{"id":244725,"date":"2025-12-02T16:54:13","date_gmt":"2025-12-02T16:54:13","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244725"},"modified":"2026-03-02T14:05:29","modified_gmt":"2026-03-02T14:05:29","slug":"privacy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/our-work\/privacy\/","title":{"rendered":"Confidentialit\u00e9"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-ffc93ebd uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-tab uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c95947c4\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">Confidentialit\u00e9<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f5da99 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-bf6c64fb\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>La confidentialit\u00e9 en ligne est essentielle \u00e0 un Internet digne de confiance.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong>La confidentialit\u00e9 en ligne est essentielle \u00e0 un Internet digne de confiance.<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-b4c134c7 uagb-columns__columns-1 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-4e25c9ae\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-18-font-size\">La confidentialit\u00e9 en ligne d\u00e9pend de la possibilit\u00e9 de divulguer des donn\u00e9es de mani\u00e8re consensuelle et avec des attentes claires quant au contexte et \u00e0 la port\u00e9e du partage des donn\u00e9es. L\u2019identifiabilit\u00e9, <a href=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\">la possibilit\u00e9 de relier des donn\u00e9es<\/a> et l\u2019exploration de donn\u00e9es soul\u00e8vent des pr\u00e9occupations importantes en mati\u00e8re de confidentialit\u00e9. <\/p>\n\n\n\n<p class=\"has-18-font-size\">Nous nous engageons \u00e0 promouvoir la confidentialit\u00e9 en d\u00e9fendant des technologies et des politiques qui la respectent. Nous sensibilisons \u00e9galement les communaut\u00e9s aux avantages de pr\u00e9server une confidentialit\u00e9 solide en ligne et \u00e0 la mani\u00e8re de g\u00e9rer leur identit\u00e9 sur Internet.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">Confidentialit\u00e9<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>La confidentialit\u00e9 en ligne est essentielle \u00e0 un Internet digne de confiance.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082.jpg\" alt=\"Une femme au sourire \u00e9clatant utilise son t\u00e9l\u00e9phone portable\" class=\"wp-image-199877\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082-250x167.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">La confidentialit\u00e9 en ligne d\u00e9pend de la possibilit\u00e9 de divulguer des donn\u00e9es de mani\u00e8re consensuelle et avec des attentes claires quant au contexte et \u00e0 la port\u00e9e du partage des donn\u00e9es. L\u2019identifiabilit\u00e9, <a href=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\">la possibilit\u00e9 de relier des donn\u00e9es<\/a> et l\u2019exploration de donn\u00e9es soul\u00e8vent des pr\u00e9occupations importantes en mati\u00e8re de confidentialit\u00e9. <\/p>\n\n\n\n<p class=\"has-18-font-size\">Nous nous engageons \u00e0 promouvoir la confidentialit\u00e9 en d\u00e9fendant des technologies et des politiques qui la respectent. Nous sensibilisons \u00e9galement les communaut\u00e9s aux avantages de pr\u00e9server une confidentialit\u00e9 solide en ligne et \u00e0 la mani\u00e8re de g\u00e9rer leur identit\u00e9 sur Internet.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Liens essentiels sur la confidentialit\u00e9<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Liens essentiels sur la confidentialit\u00e9<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer.jpg\" alt=\"Un homme, assis \u00e0 son bureau, sourit tout en travaillant sur son ordinateur portable\" class=\"wp-image-239511\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/online-trust-and-safety\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Confiance et s\u00e9curit\u00e9 en ligne<\/h3><\/div><p class=\"uagb-ifb-desc\">Les nouveaux utilisateurs d\u2019Internet d\u00e9couvrent un environnement num\u00e9rique complexe. D\u00e9velopper des comp\u00e9tences en mati\u00e8re de confiance et de s\u00e9curit\u00e9 est essentiel pour une exp\u00e9rience en ligne plus s\u00fbre.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone.jpg\" alt=\"Trois hommes, assis autour d\u2019une table, sourient en regardant une vid\u00e9o ensemble\" class=\"wp-image-239520\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/action-plan\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Chiffrement<\/h3><\/div><p class=\"uagb-ifb-desc\">Le chiffrement est un outil essentiel pour la confidentialit\u00e9 : il prot\u00e8ge vos informations personnelles et contribue \u00e0 la s\u00e9curit\u00e9 des personnes au sein de notre soci\u00e9t\u00e9 num\u00e9rique.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"758\" height=\"749\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training.jpg\" alt=\"Deux femmes, assises \u00e0 une table, sont absorb\u00e9es par leurs t\u00e9l\u00e9phones\" class=\"wp-image-220917\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training.jpg 758w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training-450x445.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training-250x247.jpg 250w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/privacy\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Cours sur la confidentialit\u00e9 en ligne<\/h3><\/div><p class=\"uagb-ifb-desc\">La confidentialit\u00e9 est un droit fondamental et un \u00e9l\u00e9ment essentiel qui permet l\u2019autonomie, la dignit\u00e9 et l\u2019expression de soi. En savoir plus sur la confidentialit\u00e9 en ligne et la collecte de donn\u00e9es \u00e0 l\u2019\u00e8re du num\u00e9rique.