Derecho (R)
URI permanente para esta colección
Examinar
Envíos recientes
Ítem ¿CÓMO ESTÁ ESTABLECIDO EL HURTO INFORMÁTICO EN COLOMBIA A PARTIR DE LA LEY 1273 DE 2009?(Universidad La Gran Colombia, 2023-05-11) Espejo Valencia, Andrés Felipe; Torres Vasquez, HenrryComputer crimes have their origin since the end of World War II, in 1945; From then on, society was going to face a great change that was related to the concept of information. For this reason, with the birth of the Internet as a vital instrument to search for information in the sixties, a criminal way is also discovered that allows access to different information and personal data of others. This new criminal modality will be defined as computer crimes. The Congress of the Republic enacted Law 1273 of 2009. Through this, a modification was made in the penal code, in which a new legal right was created that was protected to protect data and information, in order to fully preserve the systems that use Information Technology. and Communication (hereinafter, ICT), in addition to containing other provisions (Congress of the Republic, 2009). This law constitutes an advance in Colombian legislation because crimes that violate information and data, which constitute a legal right, were classified and penalized. In this paper, said law is carefully examined, in order to determine if those crimes that were committed with the use of ICTs are in force and if with the vertiginous advance of these they have increased and new crimes have appeared that are not typified in this norm. . It should be noted that for the development of this work the methodology that was used was the following: review of texts that deal with cybercrimes, specifically computer theft, review the increase in these crimes during the last two years, considering national and international regulations at regard. Likewise, the current Colombian regulations regarding computer crimes were analyzed and the most common crimes of this type in the country were investigated. Keywords: computer crimes, technology, computing, Internet, theft.