Análisis comparativo de la Ley Orgánica de Protección de Datos Personales del Ecuador con la legislación colombiana desde un enfoque de ciberseguridad y delitos informáticos

Translated title of the contribution: Comparative analysis of the Organic Law on Personal Data Protection of Ecuador with Colombian legislation from a cybersecurity and cybercrime approach

Miguel Arcos-Argudo, Karina Matute-Pinos, Mesías Fernández-Mora

Research output: Contribution to journalArticlepeer-review

Abstract

The expansion of the Internet and technology has changed the way we live and work, making it essential to be permanently connected. However, this has made us more vulnerable to personal information theft and has given rise to significant cyber crimes that affect the right to personal data protection and privacy. Deficient global legislation has hindered an effective fight against cybercrime, and governments are pressured to create laws that protect their citizens. Organizations must implement information security systems and responsible policies and procedures to manage the collected, processed, and stored information. This article presents a comparison of Colombian and Ecuadorian laws on personal data protection and cyber crimes, as well as recommendations for implementing an Information Security Management System (ISMS) to comply with these protection laws.

Translated title of the contributionComparative analysis of the Organic Law on Personal Data Protection of Ecuador with Colombian legislation from a cybersecurity and cybercrime approach
Original languageSpanish
Pages (from-to)100-114
Number of pages15
JournalRISTI - Revista Iberica de Sistemas e Tecnologias de Informacao
Volume2023
Issue numberE60
StatePublished - 2023

Bibliographical note

Publisher Copyright:
© 2023, Associacao Iberica de Sistemas e Tecnologias de Informacao. All rights reserved.

Fingerprint

Dive into the research topics of 'Comparative analysis of the Organic Law on Personal Data Protection of Ecuador with Colombian legislation from a cybersecurity and cybercrime approach'. Together they form a unique fingerprint.

Cite this