{"id":244691,"date":"2025-12-02T18:10:46","date_gmt":"2025-12-02T18:10:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244691"},"modified":"2026-02-27T18:54:46","modified_gmt":"2026-02-27T18:54:46","slug":"internet-policy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-policy\/","title":{"rendered":"Politiques Internet"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-ffc93ebd uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c95947c4\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">Politiques Internet<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f5da99 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-bf6c64fb\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>Les politiques peuvent soit am\u00e9liorer Internet, soit nuire \u00e0 celui-ci pour nous tous.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong>Les politiques peuvent soit am\u00e9liorer Internet, soit nuire \u00e0 celui-ci pour nous tous.<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-b4c134c7 uagb-columns__columns-1 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-4e25c9ae\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-18-font-size\">Sous la pression des enjeux sociaux et des int\u00e9r\u00eats commerciaux, les efforts des gouvernements pour r\u00e9glementer divers aspects d\u2019Internet s\u2019intensifient \u00e0 l\u2019\u00e9chelle mondiale. Mais m\u00eame des politiques bien intentionn\u00e9es peuvent compromettre la nature mondiale d\u2019Internet et son infrastructure fondamentale \u2014 que ce soit volontairement ou par inadvertance.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop uag-hide-tab\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">Politiques Internet<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>Les politiques peuvent soit am\u00e9liorer Internet, soit nuire \u00e0 celui-ci pour nous tous.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1498\" height=\"751\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone.jpg\" alt=\"Des personnes assises sur une colline, absorb\u00e9es par un t\u00e9l\u00e9phone portable\" class=\"wp-image-239758\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone.jpg 1498w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-450x226.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-1024x513.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-768x385.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-250x125.jpg 250w\" sizes=\"auto, (max-width: 1498px) 100vw, 1498px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Sous la pression des enjeux sociaux et des int\u00e9r\u00eats commerciaux, les efforts des gouvernements pour r\u00e9glementer divers aspects d\u2019Internet s\u2019intensifient \u00e0 l\u2019\u00e9chelle mondiale. Mais m\u00eame des politiques bien intentionn\u00e9es peuvent compromettre la nature mondiale d\u2019Internet et son infrastructure fondamentale \u2014 que ce soit volontairement ou par inadvertance.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Liens essentiels sur les politiques Internet<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Liens essentiels sur les politiques Internet<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC.jpg\" alt=\"Un groupe de personnes en train d\u2019\u00e9crire\" class=\"wp-image-239709\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/blog\/2025\/06\/how-policy-experts-run-the-internet\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comment les d\u00e9cideurs politiques g\u00e8rent Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">La politique Internet est fa\u00e7onn\u00e9e par un \u00e9cosyst\u00e8me mondial compos\u00e9 de l\u00e9gislateurs, d\u2019organismes de r\u00e9glementation, d\u2019organisations internationales, de groupes de la soci\u00e9t\u00e9 civile, ainsi que d\u2019experts techniques et en politiques.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"667\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1.jpg\" alt=\"Deux femmes sur le perron, travaillant ensemble sur un ordinateur portable\" class=\"wp-image-239699\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1.jpg 667w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-450x450.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-250x250.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-600x600.jpg 600w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/a-policy-framework-for-internet-intermediaries-and-content\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comprendre les interm\u00e9diaires d\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Les interm\u00e9diaires d\u2019Internet sont essentiels \u00e0 l\u2019existence m\u00eame d\u2019Internet. Consultez notre cadre de politiques pour les interm\u00e9diaires d\u2019Internet et le contenu.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg\" alt=\"Un homme en chemise jaune debout derri\u00e8re un pupitre, pronon\u00e7ant un discours\" class=\"wp-image-239701\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-governance\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Promouvoir la gouvernance de l\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Internet fonctionne mieux lorsqu\u2019il est gouvern\u00e9 par plusieurs. Nous pr\u00e9conisons une approche multipartite de la gouvernance d\u2019Internet, o\u00f9 tous les acteurs int\u00e9ress\u00e9s peuvent participer.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"850\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k.jpg\" alt=\"Photo du b\u00e2timent de la Cour supr\u00eame des \u00c9tats-Unis \u00e0 Washington, D.C.\" class=\"wp-image-205099\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k.jpg 1280w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-450x299.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-1024x680.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-768x510.