{"id":1056,"date":"2020-10-16T17:15:59","date_gmt":"2020-10-16T17:15:59","guid":{"rendered":"https:\/\/dev.aspertic.org\/?p=1056"},"modified":"2023-01-17T09:59:31","modified_gmt":"2023-01-17T09:59:31","slug":"k-informe-de-aplicacion-de-la-compliance-a-los-delitos-informaticos","status":"publish","type":"post","link":"https:\/\/aspertic.org\/en\/2020\/10\/16\/k-informe-de-aplicacion-de-la-compliance-a-los-delitos-informaticos\/","title":{"rendered":"K. Informe de Aplicaci\u00f3n de la compliance a los delitos inform\u00e1ticos"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1056\" class=\"elementor elementor-1056\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17307151 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17307151\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26647435\" data-id=\"26647435\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b94423 elementor-widget elementor-widget-post-info\" data-id=\"1b94423\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-1b55ad0 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/aspertic.org\/en\/2020\/10\/16\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>October 16, 2020<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f3623c8 elementor-widget elementor-widget-text-editor\" data-id=\"1f3623c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Los nuevos retos y las nuevas amenazas contra la seguridad de los ciudadanos en general, y las infraestructuras cr\u00edticas y estrat\u00e9gicas, en particular, son exponentes del incremento y la evoluci\u00f3n de una inseguridad ciudadana global. Por tanto, estamos ante un necesario cambio de paradigma en relaci\u00f3n con el perfil, misi\u00f3n y visi\u00f3n de la seguridad integral, correspondi\u00e9ndose a nuevas asunciones legales. Asimismo, directivas como la Directiva 2002\/58\/CE del Parlamento Europeo y del Consejo, de 12 de julio de 2002, relativa al tratamiento de los datos personales y a la protecci\u00f3n de la intimidad en el sector de las comunicaciones electr\u00f3nicas (Directiva sobre la privacidad y las comunicaciones electr\u00f3nicas), contin\u00faa esperando la trasposici\u00f3n aunque est\u00e1 en vigor desde 2003.<\/p><p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Los nuevos retos y las nuevas amenazas contra la seguridad de los ciudadanos en general, y las infraestructuras cr\u00edticas y estrat\u00e9gicas, en particular, son exponentes del incremento y la evoluci\u00f3n de una inseguridad ciudadana global. Por tanto, estamos ante un necesario cambio de paradigma en relaci\u00f3n con el perfil, misi\u00f3n y visi\u00f3n de la seguridad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1158,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1056","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"jetpack_featured_media_url":"https:\/\/aspertic.org\/wp-content\/uploads\/sites\/12\/2022\/11\/gdpr-3285252_640.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/posts\/1056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/comments?post=1056"}],"version-history":[{"count":8,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/posts\/1056\/revisions"}],"predecessor-version":[{"id":2261,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/posts\/1056\/revisions\/2261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/media\/1158"}],"wp:attachment":[{"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/media?parent=1056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/categories?post=1056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aspertic.org\/en\/wp-json\/wp\/v2\/tags?post=1056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}