<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.internetsociety.org/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.internetsociety.org/policybriefs/networkneutrality/</loc>
		<lastmod>2017-06-29T15:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/apac-connections-july-2017/</loc>
		<lastmod>2017-09-04T21:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/deploying-ipv6-enterprise/</loc>
		<lastmod>2017-09-04T21:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/apac-connections-may-2017/</loc>
		<lastmod>2017-09-04T21:47:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/apac-connections-march-2017/</loc>
		<lastmod>2017-09-04T21:48:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/bnet-info-session/</loc>
		<lastmod>2017-09-04T21:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/apac-connections-february-2017/</loc>
		<lastmod>2017-09-04T21:49:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/apac-connections-january-2017/</loc>
		<lastmod>2017-09-04T21:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-of-farmers-final-report/</loc>
		<lastmod>2017-09-04T21:49:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/apac-connections-december-2016/</loc>
		<lastmod>2017-09-04T21:49:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/apac-connections-october-2016/</loc>
		<lastmod>2017-09-04T21:49:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/apac-connections-september-2016/</loc>
		<lastmod>2017-09-04T21:50:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/yemen-ecommerce-research-document/</loc>
		<lastmod>2017-09-04T21:52:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/privacy-canada-final-report/</loc>
		<lastmod>2017-09-04T21:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/extension-form/</loc>
		<lastmod>2017-09-04T22:07:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/internet-society-in-numbers-2015/</loc>
		<lastmod>2017-09-04T22:07:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOCinNumbers2015-coverpage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/nextgen-leaders-2015-survey-results/</loc>
		<lastmod>2017-09-04T22:07:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Slide1_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/internet-governance-forum-2014-kathy-brown-opening-speech/</loc>
		<lastmod>2017-09-04T22:08:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/the-relationship-between-content-availability-and-piracy/</loc>
		<lastmod>2017-09-04T22:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/where-does-the-internet-go-next/</loc>
		<lastmod>2017-09-04T22:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/internet-governance-challenges-issues-and-roles-a-taxonomy-discussion-workshop/</loc>
		<lastmod>2017-09-04T22:14:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Screen-Shot-2014-06-13-at-2.19.34-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/bgp-configuration-for-ixps/</loc>
		<lastmod>2017-09-04T22:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/BGP-Configuration-for-IXPworkshop-Belgrade-Serbia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/internet-governance-timeframe-2003-2016/</loc>
		<lastmod>2017-09-04T22:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IG-Milestones-Final.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/identity/</loc>
		<lastmod>2017-09-06T13:46:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/internetinterconnection/</loc>
		<lastmod>2017-09-06T13:49:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/spam-legislation-in-the-netherlands-the-law-results-approach-and-lessons-learned/</loc>
		<lastmod>2017-09-06T16:41:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/CITEL-Wout-Presentation-Mendoza.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/deploy360-fr/2012/comment-securiser-et-signer-votre-domaine-avec-le-protocole-dnssec-en-utilisant-les-bureaux-denregistrement-de-domaines/</loc>
		<lastmod>2017-09-06T21:40:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/ipv6-time-servers-ntp/</loc>
		<lastmod>2017-09-06T22:10:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-20-august-26-august-2016/</loc>
		<lastmod>2017-09-07T13:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-26-AUGUST.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-16-july-20-july-2016/</loc>
		<lastmod>2017-09-07T13:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-20-JULY.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-6-august-12-august-2016/</loc>
		<lastmod>2017-09-07T13:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-12-August.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-13-august-19-august-2016/</loc>
		<lastmod>2017-09-07T13:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-19-AUGUST.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-04-10-june-2016/</loc>
		<lastmod>2017-09-07T13:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-10-June.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-18-24-june-2016/</loc>
		<lastmod>2017-09-07T13:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-24-JUNE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-28-may-03-june-2016/</loc>
		<lastmod>2017-09-07T13:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-3-JUNE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-25-june-1-july-2016/</loc>
		<lastmod>2017-09-07T13:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-1-July.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-14-20-may-2016/</loc>
		<lastmod>2017-09-07T13:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-20-May.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-7-13-may-2016/</loc>
		<lastmod>2017-09-07T13:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-13-MAY_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-16-22-april-2016/</loc>
		<lastmod>2017-09-07T13:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-22-APRIL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-26-march-1-april-2016/</loc>
		<lastmod>2017-09-07T13:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-APRIL-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-23-29-april-2016/</loc>
		<lastmod>2017-09-07T13:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-29-APRIL-2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/eu-issues-overview-30-april-6-may-2016/</loc>
		<lastmod>2017-09-07T13:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-6-May.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-9-15-april-2016/</loc>
		<lastmod>2017-09-07T13:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EUNEWSLETTER-15-APRIL2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-19-25-march-2016/</loc>
		<lastmod>2017-09-07T13:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-25-March.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-12-18-march-2016/</loc>
		<lastmod>2017-09-07T13:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-18-MARCH-2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-5-11-march-2016/</loc>
		<lastmod>2017-09-07T13:45:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWLESTTER-11-MARCH.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/eu-issues-overview-5-11-december-2015/</loc>
		<lastmod>2017-09-07T13:45:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOCEUNewsletter11December.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-my-school-interim-report/</loc>
		<lastmod>2017-09-07T21:31:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/wtsa-2016-matrix-resolutions/</loc>
		<lastmod>2017-09-08T08:40:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/net-neutrality-in-latin-america-cgp-interim-report/</loc>
		<lastmod>2017-09-08T15:36:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/internetinterconnection/</loc>
		<lastmod>2017-09-09T21:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/spam/</loc>
		<lastmod>2017-09-09T22:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/botnets/</loc>
		<lastmod>2017-09-09T22:36:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/zerorating/</loc>
		<lastmod>2017-09-09T22:44:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/zerorating/</loc>
		<lastmod>2017-09-09T22:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/botnets/</loc>
		<lastmod>2017-09-09T23:18:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/humanrights/</loc>
		<lastmod>2017-09-09T23:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/internetinterconnection/</loc>
		<lastmod>2017-09-09T23:31:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/localcontent/</loc>
		<lastmod>2017-09-09T23:47:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/networkneutrality/</loc>
		<lastmod>2017-09-09T23:53:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/spam/</loc>
		<lastmod>2017-09-09T23:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/privacy/</loc>
		<lastmod>2017-09-10T00:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/zerorating/</loc>
		<lastmod>2017-09-10T00:07:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/identity/</loc>
		<lastmod>2017-09-10T00:08:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/oecd-2016-ministerial-meeting-on-the-digital-economy-background-paper/</loc>
		<lastmod>2017-09-11T15:31:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2016/policy-framework-for-an-open-and-trusted-internet/</loc>
		<lastmod>2017-09-11T18:18:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/trust4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2016/policy-framework-for-an-open-and-trusted-internet/</loc>
		<lastmod>2017-09-11T18:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/confia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/four-ethical-issues-in-online-trust-topics-for-a-moderated-workshop/</loc>
		<lastmod>2017-09-12T12:36:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Ethical-Data-handling-v2.0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/final-report-promoting-child-online-safety-in-uganda/</loc>
		<lastmod>2017-09-12T15:46:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-online-privacy/</loc>
		<lastmod>2017-09-13T10:29:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Online-Privacy-1-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Online-Privacy-2-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Online-Privacy-3-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Online-Privacy-4-600px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/global-internet-report-2014-executive-summary/</loc>
		<lastmod>2017-09-15T18:52:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/global-internet-report-2014-executive-summary/</loc>
		<lastmod>2017-09-15T18:57:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/contribution-2014-itu-world-telecommunication-development-conference/</loc>
		<lastmod>2017-09-18T12:51:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/internet-governance-observations-recommendations/</loc>
		<lastmod>2017-09-19T14:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/committing-principle-openness/</loc>
		<lastmod>2017-09-19T14:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2010/privacy-internet-society-membership-survey/</loc>
		<lastmod>2017-09-20T16:07:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/report-micro-survey-regarding-online-privacy-personal-data/</loc>
		<lastmod>2017-09-20T16:11:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2010/future-privacy-igf-workshop-report/</loc>
		<lastmod>2017-09-20T16:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/data-privacy-global-scale-keeping-pace-evolving-environment/</loc>
		<lastmod>2017-09-20T16:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/following-tracking-trackers-part-2/</loc>
		<lastmod>2017-09-20T16:45:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/new-pii-privacy-impacting-information/</loc>
		<lastmod>2017-09-20T17:00:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/have-you-chosen-an-identity-provider-lately/</loc>
		<lastmod>2017-09-20T18:00:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/have-you-chosen-an-identity-provider-lately/</loc>
		<lastmod>2017-09-21T09:07:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/internet-development-and-internet-governance-in-africa/</loc>
		<lastmod>2017-09-22T11:19:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/ixpimpact/</loc>
		<lastmod>2017-09-22T16:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/report-igf-2015-workshop-law-enforcement-in-a-world-of-pervasive-encryption/</loc>
		<lastmod>2017-09-25T08:11:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/support-for-the-timely-transition-of-iana-stewardship/</loc>
		<lastmod>2017-09-25T12:23:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/basic-project-management/</loc>
		<lastmod>2017-09-25T17:04:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/write-grant-application/</loc>
		<lastmod>2017-09-25T17:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/write-grant-application/</loc>
		<lastmod>2017-09-25T17:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/beyond-the-net-impact-report-2015/</loc>
		<lastmod>2017-09-26T13:45:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-society-contribution-wtdc-2017/</loc>
		<lastmod>2017-10-04T14:15:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-society-contribution-wtdc-2017/</loc>
		<lastmod>2017-10-04T14:16:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-society-contribution-wtdc-2017/</loc>
		<lastmod>2017-10-04T20:40:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/wireless-for-communities-in-india-an-overview/</loc>
		<lastmod>2017-10-10T19:14:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/africa-regional-bureau-brochure/</loc>
		<lastmod>2017-10-11T12:39:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/timeline-history-internet-asia-pacific/</loc>
		<lastmod>2017-10-11T20:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/spectrum/</loc>
		<lastmod>2017-10-13T13:58:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/spectrum/</loc>
		<lastmod>2017-10-13T14:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-accessibility-internet-use-by-persons-with-disabilities-moving-forward/</loc>
		<lastmod>2017-10-19T07:22:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/accesibilidad-internet-uso-de-internet-para-discapacitados-avanzar/</loc>
		<lastmod>2017-10-19T07:23:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-accessibility-internet-use-by-persons-with-disabilities-moving-forward/</loc>
		<lastmod>2017-10-19T07:30:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-7-oct-13-oct-2017/</loc>
		<lastmod>2017-10-23T07:43:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-30-sep-06-oct-2017/</loc>
		<lastmod>2017-10-23T07:44:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-23-sep-29-sep-2017/</loc>
		<lastmod>2017-10-23T07:45:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-16-september-22-september-2017/</loc>
		<lastmod>2017-10-23T07:46:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/wireless-communities-case-book/</loc>
		<lastmod>2017-10-23T10:38:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/wireless-communities-nepal-status-report-may-2016/</loc>
		<lastmod>2017-10-23T10:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2011/wireless-communities-india-phase-1-impact-study-analysis/</loc>
		<lastmod>2017-10-23T11:01:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2011/wireless-communities-india-phase-1-impact-assessment-report/</loc>
		<lastmod>2017-10-23T11:09:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/wireless-communities-india-phase-2-report/</loc>
		<lastmod>2017-10-23T11:17:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/wireless-communities-india-phase-3-report/</loc>
		<lastmod>2017-10-23T12:25:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/wireless-for-communities-in-india-phase-6-report/</loc>
		<lastmod>2017-10-23T12:38:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/connecting-remote-communities-wireless-communities-india/</loc>
		<lastmod>2017-10-23T15:17:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-2-sep-8-sep/</loc>
		<lastmod>2017-10-24T08:12:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-19-aug-25-aug/</loc>
		<lastmod>2017-10-24T08:12:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-11-aug-18-aug/</loc>
		<lastmod>2017-10-24T08:16:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-21-jul-28-jul/</loc>
		<lastmod>2017-10-24T08:45:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-14-jul-21-jul/</loc>
		<lastmod>2017-10-24T08:45:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-07-jul-14-jul/</loc>
		<lastmod>2017-10-24T08:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-30-jun-07-jul/</loc>
		<lastmod>2017-10-24T09:00:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-23-jun-30-jun/</loc>
		<lastmod>2017-10-24T09:04:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-16-jun-23-jun/</loc>
		<lastmod>2017-10-24T09:06:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-09-jun-16-jun/</loc>
		<lastmod>2017-10-24T09:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-02-jun-09-jun/</loc>
		<lastmod>2017-10-24T09:11:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-19-may-26-may/</loc>
		<lastmod>2017-10-24T09:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-12-may-18-may/</loc>
		<lastmod>2017-10-24T09:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-21-apr-28-apr/</loc>
		<lastmod>2017-10-24T09:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-14-apr-21-apr/</loc>
		<lastmod>2017-10-24T09:47:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-7-apr-14-apr/</loc>
		<lastmod>2017-10-24T09:49:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-17-march-24-march/</loc>
		<lastmod>2017-10-24T11:01:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-17-march-24-march/</loc>
		<lastmod>2017-10-24T11:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-7-january-13-january-2017/</loc>
		<lastmod>2017-10-25T08:27:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-10-december-16-december-2016/</loc>
		<lastmod>2017-10-25T08:35:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-26-november-2-december-2016/</loc>
		<lastmod>2017-10-25T08:35:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-19-november-25-november-2016/</loc>
		<lastmod>2017-10-25T08:39:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-3-december-9-december-2016/</loc>
		<lastmod>2017-10-25T08:40:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-22-october-28-october-2016/</loc>
		<lastmod>2017-10-25T08:44:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-4-november-10-november-2016/</loc>
		<lastmod>2017-10-25T08:46:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-29-october-4-november-2016/</loc>
		<lastmod>2017-10-25T08:47:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-15-october-21-october-2016/</loc>
		<lastmod>2017-10-25T08:49:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-17-september-23-september-2016/</loc>
		<lastmod>2017-10-25T08:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-24-september-30-september-2016-2/</loc>
		<lastmod>2017-10-25T08:54:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-3-september-9-september-2016/</loc>
		<lastmod>2017-10-25T08:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-27-august-2-september-2016/</loc>
		<lastmod>2017-10-25T08:59:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/barefoot-connected-socio-behavioural-impact-wireless-broadband-digital-intervention-village-campus/</loc>
		<lastmod>2017-10-25T15:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-14-oct-20-oct-2017/</loc>
		<lastmod>2017-10-26T09:56:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-21-oct-27-oct-2017/</loc>
		<lastmod>2017-10-30T21:24:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2011/routing-security-report-2nd-internet-society-operator-roundtable/</loc>
		<lastmod>2017-11-02T14:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/initial-longitudinal-analysis-of-ip-source-spoofing-capability-on-the-internet/</loc>
