Search
Content type: Examples
The lower house of the French parliament paved the way for the launch of the government's independently-developed contact tracing app. The minister in charge, technology minister Cedric O, praised the app, developed by companies such as Orange and Dassault Systemes, as a French project "with the excellence but also the panache and some would say the stubbornness which characterises our country". O added that although 22 other countries have opted to use the Google/Apple platform, it was not a…
Content type: Examples
South Korea's second spike in coronavirus cases was curbed via a contact tracing regime that uses credit card records, mobile phone tracking, and GPS location data in order to track the previous movements of infected individuals working alongside efficient diagnostic testing. Successfully tracing an outbreak in Itaewon to a gay barhopper, however, led to reports of homophobic abuse targeted at the South Korean LGBTQIA community, and online criticism has led some who should be self-isolating to…
Content type: Examples
Contact tracing apps will only work effectively if people trust them and install them in sufficient numbers. Soon after its launch, however, the North Dakota contact tracing app people were already dropping it after posting complaints in the Google App store. In a survey of 798 Americans, researchers at Microsoft Research, Johns Hopkins University, and the University of Zurich found that nearly half said they would not install a COVID-19 contact tracing app that has false negatives or could…
Content type: Examples
On the day South Korea relaxed its social distancing measures, a 29-year-old man tested positive for COVID-19. The previous weekend, he had visited five nightclubs in the gay district of Itweon in Seoul, mingling with around 7,200 other people. After nearly 80 new COVID-19 cases have been linked to that one man's outing, the mayor ordered all clubs and bars closed indefinitely, and led officials to push back reopening schools by a week. Soon aftewards, another infected man was found to have…
Content type: Examples
The best contact tracers in US history were a group of mid-20th century venereal disease investigators working for a programme at the Centers for Disease Control and Prevention whose strategy eventually led to the eradication of smallpox in the 1970s. Talking to infected people and tracking down their vague descriptions of contacts at a time when VD was a source of shame was challenging; recruits were required to have a college degree, preferably in liberal arts, and a varied background of work…
Content type: Examples
Local health authorities in Germany have relied on human contact tracers since the country confirmed its first COVID-19 cases early in 2020, and say that doing so has helped the country keep its death rate comparatively low even with a less restrictive lockdown than many other countries. Germany aims to have 16,000 contract tracers overall, or five for every 25,000 people. Tracing involves phoning each newly-diagnosed patient and asking their movements; those who have been in close contact for…
Content type: Examples
NHS Digital has added facial recognition to its app, which allows people to order prescriptions, book appointments, and find health care data, in hopes it will also be usable as an "immunity passport" once at-home testing becomes available. The NHS facial recognition system was built by iProov, and is available in England for both Android and iOS devices; users enroll by submitting a photo of themselves from an official document such as a passport or driving licence and then using the phone to…
Content type: Examples
Estonia has begun testing its Immuunsuspass app, which was developed for the Back to Work NGO by the Estonian technology firms Transferwise and Guardtime working with health specialists. The app, which is intended to help schools and employers make decisions, will have to pass scientific consensus before being approved for use. It allows users to access COVID-19 test results for an hour after proving their identity, and issues them with a QR code valid for one minute that they can use to show…
Content type: Examples
Numerous companies are repurposing their body monitors, asset trackers, and electronic ankle monitors and marketing them to the newly-created market for strap-on surveillance bracelets to enforce quarantine and social distancing including companies such as AiRISTA Flow. Redpoint Positioning Corporation, Israel-based SuperCom.
https://theintercept.com/2020/05/25/coronavirus-tracking-bracelets-monitors-surveillance-supercom/
Writer: Sam Biddle
Publication: The Intercept
Content type: Examples
Latvia became one of the first countries to use Apple's and Google's new joint toolkit to launch a smartphone contact tracing app, Apturi Covid. For now, the app will only work for Latvia's 2 million citizens, but the intention is that it should interoperate with the apps other countries to aid travellers.
https://www.euractiv.com/section/digital/short_news/latvia-to-launch-google-apple-friendly-coronavirus-contact-tracing-app/
Writer: Reuters
Publication: Euractiv
Content type: Examples
An Ipsos MORI survey conducted on May 20-22 found generally high levels of compliance with lockdown restrictions, though many were suffering. While roughly three-quarters were confident they could download and operate a contact tracing app and would be willing to comply with its recommendations, only 40% were confident or fairly confident that they could trust the government to protect their and other people's data, and only 42% were confident or fairly confident that the app could help limit…
Content type: Case Study
Students around the world are quickly turning into training-data for intrusive facial recognition technology. In Sweden, the national Data Protection Authority (DPA) ruled that students at Anderstorp High School in Skellefteå had their right to privacy violated by the testing of facial recognition software to take attendance.
The Skellefteå school board invited a private company, Tieto, to install facial recognition cameras across classrooms that would automatically register students’ class…
Content type: News & Analysis
Traduction réalisée par Nadine Blum.
