{"id":113344,"date":"2025-05-12T12:23:15","date_gmt":"2025-05-12T16:23:15","guid":{"rendered":"https:\/\/reinickeostria.com\/?p=113344"},"modified":"2025-05-12T13:12:48","modified_gmt":"2025-05-12T17:12:48","slug":"identidades-hackeadas-la-deuda-pendiente-de-bolivia-con-la-proteccion-penal-de-los-datos-digitales","status":"publish","type":"post","link":"https:\/\/reinickeostria.com\/en\/identidades-hackeadas-la-deuda-pendiente-de-bolivia-con-la-proteccion-penal-de-los-datos-digitales\/","title":{"rendered":"Identities Hacked: the outstanding debt of Bolivia with the criminal-law protection of digital data"},"content":{"rendered":"[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_image src=\u00bbhttps:\/\/reinickeostria.com\/wp-content\/uploads\/2025\/05\/Identidades-Hackeadas-la-deuda-pendiente-de-Bolivia-con-la-proteccion-penal-de-los-datos-digitales-scaled.png\u00bb title_text=\u00bbIdentidades Hackeadas la deuda pendiente de Bolivia con la protecci\u00f3n penal de los datos digitales\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<h1>Improper use of proprietary data on computer media in Bolivia: background, legislation, and reform proposal<\/h1>\n<p>&nbsp;<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<div>\n<p class=\"p1\">Computer crime has experienced a <span class=\"s1\"><b>significant increase in Bolivia<\/b><\/span> in recent years, reflecting a global trend where the cyber crimes grow to the beat of the scan. According to the UN, more than three-quarters of cybercrime to the global level today would be linked to organised crime.<\/p>\n<p class=\"p1\">Bolivia, as part of this phenomenon, faces an increase of illicit as <span class=\"s1\"><b>impersonation of digital identity<\/b><\/span> and unauthorized use of personal data in various electronics environments. This growth is occurring in a context of structural weaknesses: Bolivia is ranked <i>79<\/i> of the world (the last of Latin America) in preparation against threats of cybersecurity, which shows the <span class=\"s1\"><b>vulnerability of the country<\/b><\/span> in the face of these new crimes.<\/p>\n<\/div>\n<div><\/div>\n<div><\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb|auto||2px||\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<p class=\"p1\">In Bolivia, the proliferation of <span class=\"s1\"><b>scams digital, fraud, online banking, improper access to personal accounts, and other computer-related crimes<\/b><\/span> it has caused economic losses, damages to the privacy and security risks citizen. The penetration of mass Internet and social networks, together with the <span class=\"s1\"><b>lack of knowledge of basic measures of cyber security on the part of the population<\/b><\/span>he has provided opportunities for criminals to exploit technology for illicit purposes. This boom crime is aggravated by the lack of complaint: experts point out that the shame of the victims, the distrust in the justice and the lack of knowledge in digital security are <i>three main causes<\/i> that many cybercrimes are not reported in Bolivia. These factors have allowed that many incidents go unpunished, encouraging recidivism.<\/p>\n<p class=\"p1\">Given this scenario, it is essential to <span class=\"s1\"><b>contextualize the growth of computer crime in Bolivia<\/b><\/span> and critically analyze the response of the law. Then, we present recent statistics on computer crime in the country, a review of bolivian law (including the failed attempt to reform criminal, 2017), comparisons with legal frameworks of neighbouring countries, and expert opinions on deficiencies in current regulations. Finally, we will propose a <i>making it a criminal offence-specific<\/i> for the crime of improper use of proprietary data on computer media, as part of a necessary legal reform integral.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<div>\n<h1>Recent statistics of computer crimes in Bolivia<o:p><\/o:p><\/h1>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<p class=\"p1\">The magnitude of the problem in Bolivia is reflected in the <span class=\"s1\"><b>statistics compiled by 2025<\/b><\/span>. In the year 2023, the <i>Observatory of Computer-related Crimes Bolivia (ODIB)<\/i> registered <span class=\"s1\"><b>3.768 cases of cyber crimes<\/b><\/span> in the country. These figures represent a considerable increase compared to previous years; for example, it reported an increase in the <span class=\"s1\"><b>43% in the scams digital during the first half of 2023<\/b><\/span> in comparison with the same period in 2022. The computer crimes most commonly include the <span class=\"s1\"><b>fraud or scam computer<\/b><\/span>, online threats and <i>grooming<\/i> (sexual harassment digital). Jurisdictions <i>La Paz, Santa Cruz and Cochabamba<\/i> account for the higher incidence of these crimes <span class=\"s1\"><\/span>, which coincides with the regions of major economic activity and use of technology.<\/p>\n<p class=\"p1\">Within the modalities of cybercrime that are of greatest concern in Bolivia are those related to the <span class=\"s1\"><b>identity theft and the misuse of personal or financial data<\/b><\/span>. Police authorities have investigated cases of kidnapping of messaging accounts (for example, accounts of <i>WhatsApp<\/i>) where the criminal impersonates the identity of the victim to request their contacts, money transfers to bank accounts, using deceptions credible. This method, known as <i>fraud WhatsApp<\/i>it has become recurrent and difficult to pursue with figures traditional criminal court. In the same way, are reported increasingly <span class=\"s1\"><b>creations of fake profiles in social networks<\/b><\/span> (Facebook, TikTok, Instagram) in order to defame, defraud, or affect the reputation of people, public and private. These behaviors involve the unlawful use of outside data (name, photographs, information and staff) to commit crimes ranging from the scam estate until the violation of the honor, or privacy.