Search
Content type: Examples
In February, before the pandemic was declared, the Myanmar Post and Telecommunications Department set a deadline of April 30 for citizens to register their mobile phone SIMs, a move the PTD said was necessary to enhance the security of electronic transactions and cut down crime.
The PTD issued an official reminder on April 16, and confirmed on April 29 that other than websites and applications for registration operators would be required to block calls and data for unregistered users on the…
Content type: Long Read
Commercial interests seem to often overshadow the EU’s stance as a global privacy leader. After looking at Europes's shady funds to border forces in the Sahel area, Niger's new biometric voting system, and attempts to dismantle smugglers networks powered by Europe's gifts of surveillance, freelance journalist Giacomo Zandonini looks at the battle for data protection and digital rights in the continent.
What do a teenage labourer on a marijuana farm in Lesotho, a…
Content type: News & Analysis
Updated January 18th 2021
The Government of Myanmar is pushing ahead with plans to require anyone buying a mobile SIM card to be fingerprinted and hand over their ID cards, according to procurement documents circulated to prospective bidders.
The plans are a serious threat to privacy in a country lacking any data protection or surveillance laws and where minorities are systematically persecuted, and must be scrapped.
According to technical requirements developed by Myanmar’s Post and…
Content type: Long Read
Miguel Morachimo, Executive Director of Hiperderecho. Hiperderecho is a non-profit Peruvian organisation dedicated to facilitating public understanding and promoting respect for rights and freedoms in digital environments.
The original version of this article was published in Spanish on Hiperderecho's website.
Where does our feeling of insecurity come from? As we walk around our cities, we are being observed by security cameras most of the time. Our daily movement, call logs, and internet…
Content type: Long Read
Image credit: Emil Sjöblom [ShareAlike 2.0 Generic (CC BY-SA 2.0)]
Prepaid SIM card use and mandatory SIM card registration laws are especially widespread in countries in Africa: these two factors can allow for a more pervasive system of mass surveillance of people who can access prepaid SIM cards, as well as exclusion from important civic spaces, social networks, and education and health care for people who cannot.
Mandatory SIM card registration laws require that people provide personal…
Content type: Long Read
IMAGE SOURCE: "My Phone Bought This" by oliver t is licensed under CC BY-NC-ND 4.0.
LAST UPDATE: 16th May 2022.
Mandatory SIM card registration laws require people to provide personal information, including a valid ID or even their biometrics, as a condition for purchasing or activating a SIM card. Such a requirement allows the state to identify the owner of a SIM card and infer who is most likely making a call or sending a message at any given time.
SIM card…
Content type: Explainer
Photo credit: warrenski
Mandatory SIM card registration eradicates the potential for anonymity of communications, enables location-tracking, and simplifies communications surveillance and interception. By facilitating the creation of an extensive database of user information, it places individuals at risk of being tracked or targeted, and having their private information misused. In the absence of comprehensive data protection legislation and judicial oversight, SIM users' information can be…
Content type: Advocacy
Este informe es presentado por Derechos Digitales, Ciudadano Inteligente, Fundación ProAcceso y Privacy International. Derechos Digitales es una organización no gubernamental de defensa, promoción y desarrollo de los derechos humanos en el entorno digital. Ciudadano Inteligente es una organización dedicada a fortalecer la democracia y reducir la desigualdad a través de la transparencia y la participación ciudadana. Fundación ProAcceso se dedica a la defensa del derecho de acceso a la…
Content type: Long Read
Image attribution: By Legaleagle86 at en.wikipedia, CC BY-SA 3.0.
In a long-anticipated judgment, the Indian Supreme Court has ruled that India's controversial identification system Aadhaar is Constitutional. They based their conclusion on notes that there are sufficient measures in place to protect data, and that it is difficult to undertake surveillance of citizens on the basis of Aadhaar.
But there is some good in this ruling. The court has demanded that the Government introduce…
Content type: Examples
In December 2017, it was revealed that the large telco Bharti Airtel made use of Aadhaar-linked eKYC (electronic Know Your Customer) to open bank accounts for their customers without their knowledge or consent. eKYC is a way of using data in the UIDAI database as part of the verification process, which Airtel made use of for the issuing of SIM cards, and also secretly opened bank accounts with their Airtel Payments Bank. More than 2 million accounts could have been opened, receiving more than…
Content type: Course Section
CONCEPTS
Communications surveillance: Communications surveillance is the monitoring, interception, collection, preservation and retention of information that has been communicated, relayed or generated over communications networks to a group of recipients by a third party. This includes phone calls, emails, text messages, pictures, and messaging apps.
