{"id":244691,"date":"2025-12-02T18:10:46","date_gmt":"2025-12-02T18:10:46","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244691"},"modified":"2026-02-27T18:54:46","modified_gmt":"2026-02-27T18:54:46","slug":"internet-policy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-policy\/","title":{"rendered":"Politiques Internet"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-ffc93ebd uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c95947c4\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">Politiques Internet<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f5da99 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-bf6c64fb\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>Les politiques peuvent soit am\u00e9liorer Internet, soit nuire \u00e0 celui-ci pour nous tous.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong>Les politiques peuvent soit am\u00e9liorer Internet, soit nuire \u00e0 celui-ci pour nous tous.<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-b4c134c7 uagb-columns__columns-1 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-4e25c9ae\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-18-font-size\">Sous la pression des enjeux sociaux et des int\u00e9r\u00eats commerciaux, les efforts des gouvernements pour r\u00e9glementer divers aspects d\u2019Internet s\u2019intensifient \u00e0 l\u2019\u00e9chelle mondiale. Mais m\u00eame des politiques bien intentionn\u00e9es peuvent compromettre la nature mondiale d\u2019Internet et son infrastructure fondamentale \u2014 que ce soit volontairement ou par inadvertance.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop uag-hide-tab\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">Politiques Internet<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>Les politiques peuvent soit am\u00e9liorer Internet, soit nuire \u00e0 celui-ci pour nous tous.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1498\" height=\"751\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone.jpg\" alt=\"Des personnes assises sur une colline, absorb\u00e9es par un t\u00e9l\u00e9phone portable\" class=\"wp-image-239758\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone.jpg 1498w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-450x226.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-1024x513.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-768x385.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-on-road-phone-250x125.jpg 250w\" sizes=\"auto, (max-width: 1498px) 100vw, 1498px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Sous la pression des enjeux sociaux et des int\u00e9r\u00eats commerciaux, les efforts des gouvernements pour r\u00e9glementer divers aspects d\u2019Internet s\u2019intensifient \u00e0 l\u2019\u00e9chelle mondiale. Mais m\u00eame des politiques bien intentionn\u00e9es peuvent compromettre la nature mondiale d\u2019Internet et son infrastructure fondamentale \u2014 que ce soit volontairement ou par inadvertance.<\/p>\n\n\n\n<p class=\"has-18-font-size\">Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Liens essentiels sur les politiques Internet<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Liens essentiels sur les politiques Internet<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC.jpg\" alt=\"Un groupe de personnes en train d\u2019\u00e9crire\" class=\"wp-image-239709\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/people-writing-APAC-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/blog\/2025\/06\/how-policy-experts-run-the-internet\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comment les d\u00e9cideurs politiques g\u00e8rent Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">La politique Internet est fa\u00e7onn\u00e9e par un \u00e9cosyst\u00e8me mondial compos\u00e9 de l\u00e9gislateurs, d\u2019organismes de r\u00e9glementation, d\u2019organisations internationales, de groupes de la soci\u00e9t\u00e9 civile, ainsi que d\u2019experts techniques et en politiques.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"667\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1.jpg\" alt=\"Deux femmes sur le perron, travaillant ensemble sur un ordinateur portable\" class=\"wp-image-239699\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1.jpg 667w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-450x450.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-250x250.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/two-women-with-computer-terrace-1-600x600.jpg 600w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/a-policy-framework-for-internet-intermediaries-and-content\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comprendre les interm\u00e9diaires d\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Les interm\u00e9diaires d\u2019Internet sont essentiels \u00e0 l\u2019existence m\u00eame d\u2019Internet. Consultez notre cadre de politiques pour les interm\u00e9diaires d\u2019Internet et le contenu.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg\" alt=\"Un homme en chemise jaune debout derri\u00e8re un pupitre, pronon\u00e7ant un discours\" class=\"wp-image-239701\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/internet-governance\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Promouvoir la gouvernance de l\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Internet fonctionne mieux lorsqu\u2019il est gouvern\u00e9 par plusieurs. Nous pr\u00e9conisons une approche multipartite de la gouvernance d\u2019Internet, o\u00f9 tous les acteurs int\u00e9ress\u00e9s peuvent participer.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"850\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k.jpg\" alt=\"Photo du b\u00e2timent de la Cour supr\u00eame des \u00c9tats-Unis \u00e0 Washington, D.C.\" class=\"wp-image-205099\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k.jpg 1280w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-450x299.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-1024x680.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-768x510.