{"id":698,"date":"2015-08-24T11:26:37","date_gmt":"2015-08-24T10:26:37","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=698"},"modified":"2015-08-28T11:27:02","modified_gmt":"2015-08-28T10:27:02","slug":"nations-unies-vers-une-convention-de-geneve-sur-la-vie-privee-en-ligne","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/24\/nations-unies-vers-une-convention-de-geneve-sur-la-vie-privee-en-ligne\/","title":{"rendered":"Nations unies : vers une \u00ab convention de Gen\u00e8ve \u00bb sur la vie priv\u00e9e en ligne ?"},"content":{"rendered":"<p>Une r\u00e9alit\u00e9 \u00ab pire que celle du roman 1984 \u00bb de George Orwell. Joseph Cannataci, le rapporteur sp\u00e9cial des Nations unies sur la vie priv\u00e9e, r\u00e9cemment nomm\u00e9, a tr\u00e8s fortement critiqu\u00e9 les syst\u00e8mes de surveillance num\u00e9rique mis en place en Grande-Bretagne et dans d\u2019autres pays. Il a estim\u00e9 que \u00ab Si vous regardez ce qui se passe au niveau de la seule vid\u00e9osurveillance, Winston [Winston Smith, personnage principal de 1984] pouvait au moins partir \u00e0 la campagne et se cacher derri\u00e8re un arbre en esp\u00e9rant que personne ne le surveille. Mais aujourd\u2019hui, dans bien des endroits de la campagne anglaise, il y a plus de cam\u00e9ras que tout ce que George Orwell aurait pu imaginer \u00bb. M. Cannataci, qui dispose de larges pouvoirs d\u2019investigation dans le cadre de son mandat, souhaite la mise en place, au niveau mondial, d\u2019une l\u00e9gislation encadrant la surveillance num\u00e9rique de masse, sur le mod\u00e8le de la convention de Gen\u00e8ve, cadre du droit humanitaire international.Le rapporteur sp\u00e9cial des Nations unies souhaite \u00e9galement s\u2019attaquer au mod\u00e8le \u00e9conomique des grandes entreprises du Web \u00ab qui tr\u00e8s souvent collectent des informations sur vous dont vous ne vous doutez m\u00eame pas qu\u2019elles puissent exister. [\u2026] Elles ont cr\u00e9\u00e9 un mod\u00e8le dans lequel les informations personnelles sont devenues la nouvelle monnaie. Et malheureusement, la plupart des utilisateurs leur abandonnent ce droit sans m\u00eame le savoir ou y r\u00e9fl\u00e9chir \u00bb.<br \/>\n<a href=\"http:\/\/actualitesdudroit.lamy.fr\/Accueil\/Articles\/tabid\/88\/articleType\/ArticleView\/articleId\/126773\/Default.aspx\" target=\"_blank\">http:\/\/actualitesdudroit.lamy.fr\/Accueil\/Articles\/tabid\/88\/articleType\/ArticleView\/articleId\/126773\/Default.aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une r\u00e9alit\u00e9 \u00ab pire que celle du roman 1984 \u00bb de George Orwell. Joseph Cannataci, le rapporteur sp\u00e9cial des Nations unies sur la vie priv\u00e9e, r\u00e9cemment nomm\u00e9, a tr\u00e8s fortement&hellip; <\/p>\n","protected":false},"author":1,"featured_media":193,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[16],"tags":[],"class_list":["post-698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-donnees-personnelles"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/Unknown-2.jpeg?fit=298%2C169&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-bg","jetpack-related-posts":[{"id":4913,"url":"https:\/\/mouillere.com\/universconvergents\/2021\/05\/19\/affaire-snowden-la-suite-devant-la-cedh\/","url_meta":{"origin":698,"position":0},"title":"Affaire Snowden : la suite devant la CEDH","author":"Fred","date":"19 mai 2021","format":false,"excerpt":"\"Le fait de livrer ou de rendre accessibles \u00e0 une puissance \u00e9trang\u00e8re, \u00e0 une entreprise ou organisation \u00e9trang\u00e8re ou sous contr\u00f4le \u00e9tranger ou \u00e0 leurs agents des renseignements, proc\u00e9d\u00e9s, objets, documents, donn\u00e9es informatis\u00e9es ou fichiers dont l'exploitation, la divulgation ou la r\u00e9union est de nature \u00e0 porter atteinte aux int\u00e9r\u00eats\u2026","rel":"","context":"Dans &quot;Non class\u00e9&quot;","block_context":{"text":"Non class\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/non-classe\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/07\/fonctionnement-prism.jpg?fit=592%2C648&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/07\/fonctionnement-prism.jpg?fit=592%2C648&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/07\/fonctionnement-prism.jpg?fit=592%2C648&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":5369,"url":"https:\/\/mouillere.com\/universconvergents\/2023\/01\/11\/projet-de-traite-sur-la-cybercriminalite\/","url_meta":{"origin":698,"position":1},"title":"Projet de trait\u00e9 sur la cybercriminalit\u00e9","author":"Fred","date":"11 janvier 2023","format":false,"excerpt":"Plusieurs organisations s'inqui\u00e8tent du projet de trait\u00e9 des Nations Unies sur la cybercriminalit\u00e9 pr\u00e9voyant une liste de crimes li\u00e9s aux contenus sur Internet qui menacerait gravement la libert\u00e9 d'expression, la vie priv\u00e9e et les activit\u00e9s l\u00e9gitimes des journalistes, lanceurs d'alerte, activistes, etc.