{"id":19923,"date":"2020-06-03T18:59:45","date_gmt":"2020-06-03T16:59:45","guid":{"rendered":"https:\/\/xnet-x.net\/?p=19923"},"modified":"2026-01-20T16:06:24","modified_gmt":"2026-01-20T14:06:24","slug":"propuesta-para-la-excelencia-en-la-privacidad-de-datos-y-la-digitalizacion-democratica-de-los-centros-educativos","status":"publish","type":"post","link":"https:\/\/xnet-x.net\/ca\/privacitat-dades-digitalitzacio-democratica-educacio-sense-google\/","title":{"rendered":"Pla per a la Privacitat de Dades i la Digitalitzaci\u00f3 Democr\u00e0tica de l&#8217;Educaci\u00f3"},"content":{"rendered":"<p><\/p>\n<div style=\"font-size:90%;margin:6px 0;border: 1px solid #000000;padding: 20px 5% 20px\">\n<em>Presentem aquesta proposta per primera vegada de forma activista i no remunerada al Departament d\u2019Educaci\u00f3 de la Generalitat de Catalunya al juny del 2019 (per escrit l\u20191 de setembre de 2019).<br \/>\n<a href=\"https:\/\/xnet.maadix.org\/nextcloud\/index.php\/s\/ogJ2cf97gmEenAT\" rel=\"noopener\" target=\"_blank\">Pilot<\/a> en fase beta a l&#8217;Ajuntament de Barcelona des de la primavera de 2021.<\/em><\/p>\n<p><a href=\"https:\/\/xnet-x.net\/ca\/presentem-dd-eina-digitalitzacio-democratica-educacio\/\" rel=\"noopener\" target=\"_blank\">DD: l&#8217;eina integral en codi auditable per a educaci\u00f3<\/a> que hem generat amb el pilot del nostre Pla de Digitalitzaci\u00f3 Democr\u00e0tica de l&#8217;Educaci\u00f3 <\/div>\n<p>&nbsp;<\/p>\n<p><a id=\"pro\"><\/a><\/p>\n<h3>PROPOSTA DE SOLUCI\u00d3 D&#8217;XNET I FAM\u00cdLIES PROMOTORES PER L&#8217;EXCEL\u00b7L\u00c8NCIA EN LA PRIVACITAT DE DADES I LA DIGITALITZACI\u00d3 DEMOCR\u00c0TICA DELS CENTRES EDUCATIUS<\/h3>\n<div class=\"youtube-container auto-resizable-iframe\" style=\"max-width: 600px; margin: 0px auto;\">\n<div class=\"youtube-player\" data-id=\"afYVNHDLTMc\" style=\" position: relative;  padding-bottom: 60%;  height: 0px;\"><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>En la situaci\u00f3 d&#8217;acceleraci\u00f3 de la digitalitzaci\u00f3 de tots els \u00e0mbits de la vida, cal evitar que les institucions, per curt termini o per deixadesa de funcions, permeten que els grans actors multinacionals ocupin tots aquells espais pels que elles no han planificat. <\/p>\n<p>Un dels casos m\u00e9s flagrants \u00e9s el de l&#8217;educaci\u00f3 en la qual la penetraci\u00f3 de solucions monopol\u00edstiques corporatives privades &#8211; Google o Microsoft, particularment &#8211; \u00e9s massiva.<\/p>\n<p>Per incre\u00efble que pugui semblar, la conjuntura econ\u00f2mica, com a ra\u00f3 o excusa, fa que no hi ha una an\u00e0lisi institucional sobre qu\u00e8 significa la &#8220;gratu\u00eftat&#8221; d&#8217;aquests serveis, la seva relaci\u00f3 amb l&#8217;\u00fas de les dades personals de tota la comunitat educativa, menors en particular, les repercussions sobre la vida present i futura de tots ells, etc. [5.1] <\/p>\n<p>Per qu\u00e8 s&#8217;abandona un model en molts aspectes tamb\u00e9 gratu\u00eft, que podia modificar-se segons les exig\u00e8ncies, m\u00e9s distribu\u00eft, transparent i auditable pel que fa a la privacitat i la protecci\u00f3 de les dades de les i els alumnes, per un altre centralitzat, tancat, amb codi no auditable i en mans d&#8217;empreses que basen una gran part de la seva activitat general en l&#8217;extracci\u00f3 de dades i el seu processament?<br \/>\nEls leg\u00edtims interessos i beneficis de les corporacions prove\u00efdores d&#8217;aquests serveis estan clars; per contra, els beneficis per a les nostres societats semblen dubtosos. <\/p>\n<p>I ho s\u00f3n no nom\u00e9s pel que fa a la sobirania de les dades sin\u00f3 tamb\u00e9 pel que fa al &#8220;monocultiu&#8221; monopol\u00edstic digital que crea clients captius des d&#8217;edats molt primerenques. Un espai que neix divers, neutral, obert, distribu\u00eft i amb m\u00faltiples possibilitats per a la innovaci\u00f3, com \u00e9s internet i el digital, acaba sent assimilable pels usuaris a un \u00fanic producte privat. Per entendre&#8217;ns, seria com si tota l&#8217;alimentaci\u00f3 fora prove\u00efda \u00fanicament per una o poques cadenes de menjar r\u00e0pid.<\/p>\n<p>El problema d&#8217;aquestes pol\u00edtiques, o millor dit en molts casos, manca de pol\u00edtiques, \u00e9s la p\u00e8rdua de la sobirania digital o sigui d&#8217;una digitalitzaci\u00f3 que sigui democr\u00e0tica des del punt de vista de la privacitat i sobirania de les dades i les informacions, per\u00f2 tamb\u00e9 des del punt de vista de l&#8217;aplicaci\u00f3 de la llei, de la transpar\u00e8ncia i de la llibertat d&#8217;expressi\u00f3 i acc\u00e9s a la informaci\u00f3, la tutela judicial efectiva, la llibertat de c\u00e0tedra, entre molts valors fonamentals.  <\/p>\n<p>Per\u00f2 les eines necess\u00e0ries per crear alternatives ja existeixen des dels or\u00edgens del digital.<br \/>\nD&#8217;aix\u00f2 parteix <strong>el Pla que presentem aqu\u00ed<\/strong>, creat per una alian\u00e7a esperonada el 2019 per diverses fam\u00edlies per donar una altra sortida a la digitalitzaci\u00f3 dels centres educatius de les seves filles i fills, i Xnet, per la seva compet\u00e8ncia en drets digitals. <\/p>\n<p>El Pla neix amb vocaci\u00f3 de ser replicable no nom\u00e9s en l&#8217;\u00e0mbit educatiu sin\u00f3 en la mateixa Administraci\u00f3. Vol generalitzar una digitalitzaci\u00f3 segura i respectuosa amb la sobirania digital de les persones que garanteixi la privacitat i el control de les dades, per tal de salvaguardar de manera integral els drets digitals de la comunitat educativa i de l&#8217;Administraci\u00f3. Es tracta d&#8217;oferir una alternativa auditable i \u00e0gil a les eines m\u00e9s comunament emprades, com les de Google o Microsoft. <\/p>\n<p>El projecte es basa, d&#8217;una banda, en l&#8217;adopci\u00f3 de servidors propis o aliens, assegurances, sobirans i respectuosos dels drets humans i en la millora de la usabilitat, integraci\u00f3 i actualitzaci\u00f3 d&#8217;eines de codi lliure existents, robustes, \u00e0mpliament utilitzades i amb provada solv\u00e8ncia a nivell internacional com Nextcloud, Moodle, WordPress, BigBlue Button, Jitsi, Etherpad, de l&#8217;altra. L&#8217;objectiu \u00e9s adequar-les a les necessitats dels centres, ampliar el nivell d&#8217;usabilitat perqu\u00e8 siguin plenament competitives i acompanyar l&#8217;acc\u00e9s amb tots els recursos t\u00e8cnics i formatius necessaris que permetin un aprofitament m\u00e0xim d&#8217;aquestes tecnologies per a l&#8217;ensenyament presencial o en remot, utilitzant una plataforma integral de gran qualitat t\u00e8cnica i f\u00e0cilment replicable. <\/p>\n<p>Concretament el Pla implica: <\/p>\n<p>\u2022 Una Suite automatitzada i replicable amb eines de programari lliure i auditable en els centres educatius, robustes, usables i altament competitius per a les principals necessitats de l&#8217;educaci\u00f3 digital i f\u00e0cilment replicable.<\/p>\n<p>\u2022 Un \u00fas d&#8217;infraestructures que siguin segures, auditables i que defensin la sobirania de les dades personals i altres drets fonamentals en \u00e0mbit digital com la inviolabilitat de les comunicacions en l\u00ednia, la minimitzaci\u00f3 de les dades, la tutela judicial efectiva i la privacitat des del disseny i per defecte amb especial \u00e8mfasi en els nens i adolescents.<\/p>\n<p>\u2022 Accions formatives i d&#8217;acompanyament en l&#8217;\u00fas d&#8217;aquestes tecnologies per al professorat i a tota la comunitat educativa dels centres. A llarg termini: actualitzaci\u00f3 del model educatiu cap a un model en xarxa i \u00e0gil.<\/p>\n<p>\u2022 El foment dels usos democr\u00e0tics de la tecnologia i l&#8217;agilitat en l&#8217;\u00fas de diverses plataformes evitant la creaci\u00f3 de clients captius d&#8217;un \u00fanic producte. Tenir coneixement i entendre els conceptes de Drets Digitals i comuns digitals.<\/p>\n<p>\u2022 Possibilitats per a l&#8217;emprenedoria distribu\u00efda, de proximitat i en base a criteris \u00e8tics.<\/p>\n<p>\u2022 Reducci\u00f3 de despesa a llarg termini i que els centres educatius puguin escollir la tecnologia que utilitzen en base a propostes i decisions raonades.<\/p>\n<p>Amb la intenci\u00f3 de pal\u00b7liar el d\u00e8ficit existent sobre privacitat i sobirania de dades en els centres educatius proposem un Pla hol\u00edstic que ens facilitar\u00e0 accedir a una digitalitzaci\u00f3 democr\u00e0tica \u00e0gil, efectiva i respectuosa de les llibertats fonamentals.<br \/>\n&nbsp;<\/p>\n<p>Objectius espec\u00edfics a assolir per resoldre el problema global:<br \/>\n<a href=\"#1ca\"><\/p>\n<div style=\"font-size:95%;margin:4px 0;border: 1px ;padding: 10px 4% 10px\">\n> 1. SERVIDORS SEGURS I RESPECTUOSOS AMB ELS DRETS HUMANS I ACCIONS RELACIONADES<\/a><br \/>\n<a href=\"#2ca\"><br \/>\n> 2. SUITE FOR EDUCATION: EINES ESTRUCTURALMENT AUDITABLES QUE JA EXISTEIXEN AGREGADES EN UNA \u00daNICA SUITE<\/a><br \/>\n<a href=\"#3ca\"><br \/>\n> 3. FORMACI\u00d3 I CAPACITACI\u00d3 DIGITAL DE LA COMUNITAT EDUCATIVA: TASK FORCE PER A TRASP\u00c0S DE LES COMPET\u00c8NCIES I ADEQUACI\u00d3 DELS PROGRAMES DE FORMACI\u00d3 DIGITAL <\/a><br \/>\n<a href=\"#4ca\"><br \/>\n> 4. Q\u00dcESTIONS TRANSVERSALS PER AJUDAR L&#8217;ECOSISTEMA EMPRESARIAL, EL CORREU I  ALTRES Q\u00dcESTIONS RELACIONADES AMB LA DIGITALITZACI\u00d3 GENERAL<\/a><br \/>\n<a href=\"#5ca\"><br \/>\n> 5. [ACTUALITZACI\u00d3 A 29\/07\/2020]. DISSENY D&#8217;IMPLEMENTACI\u00d3 I PRESSUPOST DEL NOSTRE PLA DE DIGITALITZACI\u00d3 DEMOCR\u00c0TICA DELS CENTRES EDUCATIUS<\/a><br \/>\n<a href=\"#5u\"><br \/>\n> [5.1.] BREU ACLARIMENT I ACTUALITZACI\u00d3 SOBRE ELS AVAN\u00c7OS<\/a><br \/>\n<a href=\"#rep\"><br \/>\n> 6. Repositori d&#8217;informaci\u00f3 per argumentaris<\/a><br \/>\n<a href=\"#info\"><br \/>\n>  *Informacions d&#8217;utilitat i notes<\/a><\/div>\n<p><a id=\"1ca\"><\/a><br \/>\n&nbsp;<\/p>\n<p><span style=\"color: #f4efef \">SERVIDORS SEGURS<\/span><\/p>\n<p><strong>1. SERVIDORS SEGURS<\/strong> <\/p>\n<p>Es necessita que la seguretat d&#8217;emmagatzematge en el <strong>n\u00favol sigui t\u00e8cnica i concorde amb el Reglament General de Protecci\u00f3 de Dades, per\u00f2 tamb\u00e9 \u00e8tica i respectuosa amb els drets humans.<\/strong>.<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/xnet-x.net\/img\/no-cloud-fsfe.jpg\" alt=\"\" width=\"200\" height=\"200\" class=\"alignright size-full wp-image-19959\" srcset=\"https:\/\/xnet-x.net\/img\/no-cloud-fsfe.jpg 681w, https:\/\/xnet-x.net\/img\/no-cloud-fsfe-300x300.jpg 300w, https:\/\/xnet-x.net\/img\/no-cloud-fsfe-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/> El servidor \u00e9s la nostra casa, ha de ser un lloc segur independentment que utilitzem solucions comercials o no. Implica prove\u00efdors que disposin de protocols de funcionament, que respectin de la mateixa manera a les persones \/ clients (en aquest cas els centres educatius i la comunitat educativa) que als Estats [1].  <\/p>\n<p>Tamb\u00e9 hi ha l&#8217;opci\u00f3 d&#8217;utilitzar servidors propis encara que en alguns casos resulta poc viable.