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/12\/us_supreme_court_7432022562_ffb903102e_k-250x166.jpg 250w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-cc442a13 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/amicus-program\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Influencer les politiques publiques par le biais des tribunaux<\/h3><\/div><p class=\"uagb-ifb-desc\">Notre programme Amicus donne \u00e0 Internet une voix devant les tribunaux du monde entier, l\u00e0 o\u00f9 les d\u00e9cisions juridiques, les interpr\u00e9tations et les r\u00e9glementations affectent son fonctionnement.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"665\" height=\"665\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1.jpg\" alt=\"Deux hommes debout c\u00f4te \u00e0 c\u00f4te sur un trottoir en train de discuter\" class=\"wp-image-220929\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1.jpg 665w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-450x450.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-150x150.jpg 150w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-250x250.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/men-on-street-NY-1-600x600.jpg 600w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-86535691 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/get-involved\/advocate\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Comment d\u00e9fendre Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Il nous incombe \u00e0 tous de prot\u00e9ger et de d\u00e9fendre ce dont Internet a besoin pour exister et prosp\u00e9rer. En savoir plus sur ce que vous pouvez faire pour changer les choses.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain.jpg\" alt=\"Une personne en montagne tient un t\u00e9l\u00e9phone portable\" class=\"wp-image-239706\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/phone-on-mountain-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-917a6d40 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/countering-internet-threats\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Pr\u00e9server l\u2019ouverture d\u2019Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Toute politique ou d\u00e9cision qui compromet la nature ouverte, mondiale et interop\u00e9rable d\u2019Internet contribue \u00e0 sa fragmentation.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-983fdfa8 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-f34f6c41\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"349\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo.jpg\" alt=\"Une personne prend une photo avec un t\u00e9l\u00e9phone portable\" class=\"wp-image-239704\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo-450x262.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/hold-phone-photo-250x145.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-dde34b92 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">S\u00e9curiser Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Le chiffrement renforce le pouvoir des individus et assure leur s\u00e9curit\u00e9 en ligne. C\u2019est un outil essentiel pour nous prot\u00e9ger dans une soci\u00e9t\u00e9 num\u00e9rique.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-af0333e8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"767\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN.jpg\" alt=\"Un homme debout devant un ordinateur en charge et un panneau de l\u2019Internet Society\" class=\"wp-image-228357\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN-450x345.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN-768x589.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/08\/Man-at-Panama-CN-250x192.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-aed86da8 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/connectivity\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Connecter les gens \u00e0 Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Nous contribuons \u00e0 l\u2019\u00e9laboration et \u00e0 la promotion de politiques aupr\u00e8s de diff\u00e9rents organismes de r\u00e9glementation et l\u00e9gislatifs afin de permettre aux personnes de se connecter \u00e0 Internet.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-cd0f1a76\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"1447\" height=\"600\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1.jpg\" alt=\"Une femme portant un foulard vert et noir prononce un discours lors d\u2019une conf\u00e9rence.\" class=\"wp-image-208911\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1.jpg 1447w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-450x187.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-1024x425.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-768x318.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2024\/03\/woman-speaking-igf-1-250x104.jpg 250w\" sizes=\"auto, (max-width: 1447px) 100vw, 1447px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-14fe9def uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/internet-impact-assessment-toolkit\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Analyser une proposition de loi<\/h3><\/div><p class=\"uagb-ifb-desc\">D\u00e9couvrez notre bo\u00eete \u00e0 outils pour en savoir plus sur la mani\u00e8re de construire des arguments solides en faveur de la d\u00e9fense d\u2019Internet et \u00e9valuer l\u2019impact des politiques.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Le chiffrement prot\u00e8ge tout le monde<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Le chiffrement prot\u00e8ge tout le monde<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Nous avons organis\u00e9 \u00e0 Bruxelles un atelier destin\u00e9 aux organisations de la soci\u00e9t\u00e9 civile afin d\u2019explorer les menaces l\u00e9gislatives qui p\u00e8sent sur le chiffrement et d\u2019\u00e9laborer des strat\u00e9gies politiques communes pour sensibiliser les d\u00e9cideurs politiques \u00e0 l\u2019importance du chiffrement pour les utilisateurs quotidiens.<\/p>\n\n\n\n<p class=\"has-18-font-size\">D\u00e9couvrez les t\u00e9moignages des participants sur leur exp\u00e9rience et les raisons de leur engagement passionn\u00e9 en faveur d\u2019un chiffrement robuste.