Search
Content type: News & Analysis
29th October 2015
Photo: Flickr/Elvert Barnes. Some rights reserved.
In the wider civil society space, the opportunities for travel come thick and fast. From the multi-stakeholder perspective, the Internet Governance Forum will be held during November in João Pessoa, Brazil. There is the Stockholm Internet Forum in, naturally, Stockholm. In freedom of expression there is the International Freedom of Expression Exchange Strategy Conference in Trinidad & Tobago, while End Violence Against Women International'…
Content type: Long Read
21st June 2018
Update 28 June 2018
Last week Privacy International wrote to Thomson Reuters Corporation asking the company to commit to ensuring the vast amounts of data they provide to US immigration agencies isn’t used to identify families for indefinite detention or separation, or for other human rights abuses.
Thomson Reuters has unfortunately ignored our specific questions and made no such commitment.
Instead, the CEO Thomson Reuters Special Services (TRSS) a subsidiary, makes clear that instead of…
Content type: Frequently Asked Questions
27th October 2020
On 27 October 2020, the UK Information Commissioner's Office (ICO) issued a report into three credit reference agencies (CRAs) - Experian, Equifax and TransUnion - which also operate as data brokers for direct marketing purposes.
After our initial reaction, below we answer some of the main questions regarding this report.
Content type: News & Analysis
1st August 2016
Privacy can be seen as a reflex of innovation. One of the seminal pieces on the right to privacy as the 'right to be let alone emerged in response to the camera and its use by the tabloid media. Seminal jurisprudence is in response to new surveillance innovations... though often with significant delays.
While one approach would be to say that privacy is a norm and that with modern technologies the norm must be reconsidered and if necessary, abandoned; I think there’s an interesting idea around…
Content type: Long Read
13th November 2019
Miguel Morachimo, Executive Director of Hiperderecho. Hiperderecho is a non-profit Peruvian organisation dedicated to facilitating public understanding and promoting respect for rights and freedoms in digital environments.
The original version of this article was published in Spanish on Hiperderecho's website.
Where does our feeling of insecurity come from? As we walk around our cities, we are being observed by security cameras most of the time. Our daily movement, call logs, and internet…
Content type: Press release
15th December 2017
A new investigation published today by Privacy International reveals the role of an American data-based digital advertising company in the highly divisive online re-election campaign of Kenyan president Uhuru Kenyatta.
In the run-up to Kenya's presidential election in August 2017, paid advertisements for two mysterious sites dominated Google searches for election-related terms and flooded Kenyans' social media feeds. All linked back to either 'The Real Raila', a virulent attack campaign…
Content type: Press release
21st June 2018
Privacy International (PI) has today sent an open letter to the President of Thomson Reuters Corporation asking whether he will commit to ensuring the multinational company’s products or services are not used to enforce cruel, arbitrary, and disproportionate measures, including those currently being implemented by US immigration authorities.
Documentation shows that Thomson Reuters Corporation is selling access to highly sensitive and personal data to the US Immigration and Customs Enforcement…
Content type: News & Analysis
26th October 2012
Today, travelling within many cities around the world comes at a cost: privacy.
Electronic ticketing systems are proliferating, but it’s not clear how much information they collect or what they do with it. Privacy International has written to 48 transport authorities and companies operating transport services across the world requesting this data.
The kinds of personal information held about users of London’s Oyster card (which is used to travel by tube, train and bus) include full name,…
Content type: Long Read
17th July 2019
By Valentina Pavel, PI Mozilla-Ford Fellow, 2018-2019
Our digital environment is changing, fast. Nobody knows exactly what it’ll look like in five to ten years’ time, but we know that how we produce and share our data will change where we end up. We have to decide how to protect, enhance, and preserve our rights in a world where technology is everywhere and data is generated by every action. Key battles will be fought over who can access our data and how they may use it. It’s time to take…
Content type: Long Read
16th January 2018
The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. Below we outline 10 ways in which this exploitation and…
Content type: Long Read
13th March 2018
To mark International Women’s Day 2018, Privacy International and some of our partner organisations - Datos Protegidos, Derechos Digitales, the National Coalition for Human Rights Defenders-Kenya, the Karisma Foundation, and the Foundation for Media Alternatives – are telling the stories of women across the world as told by their data over the next seven days (for us, it’s International Women’s Week!).
Gender inequality has many complex dimensions and data exploitation is yet another. While…
Content type: News & Analysis
15th March 2017
On a hot day in Nairobi, our researcher is speaking to an officer of Kenya’s National Intelligence Service (NIS). The afternoon is wearing on and the conversation has turned to the presidential elections, taking place in August this year. He has just finished describing the NIS’ highly secret surveillance powers and the disturbing ways in which these powers are deployed.
