{"id":90298,"date":"2012-05-30T17:12:34","date_gmt":"2012-05-30T17:12:34","guid":{"rendered":"https:\/\/www.internetsociety.org\/?post_type=resources&#038;p=90298"},"modified":"2025-11-27T17:48:15","modified_gmt":"2025-11-27T17:48:15","slug":"perspectives-de-linternet-society-sur-le-filtrage-du-systeme-de-noms-de-domaine-dns","status":"publish","type":"resources","link":"https:\/\/www.internetsociety.org\/fr\/resources\/doc\/2012\/perspectives-de-linternet-society-sur-le-filtrage-du-systeme-de-noms-de-domaine-dns\/","title":{"rendered":"Perspectives de l&rsquo;Internet Society sur le filtrage du syst\u00e8me de noms de domaine (DNS)"},"content":{"rendered":"<p>Probl\u00e8me : trouver des solutions aux activit\u00e9s ill\u00e9gales en ligne<\/p>\n<p>Les d\u00e9cideurs politiques, les l\u00e9gislateurs et les organismes de r\u00e9glementation \u00e0 travers le monde veulent combattre les activit\u00e9s ill\u00e9gales en ligne telles que la<br \/>\npornographie infantile, les infractions des droits de propri\u00e9t\u00e9 intellectuelle et lesactivit\u00e9s de cybercriminalit\u00e9. L&rsquo;Internet Society reconna\u00eet qu&rsquo;il s&rsquo;agit l\u00e0 de probl\u00e8mes critiques auxquels il convient de r\u00e9pondre, mais pense aussi que cela doit se faire de mani\u00e8re \u00e0 ne pas entraver l&rsquo;architecture mondiale d&rsquo;Internet ni \u00e0 r\u00e9duire les droits de l&rsquo;Homme internationalement reconnus.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Probl\u00e8me : trouver des solutions aux activit\u00e9s ill\u00e9gales en ligne Les d\u00e9cideurs politiques, les l\u00e9gislateurs et les organismes de r\u00e9glementation \u00e0 travers le monde veulent combattre les activit\u00e9s ill\u00e9gales en ligne telles que la pornographie infantile, les infractions des droits de propri\u00e9t\u00e9 intellectuelle et lesactivit\u00e9s de cybercriminalit\u00e9. L&rsquo;Internet Society reconna\u00eet qu&rsquo;il s&rsquo;agit l\u00e0 de probl\u00e8mes [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":0,"template":"","categories":[178,6187,2581,2583,169,4909,4775,146],"tags":[6266,6318,6317,6240,6283],"region_news_regions":[6029],"content_category":[6105],"ppma_author":[4057],"class_list":["post-90298","resources","type-resources","status-publish","hentry","category-securite","category-comment-fonctionne-internet","category-domain-name-system-dns-fr","category-extensions-de-securite-du-dns","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-deploy360-fr","tag-cybersecurity","tag-domain-name-system-dns-2","tag-domain-name-system-systeme-de-nom-de-domaine","tag-extensions-de-securite-dns-dnssec","tag-securite-du-routage","region_news_regions-mondial","resource_types-ressource","content_category-resources-type"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"square":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ivana Trbovic","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/trbovic\/"},"uagb_comment_info":0,"uagb_excerpt":"Probl\u00e8me : trouver des solutions aux activit\u00e9s ill\u00e9gales en ligne Les d\u00e9cideurs politiques, les l\u00e9gislateurs et les organismes de r\u00e9glementation \u00e0 travers le monde veulent combattre les activit\u00e9s ill\u00e9gales en ligne telles que la pornographie infantile, les infractions des droits de propri\u00e9t\u00e9 intellectuelle et lesactivit\u00e9s de cybercriminalit\u00e9. L&rsquo;Internet Society reconna\u00eet qu&rsquo;il s&rsquo;agit l\u00e0 de probl\u00e8mes\u2026","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/resources\/90298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/46"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=90298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=90298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=90298"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=90298"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=90298"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=90298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}