11
|
1 |
{ |
|
2 |
"documents": [ |
|
3 |
{ |
|
4 |
"category": "Global Framework", |
|
5 |
"documents": [ |
|
6 |
{ |
|
7 |
"uri": "https://webwewant.org/", |
|
8 |
"name": "Web We Want", |
|
9 |
"author": "Tim Berners Lee", |
|
10 |
"description": null |
|
11 |
}, |
|
12 |
{ |
|
13 |
"uri": "http://internetrightsandprinciples.org/site/wp-content/uploads/2017/03/IRPC_english_4thedition-1.pdf", |
|
14 |
"name": "The charter of human rights and principles for the internet", |
|
15 |
"author": "Internet Rights and Principles Coalition", |
|
16 |
"description": null |
|
17 |
}, |
|
18 |
{ |
|
19 |
"uri": "https://digitalcharta.eu", |
|
20 |
"name": "Digital Charta", |
|
21 |
"author": "Die Zeit", |
|
22 |
"description": "The Digital Charta is a German proposal of Net Rights. There is also an available <a href=\"https://via.hypothes.is/https://digitalcharta.eu/wp-content/uploads/2016/12/Digital-Charta-EN.pdf\">english version\n" |
|
23 |
}, |
|
24 |
{ |
|
25 |
"uri": "https://nextleap.eu/netrights/articles/Benkler-Degrees_of_Freedom_Dimensions_of_Power_Final.pdf", |
|
26 |
"name": "Degrees of Freedom, Dimensions of Power", |
|
27 |
"author": "Yochai Benkler", |
|
28 |
"description": null |
|
29 |
}, |
|
30 |
{ |
|
31 |
"uri": "https://nextleap.eu/netrights/articles/Internet%20Bill%20of%20rights-Musiani.pdf", |
|
32 |
"name": "Internet Bill of Rights", |
|
33 |
"author": "Francesca Musiani", |
|
34 |
"description": null |
|
35 |
}, |
|
36 |
{ |
|
37 |
"uri": "https://nextleap.eu/netrights/articles/Musiani_caring-about-the-plumbing.pdf", |
|
38 |
"name": "Caring about the plumbing", |
|
39 |
"author": "Francesca Musiani", |
|
40 |
"description": null |
|
41 |
}, |
|
42 |
{ |
|
43 |
"uri": "https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/4586/590", |
|
44 |
"name": "Report of the UN Secretary-General: implementation of and follow-up to the outcomes of the World Summit on the Information Society", |
|
45 |
"author": "United Nations", |
|
46 |
"description": null |
|
47 |
}, |
|
48 |
{ |
|
49 |
"uri": "http://www.ohchr.org/Documents/Publications/GuidingPrinciplesBusinessHR_EN.pdf", |
|
50 |
"name": "The UN Guiding Principles on Business and Human Rights (Ruggie Principles)", |
|
51 |
"author": "United Nations", |
|
52 |
"description": null |
|
53 |
}, |
|
54 |
{ |
|
55 |
"uri": "https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm", |
|
56 |
"name": "The OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", |
|
57 |
"author": "OECD", |
|
58 |
"description": null |
|
59 |
}, |
|
60 |
{ |
|
61 |
"uri": "https://necessaryandproportionate.org/about", |
|
62 |
"name": "The International Principles on the Application of Human Rights to Communications Surveillance", |
|
63 |
"author": "EFF", |
|
64 |
"description": null |
|
65 |
}, |
|
66 |
{ |
|
67 |
"uri": "https://www.article19.org/data/files/pdfs/standards/joburgprinciples.pdf", |
|
68 |
"name": "The Johannesburg Principles on National Security, Freedom of Expression and Access to Information", |
|
69 |
"author": "Article 19", |
|
70 |
"description": null |
|
71 |
}, |
|
72 |
{ |
|
73 |
"uri": "https://www.opensocietyfoundations.org/publications/global-principles-national-security-and-freedom-information-tshwane-principles", |
|
74 |
"name": "The Global Principles on National Security and the Right to Information", |
|
75 |
"author": "Open Society Justice Initiative", |
|
76 |
"description": null |
|
77 |
}, |
|
78 |
{ |
|
79 |
"uri": "https://www.article19.org/data/files/medialibrary/38641/Revised-Defining-Defamation-Principles-2016.pdf", |
|
80 |
"name": "The Revised Defining Defamation: Principles on the Freedom of Expression and the Protection of Reputation", |
|
81 |
"author": "Article 19", |
|
82 |
"description": null |
|
83 |
}, |
|
84 |
{ |
|
85 |
