{"id":1383,"date":"2016-08-29T13:44:35","date_gmt":"2016-08-29T13:44:35","guid":{"rendered":"http:\/\/ojen.turnbull.co\/fr\/?post_type=resource&#038;p=1383"},"modified":"2016-11-27T14:54:31","modified_gmt":"2016-11-27T19:54:31","slug":"cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014","status":"publish","type":"resource","link":"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014","title":{"rendered":"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014)"},"content":{"rendered":"<p>Cette pr\u00e9sentation PowerPoint donne un aper\u00e7u des crimes li\u00e9s \u00e0 la technologie et \u00e0 Internet, notamment la prof\u00e9ration de menaces, l\u2019extorsion, le voyeurisme, le harc\u00e8lement criminel, les crimes haineux, la pornographie infantile, les m\u00e9faits relatifs aux donn\u00e9es informatiques et le libelle diffamatoire.La pr\u00e9sentation comprend un examen des d\u00e9fenses en common law ainsi que du projet de loi&nbsp;C-13, Loi sur la protection des Canadiens contre la cybercriminalit\u00e9. Ces documents ont \u00e9t\u00e9 pr\u00e9sent\u00e9s par Lisa Henderson de la strat\u00e9gie provinciale pour pr\u00e9venir les cybercrimes \u00e0 l\u2019\u00e9gard des enfants, le d\u00e9tective Paul Krawczyk du Service de police de Toronto ainsi que Emma Rhodes et Megan Savard, avocates en d\u00e9fense criminelle, au cours de l\u2019Institut estival de droit de 2014.<\/p>\n","protected":false},"featured_media":0,"template":"","resource-type":[],"area-of-law":[],"subject-area":[],"grade-level":[27,28,29],"resource-audience":[],"resource-format":[],"class_list":["post-1383","resource","type-resource","status-publish","hentry","grade-level-10e-annee","grade-level-11e-annee","grade-level-12e-annee"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014) - OJEN<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014) - OJEN\" \/>\n<meta property=\"og:description\" content=\"Cette pr\u00e9sentation PowerPoint donne un aper\u00e7u des crimes li\u00e9s \u00e0 la technologie et \u00e0 Internet, notamment la prof\u00e9ration de menaces, l\u2019extorsion, le voyeurisme, le harc\u00e8lement criminel, les crimes haineux, la pornographie infantile, les m\u00e9faits relatifs aux donn\u00e9es informatiques et le libelle diffamatoire.La pr\u00e9sentation comprend un examen des d\u00e9fenses en common law ainsi que du projet [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014\" \/>\n<meta property=\"og:site_name\" content=\"OJEN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/OJEN\/252115501467864\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-27T19:54:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@OJEN_ROEJ\" \/>\n<meta name=\"twitter:label1\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014\",\"url\":\"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014\",\"name\":\"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014) - OJEN\",\"isPartOf\":{\"@id\":\"https:\/\/ojen2024.turnbull.co\/en\/#website\"},\"datePublished\":\"2016-08-29T13:44:35+00:00\",\"dateModified\":\"2016-11-27T19:54:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ojen2024.turnbull.co\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ojen2024.turnbull.co\/en\/#website\",\"url\":\"https:\/\/ojen2024.turnbull.co\/en\/\",\"name\":\"OJEN\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ojen2024.turnbull.co\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014) - OJEN","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014) - OJEN","og_description":"Cette pr\u00e9sentation PowerPoint donne un aper\u00e7u des crimes li\u00e9s \u00e0 la technologie et \u00e0 Internet, notamment la prof\u00e9ration de menaces, l\u2019extorsion, le voyeurisme, le harc\u00e8lement criminel, les crimes haineux, la pornographie infantile, les m\u00e9faits relatifs aux donn\u00e9es informatiques et le libelle diffamatoire.La pr\u00e9sentation comprend un examen des d\u00e9fenses en common law ainsi que du projet [&hellip;]","og_url":"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014","og_site_name":"OJEN","article_publisher":"https:\/\/www.facebook.com\/pages\/OJEN\/252115501467864","article_modified_time":"2016-11-27T19:54:31+00:00","twitter_card":"summary_large_image","twitter_site":"@OJEN_ROEJ","twitter_misc":{"Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014","url":"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014","name":"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014) - OJEN","isPartOf":{"@id":"https:\/\/ojen2024.turnbull.co\/en\/#website"},"datePublished":"2016-08-29T13:44:35+00:00","dateModified":"2016-11-27T19:54:31+00:00","breadcrumb":{"@id":"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ojen2024.turnbull.co\/fr\/resource\/cyberharcelement-et-cyberintimidation-lisa-henderson-ied-2014#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ojen2024.turnbull.co\/fr"},{"@type":"ListItem","position":2,"name":"Cyberharc\u00e8lement et cyberintimidation \u2013 Lisa Henderson (IED 2014)"}]},{"@type":"WebSite","@id":"https:\/\/ojen2024.turnbull.co\/en\/#website","url":"https:\/\/ojen2024.turnbull.co\/en\/","name":"OJEN","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ojen2024.turnbull.co\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"}]}},"_links":{"self":[{"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/resource\/1383"}],"collection":[{"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":0,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/resource\/1383\/revisions"}],"wp:attachment":[{"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/media?parent=1383"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/resource-type?post=1383"},{"taxonomy":"area-of-law","embeddable":true,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/area-of-law?post=1383"},{"taxonomy":"subject-area","embeddable":true,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/subject-area?post=1383"},{"taxonomy":"grade-level","embeddable":true,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/grade-level?post=1383"},{"taxonomy":"resource-audience","embeddable":true,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/resource-audience?post=1383"},{"taxonomy":"resource-format","embeddable":true,"href":"https:\/\/ojen2024.turnbull.co\/fr\/wp-json\/wp\/v2\/resource-format?post=1383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}