<br \/>\nEs necessita oferir als centres educatius, respectant la seva autonomia, opcions segures i diversificades perqu\u00e8 puguin triar amb tota la informaci\u00f3 necess\u00e0ria. Publicar de forma clara la informaci\u00f3 sobre la participaci\u00f3 de cada servidor permet que l&#8217;elecci\u00f3 sigui f\u00e0cil i transparent. <\/p>\n<p>> A m\u00e9s llarg terme, cal modificar els plecs de contractaci\u00f3 dels servidors de la Generalitat de Catalunya -possiblement no nom\u00e9s de el Departament d&#8217;Educaci\u00f3- perqu\u00e8 s&#8217;incloguin els est\u00e0ndards m\u00e9s elevats de privacitat, drets, \u00e8tica, respecte per les persones usu\u00e0ries , transpar\u00e8ncia i seguretat.<a id=\"2ca\"><\/a> Aix\u00f2 a m\u00e9s ajudar\u00e0 a incentivar la millorar dels aspectes \u00e8tics de l&#8217;oferta de les grans corporacions. <\/p>\n<p>&nbsp;<\/p>\n<p><strong>2. SUITE FOR EDUCATION: EINES ESTRUCTURALMENT AUDITABLES QUE JA EXISTEIXEN AGREGADES EN UNA \u00daNICA SUITE (TIPUS SUITE FOR EDUCATION I TIPUS CLASS ROOM) <\/strong><\/p>\n<p>Afegir a una Suite for Education les eines amb codi auditables (Google i Microsoft &#8211; com a exemple &#8211; no ho s\u00f3n) que ja existeixen i ofereixen totes les prestacions que proporcionen les suites de les grans corporacions com Google o Microsoft amb un enfocament m\u00e9s centrat en la privacitat de les i els usuaris, la seva capacitaci\u00f3 real i el control de les dades per part de la comunitat educativa.<br \/>\n<strong>El resultat \u00e9s oferir als centres altres opcions respecte a Google perqu\u00e8 puguin triar de veritat.<\/strong><\/p>\n<p>Integraci\u00f3n de:<\/p>\n<p>2.1. TIPUS SUITE FOR EDUCATION<\/p>\n<p>Adaptar la soluci\u00f3 Nextcloud (alemanya) i altres ja identificades perqu\u00e8 incorporin funcions i equiparar-la a altres solucions com Suite for Education. La possibilitat d&#8217;afegir apps facilita aquesta adaptaci\u00f3.<br \/>\n&nbsp;<\/p>\n<p>2.2. TIPUS CLASS ROOM<\/p>\n<p><strong>Actualitzar i adaptar la plataforma Moodle (australiana que t\u00e9 seu a Catalunya) i que ja est\u00e0 implementada<\/strong>, per\u00f2 en un format obsolet, no idoni, poc \u00e0gil i insuficient.<\/p>\n<p>Moodle \u00e9s una plataforma infinitament m\u00e9s completa que les solucions comercials en \u00fas sent utilitzades des de fa un decenni en escoles i universitats de tot el m\u00f3n comptant amb una \u00e0mplia comunitat que la proveeix de tot tipus de funcionalitats. El problema \u00e9s organitzar i adaptar aquestes funcionalitats a les necessitats actuals dels centres educatius, fer-les \u00e0gils, f\u00e0cilment usables i de f\u00e0cil manteniment, per substituir e i superar a eines tipus Google Classroom. <\/p>\n<p>[Afegit m\u00e9s recentment per aportacions ciutadanes a les nostres propostes]<br \/>\n\u00abA m\u00e9s s&#8217;ha de garantir la portabilitat de les dades. \u00c9s a dir, que si una escola decideix canviar d&#8217;una suite a una altra perqu\u00e8 li ofereix millors prestacions ho pugui fer de forma f\u00e0cil migrant les dades d&#8217;una plataforma a una altra, evitant aix\u00ed que les escoles es quedin captives de la soluci\u00f3 que hagin escollit inicialment. Aix\u00f2 vol dir pensar en solucions interoperables amb API obertes.<a id=\"3ca\"><\/a> Dit d&#8217;una altra manera, les dades han de ser sempre de l&#8217;escola o, fins i tot, de l&#8217;alumne que se les ha de poder dur, per exemple, si canvia d&#8217;escola \u00bb. <\/p>\n<p>&nbsp;<\/p>\n<p><strong>3. FORMACI\u00d3 I CAPACITACI\u00d3 DIGITAL DE LA COMUNITAT EDUCATIVA<\/strong><\/p>\n<p>3.1 COL.LABORACI\u00d3 I IMPLEMENTACI\u00d3 DE LES EINES DEL PUNT 2: TASK FORCE<\/p>\n<p>Es constitueix una Task Force que pot assistir els centres en la fase d&#8217;adopci\u00f3 de l&#8217;eina, per explicar i instal\u00b7lar les noves eines. Aquesta Task Force despr\u00e9s passar\u00e0 a crear i \/ o refor\u00e7ar la xarxa d&#8217;assessorament digital permanent per als centres a m\u00e9s de contribuir a ajudar i consolidar la figura referent digital dels centres de forma sostenible i remunerada.<br \/>\n&nbsp;<\/p>\n<p>3.2. ADEQUACI\u00d3 DELS PROGRAMES DE FORMACI\u00d3 DIGITAL <\/p>\n<p>El digital \u00e9s tecnologia en una m\u00ednima part, tant com \u00e9s tecnologia l&#8217;escriptura o els llibres. Es necessita crear un tipus de compet\u00e8ncia i capacitaci\u00f3 digital que no sigui nom\u00e9s t\u00e8cnica ni criminalitzadora i que eduqui en la tecnocultura, \u00e9s a dir, la cultura del nostre temps.<br \/>\n<strong>No cal con\u00e8ixer la t\u00e8cnica sobre com s&#8217;enquaderna un llibre per entendre la import\u00e0ncia del que hi ha escrit.<\/strong> <\/p>\n<p>\u00c9s indispensable que les persones que contribueixin al disseny dels programes de formaci\u00f3 tinguin compet\u00e8ncies en tecnocultura per assolir les compet\u00e8ncies adequades al temps i tamb\u00e9 per reduir la bretxa digital: aprendre el \u00abdigital\u00bb havent d&#8217;aprendre cada dia una nova app, aconsegueix que qui no \u00e9s nadiu digital en qualsevol moment abandoni l&#8217;esfor\u00e7. <\/p>\n<p>Comprendre el digital no \u00e9s nom\u00e9s utilitzar aplicacions. \u00c9s una estructura de pensament que permet funcionar \u00e0gilment, ja que combina desintermediaci\u00f3, tra\u00e7abilitat i immediatesa. Entendre com moure\u2019s al context digital i independentment de tecnologies concretes ens permet entendre-les totes i triar les que realment necessitem per ser una ciutadania aut\u00f2noma i amb capacitat cr\u00edtica. <\/p>\n<p>Enlla\u00e7 extern &#8211; El nostre article d&#8217;opini\u00f3 sobre l&#8217;ensenyament del digital:<a id=\"4ca\"><\/a><br \/>\nEl encuadernador y el exorcista: sobre el futuro de la digitalizaci\u00f3n en la educaci\u00f3n (y en todo lo dem\u00e1s)\u2028<br \/>\n<a href=\"https:\/\/blogs.publico.es\/dominiopublico\/33360\/el-encuadernador-y-el-exorcista-sobre-el-futuro-de-la-digitalizacion-en-la-educacion-y-en-todo-lo-demas\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/blogs.publico.es\/dominiopublico\/33360\/el-encuadernador-y-el-exorcista-sobre-el-futuro-de-la-digitalizacion-en-la-educacion-y-en-todo-lo-demas\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>4. Q\u00dcESTIONS TRANSVERSALS<\/strong><\/p>\n<p>AJUDES A L&#8217;ECOSISTEMA EMPRESARIAL DE CATALUNYA PERQU\u00c8 PUGUI DONAR RESPOSTA A AQUESTES DEMANDES<\/p>\n<p>El resultat i licitacions resultants hauran de preveure el manteniment i actualitzaci\u00f3. En la mesura del possible, s&#8217;han de prioritzar productes i serveis en programari lliure per optimitzar el retorn dels recursos p\u00fablics de manera que m\u00e9s d&#8217;una entitat -possiblement de km0- pugui dur a terme el manteniment i les actualitzacions. En cap cas les solucions haurien de funcionar nom\u00e9s en un suport o sistema operatiu. <\/p>\n<p>Es tracta de <strong>crear un cercle virtu\u00f3s<\/strong>: la Generalitat afegeix valor i recursos per millorar codi utilitzat en tot el m\u00f3n, contribuint al b\u00e9 com\u00fa ia l&#8217;accessibilitat, <strong>aprofitant aquest coneixement que est\u00e0 a l&#8217;abast per aconseguir m\u00e9s qualitat democr\u00e0tica de les seves estructures<\/strong>, per\u00f2 amb menys recursos. Un cop creades les solucions, es realitzar\u00e0 una adequaci\u00f3 dels espais informatius del Departament d&#8217;Educaci\u00f3 respectant el principi de neutralitat: totes les opcions seran presentades en igualtat de condicions.  <\/p>\n<p>Es posa en marxa un programa de capacitaci\u00f3 per a les empreses catalanes perqu\u00e8 en poc temps puguin aconseguir donar resposta al manteniment i replicaci\u00f3 d&#8217;aquestes necessitats en una pol\u00edtica de km0 i d&#8217;excel\u00b7l\u00e8ncia en relaci\u00f3 amb els drets digitals i les llibertats fonamentals. <\/p>\n<p>ALTRES ASPECTES RELACIONATS AMB LA DIGITALITZACI\u00d3 GENERAL ELS TRACTAREM M\u00c9S ENDAVANT JA QUE REQUEREIXEN EL SUPORT DE M\u00c9S DEPARATAMENTS I, EN ALGUN CAS, TAMB\u00c9 D&#8217;EUROPA.<br \/>\n<a id=\"5ca\"><\/a><br \/>\nXnet incorpora una secci\u00f3 interna per a l&#8217;assoliment d&#8217;aquest projecte compost per les ciutadanes i ciutadans promotors del projecte. <\/p>\n<p>&nbsp;<\/p>\n<p><strong>5. DISSENY D&#8217;IMPLEMENTACI\u00d3 I PRESSUPOST PER PROTOTIP DEL NOSTRE PLA DE DIGITALITZACI\u00d3 DEMOCR\u00c0TICA DELS CENTRES EDUCATIUS<\/strong> [ACTUALITZACI\u00d3 A 29\/07\/2020].<\/p>\n<p><object class=\"vanilla-pdf-embed\" data=\"https:\/\/xnet-x.net\/img\/DIGITALITZAR_PLA-EDU-Ca.pdf#page=1&view=FitH\" type=\"application\/pdf\" width=\"100%\" height=\"500em\">\n            <p><a href=\"https:\/\/xnet-x.net\/img\/DIGITALITZAR_PLA-EDU-Ca.pdf\">Download the PDF file .<\/a><\/p><\/object><br \/>\n<a id=\"5u\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<div style=\"font-size:90%;margin:6px 0;border: 1px solid #e00f2f;padding: 20px 5% 10px\">\n<p>[5.1.] <strong>BREU ACLARIMENT I ACTUALITZACI\u00d3 SOBRE ELS AVAN\u00c7OS<\/strong><br \/>\nAquest Pla \u00e9s el resultat de la campanya -> <a href=\"https:\/\/xnet-x.net\/ca\/no-autoritzar-google-suite-escoles\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/xnet-x.net\/ca\/no-autoritzar-google-suite-escoles\/<\/a><\/p>\n<p>L&#8217;<strong>emerg\u00e8ncia de la Covid19 ha demostrat<\/strong> la urg\u00e8ncia i vig\u00e8ncia del  plantejament que vam formular llavors. Cal una digitalitzaci\u00f3 democr\u00e0tica que a m\u00e9s sigui capa\u00e7 de prevenir situacions com les que es viuen en pand\u00e8mia.<\/p>\n<p>Aquest projecte \u00e9s:<\/p>\n<p><strong>a) Un exemple internacional, tenint en compte que fins i tot a Europa s\u2019ha acceptat la import\u00e0ncia de vetllar per la sobirania de les dades dels seus habitants. <\/p>\n<p>b) Un prototip que tamb\u00e9 es pugui aplicar en altres administracions p\u00fabliques que, com hem vist, tamb\u00e9 necessiten urgentment digitalitzar sense malbaratar recursos p\u00fablics.  <\/strong><\/p>\n<p>Les nostres propostes, si b\u00e9 es poden dur a terme directament des de la societat civil i la comunitat educativa, aix\u00f2 requeriria de tal esfor\u00e7 que les abocaria al rac\u00e0s a llarg termini.<\/p>\n<p>No es pot competir amb grans corporacions sense coordinaci\u00f3 i recursos per a l&#8217;adequaci\u00f3 a les necessitats de la comunitat educativa. L&#8217;esfor\u00e7 d&#8217;adequaci\u00f3 quedaria en m\u00e0 dels centres, ja molt desbordats de responsabilitat i treball. Aix\u00f2 produeix rebuig i els aboca els bra\u00e7os de corporacions que <strong>faciliten la digitalitzaci\u00f3 a canvis d&#8217;h\u00e0bits de depend\u00e8ncia i de clients captius<\/strong>.<br \/>\nLa nostra proposta requereix d&#8217;una intenci\u00f3 institucional perqu\u00e8 sigui estable i resolutiva per a les necessitats dels centres a llarg termini. Creiem que \u00e9s contraproduent aplicar el que proposem a trossets i amb pocs recursos esgotant la paci\u00e8ncia de les i els alumnes, professorat i fam\u00edlies; \u00e9s preferible tenir una implicaci\u00f3 institucional que garanteixi els recursos per crear un prototip que pugui competir amb les solucions corporatives. <\/p>\n<p>Finalment, la digitalitzaci\u00f3 forma part d&#8217;una actualitzaci\u00f3 de l&#8217;educaci\u00f3 als temps en qu\u00e8 vivim i no com un substitut de l&#8217;experi\u00e8ncia de l&#8217;educaci\u00f3 presencial. <\/p>\n<p>Despr\u00e9s de m\u00e9s d&#8217;un any de negociacions, el Departament d&#8217;Educaci\u00f3 de la Generalitat de Catalunya finalment no es va fer c\u00e0rrec del projecte (<a href=\"https:\/\/xnet-x.net\/ca\/digitalitzacio-democratica-centres-educatius-catalunya\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/xnet-x.net\/ca\/digitalitzacio-democratica-centres-educatius-catalunya\/<\/a>).