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-neutral-white-color has-depth-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.internetsociety.org\/blog\/2025\/07\/encryption-makes-us-powerful-internet-society-hosts-encryption-advocacy-workshop-for-european-civil-society\/\"><strong>Lire l\u2019article de blog<\/strong><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Advocating for Strong Encryption\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/xmD7NYEm21E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1110' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1110\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (245)<\/span><\/option><option value=\"campaigns-type\" >Campagnes<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"events-type\" >\u00c9v\u00e9nements<span class=\"cvp-count\"> (68)<\/span><\/option><option value=\"news-type\" >Actualit\u00e9s<span class=\"cvp-count\"> (28)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Communiqu\u00e9s de presse<span class=\"cvp-count\"> (23)<\/span><\/option><option value=\"statements-type\" >&nbsp;&nbsp;&nbsp;D\u00e9clarations<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"open-letters\" >Lettres ouvertes<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (85)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (23)<\/span><\/option><option value=\"speeches-type\" >&nbsp;&nbsp;&nbsp;Discours<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"stories-type\" >Histoires<span class=\"cvp-count\"> (32)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Th\u00e8me<\/option><option value=\"acces\" >R\u00e9duire la fracture num\u00e9rique<span class=\"cvp-count\"> (302)<\/span><\/option><option value=\"cryptage\" >Cryptage<span class=\"cvp-count\"> (62)<\/span><\/option><option value=\"gouvernance-internet\" >Gouvernance Internet<span class=\"cvp-count\"> (56)<\/span><\/option><option value=\"politique-publique\" >Politiques Internet<span class=\"cvp-count\"> (46)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"afrique\" >Afrique<span class=\"cvp-count\"> (109)<\/span><\/option><option value=\"asie-pacifique\" >Asie Pacifique<span class=\"cvp-count\"> (32)<\/span><\/option><option value=\"europe\" >Europe<span class=\"cvp-count\"> (37)<\/span><\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (178)<\/span><\/option><option value=\"amerique-latine-et-les-caraibes\" >Am\u00e9rique Latine et les Caraibes<span class=\"cvp-count\"> (26)<\/span><\/option><option value=\"moyen-orient\" >Moyen Orient<span class=\"cvp-count\"> (8)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (54)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"246442\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2026\/2025-annual-report\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Rapport annuel 2025\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Rapport annuel 2025\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2026-03-31T16:20:01+00:00\">31 mars 2026<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2026\/2025-annual-report\/\" class=\"_self\" target=\"_self\" aria-label=\"Rapport annuel 2025\">Rapport annuel 2025<\/a><\/h2><div class=\"pt-cv-content\">Le rapport explique comment notre communaut\u00e9 mondiale a relev\u00e9 le d\u00e9fi de notre ambitieuse strat\u00e9gie quinquennale visant \u00e0 \u00e9largir l\u2019acc\u00e8s &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"244450\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/interconnexion-et-obligations-de-trafic-reglemente\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Document d&#039;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Document d&#039;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-19T18:10:24+00:00\">19 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/interconnexion-et-obligations-de-trafic-reglemente\/\" class=\"_self\" target=\"_self\" aria-label=\"Document d&#039;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9\">Document d&rsquo;orientation : Interconnexion et obligations de trafic r\u00e9glement\u00e9<\/a><\/h2><div class=\"pt-cv-content\">Ce document d\u2019orientation analyse la pression croissante en faveur d\u2019une r\u00e9glementation des relations entre les services en ligne et les &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242756\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\">Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne<\/a><\/h2><div class=\"pt-cv-content\">Les politiques exigeant des v\u00e9rifications d\u2019\u00e2ge, bien qu\u2019elles partent souvent d\u2019une bonne intention, cr\u00e9ent des risques pour les personnes en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"240175\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/approches-doctroi-de-licences-pour-la-connectivite-centree-sur-la-communaute\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-28T11:42:07+00:00\">28 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/approches-doctroi-de-licences-pour-la-connectivite-centree-sur-la-communaute\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9\">Fiche d\u2019orientation : Approches d\u2019octroi de licences pour la connectivit\u00e9 centr\u00e9e sur la communaut\u00e9<\/a><\/h2><div class=\"pt-cv-content\">D\u00e9couvrez comment les solutions de connectivit\u00e9 centr\u00e9e sur la communaut\u00e9 contribuent \u00e0 l&rsquo;essor des zones mal desservies. Explorez les options &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242698\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/gouvernance-de-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Gouvernance de l\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Gouvernance de l\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-26T18:02:23+00:00\">26 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/gouvernance-de-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Gouvernance de l\u2019Internet\">Fiche d\u2019orientation : Gouvernance de l\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">Cette fiche d\u2019orientation examine les principaux enjeux et d\u00e9fis et pr\u00e9sente des principes directeurs pour une gouvernance multipartite de l\u2019Internet &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"244035\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/issues\/community-networks\/success-stories\/haiti\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Un outil\u00a0autrefois\u00a0n\u00e9glig\u00e9\u00a0: comment les r\u00e9seaux communautaires ont connect\u00e9 Ha\u00efti