Le 29 mai, le Congrès nigérien a voté une loi permettant au gouvernement d’intercepter largement certaines communications électroniques. La loi rend légale l’interception de communications, autorisée par le gouvernement, sans protections appropriées ni mécanismes de contrôle.
La loi a été adoptée avec 104 votes pour – le Parlement nigérien compte 171 membres – et sans la participation de l’opposition qui a boycotté la loi. L’opposition a affirmé…
Content type: Long Read
1. What are the barriers to access safe and legal abortion care?
The Indian state’s approach to reproductive rights historically has focused on population control rather than enhancing individual autonomy and removing structural barriers to reproductive health services, which is reflected in the barriers to provision of services. As a consequence of the early adoption of family planning and population control measures in the 1950s, India was one of the first countries to legislate on abortion…
Content type: Video
Given everything that's happening at the moment around the world, we've decided to postpone our episode on ID in Kenya until next week.
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Some of the resources we mentioned in the episode can be found here:
ACLU: know your rights: https://www.aclu.org/know-your-rights/protesters-…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
In Kenya, access to abortion care is restricted by the Constitution, which provides that: “…
Content type: News & Analysis
Humanitarian organisations are defined by their commitment to core, apolitical principles, including: humanity, impartiality, neutrality, independence and to “do no harm”.
And yet the ways data and technology are being used in the world today are often far from being apolitical, humane, impartial, neutral and independent, and in many instances many actors are using technology to exploit people, failing to protect and empower many individuals and communities - in particular those most in need…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Even though abortion is legal in certain cases in Argentina, different types of barriers restrict the access to legal abortions, contribute…
Content type: Long Read
This research was produced by Paz Peña as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights. Reproductive Rights and Privacy Project. Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion?
According to figures from the Ministry of Health, more than 33 thousand clandestine abortions are…
Content type: News & Analysis
On 29 May, Niger’s Congress voted on a law allowing for broad interception powers of certain electronic communications by the government. The bill makes it lawful for the government to approve the interception of communications without appropriate safeguards or oversight mechanisms.
The law passed with 104 votes – the Nigerien parliament has 171 members – without the participation of the opposition that boycotted the law. The opposition claimed that
the law will allow those, for…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Legal barriers
To identify the barriers experienced by women to access safe and legal abortion care, we have to understand the legal picture…
Content type: Advocacy
Last week, Privacy International joined more than 30 UK charities in a letter addressed to the British Prime Minister Boris Johnson, following his recent declaration, asking him to lift No Recourse to Public Funds (NRPF) restrictions.
Since 2012, a ‘NRPF condition’ has been imposed on all migrants granted the legal right to live and work in the UK. They are required to pay taxes, but they are not permitted to access the public safety net funded by those taxes.
This is not a topic we are known…
Content type: News & Analysis
As countries around the world develop contact tracing apps to contain the spread of Coronavirus, they keep facing a problem: for them to be effective a certain percentage of the population has to download them. Something like 60% is the threshold for the app to be effective. So far only Iceland has gotten close with 38% of their country downloading it.
The UK is currently trialling an app, which is designed to notify people if they've been close to someone with symptoms of covid-19 for 15…
Content type: Frequently Asked Questions
The right to access your personal data (or access right) is just one of a number of data rights that may be found in data protection law, including the European Union's General Data Protection Regulation. Data Subject Access Requests, or DSARs, have helped us several times understand the extent of data companies and governments might hold on us, how this data might be shared among various recipients, or what other third parties a company might be using to obtain additional data and enrich their…
Content type: Case Study
In the UK, asylum seekers cannot claim benefits. Some of them are entitled to an ASPEN card, a pre-paid payment card that allocates them a weekly sum of money. Most of them are allowed to use it the way we would use any debit card. But people, whose applications have been refused but who cannot return to their countries, aren’t allowed to withdraw cash. That means that every single payment they make can be monitored by the Home Office.
Evidence has started emerging that this monitoring has led…
Content type: Case Study
As working from home is becoming the new normal, employees’ monitoring becomes the new norm.
Companies around the globe are increasingly using software to monitor how long we spend in front of our computer, what websites we visit and what apps we use, when we type, for how long and how fast, how long our mouse stay inactive — any more than 15 seconds away can shift us from ‘active’ to ‘idle’ — and require us to keep our camera and microphone on at all times. These systems pit us against our…
Content type: Video
A quick catch-up on the state of play of apps round the world - though we end up mostly discussing India and the UK - and we celebrate a very special birthday.
You can find a much deeper and more detailed look at the various questions and concerns around coronavirus apps on our website: https://privacyinternational.org/long-read/3792/covid-contact-tracing-apps-are-complicated-mess-what-you-need-know and all the latest news in our tracker https://privacyinternational.org/examples/tracking-…
Content type: Long Read
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a ‘Child in Need’ assessment.
This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…