Collection and archival of sensitive information are core to humanitarian and social justice practices, but all too often security and privacy protections are neglected in such efforts. Benetech CEO Jim Fruchterman sat down with WBEZ Chicago’s Worldview guest host Alexandra Salomon for a conversation about the power of open source technology in strengthening privacy and human rights, and about Benetech’s social impact work.
How can we use technology to help social entrepreneurs collect and use their data more effectively and securely? We are exploring this in Benetech Labs. The solution we have been exploring is a semi-customized, open source, secure, data collection and analysis application that makes it easier for social sector users to safely gather and use information more efficiently.
How do improvements in information and communications technology affect governance? A particular area of concern in this context is the use of technology in countries where the government is weak or altogether missing. In a story that examines the transformative impact of data and communication on governance, the Brookings Institution’s TechTank blog highlights Benetech’s role as an innovation center.
Silicon Valley startups are proving their ability to subvert internet censorship plans of governments half a world away, but by doing so might wade into dicey diplomatic waters. In a story that examines the promises and perils of this new, unregulated power, TechCrunch journalist Gregory Ferenstein quotes our VP of Human Rights, Enrique Piracés, who explains why non-commercial, open source technology ought to be the baseline for trusted anti-censorship applications.
As hundreds of technologists, businesses, governments, and human rights defenders assemble in San Francisco for the RightsCon technology and human rights conference, our CEO, Jim Fruchterman, and VP of Human Rights, Enrique Piracés, have co-authored a Huffington Post op-ed on human rights and the duty to protect sensitive data. They argue that the “Do No Harm” principle requires social justice advocates to use encryption and other strong security practices.