“It is what you might call ‘acceptable deaths,’” he states about the misuse of communications surveillance powers. “People…
Content type: News & Analysis
6th June 2016
When it comes to tackling corruption, we need to critically engage with the role of technology. One technology in particular is biometrics, a technology that identifies and stores on a database the identity of an individual through some physical characteristic, usually fingerprints or an iris scan. Biometrics is increasingly being used in ID and voter registration schemes. It is a technology that raises privacy and data protection issues but notwithstanding these problems, does it actually…
Content type: News & Analysis
10th November 2014
Since the European Court of Justice in May ruled in the “right to be forgotten” case, there has been a dizzying amount of debate about the decision, and its implications for privacy and free expression.
A main thread within these discussions is an old story that US Industry loves to tell and has told for some time: Europeans love privacy law, and Americans love free speech, and the twain shall never meet.
The Google Search case at the European Court of Justice has fuelled this view: Europeans…
Content type: News & Analysis
7th March 2018
Written by the Foundation for Media Alternatives
7:01: Naomi wakes up and gets ready for the day.
7:58: Naomi books an Uber ride to Bonifacio Global City (BGC), where she has a meeting. She pays with her credit card. While Naomi is waiting for her Uber, she googles restaurant options for her dinner meeting in Ortigas.
9:00: While her Uber ride is stuck in traffic on EDSA (a limited access highway circling Manilla), Naomi’s phone automatically connects to the free WiFi offered by the…
Content type: News & Analysis
7th March 2018
Written by the National Coalition for Human Rights Defenders - Kenya and Privacy International
05:00: Mercy’s alarm goes off. She gets out of the warmth of the bed into the piercing morning chill. She switches on the bedside lamp and reaches for her Bible. She then checks in onto her devotional group on Facebook, as she does every morning. Her Facebook app keeps track of her location, and the time she wakes up.
05:24: She steps into the shower and prepares for her day in the office as she…
Content type: News & Analysis
7th March 2018
Written by Derechos Digitales
03:00: Maritza wakes up and gets ready. It’s still dark. She has to go stand in a queue outside the nearest grocery store, where after several hours her fingerprint will be scanned to retrieve her personal information from a governmental database. This will tell the cashier not only her address, full name and phone number, but also if she already bought her allotted ration of food that month. If so, she will be sent back empty-handed. There are drones flying over…
Content type: News & Analysis
7th March 2018
Written by Privacy International
08:27: Jen gets on the London Underground to go to work. She uses her contactless debit card to pay for the tube, so Transport for London knows where she is travelling to and from and her bank knows when she takes the tube.
08:36: The public WiFi on the tube means that even when Jen doesn’t connect to it, her every step inside the underground is tracked. The data will eventually be sold to advertisers.
08:58: Jen arrives at work. As with all the lower rank…
Content type: News & Analysis
13th March 2018
Written by Karisma Foundation
7:03: Catalina leaves her apartment and a security camera follows her down the hall, another one observes her in the elevator while she fixes her hair. As she exits the building, the warden tells her she doesn’t have to fix her hair because she is already pretty as she is. She gets to the parking lot where another two cameras look at her while she gets into her car.
8:00: She is heading to an open data workshop organized by the Colombian government in a hotel in…
Content type: News & Analysis
7th March 2018
Written by Datos Protegidos
04:16: Carolina can´t sleep. She grabs her mobile from the nightstand next to her bed to check her WhatsApp notifications and read some tweets. She decides to disconnect to and tries to go back to sleep.
07:00: Carolina is woken by her mobile phone alarm. She picks it up and checks her social networks and messages again. To her astonishment, she finds a message in a WhatsApp group from her former college classmate Pablo at 5:25 asking if anyone was still partying…
Content type: News & Analysis
12th March 2018
Written by Privacy International
07:06: Camille’s smart pillow sends a signal to her smartphone that it’s time for her to wake up. She checks the quality of sleep on the app – last night was not great. Because the pillow tracks the motion in her bed, the company knows what else she may (or may not) have been up to. But the company doesn’t just track her when she is in bed. By downloading the app, Camille has also authorised access to her location wherever she goes, her camera, her contact…
Content type: Long Read
15th December 2017
The battle for Kenyan voters’ allegiance in the 2017 Presidential election was fought on social media and the blogosphere. Paid advertisements for two mysterious, anonymous sites in particular started to dominate Google searches for dozens of election-related terms in the months leading up to the vote. All linked back to either “The Real Raila”, a virulent attack campaign against presidential hopeful Raila Odinga, or Uhuru for Us, a site showcasing President Uhuru Kenyatta’s accomplishments. As…