\u00a0 Ainsi, alors que\u00a0 la d\u00e9sinformation menace la d\u00e9mocratie\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/08\/cyber-war-300.jpg?fit=600%2C300&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2623,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/09\/07\/cedh-conditions-dune-surveillance-des-messages-personnels-des-salaries\/","url_meta":{"origin":698,"position":2},"title":"CEDH : conditions d\u2019une surveillance des messages personnels des salari\u00e9s","author":"Fred","date":"7 septembre 2017","format":false,"excerpt":"La CEDH a d\u00e9taill\u00e9 le 5 septembre 2017 les conditions dans lesquelles un employeur peut surveiller les communications \u00e9lectroniques d\u2019un salari\u00e9 : \u00ables juridictions nationales ont manqu\u00e9, d\u2019une part, \u00e0 v\u00e9rifier, en particulier, si le requ\u00e9rant avait \u00e9t\u00e9 pr\u00e9alablement averti par son employeur de la possibilit\u00e9 que ses communications sur\u2026","rel":"","context":"Dans &quot;Ressources humaines&quot;","block_context":{"text":"Ressources humaines","link":"https:\/\/mouillere.com\/universconvergents\/category\/ressources-humaines\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/09\/172122.jpg?fit=800%2C800&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":4596,"url":"https:\/\/mouillere.com\/universconvergents\/2020\/05\/19\/surveillance-par-drones\/","url_meta":{"origin":698,"position":3},"title":"Surveillance par drones","author":"Fred","date":"19 mai 2020","format":false,"excerpt":"Par ordonnance du 18 mai 2020, le Conseil d'Etat enjoint \u00e0 l\u2019Etat de cesser de proc\u00e9der aux mesures de surveillance par drones du respect \u00e0 Paris des r\u00e8gles de s\u00e9curit\u00e9 sanitaire. La Quadrature du Net et la Ligue des Droits de l\u2019Homme avaient sans succ\u00e8s d\u00e9pos\u00e9 devant le tribunal administratif\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4927,"url":"https:\/\/mouillere.com\/universconvergents\/2021\/05\/29\/la-cedh-valide-la-surveillance-electronique-de-masse\/","url_meta":{"origin":698,"position":4},"title":"La CEDH valide la surveillance \u00e9lectronique de masse","author":"Fred","date":"29 mai 2021","format":false,"excerpt":"L\u2019article 8 de la Convention europ\u00e9enne \u00ab n\u2019interdit pas de recourir \u00e0 l\u2019interception en masse afin de prot\u00e9ger la s\u00e9curit\u00e9 nationale ou d\u2019autres int\u00e9r\u00eats nationaux essentiels contre des menaces ext\u00e9rieures graves, et les \u00c9tats jouissent d\u2019une ample marge d\u2019appr\u00e9ciation pour d\u00e9terminer de quel type de r\u00e9gime d\u2019interception ils ont besoin\u2026","rel":"","context":"Dans &quot;Donn\u00e9es personnelles&quot;","block_context":{"text":"Donn\u00e9es personnelles","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/donnees-personnelles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/10\/justice.jpg?fit=1076%2C1111&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/10\/justice.jpg?fit=1076%2C1111&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/10\/justice.jpg?fit=1076%2C1111&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/10\/justice.jpg?fit=1076%2C1111&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2018\/10\/justice.jpg?fit=1076%2C1111&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":491,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/28\/la-loi-renseignement-validee-pour-lessentiel\/","url_meta":{"origin":698,"position":5},"title":"La loi renseignement valid\u00e9e pour l\u2019essentiel","author":"Fred","date":"28 juillet 2015","format":false,"excerpt":"Le Conseil constitutionnel a d\u00e9clar\u00e9 conforme les dispositions des articles L. 853-1 L. 853-2 et L. 853-3 du code de la s\u00e9curit\u00e9 int\u00e9rieure. Il rappelle que l'article L. 853-1 du code de la s\u00e9curit\u00e9 int\u00e9rieure autorise, lorsque les renseignements ne peuvent \u00eatre recueillis par un autre moyen l\u00e9galement autoris\u00e9, l'utilisation\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/4617357_3_b22e_sur-les-reseaux-sociaux-de-nombreux_62ff6ca6b01b759840f332412aece338.jpg?fit=534%2C267&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=698"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/698\/revisions"}],"predecessor-version":[{"id":699,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/698\/revisions\/699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/193"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}