<br \/>\nL&#8217;Ajuntament de Barcelona va prendre el relleu i es va posar a treballar amb Xnet i les fam\u00edlies promotores per crear un pilot prototip (<a href=\"https:\/\/xnet-x.net\/ca\/pla-digitalitzacio-democratica-educacio-pilot-barcelona\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/xnet-x.net\/ca\/pla-digitalitzacio-democratica-educacio-pilot-barcelona\/<\/a>). <\/p>\n<p>Nota: la nostra proposta no exclou a ning\u00fa. Els fans de Google no s&#8217;han de preocupar :). <strong>Nom\u00e9s volem competicions en igualtat de condicions<\/strong>.\n<\/div>\n<p><a id=\"rep\"><\/a><br \/>\n<span style=\"color: #f4efef \">repo<\/span><br \/>\n&nbsp;<\/p>\n<p><strong>6. Repositori d&#8217;informaci\u00f3 per argumentaris<\/strong><\/p>\n<p>\u201cEuropa integra en su aparato de seguridad las tecnolog\u00edas de vigilancia masiva que Israel prueba en Palestina\u201d<br \/>\n<a href=\"https:\/\/ctxt.es\/es\/20251001\/Politica\/50661\/rasha-abdul-rahim-tecnologia-vigilancia-israel-palestina-europa.htm\" target=\"_blank\">https:\/\/ctxt.es\/es\/20251001\/Politica\/50661\/rasha-abdul-rahim-tecnologia-vigilancia-israel-palestina-europa.htm<\/a><\/p>\n<p>Google misled users about their privacy and now owes them $425m, says court<br \/>\n<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/09\/google-misled-users-about-their-privacy-and-now-owes-them-425m-says-court\" target=\"_blank\">https:\/\/www.malwarebytes.com\/blog\/news\/2025\/09\/google-misled-users-about-their-privacy-and-now-owes-them-425m-says-court<\/a><\/p>\n<p>\u00bfEs leg\u00edtimo cobrar m\u00e1s por un vuelo a quien va a un funeral que a quien viaja por placer? \u201cEstamos ante una nueva frontera de abusos potenciales\u201d<br \/>\n<a href=\"https:\/\/elpais.com\/tecnologia\/2025-09-02\/es-legitimo-cobrar-mas-por-un-vuelo-a-quien-va-a-un-funeral-que-a-quien-viaja-por-placer-estamos-ante-una-nueva-frontera-de-abusos-potenciales.html\" target=\"_blank\">https:\/\/elpais.com\/tecnologia\/2025-09-02\/es-legitimo-cobrar-mas-por-un-vuelo-a-quien-va-a-un-funeral-que-a-quien-viaja-por-placer-estamos-ante-una-nueva-frontera-de-abusos-potenciales.html<\/a><\/p>\n<p>Google settles YouTube lawsuit over kids\u2019 privacy invasion and data collection<br \/>\n<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/08\/google-settles-youtube-lawsuit-over-kids-privacy-invasion-and-data-collection\" target=\"_blank\">https:\/\/www.malwarebytes.com\/blog\/news\/2025\/08\/google-settles-youtube-lawsuit-over-kids-privacy-invasion-and-data-collection<\/a><\/p>\n<p>Ford Seeks Patent for Software That Records Your Conversations to Serve You Ads<br \/>\n<a href=\"https:\/\/gizmodo.com\/ford-seeks-patent-for-software-that-records-your-conversations-to-serve-you-ads-2000497099\" rel=\"noopener\" target=\"_blank\">https:\/\/gizmodo.com\/ford-seeks-patent-for-software-that-records-your-conversations-to-serve-you-ads-2000497099<\/a><\/p>\n<p>Switzerland federal government requires releasing its software as open source<br \/>\n<a href=\"https:\/\/www.zdnet.com\/article\/switzerland-now-requires-all-government-software-to-be-open-source\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.zdnet.com\/article\/switzerland-now-requires-all-government-software-to-be-open-source\/<\/a><\/p>\n<p>European Commission\u2019s use of Microsoft 365 infringes data protection law for EU institutions and bodies<br \/>\n<a href=\"https:\/\/www.edps.europa.eu\/press-publications\/press-news\/press-releases\/2024\/european-commissions-use-microsoft-365-infringes-data-protection-law-eu-institutions-and-bodies_en\" rel=\"noopener\" target=\"_blank\">https:\/\/www.edps.europa.eu\/press-publications\/press-news\/press-releases\/2024\/european-commissions-use-microsoft-365-infringes-data-protection-law-eu-institutions-and-bodies_en<\/a><\/p>\n<p>Una nova an\u00e0lisi de les dades de PISA del 2022 (gaireb\u00e9 700.000 estudiants de 81 pa\u00efsos) suggereix que prohibir els tel\u00e8fons m\u00f2bils a les escoles condueix a un menor rendiment<br \/>\n<a href=\"https:\/\/www.bera.ac.uk\/blog\/mobile-phone-bans-in-schools-impact-on-achievement\" rel=\"noopener\" target=\"_blank\">https:\/\/www.bera.ac.uk\/blog\/mobile-phone-bans-in-schools-impact-on-achievement<\/a><\/p>\n<p>Las escuelas de Espa\u00f1a usan Google. Dinamarca ha dictaminado que viola la privacidad de los ni\u00f1os<br \/>\n<a href=\"https:\/\/www.elperiodico.com\/es\/tecnologia\/20240208\/google-escuelas-espana-dinamarca-violacion-privacidad-datos-ninos-cole-97903733\" rel=\"noopener\" target=\"_blank\">https:\/\/www.elperiodico.com\/es\/tecnologia\/20240208\/google-escuelas-espana-dinamarca-violacion-privacidad-datos-ninos-cole-97903733<\/a><\/p>\n<p>Hay un truco para ver archivos de Google Drive que no son tuyos. Tras probarlo me he encontrado hasta ex\u00e1menes de universidad<br \/>\n<a href=\"https:\/\/www.genbeta.com\/actualidad\/hay-truco-para-ver-archivos-google-drive-que-no-tuyos-probarlo-me-he-encontrado-examenes-universidad\" rel=\"noopener\" target=\"_blank\">https:\/\/www.genbeta.com\/actualidad\/hay-truco-para-ver-archivos-google-drive-que-no-tuyos-probarlo-me-he-encontrado-examenes-universidad<\/a><\/p>\n<p>Startups espa\u00f1olas presentan una queja contra Microsoft por pr\u00e1cticas anticompetitivas en la nube<br \/>\n<a href=\"https:\/\/elpais.com\/educacion\/2024-05-18\/la-ue-pide-a-espana-que-forme-a-15-millones-de-empleados-en-perfiles-tecnologicos-en-seis-anos.html\" rel=\"noopener\" target=\"_blank\">https:\/\/elpais.com\/educacion\/2024-05-18\/la-ue-pide-a-espana-que-forme-a-15-millones-de-empleados-en-perfiles-tecnologicos-en-seis-anos.html<\/a><\/p>\n<p>The US Government Has a Microsoft Problem<br \/>\nMicrosoft has stumbled through a series of major cybersecurity failures over the past few years. Experts say the US government\u2019s reliance on its systems means the company continues to get a free pass.<br \/>\n<a href=\"https:\/\/www.wired.com\/story\/the-us-government-has-a-microsoft-problem\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.wired.com\/story\/the-us-government-has-a-microsoft-problem\/<\/a><\/p>\n<p>The United Nations ditches Big Tech in a bid for security<br \/>\n<a href=\"https:\/\/www.techradar.com\/pro\/the-united-nations-ditches-big-tech-in-a-bid-for-security\" rel=\"noopener\" target=\"_blank\">https:\/\/www.techradar.com\/pro\/the-united-nations-ditches-big-tech-in-a-bid-for-security<\/a><\/p>\n<p>EU Policy. Microsoft software accused of breaching data rights of EU schoolchildren<br \/>\n<a href=\"https:\/\/www.euronews.com\/next\/2024\/06\/04\/microsoft-software-accused-of-breaching-data-rights-of-eu-schoolchildren\" rel=\"noopener\" target=\"_blank\">https:\/\/www.euronews.com\/next\/2024\/06\/04\/microsoft-software-accused-of-breaching-data-rights-of-eu-schoolchildren<\/a><\/p>\n<p>Google llega a un acuerdo por la demanda que aseguraba que el modo inc\u00f3gnito de Chrome en realidad no lo era<br \/>\n<a href=\"https:\/\/www.lavanguardia.com\/andro4all\/google\/google-llega-a-un-acuerdo-por-la-demanda-que-aseguraba-que-el-modo-incognito-de-chrome-en-realidad-no-lo-era\" rel=\"noopener\" target=\"_blank\">https:\/\/www.lavanguardia.com\/andro4all\/google\/google-llega-a-un-acuerdo-por-la-demanda-que-aseguraba-que-el-modo-incognito-de-chrome-en-realidad-no-lo-era<\/a><\/p>\n<p>L&#8217;Autoritat Espanyola de Protecci\u00f3 de Dades diu que el procediment de Google mostra problemes<br \/>\n<a href=\"https:\/\/www.aepd.es\/es\/documento\/ps-00176-2022.pdf\" rel=\"noopener\" target=\"_blank\">https:\/\/www.aepd.es\/es\/documento\/ps-00176-2022.pdf<\/a><\/p>\n<p>Los Chromebooks est\u00e1n deliberadamente programados para no ser utilizables a los 3 a\u00f1os<br \/>\n<a href=\"https:\/\/www.20minutos.es\/tecnologia\/moviles-dispositivos\/millones-ordenadores-escolares-basura-electronica-chromebooks-fecha-caducidad-incorporada-5122306\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.20minutos.es\/tecnologia\/moviles-dispositivos\/millones-ordenadores-escolares-basura-electronica-chromebooks-fecha-caducidad-incorporada-5122306\/<\/a><\/p>\n<p>Alemanya declara que les organitzacions actualment no poden fer servir MS365 de manera legal sota el RGPD<br \/>\n<a href=\"https:\/\/twitter.com\/wolfiechristl\/status\/1596277060435345411\" rel=\"noopener\" target=\"_blank\">https:\/\/twitter.com\/wolfiechristl\/status\/1596277060435345411<\/a><\/p>\n<p>Assembl\u00e9e nationale &#8211; Question N\u00b0 971 de M. Philippe Latombe<br \/>\n<a href=\"https:\/\/questions.assemblee-nationale.fr\/q16\/16-971QE.htm\" rel=\"noopener\" target=\"_blank\">https:\/\/questions.assemblee-nationale.fr\/q16\/16-971QE.htm<\/a><\/p>\n<p>Le ministre de l\u2019\u00c9ducation nationale ne veut pas de Microsoft Office 365 ni de Google Workspace<br \/>\n<a href=\"https:\/\/siecledigital.fr\/2022\/11\/17\/le-ministre-de-leducation-nationale-ne-veut-pas-de-microsoft-office-365-ni-de-google-workspace\/\" rel=\"noopener\" target=\"_blank\">https:\/\/siecledigital.fr\/2022\/11\/17\/le-ministre-de-leducation-nationale-ne-veut-pas-de-microsoft-office-365-ni-de-google-workspace\/<\/a><\/p>\n<p>A l\u2019\u00e9cole, l\u2019\u00e9ducation nationale tente de limiter l\u2019emprise des Gafam<br \/>\n<a href=\"https:\/\/www.lemonde.fr\/pixels\/article\/2022\/11\/16\/a-l-ecole-l-education-nationale-tente-de-limiter-l-emprise-des-gafam_6150169_4408996.html\" rel=\"noopener\" target=\"_blank\">https:\/\/www.lemonde.fr\/pixels\/article\/2022\/11\/16\/a-l-ecole-l-education-nationale-tente-de-limiter-l-emprise-des-gafam_6150169_4408996.html<\/a><\/p>\n<p>Google acuerda pagar una multa de 391 millones de d\u00f3lares por rastrear en secreto la ubicaci\u00f3n de los usuarios<br \/>\n<a href=\"https:\/\/derechodelared.com\/google-multa-rastreo-usuarios\/\" rel=\"noopener\" target=\"_blank\">https:\/\/derechodelared.com\/google-multa-rastreo-usuarios\/<\/a><\/p>\n<p>Declaraci\u00f3n de privacidad de Microsoft<br \/>\n<a href=\"https:\/\/privacy.microsoft.com\/es-mx\/privacystatement\" rel=\"noopener\" target=\"_blank\">https:\/\/privacy.microsoft.com\/es-mx\/privacystatement<\/a><\/p>\n<p>Google Fotos est\u00e1 destrozando fotos antiguas almacenadas en el servicio: esto es lo que est\u00e1 pasando a muchos usuarios<br \/>\n<a href=\"https:\/\/www.genbeta.com\/actualidad\/entras-a-google-fotos-te-encuentras-tus-fotos-antiguas-corruptas-esto-que-esta-pasando-a-muchos-usuarios\" rel=\"noopener\" target=\"_blank\">https:\/\/www.genbeta.com\/actualidad\/entras-a-google-fotos-te-encuentras-tus-fotos-antiguas-corruptas-esto-que-esta-pasando-a-muchos-usuarios<\/a><\/p>\n<p>WFH &#8211; Watched from Home: Office 365 and workplace surveillance creep<br \/>\n<a href=\"https:\/\/privacyinternational.org\/long-read\/4909\/wfh-watched-home-office-365-and-workplace-surveillance-creep\" rel=\"noopener\" target=\"_blank\">https:\/\/privacyinternational.org\/long-read\/4909\/wfh-watched-home-office-365-and-workplace-surveillance-creep<\/a><br \/>\nData privacy concerns trigger restrictions on Google Chrome in Dutch schools<br \/>\n<a href=\"https:\/\/www.androidpolice.com\/dutch-ministry-chromeos-restrictions-in-schools\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.androidpolice.com\/dutch-ministry-chromeos-restrictions-in-schools\/<\/a><\/p>\n<p>Dinamarca proh\u00edbe el uso de los productos de Google, y podr\u00eda terminar contagiando a otros pa\u00edses<br \/>\n<a href=\"https:\/\/www.genbeta.com\/actualidad\/dinamarca-prohibe-uso-productos-google-podria-terminar-contagiando-a-otros-paises\" rel=\"noopener\" target=\"_blank\">https:\/\/www.genbeta.com\/actualidad\/dinamarca-prohibe-uso-productos-google-podria-terminar-contagiando-a-otros-paises<\/a><\/p>\n<p>Informaci\u00f3n de la LfDI sobre el uso de Microsoft 365 por parte de las escuelas<br \/>\n<a href=\"https:\/\/www-baden--wuerttemberg-datenschutz-de.translate.goog\/ms-365-schulen-hinweise-weiteres-vorgehen\/?