"uri": "https://www.manilaprinciples.org/", |
|
86 |
"name": "The Manila Principles on Intermediary Liability", |
|
87 |
"author": "EFF", |
|
88 |
"description": null |
|
89 |
}, |
|
90 |
{ |
|
91 |
"uri": "https://www.eff.org/fr/cyberspace-independence", |
|
92 |
"name": "A Declaration of the Independence of Cyberspace", |
|
93 |
"author": "John Perry Barlow", |
|
94 |
"description": null |
|
95 |
}, |
|
96 |
{ |
|
97 |
"uri": "https://www.rfc-editor.org/rfc/pdfrfc/rfc8280.txt.pdf", |
|
98 |
"name": "Research into Human Rights Protocol Considerations", |
|
99 |
"author": "N. ten Oever, ARTICLE 19 - C. Cath, Oxford Internet Institute", |
|
100 |
"description": null |
|
101 |
}, |
|
102 |
{ |
|
103 |
"uri": "https://nextleap.eu/netrights/articles/20180412_SCQ.pdf", |
|
104 |
"name": "Devant le Sénat américain, Mark Zuckerberg sauve la face", |
|
105 |
"author": "Le Monde, 2018-04-12", |
|
106 |
"description": null |
|
107 |
}, |
|
108 |
{ |
|
109 |
"uri": "https://blog.mondediplo.net/2018-04-10-Pour-un-service-public-des-donnees", |
|
110 |
"name": "Pour un service public des données", |
|
111 |
"author": "Evgeny Morozov", |
|
112 |
"description": null |
|
113 |
}, |
|
114 |
{ |
|
115 |
"uri": "https://nextleap.eu/netrights/articles/Magna_Charta_constitution.pdf", |
|
116 |
"name": "Magna Charta for the Web", |
|
117 |
"author": "Ars Industrialis", |
|
118 |
"description": "Draft for a constitution of the Internet" |
|
119 |
} |
|
120 |
] |
|
121 |
}, |
|
122 |
{ |
|
123 |
"category": "European Framework", |
|
124 |
"documents": [ |
|
125 |
{ |
|
126 |
"uri": "https://ec.europa.eu/education/sites/education/files/digital-education-action-plan.pdf", |
|
127 |
"name": "Digital Education Action Plan", |
|
128 |
"author": "European Commission", |
|
129 |
"description": null |
|
130 |
}, |
|
131 |
{ |
|
132 |
"uri": "https://nextleap.eu/netrights/articles/digital_agenda_en.pdf", |
|
133 |
"name": "Digital Agenda for Europe", |
|
134 |
"author": "European Commission", |
|
135 |
"description": null |
|
136 |
}, |
|
137 |
{ |
|
138 |
"uri": "https://nextleap.eu/netrights/articles/Digital_single_market.pdf", |
|
139 |
"name": "EU Digital Single Market", |
|
140 |
"author": "European Commission", |
|
141 |
"description": null |
|
142 |
}, |
|
143 |
{ |
|
144 |
"uri": "https://www.enisa.europa.eu/publications/corporate/enisa-strategy", |
|
145 |
"name": "ENISA Strategy", |
|
146 |
"author": "EU Cyber Security Agency", |
|
147 |
"description": null |
|
148 |
}, |
|
149 |
{ |
|
150 |
"uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:l14555&from=EN", |
|
151 |
"name": "Promoting Data Protection by Privacy Enhancing Technologies", |
|
152 |
"author": "European Commission", |
|
153 |
"description": null |
|
154 |
}, |
|
155 |
{ |
|
156 |
"uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&from=EN", |
|
157 |
"name": "Personal data and criminal justice authorities", |
|
158 |
"author": "European Parliament, Council of the European Union", |
|
159 |
"description": null |
|
160 |
}, |
|
161 |
{ |
|
162 |
"uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:l24222&from=EN", |
|
163 |
"name": "European Data Protection Supervisor", |
|
164 |
"author": "European Parliament, Council of the European Union", |
|
165 |
"description": null |
|
166 |
}, |
|
167 |
{ |
|
168 |
"uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:310401_1&from=EN", |
|
169 |
"name": "Right to Be Forgotten", |
|
170 |
"author": "Publications Office", |
|
171 |
"description": null |
|
172 |
}, |
|
173 |
{ |
|
174 |
"uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:4298958&from=EN", |
|
175 |
"name": "EU citizens’ privacy in data transfers to the US", |
|
176 |
"author": "Publications Office", |
|
177 |
"description": null |
|
178 |
}, |
|
179 |
{ |
|
180 |
"uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:310401_2&from=EN", |
|
181 |
"name": "Protection of Personal Data", |
|
182 |
"author": "Publications Office", |
|
183 |
"description": null |
|
184 |
}, |
|
185 |
{ |
|
186 |
"uri": "https://ec.europa.eu/digital-single-market/en/policies/open-internet-net-neutrality", |
|
187 |
"name": "EU and Open Internet", |
|
188 |
"author": "European Commission", |
|
189 |
"description": null |
|
190 |
}, |
|
191 |
{ |
|
192 |
"uri": "https://ec.europa.eu/digital-single-market/en/news/study-implementation-net-neutrality-provisions-telecoms-single-market-regulation-smart-20170011", |
|
193 |
"name": "Study on the implementation of the net neutrality provisions of the Telecoms Single MarketRegulation", |
|
194 |
"author": "European Commission", |
|
195 |
"description": null |
|
196 |
}, |
|
197 |
{ |
|
198 |
"uri": "https://en.wikipedia.org/wiki/General_Data_Protection_Regulation", |
|
199 |
"name": "Wikipedia page on the General Data Protection Regulation (GDPR)", |
|
200 |
"author": "Wikipedia", |
|
201 |
"description": null |
|
202 |
}, |
|
203 |
{ |
|
204 |
"uri": "http://www.osce.org/fom/78309?download=true", |
|
205 |
"name": "Joint Declaration on Freedom of Expression and the Internet", |
|
206 |
"author": "OSCE", |
|
207 |
"description": null |
|
208 |
}, |
|
209 |
{ |
|
210 |
"uri": "https://www.dsimanifesto.eu/manifesto/", |
|
211 |
"name": "The Digital Social Innovation Manifesto", |
|
212 |
"author": "CHiC project", |
|
213 |
"description": null |
|
214 |
} |
|
215 |
] |
|
216 |
}, |
|
217 |
{ |
|
218 |
"category": "France Framework", |
|
219 |
"documents": [ |
|
220 |
{ |
|
221 |
"uri": "https://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000006070987&idArticle=LEGIARTI000006465770&dateTexte=&categorieLien=cid", |
|
222 |
"name": "Code des postes et des communications électroniques", |
|
223 |
"author": "Legifrance", |
|
224 |
"description": null |
|
225 |
}, |
|
226 |
{ |
|
227 |
"uri": "http://www2.assemblee-nationale.fr/static/14/numerique/numerique_rapport.pdf", |
|
228 |
"name": "Rapport du Conseil du Numérique", |
|
229 |
"author": "Assemblé Nationale", |
|
230 |
"description": null |
|
231 |
}, |
|
232 |
{ |
|
233 |
"uri": "https://digital-society-forum.orange.com/fr/les-forums/100-forum-vie_privee_et_donnees_personnelles", |
|
234 |
"name": "Private Life and Personal data, Blog from Orange Labs (in French)", |
|
235 |
"author": "Orange", |
|
236 |
"description": null |
|
237 |
} |
|
238 |
] |
|
239 |
} |
|
240 |
], |
|
241 |
"topics" : [ |
|
242 |
"Decentralization", |
|
243 |
"Encryption", |
|
244 |
"Net rights", |
|
245 |
"Activism", |
|
246 |
"Industrial lobby", |
|
247 |
"Surveillance", |
|
248 |
"Political threat", |
|
249 |
"Technology" |
|
250 |
], |
|
251 |
"metacategories" : [ |
|
252 |
{ |
|
253 |
"tag": "important", |
|
254 |
"description": "Utiliser cette métacatégorie lorsque vous estimez que le propos surligné est important dans le traitement du sujet.", |
|
255 |
"id": "important" |
|
256 |
}, |
|
257 |
{ |
|
258 |
"tag": "mot-clef", |
|
259 |
"description": "Utiliser cette métacatégorie lorsque vous estimez que le terme surligné est un mot-clef relatif au sujet.", |
|
260 |
"id": "keyword" |
|
261 |
}, |
|
262 |
{ |
|
263 |
"tag": "commentaire", |
|
264 |
"description": "Utiliser cette métacatégorie lorsque le propos surligné nécessite un commentaire ou une question.", |
|
265 |
"id": "comment" |
|
266 |
}, |
|
267 |
{ |
|
268 |
"tag": "trouble", |
|
269 |
"description": "Utilisez cette métacatégorie lorsque le propos surligné est à retravailler mais est important à mobiliser dans la suite.", |
|
270 |
"id": "trouble" |
|
271 |
} |
|
272 |
], |
|
273 |
"title": "Net Rights + Cryptography + Decentralization", |
|
274 |
"dashboardId": "" |
|
275 |
} |