		<lastmod>2017-11-03T10:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/07/Initial-Longitudinal-Analysis.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/07/Initial-Longitudinal-Analysis-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/enabling-digital-opportunities-middle-east/</loc>
		<lastmod>2017-11-03T16:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/enabling-digital-opportunities-middle-east-cover-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/children-and-the-internet/</loc>
		<lastmod>2017-11-03T21:54:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/children-and-the-internet/</loc>
		<lastmod>2017-11-03T21:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/children-and-the-internet/</loc>
		<lastmod>2017-11-03T21:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-28-oct-3-nov-2017/</loc>
		<lastmod>2017-11-07T06:08:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-infrastructure-security-guidelines-for-africa/</loc>
		<lastmod>2017-11-20T17:37:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/reducing-internet-latency-2013-workshop-report/</loc>
		<lastmod>2017-11-21T11:46:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-4-nov-10-nov-2017/</loc>
		<lastmod>2017-11-22T17:33:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-climate-change/</loc>
		<lastmod>2017-11-22T22:42:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-digital-safety-children-youth/</loc>
		<lastmod>2017-11-22T22:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-internet-things/</loc>
		<lastmod>2017-11-22T22:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-mobile-internet/</loc>
		<lastmod>2017-11-22T22:59:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-social-media/</loc>
		<lastmod>2017-11-22T23:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-11-nov-17-nov-2017/</loc>
		<lastmod>2017-11-23T23:34:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-18-nov-24-nov-2017/</loc>
		<lastmod>2017-11-27T18:49:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/unleashing-the-potential-of-the-internet-for-asean-economies-executive-summary/</loc>
		<lastmod>2017-11-29T10:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/unleashing-the-potential-of-the-internet-for-asean-economies/</loc>
		<lastmod>2017-11-29T10:59:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/the-rise-of-the-digital-citizen-stakeholder-re-balancing-multistakeholder-governance/</loc>
		<lastmod>2017-11-29T15:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Multistakeholder.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2010/open-inter-networking/</loc>
		<lastmod>2017-12-11T17:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/localcontent/</loc>
		<lastmod>2017-12-13T16:27:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/privacy/</loc>
		<lastmod>2017-12-13T16:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/networkneutrality/</loc>
		<lastmod>2017-12-13T16:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/networkneutrality/</loc>
		<lastmod>2017-12-13T16:47:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/interim-report-uganda-wikipedia/</loc>
		<lastmod>2017-12-15T14:39:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-2-dec-8-dec-2017/</loc>
		<lastmod>2017-12-17T02:52:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2012/volunteer-toolkit/</loc>
		<lastmod>2017-12-27T10:57:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/igtoolkit/</loc>
		<lastmod>2017-12-27T13:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/volunteer-toolkit/</loc>
		<lastmod>2017-12-27T13:21:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2012/volunteer-toolkit/</loc>
		<lastmod>2017-12-27T14:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-30-dec-2017-5-jan-2018/</loc>
		<lastmod>2018-01-08T22:18:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/key-concepts/</loc>
		<lastmod>2018-01-09T08:09:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/rw10k-combating-spam-as-network-operators/</loc>
		<lastmod>2018-01-10T10:18:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/best-practices-address-online-mobile-threats/</loc>
		<lastmod>2018-01-10T11:39:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/open-data-lebanon-interim-report/</loc>
		<lastmod>2018-01-11T13:39:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/hamara-internet-final-report/</loc>
		<lastmod>2018-01-11T14:49:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/armenia_internet-radio-progress-report/</loc>
		<lastmod>2018-01-11T15:21:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/progress-report-safer-and-conscious-use-of-the-internet-and-icts-among-k-12-children-in-turkey/</loc>
		<lastmod>2018-01-11T15:37:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-6-jan-2018-12-jan-2018/</loc>
		<lastmod>2018-01-15T18:33:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/wireless-for-communities-in-india-phase-4-report/</loc>
		<lastmod>2018-01-22T13:13:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-13-jan-2018-19-jan-2018/</loc>
		<lastmod>2018-01-22T17:46:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/toward-collaborative-internet-development/</loc>
		<lastmod>2018-02-02T12:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/post-hurricane-connectivity-in-the-caribbean/</loc>
		<lastmod>2018-02-02T13:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/caribbean1-1024x677.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/caribbean2-1024x681.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/02/caribbean3-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/itu-plenipotentiary-14-conference-background-paper/</loc>
		<lastmod>2018-02-05T12:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/itu-plenipotentiary-14-conference-background-paper/</loc>
		<lastmod>2018-02-05T12:19:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-20-jan-2018-26-jan-2018/</loc>
		<lastmod>2018-02-12T17:06:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-27-jan-2018-2-feb-2018/</loc>
		<lastmod>2018-02-12T17:11:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/summary-of-activities-undertaken-by-the-internet-society-related-to-the-implementation-of-the-targets-recommendations-and-commitments-of-the-world-summit-on-the-information-society/</loc>
		<lastmod>2018-02-23T10:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-radio-for-people-with-visual-impairments-final-report/</loc>
		<lastmod>2018-02-26T22:25:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-10-march-17-march-2017/</loc>
		<lastmod>2018-02-27T18:42:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-1-april-7-april-2017/</loc>
		<lastmod>2018-02-27T18:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-26-may-02-june-2017/</loc>
		<lastmod>2018-02-27T19:01:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-28-jul-11-aug/</loc>
		<lastmod>2018-02-27T19:24:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-26-aug-1-sep/</loc>
		<lastmod>2018-02-27T19:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-6-may-12-may-2017/</loc>
		<lastmod>2018-02-27T19:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-11-november-18-november-2016/</loc>
		<lastmod>2018-02-27T20:42:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/connecting-the-unconnected-one-village-at-a-time/</loc>
		<lastmod>2018-02-27T21:06:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-8-october-14-october-2016/</loc>
		<lastmod>2018-02-27T21:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2009/comments-final-sg-report/</loc>
		<lastmod>2018-03-07T16:16:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2008/internet-society-comments-preliminary-third-draft-secretary-generals-report/</loc>
		<lastmod>2018-03-07T16:21:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2008/internet-society-comments-second-draft-secretary-generals-report/</loc>
		<lastmod>2018-03-07T16:27:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2008/contribution-following-wtpf-first-expert-group-meeting/</loc>
		<lastmod>2018-03-07T16:50:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2008/internet-society-comments-second-draft-itu-secretary-generals-report/</loc>
		<lastmod>2018-03-07T16:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2008/internet-society-comments-first-draft-itu-sg-report/</loc>
		<lastmod>2018-03-07T17:05:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2009/comments-secretary-generals-report-april-2009/</loc>
		<lastmod>2018-03-07T17:19:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2009/preserving-user-centric-internet/</loc>
		<lastmod>2018-03-07T17:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2009/the-internet-and-standards/</loc>
		<lastmod>2018-03-07T17:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2009/ngn-and-the-internet/</loc>
		<lastmod>2018-03-07T17:40:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2009/ipv6-address-allocation/</loc>
		<lastmod>2018-03-07T17:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-3-mar-2018-9-mar-2018/</loc>
		<lastmod>2018-03-13T14:40:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/cryptography-ceo-questions-ctos/</loc>
		<lastmod>2018-03-19T20:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-10-mar-2018-16-mar-2018/</loc>
		<lastmod>2018-03-21T10:37:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-17-mar-2018-23-mar-2018/</loc>
		<lastmod>2018-03-26T14:40:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/the-internet-society-and-african-union-commission-survey-on-african-ict-policy-makers/</loc>
		<lastmod>2018-03-28T08:55:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/beyond-net-impact-report-2016/</loc>
		<lastmod>2018-03-30T15:08:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-31-mar-2018-06-apr-2018/</loc>
		<lastmod>2018-04-10T10:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-comment-wcit-preparations-february-2012/</loc>
		<lastmod>2018-04-11T09:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-comment-wcit-preparations-february-2012/</loc>
		<lastmod>2018-04-11T09:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-comment-wcit-preparations-february-2012/</loc>
		<lastmod>2018-04-11T09:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2015/iot-overview/</loc>
		<lastmod>2018-04-17T10:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-7-13-apr-2018/</loc>
		<lastmod>2018-04-24T10:51:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-14-20-apr-2018/</loc>
		<lastmod>2018-04-24T10:55:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/2018/iot-security-for-policymakers/</loc>
		<lastmod>2018-04-26T07:29:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/privacy/</loc>
		<lastmod>2018-04-27T17:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-21-apr-27-apr-2018/</loc>
		<lastmod>2018-04-30T08:37:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/internet-governance-why-the-multistakeholder-approach-works/</loc>
		<lastmod>2018-05-03T08:19:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/eco.es_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/connectivity-in-latin-america-and-the-caribbean-the-role-of-internet-exchange-points/</loc>
		<lastmod>2018-05-03T09:18:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-28-apr-4-may-2018/</loc>
		<lastmod>2018-05-08T08:27:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-5-11-may-2018/</loc>
		<lastmod>2018-05-15T07:44:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2018/iot-trust-by-design/</loc>
		<lastmod>2018-05-22T22:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-12-18-may-2018/</loc>
		<lastmod>2018-05-24T07:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/beyond-the-net-funding-newsletter-may-2018/</loc>
		<lastmod>2018-05-30T13:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-isoc-africa-march-2018/</loc>
		<lastmod>2018-06-01T11:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-isoc-africa-january-2018/</loc>
		<lastmod>2018-06-01T11:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-isoc-africa-february-2018/</loc>
		<lastmod>2018-06-01T11:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/personal-data-protection-guidelines-for-africa/</loc>
		<lastmod>2018-06-14T14:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2018/iot-trust-by-design/</loc>
		<lastmod>2018-06-20T13:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/iot-trust-by-design/</loc>
		<lastmod>2018-06-20T14:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/top-tips-for-consumers-internet-of-things-security-and-privacy/</loc>
		<lastmod>2018-06-24T13:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-june-2018-edition/</loc>
		<lastmod>2018-06-27T13:38:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-april-2018-edition/</loc>
		<lastmod>2018-06-27T13:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-april-2018-edition/</loc>
		<lastmod>2018-06-27T14:00:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-june-2018-edition/</loc>
		<lastmod>2018-06-27T14:03:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-june-2018/</loc>
		<lastmod>2018-07-02T09:02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/meeting-europes-connectivity-challenge/</loc>
		<lastmod>2018-07-03T15:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/EUreport.img1_.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/guifi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/tusheti.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/sarantaporo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/gotland.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2018/iot-trust-framework-v2-5/</loc>
		<lastmod>2018-07-04T13:53:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2018/iot-trust-framework-v2-5/</loc>
		<lastmod>2018-07-04T13:54:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/g7-questionnaire-submission-feb-2016/</loc>
		<lastmod>2018-07-13T09:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/G7-Questionnaire-submission-coverpage.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/promoting-content-in-africa/</loc>
		<lastmod>2018-07-23T10:03:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-july-2018-edition/</loc>
		<lastmod>2018-07-30T14:36:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2018/blockchain-identity/</loc>
		<lastmod>2018-07-31T15:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-august-2018-edition/</loc>
		<lastmod>2018-08-28T09:08:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/blockchain-identity/</loc>
		<lastmod>2018-08-28T16:30:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-august-2018/</loc>
		<lastmod>2018-09-03T11:52:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/policy-framework-for-an-open-and-trusted-internet/</loc>
		<lastmod>2018-09-03T16:22:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/06/trust1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/collaborating-to-eliminate-spam-and-nuisance-communications/</loc>
		<lastmod>2018-09-06T13:44:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/state-of-ipv6-deployment-2017/</loc>
		<lastmod>2018-09-06T13:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/timeipv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/plotend.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ipv62_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/apnic1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/ip8.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/internet-governance-why-the-multistakeholder-approach-works/</loc>
		<lastmod>2018-09-13T13:33:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/04/ecosys.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/internet-society-issues-paper-on-intellectual-property-on-the-internet/</loc>
		<lastmod>2018-09-18T09:39:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/internet-society-issues-paper-on-intellectual-property-on-the-internet/</loc>
		<lastmod>2018-09-18T09:39:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/internet-society-issues-paper-on-intellectual-property-on-the-internet/</loc>
		<lastmod>2018-09-18T09:39:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/discussion-paper-on-the-contribution-of-the-internet-to-content-creation/</loc>
		<lastmod>2018-09-18T10:09:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/beyond-the-net-funding-newsletter-september-2018/</loc>
		<lastmod>2018-09-21T08:17:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/News_Sri_lanka-300x216.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/News_Paraguay-300x216.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Last_Events_Montenegro-300x216.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Last_Events_Pakistan-300x216.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Blog_TunapandaNet-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Blog_Barbados-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Blog_Internet_of_Food-300x225.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/Blog_India_Editathon-300x225.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-september-2018-edition/</loc>
		<lastmod>2018-10-02T16:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-august-2018-edition/</loc>
		<lastmod>2018-10-02T16:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-september-2018-edition/</loc>
		<lastmod>2018-10-02T16:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-september-2018/</loc>
		<lastmod>2018-10-04T10:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-for-education-in-africa-helping-policy-makers-to-meet-the-global-education-agenda-sustainable-development-goal-4/</loc>
		<lastmod>2018-10-04T12:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-digital-accessibility/</loc>
		<lastmod>2018-10-05T09:24:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Digital-Accessibility-1-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Digital-Accessibility-2-600px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/the-value-of-openness-for-a-sustainable-internet/</loc>
		<lastmod>2018-10-05T09:42:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/The-Value-of-Openness-for-a-Sustainable-Internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/state-of-dnssec-deployment-2016/</loc>
		<lastmod>2018-10-05T09:45:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/state-of-dnssec-deployment-2016-976px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/12/dns15.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-society-contribution-citel-pcc-1-preparatory-meeting-itu-world-telecommunication-development-conference-2017-wtdc-17/</loc>
		<lastmod>2018-10-05T10:01:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/internet-societys-2017-action-plan/</loc>
		<lastmod>2018-10-05T13:26:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2015/short-guide-ip-addressing/</loc>
		<lastmod>2018-10-08T01:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/easy-guide-video-making/</loc>
		<lastmod>2018-10-08T10:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/photography-and-video-consent-form/</loc>
		<lastmod>2018-10-08T11:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/middle-east-newsletter-september-2018-edition/</loc>
		<lastmod>2018-10-10T16:01:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/LayalJebran-1-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2011/understanding-online-identity-learning-protect-identity/</loc>
		<lastmod>2018-10-12T21:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/human-rights-infographic/</loc>
		<lastmod>2018-10-15T11:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-5-oct-12-oct-2018/</loc>
		<lastmod>2018-10-16T13:49:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-29-september-5-october-2018/</loc>
		<lastmod>2018-10-16T13:50:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-26-may-1-june-2018/</loc>
		<lastmod>2018-10-16T13:58:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-8-14-september-2018/</loc>