_x_tr_sl=auto&#038;_x_tr_tl=es&#038;_x_tr_hl=es&#038;_x_tr_pto=wapp\" rel=\"noopener\" target=\"_blank\">https:\/\/www-baden&#8211;wuerttemberg-datenschutz-de.translate.goog\/ms-365-schulen-hinweise-weiteres-vorgehen\/?_x_tr_sl=auto&#038;_x_tr_tl=es&#038;_x_tr_hl=es&#038;_x_tr_pto=wapp<\/a><\/p>\n<p>Students Not Products<br \/>\n<a href=\"https:\/\/www.hrw.org\/StudentsNotProducts\" rel=\"noopener\" target=\"_blank\">https:\/\/www.hrw.org\/StudentsNotProducts<\/a><\/p>\n<p>Open-source tests of web browser privacy<br \/>\n<a href=\"https:\/\/privacytests.org\/\" rel=\"noopener\" target=\"_blank\">https:\/\/privacytests.org\/<\/a><\/p>\n<p>En qu\u00e9 consiste Jedi Blue, el pacto secreto entre Google y Meta que ahora deber\u00e1n justificar frente a la Comisi\u00f3n Europea<br \/>\n<a href=\"https:\/\/www.xataka.com\/legislacion-y-derechos\/que-consiste-jedi-blue-pacto-secreto-google-meta-que-ahora-deberan-justificar-frente-a-comision-europea\" rel=\"noopener\" target=\"_blank\">https:\/\/www.xataka.com\/legislacion-y-derechos\/que-consiste-jedi-blue-pacto-secreto-google-meta-que-ahora-deberan-justificar-frente-a-comision-europea<\/a><\/p>\n<p>No digas tecnol\u00f3gicas, di agencias publicitarias: Google ya genera m\u00e1s por publicidad que la TV, Amazon o la prensa<br \/>\n<a href=\"https:\/\/hipertextual.com\/2022\/02\/bigtech-publicidad-vs-medios\" rel=\"noopener\" target=\"_blank\">https:\/\/hipertextual.com\/2022\/02\/bigtech-publicidad-vs-medios<\/a><\/p>\n<p>No digas tecnol\u00f3gicas, di agencias publicitarias: Google ya genera m\u00e1s por publicidad que la TV, Amazon o la prensa<br \/>\n<a href=\"https:\/\/hipertextual.com\/2022\/02\/bigtech-publicidad-vs-medios\" rel=\"noopener\" target=\"_blank\">https:\/\/hipertextual.com\/2022\/02\/bigtech-publicidad-vs-medios<\/a><\/p>\n<p>Durante el Covid19, Google y Apple mostraron que pod\u00edan hacer un mapeo mundial de los desplazamientos de las personas<br \/>\n<a href=\"https:\/\/www.google.com\/covid19\/mobility\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.google.com\/covid19\/mobility\/<\/a><\/p>\n<p>Google Drive borrar\u00e1 nuestros archivos si detecta algo &#8220;inapropiado&#8221;: un arbitrario proceso que va m\u00e1s all\u00e1 de bloquear archivos ilegales<br \/>\n<a href=\"https:\/\/www.xataka.com\/servicios\/google-drive-borrara-nuestros-archivos-detecta-algo-inapropiado-arbitrario-proceso-que-va-alla-bloquear-archivos-ilegales\" rel=\"noopener\" target=\"_blank\">https:\/\/www.xataka.com\/servicios\/google-drive-borrara-nuestros-archivos-detecta-algo-inapropiado-arbitrario-proceso-que-va-alla-bloquear-archivos-ilegales<\/a><\/p>\n<p>Google ocult\u00f3 que ten\u00eda acceso a las copias de seguridad de WhatsApp<br \/>\n<a href=\"https:\/\/www.muycomputer.com\/2021\/10\/25\/google-acceso-copias-de-seguridad-whatsapp\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.muycomputer.com\/2021\/10\/25\/google-acceso-copias-de-seguridad-whatsapp\/<\/a><\/p>\n<p>Google, siniestro pedagogo<br \/>\n<a href=\"https:\/\/elpais.com\/ideas\/2021-01-23\/google-siniestro-pedagogo.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/ideas\/2021-01-23\/google-siniestro-pedagogo.html<\/a><\/p>\n<p>Descubierta una gigantesca filtraci\u00f3n de datos privados almacenados en la nube de Google<br \/>\n<a href=\"https:\/\/www.lavanguardia.com\/tecnologia\/20191125\/471842508676\/descubierta-filtracion-datos-privados-nube-google.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.lavanguardia.com\/tecnologia\/20191125\/471842508676\/descubierta-filtracion-datos-privados-nube-google.html<\/a><\/p>\n<p>Amnist\u00eda Internacional: el negocio de los datos personales de Google y Facebook amenaza los derechos humanos<br \/>\n<a href=\"https:\/\/www.businessinsider.es\/google-facebook-peligro-derechos-humanos-534393\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.businessinsider.es\/google-facebook-peligro-derechos-humanos-534393<\/a><\/p>\n<p>\u00abEl negocio de Google y Facebook puede atentar contra los derechos humanos\u00bb<br \/>\n<a href=\"https:\/\/www.eldiariomontanes.es\/tecnologia\/amnistia-internacional-negocio-google-facebook-20191125184606-ntrc.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eldiariomontanes.es\/tecnologia\/amnistia-internacional-negocio-google-facebook-20191125184606-ntrc.html<\/a><\/p>\n<p>Surveillance giants:how the business model of google and facebook threatens human rights<br \/>\n<a href=\"https:\/\/www.amnestyusa.org\/wp-content\/uploads\/2019\/11\/Surveillance-Giants-Embargo-21-Nov-0001-GMT-FINAL-report.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.amnestyusa.org\/wp-content\/uploads\/2019\/11\/Surveillance-Giants-Embargo-21-Nov-0001-GMT-FINAL-report.pdf<\/a><\/p>\n<p>Google accedi\u00f3 a datos m\u00e9dicos de miles de pacientes sin permiso. La compa\u00f1\u00eda es acusada de nuevo por otro episodio de vulneraci\u00f3n a la privacidad.<br \/>\n<a href=\"https:\/\/www.eltiempo.com\/tecnosfera\/novedades-tecnologia\/demanda-a-google-y-universidad-de-chicago-por-acceder-a-datos-medicos-de-pacientes-381320\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eltiempo.com\/tecnosfera\/novedades-tecnologia\/demanda-a-google-y-universidad-de-chicago-por-acceder-a-datos-medicos-de-pacientes-381320<\/a><\/p>\n<p>Entrevista a Marc Sanz, responsable de Google for Education: \u201cGoogle no crea una dependencia en la escuela, crea un h\u00e1bito\u201d<br \/>\n<a href=\"https:\/\/eldiariodelaeducacion.com\/blog\/2017\/10\/31\/google-no-crea-una-dependencia-en-la-escuela-crea-un-habito\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/eldiariodelaeducacion.com\/blog\/2017\/10\/31\/google-no-crea-una-dependencia-en-la-escuela-crea-un-habito\/<\/a><\/p>\n<p>Google y edeb\u00e9 se al\u00edan para mejorar la educaci\u00f3n con la inteligencia artificial y el Big Data<br \/>\n<a href=\"https:\/\/prensa.edebe.com\/alianza-google-y-edebe-para-la-mejora-de-la-educacion-educativa\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/prensa.edebe.com\/alianza-google-y-edebe-para-la-mejora-de-la-educacion-educativa\/<\/a><br \/>\n<a href=\"https:\/\/www.europapress.es\/catalunya\/noticia-google-edebe-alian-mejorar-educacion-inteligencia-artificial-big-data-20190211174635.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.europapress.es\/catalunya\/noticia-google-edebe-alian-mejorar-educacion-inteligencia-artificial-big-data-20190211174635.html<\/a><\/p>\n<p>Los fiscales generales de EEUU se unen en una macroinvestigaci\u00f3n contra Google por monopolio<br \/>\n<a href=\"https:\/\/www.elmundo.es\/economia\/empresas\/2019\/09\/09\/5d769f33fc6c83ae1a8b45e5.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.elmundo.es\/economia\/empresas\/2019\/09\/09\/5d769f33fc6c83ae1a8b45e5.html<\/a><\/p>\n<p>Google afronta una investigaci\u00f3n &#8220;sin precedentes&#8221; que examinar\u00e1 su verdadero poder sobre internet<br \/>\n<a href=\"https:\/\/www.genbeta.com\/actualidad\/google-afronta-investigacion-precedentes-que-examinara-su-verdadero-poder-internet\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.genbeta.com\/actualidad\/google-afronta-investigacion-precedentes-que-examinara-su-verdadero-poder-internet<\/a><\/p>\n<p>Medio centenar de fiscales generales de EE UU se unen para investigar a Google<br \/>\n<a href=\"https:\/\/elpais.com\/economia\/2019\/09\/09\/actualidad\/1568039253_604619.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/economia\/2019\/09\/09\/actualidad\/1568039253_604619.html<\/a><\/p>\n<p>Google&#8217;s smart-city plans &#8216;tech for tech&#8217;s sake&#8217;<br \/>\n<a href=\"https:\/\/www.bbc.com\/news\/technology-49674533\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.bbc.com\/news\/technology-49674533<\/a><\/p>\n<p>&#8216;Surveillance capitalism&#8217;: critic urges Toronto to abandon smart city project<br \/>\n<a href=\"https:\/\/www.theguardian.com\/cities\/2019\/jun\/06\/toronto-smart-city-google-project-privacy-concerns\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.theguardian.com\/cities\/2019\/jun\/06\/toronto-smart-city-google-project-privacy-concerns<\/a><\/p>\n<p>Sidewalk Labs<br \/>\n<a href=\"https:\/\/www.sidewalklabs.com\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.sidewalklabs.com\/<\/a><\/p>\n<p>Las mayores brechas de datos y seguridad de 2019 (actualizadas)<br \/>\n<a href=\"https:\/\/bitlifemedia.com\/2019\/08\/mayores-brechas-datos-seguridad-2019-actualizadas\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/bitlifemedia.com\/2019\/08\/mayores-brechas-datos-seguridad-2019-actualizadas\/<\/a><br \/>\n[NO POR SER GRANDE EL SERVIDOR ES SEGURO &#8211; ENTRE LAS MAYORES BRECHAS DE SEGURIDAD DE 2019 EST\u00c1 AMAZON (capital1)<\/p>\n<p>[Ya lo dijo EFF &#8211; 2015] Google Deceptively Tracks Students\u2019 Internet Browsing, EFF Says in FTC Complaint. EFF Launches &#8216;Spying on Students&#8217; Campaign to Raise Awareness About Privacy Risks of School Technology Tools<br \/>\n<a href=\"https:\/\/www.eff.org\/press\/releases\/google-deceptively-tracks-students-internet-browsing-eff-says-complaint-federal-trade\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eff.org\/press\/releases\/google-deceptively-tracks-students-internet-browsing-eff-says-complaint-federal-trade<\/a><\/p>\n<p>George Musser (@gmusser) twitte\u00f3 a las 0:38 a. m. on dom., sept. 08, 2019:<br \/>\nGoogle Scholar seems to be altering scholarly citation patterns. Citations are getting more concentrated: the same few papers get cited over and over, @jevinwest has found. People lazily cite whatever papers the search engine ranks highly. #metascience2019<br \/>\n<a href=\"https:\/\/t.co\/OPpmVn9MqB\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/t.co\/OPpmVn9MqB<\/a><br \/>\n(<a href=\"https:\/\/twitter.com\/gmusser\/status\/1170466414345375746?s=09\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/twitter.com\/gmusser\/status\/1170466414345375746?s=09<\/a>)<\/p>\n<p>YouTube Said to Be Fined Up to $200 Million for Children\u2019s Privacy Violations<br \/>\n<a href=\"https:\/\/www.nytimes.com\/2019\/08\/30\/technology\/youtube-childrens-privacy-fine.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.nytimes.com\/2019\/08\/30\/technology\/youtube-childrens-privacy-fine.html<\/a><\/p>\n<p>Multa millonaria a Google por violar la privacidad de los ni\u00f1os en YouTube<br \/>\n<a href=\"https:\/\/elpais.com\/sociedad\/2019\/09\/04\/actualidad\/1567605248_751405.