News

The Free to Protest Guide (Türkiye) has been created by adapting Privacy International's (PI) Free to Protest Guide UK according to the laws and policies of Türkiye ...
The AI industry is rushing to build AI Assistants that integrate into our lives. These firms need to answer questions about how they will protect our data, including from them. Layla looks at her ...
The aftermath of the overturning of Roe v. Wade in the United States (US) sparked widespread debate and concern that data from period tracking apps could be use to criminalise those seeking abortion ...
The Open informal consultations on lethal autonomous weapons systems, held in accordance with General Assembly resolution 79/62 at the UN in New York on 12-13 May 2025, examined various legal, ...
Industry is gaining insights into and intelligence on our lives that were previously possessed by powerful Intelligence Agencies, and tomorrow their potential may exceed them. In the future, industry ...
This explainer takes a look at the main ways in which large language models (LLMs) threaten your privacy and data protection rights. The emergence of large language models (LLMs) in late 2022 has ...
Industry is gaining insights into and intelligence on our lives that were previously possessed by powerful Intelligence Agencies, and tomorrow their potential may exceed them. In the future, industry ...
Privacy International (PI) has been investigating and exposing the use of data and technology in the migration context, and we aim to build the knowledge and ...
Until recent the international human right to privacy was largely unaddressed. We led initiatives to establish law on the right to privacy through UN special procedures and human rights processes, and ...
Privacy is a fundamental right, essential to freedom everywhere. At the same time companies and governments try to maximise their power and profits on surveillance ...
As computing becomes embedded everywhere, privacy, security and safety issues converge. In the future, our infrastructure will be insecure and unsafe due to insecure devices and components that are ...
People don’t know or control what data is on devices and how it is used by others, and how this can be used against them. In the future, individuals’ data held on technologies and devices can be ...