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet.jpg\" alt=\"Une femme tient une tablette et semble attentive et absorb\u00e9e par ce qu\u2019elle fait.\" class=\"wp-image-239507\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4fea2dee uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/learning\/empreintes-numeriques\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Empreintes num\u00e9riques<\/h3><\/div><p class=\"uagb-ifb-desc\">Les empreintes num\u00e9riques sont des traces de donn\u00e9es que les utilisateurs laissent derri\u00e8re eux lorsqu\u2019ils naviguent sur Internet. Ces donn\u00e9es contribuent \u00e0 dresser un portrait num\u00e9rique de notre identit\u00e9 en ligne.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop.jpg\" alt=\"Plusieurs personnes concentr\u00e9es sur un ordinateur portable, \u00e9changeant des id\u00e9es\" class=\"wp-image-239515\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-7475369c uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/fr\/our-work\/privacy\/privacy-policy\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Politique de confidentialit\u00e9<\/h3><\/div><p class=\"uagb-ifb-desc\">Les d\u00e9cideurs politiques peuvent soutenir ou mettre en danger la confidentialit\u00e9 en ligne. D\u00e9couvrez comment les politiques peuvent influencer la capacit\u00e9 des individus \u00e0 pr\u00e9server leur confidentialit\u00e9.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen.jpg\" alt=\"Un jeune homme allong\u00e9 sur son lit, utilisant un ordinateur portable\" class=\"wp-image-239494\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen.jpg 640w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen-250x167.jpg 250w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8987a0a2 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/blog\/2024\/01\/keeping-kids-safe-online-navigating-the-new-parents-guide-to-encryption\/ \" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Prot\u00e9ger les enfants sur Internet<\/h3><\/div><p class=\"uagb-ifb-desc\">Les enfants vivent dans un monde num\u00e9rique. Le chiffrement est un outil pr\u00e9cieux pour prot\u00e9ger la confidentialit\u00e9 de leurs messages et de leurs informations personnelles.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Prot\u00e9gez vos donn\u00e9es : ateliers sur la confiance et la s\u00e9curit\u00e9<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Prot\u00e9gez vos donn\u00e9es : ateliers sur la confiance et la s\u00e9curit\u00e9<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Avec la cybercriminalit\u00e9 en augmentation dans le monde, il est plus important que jamais de poss\u00e9der les comp\u00e9tences n\u00e9cessaires pour naviguer sur Internet en toute s\u00e9curit\u00e9.<\/p>\n\n\n\n<p class=\"has-18-font-size\">L\u2019ann\u00e9e derni\u00e8re, nos ateliers sur la confiance et la s\u00e9curit\u00e9 ont promu l\u2019alphab\u00e9tisation num\u00e9rique, form\u00e9 les participants \u00e0 reconna\u00eetre les arnaques et partag\u00e9 les bonnes pratiques pour une exp\u00e9rience en ligne s\u00e9curis\u00e9e. Regardez la vid\u00e9o compl\u00e8te pour en savoir plus\u202f!<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-wrapper\"><iframe loading=\"lazy\" title=\"Trust and Safety Workshops\" src=\"https:\/\/player.vimeo.com\/video\/1154697228?dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div>\n<\/div><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Derni\u00e8res mises \u00e0 jour<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1605' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1605\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (90)<\/span><\/option><option value=\"events-type\" >\u00c9v\u00e9nements<span class=\"cvp-count\"> (10)<\/span><\/option><option value=\"news-type\" >Actualit\u00e9s<span class=\"cvp-count\"> (12)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Communiqu\u00e9s de presse<span class=\"cvp-count\"> (9)<\/span><\/option><option value=\"statements-type\" >&nbsp;&nbsp;&nbsp;D\u00e9clarations<span class=\"cvp-count\"> (3)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (34)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (6)<\/span><\/option><option value=\"speeches-type\" >&nbsp;&nbsp;&nbsp;Discours<span class=\"cvp-count\"> (1)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Th\u00e8me<\/option><option value=\"cryptage\" >Cryptage<span class=\"cvp-count\"> (62)<\/span><\/option><option value=\"confidentialite\" >Confidentialit\u00e9<span class=\"cvp-count\"> (93)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"afrique\" >Afrique<span class=\"cvp-count\"> (11)<\/span><\/option><option value=\"asie-pacifique\" >Asie Pacifique<span class=\"cvp-count\"> (11)<\/span><\/option><option value=\"europe\" >Europe<span class=\"cvp-count\"> (24)<\/span><\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (79)<\/span><\/option><option value=\"amerique-latine-et-les-caraibes\" >Am\u00e9rique Latine et les Caraibes<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"moyen-orient\" >Moyen Orient<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (25)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242756\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\">Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne<\/a><\/h2><div class=\"pt-cv-content\">Les politiques exigeant des v\u00e9rifications d\u2019\u00e2ge, bien qu\u2019elles partent souvent d\u2019une bonne intention, cr\u00e9ent des risques pour les personnes en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"227162\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A bit of light spills out of a dark door.