"Whether you’re experiencing or witnessing online abuse, this Field Manual offers concrete strategies for how to defend yourself and others. We wrote this guidance with and for those disproportionately impacted by online abuse: writers, journalists, artists, and activists who identify as women, BI
...
POC, and/or LGBTQIA+. Whatever your identity or vocation, anyone active online will find useful tools and resources here for navigating online abuse and tightening digital safety." (Abstract)
more
"Das vorliegende Papier soll die Umsetzung des neuen Digital Services Act (DSA) konstruktiv aus einer kinderrechtlichen Perspektive begleiten. Dabei wird gezeigt, welche Potenziale sich aus dem DSA ergeben, um Kinderrechte im Digitalen zu stärken. Im Fokus stehen Anbietermaßnahmen sowie auch Präv
...
entions- und Befähigungsanliegen. Dabei wird über Points to Consider erarbeitet, was kinderrechtliche Good- und Best-Practice-Ansätze bei der Erfüllung der Anforderungen des DSA ausmacht." (Zusammenfassung)
more
"The Zimbabwean state has in recent years stepped up its surveillance efforts on citizens, civil society and journalists who are viewed as the “enemies of the state”. This state surveillance has been argued to infringe on citizens’ right to privacy and access to information. We are mindful tha
...
t the “Second Republic” or the “New Dispensation” government has invested heavily in surveillance to silence its critics, among them activists, opposition leaders and journalists. Based on this, the study critically examines the use of surveillance strategies by Zimbabwean journalists and assesses the challenges and opportunities. The study uses in-depth interviews with selected journalists from Zimpapers, Alpha Media Holdings and freelance journalists around the country. The data show that journalists in Zimbabwe use different surveillance strategies, while some are benefiting from state sources for surveillance. Journalists further indicated that they live in fear of the state, which tracks them down. As a result, however, journalists have resorted to various means of security, which include “hunting in packs” and deploying digital security strategies. Findings further demonstrate that newsrooms are poorly equipped with technology for surveillance." (Abstract)
more
"These recommendations are targeted towards individuals working with sensitive sources on high-level projects that uncover government or corporate misdeeds. We have drafted a few additional steps you should keep in mind if you will be communicating with sensitive sources. Following the below steps w
...
ill make it much harder for a dedicated adversary to figure out who your sources are." (Publisher description)
more
"This policy brief is an Access Now publication. It gives context about the Personal Data Protection Bill in the Parliament of Sri Lank, states the key areas of concerns in the present bill, and proposes nine (9) recommendations." (commbox)
"[...] many newsroom reactions to gender-based online violence appear to have been non-existent, ad hoc, or inadequate. At times, they have even damaged the women journalists targeted. Large global news organisations sometimes identified as “best practice” exemplars by expert responders intervie
...
wed for this study were nevertheless criticised by the journalists interviewed in the course of the research with regard to their responses to the crisis. They were accused of failing to fully understand the gendered nature of the attacks, appreciate the serious psychological impacts, adapt to emerging and increasingly sophisticated threats, and provide effective and holistic support that recognises intersectional risks and hybrid security threats. A number of outlets were also criticised for insensitive and counterproductive victim-blaming and/or speech-restrictive behaviours. Many of the journalists interviewed for this study expressed exasperation and a sense of abandonment by their employers when they were in the midst of an online violence storm, even when there were credible threats of offline violence associated with these attacks. This was linked to gender-unaware policies, or those that had stagnated as a result of a failure to take account of increasing online toxicity and hostility towards journalists - especially on social media platforms - in the context of escalating disinformation, along with political polarisation and populism." (Page 4)
more
"Surveillance of journalists has become a very topical and controversial issue that now requires attention at a number of levels – the level of the state, CSOs, and journalism organisations themselves. The systematic and arbitrary harvesting of journalists’ information, tracking and targeting of
...
journalists is on the increase especially in the SADC region where some regimes seek to retain control of the media and stifle divergent views and suffocate opponents. In countries such as Zambia, Zimbabwe, Namibia and Malawi, there is deep-rooted fear that enacted cyber laws are already being used for surveillance purposes. For instance, South Africa uses the RICA Act to regulate the interception of communication and Zimbabwe has the Interception of Communications Act while Zambia deploys the Electronic Communications and Transactions Act of 2009. Thus, anecdotal evidence in Southern Africa shows that governments in the region are increasingly resorting to digital tools for surveillance and this is a serious cause for concern. At least three Southern African countries; Botswana, Zambia, and Zimbabwe have acquired sophisticated tools developed by an Israeli company, Circles, which they use to monitor the behavior of their citizens online. This calls for journalists, their organisations and other media- support institutions to act in ways that protect journalists from surveillance, be it by state or non-state agency. There is need, therefore, to come up with a toolkit of strategies that journalists in Southern Africa can make use of in quotidian news gathering and reporting practices." (Introduction)
more
"These guidelines aim to provide a general framework for judicial actors to assess matters of privacy and data protection in the face of other rights, such as freedom of expression and the right to privacy. The document includes relevant case law from various national, international and regional bod
...
