Todas las entradas de José Cuervo

12Ene/22

Ley n° 29246 de 4 de junio de 2008

Ley n° 29246 de 4 de junio de 2008, Ley que modifica la Ley n° 28493, Ley que regula el uso del correo electrónico comercial no solicitado (SPAM).

EL PRESIDENTE DE LA REPÚBLICA

POR CUANTO:

El Congreso de la República ha dado la Ley siguiente:

LEY QUE MODIFICA LA LEY nº 28493, LEY QUE REGULA EL USO DEL CORREO ELECTRÓNICO COMERCIAL NO SOLICITADO (SPAM)

Artículo único.- Modificatoria

Modifícanse los artículos 3º, 6º y 8º de la Ley nº 28.493, Ley que regula el uso del correo electrónico comercial no solicitado (Spam), los mismos que quedan redactados en los siguientes términos:

Artículo 3º. Derechos de los usuarios

Son derechos de los usuarios de correo electrónico:

a) Rechazar o no la recepción de correos electrónicos comerciales

b) Revocar la autorización de recepción, salvo cuando dicha autorización sea una condición esencial para la provisión del servicio de correo electrónico

c) Que su proveedor de servicio de correo electrónico cuente con sistemas o programas que filtren los correos electrónicos no solicitados

d) El reenvío del correo electrónico al emisor del correo electrónico comercial no solicitado, con la copia respectiva a la cuenta implementada por el INDECOPI

Dicho reenvío será considerado como prueba de que el usuario rechaza la recepción de correos electrónicos comerciales no solicitados.

Artículo 6º. Correo electrónico comercial no solicitado considerado ilegal

El correo electrónico comercial no solicitado será considerado ilegal en los siguientes casos:

a) Cuando no cumpla con alguno de los requisitos establecidos en el artículo 5º de la presente ley.

b) Contenga nombre falso o información falsa que se oriente a no identificar a la persona natural o jurídica que transmite el mensaje.

c) Contenga información falsa o engañosa en el campo del “asunto” (o subject), que no coincida con el contenido del mensaje.

d) Se envíe o transmita a un receptor que haya formulado el pedido para que no se envíe dicha publicidad, luego del plazo de dos (2) días.

En este caso, el receptor o usuario queda expedito para presentar su denuncia cuando reciba el correo electrónico comercial no solicitado luego de haber expresado su rechazo mediante el reenvío señalado en el literal d) del artículo 3º de la presente Ley, o por cualquier otra forma equivalente, debiendo adjuntar a su denuncia copia del correo electrónico de dicho rechazo y del nuevo correo enviado por el remitente.

Artículo 8º. Derecho a compensación pecuniaria

El receptor de correo electrónico ilegal podrá accionar por la vía del proceso sumarísimo contra la persona que lo haya enviado, a fin de obtener una compensación pecuniaria, la cual será equivalente al uno por ciento (1%) de la Unidad Impositiva Tributaria por cada uno de los mensajes de correo electrónico transmitidos en contravención de la presente Ley, con un máximo de tres (3) Unidades Impositivas Tributarias. Para tales efectos, el usuario afectado deberá adjuntar a su demanda copia certificada de la resolución firme o consentida emitida por el órgano competente del INDECOPI, donde se establezca la ilegalidad de la conducta del remitente del correo electrónico recibido. Mientras no se expida resolución firme sobre dicha infracción se suspende el plazo de prescripción para efectos de reclamar el derecho a la compensación pecuniaria.

DISPOSICIONES FINALES

PRIMERA. Vigencia

La presente Ley entra en vigencia al día siguiente de su publicación en el Diario Oficial El Peruano.

SEGUNDA. Derogación

Deróganse o déjanse sin efecto, según corresponda, las normas que se opongan al contenido de la presente Ley.

Comuníquese al señor Presidente de la República para su promulgación

En Lima, a los cuatro días del mes de junio de dos mil ocho.

LUIS GONZALES POSADA EYZAGUIRRE, Presidente el Consejo de la República

ALDO ESTRADA CHOQUE, Primer Vicepresidente del Congreso de la República

AL SEÑOR PRESIDENTE CONSTITUCIONAL DE LA REPÚBLICA

POR TANTO:

Mando se publique y cumpla

Dado en la Casa de Gobierno, en Lima, a los veintitrés días del mes de junio del año dos mil ocho

ALAN GARCÍA PÉREZ, Presidente Constitucional de la República

JORGE DEL CASTILLO GÁLVEZ, Presidente el Consejo de Ministros

12Ene/22

Ley nº 31.169 de 30 de marzo de 2021

Ley nº 31.169 de 30 de marzo de 2021, que declara de interés nacional y necesidad pública la instalación de antenas de radio, televisión e Internet para facilitar a niñas, niños y adolescentes de zonas rurales el aprendizaje de lecciones a distancia “aprendo en casa”.