\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-05-02T17:59:50+00:00\">2 mai 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self\" target=\"_self\" aria-label=\"Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?\">Qu\u2019est-ce qu\u2019une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage ?<\/a><\/h2><div class=\"pt-cv-content\">Une porte d\u00e9rob\u00e9e dans le syst\u00e8me de cryptage est une forme d\u2019acc\u00e8s exceptionnel qu\u2019une plateforme accorde \u00e0 des tiers &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"223403\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"hands typing on a keyboard\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-04-17T20:08:44+00:00\">17 avril 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self\" target=\"_self\" aria-label=\"Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir\">Avoir confiance en Internet : pourquoi c\u2019est n\u00e9cessaire et comment y parvenir<\/a><\/h2><div class=\"pt-cv-content\">Int\u00e9ressons-nous de plus pr\u00e8s \u00e0 la confiance en ligne, \u00e0 ce qui fait que l\u2019Internet est digne de confiance et &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"214874\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/etude-de-cas-la-loi-canadienne-sur-les-nouvelles-en-ligne-nuit-au-journalisme-a-la-concurrence-et-a-linternet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-09-24T13:00:25+00:00\">24 septembre 2024<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2024\/etude-de-cas-la-loi-canadienne-sur-les-nouvelles-en-ligne-nuit-au-journalisme-a-la-concurrence-et-a-linternet\/\" class=\"_self\" target=\"_self\" aria-label=\"\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet\">\u00c9tude de cas : la Loi canadienne sur les nouvelles en ligne nuit au journalisme, \u00e0 la concurrence et \u00e0 l\u2019Internet<\/a><\/h2><div class=\"pt-cv-content\">De nombreux pays envisagent d\u2019adopter de nouvelles lois pour soutenir les organes de presse en difficult\u00e9 face \u00e0 la concurrence &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"205178\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/lanalyse-cote-client\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"L&#039;analyse c\u00f4t\u00e9 client\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"L&#039;analyse c\u00f4t\u00e9 client\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-12-13T15:05:02+00:00\">13 d\u00e9cembre 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2023\/lanalyse-cote-client\/\" class=\"_self\" target=\"_self\" aria-label=\"L&#039;analyse c\u00f4t\u00e9 client\">L&rsquo;analyse c\u00f4t\u00e9 client<\/a><\/h2><div class=\"pt-cv-content\">D\u00e9couvrez les recommandations de l&rsquo;Internet Society au projet de r\u00e8glement du Parlement europ\u00e9en sur la pr\u00e9vention et la lutte contre &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"192067\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/05\/le-cryptage-assure-la-securite-des-enfants-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Le cryptage assure la s\u00e9curit\u00e9 des enfants en ligne\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a young girl using laptop with headphones\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-768x352.jpeg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-768x352.jpeg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-450x206.jpeg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-1024x470.jpeg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-250x115.jpeg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop.jpeg 1199w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-05-03T23:43:29+00:00\">3 mai 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2023\/05\/le-cryptage-assure-la-securite-des-enfants-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Le cryptage assure la s\u00e9curit\u00e9 des enfants en ligne\">Le cryptage assure la s\u00e9curit\u00e9 des enfants en ligne<\/a><\/h2><div class=\"pt-cv-content\">Les d\u00e9cideurs politiques proposent des lois qui affaiblissent le cryptage. Au nom de la s\u00e9curit\u00e9 des enfants, les lois EARN &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"183209\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/11\/les-deux-mesures-que-les-etats-unis-devraient-prendre-pour-proteger-linternet-et-la-securite-de-milliards-de-personnes-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Les deux mesures que les \u00c9tats-Unis devraient prendre pour prot\u00e9ger l&#039;Internet et la s\u00e9curit\u00e9 de milliards de personnes en ligne\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a black\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-11-22T21:48:45+00:00\">22 novembre 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/11\/les-deux-mesures-que-les-etats-unis-devraient-prendre-pour-proteger-linternet-et-la-securite-de-milliards-de-personnes-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Les deux mesures que les \u00c9tats-Unis devraient prendre pour prot\u00e9ger l&#039;Internet et la s\u00e9curit\u00e9 de milliards de personnes en ligne\">Les deux mesures que les \u00c9tats-Unis devraient prendre pour prot\u00e9ger l&rsquo;Internet et la s\u00e9curit\u00e9 de milliards de personnes en ligne<\/a><\/h2><div class=\"pt-cv-content\">Pour prot\u00e9ger l&rsquo;Internet que nous voulons aujourd&rsquo;hui et demain, nous devons adopter la pratique des \u00e9valuations d&rsquo;impact sur l&rsquo;Internet &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"179638\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/events\/global-encryption-day\/2022\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Journ\u00e9e mondiale du cryptage 2022\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"navy background with white, blue, yellow squares on sides\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-768x352.png\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-768x352.png 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-450x206.