		<lastmod>2018-10-16T13:58:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-25-31-august-2018/</loc>
		<lastmod>2018-10-16T13:59:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-22-28-september-2018/</loc>
		<lastmod>2018-10-16T13:59:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/a-fine-balance-internet-number-resource-distribution-and-de-centralisation/</loc>
		<lastmod>2018-10-17T10:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/the-internet-and-extra-territorial-effects-of-laws/</loc>
		<lastmod>2018-10-18T14:53:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/the-internet-and-extra-territorial-effects-of-laws/</loc>
		<lastmod>2018-10-18T14:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/the-internet-and-extra-territorial-effects-of-laws/</loc>
		<lastmod>2018-10-18T14:59:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-13-oct-19-oct-2018/</loc>
		<lastmod>2018-10-22T11:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/infographic-collaboration-for-a-secure-and-resilient-internet/</loc>
		<lastmod>2018-10-24T10:21:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/resilience-of-the-commons-routing-security/</loc>
		<lastmod>2018-10-24T10:41:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/routing-security-for-policymakers/</loc>
		<lastmod>2018-10-24T16:52:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/addressing-the-challenge-of-ip-spoofing/</loc>
		<lastmod>2018-10-25T11:07:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/antispoofing.1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/antispoofing.2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/antispoofing.3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/antispoofing.4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/antispoofing.5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/understanding-security-and-resilience-of-the-internet/</loc>
		<lastmod>2018-10-25T11:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/understanding-security-and-resilience-of-the-internet/</loc>
		<lastmod>2018-10-25T11:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/lifting-barriers-to-internet-development-in-africa-suggestions-for-improving-connectivity/</loc>
		<lastmod>2018-10-25T16:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-society-survey-policy-issues-asia-pacific-2017/</loc>
		<lastmod>2018-10-29T17:41:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/PS2017-1-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/PS2017-2-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/PS2017-3-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/PS2017-4-full.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/PS2017-5-full.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/PS2017-6-full.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/the-internet-society-survey-on-policy-issues-in-asia-pacific-2016/</loc>
		<lastmod>2018-10-29T17:42:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/some-perspectives-on-cybersecurity-2012/</loc>
		<lastmod>2018-10-31T17:09:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-perspectives-on-domain-name-system-dns-filtering/</loc>
		<lastmod>2018-10-31T17:15:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-perspectives-on-domain-name-system-dns-filtering/</loc>
		<lastmod>2018-10-31T17:23:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-perspectives-on-domain-name-system-dns-filtering/</loc>
		<lastmod>2018-10-31T17:25:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-october-2018-edition/</loc>
		<lastmod>2018-11-01T08:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-october-2018-edition/</loc>
		<lastmod>2018-11-01T08:49:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-october-2018/</loc>
		<lastmod>2018-11-01T10:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-20-oct-26-oct-2018/</loc>
		<lastmod>2018-11-05T13:00:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-27-oct-2-nov-2018/</loc>
		<lastmod>2018-11-05T13:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/the-internet-society-survey-on-policy-issues-in-asia-pacific/</loc>
		<lastmod>2018-11-15T10:27:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/the-internet-society-survey-on-policy-issues-in-asia-pacific-2018/</loc>
		<lastmod>2018-11-15T10:30:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/apac6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/beyond-the-net-impact-report-2017/</loc>
		<lastmod>2018-11-15T11:06:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/Btn1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-3-nov-9-nov-2018/</loc>
		<lastmod>2018-11-20T08:35:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-10-nov-16-nov-2018/</loc>
		<lastmod>2018-11-20T08:39:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/our-ceo-oped-in-the-hill-times-canadas-unique-opportunity-to-lead-the-future-of-the-internet/</loc>
		<lastmod>2018-11-21T13:22:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/middle-east-newsletter-october-2018-edition/</loc>
		<lastmod>2018-11-27T10:52:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/10/Nermine-EL-Saadany_1_resized-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-november-2018/</loc>
		<lastmod>2018-12-05T14:51:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/isoc-comments-on-wsis10-zero-draft/</loc>
		<lastmod>2018-12-10T15:17:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/community-networks-in-latin-america/</loc>
		<lastmod>2018-12-11T09:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/a-summary-report-promoting-the-use-of-internet-exchange-points/</loc>
		<lastmod>2018-12-18T12:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/itu-plenipotentiary-2018-issues-matrix/</loc>
		<lastmod>2018-12-21T16:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/privacy-and-the-internet-of-things-event-report/</loc>
		<lastmod>2018-12-26T09:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/what-is-spam/</loc>
		<lastmod>2018-12-31T10:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/a-brave-new-world-how-the-internet-affects-societies/</loc>
		<lastmod>2019-01-08T16:56:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/botnets/</loc>
		<lastmod>2019-01-08T17:12:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/localcontent/</loc>
		<lastmod>2019-01-08T17:13:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/1st-summit-on-community-networks-in-africa-report/</loc>
		<lastmod>2019-01-08T17:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/africa-peering-and-interconnection-forum-afpif-program-committee-governance-structure/</loc>
		<lastmod>2019-01-08T17:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2015/anti-spoofing-whitepaper-addressing-the-challenge-of-ip-spoofing/</loc>
		<lastmod>2019-01-08T19:20:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/09/ISOC-AntiSpoofing-20150904-en-cover-250px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/anti-spoofing-continuing-the-dialogue/</loc>
		<lastmod>2019-01-08T19:22:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/07/HiRes-300x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/the-internet-an-opportunity-for-sustainable-development/</loc>
		<lastmod>2019-01-08T19:33:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/artificial-intelligence-and-machine-learning-policy-paper/</loc>
		<lastmod>2019-01-08T19:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/training-hurricane-electric-free-ipv6-certification/</loc>
		<lastmod>2019-01-08T19:54:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/whitepaper-preparing-for-dnssec-best-practices-recommendations-and-tips-for-successful-implementation-2/</loc>
		<lastmod>2019-01-08T19:59:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/site-arin-ipv6-wiki-getipv6-info-4/</loc>
		<lastmod>2019-01-08T20:02:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/dnssec-rfcs-3/</loc>
		<lastmod>2019-01-08T20:24:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/ipv6-and-content-delivery-networks-cdns/</loc>
		<lastmod>2019-01-08T20:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/ipv6-hosting-providers/</loc>
		<lastmod>2019-01-08T20:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-developer-libraries-5/</loc>
		<lastmod>2019-01-08T20:48:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-training-internet-systems-consortium-isc/</loc>
		<lastmod>2019-01-08T20:57:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/video-why-dnssec-matters-an-interview-with-joe-klein-7/</loc>
		<lastmod>2019-01-08T21:03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/fcc-dnssec-implementation-guidlines-for-isps/</loc>
		<lastmod>2019-01-08T21:05:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/dane/</loc>
		<lastmod>2019-01-08T21:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/rfc-6698-the-dns-based-authentication-of-named-entities/</loc>
		<lastmod>2019-01-08T21:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-training-men-and-mice/</loc>
		<lastmod>2019-01-08T21:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-society-submission-for-the-itu-world-conference-on-international-telecommunication-regulations-wcit-12/</loc>
		<lastmod>2019-01-08T21:13:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/hash-slinger-a-tool-for-creating-tlsa-records-for-the-dane-protocol/</loc>
		<lastmod>2019-01-08T21:18:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/human-rights-and-internet-protocols-comparing-processes-and-principles/</loc>
		<lastmod>2019-01-08T21:21:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Human-Rights-and-Internet-Protocols-Comparing-Processes-and-Principles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/wireless-training-manual/</loc>
		<lastmod>2019-01-08T21:22:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/global-internet-user-survey-infographic/</loc>
		<lastmod>2019-01-08T21:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/GUIS-2012-Infographic_Crop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/cybersecurity-searching-for-a-common-understanding/</loc>
		<lastmod>2019-01-08T21:26:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/google-public-dns-dnssec-validation/</loc>
		<lastmod>2019-01-08T21:27:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/03/google-logo-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/report-signed-root-deployment-framing-the-issues-dnssec-industry-coalition-2009/</loc>
		<lastmod>2019-01-08T21:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/04/signed-root-deployment.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/ipv6-and-ip-communications-including-voip-uc-rtc-sip/</loc>
		<lastmod>2019-01-08T21:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/dnssec-and-ip-communications-including-voip-uc-rtc-sip/</loc>
		<lastmod>2019-01-08T21:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/dnssec-test-sites/</loc>
		<lastmod>2019-01-08T21:45:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/understanding-security-and-resilience-of-the-internet/</loc>
		<lastmod>2019-01-08T21:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/average-price-per-gb-of-traffic-in-sub-saharan-africa-for-internet-access/</loc>
		<lastmod>2019-01-08T21:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Average-price-per-GB-of-traffic-in-Africa-rev12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/benno-overeinder-measuring-spoofed-traffic/</loc>
		<lastmod>2019-01-08T21:49:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/07/Benno-Graph-300x169.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/david-freedman-why-im-practicing-anti-spoofing/</loc>
		<lastmod>2019-01-08T21:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/robert-beverly-initial-longitudinal-analysis-of-ip-source-spoofing-capability-on-the-internet/</loc>
		<lastmod>2019-01-08T21:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/ipv6-address-planning/</loc>
		<lastmod>2019-01-08T21:55:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/how-to-get-ipv6-addresses/</loc>
		<lastmod>2019-01-08T21:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/rirs-nro-300x143.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/internet-society-questionnaire-on-multistakeholder-governance-report-and-summary-of-the-results-october-2013/</loc>
		<lastmod>2019-01-08T21:59:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Internet-Society-Questionnaire-on-Multistakeholder-Governance-Report-and-Summary-of-the-Results.-October-2013.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/dns-servers-supporting-dnssec/</loc>
		<lastmod>2019-01-08T22:00:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/knot-dns/</loc>
		<lastmod>2019-01-08T22:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/10/knot-dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/wtdc-2014-itu-world-telecommunication-development-conference-background-information/</loc>
		<lastmod>2019-01-08T22:03:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/dnssec-deployment-statistics-for-tlds-rick-lamb/</loc>
		<lastmod>2019-01-09T07:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/01/rick.eng_.br_dnssecstat_-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/rfc-6555-happy-eyeballs/</loc>
		<lastmod>2019-01-09T07:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/rfc-7123-security-implications-of-ipv6-on-ipv4-networks/</loc>
		<lastmod>2019-01-09T07:59:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/plan-where-we-need-to-get-dnssec-validation-happening/</loc>
		<lastmod>2019-01-09T08:03:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-how-romanias-rcsrds-deployed-ipv6/</loc>
		<lastmod>2019-01-09T08:11:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-1-450.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/rcs-rds-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-mexicos-axtel-outlines-phases-of-ipv6-deployment-and-recommendations/</loc>
		<lastmod>2019-01-09T08:11:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/axtel-ipv6-case-study-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-ipv6-at-ams-ix/</loc>
		<lastmod>2019-01-09T08:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/ams-ix-ipv6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/ams-ix-ipv6-traffic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-facebook-moving-to-an-ipv6-only-internal-network/</loc>
		<lastmod>2019-01-09T08:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/03/fb-internal-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-ipv6-deployment-at-cern/</loc>
		<lastmod>2019-01-09T08:17:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/EdoardoMartelli_IPv6DeploymentCERN-300x224.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/openssl-tls-library-for-developers/</loc>
		<lastmod>2019-01-09T08:17:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/openssl-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/gnutls-tls-library-for-developers/</loc>
		<lastmod>2019-01-09T08:18:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/GnuTLS_logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/libressl-tls-library-for-developers/</loc>
		<lastmod>2019-01-09T08:18:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/LibreSSL_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-forthnet-moves-to-ipv6-and-uses-ds-lite-to-aid-in-the-transition/</loc>
		<lastmod>2019-01-09T08:18:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/forthnet_logo-300x196.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/ripe67-forthnet-ipv6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-ipv6-at-cisco/</loc>
		<lastmod>2019-01-09T08:20:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/cisco_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-ipv6-at-the-u-s-census-bureau/</loc>
		<lastmod>2019-01-09T08:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/ebook-ipv6-consumer-guideisoc-hong-kong/</loc>
		<lastmod>2019-01-09T08:22:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/IPv6_HongKong_ISOC.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-comcasts-dnssec-implementation/</loc>
		<lastmod>2019-01-09T08:26:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/comcast_logo_200.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-t-mobile-us-goes-ipv6-only-using-464xlat/</loc>
		<lastmod>2019-01-09T08:28:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/tMobile_logo_200.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/NANOG61_464XLAT_graph_451.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/comparison-of-ipv4-and-ipv6-services/</loc>
		<lastmod>2019-01-09T08:29:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/starttls-everywhere/</loc>
		<lastmod>2019-01-09T08:33:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/EFF_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/bcop-ipv6-peering-and-transit-nanog/</loc>
		<lastmod>2019-01-09T08:33:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/tls-developer-libraries/</loc>
		<lastmod>2019-01-09T08:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/tls-150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/the-two-sides-of-dnssec-signing-and-validation/</loc>
		<lastmod>2019-01-09T08:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/07/two-sides-of-dnssec-289x300.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/ipv6-training-from-boson-com/</loc>
		<lastmod>2019-01-09T08:40:37+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/boson-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/dnssec-client-check-for-websites/</loc>
		<lastmod>2019-01-09T08:40:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/08/sidn-dnssec-secure.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/ipv6-measurement-statistics-from-acm-sigcomm/</loc>
		<lastmod>2019-01-09T08:42:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/the-open-internet-what-it-is-and-how-to-avoid-mistaking-it-for-something-else/</loc>
		<lastmod>2019-01-09T08:43:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/itu-plenipotentiary-2014-outcomes/</loc>
		<lastmod>2019-01-09T08:44:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/internet-society-positions-on-the-renewal-of-igf-mandate-and-the-wsis-2015-review/</loc>
		<lastmod>2019-01-09T08:44:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/nist-revised-guide-for-tls-implementations/</loc>
		<lastmod>2019-01-09T08:46:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/02/tls-150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/video-ipv6-and-embedded-systems/</loc>
		<lastmod>2019-01-09T08:53:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/courseware-ipv6-in-networking-essentials/</loc>
		<lastmod>2019-01-09T08:54:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/ipv6-matrix/</loc>
		<lastmod>2019-01-09T09:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/final-report-bridging-the-digital-divide-in-puerto-rico/</loc>
		<lastmod>2019-01-09T09:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2015/ipv6-for-network-operators-book-isoc-argentina-chapter/</loc>
		<lastmod>2019-01-09T09:18:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2015/02/ipv6_operadores_red1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/internet-governance-survey-2015/</loc>
		<lastmod>2019-01-09T09:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/understanding-the-wsis10-review-process/</loc>
		<lastmod>2019-01-09T09:20:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/internet-society-position-paper-on-the-wsis10-review/</loc>
		<lastmod>2019-01-09T09:20:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/wsis10-matrix/</loc>
		<lastmod>2019-01-09T09:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/wsis10-matrix-of-comments-on-4-nov-2015-draft-outcome-document/</loc>
		<lastmod>2019-01-09T09:27:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/isoc-comments-on-wsis10-4-november-draft/</loc>
		<lastmod>2019-01-09T09:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/itu-world-telecommunication-standardization-assembly-2016-background-paper/</loc>
