Proposal

APrIGF 2025 Session Proposal Submission Form
Part 1 - Lead Organizer
Contact Person
Ms. Nuva Rai
Email
Organization / Affiliation (Please state "Individual" if appropriate) *
Body & Data, Nepal
Designation
Sr. Program Officer
Gender
Female
Economy of Residence
Nepal
Stakeholder Group
Civil Society
List Your Organizing Partners (if any)
N/A
Part 2 - Session Proposal
Session Title
"Which Animal Are You?" Take a Quiz, Learn More
Thematic Track of Your Session
  • Option

    • Primary: Security & Trust
    • Secondary: Innovation & Emerging Technologies
Description of Session Formats
Workshop (60 minutes)
Where do you plan to organize your session?
Onsite at the venue (with online moderator for questions and comments from remote participants)
Specific Issues for Discussion
This workshop focuses on the importance of online data privacy and security. We will create a "Which Animal Are You?" quiz, where the participants will have to provide some personal details. This exercise will serve as example of how easily personal information can be collected. We will then discuss our comfort levels when sharing data online, especially without reviewing privacy terms often because they are written in a language format that is hard to understand and access, and then discuss how readily available information can lead to security risks. The workshop will end with a session for brainstorming strategies to protect our digital information. In this session we will delve into:
1. Data Aggregation and Profiling: This refers to the process where seemingly unrelated pieces of individual data are collected and combined to construct comprehensive personal profiles.
2. Online Tracking
This mechanism involves websites and third-party entities monitoring and recording user behavior across various online platforms and services.
3. Vulnerabilities to Hacking and Identity Theft
When personal information is readily available, individuals become considerably more susceptible to various cyber threats, including direct cyberattacks, deceptive phishing scams.
4. The Need for Platform Accountability and Digital Literacy
While individuals must understand the mechanisms by which their personal data is utilized online and actively manage and safeguard their digital presence and information, platforms must be held accountable. As, individual efforts are limited without a fundamental commitment to platform accountability, which is essential in ensuring systemic data protection and privacy.
5. Proactive Data Protection Strategies
This segment will explore and detail practical, actionable steps that individuals can implement to effectively minimize their online digital footprint and substantially enhance their overall online security posture.
Describe the Relevance of Your Session to APrIGF
Relates to "Security and Trust" by:
Our examination of online tracking, data aggregation, and vulnerabilities shows the inherent security challenges users face in the digital sphere. By exposing how easily personal data can be collected and exploited, we highlight the current gap in user security. Moreover, the discussion on how personal information, shared unknowingly or without full consent, can be used breaks trust in online services and the digital ecosystem. Our session will show why this break of trust is a necessary to bring criticality in users, making them more aware of their online presence. Our session will explore strategies for protecting user, and exploring where accountability lies in data security including platform accountability and digital governance.
Connects with "Innovation & Emerging Technologies" as a sub-theme by:
Methods of data aggregation, online tracking, and cyberattacks are getting more complex with technological innovation. Our session will show how new technologies, while offering convenience and connectivity, introduce new ways for data collection and misuse. Only by understanding the risks, participants will be better positioned to advocate for privacy-by-design principles.
The expected outcomes:
1. By making complex data privacy issues understandable, we help participants to become more aware and build a more secure and trustworthy digital space.
2. The session does not only identify risks but also brings people from different backgrounds to actively brainstorm security strategies. This shift encourages a proactive stance on personal security, which is essential for fostering trust in digital interactions and systems.
3. Calls for emerging technologies to be developed with security and ethical data handling as core. This requires a framework of digital governance that balances individual awareness with strong accountability from platforms and government.
Methodology / Agenda (Please add rows by clicking "+" on the right)
Time frame (e.g. 5 minutes, 20 minutes, should add up to the time limit of your selected session format) Description
Welcome & Introduction (5 minutes) Briefly introduce the session, set a welcoming tone. Explain that we will start with something fun that will lead to a very important discussion.
The "Which Animal Are You?" Quiz (5 minutes) Guide participants through a short, interactive quiz. The quiz will ask for basic, seemingly innocent personal details (e.g., "What's your name?", “What’s your gender?”, “What’s your age?”, "What's your favorite color?", "What's a hobby you enjoy?", "Where were you born?") and then randomly assign an animal.
Initial Reactions & Debrief (10 minutes) Open the floor for initial reactions. Ask questions like: How do you feel about the animal you got? How did it feel sharing those personal details in what seemed like a fun quiz? Have you taken similar quizzes online before? What kind of information did they ask for?
Group Discussion on Understanding Data Vulnerability (15 minutes) An exploration of the ways in which these harmless details could be used Facilitate the discussion on how the data collected, even from a simple quiz, can be used for: Tracking and Profiling Targeted Advertising Vulnerability to Hacking/Phishing
Brainstorming Strategies and Sharing (15 minutes) Facilitate a discussion on, what are some ways we can better protect our data online? Who else is responsible for protecting user data online?
Resharing of the Strategies in the larger group
Moderators & Speakers Info (Please complete where possible) - (Required)
  • Moderator (Primary)

    • Name: Nuva
    • Organization: Body & Data
    • Designation: Sr. Program Officer
    • Gender: Female
    • Economy / Country of Residence: Nepal
    • Stakeholder Group: Civil Society
    • Expected Presence: In-person
    • Status of Confirmation: Confirmed
    • Link of Bio (URL only): https://docs.google.com/document/d/1i4yg0CVFSRW8D18OYBjYA3nIUr7SVbJYdsIanYoY2-Y/edit?tab=t.0#heading=h.hhxc8qgv98in
  • Moderator (Facilitator)