<\/p>\n<p class=\"p1\">The official data and independent studies paint a troubling picture. Women accounted for 54.7% of the victims of computer crimes in Bolivia, being especially vulnerable to online frauds and extortions of a personal nature. For every age group, young people from 16 to 35 years are the most affected, given their greater use of social networks and digital platforms. In addition, incidents resonant have exposed flaws in the protection of data: for example, in 2024 it denounced the alleged sale on underground forums of a database with personal information <span class=\"s1\"><b>12.5 million bolivians<\/b><\/span>, which broke out alerts on the security of information in the hands of public and private entities.<\/p>\n<p class=\"p1\">In summary, the statistics until 2025 confirm that Bolivia faces a <span class=\"s1\"><b>rising tide of cybercrime<\/b><\/span>, among which the <span class=\"s1\"><b>impersonation digital identity and the unauthorised use of personal data<\/b><\/span> occupy a prominent place. This phenomenon has overwhelmed the response capacity of the existing legal framework, generating a gap between the reality of the criminal and legal tools to fight it. Below, we examine how the legislation bolivian have tried (and sometimes failed) to give an answer to these challenges.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<h1>Legislation bolivian current in the field of computer crimes<br \/><br \/><o:p><\/o:p><\/h1>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<h4><strong>Current Criminal code and current scope<\/strong><\/h4>\n<p>&nbsp;<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<p class=\"p1\">Bolivia lacks a special law of computer crimes; instead, the <span class=\"s1\"><b>Penal code<\/b><\/span> (which originally dates back to 1972, with subsequent amendments) contains only <i>two types of crimes-specific<\/i> in this matter. These provisions were introduced by Law no. 1768 of 1997, which added the <span class=\"s1\"><b>Chapter XI \u201cComputer Crimes\u201d<\/b><\/span> the Criminal Code. This chapter sets out:<span class=\"s1\"><\/span><\/p>\n<ul>\n<li>\n<p class=\"p1\"><span class=\"s1\"><b>Article 363 bis (computer Manipulation)<\/b><\/span>: Punishes the who, with the intent of obtaining an undue advantage, <i>\u201chandling a processing or any transfer of computer data\u201d<\/i> causing an incorrect result in prejudice to a third party, and that this results in a transfer wealth is not due. <span style=\"font-size: 16px;\">In essence, makes the computer fraud through alteration of data or programs (a figure analogous to the scam but executed by digital media). The punishment is <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>1 to 5 years of imprisonment<\/b><\/span><span style=\"font-size: 16px;\"> more fine.<\/span><br \/><span class=\"s1\"><\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\" style=\"font-size: 16px;\"><b>Article 363 ter (Alteration, unauthorized access and improper use of computer data)<\/b><\/span><span style=\"font-size: 16px;\">: Punishes the who, <\/span><i style=\"font-size: 16px;\">\u201cwithout being authorized to take over, access, use, modify, delete or disable the data stored in a computer or computer support, causing damage to the owner of the information\u201d. <\/i><span style=\"font-size: 16px;\">This figure covers the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>illegal access to systems or databases<\/b><\/span><span style=\"font-size: 16px;\"> and the unauthorized use of digital information of others. Interestingly, the expected penalty is much more mild than that of the previous offence: <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>provision of work for up to a year or fine of up to 200 days, <\/b><\/span><span style=\"font-size: 16px;\">which denotes that the legislator 1997 conceived of these behaviors as less serious (crimes against property computer without transfer direct economic).<\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"p1\">In addition, other rules bolivian touching tangentially the subject computer science: for example, the <span class=\"s1\"><b>Act 164 of Telecommunications (2011)<\/b><\/span> regulated aspects of digital signature, e-commerce and data communication, and the <span class=\"s1\"><b>Law 3325, 2006<\/b><\/span> addressed child pornography in digital environments. However, none of them creates criminal offences new behaviors specific computer, beyond adequate crimes traditional to the Internet (as in the case of child pornography).<\/p>\n<p class=\"p1\">In synthesis, the <span class=\"s1\"><b>penal framework bolivian current is extremely limited compared to the cybercrime<\/b><\/span>. The articles 363 bis and ter \u2014dating back more than two decades ago\u2014 are considered <i>\u201ctoo traditional and not adjusted adequately to the reality of social and technological change in the country\u201d<\/i>, perceiving its content as <span class=\"s1\"><b>general and unclear. <\/b><\/span>For example, the article 363 ter speaks of \u201cusing data to others without authorization causing prejudice\u201d, but does not define if it includes the identity theft in social networks or the appropriation of digital profiles, which leaves room for interpretations. To do so would contravene principles of criminal fundamental as the taxatividad and legal certainty, which requires precise definitions of prohibited conduct.