Defining Direct Access: GNI calls for greater transparency and dialogue around mandatory, unmediated government access to data

This web page calls attention to legal and technical arrangements that allow government authorities to access data streams directly – that is, without having to request data from, or even notify, the service providers that collect and/or transmit the data. Read more for the full GNI statement, "defining direct access", plus a one-page visual explainer and related resources.

2021-06-03T18:39:31+00:00June 3, 2021|Categories: feature, Issues, issues highlight, surveillance|Tags: , , |

GNI Statement of Concern on Proposed Cybersecurity Law in Myanmar

Given the severe social, economic, and human rights consequences that the draft cybersecurity law is likely to have on both users and companies inside the country, GNI calls on the Myanmar military to withdraw and reconsider the law.

“The Multistakeholder Global Network Initiative: Watch the Story Unfold” by Executive Director Judith Lichtenberg

With the tenth-anniversary video as a visual guide, GNI's executive director reflects on ten years of multistakeholder collaboration for freedom of expression and privacy in the ICT sector.

Global Network Initiative Joins RightsCon Brussels 2017

GNI led sessions on the economic costs of network and communications disruptions and shutdowns, shifting trends in country legal frameworks affecting companies’ abilities to respect rights in their operations, and GNI's multi-stakeholder approaches to advancing privacy and freedom of expression in the ICT sector.

2019-01-13T23:49:12+00:00March 24, 2017|Categories: events, feature|Tags: , , , , , |

The Global Network Initiative Urges Kazakhstan to Respect the Security of Digital Communications

The Global Network Initiative (GNI) is troubled by a provision in the new communications law of Kazakhstan which would require all Internet users to install a “national security certificate” on their devices. The certificate would permit government authorities to access all Internet traffic, regardless of whether encryption technology is used. Governments should support strong encryption, and rather than compromising digital security, they should use legal process to make requests of companies who encrypt and store their users’ data.

Go to Top