{"id":244581,"date":"2025-12-04T15:51:36","date_gmt":"2025-12-04T15:51:36","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244581"},"modified":"2026-02-27T18:29:01","modified_gmt":"2026-02-27T18:29:01","slug":"how-the-internet-works","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/our-work\/how-the-internet-works\/","title":{"rendered":"Comment fonctionne Internet"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-42dae4f2 uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-b188db33\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">Comment fonctionne Internet<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-f58bbf59 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c51029d0\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>Internet est un r\u00e9seau mondial de r\u00e9seaux.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong><strong>Internet est un r\u00e9seau mondial de r\u00e9seaux.<\/strong><\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Quand Internet fonctionne comme pr\u00e9vu, tout utilisateur peut acc\u00e9der \u00e0 l\u2019ensemble du r\u00e9seau, partout dans le monde. Internet est constitu\u00e9 de dizaines de milliers de r\u00e9seaux interconnect\u00e9s, g\u00e9r\u00e9s par des fournisseurs de services, des entreprises, des universit\u00e9s, des gouvernements et des particuliers. Tous ces acteurs contribuent au d\u00e9veloppement continu et \u00e0 l\u2019adoption des technologies, des normes et des politiques li\u00e9es \u00e0 Internet. <\/p>\n\n\n\n<p class=\"has-18-font-size\">Des processus ouverts, transparents et collaboratifs, ainsi qu\u2019une propri\u00e9t\u00e9 d\u00e9centralis\u00e9e, font de l\u2019Internet mondial ce qu\u2019il est.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop uag-hide-tab\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">Comment fonctionne Internet<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>Internet est un r\u00e9seau mondial de r\u00e9seaux.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1450\" height=\"542\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Community-Networks-Suusamyr-Net-Kyrgyzstan-2018-1-2.jpg\" alt=\"Une femme assise \u00e0 un bureau, avec de nombreux \u00e9crans d\u2019ordinateur en arri\u00e8re-plan\" class=\"wp-image-242350\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Community-Networks-Suusamyr-Net-Kyrgyzstan-2018-1-2.jpg 1450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Community-Networks-Suusamyr-Net-Kyrgyzstan-2018-1-2-450x168.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Community-Networks-Suusamyr-Net-Kyrgyzstan-2018-1-2-1024x383.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Community-Networks-Suusamyr-Net-Kyrgyzstan-2018-1-2-768x287.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Community-Networks-Suusamyr-Net-Kyrgyzstan-2018-1-2-250x93.jpg 250w\" sizes=\"auto, (max-width: 1450px) 100vw, 1450px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Quand Internet fonctionne comme pr\u00e9vu, tout utilisateur peut acc\u00e9der \u00e0 l\u2019ensemble du r\u00e9seau, partout dans le monde. Internet est constitu\u00e9 de dizaines de milliers de r\u00e9seaux interconnect\u00e9s, g\u00e9r\u00e9s par des fournisseurs de services, des entreprises, des universit\u00e9s, des gouvernements et des particuliers. Tous ces acteurs contribuent au d\u00e9veloppement continu et \u00e0 l\u2019adoption des technologies, des normes et des politiques li\u00e9es \u00e0 Internet.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Des processus ouverts, transparents et collaboratifs, ainsi qu\u2019une propri\u00e9t\u00e9 d\u00e9centralis\u00e9e, font de l\u2019Internet mondial ce qu\u2019il est.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Liens essentiels sur le fonctionnement d\u2019Internet<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Liens essentiels sur le fonctionnement d\u2019Internet<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"602\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/AJL9342.jpg\" alt=\"Un homme en train de construire un r\u00e9seau communautaire\" class=\"wp-image-104376\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/AJL9342.jpg 1280w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/AJL9342-450x212.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/AJL9342-768x361.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/AJL9342-1024x482.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/08\/AJL9342-250x118.jpg 250w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/resources\/internet-impact-assessment-toolkit\/about-the-internet-way-of-networking\/ \" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Mode de fonctionnement du r\u00e9seau Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Le mode de fonctionnement du r\u00e9seau Internet est notre mani\u00e8re de d\u00e9crire l\u2019architecture et les pratiques fondamentales d\u2019Internet. En savoir plus sur les fondements uniques d\u2019Internet.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"391\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/IETF-98-Hackathon.jpg\" alt=\"Un homme v\u00eatu d\u2019une chemise noire est assis \u00e0 une table et travaille sur un ordinateur portable.\" class=\"wp-image-239399\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/IETF-98-Hackathon.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/IETF-98-Hackathon-450x293.