<\/p>\n<p class=\"p1\">In fact, in the judicial practice bolivian recent, many behaviors <span class=\"s1\"><b>impersonation of digital identity<\/b><\/span> have been framed forcefully in types traditional criminal court, with unsatisfactory results. For example, when a fraudster takes control of the account of Facebook or WhatsApp of someone else and cheating on their contacts to send money, prosecutors attempt to process the fact as common scam. However, <i>\u201cthe computer manipulation of the account and identity theft as a means to commit fraud do not always fit perfectly in the constituent elements of a criminal offence of cheating\u201d. <\/i>Similarly, if someone creates a fake profile to defame another person, is used to crimes against honor (libel, slander) or via constitutional protection of the privacy, but <i>these figures do not consider the particularities of the diffusion anonymous on digital platforms. <\/i>In other words, the legislation in force <span class=\"s1\"><b>presents gaps<\/b><\/span> that prevent subsume accurately the new illegal conduct, generating grey zones of impunity. This reality motivated attempts of penal reform to modernize the classification, as detailed below.<\/p>\n<p class=\"p1\"><\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<h4><b>History failed: the Code of the Criminal justice System (Law 1005) and its abrogation<\/b><\/h4>\n<p>&nbsp;<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<p class=\"p1\">Conscious of the need to update the regulations, the bolivian State enacted on December 15, 2017, the <span class=\"s1\"><b>Law N\u00b0 1005 (Code of Penal System)<\/b><\/span>, which replaced integral to the Criminal Code of 1972. This new code \u2014which should enter into force after 18 months of <i>vacatio legis<\/i>\u2014 included for the first time <i>specific title dedicated to computer crime<\/i> and adapted numerous types of offences to the digital age. The Law, however, 1005 never came to rule: he faced a strong rejection of social and from different sectors (medical, carriers, and the press, among others), which led to a few months after the Government promote your cancellation. Thus, by the <span class=\"s1\"><b>Law N\u00b0 1027 January 25, 2018<\/b><\/span> is <i>repealed completely<\/i> the Code of the Criminal justice System prior to its entry into force, returning to Bolivia, the validity of the old Penal Code of 1972 (preserving, therefore, only the both plain items 363 bis and ter on computer crimes).<\/p>\n<p class=\"p1\">The <span class=\"s1\"><b>frustrated Law 1005<\/b><\/span> represented a missed opportunity to modernize the criminal definition in the field of digital. In his <i>Section IV related to computer crimes<\/i>the project incorporates figures as the <i>personal data breach<\/i>the electronic scam, counterfeit computer science, among others (armoniz\u00e1ndolas with international standards of harmfulness). <span class=\"s1\">Although it was not implemented, their existence showed the <\/span><b>will of the legislator bolivian update of the penal framework<\/b><span class=\"s1\">. The abrogation sudden this reform left a legal vacuum: Bolivia returned to a rules-of-date, <\/span><b>without criminal offences specific to phenomena such as the impersonation of digital identity, phishing, spreading not consensual, private data, etc<\/b><\/p>\n<p class=\"p1\">As a result, today the <i>criminal law bolivian<\/i> is widely perceived <span class=\"s1\"><b>insufficient to address computer crime<\/b><\/span>. The Delegation of bolivia to the UN recognized in 2019 the existence of <i>\u201ca legal vacuum product of the non-applicability of the laws existing to the new offences\u201d<\/i> committed using digital technologies, highlighting the urgent need to review and update the regulations. This gap regulations contrasts with the legal developments that have taken place in other Latin american countries, which have adopted specific legislation on cybercrime. Below, we present a comparison with the legal frameworks of Peru, Colombia and Argentina, whose experiences are illustrative.<\/p>\n<p class=\"p1\"><\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<div>\n<div>\n<h1>Comparative legal frameworks of Peru, Colombia and Argentina<\/h1>\n<\/div>\n<h1><o:p><\/o:p><\/h1>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<p class=\"p1\"><\/p>\n<p class=\"p1\">The legal answer to the crime of <span class=\"s1\"><b>impersonation of digital identity and illicit use of data<\/b><\/span> has varied in the region. While Bolivia does not yet have a figure penal express such behaviors, neighbouring countries have reformed their criminal codes or enacted special laws in the last decade to address them more directly.<span class=\"s1\"><\/span><\/p>\n<ul>\n<li>\n<p class=\"p1\"><span class=\"s1\"><b>Peru<\/b><\/span>: Adopted in 2013 <i>Law N\u00b0 30096 \u2013 cybercrime Law<\/i>that typifies a variety of cybercrimes in a detailed way. Of particular relevance is the <span class=\"s1\"><b>crime of impersonation of digital identity<\/b><\/span>, enshrined in article 9. This precept, sanction, to whom, <i>\u201cusing digital technologies impersonates the identity of a natural or legal person, provided that such conduct is some prejudice\u201d<\/i>, with penalties of <span class=\"s1\"><b>3 to 5 years of prison<\/b><\/span>(fester to 6 to 9 years if the victim is a minor). <span style=\"font-size: 16px;\">Peru, therefore, explicitly recognizes the identity theft online as a figure criminal autonomous, separate from the fraud that is traditional, which has made it easier to prosecute cases of fake profiles on social networks, fraudulent e-mails (<\/span><i style=\"font-size: 16px;\">phishing<\/i><span style=\"font-size: 16px;\">), etc., in Addition, the peruvian legislation contemplates crimes complementary as the unlawful access to computer systems, the adulteration of data and the traffic of personal information, with penalties commensurate with the severity and the damage caused. <\/span><span style=\"font-size: 16px;\">This modernization regulations placed Peru at the forefront regional criminal protection against the encroachment of digital identity.