{"id":245892,"date":"2025-12-02T18:12:38","date_gmt":"2025-12-02T18:12:38","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=245892"},"modified":"2026-03-02T14:58:30","modified_gmt":"2026-03-02T14:58:30","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/fr\/our-work\/security\/security-policy\/","title":{"rendered":"Politique de s\u00e9curit\u00e9"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-d6a40f3e uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-87a6a79b\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading\">Politique de s\u00e9curit\u00e9<\/h1>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-32-font-size\">Les d\u00e9cideurs peuvent renforcer ou affaiblir la s\u00e9curit\u00e9 d\u2019Internet. D\u00e9couvrez comment la politique influence l\u2019\u00e9cosyst\u00e8me de la s\u00e9curit\u00e9 en ligne.<\/h2>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-18-font-size\"><\/p>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1789' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1789\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Recherche par mot-cl\u00e9\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenu<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (5)<\/span><\/option><option value=\"resources-type\" >Ressources<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"policy-briefs-type\" >&nbsp;&nbsp;&nbsp;Fiche de pol\u00edtiques publiques<span class=\"cvp-count\"> (4)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">R\u00e9gion<\/option><option value=\"mondial\" >Mondial<span class=\"cvp-count\"> (8)<\/span><\/option><option value=\"amerique-du-nord\" >Am\u00e9rique du Nord<span class=\"cvp-count\"> (1)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"242756\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 d\u00e9cembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/fiche-dorientation-restrictions-de-lage-et-securite-en-ligne\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne\">Fiche d\u2019orientation : Restrictions de l\u2019\u00e2ge et s\u00e9curit\u00e9 en ligne<\/a><\/h2><div class=\"pt-cv-content\">Les politiques exigeant des v\u00e9rifications d\u2019\u00e2ge, bien qu\u2019elles partent souvent d\u2019une bonne intention, cr\u00e9ent des risques pour les personnes en &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"230521\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-09-04T11:31:06+00:00\">4 septembre 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/policybriefs\/2025\/points-de-vue-sur-le-blocage-de-contenu-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0\">Fiche d\u2019orientation politique: points de vue sur le blocage de contenu Internet\u00a0<\/a><\/h2><div class=\"pt-cv-content\">L\u2019Internet Society encourage les d\u00e9cideurs politiques \u00e0 privil\u00e9gier les solutions qui s\u2019attaquent aux contenus pr\u00e9judiciables \u00e0 la source, plut\u00f4t que &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"118656\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2020\/07\/linternet-fonctionne-tout-simplement-la-loi-earn-it-constitue-une-menace-en-la-matiere-notamment\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"L&#039;Internet &quot;fonctionne tout simplement&quot; : La loi EARN IT constitue une menace en la mati\u00e8re notamment\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"L&#039;Internet &quot;fonctionne tout simplement&quot; : La loi EARN IT constitue une menace en la mati\u00e8re notamment\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/07\/earn-it-act-threatens-internet.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2020-07-03T00:30:13+00:00\">3 juillet 2020<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2020\/07\/linternet-fonctionne-tout-simplement-la-loi-earn-it-constitue-une-menace-en-la-matiere-notamment\/\" class=\"_self\" target=\"_self\" aria-label=\"L&#039;Internet &quot;fonctionne tout simplement&quot; : La loi EARN IT constitue une menace en la mati\u00e8re notamment\">L&rsquo;Internet \u00ab\u00a0fonctionne tout simplement\u00a0\u00bb : La loi EARN IT constitue une menace en la mati\u00e8re notamment<\/a><\/h2><div class=\"pt-cv-content\">Lorsque la loi EARN IT a \u00e9t\u00e9 introduite en mars 2020, des technologues, des organisations de la soci\u00e9t\u00e9 civile, des &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"82809\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/07\/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Inscriptions sont ouvertes pour &quot;Cyber Diplomacy Meets InfoSec and Technology&quot; en m\u00eame temps que le IETF 102\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"284\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Inscriptions sont ouvertes pour &quot;Cyber Diplomacy Meets InfoSec and Technology&quot; en m\u00eame temps que le IETF 