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/sociedad\/2019\/09\/04\/actualidad\/1567605248_751405.html<\/a><\/p>\n<p>Anguita, presidente de la Sociedad Espa\u00f1ola de Cardiolog\u00eda: &#8220;Deber\u00eda prohibirse la comida basura en colegios&#8221;<br \/>\n<a href=\"https:\/\/www.20minutos.es\/noticia\/3753869\/0\/entrevista-manuel-anguita-presidente-sociedad-espanola-cardiologia\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.20minutos.es\/noticia\/3753869\/0\/entrevista-manuel-anguita-presidente-sociedad-espanola-cardiologia\/<\/a><\/p>\n<p>Hesse &#8211; Proh\u00edben usar en escuelas alemanas Office 365 (y las nubes de Apple y Google) por &#8220;problemas de privacidad&#8221;<br \/>\n<a href=\"https:\/\/www.genbeta.com\/seguridad\/prohiben-usar-escuelas-alemanas-office-365-nubes-apple-google-problemas-privacidad\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.genbeta.com\/seguridad\/prohiben-usar-escuelas-alemanas-office-365-nubes-apple-google-problemas-privacidad<\/a><\/p>\n<p>Rebeli\u00f3n contra Zuckerberg en colegios de EE UU<br \/>\n<a href=\"https:\/\/elpais.com\/sociedad\/2019\/06\/29\/actualidad\/1561832269_832729.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/sociedad\/2019\/06\/29\/actualidad\/1561832269_832729.html<\/a><\/p>\n<p>Cumplimiento de Adobe con la orden ejecutiva de EE. UU. | Venezuela<br \/>\n<a href=\"https:\/\/helpx.adobe.com\/la\/x-productkb\/policy-pricing\/executive-order-venezuela.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/helpx.adobe.com\/la\/x-productkb\/policy-pricing\/executive-order-venezuela.html<\/a><br \/>\n<a href=\"https:\/\/twitter.com\/Mx_Medea\/status\/1181371630909440000\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/twitter.com\/Mx_Medea\/status\/1181371630909440000<\/a><br \/>\n[por orden de EEUU Adobe ha cancelado todas las cuentas venezolanas y sin devolver ni un c\u00e9ntimo]<\/p>\n<p>DigitalES presenta el estudio \u00abEl desaf\u00edo de las vocaciones STEM\u00bb<br \/>\n<a href=\"https:\/\/www.digitales.es\/digitales-presenta-el-estudio-el-desafio-de-las-vocaciones-stem\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.digitales.es\/digitales-presenta-el-estudio-el-desafio-de-las-vocaciones-stem\/<\/a><\/p>\n<p>Un exempleado avisa de que Google puede acceder a todos los documentos de los usuarios de su nube<br \/>\n<a href=\"https:\/\/elpais.com\/tecnologia\/2019\/10\/13\/actualidad\/1571002375_070559.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/tecnologia\/2019\/10\/13\/actualidad\/1571002375_070559.html<\/a><\/p>\n<p>Un jefe de Google recomienda avisar a los invitados que ser\u00e1n grabados si tenemos un altavoz inteligente en casa<br \/>\n<a href=\"https:\/\/www.20minutos.es\/noticia\/3805682\/0\/asistente-inteligente-casa-avisar-invitados-escuchados-grabados\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.20minutos.es\/noticia\/3805682\/0\/asistente-inteligente-casa-avisar-invitados-escuchados-grabados\/<\/a><\/p>\n<p>Mozilla is sharing YouTube horror stories to prod Google for more transparency<br \/>\n<a href=\"https:\/\/www.cnet.com\/news\/mozilla-is-sharing-youtube-horror-stories-to-prod-google-for-more-transparency\/?utm_source=reddit.com\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.cnet.com\/news\/mozilla-is-sharing-youtube-horror-stories-to-prod-google-for-more-transparency\/?utm_source=reddit.com<\/a><\/p>\n<p>Acusan a Google de crear herramientas de espionaje contra la formaci\u00f3n de sindicatos<br \/>\n<a href=\"https:\/\/codigoespagueti.com\/noticias\/internet\/google-espionaje-extension-chrome\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/codigoespagueti.com\/noticias\/internet\/google-espionaje-extension-chrome\/<\/a><\/p>\n<p>La UE vuelve a investigar a Google por monopolio: su sistema de recopilaci\u00f3n de datos, bajo la lupa<br \/>\n<a href=\"https:\/\/www.eleconomista.es\/tecnologia\/noticias\/10231955\/12\/19\/La-UE-vuelve-a-investigar-a-Google-su-sistema-de-recopilacion-de-datos-bajo-la-lupa.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eleconomista.es\/tecnologia\/noticias\/10231955\/12\/19\/La-UE-vuelve-a-investigar-a-Google-su-sistema-de-recopilacion-de-datos-bajo-la-lupa.html<\/a><\/p>\n<p>Google sabe (casi) todo lo que compras, y tiene una web que lo prueba<br \/>\n<a href=\"https:\/\/www.genbeta.com\/web\/google-sabe-casi-todo-que-compras-tiene-web-que-prueba\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.genbeta.com\/web\/google-sabe-casi-todo-que-compras-tiene-web-que-prueba<\/a><\/p>\n<p>Hola amigos, hoy no es s\u00e1bado, sabadete, pero toca hilo de #privacidad y #eticadelosdatos. \u00bfSab\u00edas que la Comunidad Valenciana es la \u00daNICA REGI\u00d3N DE EUROPA que protege la privacidad de sus estudiantes en los colegios p\u00fablicos a trav\u00e9s de herramientas y plataformas #OpenSource?<br \/>\n<a href=\"https:\/\/twitter.com\/manuelabat\/status\/1233413827334754305\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/twitter.com\/manuelabat\/status\/1233413827334754305<\/a><\/p>\n<p>\u00bfSon los m\u00f3viles la causa de los males de los adolescentes? Ahora parece que no<br \/>\n<a href=\"https:\/\/elpais.com\/tecnologia\/2020\/01\/21\/actualidad\/1579566395_050353.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/tecnologia\/2020\/01\/21\/actualidad\/1579566395_050353.html<\/a><br \/>\n[INTERNET NO ES PELIGROSO]<\/p>\n<p>Brave denuncia a Google por incumplir el GDPR y expone en un extenso informe que recolecta &#8220;cientos de datos sin especificar su uso&#8221;<br \/>\n<a href=\"https:\/\/www.xataka.com\/privacidad\/brave-denuncia-a-google-incumplir-gdpr-expone-extenso-informe-que-recolecta-cientos-datos-especificar-su-uso\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.xataka.com\/privacidad\/brave-denuncia-a-google-incumplir-gdpr-expone-extenso-informe-que-recolecta-cientos-datos-especificar-su-uso<\/a><\/p>\n<p>Esc\u00e1ndalo en Google: as\u00ed &#8220;esp\u00eda&#8221; a millones de ni\u00f1os en el colegio y en su casa<br \/>\n<a href=\"https:\/\/www.elmundo.es\/tecnologia\/2020\/02\/25\/5e5459fcfc6c8366368b4577.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.elmundo.es\/tecnologia\/2020\/02\/25\/5e5459fcfc6c8366368b4577.html<\/a><br \/>\n[TEMA FISCAL\u00cdA DE MEXICO]<\/p>\n<p style=\"text-align: left;\">Two children sue Google for allegedly collecting students&#8217; biometric data<br \/>\n<a href=\"https:\/\/www.reddit.com\/r\/privacy\/comments\/fuqkvb\/two_children_sue_google_for_allegedly_collecting\/?utm_medium=android_app&#038;utm_source=share\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.reddit.com\/r\/privacy\/comments\/fuqkvb\/two_children_sue_google\/<\/a><\/p>\n<p style=\"text-align: left;\">Zoom Banned From New York City Schools Due To Privacy &#038; Security Flaws<br \/>\n<a href=\"https:\/\/www.reddit.com\/r\/privacytoolsIO\/comments\/fvew9h\/zoom_banned_from_new_york_city_schools_due_to\/?utm_medium=android_app&#038;utm_source=share\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.reddit.com\/r\/privacytoolsIO\/comments\/fvew9h\/zoom_banned\/<\/a><\/p>\n<p>Newsrooms, let\u2019s talk about G Suite<br \/>\n<a href=\"https:\/\/freedom.press\/training\/blog\/newsrooms-lets-talk-about-gsuite\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/freedom.press\/training\/blog\/newsrooms-lets-talk-about-gsuite\/<\/a><br \/>\n[QU\u00c9 ES LO QUE VE REALMENTE GOOGLE &#8211; TESTIMONIO DIRECTO]<\/p>\n<p style=\"text-align: left;\">Millones de datos de alumnos y profesores est\u00e1n expuestos por la educaci\u00f3n \u2018online\u2019<br \/>\n<a href=\"https:\/\/elpais.com\/sociedad\/2020-04-29\/millones-de-datos-de-alumnos-y-profesores-estan-expuestos-por-la-educacion-online.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/sociedad\/2020-04-29\/millones-de-datos-de-alumnos-y-profesores-estan-expuestos-por-la-educacion-online.html<\/a><\/p>\n<p>Google Drive Uses Hash Matching to Detect Pirated Content<br \/>\n<a href=\"https:\/\/torrentfreak.com\/google-drive-uses-hash-matching-detect-pirated-content\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/torrentfreak.com\/google-drive-uses-hash-matching-detect-pirated-content\/<\/a><\/p>\n<p>\u201cMuchas aplicaciones recopilan y venden salvajemente nuestros datos aprovechando el coronavirus\u201d<br \/>\n<a href=\"https:\/\/elpais.com\/tecnologia\/2020-03-30\/muchas-aplicaciones-recopilan-y-venden-salvajemente-nuestros-datos-aprovechando-el-coronavirus.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/elpais.com\/tecnologia\/2020-03-30\/muchas-aplicaciones-recopilan-y-venden-salvajemente-nuestros-datos-aprovechando-el-coronavirus.html<\/a><\/p>\n<p>Google, doctrina del shock y liquidaci\u00f3n de la escuela p\u00fablica<br \/>\n<a href=\"https:\/\/www.elsaltodiario.com\/el-rumor-de-las-multitudes\/google-doctrina-del-shock-y-liquidacion-de-la-escuela-publica\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.elsaltodiario.com\/el-rumor-de-las-multitudes\/google-doctrina-del-shock-y-liquidacion-de-la-escuela-publica<\/a><\/p>\n<p>Google Drive est\u00e1 bloqueando archivos que contienen un &#8216;1&#8217; o un &#8216;0&#8217; por &#8220;infracci\u00f3n de copyright&#8221;<a id=\"info\"><\/a><br \/>\n<a href=\"https:\/\/www.genbeta.com\/actualidad\/google-drive-esta-bloqueando-archivos-que-contienen-1-0-infraccion-copyright\" rel=\"noopener\" target=\"_blank\">https:\/\/www.genbeta.com\/actualidad\/google-drive-esta-bloqueando-archivos-que-contienen-1-0-infraccion-copyright<\/a><br \/>\n&nbsp;<\/p>\n<div style=\"font-size:100%;margin:6px 0;border: 1px solid #e00f2f;padding: 20px 5% 10px\">\n<p><strong>*Informacions d&#8217;utilitat i notes<\/strong><br \/>\n[1] Un exemple de possibles especificacions d\u2019un servei de servidors partint de reals que protegeix la presumpci\u00f3 d\u2019innoc\u00e8ncia i la privacitat de les i els usuaris. Us semblaran obvietats, per\u00f2 no ho s\u00f3n: la gran majoria dels prove\u00efdors corporatius, si reben un mandat judicial contra una usu\u00e0ria o usuari, tan sols responen a l\u2019autoritat, per\u00f2 no tenen el comprom\u00eds d\u2019avisar els seus usuaris: <\/p>\n<p><em>El prestador no t\u00e9 obligaci\u00f3 de retirar cap contingut del servidor en cas que no tingui &#8220;coneixement efectiu&#8221; que l&#8217;activitat o la informaci\u00f3 emmagatzemada \u00e9s il\u2022l\u00edcita o lesiona b\u00e9ns o drets d&#8217;un tercer. A aquests efectes s&#8217;ent\u00e9n que hi ha coneixement efectiu quan hi hagi una resoluci\u00f3 judicial o administrativa que ordena el bloqueig o retirada dels continguts i el prestador les conegui.<\/p>\n<p>El client ser\u00e0 informat en primer lloc de qualsevol inspecci\u00f3 i mesures de l&#8217;autoritat supervisora, en la mesura que es relacionin amb aquesta Acord o contracte. Aix\u00f2 tamb\u00e9 s&#8217;aplica en la mesura que el Prove\u00efdor est\u00e0 sota o \u00e9s part d&#8217;una investigaci\u00f3 d&#8217;una autoritat competent en relaci\u00f3 amb les infraccions de qualsevol llei civil o penal, norma administrativa, o la regulaci\u00f3 del tractament de dades personals en relaci\u00f3 amb la tramitaci\u00f3 d&#8217;aquest Acord o contracte.