Algorithmic management of workers has become the norm for gig-economy platforms, with workers obligated to give up an immense ...
Intrusive surveillance technology is increasingly used during protests around the world, and we’ve been tracking its use ...
Intrusive surveillance technology is increasingly used to prosecute activists, protesters and human rights defenders. The concept of privacy is essential for Indigenous peoples to exercise their right ...
Serhat is a Legal Officer at Privacy International. His work primarily relates to countering authoritarianism and surveillance at borders, the militarization of ...
To allow workers to more deeply understand the impact on those affected by algorithms, companies should make some version of their algorithm available for testing. This could be done by providing API ...
The European Data Protection Board (EDPB) is preparing an opinion on AI models, following a request from the Irish Data Protection Commission. This opinion is expected to cover how personal data is ...
In this new briefing, we identify the most significant concerns on the UN Countering Terrorist Travel Programme (CTTP), and put forward a range of recommendations to mitigate some of the human rights ...
Some browser add-ons help you to automatically fill out consent pop-ups while you browse the internet. In this guide, you'll learn how to install one such add-on and how to configure it according to ...
Gus has worked at the intersection of technology and human rights for over twenty-five years. He developed national, regional, and global campaigns on communications privacy. He worked on national ...
Just want to get started? Scroll down to view the list of guides! Imagine an ordinary day online: in the morning you check your e-mail and scroll through your favourite sites to learn about the latest ...
This week we're talking to Peter Bloom from Rhizomatica and LÅ©a Cruz from IDEC about internet connectivity, what drives social media companies to expand into internet provision, and what an earth is ...