1
1
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2026-05-20 18:31:18 +00:00

refactor!: Fix all formatting in activism section

This commit is contained in:
2026-05-19 00:16:04 -05:00
parent 7322fedb6e
commit 4a5299a81a
26 changed files with 250 additions and 419 deletions
+19 -71
View File
@@ -508,54 +508,7 @@ a.footnote-ref {
color: var(--md-default-fg-color--light);
}
/* Toolbox Tip Button Next */
.toolbox-tip-button-next {
float: right;
margin-top: 20px;
margin-bottom: 40px;
}
/* Toolbox Tip Quote Box */
.toolbox-quote {
margin-top: 15px !important;
font-family: bagnard !important;
font-size: 1em !important;
font-weight: 400 !important;
background: #9e9e9e1a !important;
}
.toolbox-quote .admonition-title {
background-color: transparent !important;
}
.toolbox-quote-source {
font-family: var(--md-text-font-family) !important;
text-align: right;
font-size: 0.7em !important;
font-weight: 400 !important;
}
.toolbox-quote.quote>.admonition-title.toolbox-quote::before {
transform: rotate(180deg);
}
.toolbox-quote .admonition-title.toolbox-quote::after {
background-color: #9e9e9e;
mask-image: var(--md-admonition-icon--quote);
content: "";
height: 1rem;
mask-position: center;
mask-repeat: no-repeat;
mask-size: contain;
position: absolute;
bottom: .75em;
width: 2rem;
}
/* DPA Directory */
.table-wrapper {
width: min(900px, 100% -3rem);
margin-inline: auto;
}
.dpadirectory-table {
padding: 1rem;
@@ -571,42 +524,35 @@ a.footnote-ref {
/* Column Width - Region */
.dpadirectory-table th:first-child {
min-width: 110px;
width: 110px;
}
/* Column Width - Law */
.dpadirectory-table th:nth-child(2) {
min-width: 140px;
width: 140px;
}
/* Column Width - Abbreviation */
.dpadirectory-table th:nth-child(3) {
min-width: 100px;
width: 100px;
}
/* Column Width - DPA */
.dpadirectory-table th:nth-child(4) {
min-width: 150px;
width: 150px;
}
/* Column Width - Contact */
.dpadirectory-table th:nth-child(5) {
min-width: 85px;
width: 85px;
}
/* Column Width - Complaint */
.dpadirectory-table th:nth-child(6) {
min-width: 110px;
width: 110px;
}
.dpadirectory-table caption, th, td {
padding: 0.8rem;
font-size: 0.65rem;
padding: 1rem;
text-align: left;
}
@@ -623,11 +569,7 @@ a.footnote-ref {
}
.dpadirectory-table th {
border-bottom: 3px solid var(--md-default-fg-color--light);
}
.dpadirectory-table tr {
background: var(--md-default-bg-color--light);
border-bottom: none;
}
.dpadirectory-table tr:nth-of-type(2n) {
@@ -635,12 +577,11 @@ a.footnote-ref {
}
.dpadirectory-table tr {
border: 3px solid transparent;
border-bottom: 0.5px solid var(--md-default-fg-color--light);
border: none;
}
.dpadirectory-table tr:hover {
border: 3px solid var(--md-default-fg-color--light);
border: none;
}
.dpadirectory-table td {
@@ -712,31 +653,38 @@ a.footnote-ref {
}
/* DPA Directory Buttons */
.dpadirectory-button {
color: #000000 !important;
.content .toolbox-button-grid .dpadirectory-button {
a {
color: #000000;
}
svg {
fill: black;
width: 6em;
height: 6em;
}
}
.dpadirectory-button-africa {
.dpadirectory-button-africa a {
background-color: var(--color-dpadirectory-africa);
}
.dpadirectory-button-asia {
.dpadirectory-button-asia a {
background-color: var(--color-dpadirectory-asia);
}
.dpadirectory-button-europe {
.dpadirectory-button-europe a {
background-color: var(--color-dpadirectory-europe);
}
.dpadirectory-button-northamerica {
.dpadirectory-button-northamerica a {
background-color: var(--color-dpadirectory-northamerica);
}
.dpadirectory-button-oceania {
.dpadirectory-button-oceania a {
background-color: var(--color-dpadirectory-oceania);
}
.dpadirectory-button-southamerica {
.dpadirectory-button-southamerica a {
background-color: var(--color-dpadirectory-southamerica);
}
+25 -22
View File
@@ -1,8 +1,8 @@
---
title: "Data Protection Authorities"
description: The DPA Directory is a tool to help you find the principal consumer privacy law in your region, the authority mandated to enforce it, and how to report violations.
#icon: fontawesome/solid/address-card
cover: banner-activism-dpadirectory.webp
sidebar:
hide: true
---
<small>Last update: 2026-03-30</small>
@@ -12,10 +12,9 @@ The **Data Protection Authority** (DPA) **Directory** is a tool to help you find
Additionally, this table provides information about each law, authority, contact information for questions, and a link to place a complaint for violation of the law with each authority.
> [!TIP]
> **More information on privacy laws and reporting violations**
> For more information on how to find a specific privacy law that might not be listed here, and what to look for when reading it, consult the Privacy Activist Toolbox tip to [Know Your Privacy Laws](../../toolbox/tip-know-your-privacy-laws/).
>
> - For more information on how to find a specific privacy law that might not be listed here, and what to look for when reading it, consult the Privacy Activist Toolbox tip to [Know Your Privacy Laws](../../toolbox/tip-know-your-privacy-laws/).
> - For more information on how to proceed when reporting a privacy law violation, consult the Privacy Activist Toolbox tip to [Report Privacy Violations](../../toolbox/tip-report-privacy-violations/).
> For more information on how to proceed when reporting a privacy law violation, consult the Privacy Activist Toolbox tip to [Report Privacy Violations](../../toolbox/tip-report-privacy-violations/).
## Scope and limitations
@@ -29,28 +28,32 @@ Additionally, this table provides information about each law, authority, contact
- Remember that your data *could* be protected by a privacy regulation that isn't listed here. This will depend on the region, circumstances, and type of data involved.
> [!WARNING]
> **Privacy warning**
>
> [!CAUTION]
> When sharing personal information with a DPA, keep in mind this information could be shared with the subject of the complaint, and/or displayed publicly. Make sure to consult your DPA's privacy notice first, or ask anonymously how your complaint data might be shared before sending any sensitive information.
>
> For example, the DPA for the state of Oregon in the United States specifies that: \"Any information submitted to this form is subject to Oregons Public Records Law. You may choose not to include personally identifiable data that you do not wish to be subject to public records requests.\"
## The Directory
<div class="toolbox-button-grid" markdown>
<div class="toolbox-button-grid hx:mt-12" markdown>
[Africa](#africa){ .toolbox-button .dpadirectory-button .dpadirectory-button-africa }
[{{< icon "fontawesome-solid-earth-africa" >}} Africa](#africa)
{ .dpadirectory-button .dpadirectory-button-africa }
[Asia](#asia){ .toolbox-button .dpadirectory-button .dpadirectory-button-asia }
[{{< icon "fontawesome-solid-earth-asia" >}} Asia](#asia)
{ .dpadirectory-button .dpadirectory-button-asia }
[Europe](#europe){ .toolbox-button .dpadirectory-button .dpadirectory-button-europe }
[{{< icon "fontawesome-solid-earth-europe" >}} Europe](#europe)
{ .dpadirectory-button .dpadirectory-button-europe }
[North America](#north-america){ .toolbox-button .dpadirectory-button .dpadirectory-button-northamerica }
[{{< icon "fontawesome-solid-earth-americas" >}} North America](#north-america)
{ .dpadirectory-button .dpadirectory-button-northamerica }
[Oceania](#oceania){ .toolbox-button .dpadirectory-button .dpadirectory-button-oceania }
[{{< icon "fontawesome-solid-earth-oceania" >}} Oceania](#oceania)
{ .dpadirectory-button .dpadirectory-button-oceania }
[South America](#south-america){ .toolbox-button .dpadirectory-button .dpadirectory-button-southamerica }
[{{< icon "fontawesome-solid-earth-americas" >}} South America](#south-america)
{ .dpadirectory-button .dpadirectory-button-southamerica }
</div>
@@ -207,7 +210,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### Asia
@@ -374,7 +377,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### Europe
@@ -719,7 +722,7 @@ Additionally, this table provides information about each law, authority, contact
<td data-cell="Complaint" role="cell"><a href="https://autoriteitpersoonsgegevens.nl/en/submitting-a-tip-off-or-a-complaint-to-the-ap" target="_blank">Complaint Link</a></td>
</tr>
<!-- North Macedonia -->
<!-- North Macedonia -->
<tr role="row">
<td data-cell="Region" role="rowheader">North Macedonia</td>
<td data-cell="Law" role="cell"><a href="https://azlp.mk/wp-content/uploads/2022/12/lpdp_2020.pdf" target="_blank">
@@ -933,7 +936,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### North America
@@ -1310,7 +1313,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### Oceania
@@ -1365,7 +1368,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
### South America
@@ -1462,7 +1465,7 @@ Additionally, this table provides information about each law, authority, contact
</table>
</div>
<button class="toolbox-button-top">[Back to tables menu](#the-directory)</button>
<br>
## Additional resources
@@ -13,7 +13,7 @@ Here's how you can **integrate kindness in your work**, while being relentless w
Whenever you talk with individuals in your privacy work, make sure to **stay kind and calm** when communicating with them.
Perhaps you are posting on social media, replying to posts or emails, answering questions after a talk, or writing advices on the best privacy tools to use. No matter the context, when communicating with individuals, ==kindness is your greatest asset== to persuade and bring more people to the movement.
Perhaps you are posting on social media, replying to posts or emails, answering questions after a talk, or writing advices on the best privacy tools to use. No matter the context, when communicating with individuals, <mark>kindness is your greatest asset</mark> to persuade and bring more people to the movement.
Sadly, it's not rare to see replies to beginners' posts by more advanced peers online that are humiliating and berating their uninformed or misinformed questions. People don't learn and don't change their mind by being yelled at. Aggression isn't an effective way to communicate.
@@ -35,7 +35,7 @@ Whether you are trying to report a privacy-abusive corporate practice, push back
Respect and politeness are vital here as well. Violence or threat to representatives of these institutions would only be detrimental to your goals. However, patience shouldn't be extended to privacy-abusive organizations that aren't demonstrating any realistic intentions to improve.
==To bring significant changes to institutions and corporations, your message must be loud and clear.==
<mark>To bring significant changes to institutions and corporations, your message must be loud and clear.</mark>
You should try to bring as many people and allied organizations to your cause, and be as loud as possible in the media. Your campaign must be powerful enough to grab media's attention, and to send a firm message that the people want change and will not back down.
@@ -23,15 +23,15 @@ Ethically, it's also just the right thing to do, and should be the norm everywhe
Anytime you are using images, audio, or any other sensorial elements in your advocacy work, you should always make sure to follow best practices to ensure your content will be accessible to people with visual, auditory, or other sensorial impairments.
- [x] If you use images in your websites or social media posts, make sure to always add proper [alt text](https://abilitynet.org.uk/resources/digital-accessibility/five-golden-rules-compliant-alt-text) to describe the information the image represents. Keep in mind visitors that might be using a [screen reader](https://en.wikipedia.org/wiki/Screen_reader).
- If you use images in your websites or social media posts, make sure to always add proper [alt text](https://abilitynet.org.uk/resources/digital-accessibility/five-golden-rules-compliant-alt-text) to describe the information the image represents. Keep in mind visitors that might be using a [screen reader](https://en.wikipedia.org/wiki/Screen_reader).
- [x] When designing websites, posters, flyers, or zines, keep in mind [visual accessibility](https://webdesign.tutsplus.com/accessibility-basics-designing-for-visual-impairment--cms-27634a) for people with blindness, low vision, color blindness, and other visual impairments.