Artículo único. Declaración de interés nacional y necesidad pública

Declárase de interés nacional y necesidad pública la instalación de antenas de radio, televisión e internet para facilitar a niñas, niños y adolescentes de zonas rurales el aprendizaje de lecciones a distancia Aprendo en casa.

Comuníquese al señor Presidente de la República para su promulgación.

En Lima, a los treinta días del mes de marzo de dos mil veintiuno.

MIRTHA ESTHER VÁSQUEZ CHUQUILIN, Presidenta a. i. del Congreso de la República

LUIS ANDRÉS ROEL ALVA, Segundo Vicepresidente del Congreso de la República

AL SEÑOR PRESIDENTE DE LA REPÚBLICA

POR TANTO:

Mando se publique y cumpla.

Dado en la Casa de Gobierno, en Lima, a los quince días del mes de abril del año dos mil veintiuno.

FRANCISCO RAFAEL SAGASTI HOCHHAUSLER, Presidente de la República

VIOLETA BERMÚDEZ VALDIVIA, Presidenta del Consejo de Ministros

27Dic/21

Número 26, segundo semestre de 2021

  1. Ballester León, Roger Ginler
  2. Chavez Sánchez, José Luis
  3. Demestre Saborit, Juan Luis
  4. Estrada Vázquez, Daniel
  5. Flores Dapkevicius, Rubén
  6. Hechevarría Derronselet, Yoendris
  7. Reinaldo Filho, Demócrito

ISSN 1989-5852
Título clave: Revista informática jurídica
Tít. abreviado: Rev. inform. jurid.

Introducción

En este vigésimo sexto número de la Revista, aparecen artículos de colaboradores por orden alfabético.

Un agradecimiento especial a los 7 colaboradores que han aportado sus artículos para hacer posible la publicación semestral de esta revista, que ya lleva 13 años.

Quisiera aprovechar esta publicación deseando unas felices fiestas navideñas y buena entrada y salida de año. Esperemos que el año que viene sea al menos como este y si es posible mejor.

Un cordial saludo para todos y gracias por vuestra colaboración.

José Cuervo Álvarez

Ballester León, Roger Ginler

Ministerio de Educación Superior Universidad de Granma. Centro Universitario Municipal de Media Luna

Chavez Sánchez, José Luis

Lic. Técnico Académico Asociado. Dirección de Colaboración y Vinculación, DGTIC, UNAM.

Demestre Saborit, Juan Luis

Profesor Asistente de la Universidad de Granma. Sede “Blas Roca Calderío”

El Diseño gráfico una alternativa en la comunicación de la Sociedad  (13.12.2021) (Trabajo en colaboración con Lic. Daniel Estrada Vázquez y Lic. Yoendris Hechavarría Derronselet)

Estrada Vázquez, Daniel

Profesor Asistente de la Universidad de Granma, sede “Blas Roca Calderío”

Flores Dapkevicius, Rubén

Doctor en Derecho y Ciencias Sociales y Abogado  por la Universidad Mayor de la República
Profesor de Derecho  Público de la Universidad  Mayor de la República
Integrante fundador de la Asociación Mundial  de Justicia Constitucional
Integrante fundador de la Asociación Argentina  de Justicia Constitucional
Integrante fundador de la Asociación Uruguaya de Derecho Procesal Constitucional
Integrante del Anuario de Derecho Administrativo Uruguayo
Integrante fundador  del Centro de Estudios  de Derecho Público
Autor de varios libros, entre los que se observan su “Manual de Derecho Público”, dos tomos, Constitucional y
Administrativo;  “Manual Teórico Práctico de Contratación Administrativa, incluye el TOCAF anotado y
Concordado”; “Amparo, Hábeas Corpus y  Hábeas Data” 3ra edición; “El Procedimiento Disciplinario” 5ta Edición; 
“Procedimiento Expropiatorio”, 4ta edición;  “La Acción de Nulidad y Responsabilidad del Estado” 3ra edición;  
“Decreto 500/91”,  7ma. Edición, TOCAF, anotado y concordado. Incluye índice temático y jurisprudencia, 5ta.
Edición; Prevención de lavado de activos y financiamiento del terrorismo Leyes N° 19574 y N° 19749 publicados en
la República Argentina.   
Otros libros de sus autoría son “Funcionarios Públicos”,  “Habeas Data y Acceso a la Información Pública”; 
Estatuto del Funcionario, etc. material publicado en Uruguay, Argentina, Colombia, Perú, Brasil y España 
Por último se destacan su  “Tratado de Derecho Constitucional”, dos tomos, publicado en Editorial “La Ley”,
 Buenos Aires-Montevideo y,  “Tratado de Derecho Administrativo”, dos tomos, publicado en Editorial “La Ley”,
 Buenos Aires-Montevideo, 2da. Edición 2021
Actualizó junto al Prof. Daniel Hugo Martins  la tesis profesoral del Prof. Enrique Sayagués Laso titulada “La
Licitación Pública “, libro publicado en la República Argentina. 
Autor de más de tres centenares de trabajos sobre temas de su especialidad, publicados en el país y en el exterior.
Corresponsal redactor de varios diarios  y revistas , en formato papel y electrónico  en Argentina , España,  México,
Perú,  etc..
Integrante de diversos Consejos Editoriales de Revistas en el extranjero.
Corredactor del TOFUP (funcionarios públicos) , Decreto 200/97 y de los Decretos modificativos del Decreto  500/91
(procedimiento común ,   disciplinario y recursivo ) , en su calidad de funcionario público
Ex Asesor de la Presidencia de la República y  Asesor Letrado en el  Poder Legislativo
Asesor Letrado del Servicio Civil de la Presidencia de la República
Jefe de la Asesoría Letrada de las Obras Sanitarias del Estado.
Jefe de  la División Sumarios de dicha Persona Pública estatal.
Expositor Nacional e Internacional