		<lastmod>2019-01-09T09:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/table1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/itu.table2_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/02/itu.table3_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/internet-governance-why-the-multistakeholder-approach-works/</loc>
		<lastmod>2019-01-09T09:30:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/04/ecosys.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-policies-and-regulations-for-the-digital-economy-and-society/</loc>
		<lastmod>2019-01-09T09:34:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Policies-1-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Policies-2-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Policies-3-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Policies-4-600px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/iot-trust-framework-v2-5/</loc>
		<lastmod>2019-01-09T09:40:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/open-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/05/filled-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-july-2018-edition/</loc>
		<lastmod>2019-01-09T09:42:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-july-2018/</loc>
		<lastmod>2019-01-09T09:42:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/middle-east-newletter-august-2018/</loc>
		<lastmod>2019-01-09T09:44:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Salam-150x150.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-1-7-september-2018/</loc>
		<lastmod>2019-01-09T09:45:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/a-pilot-community-network-in-pakistan-online-supplementary-education-and-its-impact/</loc>
		<lastmod>2019-01-09T09:45:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/pilot.pakistan.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/graph.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/09/pakistan2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/overview-of-the-digital-object-architecture-doa/</loc>
		<lastmod>2019-01-09T13:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/bandwidth-management-internet-society-technology-roundtable-series/</loc>
		<lastmod>2019-01-09T14:29:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/BWroundtable_report-1.0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/a-policy-framework-for-enabling-internet-access/</loc>
		<lastmod>2019-01-10T05:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2016/09/enabling.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/chapter-admin-financial-template/</loc>
		<lastmod>2019-01-10T05:56:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/spam/</loc>
		<lastmod>2019-01-10T06:48:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/internet-society-background-paper-on-itu-plenipotentiary-2018/</loc>
		<lastmod>2019-01-10T06:50:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/the-history-of-spam/</loc>
		<lastmod>2019-01-10T06:54:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/protecting-android-apps-from-repackaging-by-self-protection-code/</loc>
		<lastmod>2019-01-10T11:30:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Kanei.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-10-september-16-september-2016/</loc>
		<lastmod>2019-01-10T11:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-1-october-7-october-2016/</loc>
		<lastmod>2019-01-10T11:31:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/promoting-content-in-africa/</loc>
		<lastmod>2019-01-10T14:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-april-2018/</loc>
		<lastmod>2019-01-10T14:00:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/digital-footprints-an-internet-society-reference-framework/</loc>
		<lastmod>2019-01-10T14:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/digitalfootprint_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-24-february-3-march-2017/</loc>
		<lastmod>2019-01-10T17:09:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-17-february-24-february-2017/</loc>
		<lastmod>2019-01-10T17:09:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-10-february-17-february/</loc>
		<lastmod>2019-01-10T17:09:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-3-feb-10-feb-2017/</loc>
		<lastmod>2019-01-10T17:09:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-27-january-3-february-2017/</loc>
		<lastmod>2019-01-10T17:10:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-20-january-27-january-2017/</loc>
		<lastmod>2019-01-10T17:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-13-january-20-january-2017/</loc>
		<lastmod>2019-01-10T17:11:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-2-july-8-july-2016/</loc>
		<lastmod>2019-01-10T17:12:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-Newsletter-8-July.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-2-8-april-2016/</loc>
		<lastmod>2019-01-10T17:14:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-8-APRIL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/interim-report-iot-makerspace-project/</loc>
		<lastmod>2019-01-11T08:33:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/ahuma-final-report/</loc>
		<lastmod>2019-01-11T08:35:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/a-smart-home-is-no-castle-privacy-vulnerabilities-of-encrypted-iot-traffic/</loc>
		<lastmod>2019-01-13T16:37:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/iana-functions-the-basics/</loc>
		<lastmod>2019-01-13T16:46:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/implementation-issues-for-e-commerce/</loc>
		<lastmod>2019-01-14T08:39:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Implementation-Issues-for-E-Commerce.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/internet-society-2015-action-plan/</loc>
		<lastmod>2019-01-15T10:48:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-28-dec-2018-4-jan-2019/</loc>
		<lastmod>2019-01-15T12:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-5-jan-11-jan-2019/</loc>
		<lastmod>2019-01-15T12:50:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/ripe-atlas-probes-and-anchors/</loc>
		<lastmod>2019-01-16T09:28:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/RIPEAtlasmap-1-300x162.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/eu-issues-overview-12-18-december-2015/</loc>
		<lastmod>2019-01-16T09:29:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOCEUNewsletter18DecemberFINAL.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2018-indigenous-connectivity-summit-community-report/</loc>
		<lastmod>2019-01-16T10:07:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/basic-project-management/</loc>
		<lastmod>2019-01-16T14:39:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/multilayer-governance-as-a-theoretical-foundation-of-enhanced-cooperation-rolf-h-weber/</loc>
		<lastmod>2019-01-17T09:23:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Multilayer-Governance-as-a-Theoretical-Foundation-of-Enhanced-Cooperation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/global-internet-report-2014-executive-summary/</loc>
		<lastmod>2019-01-19T16:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/can-edutainment-change-software-updating-behavior/</loc>
		<lastmod>2019-01-19T16:04:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/middle-east-newsletter-january-2019-edition/</loc>
		<lastmod>2019-01-21T15:59:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-12-jan-18-jan-2019/</loc>
		<lastmod>2019-01-22T08:18:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/an-iot-data-communication-framework-for-authenticity-and-integrity/</loc>
		<lastmod>2019-01-26T17:08:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/the-modern-paradigm-for-standards/</loc>
		<lastmod>2019-01-26T17:09:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/The-Modern-Paradigm-for-Standards.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/routing-security-for-policymakers/</loc>
		<lastmod>2019-01-30T12:47:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-9-july-15-july-2016/</loc>
		<lastmod>2019-01-30T16:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-15-JULY.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/internet-protocol-journal-volume-17-number-1-september-2014/</loc>
		<lastmod>2019-01-31T14:42:05+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/IPJ-Journal-Vol.-17-Issue-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-19-jan-25-jan-2019/</loc>
		<lastmod>2019-02-01T11:42:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/eu-issues-overview-31-december-2016-06-january-2017/</loc>
		<lastmod>2019-02-01T16:27:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/testimony-of-sally-wentworth-before-u-s-house-about-iana-transition/</loc>
		<lastmod>2019-02-01T16:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-27-february-4-march-2016/</loc>
		<lastmod>2019-02-02T16:55:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-EU-NEWSLETTER-MARCH-4-2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-26-jan-1-feb-2019/</loc>
		<lastmod>2019-02-05T11:51:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-16-22-january-2016/</loc>
		<lastmod>2019-02-05T11:56:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/permissionless-innovation-cornerstone-of-a-successful-internet/</loc>
		<lastmod>2019-02-05T16:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/huizer-permissionless-innovation-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/highlights-from-isoc-africa-december-2018/</loc>
		<lastmod>2019-02-07T11:28:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/highlights-from-isoc-africa-january-2019/</loc>
		<lastmod>2019-02-07T11:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/global-engagement/</loc>
		<lastmod>2019-02-11T07:44:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Global-Engagement_0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internetmyschool-interim-report/</loc>
		<lastmod>2019-02-12T16:19:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2018-indigenous-connectivity-summit-community-report/</loc>
		<lastmod>2019-02-14T10:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/digital-accessibility-guidelines-building-an-accessible-internet/</loc>
		<lastmod>2019-02-14T10:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/european-regional-bureau-newsletter-24-mar-2018-30-mar-2018/</loc>
		<lastmod>2019-02-14T10:43:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-2-feb-8-feb-2019/</loc>
		<lastmod>2019-02-14T14:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/authenticall-efficient-identity-and-content-authentication-for-phone-calls/</loc>
		<lastmod>2019-02-18T18:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/9-steps-companies-must-take-to-ensure-data-privacy/</loc>
		<lastmod>2019-02-20T12:59:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/yemen-ecommerce-final-report/</loc>
		<lastmod>2019-02-21T08:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-9-feb-15-feb-2019/</loc>
		<lastmod>2019-02-22T11:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/newsletter-from-latin-america-and-the-caribbean-bureau-february-2019/</loc>
		<lastmod>2019-02-22T17:20:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/sebastian-150x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/11/ActionPlanGraph-1-450x322.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-16-feb-22-feb-2019/</loc>
		<lastmod>2019-02-26T12:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/next-generation-leader-profile-on-sorina-teleanu/</loc>
		<lastmod>2019-03-04T16:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/Screen-Shot-2016-01-22-at-10.31.40-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-20-26-february-2016/</loc>
		<lastmod>2019-03-05T16:12:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/EU-NEWSLETTER-26-FEB-2016.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/community-networks-in-latin-america/</loc>
		<lastmod>2019-03-06T16:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-22-feb-1-mar-2019/</loc>
		<lastmod>2019-03-11T08:39:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/2019/european-regional-bureau-newsletter-2-mar-8-mar-2019/</loc>
		<lastmod>2019-03-12T11:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-9-mar-15-mar-2019/</loc>
		<lastmod>2019-03-21T13:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/2019/european-regional-bureau-newsletter-16-mar-22-mar-2019/</loc>
		<lastmod>2019-03-29T08:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/highlights-from-isoc-africa-february-2019/</loc>
		<lastmod>2019-04-03T13:20:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/03/BFIXtraffic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/highlights-from-isoc-africa-march-2019/</loc>
		<lastmod>2019-04-03T13:20:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-23-mar-29-mar-2019/</loc>
		<lastmod>2019-04-05T11:39:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/collaborativesecurity/approach/</loc>
		<lastmod>2019-04-08T16:33:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/innovations-in-spectrum-management/</loc>
		<lastmod>2019-04-10T12:56:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-30-mar-5-apr-2019/</loc>
		<lastmod>2019-04-12T15:54:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-6-apr-12-apr-2019/</loc>
		<lastmod>2019-04-15T10:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/innovations-in-spectrum-management/</loc>
		<lastmod>2019-04-22T10:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/the-economics-of-the-security-of-consumer-grade-iot-products-and-services/</loc>
		<lastmod>2019-04-24T09:57:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/figure1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/trust-opportunity-exploring-consumer-attitudes-to-iot/</loc>
		<lastmod>2019-05-01T07:09:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/report1-368x450.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/report2-325x450.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/report3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/highlights-from-isoc-africa-april-2019/</loc>
		<lastmod>2019-05-08T12:19:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-13-19-apr-2019/</loc>
		<lastmod>2019-05-08T12:44:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-20-26-apr-2019/</loc>
		<lastmod>2019-05-08T12:48:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-27-apr-3-may-2019/</loc>
		<lastmod>2019-05-08T12:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/innovations-in-spectrum-management/</loc>
		<lastmod>2019-05-09T17:14:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2019/trust-opportunity-exploring-consumer-attitudes-to-iot/</loc>
		<lastmod>2019-05-10T10:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/report1-es.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/report2-es.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/report3-es.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/2019/10-goals-for-good-privacy-protection-law/</loc>
		<lastmod>2019-05-15T14:39:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2014-honor-roll-charts-and-tables/</loc>
		<lastmod>2019-05-17T15:02:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/01_overall_2014_honor_roll-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ota_online_trust_honor_roll-02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/failing_by_sector-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/failing_grades_by_category-04.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ota_online_trust_index-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/06_2014_online_trust_average_scores-06.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/email_domain_and_brand_protection-07.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/domain_and_brand_protection_both-08.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/dmarc_adoption-09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/site_and_server_security-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/site_and_server_security-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/worldwide_growth_of_ev-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ev_ssl_certificate_adoption-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/privacy_policies_and_practices-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2014_internet_retailer_honor_roll.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ota_online_trust_honor_roll_2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/either_dkim_or_spf.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/may_2014-_spf_or_dkim.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/domainkeys.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/spf_adoption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/domain_locking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/dnssec_adoption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ir_100.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ir_500.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/fdic_100.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/federal_50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/social_50.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ota_members.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/news_50.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2018-online-trust-audit-infographic/</loc>
		<lastmod>2019-05-17T15:02:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2018-audit-infographic-jpg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2018-audit-infographic-jpg-pg2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2018-audit-infographic-jpg-pg3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/best-practices/</loc>
		<lastmod>2019-05-17T15:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/email-security-committee/</loc>
		<lastmod>2019-05-17T15:04:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/emailauth.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2017-online-trust-audit-top-of-class/</loc>
		<lastmod>2019-05-17T15:26:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-online-trust-audit-methodology-announced/</loc>
		<lastmod>2019-05-17T15:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/rsa-2017-internet-of-insecurity-presentation-self-regulation-or-regulation/</loc>
		<lastmod>2019-05-17T15:38:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/industry-leaders-embrace-2014-honor-roll/</loc>
		<lastmod>2019-05-17T15:54:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2014-honor-roll-125.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/agi3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/twitter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/top10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/ota-members2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/eu-issues-overview-23-29-january-2016/</loc>
		<lastmod>2019-05-27T16:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/net-neutrality-in-lac-study-results/</loc>
		<lastmod>2019-05-27T16:26:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/net-neutrality-legislation-a-framework-for-consensus/</loc>
		<lastmod>2019-05-29T10:46:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/net-neutrality-process-report/</loc>
		<lastmod>2019-05-30T11:57:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/botnets/</loc>
		<lastmod>2019-06-05T12:49:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/extended-validation-certificates-evssl/</loc>
		<lastmod>2019-06-05T12:52:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/ssl-certificate-best-practices-risks-trade-offs/</loc>
		<lastmod>2019-06-05T12:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/email-integrity-audit/</loc>
		<lastmod>2019-06-05T13:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/dmarc/</loc>