au reste du monde\u202f\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail cvp-substitute skip-lazy  cvplazy\" alt=\"A man stands on a ladder and holds a drill, installing infrastructure\" title=\"\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/11\/Man-Installing-Haiti-CN.jpg\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/stories-type\/' title='Histoires' class='pt-cv-tax-stories-type'>Histoires<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-26T15:26:26+00:00\">26 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/issues\/community-networks\/success-stories\/haiti\/\" class=\"_self\" target=\"_self\" aria-label=\"Un outil\u00a0autrefois\u00a0n\u00e9glig\u00e9\u00a0: comment les r\u00e9seaux communautaires ont connect\u00e9 Ha\u00efti au reste du monde\u202f\">Un outil\u00a0autrefois\u00a0n\u00e9glig\u00e9\u00a0: comment les r\u00e9seaux communautaires ont connect\u00e9 Ha\u00efti au reste du monde\u202f<\/a><\/h2><div class=\"pt-cv-content\">Les r\u00e9seaux communautaires nous ouvrent des opportunit\u00e9s, partout dans le monde et au-del\u00e0 des fronti\u00e8res.Leur parcours pour s\u2019imposer dans les &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"234975\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/renforcer-la-resilience-des-infrastructures-internet-sous%e2%80%91marines\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0\"><img decoding=\"async\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail cvp-substitute skip-lazy  cvplazy\" alt=\"Description: Carte du monde pr\u00e9sentant les principaux c\u00e2bles sous-marins. Source : TeleGeography.\" title=\"\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/10\/undersea-fibre-optic-cables\u2014570-as-of-2025.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-11-13T19:13:09+00:00\">13 novembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/renforcer-la-resilience-des-infrastructures-internet-sous%e2%80%91marines\/\" class=\"_self\" target=\"_self\" aria-label=\"Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0\">Renforcer la r\u00e9silience des infrastructures Internet sous\u2011marines\u00a0<\/a><\/h2><div class=\"pt-cv-content\">Synth\u00e8se \u00c0 mesure que la d\u00e9pendance aux services num\u00e9riques s\u2019intensifie, la r\u00e9silience et la s\u00e9curit\u00e9 des syst\u00e8mes de c\u00e2bles sous-marins &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"237367\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-politique-normes-internet-ouvertes\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d&#039;orientation politique : Normes Internet ouvertes\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d&#039;orientation politique : Normes Internet ouvertes\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-10-29T15:45:20+00:00\">29 octobre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-politique-normes-internet-ouvertes\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d&#039;orientation politique : Normes Internet ouvertes\">Fiche d&rsquo;orientation politique : Normes Internet ouvertes<\/a><\/h2><div class=\"pt-cv-content\">En promouvant activement et en reconnaissant officiellement les normes ouvertes dans les politiques publiques, nous pouvons prot\u00e9ger les \u00e9l\u00e9ments fondamentaux &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"233663\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/internet-shutdowns\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Coupures d\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Coupures d\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-10-28T19:12:48+00:00\">28 octobre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/internet-shutdowns\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Coupures d\u2019Internet\">Fiche d\u2019orientation : Coupures d\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">Cette fiche d\u2019orientation met en lumi\u00e8re les impacts (externalit\u00e9s) des coupures d\u2019Internet. Elle exhorte les d\u00e9cideurs politiques \u00e0 adopter des &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"49\" data-currentpage=\"1\" data-sid=\"bu5bn556\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">\u2026<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=49\">49<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Chargement\u2026\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dit photo :<br>\u00a9 Nyani Quarmyne, \u00a9 Flawless Events, \u00a9 Jordi Ruiz Cirera, \u00a9 Flawless Events, creative commons, \u00a9 Chris Gregory, \u00a9 Nyani Quarmyne, \u00a9 Wharton Image, \u00a9 Internet Society, \u00a9 Frederic Courbet\/Panos Pictures<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.<\/p>\n","protected":false},"author":1898,"featured_media":239701,"parent":47369,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244691","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-450x300.jpg",450,300,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike-250x167.jpg",250,167,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",300,200,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",400,267,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/APAC-man-with-mike.jpg",600,400,false]},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Internet fonctionne mieux pour tout le monde lorsque la communaut\u00e9 technique et la soci\u00e9t\u00e9 civile participent aux prises de d\u00e9cision. Nous aidons les gouvernements \u00e0 prendre des d\u00e9cisions \u00e9clair\u00e9es en sensibilisant les d\u00e9cideurs politiques au fonctionnement r\u00e9el d\u2019Internet.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=244691"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244691\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/47369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/239701"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=244691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=244691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=244691"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=244691"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=244691"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=244691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}