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-1024x469.png 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-250x115.png 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550.png 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/events-type\/' title='\u00c9v\u00e9nements' class='pt-cv-tax-events-type'>\u00c9v\u00e9nements<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-10-19T14:04:00+00:00\">19 octobre 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/events\/global-encryption-day\/2022\/\" class=\"_self\" target=\"_self\" aria-label=\"Journ\u00e9e mondiale du cryptage 2022\">Journ\u00e9e mondiale du cryptage 2022<\/a><\/h2><div class=\"pt-cv-content\">Un cryptage fort nous prot\u00e8ge en ligne, et m\u00eame hors ligne. Au cours de cette Journ\u00e9e mondiale du cryptage, des &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"164464\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/02\/un-internet-plus-sur-commence-par-plus-de-cryptage\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Un Internet plus s\u00fbr commence par plus de cryptage\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"474\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Un Internet plus s\u00fbr commence par plus de cryptage\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-768x474.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-768x474.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-450x277.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-1024x631.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-1536x947.jpg 1536w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-2048x1263.jpg 2048w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/kelly-sikkema-4FwEuaWFxgE-unsplash-250x154.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-02-08T15:20:52+00:00\">8 f\u00e9vrier 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2022\/02\/un-internet-plus-sur-commence-par-plus-de-cryptage\/\" class=\"_self\" target=\"_self\" aria-label=\"Un Internet plus s\u00fbr commence par plus de cryptage\">Un Internet plus s\u00fbr commence par plus de cryptage<\/a><\/h2><div class=\"pt-cv-content\">La s\u00e9curit\u00e9 est essentielle pour un Internet plus s\u00fbr, et la seule fa\u00e7on d&rsquo;y parvenir est de retirer le cryptage &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"17\" data-currentpage=\"1\" data-sid=\"bu5bn556\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244725\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244725\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">\u2026<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244725\/?_page=17\">17<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244725\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Chargement\u2026\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dit photo :<br>\u00a9 Candice Ward\/The Internet Society, \u00a9 Nyani Quarmyne, \u00a9 Elyse Butler, \u00a9 Victor Ndonnang\/Internet Society, \u00a9 Nyani Quarmyne, \u00a9 Urban Pixel Lebanon, \u00a9 Oleksandr Pidvalnyi from Pixabay, courtesy of Cat Easdon<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La confidentialit\u00e9 en ligne est essentielle \u00e0 un Internet digne de confiance. Nous nous engageons \u00e0 promouvoir la confidentialit\u00e9 en d\u00e9fendant des technologies et des politiques qui la respectent.<\/p>\n","protected":false},"author":1898,"featured_media":239499,"parent":47369,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244725","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",1500,750,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-450x225.jpg",450,225,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-768x384.jpg",768,384,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-1024x512.jpg",1024,512,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",1500,750,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",1500,750,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-250x125.jpg",250,125,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",300,150,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",400,200,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",600,300,false]},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"La confidentialit\u00e9 en ligne est essentielle \u00e0 un Internet digne de confiance. Nous nous engageons \u00e0 promouvoir la confidentialit\u00e9 en d\u00e9fendant des technologies et des politiques qui la respectent.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=244725"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244725\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/47369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/239499"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=244725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=244725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=244725"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=244725"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=244725"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=244725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}