- When designing websites, posters, flyers, or zines, keep in mind [visual accessibility](https://webdesign.tutsplus.com/accessibility-basics-designing-for-visual-impairment--cms-27634a) for people with blindness, low vision, color blindness, and other visual impairments.
- [x] Be careful to refrain from using designs and videos with [flashing lights](https://developer.mozilla.org/en-US/docs/Web/Accessibility/Guides/Seizure_disorders), or display proper warning if you do. Flashing or flickering light effects, and even certain high-contrast static images, can trigger seizures in people with photosensitive epilepsy.
- Be careful to refrain from using designs and videos with [flashing lights](https://developer.mozilla.org/en-US/docs/Web/Accessibility/Guides/Seizure_disorders), or display proper warning if you do. Flashing or flickering light effects, and even certain high-contrast static images, can trigger seizures in people with photosensitive epilepsy.
- [x] If you use [audio material](https://www.w3.org/WAI/people-use-web/abilities-barriers/auditory/) in your advocacy, try to include captions or transcripts in your content for people with auditory impairments. If you organize a larger event with speakers, try to see if you could hire a sign language interpreter.
- If you use [audio material](https://www.w3.org/WAI/people-use-web/abilities-barriers/auditory/) in your advocacy, try to include captions or transcripts in your content for people with auditory impairments. If you organize a larger event with speakers, try to see if you could hire a sign language interpreter.
- [x] Whenever you develop content or organize events, always be mindful of people with sensory impairments or [sensory sensitivities](https://accessforallllc.com/sensory-and-cognitive-accessibility/).
- Whenever you develop content or organize events, always be mindful of people with sensory impairments or [sensory sensitivities](https://accessforallllc.com/sensory-and-cognitive-accessibility/).
### Website accessibility
@@ -39,11 +39,11 @@ If you develop a website in your privacy work, make sure to follow the internati
This is very important to ensure readers using assistive devices will be able to access your content, and that people with visual impairments will not struggle to access your content.
- [x] Get familiar with the World Wide Web Consortium (W3C) [international Web standards](https://www.w3.org/WAI/standards-guidelines/). These standards have been reviewed for accessibility support by the Accessible Platform Architectures ([APA](https://www.w3.org/WAI/about/groups/apawg/)) Working Group.
- Get familiar with the World Wide Web Consortium (W3C) [international Web standards](https://www.w3.org/WAI/standards-guidelines/). These standards have been reviewed for accessibility support by the Accessible Platform Architectures ([APA](https://www.w3.org/WAI/about/groups/apawg/)) Working Group.
- [x] Use a [web accessibility evaluation tool](https://www.w3.org/WAI/test-evaluate/tools/list/) to verify that your web content meets accessibility guidelines, or otherwise make sure to follow the [Web Content Accessibility Guidelines](https://www.pivotalaccessibility.com/2024/11/how-to-perform-a-web-accessibility-audit-step-by-step-guide/) (WCAG).
- Use a [web accessibility evaluation tool](https://www.w3.org/WAI/test-evaluate/tools/list/) to verify that your web content meets accessibility guidelines, or otherwise make sure to follow the [Web Content Accessibility Guidelines](https://www.pivotalaccessibility.com/2024/11/how-to-perform-a-web-accessibility-audit-step-by-step-guide/) (WCAG).
- [x] If your organization can afford it, hire a [web accessibility consultant](https://accessibilityinnovations.com/blogs/web-accessibility-consultant/).
- If your organization can afford it, hire a [web accessibility consultant](https://accessibilityinnovations.com/blogs/web-accessibility-consultant/).
### Global accessibility
@@ -51,105 +51,105 @@ Whether you write a post, an article, or a whole website in English, keep in min
People from all around the world will be able to read or watch your English content, many who don't speak English as their first language. Don't assume that your audience is only coming from your own country or region. This is a good thing, by the way! ==The battle for privacy rights must be global now.==
- [x] Be careful not to use too many references that are unique to your own country or region. If you do, make sure to explain what it is for people from other regions.
- Be careful not to use too many references that are unique to your own country or region. If you do, make sure to explain what it is for people from other regions.
- [x] When talking about issues related to politics, make sure to specify what governmental entities are, and explain any special rights your country has (don't just name them). That way, outsiders will be able to understand and support your cause as well, even if perhaps they aren't directly impacted by this issue at the moment.
- When talking about issues related to politics, make sure to specify what governmental entities are, and explain any special rights your country has (don't just name them). That way, outsiders will be able to understand and support your cause as well, even if perhaps they aren't directly impacted by this issue at the moment.
- [x] Don't assume everyone knows all the popular internet acronyms such as DIY (Do It Yourself) or IIRC (If I Recall Correctly). These acronyms are very challenging for non-native English speakers. When using acronyms in your content, always explain the full expression in parentheses at least once, or better yet, simply use whole words instead.
- Don't assume everyone knows all the popular internet acronyms such as DIY (Do It Yourself) or IIRC (If I Recall Correctly). These acronyms are very challenging for non-native English speakers. When using acronyms in your content, always explain the full expression in parentheses at least once, or better yet, simply use whole words instead.
- [x] When inviting people to an event, consider that people from other time zones might be reading your invitation. If your event is online, always specify the [time zone](https://www.timeanddate.com/time/map/) for the announced time. If your event is in person, always specify the whole location with the country and region ([do *not* just name the city](https://www.roughmaps.com/destinations/20-places-around-the-world-that-share-the-same-name/22)).
- When inviting people to an event, consider that people from other time zones might be reading your invitation. If your event is online, always specify the [time zone](https://www.timeanddate.com/time/map/) for the announced time. If your event is in person, always specify the whole location with the country and region ([do *not* just name the city](https://www.roughmaps.com/destinations/20-places-around-the-world-that-share-the-same-name/22)).
### Physical accessibility
When organizing events and meetups in person, it's essential to keep in mind physical accessibility for people with mobility challenges of all kind. This includes accessibility around the venue, but also on the journey to the venue.
- [x] Ensure the venue you select is [accessible for people using wheelchairs](https://sites.augsburg.edu/events/policies/accessible-events/accessible-event-planning-guide/). Check that there is access to an elevator if it's on an upper floor, that there are access ramps and automatic doors if required, and that doorways and hallways are wide enough to accommodate a wheelchair.
- Ensure the venue you select is [accessible for people using wheelchairs](https://sites.augsburg.edu/events/policies/accessible-events/accessible-event-planning-guide/). Check that there is access to an elevator if it's on an upper floor, that there are access ramps and automatic doors if required, and that doorways and hallways are wide enough to accommodate a wheelchair.
- [x] Make certain that there will be enough comfortable seating for your guests, and that seating and eating areas will be accessible to guests using wheelchairs or other mobility aids.
- Make certain that there will be enough comfortable seating for your guests, and that seating and eating areas will be accessible to guests using wheelchairs or other mobility aids.
- [x] Check that there are wheelchair-accessible bathrooms nearby.
- Check that there are wheelchair-accessible bathrooms nearby.
- [x] Evaluate the accessibility of the transit options available to reach the venue you select, including specialized transits for people who are using wheelchairs, or other types of mobility aids. Publish a map of the transit accesses around your venue.
- Evaluate the accessibility of the transit options available to reach the venue you select, including specialized transits for people who are using wheelchairs, or other types of mobility aids. Publish a map of the transit accesses around your venue.
- [x] Research if your venue has access to parking and accessible parking spots. Publish this information with your invitation.
- Research if your venue has access to parking and accessible parking spots. Publish this information with your invitation.
- [x] Verify the venue you select is accessible to people with visual or auditory impairments. For example, check if elevators are marked with Braille or raised letters, and make sure that hosts are informed on how to communicate with guests who are deaf or hard of hearing.
- Verify the venue you select is accessible to people with visual or auditory impairments. For example, check if elevators are marked with Braille or raised letters, and make sure that hosts are informed on how to communicate with guests who are deaf or hard of hearing.
### Health accessibility
In-person accessibility isn't just about mobility. Accessibility is also important to consider for a variety of health conditions, including people who are vulnerable to infectious diseases, or require other accommodations related to their health.
- [x] Designate a trained person responsible for accessibility, and share their contact information in advance. That way, people will be able to contact this person if they have any questions before or during the event.
- Designate a trained person responsible for accessibility, and share their contact information in advance. That way, people will be able to contact this person if they have any questions before or during the event.
- [x] Encourage your participants to wear a mask, and try to select a venue with adequate ventilation to minimize the risks for people who are [vulnerable to respiratory infections](https://health.clevelandclinic.org/superspreader-events). If food is served, try to select a venue with an area allowing to consume food outside.
- Encourage your participants to wear a mask, and try to select a venue with adequate ventilation to minimize the risks for people who are [vulnerable to respiratory infections](https://health.clevelandclinic.org/superspreader-events). If food is served, try to select a venue with an area allowing to consume food outside.
- [x] Make sure to bring a few boxes of [protective face masks](https://health.clevelandclinic.org/do-masks-work) to your event that guests can use for free. That way, people who might be at risk in dense crowd can decide to wear a mask once they arrived, or if they forgot to bring their own.
- Make sure to bring a few boxes of [protective face masks](https://health.clevelandclinic.org/do-masks-work) to your event that guests can use for free. That way, people who might be at risk in dense crowd can decide to wear a mask once they arrived, or if they forgot to bring their own.
- [x] Try to prepare an area in your venue, or near your venue, where people can rest comfortably in a [quiet space](https://eventwell.org/ensuring-inclusive-events-the-importance-of-supervising-quiet-spaces-for-neurodivergent-attendees-and-vulnerable-adults/), if they feel tired or overstimulated during the event.
- Try to prepare an area in your venue, or near your venue, where people can rest comfortably in a [quiet space](https://eventwell.org/ensuring-inclusive-events-the-importance-of-supervising-quiet-spaces-for-neurodivergent-attendees-and-vulnerable-adults/), if they feel tired or overstimulated during the event.
- [x] Promote a [scent-free](https://www.chrc-ccdp.gc.ca/resources/publications/environmental-sensitivities-and-scent-free-policies) environment to make your event welcoming to people who have scent allergies, environmental sensibilities, or other health conditions that can be affected by scents.
- Promote a [scent-free](https://www.chrc-ccdp.gc.ca/resources/publications/environmental-sensitivities-and-scent-free-policies) environment to make your event welcoming to people who have scent allergies, environmental sensibilities, or other health conditions that can be affected by scents.
- [x] Provide training for hosts and event volunteers to make sure they are aware of available accommodations, and can give helpful information upon request.
- Provide training for hosts and event volunteers to make sure they are aware of available accommodations, and can give helpful information upon request.
### Dietary accessibility
If your event provides meals, snacks, or drinks, make sure to prepare well in-advance to consider the potential dietary restrictions of your guests.
- [x] List clearly what types of food and drinks with be served (or available) at the event.
- List clearly what types of food and drinks with be served (or available) at the event.
- [x] Provide contact information for people to reach out in advance if they have special dietary requirements or requests that have not already been addressed.
- Provide contact information for people to reach out in advance if they have special dietary requirements or requests that have not already been addressed.
- [x] Try to provide food and beverages that will cover a variety of dietary needs, such as vegan, nut-free, gluten-free, lactose-free, alcohol-free, or low-sugar options.
- Try to provide food and beverages that will cover a variety of dietary needs, such as vegan, nut-free, gluten-free, lactose-free, alcohol-free, or low-sugar options.
- [x] If you host a large event, consider keeping a few [epinephrine autoinjectors](https://greatergood.com/blogs/news/epinephrine-public-areas) available on site in your emergency kit, in case anyone experiences a dangerous allergic reaction.
- If you host a large event, consider keeping a few [epinephrine autoinjectors](https://greatergood.com/blogs/news/epinephrine-public-areas) available on site in your emergency kit, in case anyone experiences a dangerous allergic reaction.
- [x] Make sure guests will have access to free and clean water, especially if your event is scheduled during a heat wave.
- Make sure guests will have access to free and clean water, especially if your event is scheduled during a heat wave.
