{"id":4424,"date":"2026-05-07T06:53:58","date_gmt":"2026-05-07T06:53:58","guid":{"rendered":"https:\/\/cyber-ihedn.fr\/?p=4424"},"modified":"2026-05-13T10:51:02","modified_gmt":"2026-05-13T10:51:02","slug":"inscription-25-06-2026-table-ronde-lextraterritorialite-a-lere-de-la-souverainete-numerique-jusquou-le-droit-peut-il-aller","status":"publish","type":"post","link":"https:\/\/cyber-ihedn.fr\/en\/inscription-25-06-2026-table-ronde-lextraterritorialite-a-lere-de-la-souverainete-numerique-jusquou-le-droit-peut-il-aller\/","title":{"rendered":"[INSCRIPTION] 25\/06\/2026 : table ronde \u00ab\u00a0L&rsquo;extraterritorialit\u00e9 \u00e0 l&rsquo;\u00e8re de la souverainet\u00e9 num\u00e9rique : jusqu&rsquo;o\u00f9 le droit peut-il aller ?\u00a0\u00bb"},"content":{"rendered":"<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-large is-resized\">\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4425 size-large aligncenter\" style=\"width: 600px;\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1024x574.jpeg\" alt=\"\" width=\"696\" height=\"390\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1024x574.jpeg 1024w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-300x168.jpeg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-768x430.jpeg 768w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1536x861.jpeg 1536w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-2048x1148.jpeg 2048w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-18x10.jpeg 18w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-749x420.jpeg 749w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1499x840.jpeg 1499w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-696x390.jpeg 696w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1392x780.jpeg 1392w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1068x599.jpeg 1068w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/AdobeStock_798729069-1920x1076.jpeg 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\r\n<\/figure>\r\n<h1 class=\"wp-block-heading has-text-align-center\" style=\"text-align: center;\">Round table<\/h1>\r\n<\/div>\r\n\r\n\r\n<h2 class=\"wp-block-heading has-text-align-center\" style=\"text-align: center;\"><strong><em>Extraterritoriality in the age of digital sovereignty: how far can the law go?<\/em><\/strong><\/h2>\r\n\r\n\r\n\r\n<h1 class=\"wp-block-heading has-text-align-center\" style=\"text-align: center;\">Thursday 25 June 2026 from 6.30 p.m. to 8.00 p.m.<\/h1>\r\n\r\n\r\n\r\n<h1 class=\"wp-block-heading has-text-align-center\" style=\"text-align: center;\">\u00c9cole militaire (Paris 7e)<\/h1>\r\n\r\n\r\n\r\n<p style=\"text-align: left;\">La\u00a0<strong>Chaire Souverainet\u00e9 num\u00e9rique et cyber \u2013 IHEDN<\/strong> is organising its next event on the theme of\u2019<strong>extraterritoriality of law in the age of digital sovereignty<\/strong>.<\/p>\r\n<p>Today, the abundant use of extraterritoriality in the national digital policy of many States reveals a transformation of this legal instrument of State competence (derived from its sovereignty) into a strategic tool (of \u00abdigital sovereignty\u00bb). This is why it is necessary to examine the abuses of these practices and to discuss the legal safeguards put in place to combat this excessive expansion of digital extraterritoriality.<\/p>\r\n<p id=\"isPasted\" style=\"text-align: left;\">See you on <strong>Thursday 25 June <\/strong>2026 at 6.30pm, at the\u2019<strong>Military school<\/strong>\u00a0(Paris 7e).<\/p>\r\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.paris-ecole-militaire.fr\/fr\/forms\/tablerondesouverainetenumerique\" target=\"_blank\" rel=\"noopener\"><span class=\"td_btn td_btn_md td_default_btn\">REGISTRATION FORM<\/span><\/a><\/p>\r\n<p style=\"text-align: center;\"><strong>A request for registration does not constitute acceptance<\/strong><\/p>\r\n<p><em>Digital extraterritoriality is attracting increasing interest, as states see it as a central instrument of their national digital policies. It is often associated with one state (the United States) and seen as a challenge to be overcome, closely linked to foreign dependencies. In order to \u00abcombat extraterritoriality\u00bb, it is common to adopt certain reflexes, such as \u00ablocalising data\u00bb, \u00abcreating a sovereign cloud\u00bb, \u00abusing national companies\u00bb and so on. However, these convictions are now being undermined by the abusive use of extraterritoriality in the digital domain. This practice is leading to a veritable \u00abclash of extraterritorialities\u00bb, with certain States attempting to appropriate extraterritoriality politically in order to promote their own approach, and diverting the initial objective of the legal mechanism. Extraterritoriality is a well-established legal concept in international law. Extraterritoriality is a mechanism by which a State can extend its powers (to issue or even apply the law) beyond its borders, provided that it justifies this on the basis of a connecting document and that the foreign State consents (while respecting its sovereignty). Today, the legal instrument of extraterritoriality, which stems from State sovereignty, is gradually becoming a strategic tool of State \u00abdigital sovereignty\u00bb. These observations contribute to a misunderstanding of the concept of extraterritoriality in the digital age by the general public.<\/em><\/p>\r\n<p><em>This round table brings together a number of legal experts who will attempt to shed light on the debates surrounding the extraterritoriality of law in the digital age, its current use and the implications.