{"id":29031,"date":"2019-09-11T23:14:27","date_gmt":"2019-09-11T23:14:27","guid":{"rendered":"http:\/\/5cfe0aec-09d9-41cb-9315-eb9fecd06b3c"},"modified":"2019-09-11T23:14:27","modified_gmt":"2019-09-11T23:14:27","slug":"infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/","title":{"rendered":"Infamous surveillance tech vendor makes pledge to follow UN human rights policy"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/r\/2019\/05\/14\/8c170afa-5e76-4707-ac69-5207fda59a51\/thumbnail\/770x578\/8b2ae4eb737778f1fdbaa4da71d6ec4a\/eyeidentityistock-516982188.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/NSO_Group\" target=\"_blank\" rel=\"noopener noreferrer\">NSO Group<\/a>, an Israeli company known for selling surveillance software (spyware) to governments across the world, has made a pledge this week to follow the UN&#8217;s human rights framework and adopt measures to prevent customers from abusing its tools to do harm.<\/p>\n<p>The company&#8217;s move comes after it&#8217;s been accused of selling spyware to oppressive regimes, which in turn, used it to spy on journalists, human rights activists, and political opponents.<\/p>\n<p>NSO has always denied having any knowledge of these abuse while they were going on, and has always said it only wanted to sell surveillance technology to law enforcement authorities across the world.<\/p>\n<p>However, multiple reports have linked the company&#8217;s tools to incidents where its software had been installed on the devices of people who had not committed any crimes, other than criticizing governments or investigating incumbent officials. <a href=\"https:\/\/www.amnesty.org\/en\/latest\/research\/2018\/08\/amnesty-international-among-targets-of-nso-powered-campaign\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amnesty International activists<\/a>, <a href=\"https:\/\/citizenlab.ca\/2018\/11\/mexican-journalists-investigating-cartels-targeted-nso-spyware-following-assassination-colleague\/\" target=\"_blank\" rel=\"noopener noreferrer\">journalists in Mexico<\/a>, and <a href=\"https:\/\/citizenlab.ca\/2016\/08\/million-dollar-dissident-iphone-zero-day-nso-group-uae\/\" target=\"_blank\" rel=\"noopener noreferrer\">Saudi dissidents<\/a> have had phones infected with potent iOS or Android spyware that investigators linked back to the company.<\/p>\n<h3>NSO: Misuse extremely rare<\/h3>\n<p>In a <a href=\"http:\/\/archive.is\/ITfew#selection-227.96-227.146\" target=\"_blank\" rel=\"noopener noreferrer\">press release<\/a> on Tuesday, September 10, NSO officials admitted that some of their customers did abuse their tools in the past. In an email to ZDNet, an NSO Group spokesperson said the company found three cases of confirmed misuse of its technologies, which they moved to shut down.<\/p>\n<p>NSO said misuse was &#8220;extremely rare,&#8221; but they are now launching an initiative to fight off any future abuse. This initiave includes two main components.<\/p>\n<p>The first is a Human Rights Policy, based on the <a href=\"https:\/\/www.ohchr.org\/Documents\/Publications\/GuidingPrinciplesBusinessHR_EN.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">UN&#8217;s Guiding Principles on Business and Human Rights<\/a>. The second is a Whistleblower Policy, a procedure through which outsiders can report cases of abuse.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The two moves are meant to quench some of the wave of criticism and bad press the company has been getting, and to put in place a set of rules for misbehaving customers.<\/p>\n<h3>Human rights groups yet to be convinced<\/h3>\n<p>But the company has a long way to go to change its image. For starters, it will have to convince Amnesty International and Citizen Lab, two human rights organizations that have exposed past cases where NSO tools had been used outside of legitimate crime investigations.<\/p>\n<p>In a blog post yesterday, Amnesty International challenged NSO to &#8220;<a href=\"https:\/\/www.amnesty.org\/en\/latest\/news\/2019\/09\/nso-spyware-human-rights\/\" target=\"_blank\" rel=\"noopener noreferrer\">match words with action<\/a>.&#8221;<\/p>\n<p>&#8220;NSO needs to demonstrate this is more than an attempt to whitewash its tarnished reputation,&#8221; said Danna Ingleton, Deputy Director of Amnesty Tech.<\/p>\n<p>&#8220;The NSO policy comes too late for the scores of activists targeted by abusive governments using the firm&#8217;s spyware, including UAE activist Ahmed Mansoor who was sentenced to 10 years in prison in 2018,&#8221; she added.<\/p>\n<p>&#8220;Some NSO customers clearly cannot resist abusing spyware to erode democracy, and a stern warning is not going to change that,&#8221; a Citizen Lab spokesperson told ZDNet.<\/p>\n<h3>NSO says it has leverage over customers<\/h3>\n<p>But in an email to ZDNet, an NSO spokesperson said the company can and has the tools to enforce its new Human Rights policy and prevent future abuse.<\/p>\n<p>&#8220;Our agreements require customers to fully comply with all national security and privacy laws and regulations, as well as specifically require that the products are used solely for fighting crime and terror and will not be used for human rights violations,&#8221; the company said.<\/p>\n<p>&#8220;In addition to our own review &#8211; both at the outset of licensing a product and reviews of existing contracts &#8211; our customers are required to notify us of any knowledge they may have regarding a misuse or potential misuse. We have an escalating set of remedies culminating in termination in case of misuse or refusal to co-operate in an investigation.