Working from home bolstered the use of remote surveillance software to monitor employees. It's not only tools that are developed specifically for surveillance, traditional productivity suites might ...
AI chatbots are used by people in a variety of ways, including to conduct research, create content and analyses, deliver projects, and engage in conversations. We are concerned these AI tools can pose ...
Companies selling diet programmes are using tests to lure users. Those tests encourage users to share sensitive personal data, including about their physical and mental health. But what happens to the ...
A case study illustrating the use and looming dangers of collection and use of biometrics in the name of counter-terrorism. In Israel/Palestine, the Israeli government has been deploying biometrics, ...
Discord’s decision to pause its rollout of age verification emphasises what privacy advocates have been long-saying about the technology: it creates a honeypot with no guarantees for users that the ...
Electronic tags have been a key part of criminal justice for many years throughout the world. As traditional radio-frequency tags are replaced by GPS ankle tags, we examine how these different ...
With more and more connected devices around us, the chance that you've been hit by an update notification is high. But what do these software updates do? How do they actually work, and why are they ...
PI presents its analysis of the Huduma Numba judgment in three parts: the clear wins, the parts that make some small steps forward but could have been better and the dissapointing losses. Kenya High ...
The GDPR came into effect on 25 May 2018, and reformed and replaced data protection law across Europe. Before the GDPR, data protection in the EU was governed by the 1995 Data Protection Directive, ...
The ‘Digital stop and search’ report examines the use of ‘mobile phone extraction’ tools by the UK police, enabling them to download all of the content and ...
An IP address, which is used to direct communication between devices, can be linked to someone’s physical identity, in particular when combined with information held by an internet service provider.
Driven by the need to never again allow organised mass murder of the type inflicted during the Second World War, the European Union has brought its citizens unprecedented levels of peace underpinned ...