<\/span><br \/><span style=\"font-size: 16px;\"><\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\" style=\"font-size: 16px;\"><b>Colombia<\/b><\/span><span style=\"font-size: 16px;\">: Implemented in 2009 <\/span><i style=\"font-size: 16px;\">Law 1273<\/i><span style=\"font-size: 16px;\">, which amended its Criminal Code by integrating a chapter of computer crimes. Although Colombia does not have a figure called \u201cphishing\u201d exactly the same as the peruvian, your code represses behaviors equivalent by several articles. For example, the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>Article 269F<\/b><\/span><span style=\"font-size: 16px;\">penalizes the <\/span><i style=\"font-size: 16px;\">\u201cto obtain, provide, use, or modify personal data contained in databases without authorization and for-profit or for the benefit of third parties\u201d, <\/i><span style=\"font-size: 16px;\">protecting your personal information against misuse. Also, the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>Article 269I<\/b><\/span><span style=\"font-size: 16px;\"> typifies the <\/span><i style=\"font-size: 16px;\">\u201ctheft by computer media\u201d<\/i><span style=\"font-size: 16px;\">, which explicitly includes the act of <\/span><i style=\"font-size: 16px;\">\u201cto circumvent security measures, or <\/i><span class=\"s1\" style=\"font-size: 16px;\"><b><i>impersonate a user<\/i><\/b><\/span><i style=\"font-size: 16px;\"> to steal the assets of others\u201d. <\/i><span style=\"font-size: 16px;\">This last provision covers cases where the offender is transferred by another person in a computer system (for example, using your credentials) to commit a robbery, which covers, in practice, many cases of <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>fraud by impersonation digital<\/b><\/span><span style=\"font-size: 16px;\">. In addition, Colombia punishes access for abusive systems (art. 269A), the interception of data (269b to merge), damage to computer (269D), the introduction of <\/span><i style=\"font-size: 16px;\">malware<\/i><span style=\"font-size: 16px;\"> (269E) and the creation of fake websites or <\/span><i style=\"font-size: 16px;\">phishing<\/i><span style=\"font-size: 16px;\"> (269G). <\/span><span style=\"font-size: 16px;\">The framework colombian is, therefore, quite complete: not only protects the confidentiality of data and digital identity, but also <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>typifies schemes typical of attack<\/b><\/span><span style=\"font-size: 16px;\"> (hacking, phishing, etc), with penalties ranging usually between 4 and 8 years in prison for these crimes. <\/span><span style=\"font-size: 16px;\">It should be noted that, in spite of their legislation advanced, Colombia (like Peru) complements their efforts with an active policy of cybersecurity and has acceded to the Budapest cybercrime Convention, facilitating international cooperation in the matter.<\/span><br \/><span style=\"font-size: 16px;\"><\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\" style=\"font-size: 16px;\"><b>Argentina<\/b><\/span><span style=\"font-size: 16px;\">: Amended its Criminal Code by the <\/span><i style=\"font-size: 16px;\">Law 26.388 2008<\/i><span style=\"font-size: 16px;\">incorporating various computer crimes in line with the Convention of Budapest. The reform of argentina introduced the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>illegal access to computer systems<\/b><\/span><span style=\"font-size: 16px;\">(introducing the art. 153 bis C. P.), the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>hurt or computer sabotage<\/b><\/span><span style=\"font-size: 16px;\"> (art. 183 subsection 6 C. P.), the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>interception of electronic communications<\/b><\/span><span style=\"font-size: 16px;\"> and several assumptions of <\/span><i style=\"font-size: 16px;\">computer fraud. <\/i><span style=\"font-size: 16px;\">For example, it is penalized <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>obtaining and unauthorized disclosure of confidential data<\/b><\/span><span style=\"font-size: 16px;\"> and the <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>impersonation of web sites<\/b><\/span><span style=\"font-size: 16px;\"> to capture information (behaviours comparable to the phishing). Although Argentina is not explicitly defined as a crime of \u201cdigital identity\u201d, its regulations allows them to pursue the usurpation of personality online through types as the ideological falsity, fraud by deception computer or the use of a digital document of others. In particular, the traditional figure of <\/span><i style=\"font-size: 16px;\">usurpation of civil identity<\/i><span style=\"font-size: 16px;\"> (art. 138 C. P., referring to assume marital status, or fake identity) could be applied to certain cases of theft of digital identity, complemented with the new figures computer when media systems. The argentine law also increased the penalties if the computer crimes affecting public services or involving children (for example, the distribution of child pornography on the Internet is severely punished). Notwithstanding these advances, lawyers argentine indicate that <\/span><span class=\"s1\" style=\"font-size: 16px;\"><b>persist gaps<\/b><\/span><span style=\"font-size: 16px;\">, and continuously emerging new forms of attack are not provided for in existing laws, which has led to projects to update again by the Criminal Code and to lift some sanctions. <\/span><span style=\"font-size: 16px;\">In addition, Argentina has a scaffolding legal more robust than Bolivia, but it keeps evolving to meet the innovations of crime.