<\/p>\n<p>En la mesura que el client estigui subjecte a una inspecci\u00f3 de l&#8217;autoritat supervisora, una administrativa o sum\u00e0ria o procediment penal, una reclamaci\u00f3 de responsabilitat d&#8217;un Persona afectada o un tercer o qualsevol altra reclamaci\u00f3 en relaci\u00f3 amb la tramitaci\u00f3 de l&#8217;Acord o el Contracte pel prove\u00efdor, aquest haur\u00e0 de fer tots els esfor\u00e7os per donar suport al client el millor possible.<\/p>\n<p>El client pot demanar documentaci\u00f3 per verificar l&#8217;execuci\u00f3 de la t\u00e8cnica i les mesures d&#8217;organitzaci\u00f3 adoptades pel prove\u00efdor mitjan\u00e7ant un formulari online.<\/p>\n<p>Les contrasenyes dels servidors, despr\u00e9s del desplegament inicial, nom\u00e9s poden ser canviats pel Client i no s\u00f3n conegudes pel prove\u00efdor.<\/p>\n<p>La contrasenya de client per a la interf\u00edcie d&#8217;administraci\u00f3 \u00e9s determinat pel propi client; la contrasenya ha de complir amb directrius predefinides. A m\u00e9s, el client pot emprar autenticaci\u00f3 de dos factors per assegurar encara m\u00e9s el seu compte.<\/p>\n<p>El client es compromet a no publicar continguts que puguin violar els drets de tercers o que infringeixin la llei. No es permet la col\u2022locaci\u00f3 de material er\u00f2tic, pornogr\u00e0fic, extremista o que no es consideri de bon gust. Tenim dret a bloquejar l&#8217;acc\u00e9s al compte de qualsevol client que ho infringeixi.<\/p>\n<p>El client podr\u00e0 xifrar la seva informaci\u00f3.<\/em><\/p>\n<p>[2] En un altre ordre de coses, com hem vist durant el Covid, la digitalitzaci\u00f3 produeix discriminaci\u00f3 entre fam\u00edlies que es poden permetre dispositius per a cada membre i bona connectivitat i les que no en tenen. En situaci\u00f3 normal ja existeix un 20% de fam\u00edlies poc digitalitzades. Aquest problema s&#8217;ha de solucionar amb infraestructures i amb canvis legals perqu\u00e8 internet sigui considerat un serveis b\u00e0sic. En aquesta proposta no tractem aquest cas.<\/p>\n<p>[3] Iniciativa ciutadana que va ser \u00fatil durant l&#8217;emerg\u00e8ncia:<br \/>\nCap estudiant sense internet. Apadrina un punt wifi per a estudiants <a href=\"https:\/\/estudiants.msf.cat\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/estudiants.msf.cat\/<\/a>.<\/p>\n<p>[4] Per a les persones interessades en entendre perqu\u00e8 la visi\u00f3 de \u201cseguretat\u201d que ens venen t\u00e9 un biaix antidemocr\u00e0tic:<br \/>\n<strong><br \/>\nCyber(in)security<br \/>\n<em>Bibliography by Biella Coleman and  Aaron Gluck Thayer<br \/>\nAlso a contribution to the bibliography of the Course Technopolitic and Right in the Digital Era designed by Simona Levi at the University of Barcelona:<\/em>:<\/strong><br \/>\n<a href=\"https:\/\/xnet-x.net\/posgrado-tecnopolitica-simona-levi\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/xnet-x.net\/posgrado-tecnopolitica-simona-levi\/<\/a><\/p>\n<p>This course will examine how \u201ccybersecurity\u201d is conceptualized, discursively produced, and applied to internet-connected technologies. Common cybersecurity discourses construct the internet as a realm of vulnerability, threat, and subversive activity. These discourses, often hidden from the public, can delineate the pursuit of cybersecurity by the government. They can further frame contemporary debates on online security within the confines of affective, institutional, and conceptual narratives of militarization and other top-down approaches to security. This course attends to the contemporary politics of cybersecurity by unpacking these narratives, identifying their ideological assumptions, and exploring their consequences. In particular, by drawing on infrastructure studies, military history, and leaked government documents on computer vulnerability disclosure policies, the course will examine how discourses of risk may perpetuate a performance of security, and how cyber-securitizations may generate conditions of insecurity.<\/p>\n<p>We need to examine lesser-known conceptualizations of security mobilized by hacker publics, and non-expert bodies, with a focus on the civic networks that are targeted by digital attacks. By investigating the history of security on the internet, the evolving roles of expert and non-expert bodies, and contemporary practices of hacking, whistleblowing, and leaking, we can interrogate how different articulations of security compete, and can be rendered both hyper-visible and invisible.<\/p>\n<p style=\"text-align: left;\"><em>Readings, with inspiration from<\/em>:<br \/>\n> <a href=\"https:\/\/uwaterloo.ca\/political-science\/sites\/ca.political-science\/files\/uploads\/files\/482-outline-F2012.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/uwaterloo.ca\/political-science\/sites\/ca.political-science\/files\/482-outline-F2012.pdf<\/a><br \/>\n> <a href=\"http:\/\/publish.uwo.ca\/~bmuller\/Site\/POL_4430_files\/Muller_POL4430_2012-13.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/publish.uwo.ca\/~bmuller\/Site\/POL_4430_files\/Muller_POL4430_2012-13.pdf <\/a><br \/>\n> <a href=\"http:\/\/www.karen-levy.net\/wp-content\/uploads\/2016\/07\/INFO_4250_syllabus_20160822b_links.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.karen-levy.net\/wp-content\/uploads\/2016\/07\/INFO_4250_syllabus_20160822b_links.pdf<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>What is Critical? What is Security?<\/strong><\/p>\n<p>Columba Peoples and Nick Vaughan\u2010Williams, Critical Security Studies: An Introduction (New York: Routledge, 2010): 1\u201088.<\/p>\n<p>\u201cThe Increasing insecurity of security studies: Conceptualizing security in the last twenty years,\u201d Contemporary Security Policy, 20(3): 72-101.\u00a0<\/p>\n<p>Mark Neocleous and George Rigakos, \u2018Anti\u2010Security: A Declaration\u2019, in Mark Neocleous and George Rigakos, eds., Anti\u2010Security (Ottawa: Red Quill Books, 2011): 15\u201021.\u00a0<\/p>\n<p>Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.<br \/>\n&nbsp;<br \/>\n<strong><br \/>\nNatSec<\/strong><\/p>\n<p>Arnold Wolfers, 1952. \u201cNational Security as an Ambiguous Symbol\u201d Political Science Quarterly 23.<\/p>\n<p>Zajko, M. (2015). Canada\u2019s cyber security and the changing threat landscape. Critical Studies on Security, 3(2), 147-161.<\/p>\n<p>Forcese, Craig and Roach, Kent, Introduction (False Security: The Radicalization of Canadian Anti-Terrorism) (September 3, 2015). False Security: The Radicalization of Canadian Anti-terrorism, Forthcoming. Available at SSRN: <a href=\"http:\/\/ssrn.com\/abstract=2655781\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/ssrn.com\/abstract=2655781<\/a><\/p>\n<p>Public Safety Canada. Our Security, Our Rights: National Security Green Paper, 2016. <a href=\"http:\/\/www.publicsafety.gc.ca\/cnt\/rsrcs\/pblctns\/ntnl-scrt-grn-ppr-2016-bckgrndr\/index-en.aspx\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.publicsafety.gc.ca\/cnt\/rsrcs\/pblctns\/ntnl-scrt-grn-ppr-2016-bckgrndr\/index-en.aspx<\/a><\/p>\n<p>Michels, R. (1915). The Iron Law of Oligarchy, in Political parties: A sociological study of the oligarchical tendencies of modern democracy. Hearst&#8217;s International Library Company.<\/p>\n<p>Weber, M. (1968). The types of legitimate domination.<\/p>\n<p>Savage, C. (2015). Power Wars: Inside Obama\u2019s Post-9\/11 Presidency. New York: Little Brown and Company.<\/p>\n<p>The International Code of Conduct for Information Security:<br \/>\n<a href=\"https:\/\/citizenlab.org\/2015\/09\/international-code-of-conduct\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/citizenlab.org\/2015\/09\/international-code-of-conduct\/<\/a><\/p>\n<p style=\"text-align: left;\">Jack Goldsmith, Cybersecurity Treaties: A Skeptical View, KORET-TAUBE TASK FORCE ON NAT\u2019L SEC. AND LAW FUTURE CHALLENGES ESSAY SERIES, HOOVER INST. (2011)<br \/>\n<a href=\"http:\/\/media.hoover.org\/sites\/default\/files\/documents\/FutureChallenges_Goldsmith.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/media.hoover.org\/FutureChallenges_Goldsmith.pdf<\/a><\/p>\n<p>Tamir Israel, Christopher Parsons in Law, Privacy and Surveillance in Canada in the Post-Snowden Era<br \/>\n<a href=\"http:\/\/www.ruor.uottawa.ca\/bitstream\/10393\/32424\/1\/9780776621838_WEB.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.ruor.uottawa.ca\/bitstream\/10393\/32424\/1\/9780776621838_WEB.pdf<\/a><\/p>\n<p>Tilly, C. (1985). War making and state making as organized crime. Violence: A reader.<\/p>\n<p>Jonathan Mayer, Surveillance Law, first offered by Stanford Law School on Coursera. Government Hacking.<br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=hlCYvmRg1ok\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=hlCYvmRg1ok<\/a><br \/>\n&nbsp;<\/p>\n<p><strong>Surveillance or Security?<\/strong><\/p>\n<p>Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., &#8230; &#038; Rivest, R. L. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, tyv009.<br \/>\n<a href=\"https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/97690\/MIT-CSAIL-TR-2015-026.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/dspace.mit.edu\/bitstream\/handle\/1721.1\/97690\/MIT-CSAIL-TR-2015-026.pdf\u00a0<\/a><\/p>\n<p>Matthew Jones (2016). Great Exploitations: Data Mining, Legal Modernization, and the NSA.<br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=Qx4Wupf1okc\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=Qx4Wupf1okc<\/a><\/p>\n<p>Landau, S. (2011). Surveillance or security?: The risks posed by new wiretapping technologies. Mit Press.<\/p>\n<p>Jeanne Theoharis. \u201cI FEEL LIKE A DESPISED INSECT\u201d: COMING OF AGE UNDER SURVEILLANCE IN NEW YORK<br \/>\n<a href=\"https:\/\/theintercept.com\/2016\/02\/18\/coming-of-age-under-surveillance-in-new-york\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/theintercept.com\/2016\/02\/18\/coming-of-age-under-surveillance-in-new-york\/<\/a><\/p>\n<p>Schlanger, M. (2015). Intelligence Legalism and the National Security Agency&#8217;s Civil Liberties Gap. Harvard National Security Journal, 6.<br \/>\n<a href=\"http:\/\/harvardnsj.org\/wp-content\/uploads\/2015\/02\/Schlanger.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/harvardnsj.org\/wp-content\/uploads\/2015\/02\/Schlanger.pdf\u00a0<\/a><\/p>\n<p>Report: Impacts of surveillance on contemporary British activism<br \/>\nGILBERT RAMSAY, ADAM RAMSAY, and SARAH MARSDEN<br \/>\n<a href=\"https:\/\/www.opendemocracy.net\/uk\/gilbert-ramsay\/report-impacts-of-surveillance-on-contemporary-british-activism\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.opendemocracy.net\/uk\/gilbert-ramsay\/report-impacts-of-surveillance-on-contemporary-british-activism<\/a><\/p>\n<p>EFF. Government Hacking and Subversion of Digital Security.<br \/>\n<a href=\"https:\/\/www.eff.org\/issues\/government-hacking-digital-security\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eff.org\/issues\/government-hacking-digital-security<\/a><br \/>\n&#038;<br \/>\n<a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/09\/shadow-brokers-publish-powerful-nsa-spy-tools-demonstrating-flaws-nsas-approach\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.eff.org\/deeplinks\/2016\/09\/shadow-brokers-publish-powerful-nsa-spy-tools-demonstrating-flaws-nsas-approach<\/a><\/p>\n<p>Department of Justice Manual on Electronic Evidence.<br \/>\n<a href=\"https:\/\/www.justice.gov\/sites\/default\/files\/criminal-ccips\/legacy\/2015\/01\/14\/ssmanual2009.