{"id":1554,"date":"2026-02-19T18:24:16","date_gmt":"2026-02-19T17:24:16","guid":{"rendered":"https:\/\/cyberforgood.org\/fr\/?post_type=module&#038;p=1554"},"modified":"2026-03-26T14:02:01","modified_gmt":"2026-03-26T13:02:01","slug":"introduction-que-signifie-la-souverainete-numerique","status":"publish","type":"module","link":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/","title":{"rendered":"Que signifie la souverainet\u00e9 num\u00e9rique ?"},"content":{"rendered":"<section id=\"block-text-box-block_5070445e57c6a3f06b8409866b643f4e\" class=\"block-text-box\"><div class=\"content-wrapper\"><h2>Objectifs du module <\/h2><div class=text-wrapper><p><span style=\"font-weight: 400;\">Ce module vous invite \u00e0 explorer trois dimensions de la souverainet\u00e9 num\u00e9rique :<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Comprendre les enjeux<\/b><span style=\"font-weight: 400;\"> \u00e0 travers une analyse critique des solutions populaires (Google Drive, WhatsApp, Slack, Canva)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identifier les risques<\/b><span style=\"font-weight: 400;\"> : s\u00e9curit\u00e9, confidentialit\u00e9, d\u00e9pendance technologique<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>D\u00e9couvrir des alternatives<\/b><span style=\"font-weight: 400;\"> : outils libres et souverains pour reprendre le contr\u00f4le<\/span><\/li>\n<\/ol>\n<\/div><\/div><\/section>\n\n\n<p>Pour aborder un sujet aussi vaste que la souverainet\u00e9 num\u00e9rique, il faut d\u2019abord partir d\u2019un constat : nous vivons pleinement dans l\u2019\u00e8re du cloud computing. Pour les plus jeunes d\u2019entre nous, cette mani\u00e8re de concevoir nos outils informatiques est devenue la norme\u202f; pour les plus anciens, la transition s\u2019est op\u00e9r\u00e9e plus ou moins naturellement, au gr\u00e9 de l\u2019\u00e9volution de nos usages.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u2601\ufe0fD\u00e9finir le Cloud et ses implications<\/h4>\n\n\n\n<p>Si le terme peut para\u00eetre technique et l\u2019anglicisme cloud (nuage) un peu abstrait, la CNIL nous aide \u00e0 y voir plus clair. Le cloud computing se d\u00e9finit comme le fait que nos \u00ab\u202fapplications et nos donn\u00e9es ne se trouvent plus sur un ordinateur d\u00e9termin\u00e9, mais dans un nuage (cloud) compos\u00e9 de nombreux serveurs distants interconnect\u00e9s\u202f\u00bb.<\/p>\n\n\n\n<p>Autrement dit, il est de plus en plus rare que nous installions nos outils ou sauvegardions nos fichiers sur nos ordinateurs\u202f; nous les stockons d\u00e9sormais directement dans ce fameux nuage, qui, en r\u00e9alit\u00e9, ne nous appartient pas.<\/p>\n\n\n\n<p>Le cloud computing est aujourd\u2019hui omnipr\u00e9sent dans notre quotidien : de nos logiciels de travail \u00e0 nos plateformes de streaming, o\u00f9 nous acc\u00e9dons \u00e0 nos films et s\u00e9ries pr\u00e9f\u00e9r\u00e9es. Ainsi, si vous ne vous souvenez plus de la derni\u00e8re fois que vous avez \u00ab\u202fachet\u00e9\u202f\u00bb \u2014 et donc v\u00e9ritablement poss\u00e9d\u00e9 \u2014 une copie d\u2019une \u0153uvre cin\u00e9matographique, c\u2019est une cons\u00e9quence directe du cloud computing.<\/p>\n\n\n\n<p>Une question fondamentale s\u2019impose alors : qui contr\u00f4le r\u00e9ellement vos outils et vos donn\u00e9es\u202f? Nous utilisons chaque jour des services qui semblent pratiques, intuitifs, voire gratuits. Mais \u00e0 quel prix payons-nous r\u00e9ellement cette commodit\u00e9\u202f?<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u2602\ufe0fL&#8217;enjeu de la souverainet\u00e9 num\u00e9rique<\/h4>\n\n\n\n<p>Selon l\u2019\u00e9diteur de logiciels fran\u00e7ais Oodrive, la souverainet\u00e9 num\u00e9rique est la capacit\u00e9 d\u2019une personne, d\u2019une organisation ou d\u2019une nation \u00e0 garder la ma\u00eetrise de ses donn\u00e9es, de ses infrastructures et de ses outils informatiques. Elle suppose une autonomie dans les choix technologiques, sans d\u00e9pendre exclusivement de solutions \u00e9trang\u00e8res ou propri\u00e9taires \u00e9chappant \u00e0 notre contr\u00f4le.<\/p>\n\n\n\n<p>Pourquoi cela importe-t-il\u202f? Cette question est loin d\u2019\u00eatre abstraite. Chaque jour, nous g\u00e9n\u00e9rons des donn\u00e9es pr\u00e9cieuses\u202f: messages priv\u00e9s, photos de famille, documents professionnels, historiques de navigation. Ces donn\u00e9es sont collect\u00e9es, analys\u00e9es, parfois revendues \u00e0 des tiers ou exploit\u00e9es \u00e0 des fins que nous ignorons.<\/p>\n\n\n\n<p>Au-del\u00e0 du contr\u00f4le de nos donn\u00e9es, la souverainet\u00e9 num\u00e9rique touche aussi \u00e0 notre capacit\u00e9 \u00e0 maintenir nos activit\u00e9s \u00e9conomiques et associatives en cas de panne ou de crise g\u00e9opolitique majeure.<\/p>\n\n\n\n<p>C&#8217;est pour toutes ces raisons qu\u2019il est aujourd\u2019hui indispensable de comprendre nos outils, d&#8217;\u00e9valuer notre d\u00e9pendance et d\u2019explorer des alternatives pour pr\u00e9server notre autonomie digitale.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour aborder un sujet aussi vaste que la souverainet\u00e9 num\u00e9rique, il faut d\u2019abord partir d\u2019un constat : nous vivons pleinement dans l\u2019\u00e8re du cloud computing. Pour les plus jeunes d\u2019entre&#8230;<\/p>\n","protected":false},"featured_media":1219,"menu_order":0,"template":"","index":[18,22],"field":[5],"class_list":["post-1554","module","type-module","status-publish","has-post-thumbnail","hentry","index-ess","index-module-3-ess","field-ess"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Que signifie la souverainet\u00e9 num\u00e9rique ? - Cyber for Good<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Que signifie la souverainet\u00e9 num\u00e9rique ? - Cyber for Good\" \/>\n<meta property=\"og:description\" content=\"Pour aborder un sujet aussi vaste que la souverainet\u00e9 num\u00e9rique, il faut d\u2019abord partir d\u2019un constat : nous vivons pleinement dans l\u2019\u00e8re du cloud computing. Pour les plus jeunes d\u2019entre...