<\/span><br \/><span style=\"font-size: 16px;\"><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"p1\">The regional comparison evidence that <span class=\"s1\"><b>Bolivia is located behind<\/b><\/span> in the definition of computer crime. While Peru has already punishes directly impersonation of digital identity and Colombia\/Argentina have the legal tools to pursue the misuse of data and cyber frauds, Bolivia operates with types of crimes-general of limited scope. This situation has been advised by specialists: the country is not even part of the <i>Convention de Budapest (2001)<\/i> on cybercrime, unlike Peru who has subscribed <span class=\"s2\"><\/span>, which also limits international cooperation in research of these transnational crimes. International experts have emphasized that the legislation bolivian <i>\u201cit shows a limitation in the definition and regulation\u201d<\/i> of cybercrime, urging to adapt to technological changes to meet social needs and to ensure legal certainty.<\/p>\n<p class=\"p1\">Below, you gather opinions of jurists bolivian and international discusses the <span class=\"s1\"><b>deficiencies in the framework of criminal law current in Bolivia<\/b><\/span> and propose ways of improvement, laying the groundwork for the legal reform that arises.<\/p>\n<p class=\"p1\"><\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<h4><b>Shortcomings of the framework bolivian criminal and proposals for improvement, according to experts<\/b><\/h4>\n<p class=\"p1\"><span class=\"s1\"><\/span><\/p>\n<p class=\"p1\">The legal community agrees diagnose <span class=\"s1\"><b>serious deficiencies in the framework of criminal law bolivian against cybercrime<\/b><\/span>. On the one hand, national specialists highlighted the obsolescence and poor coverage of the types of criminal force; on the other, international experts point to the decoupling of Bolivia from the global standards in the field. These are some of the critical points mentioned:<span class=\"s2\"><\/span><\/p>\n<ul>\n<li>\n<p class=\"p1\"><span class=\"s1\"><b>Insufficient coverage and lack of typing expressed<\/b><\/span>: As mentioned, Bolivia only has two computer-related crimes in the Criminal Code (arts. 363 bis and ter). The <i>Foundation Building<\/i>in a diagnosis of 2021, noted that such a situation leaves <i>atypical<\/i> many unlawful conduct digital, <i>\u201cmaking a qualifying legal-individualized criminal\u201d<\/i> and allowing a <span class=\"s1\"><b>high black figure of crime unpunished<\/b><\/span>because facts are not described explicitly in the criminal law cannot be punished without violating the principle of legality (<i>nullum crimen, nulla poena sine lege<\/i>) <span class=\"s2\"><\/span><span class=\"s2\"><\/span>. This results in practical difficulties for processing cases of phishing, hacking, theft of network profiles, extortion, by electronic means, etc, that are outside the scope of the traditional figures.<\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\"><b>Evidentiary issues, and persecution<\/b><\/span>: Jurists bolivians as Rigoberto Paredes (legal study) indicate that, in addition to the lack of criminal offences, there are obstacles such as the <span class=\"s1\"><b>low complaint<\/b><\/span> of these offences, and the complexity to identify authors. Many victims do not report out of fear or ignorance, and <i>\u201cthe cases that go to trial are often dismissed for lack of sufficient evidence, or because you can not give to the authors\u201d<\/i>given the facilities of anonymity on the Internet and the frequent location of the servers on the outside <span class=\"s2\"><\/span>. The absence of robust protocols for digital research in the Police and Prosecutor&#039;s office exacerbates the problem. In this regard, the attorney Erick Iriarte (Peru) stressed that Bolivia needs to modernize its technical capabilities and to adhere to international conventions, because in the digital age, the <span class=\"s1\"><b>cross-border cooperation<\/b><\/span> it is crucial to track evidence and responsible <span class=\"s2\"><\/span><span class=\"s2\"><\/span>.<\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\"><b>Failure to update regulations and the principle of taxatividad<\/b><\/span>: The doctrine of criminal emphasizes that the law should keep up with the evolving social and technological. In Bolivia, the gap is obvious. Professor V. C. Arequipa Bars looks at the types of criminal computer bolivians are so generic that do not comply with the requirement of precision of the criminal law, creating legal uncertainty <span class=\"s2\"><\/span><span class=\"s2\"><\/span>. It also warns that it is <i>\u201cessential that a criminal act to comply with the principles of taxatividad, certainty and booking of law\u201d<\/i>, which is currently not happening in Bolivia with regard to computer crimes <span class=\"s2\"><\/span>. This view is shared by international experts: the <i>Organization of American States (OAS)<\/i> it has urged the countries left behind to update its legislation following the guidelines of the Convention of Budapest, so clearly crimes such as unlawful access, computer sabotage, fraud, digital and abuse of personal data <span class=\"s2\"><\/span>. Bolivia, however, has not implemented these recommendations to date.