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-250x166.jpg 250w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-cc442a13 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/amicus-program\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Influencer les politiques publiques par le biais des tribunaux<\/h3><\/div><p class=\"uagb-ifb-desc\">Notre programme Amicus donne \u00e0 Internet une voix devant les tribunaux du monde entier, l\u00e0 o\u00f9 les d\u00e9cisions juridiques, les interpr\u00e9tations et les r\u00e9glementations affectent son fonctionnement.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"665\" height=\"665\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1.jpg\" alt=\"Deux hommes debout c\u00f4te \u00e0 c\u00f4te sur un trottoir en train de discuter\" class=\"wp-image-220929\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1.jpg 665w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-450x450.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-250x250.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-600x600.jpg 600w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-86535691 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/get-involved\/advocate\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comment d\u00e9fendre Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Il nous incombe \u00e0 tous de prot\u00e9ger et de d\u00e9fendre ce dont Internet a besoin pour exister et prosp\u00e9rer. En savoir plus sur ce que vous pouvez faire pour changer les choses.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain.jpg\" alt=\"Une personne en montagne tient un t\u00e9l\u00e9phone portable\" class=\"wp-image-239706\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-917a6d40 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/countering-internet-threats\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Pr\u00e9server l\u2019ouverture d\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Toute politique ou d\u00e9cision qui compromet la nature ouverte, mondiale et interop\u00e9rable d\u2019Internet contribue \u00e0 sa fragmentation.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-983fdfa8 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-f34f6c41\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"349\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo.jpg\" alt=\"Une personne prend une photo avec un t\u00e9l\u00e9phone portable\" class=\"wp-image-239704\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo-450x262.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo-250x145.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-dde34b92 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">S\u00e9curiser Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Le chiffrement renforce le pouvoir des individus et assure leur s\u00e9curit\u00e9 en ligne. C\u2019est un outil essentiel pour nous prot\u00e9ger dans une soci\u00e9t\u00e9 num\u00e9rique.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-af0333e8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"767\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN.jpg\" alt=\"Un homme debout devant un ordinateur en charge et un panneau de l\u2019Internet Society\" class=\"wp-image-228357\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN-450x345.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN-768x589.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN-250x192.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-aed86da8 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/connectivity\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Connecter les gens \u00e0 Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Nous contribuons \u00e0 l\u2019\u00e9laboration et \u00e0 la promotion de politiques aupr\u00e8s de diff\u00e9rents organismes de r\u00e9glementation et l\u00e9gislatifs afin de permettre aux personnes de se connecter \u00e0 Internet.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-cd0f1a76\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1447\" height=\"600\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1.jpg\" alt=\"Une femme portant un foulard vert et noir prononce un discours lors d\u2019une conf\u00e9rence.\" class=\"wp-image-208911\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1.jpg 1447w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-450x187.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-1024x425.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-768x318.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-250x104.jpg 250w\" sizes=\"auto, (max-width: 1447px) 100vw, 1447px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-14fe9def uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/internet-impact-assessment-toolkit\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Analyser une proposition de loi<\/h3><\/div><p class=\"uagb-ifb-desc\">D\u00e9couvrez notre bo\u00eete \u00e0 outils pour en savoir plus sur la mani\u00e8re de construire des arguments solides en faveur de la d\u00e9fense d\u2019Internet et \u00e9valuer l\u2019impact des politiques.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Le chiffrement prot\u00e8ge tout le monde<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Le chiffrement prot\u00e8ge tout le monde<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Nous avons organis\u00e9 \u00e0 Bruxelles un atelier destin\u00e9 aux organisations de la soci\u00e9t\u00e9 civile afin d\u2019explorer les menaces l\u00e9gislatives qui p\u00e8sent sur le chiffrement et d\u2019\u00e9laborer des strat\u00e9gies politiques communes pour sensibiliser les d\u00e9cideurs politiques \u00e0 l\u2019importance du chiffrement pour les utilisateurs quotidiens.<\/p>\n\n\n\n<p class=\"has-18-font-size\">D\u00e9couvrez les t\u00e9moignages des participants sur leur exp\u00e9rience et les raisons de leur engagement passionn\u00e9 en faveur d\u2019un chiffrement robuste.