\u00a0<\/em><\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\"><\/div>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Experienced speakers<\/strong><\/h2>\r\n<figure class=\"wp-block-image size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4428 size-full\" style=\"width: 250px;\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6.jpg\" alt=\"\" width=\"1685\" height=\"1685\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6.jpg 1685w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-300x300.jpg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-1024x1024.jpg 1024w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-150x150.jpg 150w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-768x768.jpg 768w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-1536x1536.jpg 1536w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-12x12.jpg 12w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-420x420.jpg 420w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-840x840.jpg 840w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-696x696.jpg 696w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-1392x1392.jpg 1392w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/PORTRAIT-BB-6-1068x1068.jpg 1068w\" sizes=\"auto, (max-width: 1685px) 100vw, 1685px\" \/><\/figure>\r\n<p>\r\n\r\n<\/p>\r\n<p><strong>Brunessen Bertrand<\/strong><br \/>University Professor<\/p>\r\n\r\n\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4131 size-full\" style=\"width: 250px;\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2024\/10\/JEAN-FRANCOIS-FUNKE-carre.jpg\" alt=\"\" width=\"709\" height=\"709\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2024\/10\/JEAN-FRANCOIS-FUNKE-carre.jpg 709w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2024\/10\/JEAN-FRANCOIS-FUNKE-carre-300x300.jpg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2024\/10\/JEAN-FRANCOIS-FUNKE-carre-150x150.jpg 150w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2024\/10\/JEAN-FRANCOIS-FUNKE-carre-420x420.jpg 420w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2024\/10\/JEAN-FRANCOIS-FUNKE-carre-696x696.jpg 696w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/figure>\r\n\r\n\r\n\r\n<p><strong>Jean-Fran\u00e7ois Funke<\/strong><br \/>Lawyer for new technologies<\/p>\r\n<figure class=\"wp-block-image size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4426 size-full\" style=\"width: 250px;\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/1605951362105.jpg\" alt=\"\" width=\"383\" height=\"383\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/1605951362105.jpg 383w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/1605951362105-300x300.jpg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/1605951362105-150x150.jpg 150w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/1605951362105-12x12.jpg 12w\" sizes=\"auto, (max-width: 383px) 100vw, 383px\" \/><\/figure>\r\n<p>\r\n\r\n<\/p>\r\n<p><strong>Marc Watin-Augouard<br \/><\/strong>Army General<\/p>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Animation<\/strong><\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-medium is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-4427 size-full\" style=\"width: 250px;\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/Esther-NOEL-photo.jpg\" alt=\"\" width=\"386\" height=\"386\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/Esther-NOEL-photo.jpg 386w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/Esther-NOEL-photo-300x300.jpg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/Esther-NOEL-photo-150x150.jpg 150w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/05\/Esther-NOEL-photo-12x12.jpg 12w\" sizes=\"auto, (max-width: 386px) 100vw, 386px\" \/><\/figure>\r\n\r\n\r\n\r\n<p><strong>Esther No\u00ebl<br \/><\/strong>Doctor of Law<br \/>Permanent researcher<br \/>Digital Sovereignty and Cyber Chair - IHEDN<\/p>","protected":false},"excerpt":{"rendered":"<p>L&rsquo;extraterritorialit\u00e9 \u00e0 l&rsquo;\u00e8re de la souverainet\u00e9 num\u00e9rique : jusqu&rsquo;o\u00f9 le droit peut-il aller ? Jeudi 25 juin 2026 de 18h30 \u00e0 20h00 \u00c9cole militaire (Paris 7e) La\u00a0Chaire Souverainet\u00e9 num\u00e9rique et cyber \u2013 IHEDN organise son prochain \u00e9v\u00e9nement sur le th\u00e8me de l&rsquo;extraterritorialit\u00e9 du droit \u00e0 l&rsquo;\u00e8re de la souverainet\u00e9 num\u00e9rique. Aujourd\u2019hui, l\u2019utilisation abondante de l\u2019extraterritorialit\u00e9 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,355],"tags":[602,441,420,425,494,547,601,431,531,456,422,528,446],"class_list":{"0":"post-4424","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-activites","8":"category-activites-evenements-portes-par-la-chaire","9":"tag-brunessen-bertrand","10":"tag-chaire-cyber-et-souverainete-numerique-ihedn","11":"tag-conference","12":"tag-cybersecurite","13":"tag-droit","14":"tag-esther-noel","15":"tag-extraterritorialite","16":"tag-ihedn","17":"tag-jean-francois-funke","18":"tag-marc-watin-augouard","19":"tag-souverainete-numerique","20":"tag-souverainete-numerique-et-cybersecurite","21":"tag-table-ronde"},"_links":{"self":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/4424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=4424"}],"version-history":[{"count":11,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/4424\/revisions"}],"predecessor-version":[{"id":4440,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/4424\/revisions\/4440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/media\/4429"}],"wp:attachment":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=4424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=4424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=4424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}