{"id":2902,"date":"2024-02-14T10:27:43","date_gmt":"2024-02-14T16:27:43","guid":{"rendered":"https:\/\/carrillolaw.com\/?p=2902"},"modified":"2024-02-16T08:56:52","modified_gmt":"2024-02-16T14:56:52","slug":"las-responsabilidades-legales-que-generan-los-ciberdelitos","status":"publish","type":"post","link":"https:\/\/carrillolaw.com\/en\/2024\/02\/14\/las-responsabilidades-legales-que-generan-los-ciberdelitos\/","title":{"rendered":"Legal Liabilities Derived from Cybercrime"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2902\" class=\"elementor elementor-2902\" wpc-filter-elementor-widget=\"1\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18e2dcb e-flex e-con-boxed e-con e-parent\" data-id=\"18e2dcb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3b11eb elementor-widget elementor-widget-image\" data-id=\"d3b11eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07.jpg\" class=\"attachment-large size-large wp-image-2903\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07.jpg 2500w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07-300x200.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07-1024x683.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07-768x512.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07-1536x1024.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07-2048x1366.jpg 2048w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-07-18x12.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fb2fd7 elementor-widget elementor-widget-text-editor\" data-id=\"9fb2fd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p>Have you ever checked your bank statements and found transactions that you do not recognize? Recently in Guatemala, a woman <a href=\"https:\/\/www.prensalibre.com\/economia\/estafas-por-medios-electronicos-alertan-de-4-formas-de-timos-mas-comunes-y-recomendaciones-para-evitar-ser-victimas-breaking\/\">reported<\/a> that, upon checking her online bank account, she found that she had lost more than <strong>Q100,000 (US$12,800)<\/strong> in less than an hour. With only six transactions, a suspected criminal group managed to empty her bank account.<\/p><p>Cybercrime like this has not only affected the personal finances of its victims, but also those of businesses, government entities, international organizations, among others. Within two days, cybercriminals <a href=\"https:\/\/www.prensalibre.com\/economia\/estafas-por-medios-electronicos-alertan-de-4-formas-de-timos-mas-comunes-y-recomendaciones-para-evitar-ser-victimas-breaking\/\">managed<\/a> to access a company's bank account and made more than 30 transactions. The organization lost <strong>Q3.6 million (US$461,000).<\/strong><\/p><p>\u00a0<\/p><p><strong>A Global Trend<\/strong><\/p><p>Cybercrime happens when electronic devices <a href=\"https:\/\/www.argentina.gob.ar\/justicia\/convosenlaweb\/situaciones\/que-es-el-ciberdelito\">are used to commit illegal behavior.<\/a> It has increased in Guatemala in the last year. In 2023 alone, the Superintendency of Banks (SIB) <a href=\"https:\/\/www.prensalibre.com\/economia\/estafas-por-medios-electronicos-alertan-de-4-formas-de-timos-mas-comunes-y-recomendaciones-para-evitar-ser-victimas-breaking\/\">revealed<\/a> that reported scams amounted to <strong>Q319.52 million (US$40.9 million)<\/strong>. The authorities claim that a transnational criminal network is behind these acts.<\/p><p>However, the goal of cybercrime is not always to obtain money. In some cases, it is to sequester high-value information and then sell it, extort money from the company and\/or users or use that information for their own purposes.<\/p><p>The technology firm IBM published a <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">report<\/a> with projections of costs arising from these acts. They reported that, in Latin America, the <a href=\"https:\/\/www.bloomberglinea.com\/2023\/08\/25\/costos-de-la-filtracion-de-datos-se-disparan-que-tan-vulnerables-somos-en-latam\/\">average cost<\/a> of a data breach amounted to <strong>US$2.46 million<\/strong> in 2023. These losses come from the paralysis of the organization's activities, as well as expenses in the recovery of the system.<\/p><p>Your organization can be affected by cybercrime, either due to a lack of cybersecurity measures, weak security measures or because a person within the company commits a human error or is complicit in an attack that violates the system. Therefore, it is important to foresee risk scenarios by identifying the liabilities that your organization may have to different stakeholders.<\/p><p>\u00a0<\/p><p><strong>Legal Responsibilities and Cybersecurity<\/strong><\/p><p>When a company becomes a victim of a cybercrime in which sensitive information is extracted or suffers monetary losses, it must consider the responsibilities it has towards the <em>stakeholders<\/em> of <a href=\"https:\/\/gelite.org\/que-son-las-partes-interesadas\/\">its organization<\/a> . These refer to those persons or entities that may be affected by your company's activities. Among them, we can mention shareholders, customers, employees, suppliers, regulators, among others.<\/p><p>The legal consequences of losing confidential information due to a cyberattack may vary depending on the stakeholder concerned, the jurisdiction in which it is located and the specific circumstances of the incident. The following describe some liabilities and suggestions for mitigating risks:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-008cf8d elementor-widget elementor-widget-image\" data-id=\"008cf8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"140\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08.jpg\" class=\"attachment-large size-large wp-image-2938\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08.jpg 1858w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08-300x52.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08-1024x179.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08-768x134.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08-1536x269.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-08-18x3.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-763d8a8 e-flex e-con-boxed e-con e-parent\" data-id=\"763d8a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d161a35 e-con-full e-flex e-con e-child\" data-id=\"d161a35\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5598dce elementor-widget elementor-widget-text-editor\" data-id=\"5598dce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Description<\/strong><\/p><p>If the organization had contractual agreements with third parties that required the protection of certain confidential information, it could face legal action for breach of contract if those obligations are not met.