Cyber Security and Habeas Data: The Latin American response to information security and data protection

Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information...

Full description

Autores:
Parraguez Kobek, Luisa
Caldera, Erick
Tipo de recurso:
Article of journal
Fecha de publicación:
2016
Institución:
Universidad Externado de Colombia
Repositorio:
Biblioteca Digital Universidad Externado de Colombia
Idioma:
spa
OAI Identifier:
oai:bdigital.uexternado.edu.co:001/8397
Acceso en línea:
https://bdigital.uexternado.edu.co/handle/001/8397
https://doi.org/10.18601/16577558.n24.07
Palabra clave:
Habeas Data
Latin America
data protection
cybersecurity
Rights
openAccess
License
http://purl.org/coar/access_right/c_abf2
id uexternad2_7756fb24fd2da5d00f8e05019c933cc1
oai_identifier_str oai:bdigital.uexternado.edu.co:001/8397
network_acronym_str uexternad2
network_name_str Biblioteca Digital Universidad Externado de Colombia
repository_id_str
dc.title.spa.fl_str_mv Cyber Security and Habeas Data: The Latin American response to information security and data protection
dc.title.translated.eng.fl_str_mv Cyber Security and Habeas Data: The Latin American response to information security and data protection
title Cyber Security and Habeas Data: The Latin American response to information security and data protection
spellingShingle Cyber Security and Habeas Data: The Latin American response to information security and data protection
Habeas Data
Latin America
data protection
cybersecurity
title_short Cyber Security and Habeas Data: The Latin American response to information security and data protection
title_full Cyber Security and Habeas Data: The Latin American response to information security and data protection
title_fullStr Cyber Security and Habeas Data: The Latin American response to information security and data protection
title_full_unstemmed Cyber Security and Habeas Data: The Latin American response to information security and data protection
title_sort Cyber Security and Habeas Data: The Latin American response to information security and data protection
dc.creator.fl_str_mv Parraguez Kobek, Luisa
Caldera, Erick
dc.contributor.author.spa.fl_str_mv Parraguez Kobek, Luisa
Caldera, Erick
dc.subject.spa.fl_str_mv Habeas Data
Latin America
data protection
cybersecurity
topic Habeas Data
Latin America
data protection
cybersecurity
description Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their  information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.
publishDate 2016
dc.date.accessioned.none.fl_str_mv 2016-11-03 10:43:43
2022-09-08T13:47:22Z
dc.date.available.none.fl_str_mv 2016-11-03 10:43:43
2022-09-08T13:47:22Z
dc.date.issued.none.fl_str_mv 2016-11-03
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.local.eng.fl_str_mv Journal article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ARTREF
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.doi.none.fl_str_mv 10.18601/16577558.n24.07
dc.identifier.eissn.none.fl_str_mv 2346-2132
dc.identifier.issn.none.fl_str_mv 1657-7558
dc.identifier.uri.none.fl_str_mv https://bdigital.uexternado.edu.co/handle/001/8397
dc.identifier.url.none.fl_str_mv https://doi.org/10.18601/16577558.n24.07
identifier_str_mv 10.18601/16577558.n24.07
2346-2132
1657-7558
url https://bdigital.uexternado.edu.co/handle/001/8397
https://doi.org/10.18601/16577558.n24.07
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.bitstream.none.fl_str_mv https://revistas.uexternado.edu.co/index.php/oasis/article/download/4679/5430
