"The goal of this Data Governance Toolkit is to guide non-profit organizations through the steps and best practices for implementing Data Governance within your organization, while keeping in mind the changing organization IT landscape, enterprise architecture and program deliverables. To support or
...
ganizations, reach their goal of capacity building in Data and Analysis, this toolkit guides you through a Framework to implementing Data Governance that includes template policies, roles, roadmaps and KPIs." (Purpose of this toolkit, page 3)
more
"This report has documented the surveillance measures and practices in Kenya and Uganda during the first year of the COVID-19 pandemic. The key trends include poor oversight over COVID-19 data collection, the lack of independent data protection authorities, the use of telecommunications data to ‘t
...
rack and trace’ individuals, the surveillance of public spaces using CCTV and biometric technologies, the possession of broad search powers by medical and public health officers, and a lack of transparency and accountability by state and nonstate actors. Also, the coronavirus apps deployed in both countries presented new challenges including their limited impact and effectiveness, non-compliance of the apps with privacy standards, their inadequate privacy policies, and a lack of transparency in partnerships. While international human rights law and the constitutions in both countries guarantee the protection of the rights to privacy, data protection, and freedom of expression and information, these were not complied with during the pandemic period. The result is an overall expansion of the surveillance environment in Kenya and Uganda, leading to interference with, and infringements and violations of these rights, a situation which is worrying if left unchanged." (Conclusion, page 20)
more
"Führende Tech-Konzerne, allen voran die aus dem Silicon Valley, instrumentalisieren zunehmend das Handelsrecht für ihre Interessen, wie die von der US-Regierung im Jahre 2000 verabschiedete Digitale Agenda zeigt. Dabei geht es längst nicht mehr nur um die Reduzierung von Zöllen auf digitale Pro
...
dukte wie Software oder einheitliche Standards für Telekommunikationsdienste. Patente auf Künstliche Intelligenz sowie die (Nicht)Regulierung von Datenflüssen sind inzwischen auch Bestandteil handelsrechtlicher Regelungen und Gegenstand kontroverser Debatten in der Welthandelsorganisation WTO. Für die Länder des Globalen Südens - aber nicht nur für sie - steht dabei viel auf dem Spiel, einschließlich der Gefahr eines neuen, digitalen Kolonialismus. Die Publikation untersucht, wo die Potenziale und Grenzen digitaler Lösungsansätze liegen. Sie analysiert, was sich aus vermeintlichen Vorzeigeprojekten wie dem mobilen Bezahlsystem M-Pesa oder der Verbreitung des bargeldlosen Bezahlens in Indien lernen lässt. Die Autoren untersuchen auch, ob die Digitalisierung transnationaler Lieferketten nicht nur die Transparenz erhöht, sondern auch die Wertschöpfung bei den Arbeiterinnen und Arbeitern auf den Kaffee- und Sojaplantagen oder in Fabriken. Für eine faire Gestaltung der Digitalisierung müssen vor allem folgende Fragen beachtet werden: Wie können benachteilige Bevölkerungsgruppen in den ländlichen Regionen Afrikas oder Bewohnerinnen und Bewohner von Armenvierteln in den Megacities einen besseren Zugang zu Arbeit und Grunddienstleistungen erhalten? Welcher Maßnahmen bedarf es, um für Menschen in Asien und Lateinamerika die Risiken des digitalen Wandels zu minimieren und dessen Potenziale zu erweitern? Die Studie schließt deswegen mit neun Bausteinen zum Aufbau einer fairen Digitalisierung." (Vorwort)
more
"This publication discusses the extent to which digital technology can help tackle poverty and social inequality. Does it increase or restrict the opportunities for social and economic participation open to disadvantaged people? We analyse the history of e-commerce in the light of this question. We
...
