New technologies continue to present great risks and opportunities for humanitarian action. To ensure that their use does not result in any harm, humanitarian organisations must develop and implement ...
PI has tracked SIM card registration laws and their impact from 2002 to present day. Such a requirement allows the state to identify the owner of a SIM card and infer who is most likely making a call ...
Driven by the need to never again allow organised mass murder of the type inflicted during the Second World War, the European Union has brought its citizens unprecedented levels of peace underpinned ...
The Kenyan High Court ruled in January 2020 that the Kenyan ID system should not continue without further legislation to guarantee the security of biometric data and to ensure the system is not ...
Stardust is a New York-based astrology-themed period tracking app that has recently risen in popularity, having received a spike in downloads in the U.S. following ...
Privacy International has joined a global coalition of privacy campaigners, tech companies, and technology experts to respond to proposals by British intelligence ...
The global counter-terrorism agenda is driven by a group of powerful governments and industry with a vested political and economic interest in pushing for security solutions that increasingly rely on ...
The proliferation of both surveillance technologies and companies that develop or use them have provided governments with a plethora of opportunities to secretly collaborate with private actors and ...
Gig economy jobs that depend on mobile applications allow workers’ movements to be monitored, evaluated, and exploited by their employers. The so-called “gig economy” has brought to light employers’ ...
Image Source: "Voting Key" by CreditDebitPro is licensed under CC BY 2.0 Democratic society is under threat from a range of players exploiting our data in ways which are often hidden and unaccountable ...
When you buy a brand new lower cost phone (like a Tecno Y2 or MYA 2 for example), it's likely to come pre-installed with insecure apps and an outdated operating system. What this means is that your or ...
In today's opinion the Advocate General of the CJEU advises that the UK’s collection of bulk communications data violates EU law and that the French and Belgium data retention schemes also violate EU ...