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.justice.gov\/sites\/default\/files\/criminal-ccips\/legacy\/2015\/01\/14\/ssmanual2009.pdf<\/a><br \/>\n&nbsp;<\/p>\n<p><strong>Infosec<\/strong><\/p>\n<p>Cyril, Malkia. \u201cBlack Americans and Encryption: The Stakes are Higher than Apple v. FBI.\u201d The Guardian (Mar 21, 2016).\u00a0<\/p>\n<p>Quinn Norton. Everything is Broken.<br \/>\n<a href=\"https:\/\/medium.com\/message\/everything-is-broken-81e5f33a24e1#.kk40m0v66\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/medium.com\/message\/everything-is-broken-81e5f33a24e1#.kk40m0v66<\/a><\/p>\n<p>Eric Geller. A complete guide to the new &#8216;Crypto Wars\u2019.<br \/>\n<a href=\"http:\/\/www.dailydot.com\/layer8\/encryption-crypto-wars-backdoors-timeline-security-privacy\/\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.dailydot.com\/layer8\/encryption-crypto-wars-backdoors-timeline-security-privacy\/<\/a><\/p>\n<p>Waddell, Kaveh. \u201cEncryption is a Luxury.\u201d The Atlantic (Mar 28, 2016).<\/p>\n<p>\u2018Going Dark\u2019. Sue Halpern.\u00a0<br \/>\n<a href=\"http:\/\/www.nybooks.com\/articles\/2016\/05\/26\/going-dark-apple-encryption\/\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.nybooks.com\/articles\/2016\/05\/26\/going-dark-apple-encryption\/<\/a><\/p>\n<p>Lex Gill. Law, Metaphor and the Encrypted Machine.<br \/>\n<a href=\"https:\/\/www.youtube.com\/watch?v=dD9rArKzQtg\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=dD9rArKzQtg<\/a><\/p>\n<p style=\"text-align: left;\">Edwards, B., Locasto, M., &#038; Epstein, J. (2014, September). Panel Summary: The Future of Software Regulation. In Proceedings of the 2014 workshop on New Security Paradigms Workshop (pp. 117-126). ACM.<br \/>\n<a href=\"https:\/\/www.researchgate.net\/profile\/Benjamin_Edwards2\/publication\/270452915_Panel_Summary_The_Future_of_Software_Regulation\/links\/54ab07290cf25c4c472f7230.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.researchgate.net\/profile\/Benjamin_Edwards2\/publication\/270452915.pdf<\/a><\/p>\n<p>Jane Chong. Bad Code: The Whole Series.<br \/>\n<a href=\"https:\/\/www.lawfareblog.com\/bad-code-whole-series\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.lawfareblog.com\/bad-code-whole-series<\/a><\/p>\n<p>Dan Geer. Cybersecurity as Realpolitik.<br \/>\n<a href=\"http:\/\/geer.tinho.net\/geer.blackhat.6viii14.txt\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/geer.tinho.net\/geer.blackhat.6viii14.txt<\/a><br \/>\n&nbsp;<\/p>\n<p><strong>Cyberwar<\/strong><\/p>\n<p>Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world&#8217;s first digital weapon. Crown.<\/p>\n<p>Sean Kanuck, National Intelligence Officer at ODNI. Deterrence and Arms Control in Cyberspace. <a href=\"https:\/\/www.youtube.com\/watch?v=N7VgvPB-3DU\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=N7VgvPB-3DU<\/a><\/p>\n<p>de Matos Alves, A. (2015). Between the \u201cBattlefield\u201d Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict. Canadian Journal of Communication, 40(3).<\/p>\n<p>Barnard-Wills, D., &#038; Ashenden, D. (2012). Securing virtual space: cyber war, cyber terror, and risk. Space and culture, 15(2), 110-123.<\/p>\n<p>Thomas Rid and Ben Buchanan, \u201cAttributing Cyber Attacks.\u201d Journal of Strategic Studies, 2014. <a href=\"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01402390.2014.977382?af=R\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01402390.2014.977382?af=R<\/a><\/p>\n<p>Nye Jr, J. S. (2015). The world needs new norms on cyberwarfare. Washington Post, 1. <a href=\"https:\/\/www.washingtonpost.com\/opinions\/the-world-needs-an-arms-control-treaty-for-cybersecurity\/2015\/10\/01\/20c3e970-66dd-11e5-9223-70cb36460919_story.html\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.washingtonpost.com\/opinions\/the-world-needs-an-arms-control-treaty-for-cybersecurity\/2015\/10\/01\/20c3e970-66dd-11e5-9223-70cb36460919_story.html<\/a><\/p>\n<p>Sean Lawson (2013). Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats, Journal of Information Technology &#038; Politics, 10(1), 86-103.\u00a0<br \/>\n&nbsp;<\/p>\n<p><strong>Cyberpathogens, or, 0-days<\/strong><\/p>\n<p style=\"text-align: left;\">Eric King, Witness Statement on Government Hacking: PRIVACY INTERNATIONAL v GOVERNMENT COMMUNICATION HEADQUARTERS.<br \/>\n<a href=\"https:\/\/www.privacyinternational.org\/sites\/default\/files\/Witness_Statement_Of_Eric_King.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.privacyinternational.org\/sites\/Eric_King.pdf<\/a><\/p>\n<p>Kaplan, F. (2016). Dark Territory: The Secret History of Cyber War. Simon and Schuster.<\/p>\n<p>Bill Robinson, CSEC and the Heartbleed Bug.<br \/>\n<a href=\"http:\/\/luxexumbra.blogspot.ca\/2014\/04\/csec-and-heartbleed-bug.html\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/luxexumbra.blogspot.ca\/2014\/04\/csec-and-heartbleed-bug.html<\/a><\/p>\n<p>Herzog, M., &#038; Schmid, J. (2016). 6 Who pays for zero-days?. Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, 95<\/p>\n<p>Bellovin, S. M., Blaze, M., Clark, S., &#038; Landau, S. (2014). Lawful hacking: Using existing vulnerabilities for wiretapping on the Internet. Nw. J. Tech. &#038; Intell. Prop., 12, i.<br \/>\n<a href=\"http:\/\/scholarlycommons.law.northwestern.edu\/cgi\/viewcontent.cgi?article=1209&#038;context=njtip\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/scholarlycommons.law.northwestern.edu\/cgi\/viewcontent.cgi?article=1209&#038;context=njtip\u00a0<\/a><\/p>\n<p style=\"text-align: left;\">Delgado, A. Zero-Day Exploits Pricing in White and Gray Markets: a case-study.<br \/>\n<a href=\"https:\/\/tsyrklevich.net\/2015\/07\/22\/hacking-team-0day-market\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/tsyrklevich.net\/2015\/07\/22\/hacking-team-0day-market\/<\/a><\/p>\n<p>Fidler, M.(2014). Anarchy or regulation: controlling the global trade in zero-day vulnerabilities (Doctoral dissertation, Master Thesis. Stanford University, URL: <a href=\"https:\/\/d1x4j6omi7lpzs.cloudfront.net\/live\/wp-content\/uploads\/2014\/06\/Fidler-Zero-Day-Vulnerability-Thesis.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/d1x4j6omi7lpzs.cloudfront.net\/live\/wp-content\/uploads\/2014\/06\/Fidler-Zero-Day-Vulnerability-Thesis.pdf<\/a>).<br \/>\n&nbsp;<\/p>\n<p><strong>Hackers &#038; Security<\/strong><\/p>\n<p>Rogaway, P. (2015). The moral character of cryptographic work. URl:<br \/>\n<a href=\"http:\/\/web.cs.ucdavis.edu\/~rogaway\/papers\/moral.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/web.cs.ucdavis.edu\/~rogaway\/papers\/moral.pdf<\/a><\/p>\n<p>Slayton, R. (2003). Speaking as scientists: Computer professionals in the Star Wars debate. History and technology, 19(4), 335-364.<\/p>\n<p>Gabriella Coleman (2016). How Anonymous Narrowly Evaded Being Framed as Cyberterrorists. HOPE.<br \/>\n<a href=\"http:\/\/livestream.com\/internetsociety\/hopeconf\/videos\/130645379\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/livestream.com\/internetsociety\/hopeconf\/videos\/130645379<\/a><\/p>\n<p>Nicolas Auray and Danielle Kaminsky, \u201cThe professionalisation paths of hackers in IT security: The sociology of a divided identity.\u201d Annales Des T\u00e9l\u00e9communications, November 2007.<\/p>\n<p>Schulte, S. R. (2008). \u201cThe WarGames Scenario\u201d: Regulating Teenagers and Teenaged Technology (1980-1984). Television &#038; New Media.<\/p>\n<p>Beno\u00eet Dupont et al., \u201cThe ecology of trust among hackers.\u201d Global Crime, 2016.<br \/>\n<a href=\"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/17440572.2016.1157480?journalCode=fglc20\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/17440572.2016.1157480?journalCode=fglc20<\/a><br \/>\n&nbsp;<\/p>\n<p><strong>Critical Infrastructure<\/strong><\/p>\n<p>Brian Larkin, \u201cThe Politics and Poetics of Infrastructure.\u201d Annual Review of Anthropology, October 2013.<br \/>\n<a href=\"http:\/\/www.annualreviews.org\/doi\/abs\/10.1146\/annurev-anthro-092412-155522\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/www.annualreviews.org\/doi\/abs\/10.1146\/annurev-anthro-092412-155522<\/a><\/p>\n<p>Stevens, T. (2015). Cyber Security and the Politics of Time. Cambridge University Press.<\/p>\n<p>Aradau, C. (2010). Security that matters: Critical infrastructure and objects of protection. Security Dialogue, 41(5), 491-514.<\/p>\n<p>Star, Susan Leigh, and Geoffrey C. Bowker. \u201cHow to Infrastructure.\u201d In Handbook of New Media: Social Shaping and Social Consequences of Icts, edited by Leah A. Lievrouw and Sonia Livingstone, 151\u201362. London: Sage, 2002.<br \/>\n&nbsp;<\/p>\n<p><strong>Theatre<\/strong><\/p>\n<p>Mann, Charles C. \u201cSmoke Screening.\u201d Vanity Fair (Dec 20, 2011).\u00a0<\/p>\n<p>Caduff, C. (2015). The Pandemic Perhaps: Dramatic Events in a Public Culture of Danger. Univ of California Press.<\/p>\n<p style=\"text-align: left;\">Anna Feigenbaum. Security for sale! The visual rhetoric of marketing counter-terrorism technologies.<br \/>\n<a href=\"http:\/\/s3.amazonaws.com\/academia.edu.documents\/30426915\/Security_for_Sale_Feigenbaum.pdf?AWSAccessKeyId=AKIAJ56TQJRTWSMTNPEA&#038;Expires=1474475759&#038;Signature=65dsTKUWuH2hNirr041j6lL7yl4%3D&#038;response-content-disposition=inline%3B%20filename%3DSecurity_for_sale_The_visual_rhetoric_of.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/s3.amazonaws.com\/Security_for_sale_The_visual_rhetoric_of.pdf<\/a><\/p>\n<p>Ron Deibert. The Cybersecurity Syndrome.<br \/>\n<a href=\"https:\/\/www.opencanada.org\/features\/the-cyber-security-syndrome\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.opencanada.org\/features\/the-cyber-security-syndrome\/<\/a><\/p>\n<p>United States Central Intelligence Agency. 1944. Simple Sabotage Field Manual.<\/p>\n<p>Masco, J. (2014). The Theater of Operations: National Security Affect from the Cold War to the War on Terror. Duke University Press.<\/p>\n<p>Schneier, Bruce. \u201cIn Praise of Security Theater.\u201d Wired (Jan 25, 2007).\u00a0<\/p>\n<p>Molotch, Harvey. 2012. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. Chapters 1, 4.<br \/>\n&nbsp;<\/p>\n<p><strong>Alternative visions<\/strong><\/p>\n<p>Roland Paris, 2001. &#8220;Human Security: Paradigm Shift or Hot Air?&#8221; International Security 26(2) Fall 2001 p. 87-102.<\/p>\n<p>Forcese, Craig, Canada&#8217;s Security &#038; Intelligence Community after 9\/11: Key Challenges and Conundrums (September 15, 2016). Available at SSRN:<br \/>\n<a href=\"http:\/\/ssrn.com\/abstract=2839622\" rel=\"noopener noreferrer\" target=\"_blank\">http:\/\/ssrn.com\/abstract=2839622<\/a><\/p>\n<p>Hall, P., Heath, C., &#038; Coles-Kemp, L. (2015). Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity, 1(1), 93-108.<\/p>\n<p>Carly Nyst. CYBERSECURITY POLICY FOR HUMAN RIGHTS DEFENDERS.<br \/>\n<a href=\"https:\/\/www.gp-digital.org\/publication\/travel-guide-to-the-digital-world-cybersecurity-policy-for-human-rights-defenders\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.gp-digital.org\/publication\/travel-guide-to-the-digital-world-cybersecurity-policy-for-human-rights-defenders\/<\/a><\/p>\n<p>Mark Neufeld, 2004. \u201cPitfalls of Emancipation and Discourses of Security: Reflections on Canada\u2019s \u2018Security with a Human Face\u2019\u201d International Relations 18(1), 109-123.