- [x] Ensure there is a quiet and private room available for anyone who might be breastfeeding.
- Ensure there is a quiet and private room available for anyone who might be breastfeeding.
- [x] Provide all this information in advance with your invitation, so that guests can evaluate properly if the event is accessible to them.
- Provide all this information in advance with your invitation, so that guests can evaluate properly if the event is accessible to them.
### Safety accessibility
Safety is also an important aspect of accessibility. Everyone has a unique threat model, and, for a variety of reasons, some people might be at an elevated risk to their physical safety when going to and participating in an event in person.
- [x] Implement a [Code of Conduct](https://oshwa.org/resources/how-to-write-a-code-of-conduct/) for your event or community. Ensure there are clear channels to report bad behaviors, and that your Code of Conduct is enforced properly.
- Implement a [Code of Conduct](https://oshwa.org/resources/how-to-write-a-code-of-conduct/) for your event or community. Ensure there are clear channels to report bad behaviors, and that your Code of Conduct is enforced properly.
- [x] Verify that access to the bathrooms is safe and well lit at your venue.
- Verify that access to the bathrooms is safe and well lit at your venue.
- [x] Make sure the venue you select is safe to access by transits or cars, and that the nearest parking lot or bus stop is well lit if the event ends late at night.
- Make sure the venue you select is safe to access by transits or cars, and that the nearest parking lot or bus stop is well lit if the event ends late at night.
- [x] If your venue is located in an area that might be more dangerous at night, consider setting up an [accompaniment service](https://www.concordia.ca/campus-life/security/services/safe-walk.html) with a set of volunteers offering to walk guests safely back to their bus stop, for example. Make this information known in advance.
- If your venue is located in an area that might be more dangerous at night, consider setting up an [accompaniment service](https://www.concordia.ca/campus-life/security/services/safe-walk.html) with a set of volunteers offering to walk guests safely back to their bus stop, for example. Make this information known in advance.
- [x] Implement a clear [Photo Policy](https://events.ccc.de/congress/2025/infos/privacy.html#photo-policy) for your event, and forbid all nonconsensual photos. You can also provide "No Photos" or "Photos OK" stickers, buttons, or lanyards for guests upon arrival. That way, guests can explicitly opt out of being photographed at your event if they prefer not to. If your event hired an official photographer, make sure they are careful to never take photos that include people wearing these badges. Ideally, limit event photos to a minimum, and only take photos of people after asking for their explicit consent first.
- Implement a clear [Photo Policy](https://events.ccc.de/congress/2025/infos/privacy.html#photo-policy) for your event, and forbid all nonconsensual photos. You can also provide "No Photos" or "Photos OK" stickers, buttons, or lanyards for guests upon arrival. That way, guests can explicitly opt out of being photographed at your event if they prefer not to. If your event hired an official photographer, make sure they are careful to never take photos that include people wearing these badges. Ideally, limit event photos to a minimum, and only take photos of people after asking for their explicit consent first.
### Financial accessibility
Another aspect of accessibility that is often overlooked is financial accessibility. Sadly, many people are unable to access certain events due to financial limitations, even if it would be very helpful to them to network and meet privacy advocacy peers. When you organize an event, be mindful of providing options to increase financial accessibility.
- [x] Try to keep your events free or partly free whenever possible, while remaining vigilant about accepting money from [financial sponsors](https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/#donations-event-sponsorships-and-other-revenues) that could be in contradiction with your privacy values.
- Try to keep your events free or partly free whenever possible, while remaining vigilant about accepting money from [financial sponsors](https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/#donations-event-sponsorships-and-other-revenues) that could be in contradiction with your privacy values.
- [x] Reserve a quantity of free tickets for people with more severe limitations.
- Reserve a quantity of free tickets for people with more severe limitations.
- [x] Offer discounts for students or unemployed peers.
- Offer discounts for students or unemployed peers.
- [x] Create opportunities for part-time volunteering, where people can offer to help a little, then participate in the rest of the event for free.
- Create opportunities for part-time volunteering, where people can offer to help a little, then participate in the rest of the event for free.
- [x] Provide contact information for people who would like to request free or cheaper access, or discuss their unique situation with you.
- Provide contact information for people who would like to request free or cheaper access, or discuss their unique situation with you.
### Beginners accessibility
[Welcoming beginners](../tip-welcome-beginners/) is crucial in all the work we do. To keep your content and events accessible to beginners, it's important to be mindful of the language you use, the ways you present content, and the places where you promote your events.
- [x] Always explain acronyms with whole words before only using the letters only.
- Always explain acronyms with whole words before only using the letters only.
- [x] Be careful when using jargon, try to be explicit and use simple words and analogies.
- Be careful when using jargon, try to be explicit and use simple words and analogies.
- [x] Beware of gatekeeping. Try to stay aware of newcomers that might be quiet or isolated from the group. [Be inclusive](../tip-keep-your-posts-and-community-inclusive/) and invite them to participate.
- Beware of gatekeeping. Try to stay aware of newcomers that might be quiet or isolated from the group. [Be inclusive](../tip-keep-your-posts-and-community-inclusive/) and invite them to participate.
- [x] Specify that your event welcomes beginners.
- Specify that your event welcomes beginners.
- [x] Be mindful of advertising your event in places where potential newcomers might see it. Be careful about not inviting people only from places reaching out to people who are already part of the privacy community.
- Be mindful of advertising your event in places where potential newcomers might see it. Be careful about not inviting people only from places reaching out to people who are already part of the privacy community.
## More resources
@@ -33,8 +33,7 @@ To establish a threat model, ask the following questions:
Ask, rinse, and repeat for each type of information. The answers to these questions will be unique for each person or organization. This is their unique threat model.
<details class="danger" markdown>
<summary>Example scenario: Threat of stalking</summary>
{{< details title="Example scenario: Threat of stalking" closed="true" >}}
**Needs:** Alice is a young celebrity sharing a lot of information about herself on social media. As part of her work, she has to be able to share photos of herself, her legal name, some of her travel information, and details about her personal life.
@@ -44,10 +43,9 @@ Ask, rinse, and repeat for each type of information. The answers to these questi
**Information to protect and solutions:** Everywhere that Alice is required to share her home address must be protected. She should use a PO box every time her personal address isn't absolutely necessary. She should make sure to only share her address with trusted people that are informed about this danger. And she should inspect all of her photos and metadata carefully, to make sure her location is never precisely [revealed](https://www.privacyguides.org/articles/2025/03/25/privacy-means-safety/#victims-of-stalkers).
</details>
{{< /details >}}
<details class="danger" markdown>
<summary>Example scenario: Surveillance Capitalism</summary>
{{< details title="Example scenario: Surveillance Capitalism" closed="true" >}}
**Needs:** Bob feels uncomfortable with companies using his information without his consent. He doesn't trust what they might do with this information later, or whom they might sell it to. He is especially worried about how companies and governments might use facial recognition with him.
@@ -57,9 +55,9 @@ Ask, rinse, and repeat for each type of information. The answers to these questi
**Information to protect and solutions:** To prevent this, Bob should not post any photos of his face online. He should make sure to only choose profile pictures that don't show his face for social media, and inspect any other photos posted to make sure his face doesn't show up on reflective surfaces. He should also inform his friends and family that he doesn't want photos of himself to be posted online, and he should protect his phone camera roll and cloud storage from getting [scanned](https://www.forbes.com/sites/zakdoffman/2026/01/15/google-upgrade-starts-scanning-all-your-photos-be-very-careful/) by remotely controlled AI. Bob should also opt out of any online platforms demanding a facial scan or photo ID in order to [verify his age](https://www.privacyguides.org/videos/2025/08/15/age-verification-is-a-privacy-nightmare/) or identity.
</details>
{{< /details >}}
## Respect people's choices when it comes to their own privacy, even if they are different from yours
## Respect people's choices when it comes to their own privacy
When advising others on data privacy, it's easy to get carried away and forget that other people might have different threat models from our own.
@@ -23,19 +23,19 @@ If we only think of *individual* solutions when a corporation exploits our data,
Here are a few questions you can ask yourself whenever a new privacy issue arises in the news, to help expand your perspective beyond individual solutions:
- [ ] What are potential mitigation solutions, and who will realistically be able to use them?
- What are potential mitigation solutions, and who will realistically be able to use them?
- [ ] What will happen to the people who don't have the resources (in time, in money, in knowledge) to protect themselves individually?
- What will happen to the people who don't have the resources (in time, in money, in knowledge) to protect themselves individually?
- [ ] Will this issue impact some communities more than others? Who will this affect the most negatively?
- Will this issue impact some communities more than others? Who will this affect the most negatively?
- [ ] What will be the impact for the people who *cannot* protect themselves individually?
- What will be the impact for the people who *cannot* protect themselves individually?
- [ ] What will be the impact for the people who *can* protect themselves individually?
- What will be the impact for the people who *can* protect themselves individually?
- [ ] Are there other solutions that could be adopted to fight this issue for *everyone* at once, without relying on *individual* harm mitigations.
- Are there other solutions that could be adopted to fight this issue for *everyone* at once, without relying on *individual* harm mitigations.
- [ ] How can we fight against this issue in a way that will benefit *everyone* impacted, including the people who aren't even aware of the issue?
- How can we fight against this issue in a way that will benefit *everyone* impacted, including the people who aren't even aware of the issue?
## More resources
@@ -15,12 +15,8 @@ Here's what you can do to become a privacy activist:
Being a privacy activist means actively taking part in the movement to protect and improve fundamental privacy rights for everyone.
<div class="admonition quote toolbox-quote" markdown>
<p class="admonition-title toolbox-quote">We want to help redefine 'activist' to a term that can include anyone who wants to work collectively to create social change. You don't have to be an expert, and you don't have to spend every waking minute trying to do 'activism'. You just have to be a person who wants to create change with other people.</p>
<p class="toolbox-quote-source" markdown>Source: [*Activist Handbook*](https://activisthandbook.org/theory/what-is-activism#our-response-take-the-%E2%80%98expert%E2%80%99-out-of-%E2%80%98activism%E2%80%99)</p>
</div>
> We want to help redefine 'activist' to a term that can include anyone who wants to work collectively to create social change. You don't have to be an expert, and you don't have to spend every waking minute trying to do 'activism'. You just have to be a person who wants to create change with other people.
> <small>— Source: [*Activist Handbook*](https://activisthandbook.org/theory/what-is-activism#our-response-take-the-%E2%80%98expert%E2%80%99-out-of-%E2%80%98activism%E2%80%99)</small>
There are many ways to actively engage in the privacy rights movement.
@@ -32,15 +28,15 @@ Perhaps you like to write, to draw, to record videos, or to build applications?
Ask yourself these questions:
- [ ] What do I enjoy doing that could also be useful to the cause?
- What do I enjoy doing that could also be useful to the cause?
- [ ] What are my interests? What do I want to learn more about?
- What are my interests? What do I want to learn more about?
- [ ] Which skills and social networks do I already have?
- Which skills and social networks do I already have?
- [ ] How much time do I have to contribute each week?
- How much time do I have to contribute each week?
- [ ] Who around me shares my privacy values and could be an ally?
- Who around me shares my privacy values and could be an ally?
## Things you can do to engage, boost, and contribute
@@ -78,12 +74,8 @@ Here are some ideas of what you can do to become a privacy activist in your comm
</div>
<div class="admonition quote toolbox-quote" markdown>
<p class="admonition-title toolbox-quote">People who do activism reclaim their own agency in deciding what kind of world they want to live in.</p>
<p class="toolbox-quote-source" markdown>Source: [*Activist Handbook*](https://activisthandbook.org/theory/what-is-activism#personal-is-political)</p>
</div>
> People who do activism reclaim their own agency in deciding what kind of world they want to live in.
> <small>— Source: [*Activist Handbook*](https://activisthandbook.org/theory/what-is-activism#personal-is-political)</small>
## More resources
@@ -17,7 +17,7 @@ Moving away from large commercial platforms can be a complex process, but it's a
Not only this allows us to stop feeding a surveillance machine that grows ever hungry for data every month, but it gives us an opportunity to build much more resilient communities, and support platforms that aren't devouring peoples' privacy.