		<lastmod>2019-06-05T13:38:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/ota-spf-dmarc-resources-tools/</loc>
		<lastmod>2019-06-05T14:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/a-vision-for-trusted-email/</loc>
		<lastmod>2019-06-05T14:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/statement-for-the-house-of-representatives-understanding-the-role-of-connected-devices-in-recent-cyber-attacks/</loc>
		<lastmod>2019-06-05T14:23:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/smart-homes-and-the-internet-of-things/</loc>
		<lastmod>2019-06-05T14:28:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/diffusing-the-iot-time-bomb-security-and-privacy-trust-code-of-conduct/</loc>
		<lastmod>2019-06-05T14:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/wearfit-security-design-analysis-of-a-wearable-fitness-tracker/</loc>
		<lastmod>2019-06-05T18:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/a-vision-for-trustworthy-advertising/</loc>
		<lastmod>2019-06-05T18:05:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2013/botnet-remediation-overview-practices/</loc>
		<lastmod>2019-06-05T20:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2012/combatting-botnets-through-user-notification-across-the-ecosystem/</loc>
		<lastmod>2019-06-05T20:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2011/data-information-security-recommended-best-practices/</loc>
		<lastmod>2019-06-05T20:43:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/comments-on-fostering-the-advancement-of-the-internet-of-things/</loc>
		<lastmod>2019-06-05T21:06:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-25-may-31-may-2019/</loc>
		<lastmod>2019-06-06T09:48:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-11-may-17-may-2019/</loc>
		<lastmod>2019-06-06T09:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-18-may-24-may-2019/</loc>
		<lastmod>2019-06-06T09:49:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/highlights-from-isoc-africa-may-2019/</loc>
		<lastmod>2019-06-06T11:38:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2014/2014-email-unsubscribe-report-audit/</loc>
		<lastmod>2019-06-06T13:50:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/2015-email-unsubscribe-audit/</loc>
		<lastmod>2019-06-06T14:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2015-online-trust-audit-honor-roll-leadership/</loc>
		<lastmod>2019-06-06T14:10:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2015-online-trust-audit/</loc>
		<lastmod>2019-06-06T14:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-email-marketing-unsubscribe-audit/</loc>
		<lastmod>2019-06-06T14:13:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2019-06-06T14:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-methodology/</loc>
		<lastmod>2019-06-06T14:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2016honorrollgraphic_150px.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-online-trust-audit-industry-support/</loc>
		<lastmod>2019-06-06T14:30:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2016honorrollgraphic_150px_0.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-online-trust-honor-roll-virtual-press-room-vpr/</loc>
		<lastmod>2019-06-06T14:32:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2017-email-marketing-unsubscribe-audit/</loc>
		<lastmod>2019-06-06T14:49:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2017-trust-audit-industry-support/</loc>
		<lastmod>2019-06-06T19:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/2017honorrollgraphicwithtag_150px-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2017-trust-audit-virtual-press-room/</loc>
		<lastmod>2019-06-06T20:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2017-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2019-06-06T20:03:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2018/2018-email-marketing-unsubscribe-audit/</loc>
		<lastmod>2019-06-06T20:07:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/dnssec/</loc>
		<lastmod>2019-06-06T20:36:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2014/2014-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2019-06-06T20:42:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2018-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2019-06-07T15:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/mobile-app-privacy-security/</loc>
		<lastmod>2019-06-07T15:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/ota-iot-webinar-with-daniel-miessler/</loc>
		<lastmod>2019-06-07T15:41:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2013/certificate-authority-best-practices/</loc>
		<lastmod>2019-06-07T15:44:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/retail-point-of-sale-name-acquisition-best-practices/</loc>
		<lastmod>2019-06-07T15:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/rsa-interview-with-craig-spiezle/</loc>
		<lastmod>2019-06-07T15:47:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/security-privacy-best-practices/</loc>
		<lastmod>2019-06-07T15:55:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/email-authentication-dmarc/</loc>
		<lastmod>2019-06-10T16:02:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/emailauth.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2018-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2019-06-12T10:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2018-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2019-06-12T10:41:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/enhancing-iot-security-final-outcomes-and-recommendations-report/</loc>
		<lastmod>2019-06-12T11:11:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/beforepurchasing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/atuse_end.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/enhancing-iot-security-final-outcomes-and-recommendations-report/</loc>
		<lastmod>2019-06-12T12:10:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/framework2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/05/framework2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/the-state-of-user-privacy-and-trust-online/</loc>
		<lastmod>2019-06-13T09:58:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/always-on-ssl-aossl/</loc>
		<lastmod>2019-06-14T14:48:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2018/best-practices-cyber-incident-response-readiness/</loc>
		<lastmod>2019-06-14T15:11:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2018/marketing-unsubscribe-best-practices/</loc>
		<lastmod>2019-06-14T15:13:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/best-practices-infrastructure-security/</loc>
		<lastmod>2019-06-14T15:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/best-practices-privacy/</loc>
		<lastmod>2019-06-14T15:14:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-1-june-7-june-2019/</loc>
		<lastmod>2019-07-05T11:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-8-june-14-june-2019/</loc>
		<lastmod>2019-07-05T11:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-15-june-21-june-2019/</loc>
		<lastmod>2019-07-05T11:56:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-january-2018-edition/</loc>
		<lastmod>2019-07-05T12:12:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-january-2018-edition/</loc>
		<lastmod>2019-07-05T12:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-february-2018-edition/</loc>
		<lastmod>2019-07-05T12:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-february-2018-edition/</loc>
		<lastmod>2019-07-05T12:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-march-2018/</loc>
		<lastmod>2019-07-05T12:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-march-2018/</loc>
		<lastmod>2019-07-05T12:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2018/enterprise-iot-security-checklist/</loc>
		<lastmod>2019-07-18T18:37:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/iot-consumer-information-resources/</loc>
		<lastmod>2019-07-18T18:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/iot-trust-framework-submission/</loc>
		<lastmod>2019-07-18T18:48:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/securing-the-internet-of-things-a-collaborative-shared-responsibility/</loc>
		<lastmod>2019-07-18T18:48:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/iot-vision-for-the-future-white-paper/</loc>
		<lastmod>2019-07-18T18:49:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/smart-home-checklist/</loc>
		<lastmod>2019-07-18T18:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/smart-and-connected-devices-security-privacy-checklist/</loc>
		<lastmod>2019-07-18T18:50:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/the-smart-home-checklist/</loc>
		<lastmod>2019-07-18T18:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/iot-trust-framework-overview-congressional-staff-briefing/</loc>
		<lastmod>2019-07-18T18:51:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/iot-comments-to-draft-trust-framework/</loc>
		<lastmod>2019-07-18T18:51:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/kilima-highlights-from-isoc-africa-july-2019/</loc>
		<lastmod>2019-08-05T13:55:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-22-28-june-2019/</loc>
		<lastmod>2019-08-05T14:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-29-june-5-july-2019/</loc>
		<lastmod>2019-08-05T14:45:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-6-12-july-2019/</loc>
		<lastmod>2019-08-05T15:11:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-13-19-july-2019/</loc>
		<lastmod>2019-08-06T11:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-20-26-july-2019/</loc>
		<lastmod>2019-08-09T10:38:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-27-july-2-august-2019/</loc>
		<lastmod>2019-08-09T10:42:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-3-9-august/</loc>
		<lastmod>2019-08-14T14:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/indigenous-connectivity-summit-community-report/</loc>
		<lastmod>2019-08-26T11:09:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/global-internet-report-2014/</loc>
		<lastmod>2019-08-28T13:53:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-24-30-august/</loc>
		<lastmod>2019-09-04T09:28:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/kilima-highlights-from-isoc-africa-august-2019/</loc>
		<lastmod>2019-09-10T08:11:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2014-email-integrity-audit-charts-and-tables/</loc>
		<lastmod>2019-09-16T09:39:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_email_trust_scorecard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_failing_grades_by_category.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_email_domain_and_brand_protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_either_spf_or_dkim_snip.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_both_dkim_spf_snip.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_spf_adoption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_dkim_adoption.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/eaud_dmarc_adoption.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2014/2014-email-integrity-audit/</loc>
		<lastmod>2019-09-16T09:52:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2015/2016-presidential-candidates-online-trust-audit/</loc>
		<lastmod>2019-09-16T09:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/irs-efile-audit/</loc>
		<lastmod>2019-09-16T09:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/freefileresults.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/04/efile_infographic_2016b.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/are-organizations-ready-for-new-privacy-regulations/</loc>
		<lastmod>2019-09-17T09:45:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-7-13-september-2019/</loc>
		<lastmod>2019-09-17T14:55:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2019-online-trust-audit-methodology/</loc>
		<lastmod>2019-09-25T10:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-21-27-september-2019/</loc>
		<lastmod>2019-10-16T17:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-28-september-4-october-2019/</loc>
		<lastmod>2019-10-16T17:20:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/internet-invariants-what-really-matters/</loc>
		<lastmod>2019-10-17T11:31:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/open-stand/</loc>
		<lastmod>2019-10-17T11:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/apac-cn-summit-2019-report/</loc>
		<lastmod>2019-10-22T11:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/why-should-municipalities-make-network-and-data-security-a-priority/</loc>
		<lastmod>2019-11-01T17:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/kilima-highlights-from-isoc-africa-october-2019/</loc>
		<lastmod>2019-11-07T11:57:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/kilima-highlights-from-isoc-africa-september-2019/</loc>
		<lastmod>2019-11-07T11:57:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/solutions-for-traffic-backhaul-in-community-networks/</loc>
		<lastmod>2019-11-11T21:25:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig0-450x271.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig1-450x281.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig2-450x208.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/%resource_types%/%year%/soluciones-para-las-redes-de-retorno-de-trafico-en-redes-comunitarias/</loc>
		<lastmod>2019-11-11T21:25:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig0-450x271.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig1-450x281.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig2-450x208.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/multi-stakeholder-model-in-ict-policymaking-philippines/</loc>
		<lastmod>2019-11-26T17:34:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/timeline.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2018/2017-cyber-incident-breach-trends-report/</loc>
		<lastmod>2019-12-04T12:53:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2014/2013-data-protection-breach-readiness-guide/</loc>
		<lastmod>2019-12-04T12:57:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/creating-trust-for-the-internet-of-things-overview/</loc>
		<lastmod>2019-12-04T13:55:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/kilima-highlights-from-isoc-africa-november-2019/</loc>
		<lastmod>2019-12-12T13:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2019/what-is-ebs/</loc>
		<lastmod>2019-12-13T09:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2019/what-is-ebs/</loc>
		<lastmod>2019-12-13T09:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/what-is-ebs/</loc>
		<lastmod>2019-12-13T13:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/transport-layered-security-tls-for-email/</loc>
		<lastmod>2019-12-25T12:20:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/deploy360/dnssec/factsheet/</loc>
		<lastmod>2019-12-25T12:55:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2019-global-internet-report-consolidation-in-the-internet-economy/</loc>
		<lastmod>2019-12-25T13:46:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/the-internet-society-survey-on-policy-issues-in-asia-pacific-2019/</loc>
		<lastmod>2019-12-25T13:50:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig7a.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/09/APACSurvey_fig7b.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2019-global-internet-report-consolidation-in-the-internet-economy/</loc>
		<lastmod>2019-12-30T14:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2019-global-internet-report-consolidation-in-the-internet-economy/</loc>
		<lastmod>2019-12-30T14:06:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2019/encryption-factsheet-essential-for-lgbtq-community/</loc>
		<lastmod>2020-01-06T19:19:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/endtoend-450x316.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/major-initiatives-in-cybersecurity/</loc>
		<lastmod>2020-01-10T17:28:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/solutions-for-traffic-backhaul-in-community-networks/</loc>
		<lastmod>2020-01-10T19:43:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig0-450x271.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig1-450x281.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig2-450x208.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/solutions-for-traffic-backhaul-in-community-networks/</loc>
		<lastmod>2020-01-10T20:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig0-450x271.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig1-450x281.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/fig2-450x208.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2019/encryption-factsheet-essential-for-lgbtq-community/</loc>
		<lastmod>2020-01-13T17:28:24+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/endtoend-450x316.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/kilima-highlights-from-isoc-africa-january-2020/</loc>
		<lastmod>2020-02-03T11:41:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-interconnections-proposals-for-new-interconnection-model-comes-up-short/</loc>
		<lastmod>2020-02-11T21:20:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/the-internet-way-of-networking-and-canadas-broadcasting-and-telecommunications-legislative-review/</loc>
		<lastmod>2020-02-21T21:31:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-how-encryption-can-protect-journalists-and-the-free-press/</loc>
		<lastmod>2020-03-26T20:18:48+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/03/end-to-end.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/manrs-fact-sheet-cdn-and-cloud-programme/</loc>
		<lastmod>2020-03-31T06:59:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/2019-ics-policy-recommendations/</loc>
		<lastmod>2020-04-03T19:35:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-client-side-scanning/</loc>
		<lastmod>2020-04-10T16:41:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-client-side-scanning/</loc>
		<lastmod>2020-04-10T16:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-client-side-scanning/</loc>
		<lastmod>2020-04-10T17:08:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-ghost-proposals/</loc>
		<lastmod>2020-04-10T17:19:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-ghost-proposals/</loc>
		<lastmod>2020-04-10T17:30:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/fact-sheet-machine-in-the-middle-attacks/</loc>
		<lastmod>2020-04-10T17:35:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/ipv6-time-servers-ntp/</loc>
		<lastmod>2020-05-14T10:18:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/iot-overview/</loc>
		<lastmod>2020-05-15T15:11:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-ghost-proposals/</loc>
		<lastmod>2020-05-29T16:35:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-government-hacking/</loc>
		<lastmod>2020-05-29T16:43:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/indigenous-connectivity-in-the-united-states/</loc>
		<lastmod>2020-06-01T12:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/itu-wtsa-2016-outcomes-an-internet-society-perspective/</loc>
		<lastmod>2020-06-03T17:39:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/ensuring-every-canadian-has-access-to-the-internet/</loc>
		<lastmod>2020-06-09T16:41:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/ensuring-every-canadian-has-access-to-the-internet/</loc>
		<lastmod>2020-06-18T15:45:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-internet-way-of-networking/</loc>
		<lastmod>2020-06-18T16:40:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-internet-peering/</loc>
		<lastmod>2020-06-19T09:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-internet-peering/</loc>
		<lastmod>2020-06-19T09:38:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-an-internet-exchange-point-ixp/</loc>
		<lastmod>2020-06-22T19:13:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/connectivity-in-latin-america-and-the-caribbean-the-role-of-internet-exchange-points/</loc>