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bc74d2 e-con-full e-flex e-con e-child\" data-id=\"9bc74d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66866e7 elementor-widget elementor-widget-text-editor\" data-id=\"66866e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigation<\/strong><\/p><p>In your contracts you can establish certain cybersecurity protocols and define which cyber-attack scenarios will be considered \"force majeure\". The purpose is that your organization is protected in case it suffers an attack, despite having taken all possible measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d499c91 e-flex e-con-boxed e-con e-parent\" data-id=\"d499c91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ea5a8c elementor-widget elementor-widget-image\" data-id=\"2ea5a8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"140\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09.jpg\" class=\"attachment-large size-large wp-image-2939\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09.jpg 1858w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09-300x52.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09-1024x179.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09-768x134.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09-1536x269.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-09-18x3.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40c1aa6 e-flex e-con-boxed e-con e-parent\" data-id=\"40c1aa6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fbe24ac e-con-full e-flex e-con e-child\" data-id=\"fbe24ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ae5e9e elementor-widget elementor-widget-text-editor\" data-id=\"8ae5e9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Description<\/strong><\/p><p>If the lost information includes intellectual property such as trade secrets, patents, or copyrights, there could be IP violations that could result in civil or criminal claims for damages.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed9dfe6 e-con-full e-flex e-con e-child\" data-id=\"ed9dfe6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5354be9 elementor-widget elementor-widget-text-editor\" data-id=\"5354be9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigation<\/strong><\/p><p>In addition to the recommendation above, you should file a complaint at the Attorney General's Office IP Unit, as well as monitor counterfeits in the market and report them. Recently, new cyber liability insurances have emerged that can help you mitigate potential costs.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dd73e8 e-flex e-con-boxed e-con e-parent\" data-id=\"3dd73e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb7884c elementor-widget elementor-widget-image\" data-id=\"fb7884c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"140\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10.jpg\" class=\"attachment-large size-large wp-image-2940\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10.jpg 1858w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10-300x52.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10-1024x179.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10-768x134.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10-1536x269.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-10-18x3.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abf0e9f e-flex e-con-boxed e-con e-parent\" data-id=\"abf0e9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7791843 e-con-full e-flex e-con e-child\" data-id=\"7791843\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb16af0 elementor-widget elementor-widget-text-editor\" data-id=\"cb16af0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Description<\/strong><\/p><p>Individuals affected by the loss of confidential information could file civil or criminal lawsuits for damages, alleging that the organization or individual was negligent in protecting their data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80c56fd e-con-full e-flex e-con e-child\" data-id=\"80c56fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e08078 elementor-widget elementor-widget-text-editor\" data-id=\"2e08078\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigation<\/strong><\/p><p>It is advisable to communicate with people whose personal information has been breached and extend recommendations to protect themselves. For example, if their financial information is involved, you can recommend that they get a new credit card and change their passwords.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d0084e e-flex e-con-boxed e-con e-parent\" data-id=\"9d0084e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ce74725 e-flex e-con-boxed e-con e-child\" data-id=\"ce74725\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-641c7b2 elementor-widget elementor-widget-image\" data-id=\"641c7b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"140\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11.jpg\" class=\"attachment-large size-large wp-image-2941\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11.jpg 1858w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11-300x52.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11-1024x179.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11-768x134.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11-1536x269.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/EN-11-18x3.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9bdf8cd e-flex e-con-boxed e-con e-parent\" data-id=\"9bdf8cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-84229dc e-con-full e-flex e-con e-child\" data-id=\"84229dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57907f3 elementor-widget elementor-widget-text-editor\" data-id=\"57907f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Description<\/strong><\/p><p>The offender could commit crimes such as destruction of computer records, alteration of programs, manipulation of information, among others. In addition, it is possible that the Attorney General's Office may investigate and file criminal charges against individuals or the organization if negligence or intentional misconduct is deemed to have occurred.