News

Human rights abuses based on use of new technologies happen everywhere in the world. Almost all governments try to acquire more control on people by use of modern technologies (e.g. facial recognition ...
Powerful companies use their resources and products to profile and judge us, to decide what we see, what we may access, what we may do, and if and how we may participate. They interfere with our ...
The meeting brought together representatives from UN bodies, civil society, academia, and election oversight institutions. Participants agreed that while digital technologies can improve electoral ...
The International Labour Organisation (ILO) is developing standards for decent work in the platform economy. Gig workers are exposed to a range of harms because of the precarious nature of their work ...
Industry is gaining insights into and intelligence on our lives that were previously possessed by powerful Intelligence Agencies, and tomorrow their potential may exceed them. In the future, industry ...
As computing becomes embedded everywhere, privacy, security and safety issues converge. In the future, our infrastructure will be insecure and unsafe due to insecure devices and components that are ...
The data that is observed, derived or predicted from our behaviour is increasingly used to automatically rank, score, and evaluate people. These derived or inferred data are increasingly used to make ...
Until recent the international human right to privacy was largely unaddressed. We led initiatives to establish law on the right to privacy through UN special procedures and human rights processes, and ...
People don’t know or control what data is on devices and how it is used by others, and how this can be used against them. In the future, individuals’ data held on technologies and devices can be ...
The data that is observed, derived or predicted from our behaviour is increasingly used to automatically rank, score, and evaluate people. These derived or inferred data are increasingly used to make ...
As nearly every human interaction now generates some form of data, systems should be designed to limit the invasiveness of data analysis by all parties in the transaction and networking.
As computing becomes embedded everywhere, privacy, security and safety issues converge. In the future, our infrastructure will be insecure and unsafe due to insecure devices and components that are ...