https://revistas.uexternado.edu.co/index.php/oasis/article/download/4679/5673
https://revistas.uexternado.edu.co/index.php/oasis/article/download/4679/9083
dc.relation.citationedition.spa.fl_str_mv Núm. 24 , Año 2016 : Julio-Diciembre
dc.relation.citationendpage.none.fl_str_mv 128
dc.relation.citationissue.spa.fl_str_mv 24
dc.relation.citationstartpage.none.fl_str_mv 109
dc.relation.ispartofjournal.spa.fl_str_mv Oasis
dc.relation.references.spa.fl_str_mv Anderson, R. & Moore, T. (2007). Information Security Economics – and Beyond. Advances in Cryptology – crypto 2007, 4622, pp. 68-91. Retrieved from http://www.cl.cam.ac.uk/~rja14/Papers/econ_crypto.pdf
Anderson, B. & Schneier, B. (2004). Economics of Information Security. ieee Security & Privacy. Retrieved from https://www.schneier.com/papereconomics.pdf
Banisar, D. (2011). The Right to Information and Privacy: Balancing Rights and Managing Conflicts. Retrieved from http://wbi.worldbank.org/wbi/Data/wbi/wbicms/files/drupal-acquia/wbi/Right%20to%20Information%20and%20Privacy.pdf
Barrientos, A. & Santibañez, C. (2009). New Forms of Social Assistance and the Evolution of Social Protection in Latin America. Journal of Latin American Studies 41 (01), pp. 1-26
Bazan, V. (2011). Habeas Data in Comparative Law, with Particular Reference to the Bolivian Constitutional Reform. Comparative Media Law Journal (5). Retrieved from http://www.juridicas.unam.mx/publica/rev/comlawj/cont/5/arc/arc4.htm
Blind, P. K. (2006). Building Trust in Government in the Twenty-First Century: Review of Literature and Emerging Issues. 7th Global Forum on Reinventing Government. Retrieved from http://unpan1.un.org/intradoc/groups/public/documents/un/unpan025062.pdf
Brigard & Urrutia Press (2013). Personal Data Regulations in Colombia: The New Legal Trend for Companies. Retrieved from http://www.worldservicesgroup.com/publications.asp?action=article&artid=5572#pdf
Carson, A. (2013). Consent is King in Latin America: Navigating the Eight Existing dpas with a Look to the Future. International Association of Privacy Professionals. Retrieved from https://iapp.org/news/a/2013-06-03-consent-is-king-in-latinamerica-navigating-the-eight-existing/
Chirino Sanchez, A. (1997). Las Tecnologías de la Información y el Proceso Penal. Nexos Costa Rica. Retrieved from http://www.nexos.co.cr/cesdepu/revelec/penaclarkel/Chirino14.htm
Cornell University Law School (n.d.). “Habeas Corpus.” Legal Information Institute. Retrieved from https://www.law.cornell.edu/wex/habeas_corpus
Council of Europe (2001). Convention on Cybercrime. Retrieved from http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=PEmVfagc
Council of Europe. (1981). Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Retrieved from http://www.conventions.coe.int/Treaty/en/Treaties/Html/108.htm
Cruz, X. (2012). Data Protection and Privacy Issues in Latin America. Cloud Times. Retrieved from http://cloudtimes.org/2012/11/21/data-protection-privacy-issues-latin-america/
Derechos Digitales (2016). Internet en México: Derechos humanos en el entorno digital. Mexico City: Derechos Digitales.
DeVries, W. T. (2003). Protecting Privacy in the Digital Age. Berkeley Technology Law Journal, 18 (1), pp. 283-310. Retrieved from http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1407&context=btlj
Dunn Cavelty, M. (2014). Breaking the Cyber-security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20 (3), pp. 701-715.
Falcon, E. (1996). Habeas Data: Concepto y Procedimiento. Buenos Aires: Abeledo Perrot.