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber for Good\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T13:02:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2008\" \/>\n\t<meta property=\"og:image:height\" content=\"2009\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/\",\"url\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/\",\"name\":\"Que signifie la souverainet\u00e9 num\u00e9rique ? - Cyber for Good\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforgood.org\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png\",\"datePublished\":\"2026-02-19T17:24:16+00:00\",\"dateModified\":\"2026-03-26T13:02:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#primaryimage\",\"url\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png\",\"contentUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png\",\"width\":2008,\"height\":2009},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/cyberforgood.org\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modules\",\"item\":\"https:\/\/cyberforgood.org\/es\/module\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Que signifie la souverainet\u00e9 num\u00e9rique ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforgood.org\/es\/#website\",\"url\":\"https:\/\/cyberforgood.org\/es\/\",\"name\":\"Cyber for Good\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyberforgood.org\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforgood.org\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforgood.org\/es\/#organization\",\"name\":\"Cyber for Good\",\"url\":\"https:\/\/cyberforgood.org\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/cyberforgood.org\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg\",\"contentUrl\":\"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg\",\"caption\":\"Cyber for Good\"},\"image\":{\"@id\":\"https:\/\/cyberforgood.org\/es\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Que signifie la souverainet\u00e9 num\u00e9rique ? - Cyber for Good","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/","og_locale":"es_ES","og_type":"article","og_title":"Que signifie la souverainet\u00e9 num\u00e9rique ? - Cyber for Good","og_description":"Pour aborder un sujet aussi vaste que la souverainet\u00e9 num\u00e9rique, il faut d\u2019abord partir d\u2019un constat : nous vivons pleinement dans l\u2019\u00e8re du cloud computing. Pour les plus jeunes d\u2019entre...","og_url":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/","og_site_name":"Cyber for Good","article_modified_time":"2026-03-26T13:02:01+00:00","og_image":[{"width":2008,"height":2009,"url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/","url":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/","name":"Que signifie la souverainet\u00e9 num\u00e9rique ? - Cyber for Good","isPartOf":{"@id":"https:\/\/cyberforgood.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#primaryimage"},"image":{"@id":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png","datePublished":"2026-02-19T17:24:16+00:00","dateModified":"2026-03-26T13:02:01+00:00","breadcrumb":{"@id":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#primaryimage","url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png","contentUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/11\/C4G_ICONS_07A_YELLOW-2000x2001.png","width":2008,"height":2009},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforgood.org\/es\/module\/introduction-que-signifie-la-souverainete-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cyberforgood.org\/es\/"},{"@type":"ListItem","position":2,"name":"Modules","item":"https:\/\/cyberforgood.org\/es\/module\/"},{"@type":"ListItem","position":3,"name":"Que signifie la souverainet\u00e9 num\u00e9rique ?"}]},{"@type":"WebSite","@id":"https:\/\/cyberforgood.org\/es\/#website","url":"https:\/\/cyberforgood.org\/es\/","name":"Cyber for Good","description":"","publisher":{"@id":"https:\/\/cyberforgood.org\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforgood.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/cyberforgood.org\/es\/#organization","name":"Cyber for Good","url":"https:\/\/cyberforgood.org\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cyberforgood.org\/es\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","contentUrl":"https:\/\/cyberforgood.org\/wp-content\/uploads\/2025\/09\/Logo-CFG.svg","caption":"Cyber for Good"},"image":{"@id":"https:\/\/cyberforgood.org\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/module\/1554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/module"}],"about":[{"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/types\/module"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/media\/1219"}],"wp:attachment":[{"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/media?parent=1554"}],"wp:term":[{"taxonomy":"index","embeddable":true,"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/index?post=1554"},{"taxonomy":"field","embeddable":true,"href":"https:\/\/cyberforgood.org\/es\/wp-json\/wp\/v2\/field?post=1554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}