{"id":114010,"date":"2020-05-04T00:00:42","date_gmt":"2020-05-04T00:00:42","guid":{"rendered":"https:\/\/www.internetsociety.org\/?post_type=news&#038;p=114010"},"modified":"2025-09-16T20:28:36","modified_gmt":"2025-09-16T20:28:36","slug":"le-tracking-est-possible-en-afrique-mais-qui-garantit-la-protection-des-donnees-personnelles","status":"publish","type":"news","link":"https:\/\/www.internetsociety.org\/fr\/news\/dans-les-nouvelles\/2020\/le-tracking-est-possible-en-afrique-mais-qui-garantit-la-protection-des-donnees-personnelles\/","title":{"rendered":"\u00ab Le \u201ctracking\u201d est possible en Afrique, mais qui garantit la protection des donn\u00e9es personnelles ? \u00bb"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1551,"featured_media":0,"template":"","categories":[185,120,4909],"tags":[],"region_news_regions":[113],"content_category":[],"class_list":["post-114010","news","type-news","status-publish","hentry","category-confiance","category-acces","category-renforcer-internet","region_news_regions-afrique","news_type-dans-les-nouvelles"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"M\u00f4nica Fast","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/fast\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/news\/114010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1551"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=114010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=114010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=114010"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=114010"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=114010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}