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db0173e e-con-full e-flex e-con e-child\" data-id=\"db0173e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e83eff elementor-widget elementor-widget-text-editor\" data-id=\"9e83eff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigation<\/strong><\/p><p>We recommend that you have an internal cybersecurity protocol or regulation that includes staff training, licensing of any software purchased and any other relevant information. The goal is to mitigate potential incidents, as well as to demonstrate in the event of one that your organization has not been negligent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4366be e-flex e-con-boxed e-con e-parent\" data-id=\"c4366be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-240a40c e-flex e-con-boxed e-con e-child\" data-id=\"240a40c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c9f12b elementor-widget elementor-widget-image\" data-id=\"2c9f12b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"140\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12.jpg\" class=\"attachment-large size-large wp-image-2964\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12.jpg 1858w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12-300x52.jpg 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12-1024x179.jpg 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12-768x134.jpg 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12-1536x269.jpg 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/CAMBIOS-12-18x3.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd5b242 e-flex e-con-boxed e-con e-parent\" data-id=\"cd5b242\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e923155 e-con-full e-flex e-con e-child\" data-id=\"e923155\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7b10e4 elementor-widget elementor-widget-text-editor\" data-id=\"e7b10e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Description<\/strong><\/p><p>If a shareholder considers that there was negligence in the protection of their information or the value of their shares, they could take both civil and criminal action.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28bd5e9 e-con-full e-flex e-con e-child\" data-id=\"28bd5e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6be10fc elementor-widget elementor-widget-text-editor\" data-id=\"6be10fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Mitigation<\/strong><\/p><p>In addition to being transparent, it is advisable to have protocols for responding to cyber-attacks, as well as to prepare reports detailing how these protocols have mitigated costs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-817fb2b e-flex e-con-boxed e-con e-parent\" data-id=\"817fb2b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f0a1b9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6f0a1b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e656f9 elementor-widget elementor-widget-text-editor\" data-id=\"5e656f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\">These recommendations are general and do not include specific requirements that regulated industries might have, such as finance, health services, insurance, professional services (especially legal), among others. In these industries, the law includes more specific provisions on the safeguarding of information.<\/p><p style=\"text-align: justify;\">For more information on how to protect your operations, please contact us.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0cfbc54 e-flex e-con-boxed e-con e-parent\" data-id=\"0cfbc54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-070ff7b e-con-full e-flex e-con e-child\" data-id=\"070ff7b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e19c70 elementor-widget elementor-widget-image\" data-id=\"2e19c70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-1024x1024.jpg\" class=\"attachment-large size-large wp-image-2709\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-1024x1024.jpg.webp 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-300x300.jpg.webp 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-150x150.jpg.webp 150w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-768x768.jpg.webp 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-1536x1536.jpg.webp 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-2048x2048.jpg.webp 2048w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-12x12.jpg.webp 12w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/01\/elementor\/thumbs\/Firma-Alfaro_Mesa-de-trabajo-1-copia-15-qig8q99a1hcqc9f56sj9xjzsjl30s9t3f7s3gxsxjk.jpg 200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38fba66 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"38fba66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/carrillolaw.com\/en\/miembro\/alfaro-lopez\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\u00c1LFARO L\u00d3PEZ<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50fadb7 e-con-full e-flex e-con e-child\" data-id=\"50fadb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe823b0 elementor-widget elementor-widget-image\" data-id=\"fe823b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-1024x1024.jpg\" class=\"attachment-large size-large wp-image-2909\" alt=\"\" srcset=\"https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-1024x1024.jpg.webp 1024w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-300x300.jpg.webp 300w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-150x150.jpg.webp 150w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-768x768.jpg.webp 768w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-1536x1536.jpg.webp 1536w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-2048x2048.jpg.webp 2048w, https:\/\/carrillolaw.com\/wp-content\/uploads\/2024\/02\/Jenni-firma-12x12.jpg.webp 12w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c52d023 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c52d023\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/carrillolaw.com\/en\/miembro\/jennifer-bravo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">jennifer bravo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Have you ever checked your bank statements and found transactions that you do not recognize? Recently in Guatemala...<\/p>","protected":false},"author":9,"featured_media":2903,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[26],"tags":[33,348,356,355,357,263,358,175,359],"class_list":["post-2902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-freshstartmonday","tag-freshstartmonday-2","tag-alfaro-lopez","tag-ciberdelito","tag-ciberdelitos","tag-ciberseguridad","tag-guatemala","tag-informacion-confidencial","tag-jennifer-bravo","tag-propiedad-intelectual"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts\/2902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/comments?post=2902"}],"version-history":[{"count":45,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts\/2902\/revisions"}],"predecessor-version":[{"id":2968,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/posts\/2902\/revisions\/2968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/media\/2903"}],"wp:attachment":[{"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/media?parent=2902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/categories?post=2902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carrillolaw.com\/en\/wp-json\/wp\/v2\/tags?post=2902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}