{"id":8435,"date":"2022-12-15T15:58:21","date_gmt":"2022-12-15T20:58:21","guid":{"rendered":"https:\/\/ccla.org\/?p=8435"},"modified":"2022-12-14T16:24:43","modified_gmt":"2022-12-14T21:24:43","slug":"international-report-under-surveillance-misuse-of-technologies-in-emergency-responses","status":"publish","type":"post","link":"https:\/\/dev.ccla.org\/fr\/intimite\/rapport-international-sur-la-surveillance-de-lutilisation-abusive-des-technologies-dans-les-interventions-durgence\/","title":{"rendered":"Rapport international : Sous surveillance : (mauvaise) utilisation des technologies dans les interventions d&#039;urgence"},"content":{"rendered":"<div id=\"fws_69da40669bd99\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<h3><strong>Les partenaires internationaux de l&#039;ACLC publient un rapport sur la (mauvaise) utilisation mondiale des technologies pendant la pand\u00e9mie<\/strong><\/h3>\n<p>Le R\u00e9seau international des organisations de libert\u00e9s civiles, auquel appartient l&#039;ACLC, ainsi que le Centre europ\u00e9en pour le droit \u00e0 but non lucratif et Privacy International se sont associ\u00e9s pour suivre les impacts n\u00e9gatifs de la technologie de surveillance et des mesures d\u00e9ploy\u00e9es pendant la pand\u00e9mie de Covid-19 sur les mouvements militants. et organismes. Ils ont men\u00e9 une vaste enqu\u00eate sur les mesures de surveillance du Covid-19 adopt\u00e9es dans les 15 pays membres de l&#039;INCLO (dont le Canada), puis ont travaill\u00e9 en collaboration avec des groupes locaux et des chercheurs ont approfondi en Colombie, en France, en Indon\u00e9sie, au Kenya et en Afrique du Sud.<\/p>\n<p>Le rapport identifie cinq grandes tendances.<\/p>\n<p><strong>1) La r\u00e9affectation des mesures de s\u00e9curit\u00e9 existantes.<\/strong><\/p>\n<p>Les lois, les technologies et les agences qui \u00e9taient auparavant associ\u00e9es \u00e0 la lutte contre le terrorisme et \u00e0 la s\u00e9curit\u00e9 nationale ont pivot\u00e9 vers le nouvel objectif de lutte contre la propagation de Covid-19. Nous avons trouv\u00e9 des preuves que les lois sur la cybercriminalit\u00e9 ont \u00e9t\u00e9 \u00e9tendues pour censurer les voix critiques et pers\u00e9cuter les personnes accus\u00e9es de diffuser des informations erron\u00e9es sur la pand\u00e9mie au Bangladesh, en Indon\u00e9sie, au Kenya, au Niger et en Arabie saoudite.<\/p>\n<p><strong>2) Le silence de la soci\u00e9t\u00e9 civile<\/strong><\/p>\n<p>Des pays comme les Philippines, la Russie et l&#039;Afrique du Sud ont introduit une nouvelle l\u00e9gislation pour criminaliser la d\u00e9sinformation li\u00e9e \u00e0 la pand\u00e9mie. Combin\u00e9es \u00e0 des sanctions p\u00e9nales - jusqu&#039;\u00e0 six ans de prison en Argentine - et \u00e0 des crit\u00e8res peu clairs pour d\u00e9finir ce qui constitue de la d\u00e9sinformation, ces mesures contribuent \u00e0 un climat de peur et d&#039;intimidation. La technologie de surveillance a \u00e9galement \u00e9t\u00e9 utilis\u00e9e pour surveiller les espaces publics sous pr\u00e9texte de faire respecter les exigences de quarantaine et de distanciation sociale.<\/p>\n<p><strong>3) Le risque d&#039;abus de donn\u00e9es personnelles<\/strong><\/p>\n<p>Les gouvernements ont introduit divers outils technologiques con\u00e7us pour suivre la propagation du virus, dont beaucoup d\u00e9pendaient de la vaste collecte de donn\u00e9es personnelles, y compris des donn\u00e9es sensibles. Ces technologies ont \u00e9t\u00e9 rapidement con\u00e7ues et introduites avec peu de consultation publique<br \/>\nou de surveillance. Nous avons d\u00e9termin\u00e9 que de nombreuses applications de suivi des contacts ou d&#039;application de la quarantaine ont \u00e9t\u00e9 introduites sans justification ni fondement juridique, ce qui est disproportionn\u00e9 par rapport \u00e0 l&#039;objectif d\u00e9clar\u00e9, cr\u00e9ant une menace s\u00e9rieuse d&#039;abus de donn\u00e9es, y compris le risque de cibler des militants.<\/p>\n<p><strong>4) Le r\u00f4le influent des entreprises priv\u00e9es<\/strong><\/p>\n<p>Pendant la pand\u00e9mie, les entreprises ont coop\u00e9r\u00e9 avec les gouvernements pour d\u00e9velopper des applications et des outils de recherche de contacts et se sont engag\u00e9es dans des accords de partage de donn\u00e9es souvent obscurs. Dans des pays comme la Colombie et le Royaume-Uni, la port\u00e9e d&#039;accords de partenariat public-priv\u00e9 opaques n&#039;a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e qu&#039;apr\u00e8s que des militants aient exig\u00e9 la transparence par le biais de lois sur la libert\u00e9 d&#039;information. La pand\u00e9mie de Covid-19 a \u00e9galement r\u00e9v\u00e9l\u00e9 l&#039;influence croissante des g\u00e9ants de la technologie tels que Google et<br \/>\nApple qui a pu dicter les protocoles pour les applications de recherche de contacts et, par cons\u00e9quent, fa\u00e7onner les r\u00e9ponses de sant\u00e9 publique, soulevant des questions importantes sur le contr\u00f4le d\u00e9mocratique et la responsabilit\u00e9 sur la capacit\u00e9 des entreprises priv\u00e9es \u00e0 \u00e9tablir des normes mondiales en p\u00e9riode de crise.