102\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-768x284.png\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-768x284.png 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-300x111.png 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-1024x379.png 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/GCSC-at-IETF102-graphic-1-250x93.png 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2018-07-09T08:00:18+00:00\">9 juillet 2018<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/07\/registration-open-for-cyber-diplomacy-meets-infosec-and-technology-alongside-ietf-102\/\" class=\"_self\" target=\"_self\" aria-label=\"Inscriptions sont ouvertes pour &quot;Cyber Diplomacy Meets InfoSec and Technology&quot; en m\u00eame temps que le IETF 102\">Inscriptions sont ouvertes pour \u00ab\u00a0Cyber Diplomacy Meets InfoSec and Technology\u00a0\u00bb en m\u00eame temps que le IETF 102<\/a><\/h2><div class=\"pt-cv-content\">Comme nous l&rsquo;avons annonc\u00e9 r\u00e9cemment, la Commission mondiale sur la stabilit\u00e9 du cyberespace (Global Commission on the Stability of Cyberspace\u00a0&#8211; &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"77879\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/2018\/iot-security-for-policymakers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"S\u00e9curit\u00e9 de l&#039;Internet des Objets (IdO) : Briefing pour les d\u00e9cideurs politiques\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"S\u00e9curit\u00e9 de l&#039;Internet des Objets (IdO) : Briefing pour les d\u00e9cideurs politiques\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2018-04-19T10:48:32+00:00\">19 avril 2018<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/resources\/2018\/iot-security-for-policymakers\/\" class=\"_self\" target=\"_self\" aria-label=\"S\u00e9curit\u00e9 de l&#039;Internet des Objets (IdO) : Briefing pour les d\u00e9cideurs politiques\">S\u00e9curit\u00e9 de l&rsquo;Internet des Objets (IdO) : Briefing pour les d\u00e9cideurs politiques<\/a><\/h2><div class=\"pt-cv-content\">L&rsquo;Internet des Objets (IdO) a un \u00e9norme potentiel pour changer notre monde pour le mieux. Les projections relatives \u00e0 l&rsquo;impact &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"73042\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/time-g20s-first-digital-agenda\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Il est temps d\u2019adopter un agenda num\u00e9rique collaboratif pour le G20\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"309\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Il est temps d\u2019adopter un agenda num\u00e9rique collaboratif pour le G20\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/Congress-Plaza-Buenos-Aires-768x309.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/Congress-Plaza-Buenos-Aires-768x309.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/Congress-Plaza-Buenos-Aires-300x121.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/Congress-Plaza-Buenos-Aires-1024x412.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/Congress-Plaza-Buenos-Aires-250x101.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/02\/Congress-Plaza-Buenos-Aires.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2018-02-02T12:00:11+00:00\">2 f\u00e9vrier 2018<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/02\/time-g20s-first-digital-agenda\/\" class=\"_self\" target=\"_self\" aria-label=\"Il est temps d\u2019adopter un agenda num\u00e9rique collaboratif pour le G20\">Il est temps d\u2019adopter un agenda num\u00e9rique collaboratif pour le G20<\/a><\/h2><div class=\"pt-cv-content\">Les \u00c9tats membres du G20 repr\u00e9sentent 85% de l&rsquo;\u00e9conomie mondiale et abritent la moiti\u00e9 des utilisateurs d&rsquo;Internet dans le monde &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"68793\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2017\/12\/reflections-global-cyber-heavy-week-gccs-gfce\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"R\u00e9flexions sur une semaine &quot;globale&quot; et &quot;cyber&quot; intense \u00e0 GCCS et GFCE\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"510\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"R\u00e9flexions sur une semaine &quot;globale&quot; et &quot;cyber&quot; intense \u00e0 GCCS et GFCE\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-768x510.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-300x199.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-1024x680.