Back to content

Search Results For: www.nubobeauty.com

Zombie cookies rise again as telcos respond to our report on tracking headers

9 Oct 2015

Even George A. Romero, visionary creator of zombie movies, would scarcely believe this script. After public outcry, policy turnarounds, and regulatory scrutiny, tracking headers live on in Verizon’s networks. The company just announced a new program combining AOL’s online advertising and tracking capabilities with Verizon’s UIDH mobile tracking headers, to track users across the fixed and mobile web. We have fought to expose the use of mobile tracking headers, and made some progress in holding companies to account. The nonprofit Business and Human Rights Resource Centre invited formal responses from the companies named in our report. Let’s go through the responses, one by one.

Post
Zombie cookies rise again as telcos respond to our report on tracking headers
9 Oct 2015
Zombie cookies rise again as telcos respond to our report on tracking headers
Tech and conflict

Tech and conflict: a guide for responsible business conduct

18 May 2023

This guide is meant to help tech companies think through the impacts of their decisions in the context of conflict.

Guide
Tech and conflict: a guide for responsible business conduct
18 May 2023
Tech and conflict: a guide for responsible business conduct
|

فيديو: ما يجب أن تعرفه عن مشروع قانون الأخبار الزائفة في تونس

24 Apr 2020
Guide
فيديو: ما يجب أن تعرفه عن مشروع قانون الأخبار الزائفة في تونس
24 Apr 2020
فيديو: ما يجب أن تعرفه عن مشروع قانون الأخبار الزائفة في تونس
|

#StopCISA

28 Jul 2015

When asked why he robbed banks, Willie Sutton famously said, “because that’s where the money is.” In the digital era, data equals dollars, and it is stockpiled by the world’s largest organizations. In past years, massive data breaches at companies like Anthem, Home Depot, Target, Sony, Staples, and TJ Maxx have resulted in unauthorized access of the data from millions of people.

Post
#StopCISA
28 Jul 2015
#StopCISA

Telco Hall of Shame: Blackberry

1 Feb 2013
Post
Telco Hall of Shame: Blackberry
1 Feb 2013
Telco Hall of Shame: Blackberry

Access joins open letter calling on Skype to clarify user security, release transparency report

25 Jan 2013

Access has joined more than forty organizations and 61 individuals in sending an open letter to Skype, asking the company to clarify its policies for protecting users’ security and to release a comprehensive transparency report detailing government requests for user data.

Post
Access joins open letter calling on Skype to clarify user security, release transparency report
25 Jan 2013
Access joins open letter calling on Skype to clarify user security, release transparency report

WCIT WATCH: Members of civil society issue a post-WCIT statement

3 Jan 2013

Shortly after the end of the World Conference on International Telecommunications members of civil society issued a statement regarding the new International Telecommunication Regulations and the future of multi-stakeholder engagement with the International Telecommunication Union.

Post
WCIT WATCH: Members of civil society issue a post-WCIT statement
3 Jan 2013
WCIT WATCH: Members of civil society issue a post-WCIT statement
|

Access releases implementation guide to be used for surveillance legal reform and advocacy

3 May 2015

This week, Access released an Implementation Guide for the 13 Principles on the Application of Human Rights to Communications Surveillance. The Implementation Guide applies the Principles to each step of the government surveillance process, calling on officials to respect human rights no matter the justification for the activity — whether it is law enforcement, national security, or intelligence gathering.

Post
Access releases implementation guide to be used for surveillance legal reform and advocacy
3 May 2015
Access releases implementation guide to be used for surveillance legal reform and advocacy
|

El ataque “Doubleswitch” en redes sociales: una amenaza para activistas y periodistas en Venezuela y el resto del mundo

9 Jun 2017

En Venezuela, Bahréin, Myanmar y otras partes del mundo, activistas afectados por esta nueva forma de secuestro de cuentas — la cual llamamos “Doubleswitch”.

Post
El ataque “Doubleswitch” en redes sociales: una amenaza para activistas y periodistas en Venezuela y el resto del mundo
9 Jun 2017
El ataque “Doubleswitch” en redes sociales: una amenaza para activistas y periodistas en Venezuela y el resto del mundo
|

Privacy under attack in France and the U.S.

23 Apr 2015

Legislators tend to respond swiftly to cyber attacks and terrorism with bold statements and hastily written bills — but as we’ve seen, bad laws can stay on the books for decades. These issues are far too important to rush into law. Cyber security should not be used as an excuse to trample upon our digital rights or expand government surveillance, in the U.S., in Europe, or anywhere else in the world.

Post
Privacy under attack in France and the U.S.
23 Apr 2015
Privacy under attack in France and the U.S.