{"id":1748,"date":"2016-01-20T10:31:20","date_gmt":"2016-01-20T09:31:20","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=1748"},"modified":"2016-01-30T10:32:47","modified_gmt":"2016-01-30T09:32:47","slug":"la-hongrie-condamnee-pour-son-programme-de-surveillance-de-masse","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2016\/01\/20\/la-hongrie-condamnee-pour-son-programme-de-surveillance-de-masse\/","title":{"rendered":"La Hongrie condamn\u00e9e pour son programme de surveillance de masse"},"content":{"rendered":"<p>La CEDH a consid\u00e9r\u00e9, le 12 janvier, que la surveillance des individus exerc\u00e9e par les autorit\u00e9s hongroises sous couvert d&#8217;antiterrorisme \u00e9tait ill\u00e9gale.<br \/>\n<a href=\"http:\/\/actualitesdudroit.lamy.fr\/Accueil\/Articles\/tabid\/88\/articleType\/ArticleView\/articleId\/127612\/Default.aspx\" target=\"_blank\">http:\/\/actualitesdudroit.lamy.fr\/Accueil\/Articles\/tabid\/88\/articleType\/ArticleView\/articleId\/127612\/Default.aspx<\/a><\/p>\n<p><a href=\"http:\/\/hudoc.echr.coe.int\/eng-press?i=001-160020\" target=\"_blank\">http:\/\/hudoc.echr.coe.int\/eng-press?i=001-160020<\/a><\/p>\n<iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fmouillere.com%2Funiversconvergents%2Fwp-content%2Fuploads%2F2016%2F01%2FCASE-OF-SZAB-AND-VISSY-v.-HUNGARY.pdf&hl=fr&embedded=true\" class=\"gde-frame\" style=\"width:100%; height:500px; border: none;\" scrolling=\"no\"><\/iframe>\n<p class=\"gde-text\"><a href=\"https:\/\/mouillere.com\/universconvergents\/wp-content\/uploads\/2016\/01\/CASE-OF-SZAB-AND-VISSY-v.-HUNGARY.pdf\" class=\"gde-link\">T\u00e9l\u00e9charger (PDF, 577KB)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La CEDH a consid\u00e9r\u00e9, le 12 janvier, que la surveillance des individus exerc\u00e9e par les autorit\u00e9s hongroises sous couvert d&#8217;antiterrorisme \u00e9tait ill\u00e9gale. http:\/\/actualitesdudroit.lamy.fr\/Accueil\/Articles\/tabid\/88\/articleType\/ArticleView\/articleId\/127612\/Default.aspx http:\/\/hudoc.echr.coe.int\/eng-press?i=001-160020<\/p>\n","protected":false},"author":1,"featured_media":485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[16],"tags":[],"class_list":["post-1748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-donnees-personnelles"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-sc","jetpack-related-posts":[{"id":868,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/10\/surveillance-a-letranger-la-proposition-de-loi-se-devoile\/","url_meta":{"origin":1748,"position":0},"title":"Surveillance \u00e0 l\u2019\u00e9tranger : la proposition de loi se d\u00e9voile","author":"Fred","date":"10 septembre 2015","format":false,"excerpt":"Annonc\u00e9e depuis quelques jours, la proposition de loi visant \u00e0 encadrer les pratiques d\u2019\u00e9coutes de la DGSE a \u00e9t\u00e9 publi\u00e9e aujourd\u2019hui sur le site de... http:\/\/www.zdnet.fr\/actualites\/surveillance-a-l-etranger-la-proposition-de-loi-se-devoile-39824694.htm http:\/\/tempsreel.nouvelobs.com\/monde\/20150909.OBS5547\/exclusif-la-nouvelle-loi-sur-les-ecoutes-de-la-dgse.html Proposition de loi relative aux mesures de surveillance des communications \u00e9lectroniques internationales \u00a0","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1495,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/11\/27\/surveillance-dinternet-dans-le-monde-le-conseil-constitutionnel-laisse-un-flou\/","url_meta":{"origin":1748,"position":1},"title":"Surveillance d\u2019Internet dans le monde : le Conseil constitutionnel laisse un flou","author":"Fred","date":"27 novembre 2015","format":false,"excerpt":"En validant sans aucune r\u00e9serve d'intepr\u00e9tation la loi sur la surveillance internationale des communications \u00e9lectroniques, le Conseil constitutionnel ouvre aux services de renseignement une porte pour \u00e9chapper au contr\u00f4le pr\u00e9vu par la loi pour le renseignement interne, y compris pour des Fran\u00e7ais en France. http:\/\/www.numerama.com\/politique\/132866-surveillance-sur-internet-le-conseil-constitutionnel-laisse-un-flou.html