<\/p>\n<p><strong>5) La normalisation de la surveillance au-del\u00e0 de la pand\u00e9mie<\/strong><\/p>\n<p>Nous avons de bonnes raisons de craindre la possibilit\u00e9 d&#039;un glissement de mission, car nous avons d\u00e9j\u00e0 vu certains gouvernements annoncer leur intention d&#039;utiliser les donn\u00e9es collect\u00e9es pendant la pand\u00e9mie \u00e0 des fins secondaires, telles que le d\u00e9veloppement de plateformes nationales de sant\u00e9 en Colombie, en Inde et en Afrique du Sud. L&#039;utilisation de donn\u00e9es initialement collect\u00e9es dans des circonstances exceptionnelles \u00e0 des fins non urgentes viole le principe de limitation des finalit\u00e9s et contribue \u00e0 la normalisation d&#039;un<br \/>\n\u00c9tat de surveillance qui accumule de grandes quantit\u00e9s de donn\u00e9es sur les personnes d&#039;une mani\u00e8re disproportionn\u00e9e par rapport \u00e0 sa n\u00e9cessit\u00e9 et \u00e0 son caract\u00e8re intrusif.<\/p>\n<p>Sur la base de ces conclusions, le rapport formule des recommandations aux acteurs \u00e9tatiques, aux entreprises et \u00e0 la soci\u00e9t\u00e9 civile, appelant \u00e0 un meilleur respect des droits de l&#039;homme, \u00e0 une meilleure transparence sur les nouvelles mesures de surveillance et \u00e0 des garanties juridiques pour toute collecte et utilisation extraordinaires de donn\u00e9es lors d&#039;urgences publiques \u00e0 l&#039;avenir. .<\/p>\n<p><a href=\"https:\/\/files.inclo.net\/content\/pdf\/79\/INCLO-Under%20Surveillance-Executive-Summary.pdf\"><strong>Lire le r\u00e9sum\u00e9 ex\u00e9cutif<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/files.inclo.net\/content\/pdf\/79\/INCLO-Under%20Surveillance-Report.pdf\">Lire le rapport<\/a><\/strong><\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t<div id=\"fws_69da40669c913\"  data-column-margin=\"default\" data-midnight=\"dark\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: 0px; padding-bottom: 0px; \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t\n\t\t<div id=\"fws_69da40669d3af\"  data-column-margin=\"default\" data-midnight=\"dark\" data-top-percent=\"1%\" data-bottom-percent=\"1%\"  class=\"wpb_row vc_row-fluid vc_row\"  style=\"padding-top: calc(100vw * 0.01); padding-bottom: calc(100vw * 0.01); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop\"  style=\"\"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div  class=\"vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<h3 style=\"color: #ef770e;text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >\u00c0 propos de l\u2019association canadienne sur les libert\u00e9s civiles<\/h3>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p class=\"translation-block\">L\u2019ACLC est un organisme ind\u00e9pendant \u00e0 but non lucratif qui compte des sympathisant.e.s dans tout le pays. Fond\u00e9 en 1964, c\u2019est un organisme qui \u0153uvre \u00e0 l\u2019\u00e9chelle du Canada \u00e0 la protection des droits et des libert\u00e9s civiles de toute sa population.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n<h3 style=\"color: #ef770e;text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >Pour les m\u00e9dias<\/h3>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Pour d&#039;autres commentaires, veuillez nous contacter \u00e0\u00a0<a href=\"mailto:media@ccla.org\"><u>media@ccla.org<\/u><\/a>.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n<h3 style=\"color: #ef770e;text-align: left\" class=\"vc_custom_heading vc_do_custom_heading\" >Pour les mises \u00e0 jour en direct<\/h3>\n<div class=\"wpb_text_column wpb_content_element\" >\n\t<div class=\"wpb_wrapper\">\n\t\t<p>Veuillez continuer \u00e0 vous r\u00e9f\u00e9rer \u00e0\u00a0<a href=\"https:\/\/dev.ccla.org\/fr\/the-latest\/\" rel=\"noopener\">cette page<\/a>\u00a0et \u00e0 nos plateformes de m\u00e9dias sociaux. On est dessus\u00a0<a href=\"https:\/\/www.instagram.com\/cancivlib\/?hl=en\" target=\"_blank\" rel=\"noopener\"><u>Instagram<\/u><\/a>,\u00a0<a href=\"http:\/\/facebook.com\/cancivlib\/\" target=\"_blank\" rel=\"noopener\"><u>Facebook<\/u><\/a>, et\u00a0<a href=\"https:\/\/twitter.com\/cancivlib\" target=\"_blank\" rel=\"noopener\"><u>Twitter<\/u><\/a>.