Search
Content type: Long Read
On 1st February 2013 Privacy International, together with the European Centre for Constitutional and Human Rights (ECCHR), the Bahrain Center for Human Rights, Bahrain Watch and Reporters without Borders, filed complaints with the Organisation for Economic Cooperation and Development (OECD) against Gamma International, a company that exports “FinFisher” (or “FinSpy”) intrusive surveillance software, and Trovicor GmbH, a German company (formerly a business unit of Siemens) which also sells…
Content type: Long Read
On 1st February 2013, Privacy International, together with the European Centre for Constitutional and Human Rights (ECCHR), the Bahrain Center for Human Rights, Bahrain Watch and Reporters without Borders, filed complaints with the Organisation for Economic Cooperation and Development (OECD) against Gamma International, a company that exports “FinFisher” (or “FinSpy”) intrusive surveillance software, and Trovicor GmbH, a German company (formerly a business unit of Siemens) which also sells…
Content type: Report
Privacy has truly become an issue of global resonance. A quick glance at policy agendas in countries around the world shows that privacy and surveillance issues are increasingly important. The challenge, however, is improving the ability of governments and policy stakeholders to engage in a policy debate that is informed about the dangers of surveillance and the importance of protecting privacy. This is the primary objective of our Privacy in the Developing World programme.
In this report, we…
Content type: Report
Privacy has truly become an issue of global resonance. A quick glance at policy agendas in countries around the world shows that privacy and surveillance issues are increasingly important. The challenge, however, is improving the ability of governments and policy stakeholders to engage in a policy debate that is informed about the dangers of surveillance and the importance of protecting privacy. This is the primary objective of our Privacy in the Developing World programme.In this report, we…
Content type: Report
This report was submitted to the Joint Committee on Human Rights. Under the current version of the draft Communications Data Bill, records of every person or entity with whom any given individual has communicated electronically would be collected continuously and stored for one year. These records would include the time of the communication and the location from which it originated.
The Communications Data Bill raises a number of concerns with regards to the right to privacy under Article 8…
Content type: Report
This report was submitted to the Joint Committee on Human Rights. Under the current version of the draft Communications Data Bill, records of every person or entity with whom any given individual has communicated electronically would be collected continuously and stored for one year. These records would include the time of the communication and the location from which it originated.
The Communications Data Bill raises a number of concerns with regards to the right to privacy under Article 8 of…
Content type: Report
This report is the result of research conducted by researchers at Privacy International, coordinated by the London School of Economics and Political Science. The report was commissioned by the International Development Research Centre.
New technologies such as mobile phones and electronic medical record (EMR) systems promise to transform the provision and management of medicine all over the world. In the U.S. alone, billions are being spent on information technologies for healthcare.
Content type: Report
Following on from their 2009 discussion paper, in 2010 the European Commission published a Communication on changes to the 1995 European Union Directive on data protection. The European Union’s 1995 Directive on data protection is a leading regional instrument for privacy and is often the model for other countries across the globe. The Directive has been integral to pushing back against key surveillance and tracking initiaitives by governments and industry.In this report we respond to that…
Content type: Report
The US does not have a general overarching privacy law like European Data Directive or the sweeping privacy protections contained in the European declarations of rights. The EU-US accord cites several laws, which it claims, give privacy rights to non-US persons. None of the cited laws offer any real substantive or procedural protections for Europeans. As explained below, the one law – the Privacy Act 5 U.S.C 552a – that could offer some modest protections is tellingly not even mentioned.
But…
Content type: Report
When we think of privacy in the political system we tend to recall historic events
like Watergate, secret files held by governments in war-time, and blacklists. Modern political surveillance is more advanced and sophisticated. In this report we identify some of the modern political surveillance initiatives by governments around the world. We must recognise that all political systems require privacy to function, and devise our policies and build our technologies accordingly.
Content type: Report
New technologies such as mobile phones and electronic medical record (EMR) systems promise to transform the provision and management of medicine all over the world. In the U.S. alone, billions are being spent on information technologies for healthcare.
This eHealth revolution could be a boon for patient privacy if the right protections are built into new health information systems; however there are growing worries that privacy and security are being overlooked by designers rushing to deploy…
Content type: Report
When we think of privacy in the political system we tend to recall historic events like Watergate, secret files held by governments in war-time, and blacklists. Modern political surveillance is more advanced and sophisticated. In this report we identify some of the modern political surveillance initiatives by governments around the world. We must recognise that all political systems require privacy to function, and devise our policies and build our technologies accordingly.
Content type: Report
This is a memo prepared by Barry Steinhardt of Friends of Privacy USA for Members of the European Parliament regarding the proposed EU-US Agreement PNR.