http:\/\/www.conseil-constitutionnel.fr\/conseil-constitutionnel\/root\/bank\/download\/2015722DC2015722dc.pdf","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2623,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/09\/07\/cedh-conditions-dune-surveillance-des-messages-personnels-des-salaries\/","url_meta":{"origin":1748,"position":2},"title":"CEDH : conditions d\u2019une surveillance des messages personnels des salari\u00e9s","author":"Fred","date":"7 septembre 2017","format":false,"excerpt":"La CEDH a d\u00e9taill\u00e9 le 5 septembre 2017 les conditions dans lesquelles un employeur peut surveiller les communications \u00e9lectroniques d\u2019un salari\u00e9 : \u00ables juridictions nationales ont manqu\u00e9, d\u2019une part, \u00e0 v\u00e9rifier, en particulier, si le requ\u00e9rant avait \u00e9t\u00e9 pr\u00e9alablement averti par son employeur de la possibilit\u00e9 que ses communications sur\u2026","rel":"","context":"Dans &quot;Ressources humaines&quot;","block_context":{"text":"Ressources humaines","link":"https:\/\/mouillere.com\/universconvergents\/category\/ressources-humaines\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":64,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/06\/10\/la-surveillance-us-plus-quun-desastre-a-35-milliards-de-dollars\/","url_meta":{"origin":1748,"position":3},"title":"La surveillance US plus qu&#8217;un d\u00e9sastre \u00e0 35 milliards de dollars","author":"Fred","date":"10 juin 2015","format":false,"excerpt":"PRISM et l\u2019espionnage de masse ont d\u00e9j\u00e0 caus\u00e9 un pr\u00e9judice de plus de 35 milliards de dollars aux acteurs US des technologies. Mais selon un rapport de l\u2019ITIF, il faut compter aussi avec des effets \u00e0 plus long terme comme les politiques protectionnistes. http:\/\/www.zdnet.fr\/actualites\/la-surveillance-us-plus-qu-un-desastre-a-35-milliards-de-dollars-39820552.htm http:\/\/www.itif.org\/publications\/2015\/06\/09\/beyond-usa-freedom-act-how-us-surveillance-still-subverts-us-competitiveness 2015-beyond-usa-freedom-act","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/TC-13397-MainIcon.jpg?fit=300%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1241,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/26\/on-vous-explique-la-proposition-de-loi-sur-la-surveillance-internationale\/","url_meta":{"origin":1748,"position":4},"title":"On vous explique la proposition de loi sur la surveillance internationale","author":"Fred","date":"26 octobre 2015","format":false,"excerpt":"C\u2019est demain en fin de journ\u00e9e que la proposition de loi sur la surveillance internationale entrera en discussion en s\u00e9ance publique au S\u00e9nat. Une douzaine d'amendements ont \u00e9t\u00e9 d\u00e9pos\u00e9s pour l\u2019heure, traduisant une perfection absolue du texte\u2026 ou une faible mobilisation des parlementaires. http:\/\/www.nextinpact.com\/news\/97032-on-vous-explique-proposition-loi-sur-surveillance-internationale.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2078,"url":"https:\/\/mouillere.com\/universconvergents\/2016\/07\/04\/renseignement-la-surveillance-hertzienne-aux-portes-du-conseil-constitutionnel\/","url_meta":{"origin":1748,"position":5},"title":"Renseignement : la surveillance hertzienne aux portes du Conseil constitutionnel","author":"Fred","date":"4 juillet 2016","format":false,"excerpt":"Mercredi, \u00e0 9h30, le Conseil d\u2019\u00c9tat examinera une demande de question prioritaire de constitutionnalit\u00e9 d\u00e9pos\u00e9e par Les Ex\u00e9g\u00e8tes. Importante, elle cible la surveillance des communications hertzienne, un \u00e9difice sans tour de contr\u00f4le. Explications. http:\/\/www.nextinpact.com\/news\/100502-renseignement-surveillance-hertzienne-aux-portes-conseil-constitutionnel.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=1748"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1748\/revisions"}],"predecessor-version":[{"id":1750,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1748\/revisions\/1750"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/485"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=1748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=1748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=1748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}