|
1 { |
|
2 "documents": [ |
|
3 { |
|
4 "category": "Global Framework", |
|
5 "documents": [ |
|
6 { |
|
7 "uri": "https://webwewant.org/", |
|
8 "name": "Web We Want", |
|
9 "author": "Tim Berners Lee", |
|
10 "description": null |
|
11 }, |
|
12 { |
|
13 "uri": "http://internetrightsandprinciples.org/site/wp-content/uploads/2017/03/IRPC_english_4thedition-1.pdf", |
|
14 "name": "The charter of human rights and principles for the internet", |
|
15 "author": "Internet Rights and Principles Coalition", |
|
16 "description": null |
|
17 }, |
|
18 { |
|
19 "uri": "https://digitalcharta.eu", |
|
20 "name": "Digital Charta", |
|
21 "author": "Die Zeit", |
|
22 "description": "The Digital Charta is a German proposal of Net Rights. There is also an available <a href=\"https://via.hypothes.is/https://digitalcharta.eu/wp-content/uploads/2016/12/Digital-Charta-EN.pdf\">english version\n" |
|
23 }, |
|
24 { |
|
25 "uri": "https://nextleap.eu/netrights/articles/Benkler-Degrees_of_Freedom_Dimensions_of_Power_Final.pdf", |
|
26 "name": "Degrees of Freedom, Dimensions of Power", |
|
27 "author": "Yochai Benkler", |
|
28 "description": null |
|
29 }, |
|
30 { |
|
31 "uri": "https://nextleap.eu/netrights/articles/Internet%20Bill%20of%20rights-Musiani.pdf", |
|
32 "name": "Internet Bill of Rights", |
|
33 "author": "Francesca Musiani", |
|
34 "description": null |
|
35 }, |
|
36 { |
|
37 "uri": "https://nextleap.eu/netrights/articles/Musiani_caring-about-the-plumbing.pdf", |
|
38 "name": "Caring about the plumbing", |
|
39 "author": "Francesca Musiani", |
|
40 "description": null |
|
41 }, |
|
42 { |
|
43 "uri": "https://www.intgovforum.org/multilingual/index.php?q=filedepot_download/4586/590", |
|
44 "name": "Report of the UN Secretary-General: implementation of and follow-up to the outcomes of the World Summit on the Information Society", |
|
45 "author": "United Nations", |
|
46 "description": null |
|
47 }, |
|
48 { |
|
49 "uri": "http://www.ohchr.org/Documents/Publications/GuidingPrinciplesBusinessHR_EN.pdf", |
|
50 "name": "The UN Guiding Principles on Business and Human Rights (Ruggie Principles)", |
|
51 "author": "United Nations", |
|
52 "description": null |
|
53 }, |
|
54 { |
|
55 "uri": "https://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm", |
|
56 "name": "The OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data", |
|
57 "author": "OECD", |
|
58 "description": null |
|
59 }, |
|
60 { |
|
61 "uri": "https://necessaryandproportionate.org/about", |
|
62 "name": "The International Principles on the Application of Human Rights to Communications Surveillance", |
|
63 "author": "EFF", |
|
64 "description": null |
|
65 }, |
|
66 { |
|
67 "uri": "https://www.article19.org/data/files/pdfs/standards/joburgprinciples.pdf", |
|
68 "name": "The Johannesburg Principles on National Security, Freedom of Expression and Access to Information", |
|
69 "author": "Article 19", |
|
70 "description": null |
|
71 }, |
|
72 { |
|
73 "uri": "https://www.opensocietyfoundations.org/publications/global-principles-national-security-and-freedom-information-tshwane-principles", |
|
74 "name": "The Global Principles on National Security and the Right to Information", |
|
75 "author": "Open Society Justice Initiative", |
|
76 "description": null |
|
77 }, |
|
78 { |
|
79 "uri": "https://www.article19.org/data/files/medialibrary/38641/Revised-Defining-Defamation-Principles-2016.pdf", |
|
80 "name": "The Revised Defining Defamation: Principles on the Freedom of Expression and the Protection of Reputation", |
|
81 "author": "Article 19", |
|
82 "description": null |
|
83 }, |
|
84 { |
|