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.internetsociety.org\/blog\/2025\/07\/encryption-makes-us-powerful-internet-society-hosts-encryption-advocacy-workshop-for-european-civil-society\/\"><strong>Lire l\u2019article de blog<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Advocating for Strong Encryption\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/xmD7NYEm21E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1507' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1507\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (246)<\/span><\/option><option value=\"campaigns-type\" >Campagnes<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"events-type\" >\u00c9v\u00e9nements<span class=\"cvp-count\"> (68)<\/span><\/option><option value=\"news-type\" >Actualit\u00e9s<span class=\"cvp-count\"> (28)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Communiqu\u00e9s de presse<span class=\"cvp-count\"> (23)<\/span><\/option><option value=\"statements-type\" >&nbsp;&nbsp;&nbsp;D\u00e9clarations<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"open-letters\" >Lettres ouvertes<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (86)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (23)<\/span><\/option><option value=\"speeches-type\" >&nbsp;&nbsp;&nbsp;Discours<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"stories-type\" >Histoires<span class=\"cvp-count\"> (32)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Th\u00e8me<\/option><option value=\"acces\" >R\u00e9duire la fracture num\u00e9rique<span class=\"cvp-count\"> (302)<\/span><\/option><option value=\"cryptage\" >Cryptage<span class=\"cvp-count\"> (63)<\/span><\/option><option value=\"gouvernance-internet\" >Gouvernance Internet<span class=\"cvp-count\"> (57)<\/span><\/option><option value=\"politique-publique\" >Politiques Internet<span class=\"cvp-count\"> (49)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"afrique\" >Afrique<span class=\"cvp-count\"> (109)<\/span><\/option><option value=\"asie-pacifique\" >Asie Pacifique<span class=\"cvp-count\"> (32)<\/span><\/option><option value=\"europe\" >Europe<span class=\"cvp-count\"> (38)<\/span><\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (181)<\/span><\/option><option value=\"amerique-latine-et-les-caraibes\" >Am\u00e9rique Latine et les Caraibes<span class=\"cvp-count\"> (26)<\/span><\/option><option value=\"moyen-orient\" >Moyen Orient<span class=\"cvp-count\"> (8)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (55)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"247563\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/defending-the-open-internet-in-the-dna-consultation\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Passez \u00e0 l\u2019action : d\u00e9fendez l\u2019Internet ouvert dans le cadre de la consultation sur le DNA de la Commission europ\u00e9enne\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Passez \u00e0 l\u2019action : d\u00e9fendez l\u2019Internet ouvert dans le cadre de la consultation sur le DNA de la Commission europ\u00e9enne\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/campaigns-type\/' title='Campagnes' class='pt-cv-tax-campaigns-type'>Campagnes<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-04-10T21:35:45+00:00\">10 avril 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/defending-the-open-internet-in-the-dna-consultation\/\" class=\"_self\" target=\"_self\" aria-label=\"Passez \u00e0 l\u2019action : d\u00e9fendez l\u2019Internet ouvert dans le cadre de la consultation sur le DNA de la Commission europ\u00e9enne\">Passez \u00e0 l\u2019action : d\u00e9fendez l\u2019Internet ouvert dans le cadre de la consultation sur le DNA de la Commission europ\u00e9enne<\/a><\/h2><div class=\"pt-cv-content\">La Commission europ\u00e9enne a lanc\u00e9 une consultation publique sur la loi relative aux r\u00e9seaux num\u00e9riques. Nous invitons la communaut\u00e9 de &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"247418\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-governance\/tirer-le-meilleur-parti-du-forum-sur-la-gouvernance-de-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Tirer le meilleur parti du Forum sur la gouvernance de l\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Tirer le meilleur parti du Forum sur la gouvernance de l\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/campaigns-type\/' title='Campagnes' class='pt-cv-tax-campaigns-type'>Campagnes<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-04-10T20:06:25+00:00\">10 avril 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-governance\/tirer-le-meilleur-parti-du-forum-sur-la-gouvernance-de-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"Tirer le meilleur parti du Forum sur la gouvernance de l\u2019Internet\">Tirer le meilleur parti du Forum sur la gouvernance de l\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">Nous vous invitons \u00e0 nous faire part de vos suggestions sur la mani\u00e8re de tirer le meilleur parti du Forum &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"247939\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-policy\/keep-canada-protected\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Assurer la protection du Canada\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"307\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Assurer la protection du Canada\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/canada-protected-768x307.png\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/canada-protected-768x307.png 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/canada-protected-450x180.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/canada-protected-1024x410.png 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/canada-protected-250x100.png 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/canada-protected.png 1500w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/campaigns-type\/' title='Campagnes' class='pt-cv-tax-campaigns-type'>Campagnes<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-04-09T12:33:23+00:00\">9 avril 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-policy\/keep-canada-protected\/\" class=\"_self\" target=\"_self\" aria-label=\"Assurer la protection du Canada\">Assurer la protection du Canada<\/a><\/h2><div class=\"pt-cv-content\">Le gouvernement affirme que les pouvoirs d\u2019acc\u00e8s l\u00e9gal pr\u00e9vus par le projet de loi C-22 contribueront \u00e0 lutter contre la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"247553\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2026\/04\/dns-blocking-mind-the-unintended-consequences\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Blocage DNS : attention aux cons\u00e9quences inattendues\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A screen displays a repeated error message\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2026\/04\/error-message.