García, C. (2016). Acepta MC que padrón en Amazon pertenece al partido. El Universal. Retrieved from http://www.eluniversal.com.mx/articulo/nacion/politica/2016/04/27/acepta-mc-que-padronelectoral-en-amazon-pertenece-al-partido>>
Genderen, R. (2008). Cybercrime investigation and the protection of personal data and privacy. CIUDAD: Economic Crime Division, Council of Europe. Retrieved from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/567%20study5-d-provisional.pdf
Global Project on Cybercrime (2011). Cybercrime Strategies. Economic Crime Division, Council of Europe. Retrieved from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_cy_strats_rep_V20_14oct11.pdf
Gozon, F. E. & Orosa, T. J. (2007). The Sovereign Individual: The Writ of Habeas Data and the Right to Information Privacy. Ateneo Law Journal 52, pp. 648-664
Guadamuz, A. (2000). Habeas Data: The Latin-American Response to Data Protection. Journal of Information, Law, and Technology. Retrieved from http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2000_2/guadamuz
Gutierrez, H. & Korn, D. (2013). Facilitando the Cloud: Data Protection Regulation as a Driver of National Competitiveness in Latin America. University of Miami Inter-American Law Review, 45 (1). Retrieved from http://repository.law.miami.edu/umair/vol45/iss1/5/
Harding, L. (2016). What are the Panama Papers? A Guide to History’s Biggest Data Leak. The Guardian. Retrieved from http://www.theguardian.com/news/2016/apr/03/what-you-need-to-knowabout-the-panama-papers
Higgott, R. (2005). The Theory and Practice of Global and Regional Governance: Accommodating American Exceptionalism and European Pluralism. garnet Working Paper, 1 (5). Retrieved from http://www2.warwick.ac.uk/fac/soc/pais/research/researchcentres/csgr/garnet/workingpapers/0105.pdf
International Telecommunication Union (2016). Itu Releases ict 2015 Figures. Retrieved from http://www.itu.int/net/pressoffice/press_releases/2015/17.aspx#.V05JvPnhDIU
Kirsh, E., Phillips, D. y D. McIntyre. (1996). Recommendations for the Evolution of Cyberlaw. Journal of Computer-Mediated Communication 2 (2).
Laurant, C. (2010). Recent Cyber-crime Court Decisions from Latin America Legal and Policy Developments. Retrieved from http://www.slideshare.net/cedriclaurant/cybercrime-court-decisions-fromlatin-america-legal-amp-policy-developmentshtcia-conference-atlanta-ga-usa-20-sept-2010
Levi, M. & Stoker, L. (2000). Political trust and trustworthiness. Annual Review of Political Science 3, pp. 475-507.
Leiva, A. (2013). Data Protection Law in Spain and Latin America: Survey of Legal Approaches. American Bar Association. Retrieved from http://www.americanbar.org/publications/international_law_news/2012/fall/data_protection_law_spain_latin_america_survey_legal_approaches.html
Litwak, R. S. & King, M. (2015). Cybersecurity treaties may be nice but it’s really every country for itself. Digital Futures Project. Retrieved from https://www.wilsoncenter.org/article/cybersecuritytreaties-may-be-nice-its-really-every-countryfor-itself
Martínez-Herrera, M. (2011). From Habeas Data Action to Omnibus Data Protection: The Latin American Privacy (R)Evolution. White & Case Technology Newsflash. Retrieved from http:// www.whitecase.com/files/Publication/e5d9876abf18-4267-8de7-723c3121e009/Presentation/PublicationAttachment/ab31c92c-c423-4bcba7d7-74c822baaa22/article_From_Habeas_Data_Action_to_Omnibus_Data_Protection.pdf
MicroMarket Monitor (2015). Latin America Cloud Analytics. Retrieved from http://www.micromarketmonitor.com/information-and-communication-technology-industry-2.html
Morgan, S. (2015). Multibillion-Dollar Cybersecurity Markets in Asia Pacific and Latin America. Retrieved from http://sandhill.com/article/multibillion-dollar-cybersecurity-markets-in-asia-pacand-latin-america/oas,
Committee on Political and Juridical Affairs (2012). Comparative Study: Data Protection in the Americas Different existing legal regimes, policies and enforcement mechanisms for the protection of personal data, including domestic legislation, regulation, and self-regulation. Retrieved from http://www.oas.org/es/sla/ddi/docs/cp-cajp-3063-12_en.pdf
OAS, Department of International Law 1 (2012). Data Protection. Retrieved from http://www.oas.org/dil/data_protection.htm
OAS, Department of International Law 2 (2012). Relation between Privacy Protection, Data Protection and Habeas Data. Retrieved from http://www.oas.org/dil/data_protection_privacy_habeas_data.htm
OAS & Trend Micro (2013). Latin America and the Caribbean Cybersecurity Trends and Government Responses. Retrieved from http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-latin-american-and-caribbeancybersecurity-trends-and-government-responses.pdf
Permanent Council of the Organization of American States Committee on Political and Juridical Affairs (2012). Comparative Study: Data Protection in the Americas. Washington, D.C.