		<lastmod>2020-06-22T19:53:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-eighty-for-africa/</loc>
		<lastmod>2020-06-23T18:11:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/statement-to-u-s-congress-hearing-on-addressing-the-urgent-needs-of-our-tribal-communities/</loc>
		<lastmod>2020-07-09T13:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/encryption/</loc>
		<lastmod>2020-07-28T12:31:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/2019-indigenous-connectivity-summit-report/</loc>
		<lastmod>2020-07-31T12:15:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/ics-report2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/ics-report.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/ics-report1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/artwork-450x418.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/herman.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/the-impact-of-internet-access-in-indigenous-communities-in-canada-and-the-united-states/</loc>
		<lastmod>2020-07-31T12:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/ixp-report-2020/</loc>
		<lastmod>2020-08-18T09:49:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/06/figure1-stages.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/ixpimpact/</loc>
		<lastmod>2020-08-18T09:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2019-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2020-08-21T17:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2019-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2020-08-21T17:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2019-online-trust-audit-and-honor-roll/</loc>
		<lastmod>2020-08-21T17:10:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-accessibility-internet-use-by-persons-with-disabilities-moving-forward/</loc>
		<lastmod>2020-08-25T16:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/pacific-internet-exchange-point-feasibility-study/</loc>
		<lastmod>2020-08-25T18:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/policy-toolkit-on-iot-security-and-privacy/</loc>
		<lastmod>2020-09-02T17:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/spectrum/</loc>
		<lastmod>2020-09-10T07:39:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/intermediary-liability-survey-latin-america/</loc>
		<lastmod>2020-09-14T17:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/the-danger-of-the-new-internet-choke-points/</loc>
		<lastmod>2020-09-22T13:58:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-an-internet-exchange-point-ixp/</loc>
		<lastmod>2020-09-23T14:53:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/middle-east-north-africa-internet-infrastructure-report/</loc>
		<lastmod>2020-09-24T13:33:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/MENA-infrastructure-report-figure1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/MENA-infrastructure-report-figure2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/MENA-infrastructure-report-figure3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/MENA-infrastructure-report-figure4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/MENA-infrastructure-report-figure5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/internet-impact-assessment-toolkit/use-case-data-localization/</loc>
		<lastmod>2020-09-30T18:52:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/internet-impact-assessment-toolkit/use-case-intermediary-liability/</loc>
		<lastmod>2020-10-08T17:26:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2020/internet-impact-assessment-toolkit/use-case-intermediary-liability/</loc>
		<lastmod>2020-10-08T17:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/2020-ics-policy-recommendations/</loc>
		<lastmod>2020-10-20T16:45:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/breaking-the-myths-on-encryption/</loc>
		<lastmod>2020-11-23T23:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/insights-from-2020-public-pulse-survey/</loc>
		<lastmod>2020-11-24T19:18:42+00:00</lastmod>
		<image:image>
			<image:loc>http://www.internetsociety.org/wp-content/uploads/2020/11/chart1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/wp-content/uploads/2020/11/subgroup.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/wp-content/uploads/2020/11/chart4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/wp-content/uploads/2020/11/chart5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/wp-content/uploads/2020/11/chart6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.internetsociety.org/wp-content/uploads/2020/11/chart7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/traceability-and-cybersecurity-experts-workshop-series-on-encryption-in-india/</loc>
		<lastmod>2020-12-01T11:46:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/traceability-and-cybersecurity-experts-workshop-series-on-encryption-in-india/</loc>
		<lastmod>2020-12-01T11:46:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/traceability-and-cybersecurity-experts-workshop-series-on-encryption-in-india/</loc>
		<lastmod>2020-12-04T15:03:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-intermediaries-and-encryption/</loc>
		<lastmod>2020-12-10T15:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-intermediaries-and-encryption/</loc>
		<lastmod>2020-12-10T15:34:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-intermediaries-and-encryption/</loc>
		<lastmod>2020-12-10T15:35:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-internet-way-of-networking/</loc>
		<lastmod>2020-12-11T15:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-internet-way-of-networking/</loc>
		<lastmod>2020-12-11T15:17:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-government-hacking/</loc>
		<lastmod>2020-12-11T15:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-government-hacking/</loc>
		<lastmod>2020-12-11T16:25:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-working-from-home/</loc>
		<lastmod>2020-12-15T11:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2020/fact-sheet-machine-in-the-middle-attacks/</loc>
		<lastmod>2020-12-15T13:26:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-impact-assessment-toolkit/use-case-intermediary-liability/</loc>
		<lastmod>2020-12-18T11:14:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-impact-assessment-toolkit/use-case-data-localization/</loc>
		<lastmod>2020-12-18T11:17:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-impact-assessment-toolkit/use-case-content-filtering/</loc>
		<lastmod>2020-12-18T11:19:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/ixpimpact/</loc>
		<lastmod>2020-12-29T22:11:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2011/internet-society-u-s-501c3-tax-exempt-charitable-organization/</loc>
		<lastmod>2020-12-30T17:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/a-case-study-in-local-content-hosting-speed-visits-and-cost-of-access/</loc>
		<lastmod>2021-01-05T23:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/04/rw1_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/04/rw2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/04/rw3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/04/rw4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/04/rw5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/keys-to-successful-collaboration-and-solving-wicked-internet-problems/</loc>
		<lastmod>2021-01-06T09:09:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-Collaboration-Behavior-20161122-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/flow-of-information-of-the-follow-up-of-the-world-summit-on-the-information-society-wsis/</loc>
		<lastmod>2021-01-06T09:15:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/call-for-submissions-by-the-un-special-rapporteur-on-freedom-of-expression/</loc>
		<lastmod>2021-01-06T09:20:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/discussion-paper-the-mobile-app-divide/</loc>
		<lastmod>2021-01-06T09:22:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/perspectives-on-the-iana-stewardship-transition-principles/</loc>
		<lastmod>2021-01-06T09:27:38+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/the-internet-and-sustainable-development/</loc>
		<lastmod>2021-01-06T09:40:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/internet-society-submission-to-the-u-n-special-rapporteur-on-the-protection-and-promotion-of-the-right-to-freedom-of-expression-and-opinion-regarding-the-use-of-encryption-and-anonymity-in-digital-co/</loc>
		<lastmod>2021-01-06T09:43:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/iot/</loc>
		<lastmod>2021-01-06T10:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/ixps/</loc>
		<lastmod>2021-01-06T11:12:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/iot/</loc>
		<lastmod>2021-01-06T11:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/ixps/</loc>
		<lastmod>2021-01-06T11:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2017/internet-content-blocking/</loc>
		<lastmod>2021-01-06T12:04:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/content.fr1_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/content.fr2_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr7.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/fr10.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2017/wtdc-2017-background-paper/</loc>
		<lastmod>2021-01-06T12:07:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/community-networks-regulatory-issues-gaps-experiences-india/</loc>
		<lastmod>2021-01-06T12:09:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-access-and-education/</loc>
		<lastmod>2021-01-06T12:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/education1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2017/internet-access-and-education/</loc>
		<lastmod>2021-01-06T12:18:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/priorities.FR_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2017/internet-access-and-education/</loc>
		<lastmod>2021-01-06T12:20:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/priorities.ES_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2013/internet-society-response-to-the-questionnaire-of-the-cstd-working-group-on-enhanced-cooperation/</loc>
		<lastmod>2021-01-06T12:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/humanrights/</loc>
		<lastmod>2021-01-07T10:16:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/internetgovernance/</loc>
		<lastmod>2021-01-07T21:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/internetgovernance/</loc>
		<lastmod>2021-01-07T21:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/internetgovernance/</loc>
		<lastmod>2021-01-07T21:50:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-impact-assessment-toolkit/use-case-interconnection-and-routing/</loc>
		<lastmod>2021-01-29T20:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2020/internet-impact-assessment-toolkit/use-case-interconnection-and-routing/</loc>
		<lastmod>2021-01-29T20:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/internet-impact-assessment-toolkit/use-case-interconnection-and-routing/</loc>
		<lastmod>2021-01-29T20:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/dns-considerations-for-ipv6/</loc>
		<lastmod>2021-02-13T19:19:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/how-to-make-sure-section-230-reforms-dont-harm-the-foundation-of-the-internet/</loc>
		<lastmod>2021-02-14T14:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/openstandards/</loc>
		<lastmod>2021-03-16T13:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/openstandards/</loc>
		<lastmod>2021-03-16T13:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/openstandards/</loc>
		<lastmod>2021-03-16T13:35:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/ipv6/</loc>
		<lastmod>2021-03-17T11:33:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/ipv6/</loc>
		<lastmod>2021-03-17T11:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/ipv6/</loc>
		<lastmod>2021-03-17T11:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/guide-to-broadband-funding-opportunities-in-us/</loc>
		<lastmod>2021-03-18T09:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/identity/</loc>
		<lastmod>2021-03-19T09:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/kilima-highlights-from-isoc-africa-june-2019/</loc>
		<lastmod>2021-03-19T16:37:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2016-online-trust-honor-roll-leaders/</loc>
		<lastmod>2021-03-19T16:41:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/telecommunications-reclaimed-a-hands-on-guide-to-networking-communities/</loc>
		<lastmod>2021-04-09T10:53:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/encryption-unlocks-the-benefits-of-a-thriving-trustworthy-internet/</loc>
		<lastmod>2021-04-16T13:04:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/graphic1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/graphic2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/graphic3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/graphic4-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/ixptoolkitguide/</loc>
		<lastmod>2021-04-27T16:56:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/mauritius-igf-and-internet-society-response-to-mauritius-icta-consultation-paper/</loc>
		<lastmod>2021-05-17T11:11:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/understanding-encryption-the-connections-to-survivor-safety/</loc>
		<lastmod>2021-05-25T16:16:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/understanding-encryption-the-connections-to-survivor-safety/</loc>
		<lastmod>2021-05-25T16:17:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/impact-of-covid-19-on-the-internet-ecosystem-in-mena/</loc>
		<lastmod>2021-06-03T16:39:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-infrastructure-security-guidelines-for-the-arab-states/</loc>
		<lastmod>2021-06-03T16:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-machine-in-the-middle-attacks/</loc>
		<lastmod>2021-06-18T17:36:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/new-security-mechanisms-network-time-synchronization-protocols/</loc>
		<lastmod>2021-06-21T10:59:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/routing-security-for-policymakers/</loc>
		<lastmod>2021-06-21T11:01:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/intermediary-liability-survey-latin-america/</loc>
		<lastmod>2021-06-21T11:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/discussion-paper-an-analysis-of-the-new-ip-proposal-to-the-itu-t/</loc>
		<lastmod>2021-06-21T11:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/04/tcp-ip.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/encryption-factsheet-essential-for-lgbtq-community/</loc>
		<lastmod>2021-06-21T11:03:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/11/endtoend-450x316.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/internet-society-chatham-house-roundtable-on-encryption-and-lawful-access/</loc>
		<lastmod>2021-06-21T11:04:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/encryption-brief/</loc>
		<lastmod>2021-06-21T11:04:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/endtoend.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/understanding-encryption-the-connections-to-survivor-safety/</loc>
		<lastmod>2021-06-21T11:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-for-youth-by-youth-3-ways-to-act/</loc>
		<lastmod>2021-06-21T11:28:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/virtual-schooling-11-ways-to-keep-your-child-safe-online/</loc>
		<lastmod>2021-06-21T11:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/factsheet-for-policymakers-6-ways-lawful-access-puts-everyones-security-at-risk/</loc>
		<lastmod>2021-06-21T11:29:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/fact-sheet-working-from-home/</loc>
		<lastmod>2021-06-21T11:29:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/ixps/</loc>
		<lastmod>2021-06-22T09:15:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/encryption/</loc>
		<lastmod>2021-06-22T09:17:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/iot-privacy-for-policymakers/</loc>
		<lastmod>2021-06-22T09:41:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/white-paper-considerations-for-mandating-open-interfaces/</loc>
		<lastmod>2021-06-22T11:11:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/effective-ixp-strategies-for-the-asia-pacific/</loc>
		<lastmod>2021-06-23T19:09:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-eighty-for-africa/</loc>
		<lastmod>2021-07-05T11:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/2018-cyber-incident-breach-trends-report/</loc>
		<lastmod>2021-07-06T10:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/promoting-local-content-hosting-to-develop-the-internet-ecosystem/</loc>
		<lastmod>2021-07-06T10:51:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-local-localised-content/</loc>
		<lastmod>2021-07-06T10:52:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/ipv6/security/ipv4-engineers/</loc>
		<lastmod>2021-07-06T10:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/internet-society-survey-on-policy-issues-in-asia-pacific-2015/</loc>
		<lastmod>2021-07-06T11:21:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/dns-privacy/intro/</loc>
		<lastmod>2021-07-06T11:24:29+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/dnsprivacy1-450x339.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/dnsprivacy2-450x335.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/dnsprivacy3-450x339.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/dnsprivacy4-450x339.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/dnsprivacy5-450x335.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/dns-privacy/faq/</loc>
		<lastmod>2021-07-06T11:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/keeping-your-workplace-safe-online/</loc>
		<lastmod>2021-07-06T11:37:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/highlights-from-isoc-africa-may-2018/</loc>
		<lastmod>2021-07-06T11:41:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2013/report-routing-resiliency-measurements-workshop/</loc>
		<lastmod>2021-07-06T11:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/routing-security-report-3rd-internet-society-operator-roundtable/</loc>
		<lastmod>2021-07-06T11:42:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/tusheti-case-study/</loc>
		<lastmod>2021-07-06T11:49:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/Tusheti.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/the-mobile-solar-computer-classroom-project-interim-report/</loc>
		<lastmod>2021-07-06T11:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/interconnection-and-traffic-exchange-ite-program-brochure/</loc>
		<lastmod>2021-07-06T11:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/asia-pacific-regional-internet-development-dialogue-programme-paper/</loc>
		<lastmod>2021-07-06T11:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/dane-test-sites/</loc>
		<lastmod>2021-07-06T21:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/the-road-to-deployment-network-time-security/</loc>
		<lastmod>2021-07-07T15:03:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/the-economic-impact-of-laws-that-weaken-encryption/</loc>
		<lastmod>2021-07-08T19:19:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/the-economic-impact-of-laws-that-weaken-encryption/</loc>
		<lastmod>2021-07-08T19:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/2018/state-of-ipv6-deployment-2018/</loc>
		<lastmod>2021-07-08T20:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv61.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv62.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv63.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv64.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv65.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv66.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/06/ipv67.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/deploy360/ipv6/security/faq/</loc>