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/IETF-98-Hackathon-250x163.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/how-the-internet-works\/open-internet-standards\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Normes Internet ouvertes<\/h3><\/div><p class=\"uagb-ifb-desc\">Internet repose fondamentalement sur des normes volontaires et ouvertes. Elles sont essentielles pour permettre l\u2019interconnexion des appareils, des services et des applications.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Measuring-rope.jpg\" alt=\"Une personne tenant une corde\" class=\"wp-image-239393\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Measuring-rope.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Measuring-rope-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Measuring-rope-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/pulse.internetsociety.org\/fr\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Mesurer Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Nous avons besoin de donn\u00e9es et d\u2019analyses pr\u00e9cises et coh\u00e9rentes pour comprendre comment Internet fonctionne et \u00e9volue. Internet Society Pulse regroupe des donn\u00e9es Internet fiables, provenant de tiers, sur un seul site Web.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"995\" height=\"587\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/08\/indigenous-women-technical-training.jpg\" alt=\"Deux femmes, assises \u00e0 une table, travaillent sur l\u2019infrastructure Internet.\" class=\"wp-image-213176\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/08\/indigenous-women-technical-training.jpg 995w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/08\/indigenous-women-technical-training-450x265.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/08\/indigenous-women-technical-training-768x453.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/08\/indigenous-women-technical-training-250x147.jpg 250w\" sizes=\"auto, (max-width: 995px) 100vw, 995px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-0b54d249 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/deploy360\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Technologies Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Les technologies Internet \u00e9voluent constamment pour offrir des exp\u00e9riences en ligne plus rapides et plus s\u00fbres.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"350\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/shaking-hands.jpg\" alt=\"Deux hommes se serrent la main en souriant, avec le drapeau du Suriname en arri\u00e8re-plan\" class=\"wp-image-197816\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/shaking-hands.jpg 800w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/shaking-hands-450x197.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/shaking-hands-768x336.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/08\/shaking-hands-250x109.jpg 250w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-7475369c uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2016\/gouvernance-de-linternet-pourquoi-lapproche-multi-acteurs-fonctionne\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Approche multipartite<\/h3><\/div><p class=\"uagb-ifb-desc\">L\u2019approche multipartite en mati\u00e8re de gouvernance de l\u2019Internet s\u2019est d\u00e9velopp\u00e9e pour d\u00e9passer l\u2019ADN propre de l\u2019Internet et en constituer le moteur.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/09\/Berners-Lee-Cerf_BriefHistory-e1521121950635.jpg\" alt=\"Deux hommes en costume en train de discuter\" class=\"wp-image-56734\" style=\"aspect-ratio:3\/2;object-fit:cover\"\/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-588ab5ca uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/internet\/history-internet\/brief-history-internet\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Histoire d\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Internet a r\u00e9volutionn\u00e9 la technologie et les communications. En savoir plus sur son \u00e9volution pour devenir l\u2019outil utile que nous connaissons aujourd\u2019hui.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Qui g\u00e8re Internet ?<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Qui g\u00e8re Internet ?<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Internet est une ressource mondiale. Chaque jour, les d\u00e9cisions qui le concernent ont un impact sur qui peut l\u2019utiliser, o\u00f9, comment et \u00e0 quel co\u00fbt.<\/p>\n\n\n\n<p class=\"has-18-font-size\">G\u00e9rer Internet avec la contribution et la repr\u00e9sentation de multiples parties prenantes garantit qu\u2019il reste un outil qui ne favorise aucun groupe et permet une innovation sans besoin d\u2019autorisation.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.internetsociety.org\/fr\/issues\/internet-governance\/who-runs-the-internet\/\"><strong>En savoir plus<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-wrapper\"><iframe loading=\"lazy\" title=\"Who Runs the Internet?