\u00a0<\/p>\n<p>Deibert, R. (2013). Divide and Rule: Republican Security Theory as Civil Society Cyber Strategy. Georgetown Journal of International Affairs, 39-50.<\/p>\n<p>Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20(3), 701-715.<\/p>\n<p>Deibert, R. (2012). Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace. Journal of military and strategic studies, 14(2).\n<\/p><\/div>\n<p>&nbsp;<\/p>\n<div style=\"font-size:100%;margin:6px 0;border: 1px solid #d5d8dc;padding: 10px 5% 10px\">\n<strong>ES VA DUR A TERME UNA REUNI\u00d3 INFORMATIVA ONLINE EL DIA 2 DE JULIOL 2020 A les 18h.<br \/>\nANUNCIADA A<\/strong>:<\/p>\n<p style=\"text-align: left;\">Twitter d&#8217;Xnet -> <a href=\"https:\/\/twitter.com\/X_net_\" rel=\"noopener noreferrer\" target=\"_blank\">@X_net_<\/a><br \/>\nTelegram d&#8217;Xnet -> <a href=\"https:\/\/t.me\/XnetInfo\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/t.me\/XnetInfo<\/a><br \/>\nNewsletter -> <a href=\"https:\/\/xnetmails.maadix.org\/mailman\/postorius\/lists\/xnet-info.listas.xnet-x.net\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/xnetmails.maadix.org\/mailman\/postorius\/lists\/xnet-info.listas.xnet-x.net\/<\/a><br \/>\nFacebook -> <a href=\"https:\/\/www.facebook.com\/RedX.Net\/\" rel=\"noopener noreferrer\" target=\"_blank\">https:\/\/www.facebook.com\/RedX.Net\/<\/a><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>M\u00e9s informaci\u00f3:<br \/>\n\u2022 <a href=\"https:\/\/xnet-x.net\/ca\/presentem-dd-eina-digitalitzacio-democratica-educacio\/\" rel=\"noopener\" target=\"_blank\">Us presentem DD: l\u2019eina per a la Digitalitzaci\u00f3 Democr\u00e0tica de l\u2019Educaci\u00f3<\/a><br \/>\n\u2022 <a href=\"https:\/\/xnet-x.net\/ca\/no-autoritzar-google-suite-escoles\/\" rel=\"noopener\" target=\"_blank\">No signeu l\u2019autoritzaci\u00f3 per utilitzar Google Suite a les escoles<\/a><br \/>\n\u2022 <a href=\"https:\/\/xnet-x.net\/ca\/prototip-digitalitzar-centres-educatius-sense-google\/\" rel=\"noopener\" target=\"_blank\">A punt per l\u2019abril el prototip per digitalitzar els centres educatius sense usar Google o similars<\/a><br \/>\n\u2022 <a href=\"https:\/\/xnet-x.net\/ca\/pla-digitalitzacio-democratica-educacio-pilot-barcelona\/\" rel=\"noopener\" target=\"_blank\">El Pla de Digitalitzaci\u00f3 Democr\u00e0tica de l\u2019Educaci\u00f3 d\u2019Xnet tindr\u00e0 el seu primer pilot a Barcelona<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Digitalitzaci\u00f3 de l&#8217;educaci\u00f3: soluci\u00f3 de mares, pares i @X_net_ per a l&#8217;excel\u00b7l\u00e8ncia i la privacitat de dades a les escoles. No m\u00e9s Google<\/p>\n","protected":false},"author":15,"featured_media":19953,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-19923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","ejes-cultura-libre","ejes-neutralidad-de-la-red","servicios-recomendaciones-de-politicas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Educaci\u00f3: privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica<\/title>\n<meta name=\"description\" content=\"Proposta de fam\u00edlies i Xnet per a l&#039;excel\u00b7l\u00e8ncia en la privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica dels centres educatius sense Google.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xnet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"29 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/\"},\"author\":{\"name\":\"Xnet\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/02880890b95968f2b3bd4cfd79843d49\"},\"headline\":\"Pla per a la Privacitat de Dades i la Digitalitzaci\u00f3 Democr\u00e0tica de l&#8217;Educaci\u00f3\",\"datePublished\":\"2020-06-03T16:59:45+00:00\",\"dateModified\":\"2026-01-20T14:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/\"},\"wordCount\":14212,\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg\",\"articleSection\":[\"Blog - Les nostres accions\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/\",\"url\":\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/\",\"name\":\"Educaci\u00f3: privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica\",\"isPartOf\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg\",\"datePublished\":\"2020-06-03T16:59:45+00:00\",\"dateModified\":\"2026-01-20T14:06:24+00:00\",\"description\":\"Proposta de fam\u00edlies i Xnet per a l'excel\u00b7l\u00e8ncia en la privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica dels centres educatius sense Google.\",\"breadcrumb\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage\",\"url\":\"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg\",\"width\":838,\"height\":420},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/xnet-x.net\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Plan para la Privacidad de Datos y la Digitalizaci\u00f3n Democr\u00e1tica de la Educaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#website\",\"url\":\"https:\/\/xnet-x.net\/ca\/\",\"name\":\"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]\",\"description\":\"Xnet: Internet, informaci\u00f3 i cultura lliures. Tecnopol\u00edtica. Dades, algoritmes i drets digitals. Llibertat d&#039;expressi\u00f3. Democr\u00e0cia i anticorrupci\u00f3\",\"publisher\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xnet-x.net\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#organization\",\"name\":\"Xnet - Internet, drets i democr\u00e0cia en l'era digital\",\"url\":\"https:\/\/xnet-x.net\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"contentUrl\":\"https:\/\/xnet-x.net\/img\/xnet-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Xnet - Internet, drets i democr\u00e0cia en l'era digital\"},\"image\":{\"@id\":\"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/facebook.com\/RedX.Net\/\",\"https:\/\/x.com\/x_net_\",\"https:\/\/es.wikipedia.org\/wiki\/Xnet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xnet-x.net\/es\/#\/schema\/person\/02880890b95968f2b3bd4cfd79843d49\",\"name\":\"Xnet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\/\/xnet-x.net\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41a61c327d24125228571dadd14748b0afd881e633e6e61518dacc4fef53cc93?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41a61c327d24125228571dadd14748b0afd881e633e6e61518dacc4fef53cc93?s=96&d=mm&r=g\",\"caption\":\"Xnet\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Educaci\u00f3: privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica","description":"Proposta de fam\u00edlies i Xnet per a l'excel\u00b7l\u00e8ncia en la privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica dels centres educatius sense Google.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/","twitter_misc":{"Written by":"Xnet","Est. reading time":"29 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#article","isPartOf":{"@id":"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/"},"author":{"name":"Xnet","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/02880890b95968f2b3bd4cfd79843d49"},"headline":"Pla per a la Privacitat de Dades i la Digitalitzaci\u00f3 Democr\u00e0tica de l&#8217;Educaci\u00f3","datePublished":"2020-06-03T16:59:45+00:00","dateModified":"2026-01-20T14:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/"},"wordCount":14212,"publisher":{"@id":"https:\/\/xnet-x.net\/es\/#organization"},"image":{"@id":"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg","articleSection":["Blog - Les nostres accions"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/","url":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/","name":"Educaci\u00f3: privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica","isPartOf":{"@id":"https:\/\/xnet-x.net\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage"},"image":{"@id":"https:\/\/xnet-x.net\/es\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage"},"thumbnailUrl":"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg","datePublished":"2020-06-03T16:59:45+00:00","dateModified":"2026-01-20T14:06:24+00:00","description":"Proposta de fam\u00edlies i Xnet per a l'excel\u00b7l\u00e8ncia en la privacitat de dades i digitalitzaci\u00f3 democr\u00e0tica dels centres educatius sense Google.","breadcrumb":{"@id":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/"]]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#primaryimage","url":"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg","contentUrl":"https:\/\/xnet-x.net\/img\/datos-no-ma\u0301smonopolio-google.jpg","width":838,"height":420},{"@type":"BreadcrumbList","@id":"https:\/\/xnet-x.net\/ca\/privacidad-datos-digitalizacion-democratica-educacion-sin-google\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/xnet-x.net\/ca\/"},{"@type":"ListItem","position":2,"name":"Plan para la Privacidad de Datos y la Digitalizaci\u00f3n Democr\u00e1tica de la Educaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/xnet-x.net\/ca\/#website","url":"https:\/\/xnet-x.net\/ca\/","name":"[:es]Xnet - Internet, derechos y democracia en la era digital[:ca]Xnet - Internet, drets i democr\u00e0cia en l'era digital[:en]Xnet - Internet freedoms & digital rights[:]","description":"Xnet: Internet, informaci\u00f3 i cultura lliures. Tecnopol\u00edtica. Dades, algoritmes i drets digitals. Llibertat d&#039;expressi\u00f3. Democr\u00e0cia i anticorrupci\u00f3","publisher":{"@id":"https:\/\/xnet-x.net\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xnet-x.net\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/xnet-x.net\/ca\/#organization","name":"Xnet - Internet, drets i democr\u00e0cia en l'era digital","url":"https:\/\/xnet-x.net\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/xnet-x.net\/img\/xnet-logo.png","contentUrl":"https:\/\/xnet-x.net\/img\/xnet-logo.png","width":512,"height":512,"caption":"Xnet - Internet, drets i democr\u00e0cia en l'era digital"},"image":{"@id":"https:\/\/xnet-x.net\/ca\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/RedX.Net\/","https:\/\/x.com\/x_net_","https:\/\/es.wikipedia.org\/wiki\/Xnet"]},{"@type":"Person","@id":"https:\/\/xnet-x.net\/es\/#\/schema\/person\/02880890b95968f2b3bd4cfd79843d49","name":"Xnet","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/xnet-x.net\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/41a61c327d24125228571dadd14748b0afd881e633e6e61518dacc4fef53cc93?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41a61c327d24125228571dadd14748b0afd881e633e6e61518dacc4fef53cc93?s=96&d=mm&r=g","caption":"Xnet"}}]}},"_links":{"self":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts\/19923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/comments?post=19923"}],"version-history":[{"count":20,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts\/19923\/revisions"}],"predecessor-version":[{"id":20077,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/posts\/19923\/revisions\/20077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/media\/19953"}],"wp:attachment":[{"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/media?parent=19923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/categories?post=19923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xnet-x.net\/ca\/wp-json\/wp\/v2\/tags?post=19923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}