&#8221;<\/p>\n<p>Furthermore, the company will also be heavily leaning on its Whistleblower Policy [<a href=\"https:\/\/www.nsogroup.com\/wp-content\/uploads\/2019\/09\/External-Whistleblowing-Policy_September19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>], which the company had created to set up a reporting channel for users or entities who spotted NSO surveillance tech being misused.<\/p>\n<p>But some sources told ZDNet the document might be a boobytrap that may prevent whistleblowers from disclosing abuse outside of NSO. Once an abuse case is reported, the whistleblower can&#8217;t talk about it to anyone.<\/p>\n<p>In a phone call with ZDNet today, <a href=\"https:\/\/www.washingtonian.com\/2017\/10\/24\/former-whistleblower-offers-pro-bono-help-officials-expose-government-wrongdoing\/\" target=\"_blank\" rel=\"noopener noreferrer\">John Tye<\/a>, a US lawyer specialized in whistleblower cases, recommended that any whistleblowers coming forward, regardless if they&#8217;re reporting issues to NSO or any other company, should contact a trusted lawyer before doing anything first.<\/p>\n<h3>Surveillance industry under assault<\/h3>\n<p>NSO Group new interest in safegurding innocent victims from abusive customers can be explained by a series of recent events that have put the company and the entire surveillance tech business on guard.<\/p>\n<p>For the past few months, pressure has been mounting against some surveillance vendors.<\/p>\n<p>In May, Amnesty International petioned an Israeli court <a href=\"https:\/\/www.timesofisrael.com\/amnesty-petitions-court-to-revoke-israeli-spyware-firms-export-license\/\" target=\"_blank\" rel=\"noopener noreferrer\">to revoke NSO&#8217;s export license<\/a>, the primary certification that allows the company to sell its products abroad, to foreign governments.<\/p>\n<p>A month later, a UN surveillance expert urged the organization and governments across the world to impose <a href=\"https:\/\/www.reuters.com\/article\/us-socialmedia-un-spyware\/u-n-surveillance-expert-urges-global-moratorium-on-sale-of-spyware-idUSKCN1TJ2DV\" target=\"_blank\" rel=\"noopener noreferrer\">a global ban on the sale of surveillance software<\/a>. The UN expert named NSO Group as one of the bad apples of the surveillance world.<\/p>\n<p>Similarly, fellow surveillance tech vendor FinFisher is <a href=\"https:\/\/netzpolitik.org\/2019\/we-filed-a-criminal-complaint-prosecutor-launches-investigation-into-finfisher-for-illegal-export-of-state-spyware\/#spendenleiste\" target=\"_blank\" rel=\"noopener noreferrer\">having problems in Germany<\/a>, where an investigation into its operations is underway, facing similar accusations of selling spyware to oppresive regimes.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facing legal assault, NSO Group pledges to fight customers abusing its tools to spy on innocents, political opponents.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29032,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-29031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infamous surveillance tech vendor makes pledge to follow UN human rights policy 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infamous surveillance tech vendor makes pledge to follow UN human rights policy 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-11T23:14:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Infamous surveillance tech vendor makes pledge to follow UN human rights policy\",\"datePublished\":\"2019-09-11T23:14:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/\"},\"wordCount\":884,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/\",\"name\":\"Infamous surveillance tech vendor makes pledge to follow UN human rights policy 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg\",\"datePublished\":\"2019-09-11T23:14:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infamous surveillance tech vendor makes pledge to follow UN human rights policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infamous surveillance tech vendor makes pledge to follow UN human rights policy 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/","og_locale":"en_US","og_type":"article","og_title":"Infamous surveillance tech vendor makes pledge to follow UN human rights policy 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-09-11T23:14:27+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Infamous surveillance tech vendor makes pledge to follow UN human rights policy","datePublished":"2019-09-11T23:14:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/"},"wordCount":884,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/","url":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/","name":"Infamous surveillance tech vendor makes pledge to follow UN human rights policy 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg","datePublished":"2019-09-11T23:14:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/09\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/infamous-surveillance-tech-vendor-makes-pledge-to-follow-un-human-rights-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Infamous surveillance tech vendor makes pledge to follow UN human rights policy"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29031"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29032"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}