Many are reluctant to quit commercial social media, despite the many issues that have only become worse in the past few years. It's not always easy to leave a place that feels like home and rebuild elsewhere. However, ==when the house is on fire, it's time to leave.==
Many are reluctant to quit commercial social media, despite the many issues that have only become worse in the past few years. It's not always easy to leave a place that feels like home and rebuild elsewhere. However, <mark>when the house is on fire, it's time to leave.</mark>
The more we produce content, and the more we engage with our community on these privacy-invasive platforms, the more we contribute to sustain these predatory corporations making money and thriving at the expense of our followers' data.
@@ -49,7 +49,7 @@ Perhaps you are already convinced to leave exploitive social media platforms for
One such network is the [**Fediverse**](https://en.wikipedia.org/wiki/Fediverse), a decentralized collection of interconnected applications and servers that can communicate with each other.
The Fediverse was built from a desire for social connection, not from greed for profits. ==This is a fundamental difference that leads to substantial benefits.== Most servers that are part of the Fediverse network are hosted by volunteers who simply want to support their communities.
The Fediverse was built from a desire for social connection, not from greed for profits. <mark>This is a fundamental difference that leads to substantial benefits.</mark> Most servers that are part of the Fediverse network are hosted by volunteers who simply want to support their communities.
There are many applications that can connect to the Fediverse, the most famous probably being the microblogging platform [Mastodon](https://joinmastodon.org/). But you could also choose to join an app more similar to Instagram with [Pixelfed](https://pixelfed.org/), or more similar to YouTube with [PeerTube](https://joinpeertube.org/). They all connect together!
@@ -69,27 +69,27 @@ We must work together to develop and promote a culture of consent around data co
Here are a few practices to improve our culture surrounding data privacy that you can adopt yourself, and help promote in your advocacy work:
- [x] Never publish photos or information about children online.
- Never publish photos or information about children online.
- [x] Don't post pictures of others online without their explicit consent.
- Don't post pictures of others online without their explicit consent.
- [x] If posting photos that include others cannot be avoided, blur the faces of non-consenting people before publication.
- If posting photos that include others cannot be avoided, blur the faces of non-consenting people before publication.
- [x] Blur any visible vehicle license plates before publishing photos.
- Blur any visible vehicle license plates before publishing photos.
- [x] Avoid taking screenshots of other people's posts without their consent (as this prevents them from exercising their right to delete).
- Avoid taking screenshots of other people's posts without their consent (as this prevents them from exercising their right to delete).
- [x] Never share the location or contact information of someone without their explicit consent.
- Never share the location or contact information of someone without their explicit consent.
- [x] Block external applications from accessing the contact information of others (e.g. don't allow the Facebook app to access your contacts).
- Block external applications from accessing the contact information of others (e.g. don't allow the Facebook app to access your contacts).
- [x] Be mindful of how one's computer or phone stores and records other people's information. Never use an application that scans content with potential information about others, such as AI note-takers, AI assistants, or applications like Microsoft's Recall.
- Be mindful of how one's computer or phone stores and records other people's information. Never use an application that scans content with potential information about others, such as AI note-takers, AI assistants, or applications like Microsoft's Recall.
- [x] Never share the files of others with a third-party person or application without their prior permission.
- Never share the files of others with a third-party person or application without their prior permission.
- [x] Unplug smart devices equipped with a microphone or camera at home before any guests enter. If this isn't possible for some reason, then inform your guests about these devices *before* they enter your home, and *before* the device collects any information about them.
- Unplug smart devices equipped with a microphone or camera at home before any guests enter. If this isn't possible for some reason, then inform your guests about these devices *before* they enter your home, and *before* the device collects any information about them.
- [x] Never use devices like Meta's Ray-Ban glasses, i.e. devices equipped with a microphone and/or camera that might record others without their consent.
- Never use devices like Meta's Ray-Ban glasses, i.e. devices equipped with a microphone and/or camera that might record others without their consent.
## More resources
@@ -19,7 +19,7 @@ When people with different lived experiences and identities join our group, it e
When people from different localities join our group, this helps us to regionalize our content and communication to make it accessible to people all around the world, and expand our network. And when people with different mentalities join our group, it helps us to reach out to people with different ways of thinking more easily.
==The more diverse is a team, the more resources it has to understand and support a diverse population of people== interested (or potentially interested) in privacy rights.
<mark>The more diverse is a team, the more resources it has to understand and support a diverse population of people</mark> interested (or potentially interested) in privacy rights.
Inclusivity allows diversity to thrive, and diversity will make it easier for your group to be inclusive.
@@ -21,11 +21,7 @@ Organizations that meet the data subject's local privacy law criteria are legall
There are a lot of nuances and regional variations to this, but in general you should focus on *where* the data subject is residing.
<details class="hx:last-of-type:mb-0 hx:rounded-lg hx:bg-neutral-50 hx:dark:bg-neutral-800 hx:p-2 hx:mt-4 hx:group" open>
<summary class="hx:flex hx:items-center hx:cursor-pointer hx:select-none hx:list-none hx:p-1 hx:rounded-sm hx:transition-colors hx:hover:bg-gray-100 hx:dark:hover:bg-neutral-800 hx:before:mr-1 hx:before:inline-block hx:before:transition-transform hx:before:content-[''] hx:dark:before:invert hx:rtl:before:rotate-180 hx:group-open:before:rotate-90">
<strong class="hx:text-lg">What is a data subject?</strong>
</summary>
<div class="hx:p-2 hx:overflow-hidden">
{{< details title="What is a data subject?" >}}
Different laws might use different terms for this. Sometimes, a regulation might simply refer to a *person*, an *individual*, a *consumer*, a *patient*, or a *customer*.
@@ -33,8 +29,7 @@ Other times, the equivalent expression used will be a *data subject*.
A data subject is simply anyone from whom personal information is collected by an organization. **Data subject** will be used as an umbrella term on this page.
</div>
</details>
{{< /details >}}
## Finding your local regulations
@@ -17,7 +17,7 @@ There are many styles and scales of leadership. It could mean starting small by
Regardless of the scale, it's important to become a *good* leader to lift your community up, which will benefit the whole movement.
Becoming a positive leader in your community doesn't mean running everything, and it doesn't mean being the only one taking decisions while telling others what to do either. First and foremost, ==it means supporting and inspiring people== to become the best privacy advocates they can be.
Becoming a positive leader in your community doesn't mean running everything, and it doesn't mean being the only one taking decisions while telling others what to do either. First and foremost, <mark>it means supporting and inspiring people</mark> to become the best privacy advocates they can be.
## Supporting others
@@ -25,12 +25,8 @@ Being a good leader is primarily being a good listener. A good leader will be at
A good leader maximizes the activism strength and energy of each member. This allows the community to thrive, and multiplies the positive impact of everyone's effort.
<div class="admonition quote toolbox-quote" markdown>
<p class="admonition-title toolbox-quote">Good leaders are the key to community organizing. They do not tell other people what to do, but help others to take charge. They do not grab center stage, but nudge others into the limelight.</p>
<p class="toolbox-quote-source" markdown>Source: [The Citizen's Handbook](https://citizenshandbook.org/1_08_lead.html)</p>
</div>
> Good leaders are the key to community organizing. They do not tell other people what to do, but help others to take charge. They do not grab center stage, but nudge others into the limelight.
> <small>— Source: [The Citizen's Handbook](https://citizenshandbook.org/1_08_lead.html)</small>
## Keys to positive leadership
@@ -40,27 +36,27 @@ A good conductor ensures that each part is played in harmony with each other, to
Here are a few tips that can help you become a positive leader in your community:
- [x] **Learn to delegate work** and split-up tasks. Do not try to do it all by yourself. Delegating and trusting others to do the work will also help prevent activism burnout.
- **Learn to delegate work** and split-up tasks. Do not try to do it all by yourself. Delegating and trusting others to do the work will also help prevent activism burnout.
- [x] **Trust the members of your group** according to their unique skill sets, and reach out to them when their [unique expertise](../tip-value-allies-with-complementary-expertise/) or experience is relevant to another part of the project.
- **Trust the members of your group** according to their unique skill sets, and reach out to them when their [unique expertise](../tip-value-allies-with-complementary-expertise/) or experience is relevant to another part of the project.
- [x] **Show appreciation** both in private and in public, and [give credit](../tip-give-credit-where-credit-is-due/) where credit is due. This is incredibly important to retain the dedicated members of your group, and to attract new advocates.
- **Show appreciation** both in private and in public, and [give credit](../tip-give-credit-where-credit-is-due/) where credit is due. This is incredibly important to retain the dedicated members of your group, and to attract new advocates.
- [x] **Inspire and support** your group members to reach their full potential, and to become the best privacy advocates they can be. Make sure their needs are met, and that they feel safe coming to you for requests.
- **Inspire and support** your group members to reach their full potential, and to become the best privacy advocates they can be. Make sure their needs are met, and that they feel safe coming to you for requests.
- [x] **Build a team that is inclusive and diverse.** A [diverse team](../tip-keep-your-posts-and-community-inclusive/) will help your group gain a broader perspective, and be able to do more by having access to a diversity of experiences, skills, and networks. It will also help your message reach more people.
- **Build a team that is inclusive and diverse.** A [diverse team](../tip-keep-your-posts-and-community-inclusive/) will help your group gain a broader perspective, and be able to do more by having access to a diversity of experiences, skills, and networks. It will also help your message reach more people.
- [x] **Lead by example** adopting principles of [integrity](../tip-stay-true-to-your-principles/), transparency, and work-life balance. Valorize and exemplify these behaviors within your group.
- **Lead by example** adopting principles of [integrity](../tip-stay-true-to-your-principles/), transparency, and work-life balance. Valorize and exemplify these behaviors within your group.
- [x] **Plan and organize projects transparently.** Make sure the members of your group are aware of the direction you have in mind, and that they support it. Avoiding surprises internally will make your members feel safer, and will help with retention and satisfaction.
- **Plan and organize projects transparently.** Make sure the members of your group are aware of the direction you have in mind, and that they support it. Avoiding surprises internally will make your members feel safer, and will help with retention and satisfaction.
- [x] **Regularly ask** the members of your group which tasks they prefer to do, and in which direction they want to go. Your group members should enjoy what they are doing, otherwise they will not stick around. Review this regularly, as situations can change and evolve.
- **Regularly ask** the members of your group which tasks they prefer to do, and in which direction they want to go. Your group members should enjoy what they are doing, otherwise they will not stick around. Review this regularly, as situations can change and evolve.
- [x] **Make sure your group members have all the rest and resources they need.** This is essential if you want a motivated team, with members that will invest the best of themselves in your group projects.
- **Make sure your group members have all the rest and resources they need.** This is essential if you want a motivated team, with members that will invest the best of themselves in your group projects.
- [x] **Organize leisure opportunities** for your group to discuss together about things other than work, and bound as a team. This will help improve communication, increase morale, and build better relationships within your group, as well as nurture a sense of belonging. Don't make this mandatory, however. Respect everyone's personal availabilities and boundaries.
- **Organize leisure opportunities** for your group to discuss together about things other than work, and bound as a team. This will help improve communication, increase morale, and build better relationships within your group, as well as nurture a sense of belonging. Don't make this mandatory, however. Respect everyone's personal availabilities and boundaries.
- [x] **Be (temporarily) replaceable.** If all the work your group does depends on your presence, all your projects will stop when you need to rest. This is a recipe for disaster, because you need to be able to [take time off](../tip-take-time-to-rest/) as much as any other members of your group. Have a backup plan ready, and communicate it with your group in advance. That way, if you fall sick, have to travel, or need time to take care of your family for a while, you will be able to take the time you need. Until you come back, you will be able to rest fully without stress, knowing your projects will keep running well despite your absence.