Data protection: Data protection is the law designed to protect your personal information, which is collected, processed and stored by “…
Content type: Advocacy
This stakeholder report is a submission by Dejusticia, Fundación Karisma and Privacy International (PI). Dejusticia is a Colombian human rights organization that provides expert knowledge on human rights. Fundación Karisma is a Colombian civil society organization that seeks to respond to the opportunities and threats that arise in the context of ‘technology for development’ for the exercise of human rights. PI is a human rights organisation that works to advance and promote the right to…
Content type: Explainer
Phone networks are divided between two networks: the physical and the mobile. The physical runs on the Public Switched Telephone Network (PSTN) that serves your home phone. Mobile networks are dominant in the age of communication and are used to relay mobile communications to the PSTN. The most prominent mobile networks are GSM networks (Global System for Mobile communications) and are what we use everyday to communicate with one another. Another system is known as CDMA (Code Division Multiple…
Content type: News & Analysis
13 October 2013
The following is an excerpt from a guest article which appeared on openDemocracy, written by Privacy International's Research Officer, Anna Crowe:
Humanitarian actors often forsake the right to privacy in favour of promoting programmes utilising phones to deliver services, either through a lack of understanding or wilful ignorance as to the risks involved.
It is clear that the massive uptake of mobile phones in developing countries has played a crucial role in the…
Content type: Long Read
Photo Credit: AU UN IST / Tobin Jones
El 25 de septiembre 2017, el presidente de Paraguay objetó la totalidad de una propuesta de Ley denominada “que regula la activación del servicio de telefonía móvil”, disponiendo la creación de un registro de huellas dactilares de todos los usuarios de servicios móviles, y la desconexión dentro de un año a todos quienes no se hayan incorporado a este registro, todo ello bajo la excusa de disminuir los robos de identidad en la activación de…
Content type: News & Analysis
This blog was written by Fundación Karisma, a member of the Privacy International Network. It does not necessarily reflect the views or position of Privacy International.
The Colombian General Prosecutor said recently that the blocking of IMEI is not working. He is talking about a registry created in 2011 that aims to reduce cellphone theft by blocking reportedly stolen phones of Colombian networks.
Fundación Karisma has been following this program and now, after six years…
Content type: News & Analysis
The Privacy International Network recently submitted joint stakeholder reports for seven partner countries - India, South Africa, Morocco, Tunisia, Brazil, the Philippines and Indonesia - as part of the 27th session of the Universal Periodic Review (1 to 12 May 2017).
Communications surveillance was a major area of concern, as we observed that these policies and practices remain largely opaque, complex and vague. In…
Content type: Advocacy
This stakeholder report is a submission by Asociación por los Derechos Civiles (ADC) and Privacy International (PI). The Asociación por los Derechos Civiles (ADC) is a non-governmental, non-pro t organisation based in Buenos Aires that promotes civil and social rights in Argentina and other Latin American countries. It was founded in 1995 with the purpose of helping to strengthen a legal and institutional culture that guarantees the fundamental rights of the people, based on respect…
Content type: Advocacy
This stakeholder report is a submission by Privacy International (PI). PI is a human rights organisation that works to advance and promote the right to privacy and government surveillance around the world. Privacy International wishes to bring concerns about the protection and promotion of the right to privacy for consideration in Pakistan’s upcoming review at the 28th session of the Working Group on the Universal Periodic Review.
Content type: Advocacy
This Universal Periodic Review (UPR) stakeholder report is a submission by Privacy International (PI), the International Human Rights Clinic at Harvard Law School (IHRC), the Zimbabwe Human Rights NGO Forum(the Forum), and the Digital Society of Zimbabwe (DSZ).
Content type: News & Analysis
What do Egypt, Kenya, Turkey, Guinea, and Sweden have in common? Despite having a Constitutional right to privacy, they are adopting and enforcing policies that directly challenge this human right.
These states are also up for a Universal Periodic Review this year before the United Nations Human Rights Council. UPRs are a mechanism within the Council aimed at improving the human rights situation in all countries and address human rights violations wherever they occur.
Despite having…
Content type: Advocacy
This stakeholder report is a submission by Privacy International (PI) and the National Coalition of Human Rights Defenders in Kenya (NCHRD-K). PI is a human rights organisation that works to advance and promote the right to privacy around the world. NCHRD-K is a non-governmental organisation registered as a Trust in Kenya. It was established to strengthen the work of human rights defenders (HRDs) in the country by reducing their vulnerability to the risk of persecution and by enhancing their…
Content type: Advocacy
What do Egypt, Kenya, Turkey, Guinea, and Sweden have in common? Despite having a Constitutional right to privacy, they are adopting and enforcing policies that directly challenge this human right.
These states are also up for a Universal Periodic Review this year before the United Nations Human Rights Council. UPRs are a mechanism within the Council aimed at improving the human rights situation in all countries and address human rights violations wherever they occur.
Despite having…
Content type: News & Analysis
The Zimbabwean government extended its reach into the private lives of its citizens this week by promulgating a new law establishing a central database of information about all mobile telephone users in the country. The Statutory Instrument 142 of 2013 on Postal and Telecommunications (Subscriber Registration) Regulations 2013, gazetted last Friday, raises new challenges to the already embattled rights to privacy and free expression in Zimbabwe, increasing the potential that the…