85 "uri": "https://www.manilaprinciples.org/", |
|
86 "name": "The Manila Principles on Intermediary Liability", |
|
87 "author": "EFF", |
|
88 "description": null |
|
89 }, |
|
90 { |
|
91 "uri": "https://www.eff.org/fr/cyberspace-independence", |
|
92 "name": "A Declaration of the Independence of Cyberspace", |
|
93 "author": "John Perry Barlow", |
|
94 "description": null |
|
95 }, |
|
96 { |
|
97 "uri": "https://www.rfc-editor.org/rfc/pdfrfc/rfc8280.txt.pdf", |
|
98 "name": "Research into Human Rights Protocol Considerations", |
|
99 "author": "N. ten Oever, ARTICLE 19 - C. Cath, Oxford Internet Institute", |
|
100 "description": null |
|
101 }, |
|
102 { |
|
103 "uri": "https://nextleap.eu/netrights/articles/20180412_SCQ.pdf", |
|
104 "name": "Devant le Sénat américain, Mark Zuckerberg sauve la face", |
|
105 "author": "Le Monde, 2018-04-12", |
|
106 "description": null |
|
107 }, |
|
108 { |
|
109 "uri": "https://blog.mondediplo.net/2018-04-10-Pour-un-service-public-des-donnees", |
|
110 "name": "Pour un service public des données", |
|
111 "author": "Evgeny Morozov", |
|
112 "description": null |
|
113 }, |
|
114 { |
|
115 "uri": "https://nextleap.eu/netrights/articles/Magna_Charta_constitution.pdf", |
|
116 "name": "Magna Charta for the Web", |
|
117 "author": "Ars Industrialis", |
|
118 "description": "Draft for a constitution of the Internet" |
|
119 } |
|
120 ] |
|
121 }, |
|
122 { |
|
123 "category": "European Framework", |
|
124 "documents": [ |
|
125 { |
|
126 "uri": "https://ec.europa.eu/education/sites/education/files/digital-education-action-plan.pdf", |
|
127 "name": "Digital Education Action Plan", |
|
128 "author": "European Commission", |
|
129 "description": null |
|
130 }, |
|
131 { |
|
132 "uri": "https://nextleap.eu/netrights/articles/digital_agenda_en.pdf", |
|
133 "name": "Digital Agenda for Europe", |
|
134 "author": "European Commission", |
|
135 "description": null |
|
136 }, |
|
137 { |
|
138 "uri": "https://nextleap.eu/netrights/articles/Digital_single_market.pdf", |
|
139 "name": "EU Digital Single Market", |
|
140 "author": "European Commission", |
|
141 "description": null |
|
142 }, |
|
143 { |
|
144 "uri": "https://www.enisa.europa.eu/publications/corporate/enisa-strategy", |
|
145 "name": "ENISA Strategy", |
|
146 "author": "EU Cyber Security Agency", |
|
147 "description": null |
|
148 }, |
|
149 { |
|
150 "uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:l14555&from=EN", |
|
151 "name": "Promoting Data Protection by Privacy Enhancing Technologies", |
|
152 "author": "European Commission", |
|
153 "description": null |
|
154 }, |
|
155 { |
|
156 "uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016L0680&from=EN", |
|
157 "name": "Personal data and criminal justice authorities", |
|
158 "author": "European Parliament, Council of the European Union", |
|
159 "description": null |
|
160 }, |
|
161 { |
|
162 "uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:l24222&from=EN", |
|
163 "name": "European Data Protection Supervisor", |
|
164 "author": "European Parliament, Council of the European Union", |
|
165 "description": null |
|
166 }, |
|
167 { |
|
168 "uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:310401_1&from=EN", |
|
169 "name": "Right to Be Forgotten", |
|
170 "author": "Publications Office", |
|
171 "description": null |
|
172 }, |
|
173 { |
|
174 "uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:4298958&from=EN", |
|
175 "name": "EU citizens’ privacy in data transfers to the US", |
|
176 "author": "Publications Office", |
|
177 "description": null |
|
178 }, |
|
179 { |
|