<\/p>\n\t<\/div>\n<\/div>\n\n\n\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"Les partenaires internationaux de CCLA publient un rapport sur l&#039;utilisation (mauvaise) des technologies dans le monde pendant la pand\u00e9mie Le R\u00e9seau international des organisations de libert\u00e9s civiles, auquel appartient CCLA, avec le Centre europ\u00e9en...","protected":false},"author":11,"featured_media":4652,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[141,11],"tags":[],"class_list":{"0":"post-8435","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-face-surveillance","8":"category-privacy"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses - CCLA<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses - CCLA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.ccla.org\/fr\/intimite\/rapport-international-sur-la-surveillance-de-lutilisation-abusive-des-technologies-dans-les-interventions-durgence\/\" \/>\n<meta property=\"og:site_name\" content=\"CCLA\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T20:58:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brenda McPhail\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Brenda\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brenda McPhail\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/\",\"url\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/\",\"name\":\"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses - CCLA\",\"isPartOf\":{\"@id\":\"https:\/\/dev.ccla.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg\",\"datePublished\":\"2022-12-15T20:58:21+00:00\",\"author\":{\"@id\":\"https:\/\/dev.ccla.org\/#\/schema\/person\/e463f8a5dd4894dd8a24a723f0b5b807\"},\"breadcrumb\":{\"@id\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#primaryimage\",\"url\":\"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg\",\"contentUrl\":\"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg\",\"width\":2000,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.ccla.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PRIVACY\",\"item\":\"https:\/\/dev.ccla.org\/category\/privacy\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.ccla.org\/#website\",\"url\":\"https:\/\/dev.ccla.org\/\",\"name\":\"CCLA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.ccla.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.ccla.org\/#\/schema\/person\/e463f8a5dd4894dd8a24a723f0b5b807\",\"name\":\"Brenda McPhail\",\"sameAs\":[\"https:\/\/x.com\/Brenda\"],\"url\":\"https:\/\/dev.ccla.org\/fr\/author\/brenda\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses - CCLA","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses - CCLA","og_url":"https:\/\/dev.ccla.org\/fr\/intimite\/rapport-international-sur-la-surveillance-de-lutilisation-abusive-des-technologies-dans-les-interventions-durgence\/","og_site_name":"CCLA","article_published_time":"2022-12-15T20:58:21+00:00","og_image":[{"width":2000,"height":800,"url":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg","type":"image\/jpeg"}],"author":"Brenda McPhail","twitter_card":"summary_large_image","twitter_creator":"@Brenda","twitter_misc":{"\u00c9crit par":"Brenda McPhail","Estimation du temps de lecture":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/","url":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/","name":"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses - CCLA","isPartOf":{"@id":"https:\/\/dev.ccla.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#primaryimage"},"image":{"@id":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg","datePublished":"2022-12-15T20:58:21+00:00","author":{"@id":"https:\/\/dev.ccla.org\/#\/schema\/person\/e463f8a5dd4894dd8a24a723f0b5b807"},"breadcrumb":{"@id":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#primaryimage","url":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg","contentUrl":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/07\/SS_security-on-mobile-phone-K3PCKG3.jpg","width":2000,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/dev.ccla.org\/privacy\/international-report-under-surveillance-misuse-of-technologies-in-emergency-responses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.ccla.org\/"},{"@type":"ListItem","position":2,"name":"PRIVACY","item":"https:\/\/dev.ccla.org\/category\/privacy\/"},{"@type":"ListItem","position":3,"name":"International Report: Under Surveillance: (Mis)use of Technologies in Emergency Responses"}]},{"@type":"WebSite","@id":"https:\/\/dev.ccla.org\/#website","url":"https:\/\/dev.ccla.org\/","name":"CCLA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.ccla.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/dev.ccla.org\/#\/schema\/person\/e463f8a5dd4894dd8a24a723f0b5b807","name":"Brenda McPhail","sameAs":["https:\/\/x.com\/Brenda"],"url":"https:\/\/dev.ccla.org\/fr\/author\/brenda\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts\/8435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/comments?post=8435"}],"version-history":[{"count":4,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts\/8435\/revisions"}],"predecessor-version":[{"id":8440,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts\/8435\/revisions\/8440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/media\/4652"}],"wp:attachment":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/media?parent=8435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/categories?post=8435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/tags?post=8435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}