PwC. (2015). Cybersecurity in Mexico. Retrieved from file:///C:/Users/Administrator/Downloads/20150917-kc-cybersecurity.pdf
Raigada, A. T. (2009). Reutilización de información pública y protección de datos personales. Revista General de Información y Documentación, pp. 243-264.
Saavedra, B. (2016). Las infraestructuras críticas en América Latina: Conectada, dependiente y vulnerable. Perry Center Occasional Paper, pp. 3-21.
Saavedra, B. (2015). Inteligencia Estratégica en un mundo globalizado en Latinoamérica: Retos y desafíos en el siglo XXI, Revista Policía y Seguridad Pública, 5 (2), pp. 75-106. Retrieved from http://www.lamjol.info/index.php/rpsp/article/view/2326
Saavedra, B. (2015). Cybersecurity in Latin America and the Caribbean: The state of readiness for the defense of cyberspace. William J. Perry Center for Hemispheric Defense Studies, pp. 3-12. Retrieved from http://chds.dodlive.mil/files/2013/12/pubother-saavedra.pdf
Silva, A. C. (2011). El “Nivel Adecuado de Protección” para las transferencias Internacionales de Datos Personales desde la Unión Europea. Revista de Derecho (Valparaíso), pp. 327-356.
Thomas, B. (2007). Policy Brief: Habeas Data as a Policy Toward Corporate Data Aggregation. Retrieved from http://www.eecs.harvard.edu/cs199r/fp/Brett.pdf
Tschentscher, A. & Lehner, C. (2013). The Latin American Model of Constitutional Jurisdiction: Amparo and Judicial Review. Social Science Research Network. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2296004
Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review 4 (5). Retrieved from http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
Westin, A. (1967). Privacy and Freedom. New York: The Bodley Head Ltd.
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by-nc-sa/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv http://purl.org/coar/access_right/c_abf2
https://creativecommons.org/licenses/by-nc-sa/4.0/
dc.format.mimetype.spa.fl_str_mv application/pdf
text/html
application/xml
dc.publisher.spa.fl_str_mv Facultad de Finanzas, Gobierno y Relaciones Internacionales
dc.source.spa.fl_str_mv https://revistas.uexternado.edu.co/index.php/oasis/article/view/4679
institution Universidad Externado de Colombia
bitstream.url.fl_str_mv https://bdigital.uexternado.edu.co/bitstreams/6fc2ae5c-798a-4d3f-9fa9-7a5964b36c40/download
bitstream.checksum.fl_str_mv d423bd539b940cf1d7a41875ee6f7e13
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Universidad Externado de Colombia
repository.mail.fl_str_mv metabiblioteca@metabiblioteca.org
_version_ 1814100363166351360
spelling Parraguez Kobek, Luisa658a43a6-98cc-45b0-b16a-5d8414a738f8Caldera, Erickd2566e04-874e-4a62-a7f2-3a05af1d41772016-11-03 10:43:432022-09-08T13:47:22Z2016-11-03 10:43:432022-09-08T13:47:22Z2016-11-03Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their  information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.application/pdftext/htmlapplication/xml10.18601/16577558.n24.072346-21321657-7558https://bdigital.uexternado.edu.co/handle/001/8397https://doi.org/10.18601/16577558.n24.07spaFacultad de Finanzas, Gobierno y Relaciones Internacionaleshttps://revistas.uexternado.edu.co/index.php/oasis/article/download/4679/5430https://revistas.uexternado.edu.co/index.php/oasis/article/download/4679/5673https://revistas.uexternado.edu.co/index.php/oasis/article/download/4679/9083Núm. 24 , Año 2016 : Julio-Diciembre12824109OasisAnderson, R. & Moore, T. (2007). Information Security Economics – and Beyond. Advances in Cryptology – crypto 2007, 4622, pp. 68-91. Retrieved from http://www.cl.cam.ac.uk/~rja14/Papers/econ_crypto.pdfAnderson, B. & Schneier, B. (2004). Economics of Information Security. ieee Security & Privacy. Retrieved from https://www.schneier.com/papereconomics.pdfBanisar, D. (2011). The Right to Information and Privacy: Balancing Rights and Managing Conflicts. Retrieved from http://wbi.worldbank.org/wbi/Data/wbi/wbicms/files/drupal-acquia/wbi/Right%20to%20Information%20and%20Privacy.pdfBarrientos, A. & Santibañez, C. (2009). New Forms of Social Assistance and the Evolution of Social Protection in Latin America. Journal of Latin American Studies 41 (01), pp. 1-26Bazan, V. (2011). Habeas Data in Comparative Law, with Particular Reference to the Bolivian Constitutional Reform. Comparative Media Law Journal (5). Retrieved from http://www.juridicas.unam.mx/publica/rev/comlawj/cont/5/arc/arc4.htmBlind, P. K. (2006). Building Trust in Government in the Twenty-First Century: Review of Literature and Emerging Issues. 7th Global Forum on Reinventing Government. Retrieved from http://unpan1.un.org/intradoc/groups/public/documents/un/unpan025062.pdfBrigard & Urrutia Press (2013). Personal Data Regulations in Colombia: The New Legal Trend for Companies. Retrieved from http://www.worldservicesgroup.com/publications.asp?action=article&artid=5572#pdfCarson, A. (2013). Consent is King in Latin America: Navigating the Eight Existing dpas with a Look to the Future. International Association of Privacy Professionals. Retrieved from https://iapp.org/news/a/2013-06-03-consent-is-king-in-latinamerica-navigating-the-eight-existing/Chirino Sanchez, A. (1997). Las Tecnologías de la Información y el Proceso Penal. Nexos Costa Rica. Retrieved from http://www.nexos.co.cr/cesdepu/revelec/penaclarkel/Chirino14.htmCornell University Law School (n.d.). “Habeas Corpus.” Legal Information Institute. Retrieved from https://www.law.cornell.edu/wex/habeas_corpusCouncil of Europe (2001). Convention on Cybercrime. Retrieved from http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=PEmVfagcCouncil of Europe. (1981). Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Retrieved from http://www.conventions.coe.int/Treaty/en/Treaties/Html/108.htmCruz, X. (2012). Data Protection and Privacy Issues in Latin America. Cloud Times. Retrieved from http://cloudtimes.org/2012/11/21/data-protection-privacy-issues-latin-america/Derechos Digitales (2016). Internet en México: Derechos humanos en el entorno digital. Mexico City: Derechos Digitales.DeVries, W. T. (2003). Protecting Privacy in the Digital Age. Berkeley Technology Law Journal, 18 (1), pp. 283-310. Retrieved from http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1407&context=btljDunn Cavelty, M. (2014). Breaking the Cyber-security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20 (3), pp. 701-715.Falcon, E. (1996). Habeas Data: Concepto y Procedimiento. Buenos Aires: Abeledo Perrot.García, C. (2016). Acepta MC que padrón en Amazon pertenece al partido. El Universal. Retrieved from http://www.eluniversal.com.mx/articulo/nacion/politica/2016/04/27/acepta-mc-que-padronelectoral-en-amazon-pertenece-al-partido>>Genderen, R. (2008). Cybercrime investigation and the protection of personal data and privacy. CIUDAD: Economic Crime Division, Council of Europe. Retrieved from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/567%20study5-d-provisional.pdfGlobal Project on Cybercrime (2011). Cybercrime Strategies. Economic Crime Division, Council