
{"id":1323,"date":"2011-04-21T10:35:05","date_gmt":"2011-04-21T13:35:05","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1323"},"modified":"2011-04-21T10:35:05","modified_gmt":"2011-04-21T13:35:05","slug":"confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/","title":{"rendered":"Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d"},"content":{"rendered":"<div id=\"Copt\"><em><strong>Lo confirm\u00f3 la C\u00e1mara del Crimen al   considerar que\u00a0el espionaje\u00a0a un correo electr\u00f3nico es\u00a0igual al de\u00a0una   correspondencia, porque para\u00a0la legislaci\u00f3n y jurisprudencia un   e-mail\u00a0es lo mismo\u00a0que una carta de correo convencional<\/strong><\/em>.<\/div>\n<div id=\"Desc\">\n<div>\n<div><img decoding=\"async\" id=\"imagen121631\" src=\"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456\" alt=\"\" \/><\/div>\n<div>Para la Ley es lo mismo violar un e-mail o una carta.<\/div>\n<\/div>\n<\/div>\n<div id=\"Desc\">La  C\u00e1mara del Crimen ratific\u00f3 que la violaci\u00f3n de un correo  electr\u00f3nico  es un delito de competencia &#8220;federal&#8221;, ya que seg\u00fan la  legislaci\u00f3n y la  jurisprudencia un e-mail es igual que una carta de  correo  convencional.<\/p>\n<p>As\u00ed lo resolvieron los integrantes de la Sala Sexta de la C\u00e1mara del   Crimen, Marcelo Lucini y Mario Filozof, al destrabar una cuesti\u00f3n de   competencia entre un juzgado de instrucci\u00f3n y otro federal.<\/p>\n<p>El caso est\u00e1 vinculado con la violaci\u00f3n del correo electr\u00f3nico de una   menor de edad, cuya identidad se mantiene en reserva. La causa recay\u00f3   inicialmente en el juzgado de instrucci\u00f3n n\u00famero uno, a cargo del juez   Miguel Salv\u00e1, quien entendi\u00f3 que deb\u00eda ser su colega del fuero federal   Sergio Torres quien deb\u00eda hacerse cargo de la investigaci\u00f3n.<\/p>\n<p>La C\u00e1mara, citando legislaci\u00f3n de sanci\u00f3n reciente y fallos de la Corte   Suprema, entendi\u00f3 que &#8220;el presunto acceso ileg\u00edtimo a una cuenta de   correo electr\u00f3nico podr\u00eda configurar una violaci\u00f3n de correspondencia,   cuesti\u00f3n de exclusiva competencia del fuero de Excepci\u00f3n&#8221;.<\/p><\/div>\n<div id=\"Desc\">Fuente:<a href=\"http:\/\/www.elargentino.com\/nota-135414-Violar-los-e-mails-es-un-delito-federal.html\">elargentino.com<\/a><\/div>\n<div>Visto en:\u00a0 <a href=\"http:\/\/seguridad-informacion.blogspot.com\">Cryptex<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lo confirm\u00f3 la C\u00e1mara del Crimen al considerar que\u00a0el espionaje\u00a0a un correo electr\u00f3nico es\u00a0igual al de\u00a0una correspondencia, porque para\u00a0la legislaci\u00f3n y jurisprudencia un e-mail\u00a0es lo mismo\u00a0que una carta de correo convencional. Para la Ley es lo mismo violar un e-mail o una carta. La C\u00e1mara del Crimen ratific\u00f3 que la violaci\u00f3n de un correo electr\u00f3nico [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1323","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-\u201cfederal\u201d\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d\",\"datePublished\":\"2011-04-21T13:35:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/\"},\"wordCount\":260,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456\",\"datePublished\":\"2011-04-21T13:35:05+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage\",\"url\":\"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456\",\"contentUrl\":\"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-\u201cfederal\u201d\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d","datePublished":"2011-04-21T13:35:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/"},"wordCount":260,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage"},"thumbnailUrl":"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/","url":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Confirman que en en Argentina, violar los e-mails es un delito \u201cfederal\u201d","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage"},"thumbnailUrl":"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456","datePublished":"2011-04-21T13:35:05+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/confirman-que-en-en-argentina-violar-los-e-mails-es-un-delito-%e2%80%9cfederal%e2%80%9d\/#primaryimage","url":"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456","contentUrl":"http:\/\/www.elargentino.com\/Files\/download.aspx?Id=121631.jpg&amp;Width=456"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1323"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1323\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1323\/revisions\/1324"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}