A Voter's Guide: 7 Tips to Detox Your Data
Our Voter’s Guide explains how personal data is collected and used by political parties and candidates – and what voters can do about it. The seven tips are now available in both English and Dutch.
Click here to read the original content on the website https://ourdataourselves.tacticaltech.org/posts/online-events-personal-data/
Our Voter’s Guide explains how personal data is collected and used by political parties and candidates – and what voters can do about it. The seven tips are now available in both English and Dutch.
This new chapter of the Organiser's Activity Book from our Data & Activism project looks at event promotion. The playful activities, aimed at organisers, campaigners and human rights defenders, explore the consequences, risks and benefits of using tools like social media in terms of personal data.
Whether you’re expressing your disapproval on the web or on the streets, technology will play a role in how you protest. This Data Detox guide will help activists and protesters stay vigilant when using smartphones, social media, and messaging apps.
The Organiser’s Activity Book is a new self-learning resource from Tactical Tech’s Data and Activism project. The book is a collection of playful exercises for organisers within civil society who work with the personal data of human rights defenders, investigators, campaigners, and others who are taking part in social or political action.
Cet article aborde les questions de savoir quelle technologie est bonne, sûre et appropriée à utiliser en ces temps complexes si nous voulons agir et travailler de manière responsable et à distance. Comment décider de la technologie à laquelle nous devons faire confiance ? Il examine également ce qui pourrait être fait à l'avenir pour répondre à cette question beaucoup plus facilement qu'aujourd'hui.
Tactical Tech's co-founder Marek Tuszynski addresses the question of which technology is good, safe and appropriate to help us act and work responsibly and remotely during the coronavirus pandemic - and how to make answering this question easier in the future.
From Exposing the Invisible The Kit: As you step into the offline world, see what it takes to plan, run and evaluate your field investigation safely and effectively.
From Exposing the Invisible The Kit: Start building your own contacts, learn how to develop, interact with and maintain sources and how to enrich your investigations with their cooperation.
This paper looks at shrinking civic space in terms of the digital, in particular the role that digital technologies can have on restricting the spaces of civil society organisations and their activities.
In this chapter from Exposing the Invisible - The Kit, Wael Eskandar and Brad Murray explain ways to find and retrieve historical and ‘lost’ information from websites, to serve as evidence that something existed online, and ways to archive and preserve your own copies of webpages for future reference.
One of 14 country studies looking at how data is used in political processes. This report, published in partnership with Coding Rights, looks at the private-public data trade in Brazil.
There has been a lot of resources written on safer use of digital technologies and social media platforms for CSOs, grassroots groups, activists and politically-active individuals. Here we present a curated list of resources, a pool of links that can help you respond to existing risks and threats.
At every stage, travelling means giving away an immense amount of data that is either required by governments or by companies that provide travel-related services, or that can be automatically generated in the background. This article gives insight into the data you give away when travelling.
In this overview we analyse the challenges faced by politically-active women who are using digital technologies to express themselves, politically organise or carry out their work.
Caroline Sinders explains how machine learning is already changing product design and software and how this might impact ethics and the agency of humans.
Kate J. Sim examines how the prevailing cultural notion of sexual assault survivors as liars, and the widely held belief of technological objectivity, converge to instruct the design of anti-rape technologies.
The GDPR compliance explained with a last-minute checklist for civil society organisations and grassroot groups to help you check that you are handling data according to the GDPR requirements.
Weaponised design is a process that allows for harm of users within the defined bounds of a designed system. This article takes a look at how it can be faciliated by designers who are oblivious to the politics of digital infrastructure or consider their design practice output to be apolitical.
This article examines a few moments related to the history of homosexuality and its categorisation. It starts with recent facial recognition algorithms to distinguish straight and gay faces and ends with Alan Turing’s questions about gender and The Imitation Game.
Visualising Information for Advocacy is a book about how advocates and activists use visual elements in their campaigns. Download the 170-page book with over 60 examples of visual information campaigns from around the world. Available in English, Spanish and Arabic.
The Trainer's Manual is the counterpart to the Holistic Security Strategy Manual for Human Rights Defenders. It reflects on further learnings and best practices grown out of Tactical Tech's engagements with experts and trainers on the overall protection, digital security, and psychosocial well-being for human rights defenders between 2013 and 2015.