
{"id":348,"date":"2008-06-08T18:17:16","date_gmt":"2008-06-08T21:17:16","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=348"},"modified":"2008-06-08T18:17:16","modified_gmt":"2008-06-08T21:17:16","slug":"argentina-tiene-ley-de-delitos-informaticos","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/","title":{"rendered":"Argentina tiene ley de delitos inform\u00c3\u00a1ticos"},"content":{"rendered":"<p>La c\u00c3\u00a1mara de Diputados acaba de convertir en ley, con 172 votos a favor y ninguno en contra, el proyecto de delitos inform\u00c3\u00a1ticos.<\/p>\n<p>Para ver el texto completo, tambi\u00c3\u00a9n se puede ver un informe completo sobre la materia en el blog de Delitos Informaticos.<\/p>\n<p>En la tarde de hoy fue aprobado el proyecto de Ley de Reforma al C\u00c3\u00b3digo Penal que incorpora los delitos relacionados con la inform\u00c3\u00a1tica y las nuevas tecnolog\u00c3\u00adas.<\/p>\n<p>Esta nueva ley, aprobada por unanimidad en ambas C\u00c3\u00a1maras Legislativas, busca penalizar aquellas conductas disvaliosas que hasta ayer no pod\u00c3\u00adan perseguirse debido a su atipicidad; pero hacerlo en forma arm\u00c3\u00b3nica, respetando los tipos penales tradicionales y la estructura del C\u00c3\u00b3digo Penal.<\/p>\n<p>No estamos frente a una ley de delitos inform\u00c3\u00a1ticos que crea nuevos delitos; antes bien, su esp\u00c3\u00adritu es adaptar los tipos penales tradicionales a las nuevas modalidades delictivas, que toman a la inform\u00c3\u00a1tica tanto como medio u objeto del delito.<\/p>\n<p>En este sentido esta reforma, que viene a llenar un vac\u00c3\u00ado legal y nos acerca al grupo de pa\u00c3\u00adses m\u00c3\u00a1s avanzados que ya han receptado este tipo de accionar il\u00c3\u00adcito en sus cuerpos legales, atiende de manera integral problem\u00c3\u00a1ticas tan dis\u00c3\u00admiles como:<br \/>\n\u00c2\u00b0 Penalizaci\u00c3\u00b3n del Da\u00c3\u00b1o Inform\u00c3\u00a1tico<br \/>\n\u00c2\u00b0 Protecci\u00c3\u00b3n de sistemas inform\u00c3\u00a1ticos del Estado y de prestaci\u00c3\u00b3n de Servicios P\u00c3\u00bablicos y Servicios Financieros<br \/>\n\u00c2\u00b0 Penalizaci\u00c3\u00b3n de la Estafa inform\u00c3\u00a1tica<br \/>\n\u00c2\u00b0 Protecci\u00c3\u00b3n de la privacidad de las Comunicaciones Electr\u00c3\u00b3nicas y Datos Electr\u00c3\u00b3nicos<br \/>\n\u00c2\u00b0 Penalizaci\u00c3\u00b3n de la falsificaci\u00c3\u00b3n de documentaci\u00c3\u00b3n electr\u00c3\u00b3nica<br \/>\n\u00c2\u00b0 Protecci\u00c3\u00b3n de las comunicaciones<br \/>\n\u00c2\u00b0 Protecci\u00c3\u00b3n de la evidencia digital<br \/>\n\u00c2\u00b0 Protecci\u00c3\u00b3n de la infancia mediante la persecuci\u00c3\u00b3n de Redes tecnol\u00c3\u00b3gicas de Pedof\u00c3\u00adlia y Pornograf\u00c3\u00ada Infantil.<\/p>\n<p>Desde la ONTI, y en particular desde ArCERT, queremos destacar que todo el proceso de tratamiento del proyecto se present\u00c3\u00b3 de forma realmente alentadora contando con un profundo trabajo legislativo y participaci\u00c3\u00b3n tanto de la sociedad civil como del resto de los Poderes del Estado, proceso del que nos sentimos honrados y agradecidos de haber podido formar parte.<\/p>\n<p>La orden del d\u00c3\u00ada N\u00c2\u00b0 172, bajo cuyo n\u00c3\u00bamero aprob\u00c3\u00b3 hoy la Honorable C\u00c3\u00a1mara de Diputados de la Naci\u00c3\u00b3n la reforma legislativa con las modificaciones introducidas por el Honorable Senado de la Naci\u00c3\u00b3n, puede consultarse aqu\u00c3\u00ad.<\/p>\n<p>Fuente:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"14c10OgkaX\"><p><a href=\"http:\/\/www.delitosinformaticos.com.ar\/blog\/\">Acerca del blog<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Acerca del blog&#8221; &#8212; Delitos Inform\u00e1ticos\" src=\"http:\/\/www.delitosinformaticos.com.ar\/blog\/embed\/#?secret=14c10OgkaX\" data-secret=\"14c10OgkaX\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\nhttp:\/\/www.arcert.gov.ar\/<br \/>\nhttp:\/\/seguinfo.blogspot.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La c\u00c3\u00a1mara de Diputados acaba de convertir en ley, con 172 votos a favor y ninguno en contra, el proyecto de delitos inform\u00c3\u00a1ticos. Para ver el texto completo, tambi\u00c3\u00a9n se puede ver un informe completo sobre la materia en el blog de Delitos Informaticos. En la tarde de hoy fue aprobado el proyecto de Ley [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-348","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Argentina tiene ley de delitos inform\u00c3\u00a1ticos<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Argentina tiene ley de delitos inform\u00c3\u00a1ticos\",\"datePublished\":\"2008-06-08T21:17:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/\"},\"wordCount\":424,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Argentina tiene ley de delitos inform\u00c3\u00a1ticos\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-06-08T21:17:16+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Argentina tiene ley de delitos inform\u00c3\u00a1ticos","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Argentina tiene ley de delitos inform\u00c3\u00a1ticos","datePublished":"2008-06-08T21:17:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/"},"wordCount":424,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/","url":"https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Argentina tiene ley de delitos inform\u00c3\u00a1ticos","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-06-08T21:17:16+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/argentina-tiene-ley-de-delitos-informaticos\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/348\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}