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/11\/encryption-key-globe-network-iStock-683716072-250x166.jpg 250w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2017-12-12T09:23:46+00:00\">12 d\u00e9cembre 2017<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2017\/12\/reflections-global-cyber-heavy-week-gccs-gfce\/\" class=\"_self\" target=\"_self\" aria-label=\"R\u00e9flexions sur une semaine &quot;globale&quot; et &quot;cyber&quot; intense \u00e0 GCCS et GFCE\">R\u00e9flexions sur une semaine \u00ab\u00a0globale\u00a0\u00bb et \u00ab\u00a0cyber\u00a0\u00bb intense \u00e0 GCCS et GFCE<\/a><\/h2><div class=\"pt-cv-content\">Il y a deux semaines, une petite d\u00e9l\u00e9gation de l&rsquo;Internet Society \u00e9tait \u00e0 Delhi pour participer \u00e0 un certain nombre &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"6922\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2016\/03\/fiches-sur-les-politiques-publiques-de-internet-society-disponibles-en-francais\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiches sur les politiques publiques de Internet Society disponibles en fran\u00e7ais\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"237\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Fiches sur les politiques publiques de Internet Society disponibles en fran\u00e7ais\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/policy-briefs-intro-12-768x237.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/policy-briefs-intro-12-768x237.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/policy-briefs-intro-12-300x93.jpg 300w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/policy-briefs-intro-12-250x77.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2017\/08\/policy-briefs-intro-12.jpg 976w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2016-03-29T00:00:00+00:00\">29 mars 2016<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2016\/03\/fiches-sur-les-politiques-publiques-de-internet-society-disponibles-en-francais\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiches sur les politiques publiques de Internet Society disponibles en fran\u00e7ais\">Fiches sur les politiques publiques de Internet Society disponibles en fran\u00e7ais<\/a><\/h2><div class=\"pt-cv-content\">Nous sommes heureux de vous informer que gr\u00e2ce aux efforts et \u00e0 la collaboration de notre communaut\u00e9, nous lan\u00e7ons aujourd\u00b9hui &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"55976\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/fr\/policybriefs\/spam\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Fiche sur les politiques publiques: Les d\u00e9fis du courrier ind\u00e9sirable\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Fiche sur les politiques publiques: Les d\u00e9fis du courrier ind\u00e9sirable\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/policy-briefs-type\/' title='Fiche de pol\u00edtiques publiques' class='pt-cv-tax-policy-briefs-type'>Fiche de pol\u00edtiques publiques<\/a><a href='https:\/\/www.internetsociety.org\/fr\/content_category\/resources-type\/' title='Ressources' class='pt-cv-tax-resources-type'>Ressources<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2015-10-30T12:11:10+00:00\">30 octobre 2015<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/fr\/policybriefs\/spam\/\" class=\"_self\" target=\"_self\" aria-label=\"Fiche sur les politiques publiques: Les d\u00e9fis du courrier ind\u00e9sirable\">Fiche sur les politiques publiques: Les d\u00e9fis du courrier ind\u00e9sirable<\/a><\/h2><div class=\"pt-cv-content\">La prolif\u00e9ration des courriers ind\u00e9sirables pr\u00e9sente une menace nuisible, co\u00fbteuse et en constante \u00e9volution pour les internautes. Les gouvernements peuvent &#8230;<\/div><\/div><\/div><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style>\n\n\n<p class=\"has-18-font-size\"><\/p>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"<p>Politique de s\u00e9curit\u00e9 Les d\u00e9cideurs peuvent renforcer ou affaiblir la s\u00e9curit\u00e9 d\u2019Internet. D\u00e9couvrez comment la politique influence l\u2019\u00e9cosyst\u00e8me de la s\u00e9curit\u00e9 en ligne.<\/p>\n","protected":false},"author":46,"featured_media":0,"parent":244763,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[4057],"class_list":["post-245892","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Politique de s\u00e9curit\u00e9 Les d\u00e9cideurs peuvent renforcer ou affaiblir la s\u00e9curit\u00e9 d\u2019Internet. D\u00e9couvrez comment la politique influence l\u2019\u00e9cosyst\u00e8me de la s\u00e9curit\u00e9 en ligne.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/245892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=245892"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/245892\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/pages\/244763"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=245892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=245892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=245892"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=245892"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=245892"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=245892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}