Black-and-white photo of people sitting at a protest, overlaid with
grey and white dots

How to Create a Data Policy

The article 'How to Create a Data Policy' is hosted on an external resource.

Click here to read the original content on the website https://ourdataourselves.tacticaltech.org/posts/how-to-data-policy/

Related content

Online Events and Personal Data

In this chapter of the Organiser's Activity Book, discover what types of personal data are created during online events. Learn about the tools that are available to host online events; the differences in how they work; and their risks and benefits.

A Voter's Guide: 7 Tips to Detox Your Data

Our Voter’s Guide explains how personal data is collected and used by political parties and candidates – and what voters can do about it. The seven tips are now available in both English and Dutch.

→︎ Read more

Event Promotion for Organisers

This new chapter of the Organiser's Activity Book from our Data & Activism project looks at event promotion. The playful activities, aimed at organisers, campaigners and human rights defenders, explore the consequences, risks and benefits of using tools like social media in terms of personal data.

A Fistful of Privacy Tips: Tech at Protests

Whether you’re expressing your disapproval on the web or on the streets, technology will play a role in how you protest. This Data Detox guide will help activists and protesters stay vigilant when using smartphones, social media, and messaging apps.

The Organiser’s Activity Book

The Organiser’s Activity Book is a new self-learning resource from Tactical Tech’s Data and Activism project. The book is a collection of playful exercises for organisers within civil society who work with the personal data of human rights defenders, investigators, campaigners, and others who are taking part in social or political action.

→︎ Read more

La technologie est stupide : comment choisir la technologie pour le travail à distance

Cet article aborde les questions de savoir quelle technologie est bonne, sûre et appropriée à utiliser en ces temps complexes si nous voulons agir et travailler de manière responsable et à distance. Comment décider de la technologie à laquelle nous devons faire confiance ? Il examine également ce qui pourrait être fait à l'avenir pour répondre à cette question beaucoup plus facilement qu'aujourd'hui.

→︎ Read more

How to Manage Your Sources

From Exposing the Invisible The Kit: Start building your own contacts, learn how to develop, interact with and maintain sources and how to enrich your investigations with their cooperation.

Retrieving and Archiving Information from Websites

In this chapter from Exposing the Invisible - The Kit, Wael Eskandar and Brad Murray explain ways to find and retrieve historical and ‘lost’ information from websites, to serve as evidence that something existed online, and ways to archive and preserve your own copies of webpages for future reference.