\" src=\"https:\/\/player.vimeo.com\/video\/1092592964?h=3bb309665c&amp;dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div>\n<\/div><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1705' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1705\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (130)<\/span><\/option><option value=\"events-type\" >\u00c9v\u00e9nements<span class=\"cvp-count\"> (9)<\/span><\/option><option value=\"news-type\" >Actualit\u00e9s<span class=\"cvp-count\"> (7)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Communiqu\u00e9s de presse<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"statements-type\" >&nbsp;&nbsp;&nbsp;D\u00e9clarations<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (25)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (5)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Th\u00e8me<\/option><option value=\"comment-fonctionne-internet\" >Comment fonctionne Internet<span class=\"cvp-count\"> (131)<\/span><\/option><option value=\"deploy360-fr\" >&nbsp;&nbsp;&nbsp;Technologies Internet<span class=\"cvp-count\"> (73)<\/span><\/option><option value=\"les-normes-internet-ouvertes\" >&nbsp;&nbsp;&nbsp;Les normes Internet ouvertes<span class=\"cvp-count\"> (63)<\/span><\/option><option value=\"le-mode-de-fonctionnement-du-reseau-internet\" >&nbsp;&nbsp;&nbsp;Mode de fonctionnement du r\u00e9seau Internet<span class=\"cvp-count\"> (34)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"3z0n3m62\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"afrique\" >Afrique<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"asie-pacifique\" >Asie Pacifique<span class=\"cvp-count\"> (13)<\/span><\/option><option value=\"europe\" >Europe<span class=\"cvp-count\"> (13)<\/span><\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (129)<\/span><\/option><option value=\"amerique-latine-et-les-caraibes\" >Am\u00e9rique Latine et les Caraibes<span class=\"cvp-count\"> (7)<\/span><\/option><option value=\"moyen-orient\" >Moyen Orient<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (5)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-3z0n3m62\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"234975\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/renforcer-la-resilience-des-infrastructures-internet-sous%e2%80%91marines\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail cvp-substitute skip-lazy  cvplazy\" alt=\"Description: Carte du monde pr\u00e9sentant les principaux c\u00e2bles sous-marins. Source : TeleGeography.\" title=\"\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/10\/undersea-fibre-optic-cables\u2014570-as-of-2025.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-13T19:13:09+00:00\">13 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/renforcer-la-resilience-des-infrastructures-internet-sous%e2%80%91marines\/\" class=\"_self\" target=\"_self\" aria-label=\"Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0\">Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0<\/a><\/h2><div class=\"pt-cv-content\">Synth\u00e8se \u00c0 mesure que la d\u00e9pendance aux services num\u00e9riques s\u2019intensifie, la r\u00e9silience et la s\u00e9curit\u00e9 des syst\u00e8mes de c\u00e2bles sous-marins &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"237367\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-politique-normes-internet-ouvertes\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d&#039;orientation politique : Normes Internet ouvertes\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d&#039;orientation politique : Normes Internet ouvertes\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-10-29T15:45:20+00:00\">29 octobre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-politique-normes-internet-ouvertes\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d&#039;orientation politique : Normes Internet ouvertes\">Fiche d&rsquo;orientation politique : Normes Internet ouvertes<\/a><\/h2><div class=\"pt-cv-content\">En promouvant activement et en reconnaissant officiellement les normes ouvertes dans les politiques publiques, nous pouvons prot\u00e9ger les \u00e9l\u00e9ments fondamentaux &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230521\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 septembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\">Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0<\/a><\/h2><div class=\"pt-cv-content\">L\u2019Internet Society encourage les d\u00e9cideurs politiques \u00e0 privil\u00e9gier les solutions qui s\u2019attaquent aux contenus pr\u00e9judiciables \u00e0 la source, plut\u00f4t que &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"203060\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/11\/les-manrs-atteignent-de-nouveaux-sommets\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Les MANRS atteignent de nouveaux sommets\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a mountain peak covered with snow seen through colorful prayer flags\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/11\/Himalayah-peak-min-1.jpg 1440w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-11-02T15:00:00+00:00\">2 novembre 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/11\/les-manrs-atteignent-de-nouveaux-sommets\/\" class=\"_self\" target=\"_self\" aria-label=\"Les MANRS atteignent de nouveaux sommets\">Les MANRS atteignent de nouveaux sommets<\/a><\/h2><div class=\"pt-cv-content\">En nous associant \u00e0 la Global Cyber Alliance (GCA), nous pensons que les MANRS continueront \u00e0 s&rsquo;imposer comme la r\u00e9f\u00e9rence &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"188571\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/internet-impact-brief-how-canadas-online-news-act-will-harm-the-internet-restricting-innovation-security-and-growth-of-the-digital-economy\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Rapport