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-04-03T13:00:00+00:00\">3 avril 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2026\/04\/dns-blocking-mind-the-unintended-consequences\/\" class=\"_self\" target=\"_self\" aria-label=\"Blocage DNS : attention aux cons\u00e9quences inattendues\">Blocage DNS : attention aux cons\u00e9quences inattendues<\/a><\/h2><div class=\"pt-cv-content\">Avec la multiplication des mandats de blocage DNS, les inqui\u00e9tudes concernant la s\u00e9curit\u00e9, l&rsquo;ouverture d&rsquo;Internet et la fragmentation augmentent \u00e9galement &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"246442\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2026\/2025-annual-report\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Rapport annuel 2025\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Rapport annuel 2025\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-03-31T16:20:01+00:00\">31 mars 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2026\/2025-annual-report\/\" class=\"_self\" target=\"_self\" aria-label=\"Rapport annuel 2025\">Rapport annuel 2025<\/a><\/h2><div class=\"pt-cv-content\">Le rapport explique comment notre communaut\u00e9 mondiale a relev\u00e9 le d\u00e9fi de notre ambitieuse strat\u00e9gie quinquennale visant \u00e0 \u00e9largir l\u2019acc\u00e8s &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"244450\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/interconnexion-et-obligations-de-trafic-reglemente\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Document d&#039;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Document d&#039;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-19T18:10:24+00:00\">19 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/interconnexion-et-obligations-de-trafic-reglemente\/\" class=\"_self\" target=\"_self\" aria-label=\"Document d&#039;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9\">Document d&rsquo;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9<\/a><\/h2><div class=\"pt-cv-content\">Ce document d\u2019orientation analyse la pression croissante en faveur d\u2019une r\u00e9glementation des relations entre les services en ligne et les &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242756\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\">Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne<\/a><\/h2><div class=\"pt-cv-content\">Les politiques exigeant des v\u00e9rifications d\u2019\u00e2ge, bien qu\u2019elles partent souvent d\u2019une bonne intention, cr\u00e9ent des risques pour les personnes en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"240175\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/approches-doctroi-de-licences-pour-la-connectivite-centree-sur-la-communaute\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-28T11:42:07+00:00\">28 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/approches-doctroi-de-licences-pour-la-connectivite-centree-sur-la-communaute\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9\">Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9<\/a><\/h2><div class=\"pt-cv-content\">D\u00e9couvrez comment les solutions de connectivit\u00e9 centr\u00e9e sur la communaut\u00e9 contribuent \u00e0 l&rsquo;essor des zones mal desservies. Explorez les options &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242698\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/gouvernance-de-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Gouvernance de l\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Gouvernance de l\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-26T18:02:23+00:00\">26 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/gouvernance-de-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Gouvernance de l\u2019Internet\">Fiche d\u2019orientation : Gouvernance de l\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">Cette fiche d\u2019orientation examine les principaux enjeux et d\u00e9fis et pr\u00e9sente des principes directeurs pour une gouvernance multipartite de l\u2019Internet &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"50\" data-currentpage=\"1\" data-sid=\"bu5bn556\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">\u2026<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=50\">50<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Chargement\u2026\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dit photo :<br>\u00a9 Nyani Quarmyne, \u00a9 Flawless Events, \u00a9 Jordi Ruiz Cirera, \u00a9 Flawless Events, creative commons, \u00a9 Chris Gregory, \u00a9 Nyani Quarmyne, \u00a9 Wharton Image, \u00a9 Internet Society, \u00a9 Frederic Courbet\/Panos Pictures<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.<\/p>\n","protected":false},"author":1898,"featured_media":239701,"parent":47369,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244691","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-450x300.jpg",450,300,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false]},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=244691"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/47369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/239701"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=244691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=244691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=244691"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=244691"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=244691"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=244691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}