<\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\"><b>Attempts of recent legislative and reviews<\/b><\/span>: In recent years, is presented bills isolated to deal with some aspects of the crime digital, although with a focus controversial. In 2023, a group of lawmakers has proposed the Draft Law N\u00b0 304 for <i>\u201cto regulate and punish the misuse of social networks\u201d<\/i>. This initiative contemplated new crimes as the <span class=\"s1\"><b>counterfeiting of digital data<\/b><\/span> and the <span class=\"s1\"><b>traffic of personal data<\/b><\/span>, and provided punishment of <span class=\"s1\"><b>5 to 7 years in prison<\/b><\/span> for those who <i>\u201ccreating a false identity or hackearan accounts in social networks damaging to the image or reputation of another person\u201d<\/i> <span class=\"s2\"><\/span>. However, the project was heavily criticized by sectors of the civil society and the press, who saw it as a threat to the freedom of expression more than a tool against cybercrime <span class=\"s2\"><\/span><span class=\"s2\"><\/span>. Finally, his treatment was suspended <span class=\"s2\"><\/span>. This episode reflects the <span class=\"s1\"><b>lack of consensus and a vision that is comprehensive technical<\/b><\/span> in the legislative response: the proposals are likely to arise reactively (sometimes tinged with politicians) instead of framing a public policy cyber security and data protection.<\/p>\n<\/li>\n<\/ul>\n<p class=\"p1\">In conclusion, the experts converge in Bolivia requires <span class=\"s1\"><b>with urgent legal reform integral<\/b><\/span> in the field of cybercrime. That reform should fill the gaps of typing (creating criminal concepts clear for the unlawful conduct digital today unpunished), provide operators of justice of best procedural tools to obtain electronic evidence <span class=\"s2\"><\/span>, and to harmonize domestic law with international standards (for example, by adhering to the Convention of Budapest and cooperation with regional initiatives in cybersecurity).<\/p>\n<p class=\"p1\">The next section proposes a <span class=\"s1\"><b>making it a criminal offence-specific<\/b><\/span> directed to cover one of the lakes more sensitive: the crime of <span class=\"s1\"><b>improper use of proprietary data on computer media<\/b><\/span>being defined as the impersonation of digital identity and other forms of free-riding of personal data of third parties on electronic platforms.<\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<div>\n<div>\n<h2>Proposal for criminal definition: improper Use of proprietary data on computer media<\/h2>\n<\/div>\n<h1><o:p><\/o:p><\/h1>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||9px||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<p class=\"p1\">In the light of the foregoing, it is proposed to incorporate the bolivian Criminal Code a new offence criminalising of a clear and precise way the <span class=\"s1\"><b>improper use of third party data on computer media<\/b><\/span>. The wording suggested \u2013made based on the identified needs and taking references of laws compared\u2013 is the following:<\/p>\n<blockquote><span class=\"s1\"><b>(Improper use of proprietary Data on Computer Media).\u2013<\/b><\/span> The person who, <span class=\"s1\"><b>without authorization<\/b><\/span>, with the intention of obtaining an undue advantage <span class=\"s1\"><b>or<\/b><\/span> in order to affect the image or dignity of the victim, <span class=\"s1\"><b>use data or confidential information of others<\/b><\/span> (whether personal, institutional or financial) as stated on computer media or electronic, <span class=\"s1\"><b>or to impersonate the identity of another<\/b><\/span> through a digital medium, generating damage to the owner of the information, or a third party, shall be punished with <span class=\"s1\"><b>a prison term of two (2) to four (4) years<\/b><\/span>in addition repair the economic damage. The penalty shall be increased to <span class=\"s1\"><b>a prison term of three (3) to six (6) years<\/b><\/span>more economic repair when the victim is a child, a child or adolescent .<\/blockquote>\n<p class=\"p1\">This classification proposal covers two purposes typical observed in the practice of crime bolivian: (1) the <span class=\"s1\"><b>profit illicit using phishing<\/b><\/span> (for example, someone who pretends to be another to obtain transfers of money, credit, goods, or accesses), and (2) the <span class=\"s1\"><b>involvement, reputation, honor or rights personal\u00edsimos<\/b><\/span> through the creation of identities or fake profiles (such as spreading false content or intimate of someone by pretending to be that person). The explicit mention of both the <i>unauthorized use of confidential data<\/i> as the <i>impersonation of digital identity<\/i>the criminal code covers common scenarios of <span class=\"s1\"><b>improper use of outside data in computer environments<\/b><\/span> who today does not fit with precision on any figure.<\/p>\n<p class=\"p1\">The proposed penalty (2 to 4 years, agravable to 3 to 6 years if the victim is a minor) seeks to be <span class=\"s1\"><b>proportional<\/b><\/span>: it is more severe than is currently provided for the unlawful access simple (363 ter, which comes only to community work), but not to exceed the severity of crimes heritage older. In addition, the inclusion of the <span class=\"s1\"><b>repair economic mandatory<\/b><\/span>points to make restitution to the victim for damages of a material or moral injury, complementing the criminal sanction.