- **Be (temporarily) replaceable.** If all the work your group does depends on your presence, all your projects will stop when you need to rest. This is a recipe for disaster, because you need to be able to [take time off](../tip-take-time-to-rest/) as much as any other members of your group. Have a backup plan ready, and communicate it with your group in advance. That way, if you fall sick, have to travel, or need time to take care of your family for a while, you will be able to take the time you need. Until you come back, you will be able to rest fully without stress, knowing your projects will keep running well despite your absence.
## Bigger projects to organize
@@ -104,93 +100,6 @@ suffix: " ";
</div>
## Tools that can help you to assemble and organize
Here are a few privacy-focused tools and services that can help you to organize your groups and actions:
<div class="grid" markdown>
<div class="admonition recommendation" markdown>
![CryptPad logo](../../../tools/software/document-collaboration/cryptpad.svg){ align=right }
**CryptPad** is a free open-source collaborative office suite that uses end-to-end encryption.
:page_with_curl: Use it as an alternative to Google Docs!
[More info](../../../tools/software/document-collaboration/index.md#cryptpad)
[Homepage](https://cryptpad.fr/)
[Review](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/)
{ .pg:buttons }
</div>
<div class="admonition recommendation" markdown>
![Mastodon logo](../../../tools/software/social-networks/mastodon.svg){ align=right }
**Mastodon** is a free and open-source microblogging social network.
:speech_balloon: Use it as an [alternative](../tip-improve-your-social-media-and-build-resilient-communities/) to commercial social media such as *X*, *Facebook*, *Instagram*, *Threads*, *TikTok*, or *Bluesky*.
[More info](../../../tools/software/social-networks/index.md#mastodon)
[Homepage](https://joinmastodon.org/)
[Review](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/)
{ .pg:buttons }
</div>
<div class="admonition recommendation" markdown>
![Element logo](../../../tools/software/social-networks/element.svg){ align=right }
**Element** is a free open-source client for the [Matrix](https://matrix.org/) open standard for chat-room group communication.
:loudspeaker: Use it as a privacy-preserving alternative to *Slack* or *Discord*.
[More info](../../../tools/software/social-networks/index.md#element)
[Homepage](https://element.io/)
{ .pg:buttons }
</div>
<div class="admonition recommendation" markdown>
![PeerTube logo](../../../tools/software/social-networks/peertube.svg){ align=right }
**PeerTube** is a free open-source video platform developed by the French nonprofit [Framasoft](https://framasoft.org/en/).
:video_camera: Use it to share videos with your community free from *YouTube*'s control.
[Homepage](../../../tools/software/social-networks/index.md#peertube)
{ .pg:buttons }
</div>
</div>
<style>
.emoji-list-b ul {
list-style: emoji-list-b;
}
@counter-style emoji-list-b {
system: fixed;
symbols: "🗺️" "📅" "☁️" "📂";
suffix: " ";
</style>
<details class="info emoji-list-b" markdown>
<summary>More Alternatives &nbsp;📗</summary>
- **Maps & Navigation:** [Organic Maps](../../../tools/software/maps/index.md#organic-maps) or [OsmAnd](../../../tools/software/maps/index.md#osmand)
- **Calendar Sync:** [Tuta](../../../tools/services/calendar/index.md#tuta) or [Proton](../../../tools/services/calendar/index.md#proton-calendar)
- **Cloud Storage:** [Proton Drive](../../../tools/services/cloud/index.md#proton-drive), [Tresorit](../../../tools/services/cloud/index.md#tresorit), or [Peergos](../../../tools/services/cloud/index.md#peergos)
- **File Sharing:** [OnionShare](../../../tools/software/file-sharing/index.md#onionshare), [Send](../../../tools/software/file-sharing/index.md#send), or [Syncthing](../../../tools/software/file-sharing/index.md#syncthing-p2p)
More tools for community organization could include [LAUTI](https://lauti.org/) for community calendars, and [Mobilizon](https://mobilizon.org/) for events and groups. For more on better alternatives to use, you can check this [tip on why and how to migrate away from Big Tech](../tip-migrate-outside-the-surveillance-ecosystem/) for your privacy advocacy work.
</details>
## More resources
### Leadership
@@ -214,5 +123,3 @@ More tools for community organization could include [LAUTI](https://lauti.org/)
- [Develop your activist strategy: Writing a strategy for your movement (*Activist Handbook*)](https://activisthandbook.org/strategy/develop)
- [Campaign accelerator training (*Mobilisation Lab*)](https://mobilisationlab.org/training-coaching/campaign-accelerator-training/)
<button class="toolbox-tip-button-next">[Go back to toolbox index](../..)</button>
@@ -17,17 +17,17 @@ It's easy to get lost in our own niche advocacy, and lose track of what others i
Nevertheless, if we want to [**build a movement**](../tip-start-alliances-not-wars/) (and to succeed, we must) we need all the help we can get, from every person and organization sharing our values.
- [x] Whenever you see an organization with a campaign compatible with your mission, lift them up!
- Whenever you see an organization with a campaign compatible with your mission, lift them up!
- [x] Even if you are an organization yourself, lift others up too!
- Even if you are an organization yourself, lift others up too!
- [x] Even if you are also working on a similar project, lift them up with you!
- Even if you are also working on a similar project, lift them up with you!
It doesn't matter if you are working on something comparable yourself, or if perhaps you would word their work slightly differently. As long as the message is aligned with your mission and values, spread the words of your allies loud and far!
By lifting each other up, we will broaden the reach of the message we share, and ultimately this serves our goals and our community too.
In privacy advocacy, we truly need to adopt the mindset: ==The more, the merrier.==
In privacy advocacy, we truly need to adopt the mindset: <mark>The more, the merrier.</mark>
## Concrete ways to support and lift your allies up
@@ -13,7 +13,7 @@ Here's why you should make your design appealing and accessible to everyone:
Quality design for User Interface (UI) and User Experience (UX) is fundamental to product adoption. Unfortunately, this is regularly neglected by developers working on privacy-focused projects. Often, this is due to lack of resources, but sometimes it's simply an oversight.
The problem is that if your application or website isn't appealing visually, is awkward to use, difficult to understand, or use jargon inaccessible to newcomers, ==people who aren't already in your community are much less likely to adopt your product==, regardless of the privacy benefits it offers. Trying to tell people a billion times they should switch to using your app will be no help at all if it's unpleasant to use on a daily basis.
The problem is that if your application or website isn't appealing visually, is awkward to use, difficult to understand, or use jargon inaccessible to newcomers, <mark>people who aren't already in your community are much less likely to adopt your product</mark>, regardless of the privacy benefits it offers. Trying to tell people a billion times they should switch to using your app will be no help at all if it's unpleasant to use on a daily basis.
When your app is ugly, fewer people want to use it, and fewer people benefit from its protections. Minimizing the importance of visual appeal and ease-of-use will only impact your goals negatively.
@@ -39,18 +39,14 @@ While using the most popular mainstream tools and platforms for our work might s
Because a better world *is* actually possible, right now. It might not be as easy and as convenient, but it's certainly possible to thrive outside the Big Tech surveillance apparatus, especially for privacy activists and digital rights organizations.
As the saying goes: ==If not us, then who? If not now, then when?==
As the saying goes: <mark>If not us, then who? If not now, then when?</mark>
</div>
## How to migrate away from privacy-harmful tools and choose better alternatives
<div class="admonition question inline end" markdown>
<p class="admonition-title">What is the best tool?</p>
For each proposed alternative, you should always first consider your own [threat model](../../../wiki/basics/threat-modeling/index.md). One tool might be ideal for one person or organization, but another tool might be better for another. Make sure to understand well your threat model in order to choose the tools that are the best for your unique situation.
</div>
> [!IMPORTANT]
> For each proposed alternative, you should always first consider your own [threat model](../../../wiki/basics/threat-modeling/index.md). One tool might be ideal for one person or organization, but another tool might be better for another. Make sure to understand well your threat model in order to choose the tools that are the best for your unique situation.
There are two good news about this:
@@ -65,6 +61,9 @@ Here's a list of alternative solutions you can start adopting to improve data pr
<style>
.emoji-list-b ul {
list-style: tools-individuals;
li {
margin-bottom: 1.5em;
}
}
@counter-style tools-individuals {
system: fixed;
@@ -80,16 +79,12 @@ Here's a list of alternative solutions you can start adopting to improve data pr
- **[Email communication](../../../tools/services/email/index.md):** Migrate to a privacy-respectful email service that offers end-to-end encryption, such as Proton Mail or Tuta. Make sure to inform yourself about the limitations of email privacy when using email for sensitive communication.
<section class="admonition success inline end" markdown>
<p class="admonition-title">Service providers disclosure and compatibility</p>
If you use your own custom domain name for email addresses, let the people you communicate with know what your service provider is.
That way, they will know that if they use a compatible service provider, they might benefit from end-to-end encryption protections for the content of their communications with you without requiring any additional steps.
For example, this is the case when emailing from a Proton Mail account to another Proton Mail account, or from a Tuta Mail account to another Tuta Mail account.
</section>
> [!TIP]
> If you use your own custom domain name for email addresses, let the people you communicate with know what your service provider is.
>
> That way, they will know that if they use a compatible service provider, they might benefit from end-to-end encryption protections for the content of their communications with you without requiring any additional steps.
>
> For example, this is the case when emailing from a Proton Mail account to another Proton Mail account, or from a Tuta Mail account to another Tuta Mail account.
- **[Document storing and sharing](../../../tools/software/document-collaboration/index.md):** Move away from privacy-invasive Google products to store and share documents. Instead, use an end-to-end encrypted solution such as [CryptPad](https://www.privacyguides.org/articles/2025/02/07/cryptpad-review/) for your collaborative documents and forms. Proton Drive also offers collaborative documents with *Proton Docs* and *Sheets*.
@@ -113,9 +108,9 @@ Here's a list of alternative solutions you can start adopting to improve data pr
- **[Social media](../../../tools/software/social-networks/index.md):** Move away from commercial social media platforms. Mainstream platforms are almost all abusing their users' data. By keeping an account there, you are indirectly encouraging your followers to stay there as well, perpetuating the platform's abuse.
While you may want to keep a minimal presence to advertise that you have now moved your activity to a more privacy-respectful platform, you should keep your engagement there to a minimum.
While you may want to keep a minimal presence to advertise that you have now moved your activity to a more privacy-respectful platform, you should keep your engagement there to a minimum.
Instead, migrate your advocacy work to better social networks that aren't abusing users' data, and encourage your followers to migrate with you. Choose and support a platform that is more aligned with your privacy values, such as [Mastodon](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/) or any other open-source non-commercial applications connected to the [Fediverse](https://blog.elenarossini.com/fediverse-video/).
Instead, migrate your advocacy work to better social networks that aren't abusing users' data, and encourage your followers to migrate with you. Choose and support a platform that is more aligned with your privacy values, such as [Mastodon](https://www.privacyguides.org/articles/2025/07/15/mastodon-privacy-and-security/) or any other open-source non-commercial applications connected to the [Fediverse](https://blog.elenarossini.com/fediverse-video/).