of Europe. Retrieved from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079_cy_strats_rep_V20_14oct11.pdfGozon, F. E. & Orosa, T. J. (2007). The Sovereign Individual: The Writ of Habeas Data and the Right to Information Privacy. Ateneo Law Journal 52, pp. 648-664Guadamuz, A. (2000). Habeas Data: The Latin-American Response to Data Protection. Journal of Information, Law, and Technology. Retrieved from http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/2000_2/guadamuzGutierrez, H. & Korn, D. (2013). Facilitando the Cloud: Data Protection Regulation as a Driver of National Competitiveness in Latin America. University of Miami Inter-American Law Review, 45 (1). Retrieved from http://repository.law.miami.edu/umair/vol45/iss1/5/Harding, L. (2016). What are the Panama Papers? A Guide to History’s Biggest Data Leak. The Guardian. Retrieved from http://www.theguardian.com/news/2016/apr/03/what-you-need-to-knowabout-the-panama-papersHiggott, R. (2005). The Theory and Practice of Global and Regional Governance: Accommodating American Exceptionalism and European Pluralism. garnet Working Paper, 1 (5). Retrieved from http://www2.warwick.ac.uk/fac/soc/pais/research/researchcentres/csgr/garnet/workingpapers/0105.pdfInternational Telecommunication Union (2016). Itu Releases ict 2015 Figures. Retrieved from http://www.itu.int/net/pressoffice/press_releases/2015/17.aspx#.V05JvPnhDIUKirsh, E., Phillips, D. y D. McIntyre. (1996). Recommendations for the Evolution of Cyberlaw. Journal of Computer-Mediated Communication 2 (2).Laurant, C. (2010). Recent Cyber-crime Court Decisions from Latin America Legal and Policy Developments. Retrieved from http://www.slideshare.net/cedriclaurant/cybercrime-court-decisions-fromlatin-america-legal-amp-policy-developmentshtcia-conference-atlanta-ga-usa-20-sept-2010Levi, M. & Stoker, L. (2000). Political trust and trustworthiness. Annual Review of Political Science 3, pp. 475-507.Leiva, A. (2013). Data Protection Law in Spain and Latin America: Survey of Legal Approaches. American Bar Association. Retrieved from http://www.americanbar.org/publications/international_law_news/2012/fall/data_protection_law_spain_latin_america_survey_legal_approaches.htmlLitwak, R. S. & King, M. (2015). Cybersecurity treaties may be nice but it’s really every country for itself. Digital Futures Project. Retrieved from https://www.wilsoncenter.org/article/cybersecuritytreaties-may-be-nice-its-really-every-countryfor-itselfMartínez-Herrera, M. (2011). From Habeas Data Action to Omnibus Data Protection: The Latin American Privacy (R)Evolution. White & Case Technology Newsflash. Retrieved from http:// www.whitecase.com/files/Publication/e5d9876abf18-4267-8de7-723c3121e009/Presentation/PublicationAttachment/ab31c92c-c423-4bcba7d7-74c822baaa22/article_From_Habeas_Data_Action_to_Omnibus_Data_Protection.pdfMicroMarket Monitor (2015). Latin America Cloud Analytics. Retrieved from http://www.micromarketmonitor.com/information-and-communication-technology-industry-2.htmlMorgan, S. (2015). Multibillion-Dollar Cybersecurity Markets in Asia Pacific and Latin America. Retrieved from http://sandhill.com/article/multibillion-dollar-cybersecurity-markets-in-asia-pacand-latin-america/oas,Committee on Political and Juridical Affairs (2012). Comparative Study: Data Protection in the Americas Different existing legal regimes, policies and enforcement mechanisms for the protection of personal data, including domestic legislation, regulation, and self-regulation. Retrieved