de l&#039;impact sur Internet: Comment la Loi canadienne sur les nouvelles en ligne va nuire \u00e0 Internet, en limitant l&#039;innovation, la s\u00e9curit\u00e9 et la croissance de l&#039;\u00e9conomie num\u00e9rique\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Rapport de l&#039;impact sur Internet: Comment la Loi canadienne sur les nouvelles en ligne va nuire \u00e0 Internet, en limitant l&#039;innovation, la s\u00e9curit\u00e9 et la croissance de l&#039;\u00e9conomie num\u00e9rique\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-02-14T23:45:12+00:00\">14 f\u00e9vrier 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/internet-impact-brief-how-canadas-online-news-act-will-harm-the-internet-restricting-innovation-security-and-growth-of-the-digital-economy\/\" class=\"_self\" target=\"_self\" aria-label=\"Rapport de l&#039;impact sur Internet: Comment la Loi canadienne sur les nouvelles en ligne va nuire \u00e0 Internet, en limitant l&#039;innovation, la s\u00e9curit\u00e9 et la croissance de l&#039;\u00e9conomie num\u00e9rique\">Rapport de l&rsquo;impact sur Internet: Comment la Loi canadienne sur les nouvelles en ligne va nuire \u00e0 Internet, en limitant l&rsquo;innovation, la s\u00e9curit\u00e9 et la croissance de l&rsquo;\u00e9conomie num\u00e9rique<\/a><\/h2><div class=\"pt-cv-content\">D\u00e9couvrez comment la loi canadienne sur les nouvelles en ligne contribue \u00e0 la fragmentation en minant le cryptage et en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"181884\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2022\/explorer-la-souverainete-numerique-et-son-impact-sur-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Explorer la souverainet\u00e9 num\u00e9rique\u00a0et son impact sur l\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Explorer la souverainet\u00e9 num\u00e9rique\u00a0et son impact sur l\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-12-01T01:55:00+00:00\">1 d\u00e9cembre 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2022\/explorer-la-souverainete-numerique-et-son-impact-sur-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"Explorer la souverainet\u00e9 num\u00e9rique\u00a0et son impact sur l\u2019Internet\">Explorer la souverainet\u00e9 num\u00e9rique\u00a0et son impact sur l\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">Plongez dans une \u00e9tude et d\u00e9couvrez la souverainet\u00e9 num\u00e9rique et son impact sur Internet dans le monde &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"170840\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/05\/pourquoi-lexpediteur-payeur-est-une-menace-directe-pour-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Vieilles r\u00e8gles dans nouvelles r\u00e9glementations - Pourquoi &quot;l&#039;exp\u00e9diteur-payeur&quot; est une menace directe pour l&#039;Internet\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"321\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"un vieux t\u00e9l\u00e9phone rotatif poussi\u00e9reux sur une table avec des fils tombant autour de lui\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/wendy-scofield-fnlNwb5sB5Y-unsplash-1280x535-1-768x321.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/wendy-scofield-fnlNwb5sB5Y-unsplash-1280x535-1-768x321.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/wendy-scofield-fnlNwb5sB5Y-unsplash-1280x535-1-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/wendy-scofield-fnlNwb5sB5Y-unsplash-1280x535-1-1024x428.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/wendy-scofield-fnlNwb5sB5Y-unsplash-1280x535-1-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/wendy-scofield-fnlNwb5sB5Y-unsplash-1280x535-1.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-05-26T13:31:56+00:00\">26 mai 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/05\/pourquoi-lexpediteur-payeur-est-une-menace-directe-pour-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"Vieilles r\u00e8gles dans nouvelles r\u00e9glementations - Pourquoi &quot;l&#039;exp\u00e9diteur-payeur&quot; est une menace directe pour l&#039;Internet\">Vieilles r\u00e8gles dans nouvelles r\u00e9glementations &#8211; Pourquoi \u00ab\u00a0l&rsquo;exp\u00e9diteur-payeur\u00a0\u00bb est une menace directe pour l&rsquo;Internet<\/a><\/h2><div class=\"pt-cv-content\">Nous avons publi\u00e9 ce mois-ci une nouvelle note d&rsquo;impact Internet sur \u00ab\u00a0les r\u00e8gles d&rsquo;interconnexion de la Cor\u00e9e du Sud\u00a0\u00bb. Notre &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"169323\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2022\/comment-proteger-internet-contre-le-splinternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Comment prot\u00e9ger Internet\u00a0contre le Splinternet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Comment prot\u00e9ger Internet\u00a0contre le Splinternet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-05-12T17:16:54+00:00\">12 mai 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2022\/comment-proteger-internet-contre-le-splinternet\/\" class=\"_self\" target=\"_self\" aria-label=\"Comment prot\u00e9ger Internet\u00a0contre le Splinternet\">Comment prot\u00e9ger Internet\u00a0contre le Splinternet<\/a><\/h2><div class=\"pt-cv-content\">La notion de \u00ab Splinternet \u00bb repose sur l\u2019id\u00e9e que l\u2019Internet ouvert et mondialement connect\u00e9 que nous utilisons tous se &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"173054\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/04\/pratiques-courantes-dinterconnexion-et-de-facturation-des-reseaux-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Pratiques courantes d&#039;interconnexion et de facturation des r\u00e9seaux Internet\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"dessin de plusieurs ordinateurs et appareils connect\u00e9s \u00e0 des r\u00e9seaux\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/04\/Internet-of-Things-IoT-1280px-768x512.