<\/p>\n<p class=\"p1\">It should be noted that <span class=\"s1\"><b>this formulation contains elements of foreign law<\/b><\/span> that have shown efficacy. The requirement of <i>prejudice<\/i> for the victim is taken from the peruvian law <span class=\"s2\"><\/span>in order to focus on the criminality in cases where the act really hurt legal property (whether property, privacy or honor). The mention of &#034; spoofing \u201cthrough means of an electronic or digital\u201d covers from the theft of accounts in networks up to the creation of profiles apocrypha, similar to what is referred to in the regulations in colombia under the concept of impersonate a user <span class=\"s2\"><\/span>. Also, the <span class=\"s1\"><b>aggravating age<\/b><\/span> (child victim) responds to the special vulnerability of children and adolescents in virtual environments, in line with the trend compared protect more strongly to the lower (as in Peru with increased penalties when the impersonated identity is that of a minor <span class=\"s2\"><\/span>).<\/p>\n<p class=\"p1\">This definition clearer and more detailed would <span class=\"s1\"><b>subsume properly conduct that today remain in impunity, or need to be forced into types inapplicable<\/b><\/span>ensuring criminal proceedings more effective. For example, the case of the <i>fraud via WhatsApp<\/i> described above would fit perfectly in \u201cuse of proprietary data for the purpose of economic benefit, impersonating the identity of another via the digital environment\u201d, in compliance with all the elements of the new type (where before you just settle with difficulty in the figure of scam) <span class=\"s2\"><\/span>. In the same way, the creation of a fake profile to humiliate someone would be included in \u201caffect the dignity of the victim by means of impersonation of digital identity\u201d, that announcement would make the damage to the image that the crimes against the honor of traditional and do not cover <span class=\"s2\"><\/span>.<\/p>\n<p class=\"p1\">In summary, the proposed <i>Improper use of proprietary Data on Computer Media<\/i> would fill a critical gap in the <span class=\"s1\"><b>Bolivian Criminal code<\/b><\/span>by providing the operators of justice to be an ideal tool to pursue and punish both the fraud-based digital identity theft as the theft itself when damage extrapatrimoniales. However, this is only a part of the necessary reform. The effective implementation of this new type of criminal would also require specialized training to prosecutors and police in the digital research, campaigns of public awareness on cybersecurity, and international cooperation to prosecute offenders who operate from abroad <span class=\"s2\"><\/span><span class=\"s2\"><\/span>.<\/p>\n<p class=\"p1\"><\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<div>\n<p class=\"p1\"><span class=\"s1\"><\/span><\/p>\n<h2>Conclusions: Urgent need for legal reform integral in Bolivia<\/h2>\n<p>&nbsp;<\/p>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<p class=\"p1\">The preceding analysis highlights the <span class=\"s1\"><b>urgency of reforming the criminal-law framework bolivian<\/b><\/span> to adequately address the misuse of data by other authors in computer resources and, in general, the cyber crime. Bolivia is located behind, both with respect to the sophistication of the crimes that occur daily, as compared with the regulatory developments in neighboring countries. This gap regulations committed to the protection of the legal property key: the heritage of the citizens (hemmed in by phishing scams), your privacy and intimacy (mangled by data breaches and phishing), and even their honor and personal safety (aggravated defamation in networks or <i>digital bullying<\/i>).<\/p>\n<p class=\"p1\">The <span class=\"s1\"><b>recent statistics<\/b><\/span> confirm an upward trend in cybercrime in Bolivia, exposing the population to increased risks without proper safeguards legal. The <span class=\"s1\"><b>current legislation<\/b><\/span>, anchored in articles written over 20 years ago, it has been clearly <span class=\"s1\"><b>out of date<\/b><\/span> compared to the types of crimes that take advantage of emerging technologies. Only to have the figures of computer manipulation and unauthorized access of data (363 bis and ter) is insufficient and obsolete <span class=\"s2\"><\/span>. This limitation is contrary to the principles of legality and taxatividad, because many behaviors do not fit into the types present criminal, forcing interpretations extensive some guarantees, or worse, leaving zones of impunity. As well point to Arequipa Bars and other jurists, it is imperative that the criminal act to adapt to social and technological changes to meet the needs of guardianship and to resolve conflicts modern <span class=\"s2\"><\/span><span class=\"s2\"><\/span>.<\/p>\n<p class=\"p1\">Examples of <span class=\"s1\"><b>Peru, Colombia and Argentina<\/b><\/span> show that yes it is possible and necessary to update the criminal law to address computer crimes specific (spoofing, phishing, data breaches, etc) with clear definitions and penalties proportional. Bolivia can take inspiration from these successful experiences, avoiding their errors. A reform well oriented should not become a tool of censorship or undermine fundamental rights (as feared with the project of social networks, 2023), but rather focus on <span class=\"s1\"><b>effectively protect the citizenship<\/b><\/span> abuse digital, in balance with freedoms such as freedom of expression. To do this, the participation of technical experts in the preparation of legislative is crucial, as well as a <span class=\"s1\"><b>public debate transparent<\/b><\/span> to legitimize the new rules.