PI has tracked SIM card registration laws and their impact from 2002 to present day. Such a requirement allows the state to identify the owner of a SIM card and infer who is most likely making a call ...
Driven by the need to never again allow organised mass murder of the type inflicted during the Second World War, the European Union has brought its citizens unprecedented levels of peace underpinned ...
New technologies continue to present great risks and opportunities for humanitarian action. To ensure that their use does not result in any harm, humanitarian organisations must develop and implement ...
The Kenyan High Court ruled in January 2020 that the Kenyan ID system should not continue without further legislation to guarantee the security of biometric data and to ensure the system is not ...
Stardust is a New York-based astrology-themed period tracking app that has recently risen in popularity, having received a spike in downloads in the U.S. following ...
Privacy International has joined a global coalition of privacy campaigners, tech companies, and technology experts to respond to proposals by British intelligence ...
The first half of 2018 saw two major privacy moments: in March, the Facebook/ Cambridge Analytica scandal broke, followed in May by the EU General Data Protection Regulation ("GDPR") taking effect.
The global counter-terrorism agenda is driven by a group of powerful governments and industry with a vested political and economic interest in pushing for security solutions that increasingly rely on ...
The proliferation of both surveillance technologies and companies that develop or use them have provided governments with a plethora of opportunities to secretly collaborate with private actors and ...
Image Source: "Voting Key" by CreditDebitPro is licensed under CC BY 2.0 Democratic society is under threat from a range of players exploiting our data in ways which are often hidden and unaccountable ...
Gig economy jobs that depend on mobile applications allow workers’ movements to be monitored, evaluated, and exploited by their employers. The so-called “gig economy” has brought to light employers’ ...
When you buy a brand new lower cost phone (like a Tecno Y2 or MYA 2 for example), it's likely to come pre-installed with insecure apps and an outdated operating system. What this means is that your or ...