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/04\/Internet-of-Things-IoT-1280px-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/04\/Internet-of-Things-IoT-1280px-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/04\/Internet-of-Things-IoT-1280px-1024x683.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/04\/Internet-of-Things-IoT-1280px-250x167.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/04\/Internet-of-Things-IoT-1280px.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-04-20T14:24:08+00:00\">20 avril 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/04\/pratiques-courantes-dinterconnexion-et-de-facturation-des-reseaux-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Pratiques courantes d&#039;interconnexion et de facturation des r\u00e9seaux Internet\">Pratiques courantes d&rsquo;interconnexion et de facturation des r\u00e9seaux Internet<\/a><\/h2><div class=\"pt-cv-content\">Les r\u00e9seaux d&rsquo;Internet facturent \u00e0 leurs clients l&rsquo;acc\u00e8s \u00e0 Internet, quel que soit le sens du trafic. Les r\u00e9seaux doivent &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"19\" data-currentpage=\"1\" data-sid=\"3z0n3m62\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244581\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244581\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">\u2026<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244581\/?_page=19\">19<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244581\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Chargement\u2026\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-3z0n3m62 {text-align: left}\n#pt-cv-view-3z0n3m62 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-3z0n3m62 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-3z0n3m62 .pt-cv-meta-fields {  }#pt-cv-view-3z0n3m62 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-3z0n3m62 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-3z0n3m62 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-3z0n3m62 .pt-cv-thumb-wrapper {  }#pt-cv-view-3z0n3m62[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-3z0n3m62:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-3z0n3m62 .pt-cv-thumbnail {  }#pt-cv-view-3z0n3m62 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-3z0n3m62 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-rmwrap {  }#pt-cv-view-3z0n3m62 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-3z0n3m62 .pt-cv-taxoterm {  }#pt-cv-view-3z0n3m62 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='3z0n3m62']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='3z0n3m62']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-3z0n3m62 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-3z0n3m62 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-3z0n3m62 .pt-cv-title a {  }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { font-size: 16px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-3z0n3m62 .pt-cv-title a {  }#pt-cv-view-3z0n3m62 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-3z0n3m62 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='3z0n3m62'] input[type=\"text\"], .cvp-live-filter[data-sid='3z0n3m62'] div > label, .cvp-live-filter[data-sid='3z0n3m62'] select, .cvp-live-filter[data-sid='3z0n3m62'] .irs-from, .cvp-live-filter[data-sid='3z0n3m62'] .irs-to { font-size: 16px; }#pt-cv-view-3z0n3m62 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dit photo :<br>\u00a9 Nyani Quarmyne, \u00a9 Atul Loke\/Panos Pictures, \u00a9 Stonehouse Photographic, \u00a9 Nyani Quarmyne, \u00a9 Elyse Butler, \u00a9 Randy Berghout, \u00a9 Internet Society<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet est un r\u00e9seau mondial de r\u00e9seaux. Des processus ouverts, transparents et collaboratifs, ainsi qu&rsquo;une propri\u00e9t\u00e9 d\u00e9centralis\u00e9e, caract\u00e9risent l&rsquo;Internet mondial tel qu&rsquo;il est.<\/p>\n","protected":false},"author":1898,"featured_media":0,"parent":47369,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244581","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Internet est un r\u00e9seau mondial de r\u00e9seaux. Des processus ouverts, transparents et collaboratifs, ainsi qu'une propri\u00e9t\u00e9 d\u00e9centralis\u00e9e, caract\u00e9risent l'Internet mondial tel qu'il est.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=244581"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244581\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/47369"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=244581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=244581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=244581"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=244581"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=244581"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=244581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}