		<lastmod>2021-07-08T20:44:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2019/online-trust-audit-2020-u-s-presidential-campaigns/</loc>
		<lastmod>2021-07-09T14:39:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig3-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig4-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig6-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig7-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig8.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/10/fig9.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/factsheet-for-policymakers-6-ways-lawful-access-puts-everyones-security-at-risk/</loc>
		<lastmod>2021-07-09T14:52:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/2018/iot-security-for-policymakers/</loc>
		<lastmod>2021-07-09T15:14:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/white-paper-considerations-for-mandating-open-interfaces/</loc>
		<lastmod>2021-07-09T15:15:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/white-paper-considerations-for-mandating-open-interfaces/</loc>
		<lastmod>2021-07-09T15:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/security-through-encryption-and-despite-encryption-an-unachievable-outcome/</loc>
		<lastmod>2021-07-13T13:25:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/2018/iot-security-for-policymakers/</loc>
		<lastmod>2021-07-14T10:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2018/blockchain-identity/</loc>
		<lastmod>2021-07-14T10:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/ixp-report-2020/</loc>
		<lastmod>2021-07-14T10:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/06/figure1-stages-FR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/impact-of-covid-19-on-the-internet-ecosystem-in-mena/</loc>
		<lastmod>2021-07-14T10:56:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/reimagining-the-summit-on-community-networks-in-africa-during-the-covid-19-pandemic/</loc>
		<lastmod>2021-08-09T21:40:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/moving-toward-an-interconnected-africa-the-80-20-initiative/</loc>
		<lastmod>2021-08-18T16:18:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/moving-toward-an-interconnected-africa-the-80-20-initiative/</loc>
		<lastmod>2021-08-18T16:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/figure2-80-20report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/does-quantum-computing-put-our-digital-security-at-risk/</loc>
		<lastmod>2021-09-28T09:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/does-quantum-computing-put-our-digital-security-at-risk/</loc>
		<lastmod>2021-09-28T09:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/does-quantum-computing-put-our-digital-security-at-risk/</loc>
		<lastmod>2021-09-28T09:27:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/the-economic-impact-of-laws-that-weaken-encryption/</loc>
		<lastmod>2021-10-06T11:31:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/factsheet-how-encryption-can-protect-advocacy-groups-and-social-change-movements/</loc>
		<lastmod>2021-10-12T19:17:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/measuring-the-impact-of-local-ixps/</loc>
		<lastmod>2021-10-13T19:25:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/10/Map.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/humanrights/</loc>
		<lastmod>2021-10-16T20:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-and-human-rights-the-challenge-of-empowered-communities/</loc>
		<lastmod>2021-10-16T20:31:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/testing-dnsviz-a-dns-visualization-tool-3/</loc>
		<lastmod>2021-11-01T23:12:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSViz.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSViz-isoc.org_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/case-study-arin-2/</loc>
		<lastmod>2021-11-01T23:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Hosting-Related-IPv6-Case-Studies-Matt-Ryanczak-ARIN-Network-Operations-Manager-Part-1-YouTube.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/case-study-hurricane-electric-3/</loc>
		<lastmod>2021-11-01T23:18:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Hosting-Related-IPv6-Case-Studies-Owen-DeLong-Hurricane-Electric-YouTube.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/case-study-nlnet-labs-3/</loc>
		<lastmod>2021-11-01T23:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/nlnetlabs.nl-__-IPv6-case-studies_-Wytze_s-Home-Network-__.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/testing-dnssec-analyzer/</loc>
		<lastmod>2021-11-02T07:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSECanalyzer-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSECAnalyzer-www.internetsociety.org_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/arin-ipv6-wiki/</loc>
		<lastmod>2021-11-02T07:31:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/ARIN-IPv6-Wiki.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/microsoft-dnssec-deployment-guide-for-windows-server-2008r2-and-windows-7-3/</loc>
		<lastmod>2021-11-02T07:35:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/MS-DNSSEC-Deployment-Guide.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/google-ipv6-statistics-2/</loc>
		<lastmod>2021-11-02T07:39:56+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/GoogleIPv6statistics.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/ipv6-act-now-4/</loc>
		<lastmod>2021-11-02T07:41:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IPv6-Act-Now.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/wikipedia-ipv6/</loc>
		<lastmod>2021-11-02T07:42:47+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IPv6-Wikipedia-the-free-encyclopedia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/jen-linkova-slides-2/</loc>
		<lastmod>2021-11-02T07:43:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IPv6_-What-Why-How-presentation-slides.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/how-to-add-dnssec-support-to-mozilla-firefox-12/</loc>
		<lastmod>2021-11-02T08:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/deploy360-dnssec.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Google-no-dnssec-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSECValidator-addon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Firefoxaddon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Firefox-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Firefox-restart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/deploy360-dnssec.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/deploy360-dnssecerror.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Add-onsManager-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/ValidatorPreferences-default.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/ValidatorPreferences-cznic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/deploy360-dnssec.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-moredetail.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-Validator-States.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/CZ.NIC-brokendnssec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-trigger-3/</loc>
		<lastmod>2021-11-02T09:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dnssec-trigger.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/whitepaper-challenges-and-opportunities-in-deploying-dnssec/</loc>
		<lastmod>2021-11-02T09:40:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/SATIN2012-DNSSEC-Challenges-v12-FINAL.pdf-page-1-of-7-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/how-to-add-dnssec-support-to-google-chrome-4/</loc>
		<lastmod>2021-11-02T14:54:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-icon-Chrome.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/CZ.NIC-Labs-DNSSEC-Validator-extension-for-Google-Chrome.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-icon-Chrome.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/deploy360-dnssecerror.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/chrome-dnssec-validator-extension.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/chrome-dnssec-validator-options-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-icon-Chrome.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/chrome-dnssec-validator-success.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-Validator-States.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dnssec-failed-icon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-quick-reference-card-4/</loc>
		<lastmod>2021-11-02T15:59:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/DNSSEC-refcard.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/number-resource-organization/</loc>
		<lastmod>2021-11-02T16:21:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IPv4-Depletion-and-IPv6-Deployment-FAQs-The-Number-Resource-Organization.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dns-statistics-for-edu-domain-names-3/</loc>
		<lastmod>2021-11-02T17:02:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/EduDNSdomainstatistics1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-tools-project-3/</loc>
		<lastmod>2021-11-02T17:05:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dnssec-tools-project-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/nist-ipv6-and-dnssec-statistics-6/</loc>
		<lastmod>2021-11-02T17:11:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/nist-ipv6-dnssec-stats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/daily-ipv6-statistics-at-vyncke-org-12/</loc>
		<lastmod>2021-11-02T17:12:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/vyncke-ipv6status.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/nist-guidelines-for-the-secure-deployment-of-ipv6/</loc>
		<lastmod>2021-11-02T17:19:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/nist-ipv6-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/ipv6-training-and-courseware-available-at-ripe-ncc/</loc>
		<lastmod>2021-11-02T19:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/RIPE-NCC-Logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/enisa-report-resilience-of-the-internet-interconnection-ecosystem/</loc>
		<lastmod>2021-11-02T20:11:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/enisa-inter-x-routing-resiliency.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/ciscos-6lab-statistics-site/</loc>
		<lastmod>2021-11-03T18:51:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/cisco-6lab-stats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/factsheet-how-encryption-can-protect-advocacy-groups-and-social-change-movements/</loc>
		<lastmod>2021-11-05T16:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/factsheet-how-encryption-can-protect-advocacy-groups-and-social-change-movements/</loc>
		<lastmod>2021-11-05T19:48:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/how-to-conduct-an-internet-impact-brief/</loc>
		<lastmod>2021-11-08T17:56:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/how-to-conduct-an-internet-impact-brief/</loc>
		<lastmod>2021-11-08T17:58:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2021/enablers-of-open-globally-connected-secure-trustworthy-internet/</loc>
		<lastmod>2021-11-08T18:08:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2021/enablers-of-open-globally-connected-secure-trustworthy-internet/</loc>
		<lastmod>2021-11-08T18:09:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/internet-impact-assessment-toolkit/critical-properties-of-the-internet/</loc>
		<lastmod>2021-11-09T10:31:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2020/internet-impact-assessment-toolkit/critical-properties-of-the-internet/</loc>
		<lastmod>2021-11-09T10:33:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-impact-assessment-toolkit/critical-properties-of-the-internet/</loc>
		<lastmod>2021-11-09T14:16:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/enablers-of-open-globally-connected-secure-trustworthy-internet/</loc>
		<lastmod>2021-11-09T14:21:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/07/20150527-ISOC-Background-Calm-Depth-Blue-RGB-1024x1024-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/how-to-conduct-an-internet-impact-brief/</loc>
		<lastmod>2021-11-09T14:26:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/internet-impact-assessment-toolkit/introduction/</loc>
		<lastmod>2021-11-09T14:56:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IIAT-roadmap.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Background-Calm-Depth-Green-CMYK.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Background-Calm-Depth-Green-CMYK.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2020/internet-impact-assessment-toolkit/introduction/</loc>
		<lastmod>2021-11-09T15:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IIAT-roadmap-ES.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Background-Calm-Depth-Green-CMYK.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Background-Calm-Depth-Green-CMYK.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/2021-indigenous-connectivity-summit-policy-recommendations/</loc>
		<lastmod>2021-11-18T13:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/ipv6-for-all-book-isoc-argentina-4/</loc>
		<lastmod>2021-11-26T18:57:11+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/ipv6forallbook.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/how-to-sign-your-domain-with-dnssec-using-binero-for-se-and-eu-13/</loc>
		<lastmod>2021-11-26T18:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/how-to-sign-your-domain-with-dnssec-using-gkg-net-5/</loc>
		<lastmod>2021-11-26T18:57:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/gkg-dsrecords-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/gkgnet-dnssec-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/how-to-sign-your-domain-with-dnssec-using-godaddy-com-16/</loc>
		<lastmod>2021-11-26T18:57:13+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnsmgr-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnsmgr-adv.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnsmgr-adv-off.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnsmgr-adv-on-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnsmgr-dnssec-success-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnsmgr-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnssec-dsrecords-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/godaddy-dnssec-dsrecords-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/how-to-sign-your-domain-with-dnssec-using-dyn-inc-6/</loc>
		<lastmod>2021-11-26T18:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dynect-overview.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dynect-dnssectab.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dynect-dnssecactive.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dynect-ds-records.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dyn-add-ds-record.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dyn-creating-new-ds.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dynect-dnssec-keys.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dynect-ds-records.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/step-by-step-how-to-use-a-dnssec-ds-record-to-link-a-registar-to-a-dns-hosting-provider-4/</loc>
		<lastmod>2021-11-26T18:57:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dsrecord-example.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/gkg-nameservers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dnssecanalyzer-dsrecord-missing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/gkg-add-ds-record.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/gkg-add-ds-warning.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/gkg-dsrecord.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dnssec-analyzer-dsrecord-success-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/deploying-dnssec-validation-on-recursive-caching-name-servers/</loc>
		<lastmod>2021-11-26T18:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/surfnet-dnssec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/making-content-available-over-ipv6/</loc>
		<lastmod>2021-11-26T18:57:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-01-nativipv6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-02-loadbalancer-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-03-6to4proxy-a-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-04-6to4proxy-b-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-05-6to4proxy-c-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-06-mtuproblems-369.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-07-nat64-a-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-08-nat64-b-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-09-nat64-c-727.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/06/mcaoipv6-10-nat64-d-727.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/ipv6-address-planning-guidelines-for-ipv6-address-allocation/</loc>
		<lastmod>2021-11-26T18:57:44+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/example-router-topology.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/monotonic-allocation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/sparse-allocation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/best-fit-allocation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/random-allocation.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/surfnet-preparing-an-ipv6-address-plan/</loc>
		<lastmod>2021-11-26T18:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/09/surfnet-ipv6-address-plan.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/deployment-guide-dnssec-for-internet-service-providers-isps/</loc>
		<lastmod>2021-11-26T18:57:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2013/ebook-ipv6-for-ipv4-experts-available-in-english-and-russian/</loc>
		<lastmod>2021-11-26T18:57:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2013/12/ipv6-for-ipv4-experts-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/video-introduction-to-dns-and-dnssec/</loc>
		<lastmod>2021-11-26T18:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/tutorial-configuring-ipv6-for-mac-os-x/</loc>
		<lastmod>2021-11-26T18:57:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/apple_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/tutorial-configuring-ipv6-for-linux/</loc>
		<lastmod>2021-11-26T18:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/tux_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/tutorial-configuring-ipv6-for-windows/</loc>
		<lastmod>2021-11-26T18:58:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/microsoft_windows_logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/dnssecnsec-vs-nsec3/</loc>
		<lastmod>2021-11-26T18:58:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_DNSSEC-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/video-ipv6-for-debian-linux/</loc>
		<lastmod>2021-11-26T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/video-getting-started-with-dnssec-8/</loc>
		<lastmod>2021-11-26T18:58:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/dnssec-tools-project.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/dnssec-in-6-minutes-5/</loc>
		<lastmod>2021-11-26T18:58:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/africa-regional-bureau-brochure/</loc>
		<lastmod>2021-12-23T15:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/internet-society-position-on-internet-shutdowns/</loc>
		<lastmod>2021-12-24T12:33:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/internet-society-position-on-internet-shutdowns/</loc>
		<lastmod>2021-12-24T12:33:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/connecting-tusheti/</loc>
		<lastmod>2022-01-19T22:14:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/tajikistan-internet-exchange-point-environment-assessment/</loc>
		<lastmod>2022-01-19T22:15:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/kyrgyz-internet-environment-assessment/</loc>