    • Name: Monisha
    • Organization: Body & Data
    • Designation: Program Officer
    • Gender: Non-Binary
    • Economy / Country of Residence: Nepal
    • Stakeholder Group: Civil Society
    • Expected Presence: In-person
    • Status of Confirmation: Confirmed
    • Link of Bio (URL only): https://docs.google.com/document/d/1i4yg0CVFSRW8D18OYBjYA3nIUr7SVbJYdsIanYoY2-Y/edit?tab=t.0#heading=h.hhxc8qgv98in
  • Speaker 1

    • Stakeholder Group: Select One
    • Expected Presence: Online
    • Status of Confirmation: Confirmed
  • Speaker 2

    • Stakeholder Group: Select One
    • Expected Presence: Select One
    • Status of Confirmation: Select One
  • Speaker 3

    • Stakeholder Group: Select One
    • Expected Presence: Select One
    • Status of Confirmation: Select One
  • Speaker 4

    • Stakeholder Group: Select One
    • Expected Presence: Select One
    • Status of Confirmation: Select One
  • Speaker 5

    • Stakeholder Group: Select One
    • Expected Presence: Select One
    • Status of Confirmation: Select One
Please explain the rationale for choosing each of the above contributors to the session.
Monisha: Monisha (they/them) is a non-binary law graduate and researcher dedicated to advancing digital and gender justice. They strive to bridge the gap between policies and marginalised experiences through advocacy and socio-legal research. They are involved in various organizations, including Body & Data and Queer Youth Group.
Nuva Rai: As an Indigenous feminist with over 4years of experience empowering marginalized communities and two years specifically in digital rights at Body & Data, Nuva complements Monika's expertise by offering valuable insights into digital inclusion and the specific challenges faced by marginalized communities in the online space.
Together, their combined experience provides a rich understanding of the technical, social, and ethical dimensions of data privacy, ensuring the session is easy, accessible and critical
If you need assistance to find a suitable speaker to contribute to your session, or an onsite facilitator for your online-only session, please specify your request with details of what you are looking for.
N/A
Please declare if you have any potential conflict of interest with the Program Committee 2025.
No
Are you or other session contributors planning to apply for the APrIGF Fellowship Program 2025?
Yes
Upon evaluation by the Program Committee, your session proposal may only be selected under the condition that you will accept the suggestion of merging with another proposal with similar topics. Please state your preference below:
Yes, I am willing to work with another session proposer on a suggested merger.
APrIGF offers live transcript in English for all sessions. Do you need any other translation support or any disability related requests for your session? APrIGF makes every effort to be a fully inclusive and accessible event, and will do the best to fulfill your needs.
Not for now.
Brief Summary of Your Session
This interactive workshop on data privacy was centered on practical, collaborative learning. The session began with a hands-on "Which Animal Are You?" quiz to immediately and practically demonstrate how personal information is collected and potentially exploited. This activity created a shared experience for all attendees, regardless of their technical background. Following this activity, participants attended a presentation on how their data is collected through sophisticated methods, including lucrative, hard-to-find privacy policies and the use of "privacy dark patterns" and manipulation to obtain sensitive consent. The session culminated with a collaborative segment where participants broke out into four rooms to discuss and develop actionable strategies to protect themselves against privacy risks, identify and escape dark patterns, and protect and control their sensitive information.
Substantive Summary of the Key Issues Raised and the Discussion
Key issues discussed in the session was based on the understanding that seemingly innocent games and entertaining quizzes can easily entice one into giving up crucial, sensitive information, with the help of a quiz. A major concern discussed was dark patterns, which are common practices in online user interfaces designed to steer, deceive, coerce, or manipulate consumers into making choices that are not in their best interests. Beyond recognizing these threats, the session also explored practical ways to save our personal information online, discussed the need for greater accessibility of privacy policies, highlighted the problem of forced or manipulated consent, and emphasized the importance of digital literacy & capacity building. Some participants also mentioned that they adopt a no trust policy while using apps or websites and knowingly provide false data to ensure their data is not misused. Some other strategies were to verify all links and forms before engaging. Other security measures were highlighted, included the need to avoid public Wi-Fi for sensitive activities like accessing banking apps and to enable Two-Factor Authentication (2FA) on all key accounts.
Conclusions and Suggestions of Way Forward
We will use the security lessons from this session to guide our future plan, focusing on two main goals: sharing what we know and making our training better. First, we will turn all the discussed advice like Zero Trust, required 2FA, avoiding public Wi-Fi for work, into one simple, practical guide. We will then share this guide widely in other trainings and workshops so everyone can easily learn and build their digital skills.
Second, we will work to improve the session based on feedback, changing the format and topics to better fit different groups, from community members to students in schools.
Number of Attendees (Please fill in numbers)
    • Online: 48
Gender Balance in Moderators/Speakers (Please fill in numbers)
  • Moderators

    • Female: 1
    • Non-binary / Self-describe: 1
How were gender perspectives, equality, inclusion or empowerment discussed? Please provide details and context.
Gender perspectives, equality, and inclusion were primarily addressed through the session's initial establishment of guiding ethical principles. These principles served as the moral framework for the entire discussion. Further, the session and the presentation were curated through an equitable and inclusive lens.

Particularly, the session dealt with how dark patterns may use relatively generic information such as age and name along with sensitive information such as gender identity and sexual expression to profile users and profit from them. Discussion on these issues were supplemented by evidence of use of such profiling and targeting by large corporations of marginalized groups. In subsequent discussions, considerations of empowerment were emphasized, as participants said that capacity building for users was necessary to identify and prevent falling into such dark patterns.
Consent
I agree that my data can be submitted to forms.for.asia and processed by APrIGF organizers for the program selection of APrIGF 2025.