consider current developments in the world trade regime, because a new dynamic has developed in trade policy almost unnoticed. As the Digital Agenda adopted by the US government in 2000 shows, leading tech companies - principally those from Silicon Valley - are increasingly using commercial law to promote their own interests. This is no longer just about reducing tariffs on digital products such as software, or about uniform standards for telecommunications services. Patents on artificial intelligence and the (non-)regulation of data flows are now elements of commercial regulations and the subject of controversy in the World Trade Organization (WTO). For the countries of the Global South - but not only for them - there is a lot at stake, including the risk of a new, digital colonialism. This publication explores the potentials and limits of digital solutions. It analyses the lessons to be learned from supposedly model projects such as the mobile payment system M-Pesa and the spread of cashless payment in India. We also examine whether the digitalisation of transnational supply chains not only boosts transparency but also increases value creation for workers on the coffee and soya plantations or in factories. The question of how digitalisation can be organised so that it contributes to the welfare of everyone must focus on one issue in particular: how can disadvantaged population groups in the rural parts of Africa or the inhabitants of slums in the megacities obtain better access to work and basic services? What steps must be taken to minimise the risks of the digital transformation for people in Asia and Latin America and enhance its potential? The study therefore concludes with a list of nine ideas that would help make digitalisation fair. Consider them as an invitation to engage in discussion of globally just and humane digitalisation." (Preface)
more
"The six modules [...] are designed to help trainers integrate digital safety and online security topics into their media training. The modules do not assume that the trainer has special knowledge of the subject. While we wrote the toolkit with journalism trainers in mind, we believe that the module
...
s can also be used when training a wide range of media content producers (i.e., bloggers, citizen reporters, human rights activists who work with information, etc.) who use smartphones and the Internet to communicate." (Page 3)
more
"Speak safe" introduces reporters, journalists and bloggers to simple yet effective practices for maintaining control of important information and communications. Thirteen short chapters, of two to four pages each, provide basic knowledge about issues such as safe emailing, surfing, Wi-Fi, data dele
...
tion, the risks of sharing data online, or mobile phone safety. Several online resources are introduced, where additional information, tutorials and software can be found." (CAMECO Update November 2013)
more
"Gewerkschaften und Datenschützer fürchten um die Pressefreiheit: Immer neue Gesetze erschweren die vertrauliche Kommunikation per Internet und Telefon. Besonders stark betroffen sind Berufsgruppen, die bislang nur in Sonderfällen ausgespäht werden durften: Journalisten, Juristen und Ärzte. Doc
...
h es ist möglich, die Kontrollen zu umgehen - ganz legal und ohne großen technischen Aufwand! Journalisten können auch weiterhin diskret Informanten kontaktieren. Oder Anwälte ihre Mandanten. Oder Ärzte ihre Patienten. Das Buch verrät, welche Techniken es gibt. Schritt für Schritt wird der Umgang mit Programmen gezeigt, die die Kommunikation anonymisieren, von der E-Mail über den Chat bis zur Internet-Telefonie. Der Leser erfährt, wie er Spuren auf Computern oder im World Wide Web verwischt. An praktischen Alltagsbeispielen wird gezeigt, welche Methode wann angewendet werden sollte. Dabei Setzt das Buch keine besonderen Computerkenntnisse voraus: Wer Surfen, Mailen und Office-Programme benutzen kann, bringt genug Wissen mit, um sich anonym im Internet zu bewegen. Das Buch behandelt außerdem zwei Spezialthemen: Wie kann man beim Telefonieren mit dem Handy seine Identität verschleiern? Und: Wie umgeht man die Zensur in Diktaturen? Das Buch eignet sich deshalb auch besonders für Auslandskorrespondenten und für Mitarbeiter von Hilfsorganisationen." (Verlagsbeschreibung)
more
"This manual is divided into four parts which can be read in any order. The reader does not require any special expertise, although some basic knowledge of computer and Internet operations would come handy. The chapters, containing information of a more technical nature, are marked ‘For Techies’
...
. The First Section is about understanding your security needs and vulnerabilities. It describes a non-technical approach to the digital environment. A method of mapping the threats, posed by a particular situation, is off e red to help you decide on the strategies for implementing privacy and security solutions. The Second Section lists various elements of computer and Internet security. It introduces the reader to computer operations and Internet infrastructure. Methods of securing data, bypassing Internet censorship and protecting yourself against malicious attacks are explained in detail. The Third Section is a summary of worldwide legislation to restrict and monitor information flow and communications. It shows the downward trend, caused by the growth of restrictions to the rights to freedom of expression, privacy and communication, in many countries. Cases of human rights defenders currently in prison or persecuted because of their work through the Internet are presented as examples of the ways some governments enforce these pieces of legislation. The Fourth Section drafts possible scenarios for human rights defenders and their organisations of dealing with problems of electronic insecurity and ensuring continuation of their work. The scenarios relate to the concepts presented throughout the book and solutions are based on realisable actions." (Page 3)
more