of personal information, both visible and invisible.
What three things would you grab if your house was on fire? It’s a sure bet your mobile is going to rank pretty high. It’s our identity, saying more about us than we perhaps realise. It contains our photos, calendar, internet browsing, locations of where we go, where we’ve been, our emails, social media. It holds our online banking, notes with half written poems, shopping lists, shows…