</div>
@@ -21,38 +21,38 @@ Here are a some examples of other people's data we might collect or share in the
<div markdown>
- [ ] Contact information (personal advocacy or professional work)
- [ ] Donation information (including legal names, emails, and phone numbers)
- [ ] Purchase information (including legal names and shipping addresses)
- [ ] Mailing list email addresses
- [ ] Email content
- [ ] Instant messaging content
- [ ] Forum post content
- [ ] Login credentials
- [ ] Internet Protocol (IP) addresses
- [ ] Website telemetry data
- [ ] Website cookies and fingerprinting data
- [ ] Chatbot logs
- [ ] Survey answers
- [ ] Shared documents
- Contact information (personal advocacy or professional work)
- Donation information (including legal names, emails, and phone numbers)
- Purchase information (including legal names and shipping addresses)
- Mailing list email addresses
- Email content
- Instant messaging content
- Forum post content
- Login credentials
- Internet Protocol (IP) addresses
- Website telemetry data
- Website cookies and fingerprinting data
- Chatbot logs
- Survey answers
- Shared documents
</div>
<div markdown>
- [ ] Shared photos and images
- [ ] Legal names of people on work contracts or partnership agreements
- [ ] Home addresses of people on work contracts or partnership agreements
- [ ] Resumes and cover letters from job applicants
- [ ] Recordings or screenshots of video or audio meetings
- [ ] Behind-the-scene video footage from interviews
- [ ] Videos we take during meetups, events, or protests
- [ ] Photos we take during meetups, events, or protests
- [ ] License plates information from event photos or event parking lot management
- [ ] Security camera footage
- [ ] Dietary restrictions/preferences and health information for events
- [ ] Screenshots of people's social media posts
- [ ] And so much more
- Shared photos and images
- Legal names of people on work contracts or partnership agreements
- Home addresses of people on work contracts or partnership agreements
- Resumes and cover letters from job applicants
- Recordings or screenshots of video or audio meetings
- Behind-the-scene video footage from interviews
- Videos we take during meetups, events, or protests
- Photos we take during meetups, events, or protests
- License plates information from event photos or event parking lot management
- Security camera footage
- Dietary restrictions/preferences and health information for events
- Screenshots of people's social media posts
- And so much more
</div>
@@ -78,27 +78,27 @@ Regardless of the data we have to collect, we should always make sure to:
### Some practices to normalize in our advocacy work
- [x] Asking for consent before sharing someone's information (legal name, location, contact information, photos, etc.).
- Asking for consent before sharing someone's information (legal name, location, contact information, photos, etc.).
- [x] Asking people what name and pronouns they want to be referred to publicly.
- Asking people what name and pronouns they want to be referred to publicly.
- [x] Asking people how (and if) they would like to be credited publicly.
- Asking people how (and if) they would like to be credited publicly.
- [x] Asking for permission before using the quote of someone else in our own work.
- Asking for permission before using the quote of someone else in our own work.
- [x] Asking for permission before publishing a screenshot of someone else's post.
- Asking for permission before publishing a screenshot of someone else's post.
- [x] Respecting people's choices to show their face publicly or not.
- Respecting people's choices to show their face publicly or not.
- [x] Asking for consent before taking photos at meetups or events.
- Asking for consent before taking photos at meetups or events.
- [x] Blurring the faces of strangers in crowd photos (especially for children).
- Blurring the faces of strangers in crowd photos (especially for children).
- [x] Using consent badges for photo permission at event, or ideally forbidding taking nonconsensual photos entirely.
- Using consent badges for photo permission at event, or ideally forbidding taking nonconsensual photos entirely.
- [x] Warning people in advance when there are recording technologies on premise (such as smart speakers or other recording devices).
- Warning people in advance when there are recording technologies on premise (such as smart speakers or other recording devices).
- [x] Not requiring guests to sign up for events. Making sure all the information is public, without requiring to provide any personal information in order to participate.
- Not requiring guests to sign up for events. Making sure all the information is public, without requiring to provide any personal information in order to participate.
## More resources
@@ -11,7 +11,7 @@ Here's how you can refuse to comply with privacy-abusive practices, and why it's
## The risk of complying with privacy-invasive requests
Requests to invade our privacy are part of our daily lives in today's world. Whether it's a store cashier banally asking for our phone number after a purchase, or a prominent facial scan at the airport with no clear instructions on how to opt out, ==privacy-invasive requests have become so normalized== that most people barely notice them anymore.
Requests to invade our privacy are part of our daily lives in today's world. Whether it's a store cashier banally asking for our phone number after a purchase, or a prominent facial scan at the airport with no clear instructions on how to opt out, <mark>privacy-invasive requests have become so normalized</mark> that most people barely notice them anymore.
The problem is, each time we mindlessly comply because we are tired, rushed, or failed to even notice how unnecessary and intrusive this is, we directly contribute in normalizing bad practices even more.
@@ -9,14 +9,10 @@ Once you are [informed on your local privacy laws](../tip-know-your-privacy-laws
Here's why and how you should report violations of your local privacy laws:
<div class="admonition note" markdown>
<p class="admonition-title">International variations</p>
There are hundreds of privacy regulations currently in effect in the world. Moreover, each country might have multiple privacy laws protecting different regions/states/provinces, and different types of data (health data, children's data, employees' data, etc.).
This tip cannot cover each regulation individually. There will be variations for each privacy law applicable. Read this tip as a general advice and a starting point to guide you through your own regional research.
</div>
> [!NOTE]
> There are hundreds of privacy regulations currently in effect in the world. Moreover, each country might have multiple privacy laws protecting different regions/states/provinces, and different types of data (health data, children's data, employees' data, etc.).
>
>This tip cannot cover each regulation individually. There will be variations for each privacy law applicable. Read this tip as a general advice and a starting point to guide you through your own regional research.
## Why reporting violations matters
@@ -26,14 +22,13 @@ Unless the enforcing authority decides to investigate an especially important ab
If you believe that your privacy rights have been violated by an organization, infringing your local privacy regulations, you can likely report this violation to the entity responsible for enforcing the law, the **Data Protection Authority** (DPA).
<div class="admonition info inline end" markdown>
<p class="admonition-title">What is a Data Protection Authority?</p>
{{< details title="What is a Data Protection Authority?" >}}
Again, different laws might use different terms for this, depending on the region. For example, in Canada the enforcing authority for a privacy law is often called a *Privacy Commissioner*. In Europe, the term used is a *Data Protection Authority*. In the state of California in the United States, the entity responsible for enforcing the California Consumer Privacy Act (CCPA) is the *California Privacy Protection Agency*.
This text will use **Data Protection Authority** or **DPA** as an umbrella term to refer to any authorities mandated to enforce a privacy regulation.
</div>
{{< /details >}}
Reporting even small violations can help improve privacy rights not only for yourself but for everyone else as well.
@@ -91,12 +86,8 @@ Most regulations will have a clear process to submit an official complaint.
Once you've found the official documentation for your local privacy law(s), read through it to find who is responsible for enforcing the law (who is your DPA), and what the complaint process is.
<div class="admonition success" markdown>
<p class="admonition-title">Finding your local privacy law and enforcement authority</p>
To help you find the official documentation for your local privacy law, the authority mandated to enforce it, and the contact links to ask questions or place a complaint, Privacy Guides has put together this handy [DPA Directory](../../legal/dpa-directory/).
</div>
> [!TIP]
> To help you find the official documentation for your local privacy law, the authority mandated to enforce it, and the contact links to ask questions or place a complaint, Privacy Guides has put together this handy [DPA Directory](../../legal/dpa-directory/).
Before submitting a complaint, you may want to:
@@ -19,7 +19,7 @@ Discouragement often emerges from envisioning too much of what's left to do at o
Even if you do not have the resources to organize a large campaign around a privacy issue, do not minimize the power that you have.
All the ==small contributions you can make will culminate over time==, and end up having a significant impact overall.
All the <mark>small contributions you can make will culminate over time</mark>, and end up having a significant impact overall.
Additionally, you are [not alone](../tip-lift-your-allies-up/) in this battle. If you can make a small contribution today, and perhaps convince one or two other advocates to do the same, you have already contributed significantly to the movement.
@@ -15,7 +15,7 @@ Here's how you can nurture alliances, instead of fueling conflicts:
## Acknowledge that you cannot win this battle alone, neither as a person nor as a single organization
To fight for privacy rights in this hostile environment, **we need to create a movement**. Effective movements grow from collaboration, not from competition. ==You cannot do it alone.==
To fight for privacy rights in this hostile environment, **we need to create a movement**. Effective movements grow from collaboration, not from competition. <mark>You cannot do it alone.</mark>
Attacks on digital rights have increased exponentially in the past few years. Not one organization, and certainly not one person, can solve these complex issues on their own. Not even the most prominent ones.
@@ -37,7 +37,7 @@ By promoting privacy rights *together*, we all participate in growing a movement
Competition, and especially when this competition leads to businesses and organizations badmouthing each other, ends up damaging the whole movement, therefore impacting negatively all of our goals.
Additionally, tearing down perceived competitors sharing your values isn't a good look for you. It's draining for people already in the community, and often repulsive to potential new people on the outside. ==This behavior often results in pushing away newcomers== that were initially interested in joining our movement. This is bad for your competitors, sure, but it's *also* bad for *you*.
Additionally, tearing down perceived competitors sharing your values isn't a good look for you. It's draining for people already in the community, and often repulsive to potential new people on the outside. <mark>This behavior often results in pushing away newcomers</mark> that were initially interested in joining our movement. This is bad for your competitors, sure, but it's *also* bad for *you*.
Newcomers get confused when they receive competing new information. Confusion leads to *inertia*, and inertia in the current Big Tech ecosystem means staying with Gmail instead of moving to Tuta or Proton mail, or any other privacy-focused email services. This is a bad outcome for *all* of us.
@@ -100,12 +100,13 @@ Here are a few ways that might help to reduce the impact of infighting within th
**Host:** [EDRi](https://edri.org/)<br>
**Participants:** ApTI, Bits of Freedom, Chaos Computer Club, Digital Courage, EFF, Epicenter Works, Internet Society, La Quadrature du Net, and more.
<section class="admonition success" markdown>
<p class="admonition-title">Coalition donation page example</p>
{{< details title="Coalition donation page example" closed="true" >}}
EDRi's *Stop Scanning Me* coalition provides a great example of collaboration with a [donation page](https://stopscanningme.eu/en/donate.html) listing all the coalition members with their countries of origin, and linking to external donation pages. EDRi humbly listed their own donation link at the bottom. We need more strong coalitions like this.
</section><hr>
{{< /details >}}
<hr>
- **Campaign:** [**The Nameless Coalition (2015)**](https://act.eff.org/action/dear-facebook-authentic-names-are-authentically-dangerous-for-your-users)
@@ -17,19 +17,19 @@ Sometimes, it's easy to just use the most popular tool and forget privacy best p
Staying true to your privacy values internally has many benefits:
- [x] It significantly increases your credibility while telling others what tools and practices they should adopt when you are following the same advice yourself.
- It significantly increases your credibility while telling others what tools and practices they should adopt when you are following the same advice yourself.
- [x] It supports the privacy-enhancing tools and projects you would like to see prosper.
- It supports the privacy-enhancing tools and projects you would like to see prosper.
- [x] It demonstrates that it is possible to manage a group or organization using privacy-focused services, practices, and partners. It makes you set a positive example.
- It demonstrates that it is possible to manage a group or organization using privacy-focused services, practices, and partners. It makes you set a positive example.
- [x] It builds your reputation as someone who knows what they are talking about.
- It builds your reputation as someone who knows what they are talking about.
- [x] It gives you valuable insight to understand better your own recommendations, and their potential downsides. You will be better equipped to answer questions about how to deal with the disadvantages of some privacy-preserving tools and practices if you have adopted them yourself internally.
- It gives you valuable insight to understand better your own recommendations, and their potential downsides. You will be better equipped to answer questions about how to deal with the disadvantages of some privacy-preserving tools and practices if you have adopted them yourself internally.
- [x] It makes your group or organization more attractive to recruit new qualified members or employees. Most privacy experts and advocates are in this field because they deeply care about privacy rights. By adopting good practices internally, you will show them that you are trustworthy, know what you're talking about, and will respect their own data if they work with you.
- It makes your group or organization more attractive to recruit new qualified members or employees. Most privacy experts and advocates are in this field because they deeply care about privacy rights. By adopting good practices internally, you will show them that you are trustworthy, know what you're talking about, and will respect their own data if they work with you.
- [x] It normalizes the use of privacy-preserving technologies and privacy-respectful practices with your members, contributors, and employees, as well as with any external observers.
- It normalizes the use of privacy-preserving technologies and privacy-respectful practices with your members, contributors, and employees, as well as with any external observers.