from http://www.oas.org/es/sla/ddi/docs/cp-cajp-3063-12_en.pdfOAS, Department of International Law 1 (2012). Data Protection. Retrieved from http://www.oas.org/dil/data_protection.htmOAS, Department of International Law 2 (2012). Relation between Privacy Protection, Data Protection and Habeas Data. Retrieved from http://www.oas.org/dil/data_protection_privacy_habeas_data.htmOAS & Trend Micro (2013). Latin America and the Caribbean Cybersecurity Trends and Government Responses. Retrieved from http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-latin-american-and-caribbeancybersecurity-trends-and-government-responses.pdfPermanent Council of the Organization of American States Committee on Political and Juridical Affairs (2012). Comparative Study: Data Protection in the Americas. Washington, D.C.PwC. (2015). Cybersecurity in Mexico. Retrieved from file:///C:/Users/Administrator/Downloads/20150917-kc-cybersecurity.pdfRaigada, A. T. (2009). Reutilización de información pública y protección de datos personales. Revista General de Información y Documentación, pp. 243-264.Saavedra, B. (2016). Las infraestructuras críticas en América Latina: Conectada, dependiente y vulnerable. Perry Center Occasional Paper, pp. 3-21.Saavedra, B. (2015). Inteligencia Estratégica en un mundo globalizado en Latinoamérica: Retos y desafíos en el siglo XXI, Revista Policía y Seguridad Pública, 5 (2), pp. 75-106. Retrieved from http://www.lamjol.info/index.php/rpsp/article/view/2326Saavedra, B. (2015). Cybersecurity in Latin America and the Caribbean: The state of readiness for the defense of cyberspace. William J. Perry Center for Hemispheric Defense Studies, pp. 3-12. Retrieved from http://chds.dodlive.mil/files/2013/12/pubother-saavedra.pdfSilva, A. C. (2011). El “Nivel Adecuado de Protección” para las transferencias Internacionales de Datos Personales desde la Unión Europea. Revista de Derecho (Valparaíso), pp. 327-356.Thomas, B. (2007). Policy Brief: Habeas Data as a Policy Toward Corporate Data Aggregation. Retrieved from http://www.eecs.harvard.edu/cs199r/fp/Brett.pdfTschentscher, A. & Lehner, C. (2013). The Latin American Model of Constitutional Jurisdiction: Amparo and Judicial Review. Social Science Research Network. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2296004Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review 4 (5). Retrieved from http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.htmlWestin, A. (1967). Privacy and Freedom. New York: The Bodley Head Ltd.info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2https://creativecommons.org/licenses/by-nc-sa/4.0/https://revistas.uexternado.edu.co/index.php/oasis/article/view/4679Habeas DataLatin Americadata protectioncybersecurityCyber Security and Habeas Data: The Latin American response to information security and data protectionCyber Security and Habeas Data: The Latin American response to information security and data protectionArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85Textinfo:eu-repo/semantics/articleJournal articlehttp://purl.org/redcol/resource_type/ARTREFinfo:eu-repo/semantics/publishedVersionPublicationOREORE.xmltext/xml2662https://bdigital.uexternado.edu.co/bitstreams/6fc2ae5c-798a-4d3f-9fa9-7a5964b36c40/downloadd423bd539b940cf1d7a41875ee6f7e13MD51001/8397oai:bdigital.uexternado.edu.co:001/83972023-08-14 15:04:08.815https://creativecommons.org/licenses/by-nc-sa/4.0/https://bdigital.uexternado.edu.coUniversidad Externado de Colombiametabiblioteca@metabiblioteca.org