		<lastmod>2022-01-19T22:15:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/sidsreport/</loc>
		<lastmod>2022-01-19T22:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-24-march-31-march-2017/</loc>
		<lastmod>2022-01-21T07:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/africa-internet-economy/</loc>
		<lastmod>2022-01-21T14:53:27+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/AE1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/AE2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/11/ae14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/supporting-the-creation-and-scalability-of-affordable-access-solutions-understanding-community-networks-in-africa/</loc>
		<lastmod>2022-01-25T13:30:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/CN2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/05/presenters.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/unleashing-the-internet-in-the-caribbean-removing-barriers-to-connectivity-and-stimulating-better-access-in-the-region/</loc>
		<lastmod>2022-01-25T15:41:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/encryption/</loc>
		<lastmod>2022-01-25T16:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2017/2016-cyber-incident-breach-readiness-guide/</loc>
		<lastmod>2022-01-25T16:27:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/nyc-mesh-interim-report-june2017/</loc>
		<lastmod>2022-01-25T17:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/iot/</loc>
		<lastmod>2022-01-25T18:14:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2012/dnssec-policy-practice-statements-dps/</loc>
		<lastmod>2022-01-26T15:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/privacy-extensions-for-ipv6-slaac/</loc>
		<lastmod>2022-01-26T15:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/assessing-national-internet-governance-arrangements/</loc>
		<lastmod>2022-01-31T10:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/internet-governance-in-kenya-an-assessment/</loc>
		<lastmod>2022-01-31T10:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2011/understanding-online-identity-overview-identity/</loc>
		<lastmod>2022-02-03T14:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/online-identity-who-me/</loc>
		<lastmod>2022-02-03T14:37:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/understanding-online-identity-protecting-privacy/</loc>
		<lastmod>2022-02-03T14:39:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/online-identity-who-me/</loc>
		<lastmod>2022-02-03T14:41:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/doc/2020/internet-impact-assessment-toolkit/introduction/</loc>
		<lastmod>2022-02-04T14:25:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/IIAT-roadmap-FR-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Background-Calm-Depth-Green-CMYK.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/Background-Calm-Depth-Green-CMYK.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2017/internet-content-blocking/</loc>
		<lastmod>2022-02-04T16:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/table.es_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/sp2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/bl.es2_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/bl.es3_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/sp6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/sp6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/bl.es6_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/sp8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/bl.es8_.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/09/bl.es9_.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/internet-shutdowns/</loc>
		<lastmod>2022-02-07T16:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/figure1-1024x639.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/responsible-data-handling/</loc>
		<lastmod>2022-02-07T16:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/internet-shutdowns/</loc>
		<lastmod>2022-02-07T16:19:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/figure1-shutdowns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/about-internet-society/policy-development-process/</loc>
		<lastmod>2022-02-07T16:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/internet-shutdowns/</loc>
		<lastmod>2022-02-07T16:23:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/12/figure1-shutdowns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/2018/unleashing-community-networks-innovative-licensing-approaches/</loc>
		<lastmod>2022-02-07T16:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/2018/unleashing-community-networks-innovative-licensing-approaches/</loc>
		<lastmod>2022-02-07T16:32:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/resources/2018/unleashing-community-networks-innovative-licensing-approaches/</loc>
		<lastmod>2022-02-07T16:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-infrastructure-security-guidelines-for-africa/</loc>
		<lastmod>2022-02-09T13:39:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2017/lldcreport/</loc>
		<lastmod>2022-02-09T15:42:22+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fig3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/lldcreport/</loc>
		<lastmod>2022-02-09T16:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fig1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fig2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/fig3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/kyrg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/10/tajikist-page-001.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/resources/doc/2018/lac-newsletter-may-2018-edition/</loc>
		<lastmod>2022-02-09T16:30:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/lac-newsletter-may-2018-edition/</loc>
		<lastmod>2022-02-09T16:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/european-regional-bureau-newsletter-28-apr-05-may/</loc>
		<lastmod>2022-02-09T17:12:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/iana-amicus-brief/</loc>
		<lastmod>2022-02-09T17:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2012/combating-spam-policy-technical-and-industry-approaches/</loc>
		<lastmod>2022-02-09T18:01:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/spam-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/iib-encryption-uk-online-safety-bill/</loc>
		<lastmod>2022-02-14T13:14:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/internet-impact-brief-mandated-browser-root-certificates-in-the-eu-eidas-regulation/</loc>
		<lastmod>2022-02-14T13:14:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/internet-impact-brief-2021-indian-intermediary-guidelines-and-the-internet-experience-in-india/</loc>
		<lastmod>2022-02-14T13:15:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/internet-impact-brief-canadas-proposed-online-harms-legislation-and-the-internet/</loc>
		<lastmod>2022-02-14T13:15:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/internet-impact-brief-technical-architecture-of-the-gaia-x-project/</loc>
		<lastmod>2022-02-14T13:15:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/internet-impact-brief-nis2/</loc>
		<lastmod>2022-02-14T13:15:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/manrs-community-report-2020/</loc>
		<lastmod>2022-02-21T10:36:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/manrs-community-report-2021/</loc>
		<lastmod>2022-02-21T10:51:10+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2022/02/manrs-report-2021-cover-min-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/internet-impact-brief-cambodia-national-internet-gateway/</loc>
		<lastmod>2022-02-21T16:37:33+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2022/02/IIB-Cambodia-national-internet-gateway-topology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/internet-impact-brief-nigerias-protection-from-internet-falsehood-and-manipulation-bill-2019/</loc>
		<lastmod>2022-02-21T17:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/huaweis-new-ip-proposal-faq/</loc>
		<lastmod>2022-02-22T10:21:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2022/02/New-IP-Networking-for-Network-2030.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/the-impact-of-the-covid-19-pandemic-on-internet-performance-in-afghanistan-nepal-and-sri-lanka/</loc>
		<lastmod>2022-02-22T15:33:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/12/Screenshot-2021-03-26-at-20.09.38-1024x442.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/impact-of-covid-19-on-the-internet-ecosystem-in-bangladesh-bhutan-and-pakistan/</loc>
		<lastmod>2022-02-22T15:38:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/internet-impact-brief-bangladesh-regulation-for-digital-social-media-and-ott-platforms-2021/</loc>
		<lastmod>2022-03-04T18:03:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2004/the-internet-domain-name-system-explained-for-non-experts-by-daniel-karrenberg/</loc>
		<lastmod>2022-03-14T11:05:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-smtp-over-ipv6-at-linkedin/</loc>
		<lastmod>2022-03-14T20:09:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/linkedIn_SMTP_IPv6-300x224-300x224.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/case-study-ipv6-at-xtracta/</loc>
		<lastmod>2022-03-14T20:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/06/xtracta_logo-300x297-300x297.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/mapping-online-child-safety-in-asia-pacific/</loc>
		<lastmod>2022-03-15T17:25:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/issue-paper-asia-pacific-bureau-gender/</loc>
		<lastmod>2022-03-15T17:25:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-1-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-2-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-3-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-4-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-5-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-6-600px.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/07/APAC-Issue-Papers-Gender-7-600px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/4th-wireless-for-communities-open-spectrum-summit-report/</loc>
		<lastmod>2022-03-15T17:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/mobile-internet-usage-trends-in-asia-pacific/</loc>
		<lastmod>2022-03-15T17:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/rural-communities-access-to-information-society-ruccess-interim-report/</loc>
		<lastmod>2022-03-15T17:25:40+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/RUCCESS_Nepal_Chapter_Interim_Report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/indian-ietf-capacity-building-phase-ii-interim-report/</loc>
		<lastmod>2022-03-15T17:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/policybriefs/internetinvariants/</loc>
		<lastmod>2022-03-16T06:42:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/policybriefs/internetinvariants/</loc>
		<lastmod>2022-03-16T06:42:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/policybriefs/internetinvariants/</loc>
		<lastmod>2022-03-16T06:42:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/ota/2016/2015-data-protection-breach-readiness-guide/</loc>
		<lastmod>2022-03-16T18:19:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/nist-secure-domain-name-system-dns-deployment-guide/</loc>
		<lastmod>2022-03-16T18:43:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/11/nist800-81r1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/6deploy-series-of-ipv6-tutorials/</loc>
		<lastmod>2022-03-16T19:46:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/internet-impact-brief-how-refusing-russian-networks-will-impact-the-internet/</loc>
		<lastmod>2022-03-18T18:13:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/impact-of-ukraines-requests-to-block-russias-access-to-the-internet/</loc>
		<lastmod>2022-03-18T18:13:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/2015-online-trust-honor-roll-virtual-press-room-vpr/</loc>
		<lastmod>2022-03-21T12:53:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/kilima-highlights-from-isoc-africa-march-2020/</loc>
		<lastmod>2022-03-21T13:19:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/vps-providers-supporting-ipv6/</loc>
		<lastmod>2022-03-21T14:03:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/04/Deploy360_Badge_IPv6-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/quick-analysis-the-impact-of-efforts-to-disconnect-russia-from-the-internet/</loc>
		<lastmod>2022-03-21T14:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/explainer-what-is-internet-peering/</loc>
		<lastmod>2022-03-21T16:12:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2014/resource-public-key-infrastructure-rpki/</loc>
		<lastmod>2022-03-21T16:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2014/05/Deploy360_Badge_Securing_BGP-200px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2011/video-how-dnssec-works-4/</loc>
		<lastmod>2022-03-21T17:47:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/ianatimeline/</loc>
		<lastmod>2022-03-21T19:04:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/iana-timeline-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2014/routing-resiliency-survey-report/</loc>
		<lastmod>2022-03-21T19:16:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/internet-society-position-on-internet-shutdowns/</loc>
		<lastmod>2022-03-22T15:09:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/chapter-charter-letter-2016-version/</loc>
		<lastmod>2022-03-22T17:36:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/08/chapter.charter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/the-year-that-was-a-report-on-the-initiatives-and-activities-of-the-asia-pacific-bureau-for-2016-2/</loc>
		<lastmod>2022-03-22T17:37:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2016/the-year-that-was-a-report-on-the-initiatives-and-activities-of-the-asia-pacific-bureau-for-2015/</loc>
		<lastmod>2022-03-22T17:38:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/accessibility-toolkit/</loc>
		<lastmod>2022-03-22T17:39:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/history-internet-africa/</loc>
		<lastmod>2022-03-22T17:39:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/brief-history-internet/</loc>
		<lastmod>2022-03-22T17:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2015/internet-society-2016-action-plan/</loc>
		<lastmod>2022-03-22T17:43:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2021/internet-governance-in-the-middle-east-and-north-africa/</loc>
		<lastmod>2022-03-22T17:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2020/itu-wtsa-2020-background-paper/</loc>
		<lastmod>2022-03-22T17:47:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2017/internet-content-blocking/</loc>
		<lastmod>2022-03-23T09:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/blocking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/overview.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/table1_1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/points.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/ip-blocking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/deep-blocking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/url-blocking_0.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/platform-blocking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/dns-blocking.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2017/03/summary.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/internet/who-makes-it-work/</loc>
		<lastmod>2022-03-23T11:30:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2022/03/Internet-Ecosystem-EN.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/es/internet/who-makes-it-work/</loc>
		<lastmod>2022-03-23T15:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2022/03/Internet-Ecosystem-ES.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/fr/internet/who-makes-it-work/</loc>
		<lastmod>2022-03-23T15:43:06+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2022/03/Internet-Ecosystem-FR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/newsletter-from-latin-america-and-the-caribbean-bureau-february-2019/</loc>
		<lastmod>2022-03-31T10:33:45+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/sebastian-150x150.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2019/02/actionplangraph-ES-450x330.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/wtsa-2020-issues-matrix/</loc>
		<lastmod>2022-04-08T13:09:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/deploy360/2017/introduction-to-pkis-cas/</loc>
		<lastmod>2022-05-04T14:27:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2019/european-regional-bureau-newsletter-4-11-october-2019/</loc>
		<lastmod>2022-05-05T07:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/the-year-that-was-report/</loc>
		<lastmod>2022-05-05T07:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2018/personal-data-protection-guidelines-for-africa/</loc>
		<lastmod>2022-05-09T13:23:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/community-network-readiness-assessment-handbook/</loc>
		<lastmod>2022-05-09T16:57:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/path-to-2025/</loc>
		<lastmod>2022-05-12T09:42:03+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/08/Iconography-Multistakeholder-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Iconography-Global-RGB-Dark.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Conversation-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Education-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Grants_arrow-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Inclusion-e1640273181427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/economy-icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/Icon_Take_Action_RGB_dark-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/11/Iconography-Leadership-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Medium-Core_Values_C_1920x1080.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/path-to-2025/</loc>
		<lastmod>2022-05-12T09:44:25+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/08/Iconography-Multistakeholder-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Iconography-Global-RGB-Dark.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Conversation-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Education-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Grants_arrow-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Inclusion-e1640273181427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/economy-icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/Icon_Take_Action_RGB_dark-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/11/Iconography-Leadership-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Medium-Core_Values_C_1920x1080.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/path-to-2025/</loc>
		<lastmod>2022-05-12T09:44:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/08/Iconography-Multistakeholder-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2018/01/Iconography-Global-RGB-Dark.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Conversation-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Education-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Iconography-Grants_arrow-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Inclusion-e1640273181427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/economy-icon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/04/Icon_Take_Action_RGB_dark-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2020/11/Iconography-Leadership-Dark-RGB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.internetsociety.org/wp-content/uploads/2021/12/Medium-Core_Values_C_1920x1080.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.internetsociety.org/resources/doc/2022/internet-impact-brief-south-koreas-interconnection-rules/</loc>
		<lastmod>2022-05-13T09:42:29+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->