## How to stay true to your principles
@@ -37,21 +37,21 @@ There are many things you can do to stay true to your principles, both in your o
Here are a few examples of practices and good habits you might want to adopt:
- [x] Make sure to [inform yourself about the privacy laws](../tip-know-your-privacy-laws/) you have to comply with in your work, and go above and beyond to respect them carefully.
- Make sure to [inform yourself about the privacy laws](../tip-know-your-privacy-laws/) you have to comply with in your work, and go above and beyond to respect them carefully.
- [x] Create a [Code of Ethics](https://www.wikihow.com/Develop-a-Code-of-Ethics) for your group or organization, and ensure it includes a special emphasis on enforcing your privacy values.
- Create a [Code of Ethics](https://www.wikihow.com/Develop-a-Code-of-Ethics) for your group or organization, and ensure it includes a special emphasis on enforcing your privacy values.
- [x] Build protocols to minimize data *collection* and maximize data *protection* when collecting data internally (e.g. from employees), and externally (e.g. from subscribers). Verify that your protocols are thoroughly followed by everyone in your group or organization.
- Build protocols to minimize data *collection* and maximize data *protection* when collecting data internally (e.g. from employees), and externally (e.g. from subscribers). Verify that your protocols are thoroughly followed by everyone in your group or organization.
- [x] Educate the members and contributors of your group or team. Make sure that everyone understands well your values, your Code of Ethics, and applies your established protocols.
- Educate the members and contributors of your group or team. Make sure that everyone understands well your values, your Code of Ethics, and applies your established protocols.
- [x] Pick your vendors carefully. [Research](https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/) each third-party software you use, to select the most privacy-preserving option available.
- Pick your vendors carefully. [Research](https://www.privacyguides.org/articles/2025/09/03/red-and-green-privacy-flags/) each third-party software you use, to select the most privacy-preserving option available.
- [x] Whenever relevant, request [Service-Level Agreements](https://en.wikipedia.org/wiki/Service-level_agreement) (SLA) from your service providers, to ensure you have a legally binding contract they have to comply with to respect your own terms of service.
- Whenever relevant, request [Service-Level Agreements](https://en.wikipedia.org/wiki/Service-level_agreement) (SLA) from your service providers, to ensure you have a legally binding contract they have to comply with to respect your own terms of service.
- [x] Reject any offers for partnership or sponsorship from third-parties that have not been properly vetted for being trustworthy and sharing your privacy values, or who might only have profit and advertising in mind.
- Reject any offers for partnership or sponsorship from third-parties that have not been properly vetted for being trustworthy and sharing your privacy values, or who might only have profit and advertising in mind.
- [x] Keep your promises. As a privacy advocate, group, or organization, your reputation is the most valuable thing you have. ==If people cannot trust your integrity, they will not trust any of your advice either.== If you promise to never accept sponsorship from certain Big Tech companies, then make sure you are ready to hold this promise. If you promise to never accept venture-capital money for your privacy-preserving app, then keep your word and be ready to reject even attractive offers.
- Keep your promises. As a privacy advocate, group, or organization, your reputation is the most valuable thing you have. <mark>If people cannot trust your integrity, they will not trust any of your advice either.</mark> If you promise to never accept sponsorship from certain Big Tech companies, then make sure you are ready to hold this promise. If you promise to never accept venture-capital money for your privacy-preserving app, then keep your word and be ready to reject even attractive offers.
## Integrity is essential to build our movement
@@ -17,7 +17,7 @@ Many privacy advocates will choose, rightly so, to completely [leave](../tip-mig
Moreover, fighting to protect privacy rights while reading about attacks on those rights every day in the news can be draining.
Most advocates have experienced moments of great discouragement, and feelings of helplessness while facing the magnitude of the task at hand. ==Social support is a matter of survival== to recharge and continue this long battle for human rights.
Most advocates have experienced moments of great discouragement, and feelings of helplessness while facing the magnitude of the task at hand. <mark>Social support is a matter of survival</mark> to recharge and continue this long battle for human rights.
This is why we must work to rebuild communities of our own. Supportive privacy communities that are [kind](../tip-be-kind-to-people-but-be-relentless-with-institutions/), [inclusive](../tip-keep-your-posts-and-community-inclusive/), and [accessible](../tip-be-mindful-of-accessibility/).
@@ -31,21 +31,21 @@ Some people will periodically take time off from the internet to rest, which can
Here are a few things you can do to support your privacy comrades in times of need:
- [x] Work on strengthening your empathy skills, and demonstrate more compassion. This is a superpower to take care of your community.
- Work on strengthening your empathy skills, and demonstrate more compassion. This is a superpower to take care of your community.
- [x] Tell them you understand this is difficult, and that you are here to help if they need support.
- Tell them you understand this is difficult, and that you are here to help if they need support.
- [x] Ask if they would like to talk more about their difficulties in private.
- Ask if they would like to talk more about their difficulties in private.
- [x] Offer your time to talk with them on a privacy-respectful chat, audio, or video call, if this is something you are comfortable doing.
- Offer your time to talk with them on a privacy-respectful chat, audio, or video call, if this is something you are comfortable doing.
- [x] Invite them to join your community or group of like-minded people, if you think they might be a good fit.
- Invite them to join your community or group of like-minded people, if you think they might be a good fit.
- [x] Organize a group or event to socialize with your privacy comrades regularly, offline or online, in a privacy-respectful way.
- Organize a group or event to socialize with your privacy comrades regularly, offline or online, in a privacy-respectful way.
- [x] Depending on circumstances (and only if they might be open to it), refer them to a helpful resource in private. However, be careful not to fall into [the advice trap](https://www.psychologytoday.com/us/blog/the-questionologist/202103/how-guide-people-without-giving-advice), unless they specifically asked for advice.
- Depending on circumstances (and only if they might be open to it), refer them to a helpful resource in private. However, be careful not to fall into [the advice trap](https://www.psychologytoday.com/us/blog/the-questionologist/202103/how-guide-people-without-giving-advice), unless they specifically asked for advice.
- [x] Stay kind and do not take it personally if they refuse your help or disagree with your [*solicited* advice](https://www.verywellmind.com/whats-behind-different-types-of-unsolicited-advice-3144961). Let them know the door is always open to reach out to you whenever they might need help later.
- Stay kind and do not take it personally if they refuse your help or disagree with your [*solicited* advice](https://www.verywellmind.com/whats-behind-different-types-of-unsolicited-advice-3144961). Let them know the door is always open to reach out to you whenever they might need help later.
## More resources
@@ -23,7 +23,7 @@ This has many annoying side effects, such as having limited energy and a flesh-a
In our society's hustle culture, it's counterproductive that we often value overwork more than strategic rest.
The thing is, overwork isn't a sustainable strategy for the long battle ahead of us. ==What we need to succeed is privacy activists who will fight by our side for a very long time.== We need endurance and persistence. And for this to happen, we need ourselves and our [privacy comrades](../tip-support-your-privacy-comrades/) to be well-rested, by taking pauses and adopting the strategies we all need to recharge.
The thing is, overwork isn't a sustainable strategy for the long battle ahead of us. <mark>What we need to succeed is privacy activists who will fight by our side for a very long time.</mark> We need endurance and persistence. And for this to happen, we need ourselves and our [privacy comrades](../tip-support-your-privacy-comrades/) to be well-rested, by taking pauses and adopting the strategies we all need to recharge.
We need our movement to stay away from the often toxic hustle culture we have all observed from Big Tech companies, and instead embrace a culture of mutual support that encourages self-care.
@@ -33,12 +33,8 @@ We need to move at a *sustainable* pace, and build a powerful privacy rights mov
The important part isn't to fight for privacy rights 24/7. What matters most is that once you are well-rested after taking some time off, you come back to the battlefield to fight with us again.
<div class="admonition quote toolbox-quote" markdown>
<p class="admonition-title toolbox-quote">Successful social change activists learn to be the tortoise rather than the hare. Looking after yourself and your family is important.</p>
<p class="toolbox-quote-source" markdown>Source: [*The Activists' Handbook* by Aidan Ricketts](https://aidanricketts.com/the-activists-handbook/)</p>
</div>
> Successful social change activists learn to be the tortoise rather than the hare. Looking after yourself and your family is important.
> <small>—Source: [*The Activists' Handbook* by Aidan Ricketts](https://aidanricketts.com/the-activists-handbook/)</small>
## Tips to help prevent privacy activism burnout
@@ -19,7 +19,7 @@ Being an expert in privacy can mean so many things. No two specialists have the
Whatever your own privacy expertise might be, make sure to always stay aware of the [bigger picture](../tip-keep-in-mind-the-whole-landscape/), and recognize that other privacy specialists might have knowledge entirely different from yours. Your knowledge might intersect, or you might not share any at all.
This doesn't mean they are any less valuable. On the contrary, this ==diversity of knowledge gives us the best chance to succeed== in our common cause.
This doesn't mean they are any less valuable. On the contrary, this <mark>diversity of knowledge gives us the best chance to succeed</mark> in our common cause.
## Respect people with different knowledge
@@ -39,7 +39,7 @@ Kindness, patience, and compassion are the first steps to attract and retain new
- **No stupid questions:** There are no stupid questions, only impatient answerers. Whenever a beginner asks a question that seems obvious to you, refrain from replying with something dry or snarky such as "Google it," or its privacy-equivalent "DuckDuckGo it." This only has the effect of chasing people away from our community. If you don't feel like helping, just reply nothing. But if you do want to help, try to find an answer for them. If you are in a rush, something like "Hey! Sorry I don't have the answer, but maybe this [resource](../../../wiki/basics/why-privacy-matters/index.md) might be helpful to you!" or "Sorry I'm not sure, but perhaps asking on this [forum](https://discuss.privacyguides.net/) might get you an answer."
- **Stay patient and compassionate:** Always stay patient with beginners and newcomers (and everyone else, actually). To keep people fighting with us and grow our movement, we cannot afford to lose anyone just because we felt angry that day. Develop your [empathy skills](../tip-support-your-privacy-comrades/) to provide support and reply with compassion. People stay where they feel safe and welcomed. ==Make them feel safe and welcomed.==
- **Stay patient and compassionate:** Always stay patient with beginners and newcomers (and everyone else, actually). To keep people fighting with us and grow our movement, we cannot afford to lose anyone just because we felt angry that day. Develop your [empathy skills](../tip-support-your-privacy-comrades/) to provide support and reply with compassion. People stay where they feel safe and welcomed. <mark>Make them feel safe and welcomed.</mark>
- **Do not confound lack of knowledge with lack of intelligence:** Everyone has a different set of knowledge. Lack of knowledge doesn't mean someone isn't intelligent, it just means they haven't come in contact with this area of knowledge yet. They probably know a lot of things you don't know at all. Be careful not to sound patronizing when communicating with newcomers (or anyone else really). This is a behavior sadly too common in the privacy community, and we all need to work on this to create an environment that is more welcoming and enjoyable for everyone.