<\/p>\n<p class=\"p1\">The <span class=\"s1\"><b>proposal for criminal definition of \u201cmisuse of proprietary data on computer media\u201d<\/b><\/span> presented in this article is a specific step in the right direction. Its adoption would fill one of the gaps more noticeable in the Criminal Code, providing a legal framework express to pursue the impersonation of digital identity and the use of illicit personal data. However, a comprehensive reform should also include the review of other types of criminal computer (for example, define the <i>intrusion or unauthorized access<\/i> with greater severity, the <i>cyberbullying<\/i>, the <i>extortion digital<\/i>, the <i>alteration of critical computer systems<\/i>, etc), the update rules of procedure to facilitate the obtaining of <span class=\"s1\"><b>electronic evidence<\/b><\/span> <span class=\"s2\"><\/span>, and the consideration of mechanisms for international cooperation in research (Bolivia should seriously evaluate accede to the Convention of Budapest, which would provide a legal framework for mutual legal assistance in cybercrime <span class=\"s2\"><\/span>).<\/p>\n<p class=\"p1\">In conclusion, the rapid evolution of technology and the proliferation of crime in the cyberspace have created a <span class=\"s1\"><b>inescapable challenge to the criminal justice system bolivian<\/b><\/span>. Persist in the inaction of legislation will not only leave unprotected to the current victims, but sends a signal of impunity that encourages them to future offenders. Legal reform in this matter is urgent and necessary. To give Bolivia a regulatory body modern against cybercrime will strengthen the rule of law in the digital world, will safeguard fundamental rights of the people in line and will help to create an electronic environment more safe and reliable for the economic and social development of the country <span class=\"s2\"><\/span><span class=\"s2\"><\/span>. In the words of the Observatory of Computer Crimes, only using <i>\u201ca comprehensive, collaborative approach\u201d<\/i> involving legal update, technical capabilities, and public awareness, we will be able to mitigate the negative impact of these crimes and <span class=\"s1\"><b>to ensure the validity of the rule of Law in the digital age<\/b><\/span> <span class=\"s2\"><\/span>.<\/p>\n<p class=\"p1\"><\/p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb||10px||false|false\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<div>\n<div>\n<h1>References:<o:p><\/o:p><\/h1>\n<\/div>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.21.0&#8243; _module_preset=\u00bbdefault\u00bb header_4_font_size=\u00bb20px\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb]<ul>\n<li>\n<p class=\"p1\">Bolivian Criminal code (D. L. 10426, 1972, rev. Law 1768\/1997), arts. 363 bis and ter.<\/p>\n<\/li>\n<li>\n<p class=\"p1\">Law N\u00b0 1005 (2017) \u2013 the Code of the Criminal justice System Boliviano (repealed by Act N\u00b0 1027\/2018).<\/p>\n<\/li>\n<li>\n<p class=\"p1\">Observatory of Computer Crimes-of-Bolivia \u2013 <i>Report on cyber crime in Bolivia 2023<\/i>.<\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\">Arequipa-Gates, V. C. (2023). <\/span><b>\u201cThe modification of the bolivian Criminal Code in the incorporation of new computer-related crimes\u201d<\/b><span class=\"s1\">. <i>Juris Studia<\/i>, 1(2), 83-100 <\/span><span class=\"s2\"><\/span><span class=\"s1\"><\/span><span class=\"s2\"><\/span><span class=\"s1\">.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\">Rigoberto Paredes &amp; Associates (2022). <\/span><b>\u201cWhat are cyber crimes? Is there legislation in Bolivia?\u201d<\/b><span class=\"s1\"> <\/span><span class=\"s2\"><\/span><span class=\"s1\"><\/span><span class=\"s2\"><\/span><span class=\"s1\">.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\">Peru \u2013 Law N\u00b0 30096 (2013) Computer-related Crimes, art. 9 (Phishing digital) <span class=\"s1\"><\/span>.<\/p>\n<\/li>\n<li>\n<p class=\"p1\">Colombia \u2013 Criminal Code, arts. 269F (violation of personal data) and 269I (theft by computer using impersonaci\u00f3n) <span class=\"s1\"><\/span><span class=\"s1\"><\/span>.<\/p>\n<\/li>\n<li>\n<p class=\"p1\"><span class=\"s1\">The Journal (02\/06\/2024). <\/span><b>\u201cThree causes that are not reported cybercrimes\u201d<\/b><span class=\"s1\">, interview with E. Iriarte <\/span><span class=\"s2\"><\/span><span class=\"s1\"><\/span><span class=\"s2\"><\/span><span class=\"s1\">.<\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\">Bill 304\/2023 (misuse of social networking), proposed Text <span class=\"s1\"><\/span>(suspended prior to their approval).<\/p>\n<\/li>\n<\/ul>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>Uso indebido de datos ajenos en medios inform\u00e1ticos en Bolivia: contexto, legislaci\u00f3n y propuesta de reforma &nbsp; La criminalidad inform\u00e1tica ha experimentado un auge significativo en Bolivia en los \u00faltimos a\u00f1os, reflejando una tendencia global donde los delitos cibern\u00e9ticos crecen al comp\u00e1s de la digitalizaci\u00f3n. Seg\u00fan la ONU, m\u00e1s de tres cuartas partes de la [&hellip;]<\/p>","protected":false},"author":4,"featured_media":113358,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[11],"tags":[],"class_list":["post-113344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/posts\/113344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/comments?post=113344"}],"version-history":[{"count":7,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/posts\/113344\/revisions"}],"predecessor-version":[{"id":113357,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/posts\/113344\/revisions\/113357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/media\/113358"}],"wp:attachment":[{"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/media?parent=113344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/categories?post=113344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reinickeostria.com\/en\/wp-json\/wp\/v2\/tags?post=113344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}