ies that may inform judicial actors’ understanding of the matters at hand. It draws a coherent line from privacy rights to data protection rights and the challenges of upholding these rights in the face of new technologies." (Page 2)
more
"En la era digital los equipos electrónicos y la información manejada por los activistas y defensores de Derechos Humanos también están en riesgo. La seguridad digital, está compuesta por un conjunto de herramientas, hábitos y métodos empleados para proteger los equipos electrónicos y la inf
...
ormación manejada a través de ellos. Esta guia explica puntos sobre seguridad digital y da recomendaciones." (Publisher description)
more
"In the past few years, many countries across the continent have enacted various laws that permit surveillance, mandate telecommunication intermediaries to facilitate the interception of communication, stipulate the mandatory collection of biometric data, limit the use of encryption, require the loc
...
alisation of personal data, and grant law enforcement agents broad search and seizure powers. This report therefore maps and analyses the laws and policies that impact on privacy, notably those that regulate surveillance, limitations on encryption, data localisation, and biometric databases. This analysis could inform remedial and mitigatory steps to protect the right to privacy, which may include strategic litigation and advocacy for legislative and policy reforms. Moreover, the results of this analysis are also crucial for monitoring developments and trends on privacy regulation and practice in the region." (Introduction, page 5-6)
more
"Die in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung
...
hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt Verhaltensbeeinflussungen und verstärkt Ungleichgewichte in der Informationsmacht. Es analysiert die Auswirkungen der Digitalisierung auf den rechtlichen und politischen Schutz der Grundrechte, die ökonomischen Beziehungen, die gesellschaftliche Integration und die individuelle Entfaltung. Das Buch zeigt aber auch auf, wie Digitalisierung und ihre gesellschaftlichen Rahmenbedingungen technisch, sozial, ökonomisch und rechtlich gestaltet werden können, um Privatheit und Selbstbestimmung zu schützen." (Verlagsbeschreibung)
more
"This research was conducted to assess the digital security posture among independent media organizations in Lebanon. It is significant for media organizations in Lebanon to maintain a good standard of digital security, especially in an era when press freedom is increasingly under attack." (Introduc
...
tion and Methodology, 5)
more
"Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyberspace in conflictual settings, while the second focuses on political responses by state and non-state acto
...
rs in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective – how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space." (Publisher description)
more
"This white paper seeks to provide an overview of the core thematic issues around digital rights and digital safety across the world. The content builds off a global mapping exercise of organisations and knowledge, predominantly focused on Africa and the Middle East, Latin America, Asia-Pacific, Eas
...
tern Europe and Central Asia. This document is intended to serve as a primer for practitioners and newcomers into the field of digital rights to gain a broad understanding of key issues within this ecosystem." (Introduction, page 5)
more
"This guide looks at how our mobile devices could leak data about our locations and what we could do to protect ourselves against it. It’s designed for most Central European journalists’ threat models and only looks at how our mobile devices could give up precise location data on us. It doesn’
...
t look at some of the other ways your location can be tracked, such as through payments, CCTV cameras, or images you post online, and doesn’t cover coarse location data (for example, how your IP address might reveal which country or city you’re in)." (Page 1)
more
"Data governance is an integral aspect of digital authoritarianism because it incorporates any type of control, authority, and manipulation of data […]. Within the context of digital authoritarianism, data governance may incorporate both states and non-state actors that collaborate with states to
...
facilitate their control over the data sources. This section analyses data governance in the context of its relationship to digital authoritarianism. Among the various facets of the topic, it concentrates mainly on surveillance, privacy, and digital methods of transnational repression that the states use to intimidate and silence their anti-regime activists abroad." (Data Governance, page 3)
more
"The OECD Policy Framework on Digital Security helps policy makers understand the economic and social dimension of cybersecurity, raises their awareness about the OECD approach to digital security policy, and encourages them to make use of OECD digital security recommendations to develop better poli
...
cies. The Framework provides a helpful narrative based upon OECD digital security recommendations and identifies linkages with other policy areas addressed through existing OECD standards and tools." (Foreword, page 3)
more