+5
View File
@@ -7,3 +7,8 @@ fontawesome-solid-heart-circle-check: <svg xmlns="http://www.w3.org/2000/svg" vi
fontawesome-solid-star: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M341.5 45.1C337.4 37.1 329.1 32 320.1 32C311.1 32 302.8 37.1 298.7 45.1L225.1 189.3L65.2 214.7C56.3 216.1 48.9 222.4 46.1 231C43.3 239.6 45.6 249 51.9 255.4L166.3 369.9L141.1 529.8C139.7 538.7 143.4 547.7 150.7 553C158 558.3 167.6 559.1 175.7 555L320.1 481.6L464.4 555C472.4 559.1 482.1 558.3 489.4 553C496.7 547.7 500.4 538.8 499 529.8L473.7 369.9L588.1 255.4C594.5 249 596.7 239.6 593.9 231C591.1 222.4 583.8 216.1 574.8 214.7L415 189.3L341.5 45.1z"/></svg>
fontawesome-solid-heart: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M305 151.1L320 171.8L335 151.1C360 116.5 400.2 96 442.9 96C516.4 96 576 155.6 576 229.1L576 231.7C576 343.9 436.1 474.2 363.1 529.9C350.7 539.3 335.5 544 320 544C304.5 544 289.2 539.4 276.9 529.9C203.9 474.2 64 343.9 64 231.7L64 229.1C64 155.6 123.6 96 197.1 96C239.8 96 280 116.5 305 151.1z"/></svg>
fontawesome-solid-hand-fist: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M288 64C305.7 64 320 78.3 320 96L320 208L256 208L256 96C256 78.3 270.3 64 288 64zM160 128C160 110.3 174.3 96 192 96C209.7 96 224 110.3 224 128L224 208L160 208L160 128zM352 128C352 110.3 366.3 96 384 96C401.7 96 416 110.3 416 128L416 224C416 241.7 401.7 256 384 256C366.3 256 352 241.7 352 224L352 128zM448 192C448 174.3 462.3 160 480 160C497.7 160 512 174.3 512 192L512 256C512 273.7 497.7 288 480 288C462.3 288 448 273.7 448 256L448 192zM352 280L352 279.4C361.4 284.8 372.3 288 384 288C397.2 288 409.4 284 419.6 277.2C428.3 302.1 452.1 320 480 320C491.7 320 502.6 316.9 512 311.4L512 320C512 372.3 486.9 418.8 448 448L448 544C448 561.7 433.7 576 416 576L256 576C238.3 576 224 561.7 224 544L224 465.6C206.7 457.7 190.8 446.8 177.1 433.1L165.5 421.5C141.5 397.5 128 364.9 128 331L128 304C128 268.7 156.7 240 192 240L280 240C302.1 240 320 257.9 320 280C320 302.1 302.1 320 280 320L224 320C215.2 320 208 327.2 208 336C208 344.8 215.2 352 224 352L280 352C319.8 352 352 319.8 352 280z"/></svg>
fontawesome-solid-earth-americas: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M119.7 263.7L150.6 294.6C156.6 300.6 164.7 304 173.2 304L194.7 304C203.2 304 211.3 307.4 217.3 313.4L246.6 342.7C252.6 348.7 256 356.8 256 365.3L256 402.8C256 411.3 259.4 419.4 265.4 425.4L278.7 438.7C284.7 444.7 288.1 452.8 288.1 461.3L288.1 480C288.1 497.7 302.4 512 320.1 512C337.8 512 352.1 497.7 352.1 480L352.1 477.3C352.1 468.8 355.5 460.7 361.5 454.7L406.8 409.4C412.8 403.4 416.2 395.3 416.2 386.8L416.2 352.1C416.2 334.4 401.9 320.1 384.2 320.1L301.5 320.1C293 320.1 284.9 316.7 278.9 310.7L262.9 294.7C258.7 290.5 256.3 284.7 256.3 278.7C256.3 266.2 266.4 256.1 278.9 256.1L313.6 256.1C326.1 256.1 336.2 246 336.2 233.5C336.2 227.5 333.8 221.7 329.6 217.5L309.9 197.8C306 194 304 189.1 304 184C304 178.9 306 174 309.7 170.3L327 153C332.8 147.2 336.1 139.3 336.1 131.1C336.1 123.9 333.7 117.4 329.7 112.2C326.5 112.1 323.3 112 320.1 112C224.7 112 144.4 176.2 119.8 263.7zM528 320C528 285.4 519.6 252.8 504.6 224.2C498.2 225.1 491.9 228.1 486.7 233.3L473.3 246.7C467.3 252.7 463.9 260.8 463.9 269.3L463.9 304C463.9 321.7 478.2 336 495.9 336L520 336C522.5 336 525 335.7 527.3 335.2C527.7 330.2 527.8 325.1 527.8 320zM64 320C64 178.6 178.6 64 320 64C461.4 64 576 178.6 576 320C576 461.4 461.4 576 320 576C178.6 576 64 461.4 64 320z"/></svg>
fontawesome-solid-earth-africa: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M511.6 239C480 164.4 406.1 112 320 112C297.9 112 276.6 115.5 256.6 121.8C256.2 123.8 256 125.9 256 128L256 201.4C256 213.9 266.1 224 278.6 224C284.6 224 290.4 221.6 294.6 217.4L310.6 201.4C316.6 195.4 324.7 192 333.2 192L338.7 192C367.2 192 381.5 226.5 361.3 246.6C355.3 252.6 347.2 256 338.7 256L277.2 256C268.7 256 260.6 259.4 254.6 265.4L233.3 286.7C227.3 292.7 223.9 300.8 223.9 309.3L223.9 352C223.9 369.7 238.2 384 255.9 384L287.9 384C305.6 384 319.9 398.3 319.9 416L319.9 448C319.9 465.7 334.2 480 351.9 480L354.6 480C363.1 480 371.2 476.6 377.2 470.6L406.5 441.3C412.5 435.3 415.9 427.2 415.9 418.7L415.9 400C415.9 391.2 423.1 384 431.9 384C440.7 384 447.9 376.8 447.9 368L447.9 333.3C447.9 324.8 444.5 316.7 438.5 310.7L422.5 294.7C418.3 290.5 415.9 284.7 415.9 278.7C415.9 266.2 426 256.1 438.5 256.1L483.5 256.1C495.9 256.1 506.2 249 511.5 239.1zM64 320C64 178.6 178.6 64 320 64C461.4 64 576 178.6 576 320C576 461.4 461.4 576 320 576C178.6 576 64 461.4 64 320z"/></svg>
fontawesome-solid-earth-asia: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M114 348.8C118.2 350.9 123 352 128 352L178.7 352C187.2 352 195.3 355.4 201.3 361.4L214.6 374.7C220.6 380.7 228.7 384.1 237.2 384.1L255.9 384.1C273.6 384.1 287.9 369.8 287.9 352.1L287.9 312.1C287.9 298.8 298.6 288.1 311.9 288.1C325.2 288.1 335.9 277.4 335.9 264.1L335.9 221.4C335.9 212.9 339.3 204.8 345.3 198.8L358.6 185.5C364.6 179.5 368 171.4 368 162.9L368 121C368 119.8 367.9 118.7 367.8 117.5C352.4 113.9 336.4 112 320 112C205.1 112 112 205.1 112 320C112 329.8 112.7 339.4 114 348.8zM517.3 386.1C514.1 384.7 510.6 384 506.8 384L496 384C487.2 384 480 376.8 480 368C480 359.2 472.8 352 464 352L429.3 352C420.8 352 412.7 355.4 406.7 361.4L361.4 406.7C355.4 412.7 352 420.8 352 429.3L352 448C352 465.7 366.3 480 384 480L402.7 480C411.2 480 419.3 483.4 425.3 489.4C427.5 491.6 430 493.5 432.6 494.9C471.9 469.5 502.1 431.3 517.2 386.1zM64 320C64 178.6 178.6 64 320 64C461.4 64 576 178.6 576 320C576 461.4 461.4 576 320 576C178.6 576 64 461.4 64 320zM192 432C192 440.8 199.2 448 208 448L240 448C248.8 448 256 440.8 256 432C256 423.2 248.8 416 240 416L208 416C199.2 416 192 423.2 192 432zM336 320C327.2 320 320 327.2 320 336L320 368C320 376.8 327.2 384 336 384C344.8 384 352 376.8 352 368L352 336C352 327.2 344.8 320 336 320zM384 208L384 240C384 248.8 391.2 256 400 256C408.8 256 416 248.8 416 240L416 208C416 199.2 408.8 192 400 192C391.2 192 384 199.2 384 208z"/></svg>
fontawesome-solid-earth-europe: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M320.2 112C435 112.1 528 205.2 528 320C528 342.1 524.6 363.4 518.2 383.4C516.2 383.8 514.1 384 512 384L509.3 384C500.8 384 492.7 380.6 486.7 374.6L457.4 345.3C451.4 339.3 448 331.2 448 322.7L448 272C448 263.2 455.2 256 464 256C472.8 256 480 248.8 480 240C480 231.2 472.8 224 464 224L440 224C426.7 224 416 234.7 416 248C416 261.3 405.3 272 392 272L336 272C327.2 272 320 279.2 320 288C320 296.8 312.8 304 304 304L278.6 304C266.1 304 256 293.9 256 281.4C256 275.4 258.4 269.6 262.6 265.4L332.7 195.3C334.8 193.2 336 190.3 336 187.3C336 181.1 330.9 176 324.7 176L310.6 176C298.1 176 288 165.9 288 153.4C288 147.4 290.4 141.6 294.6 137.4L317.7 114.3C318.5 113.5 319.3 112.8 320.2 112.1zM502.4 420.1C469.6 479.7 408.5 521.5 337.2 527.3C336.5 525 336.1 522.5 336.1 520C336.1 506.7 325.4 496 312.1 496L285.4 496C276.9 496 268.8 492.6 262.8 486.6L233.5 457.3C227.5 451.3 224.1 443.2 224.1 434.7L224.1 368C224.1 350.3 238.4 336 256.1 336L354.8 336C363.3 336 371.4 339.4 377.4 345.4L406.7 374.7C412.7 380.7 420.8 384.1 429.3 384.1L434.8 384.1C443.3 384.1 451.4 387.5 457.4 393.5L473.4 409.5C477.6 413.7 483.4 416.1 489.4 416.1C494.2 416.1 498.7 417.6 502.4 420.2zM320 576L346.2 574.7C337.6 575.6 328.9 576 320 576zM346.2 574.7C475.3 561.6 576 452.6 576 320C576 178.6 461.4 64 320 64L320 64C178.6 64 64 178.6 64 320C64 447.5 157.2 553.3 279.3 572.8C292.5 574.9 306.1 576 320 576zM251.3 187.3L219.3 219.3C213.1 225.5 202.9 225.5 196.7 219.3C190.5 213.1 190.5 202.9 196.7 196.7L228.7 164.7C234.9 158.5 245.1 158.5 251.3 164.7C257.5 170.9 257.5 181.1 251.3 187.3z"/></svg>
fontawesome-solid-earth-oceania: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 640"><!--!Font Awesome Free v7.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2026 Fonticons, Inc.--><path d="M320 576C461.4 576 576 461.4 576 320C576 178.6 461.4 64 320 64C178.6 64 64 178.6 64 320C64 461.4 178.6 576 320 576zM256 214.6C256 202.1 266.1 192 278.6 192L320 192C337.7 192 352 206.3 352 224C352 241.7 337.7 256 320 256L301.3 256C292.8 256 284.7 252.6 278.7 246.6L262.7 230.6C258.5 226.4 256.1 220.6 256.1 214.6zM496 320C504.8 320 512 327.2 512 336L512 368C512 376.8 504.8 384 496 384C487.2 384 480 376.8 480 368L480 336C480 327.2 487.2 320 496 320zM475.3 443.3L443.3 475.3C437.1 481.5 426.9 481.5 420.7 475.3C414.5 469.1 414.5 458.9 420.7 452.7L452.7 420.7C458.9 414.5 469.1 414.5 475.3 420.7C481.5 426.9 481.5 437.1 475.3 443.3zM288 496C288 487.2 295.2 480 304 480L336 480C344.8 480 352 487.2 352 496C352 504.8 344.8 512 336 512L304 512C295.2 512 288 504.8 288 496zM192 416C174.3 416 160 401.7 160 384L160 365.3C160 356.8 163.4 348.7 169.4 342.7L217.4 294.7C221.6 290.5 227.4 288.1 233.4 288.1L240 288.1C248.8 288.1 256 295.3 256 304.1C256 312.9 263.2 320.1 272 320.1C280.8 320.1 288 312.9 288 304.1C288 295.3 295.2 288.1 304 288.1L310.6 288.1C316.6 288.1 322.4 290.5 326.6 294.7L374.6 342.7C380.6 348.7 384 356.8 384 365.3L384 416C384 433.7 369.7 448 352 448L301.3 448C292.8 448 284.7 444.6 278.7 438.6L265.4 425.3C259.4 419.3 251.3 415.9 242.8 415.9L192 416z"/></svg>