180 "uri": "http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=LEGISSUM:310401_2&from=EN", |
|
181 "name": "Protection of Personal Data", |
|
182 "author": "Publications Office", |
|
183 "description": null |
|
184 }, |
|
185 { |
|
186 "uri": "https://ec.europa.eu/digital-single-market/en/policies/open-internet-net-neutrality", |
|
187 "name": "EU and Open Internet", |
|
188 "author": "European Commission", |
|
189 "description": null |
|
190 }, |
|
191 { |
|
192 "uri": "https://ec.europa.eu/digital-single-market/en/news/study-implementation-net-neutrality-provisions-telecoms-single-market-regulation-smart-20170011", |
|
193 "name": "Study on the implementation of the net neutrality provisions of the Telecoms Single MarketRegulation", |
|
194 "author": "European Commission", |
|
195 "description": null |
|
196 }, |
|
197 { |
|
198 "uri": "https://en.wikipedia.org/wiki/General_Data_Protection_Regulation", |
|
199 "name": "Wikipedia page on the General Data Protection Regulation (GDPR)", |
|
200 "author": "Wikipedia", |
|
201 "description": null |
|
202 }, |
|
203 { |
|
204 "uri": "http://www.osce.org/fom/78309?download=true", |
|
205 "name": "Joint Declaration on Freedom of Expression and the Internet", |
|
206 "author": "OSCE", |
|
207 "description": null |
|
208 }, |
|
209 { |
|
210 "uri": "https://www.dsimanifesto.eu/manifesto/", |
|
211 "name": "The Digital Social Innovation Manifesto", |
|
212 "author": "CHiC project", |
|
213 "description": null |
|
214 } |
|
215 ] |
|
216 }, |
|
217 { |
|
218 "category": "France Framework", |
|
219 "documents": [ |
|
220 { |
|
221 "uri": "https://www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000006070987&idArticle=LEGIARTI000006465770&dateTexte=&categorieLien=cid", |
|
222 "name": "Code des postes et des communications électroniques", |
|
223 "author": "Legifrance", |
|
224 "description": null |
|
225 }, |
|
226 { |
|
227 "uri": "http://www2.assemblee-nationale.fr/static/14/numerique/numerique_rapport.pdf", |
|
228 "name": "Rapport du Conseil du Numérique", |
|
229 "author": "Assemblé Nationale", |
|
230 "description": null |
|
231 }, |
|
232 { |
|
233 "uri": "https://digital-society-forum.orange.com/fr/les-forums/100-forum-vie_privee_et_donnees_personnelles", |
|
234 "name": "Private Life and Personal data, Blog from Orange Labs (in French)", |
|
235 "author": "Orange", |
|
236 "description": null |
|
237 } |
|
238 ] |
|
239 } |
|
240 ], |
|
241 "topics" : [ |
|
242 "Decentralization", |
|
243 "Encryption", |
|
244 "Net rights", |
|
245 "Activism", |
|
246 "Industrial lobby", |
|
247 "Surveillance", |
|
248 "Political threat", |
|
249 "Technology" |
|
250 ], |
|
251 "metacategories" : [ |
|
252 { |
|
253 "tag": "important", |
|
254 "description": "Utiliser cette métacatégorie lorsque vous estimez que le propos surligné est important dans le traitement du sujet.", |
|
255 "id": "important" |
|
256 }, |
|
257 { |
|
258 "tag": "mot-clef", |
|
259 "description": "Utiliser cette métacatégorie lorsque vous estimez que le terme surligné est un mot-clef relatif au sujet.", |
|
260 "id": "keyword" |
|
261 }, |
|
262 { |
|
263 "tag": "commentaire", |
|
264 "description": "Utiliser cette métacatégorie lorsque le propos surligné nécessite un commentaire ou une question.", |
|
265 "id": "comment" |
|
266 }, |
|
267 { |
|
268 "tag": "trouble", |
|
269 "description": "Utilisez cette métacatégorie lorsque le propos surligné est à retravailler mais est important à mobiliser dans la suite.", |
|
270 "id": "trouble" |
|
271 } |
|
272 ], |
|
273 "title": "Net Rights + Cryptography + Decentralization", |
|
274 "dashboardId": "" |
|
275 } |