Algorithmic management of workers has become the norm for gig-economy platforms, with workers obligated to give up an immense ...
Princeton University's WebTap - Web Transparency and Accountability - project conducts a monthly automated census of 1 million websites to measure tracking and privacy. The census detects and measures ...
Intrusive surveillance technology is increasingly used during protests around the world, and we’ve been tracking its use ...
Privacy International has been investigating the proliferation of data tracking, brokerage and exchange between many tech companies, both as their primary business as ...
We fight for a world where technology will empower and enable us, not exploit our data for profit and power. This means providing people with ways to take concrete action to protect themselves or ...
Although digital and data technologies are becoming more and more ubiquitous and influential in our daily lives, people’s knowledge about how these technologies work and how they affect their lives is ...
Privacy International ("PI") strongly believes that you have the right to control the use of your personal information, and that your privacy must be respected. We ...
Privacy International partnered with the International Human Rights Clinic at Harvard Law School to guide the reader through a simple presentation of the legal ...
We are building a global movement. We are supporting civil society partners in countries across the world, who constitute our international network of privacy advocates and researchers. Together we ...
This guide was designed for our partners across the world who want to see strong data protection laws in their countries. We identify some key points that they can use in their advocacy. This version ...
Privacy International presents how the use of social media monitoring by governments and companies is an increasingly prevalent one, and as this article explores ...
A growing number of governments around the world are embracing hacking to facilitate their surveillance activities. But many deploy this capability in secret and without a clear basis in law.In the ...