The proposed agreement regarding Passenger Name Records (PNR) between the United States and the European Union is riddled with faulty assertions and assumptions about US law and the actual operations of the US government.
These faulty assertions and assumptions go to the heart of the agreement and undercut the claims of protections for…
Content type: Report
Following on from their 2009 discussion paper, in 2010 the European Commission published a Communication on changes to the 1995 European Union Directive on data protection. The European Union’s 1995 Directive on data protection is a leading regional instrument for privacy and is often the model for other countries across the globe. The Directive has been integral to pushing back against key surveillance and tracking initiaitives by governments and industry.
In this report we respond to that…
Content type: Report
This report has been prepared by Privacy International following a six-month investigation into the privacy practices of key Internet based companies. The ranking lists the best and the worst performers both in Web 1.0 and Web 2.0 across the full spectrum of search, email, e-commerce and social networking sites.
The analysis employs a methodology comprising around twenty core parameters. We rank the major Internet players but we also discuss examples of best and worst privacy practice among…
Content type: Report
This report has been prepared by Privacy International following a six-month investigation into the privacy practices of key Internet based companies. The ranking lists the best and the worst performers both in Web 1.0 and Web 2.0 across the full spectrum of search, email, e-commerce and social networking sites.
The analysis employs a methodology comprising around twenty core parameters. We rank the major Internet players but we also discuss examples of best and worst privacy practice among…
Content type: Long Read
On June 22-23 2006 the New York Times ran a story uncovering an international financial surveillance programme run by the Bush Administration. In essence the Bush Administration is getting access to international transfer data and storing this in databases at the Treasury Department and/or CIA for access to investigate terrorist activity.
There are a number of inconsistencies in the accounts so far:
The U.S. claims that this is a narrowly focused programme that is compliant with the law,…
Content type: Report
Race relations across European states are usually far from ideal. However in law, European countries appear to grant Europeans ideal protections against discrimination. There are mounting tensions with ethnic and minority communities in countless European countries, with particular suspicion and aggression pointed towards the Roma people, Travellers, Northern Africans, Turks, Jehovah’s Witnesses, and people of Islamic and other faiths. Increasingly these groups are finding safe havens behind…
Content type: Report
Race relations across European states are usually far from ideal. However in law, European countries appear to grant Europeans ideal protections against discrimination. There are mounting tensions with ethnic and minority communities in countless European countries, with particular suspicion and aggression pointed towards the Roma people, Travellers, Northern Africans, Turks, Jehovah’s Witnesses, and people of Islamic and other faiths. Increasingly these groups are finding safe havens behind…
Content type: Report
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial recognition, ngerprinting and iris scanning).
The Report provides a specific assessment of the recently published biometrics trial conducted by the UK Passport Service (UKPS), and compares these…
Content type: Report
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial recognition, fingerprinting and iris scanning).
Content type: Report
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning.
Some applications of biometric identification technology are now cost-effective, reliable, and highly accurate. As a result, biometric systems…
Content type: Report
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning.
Some applications of biometric identification technology are now cost-effective, reliable, and highly accurate. As a result, biometric systems are…
Content type: Report
Proposals for identity (ID) cards have provoked public outrage and political division in several countries. In this paper Simon Davies analyses the key elements of public opposition to ID Card schemes, and profiles the massive 1987 Australian campaign against a national ID card.
Content type: Report
Proposals for identity (ID) cards have provoked public outrage and political division in several countries. In this paper Simon Davies analyses the key elements of public opposition to ID Card schemes, and profiles the massive 1987 Australian campaign against a national ID card.
Content type: Report
This report presents a detailed analysis of the international trade in surveillance technology. Its’ primary concern is the ow of sophisticated computer-based technology from developed countries to developing countries – and particularly to non-democratic regimes. It is in this environment where surveillance technologies become technologies of political control.
Surveillance technologies can be de ned as technologies which can monitor, track and assess the movements, activities and…
Content type: Report
The explosion of telecommunications services has improved the ability for human rights groups to disseminate information worldwide. New telephone, facsimile and computer communications have created opportunities for human rights groups to improve organizing and to promote human rights faster and at a lower cost than ever before. However, these new technologies can be monitored by governments and other groups seeking to monitor the activities of human rights advocates. For this reason, human…
Content type: Report
The explosion of telecommunications services has improved the ability for human rights groups to disseminate information worldwide. New telephone, facsimile and computer communications have created opportunities for human rights groups to improve organizing and to promote human rights faster and at a lower cost than ever before. However, these new technologies can be monitored by governments and other groups seeking to monitor the activities of human rights advocates. For this reason, human…