Privacy International presents how the use of social media monitoring by governments and companies is an increasingly prevalent one, and as this article explores ...
On 13 March 2025, we filed a complaint against the UK government challenging their use of dangerous, disproportionate and intrusive surveillance powers to undermine the privacy and security of people ...
Just want to get started? Scroll down to view the list of guides! Imagine an ordinary day online: in the morning you check your e-mail and scroll through your favourite sites to learn about the latest ...
This guide was designed for our partners across the world who want to see strong data protection laws in their countries. We identify some key points that they can use in their advocacy. This version ...
We all generate vast amounts of data using our mobile phones. Surprisingly, the data created and collected by the apps we use such as Uber, Facebook, Slack and Alexa, is not stored on our phones, but ...
A new generation of technology has given local law enforcement officers in some parts of the US unprecedented power to peer into the lives of citizens. The police department of Frenso California uses ...
Find the answers to all the questions you have regarding the UK's secret Technical Capability Notice (TCN) powers, Apple, and our fight against them. The UK government has used its surveillance to ...
We fight for a world where technology will empower and enable us, not exploit our data for profit and power. This means providing people with ways to take concrete action to protect themselves or ...
Privacy International ("PI") strongly believes that you have the right to control the use of your personal information, and that your privacy must be respected. We ...
TRUSTEE/Treasurer Amanda is a Fellow of the Institute of Chartered Accountants in England and Wales (ICAEW), and has held financial leadership roles in the public, private and charity sectors. Amanda ...
Protecting your account starts with the settings of your Telegram account to tighten your privacy and limit risks. This guide addresses profile visibility, two step verification and account deletion.
当前正在显示可能无法访问的结果。
隐藏无法访问的结果