Prevención de Lavado o Blanqueo de Capitales con Criptoactivos: “bitcoin” o criptoactivos de la blockchain (31.12.2021)

Hechavarría Derronselet, Yoendris

Licenciado en Educación Laboral. Profesor Asistente del departamento Educación Laboral-Informática de la Universidad de Granma Sede “Blas Roca Calderío”

  • El Diseño gráfico una alternativa en la comunicación de la Sociedad  (13.12.2021) (Trabajo en colaboración con Lic. Juan Luis Demestre Saborit y Lic. Daniel Estrada Vázquez)
  • Reinaldo Filho, Demócrito

    Desembargador do TJPE

    06Dic/21

    Ley n° 31207 de 31 de mayo de 2021

    Ley n° 31207 de 31 de mayo de 2021, que garantiza la velocidad mínima de conexión a Internet y monitoreo de la prestación del servicio de Internet a favor de los usuarios.

    LA PRESIDENTA A. I. DEL CONGRESO DE LA REPÚBLICA

    POR CUANTO:

    EL CONGRESO DE LA REPÚBLICA;

    Ha dado la Ley siguiente:

    LEY QUE GARANTIZA LA VELOCIDAD MÍNIMA DE CONEXIÓN A INTERNET Y MONITOREO DE LA PRESTACIÓN DEL SERVICIO DE INTERNET A FAVOR DE LOS USUARIOS

    Artículo 1. Objeto de la Ley

    La presente ley tiene como objeto garantizar y promover la óptima prestación del servicio de internet, así como la efectiva calidad, velocidad y monitoreo de la prestación contratada por los proveedores del servicio de internet.

    Artículo 2. Objetivos y principios

    Los objetivos y principios de la presente ley son los siguientes:

    a) Fomentar la competencia efectiva en los mercados de telecomunicaciones para potenciar al máximo los beneficios para las empresas y los consumidores, principalmente en términos de bajada de los precios, calidad de los servicios e innovación, teniendo debidamente en cuenta la variedad de condiciones en cuanto a la competencia y los consumidores que existen en las distintas áreas geográficas, y velando por que no exista falseamiento ni restricción de la competencia en la explotación de redes o en la prestación de servicios de comunicaciones electrónicas, incluida la transmisión de contenidos.

    b) Desarrollar la economía y el empleo digital, promover el desarrollo del sector de las telecomunicaciones y de todos los nuevos servicios digitales que las nuevas redes rápidas permiten, impulsando la cohesión social y territorial, mediante la mejora y extensión de las redes, así como la prestación de los servicios de comunicaciones electrónicas y el suministro de los recursos asociados a ellas.

    c) Promover el despliegue de redes y la prestación de servicios de comunicaciones electrónicas, fomentando la conectividad y la interoperabilidad extremo a extremo y su acceso, en condiciones de igualdad y no discriminación.

    d) Promover el desarrollo de la industria de productos y equipos de telecomunicaciones.

    e) Contribuir al desarrollo del mercado interior de servicios de comunicaciones electrónicas en el Perú.

    f) Promover la inversión eficiente en materia de infraestructuras incluyendo, cuando proceda, la competencia basada en infraestructuras, fomentando la innovación y teniendo debidamente en cuenta los riesgos en que incurren las empresas inversoras.

    g) Hacer posible el uso eficaz de los recursos limitados de telecomunicaciones, como la numeración y el espectro radioeléctrico, y la adecuada protección de este último, y el acceso a los derechos de ocupación de la propiedad pública y privada.

    h) Fomentar, en la medida de lo posible, la neutralidad tecnológica en la regulación y garantizar el cumplimiento de las obligaciones de servicio público en la explotación de redes y la prestación de servicios de comunicaciones electrónicas.

    i) Defender los intereses de los usuarios, asegurando su derecho al acceso a los servicios de comunicaciones electrónicas en condiciones adecuadas de elección, precio y buena calidad, promoviendo la capacidad de los usuarios finales para acceder y distribuir la información o utilizar las aplicaciones y los servicios de su elección, en particular a través de un acceso abierto a internet.

    j) Salvaguardar y proteger en los mercados de telecomunicaciones, la satisfacción de las necesidades de grupos sociales específicos, las personas con discapacidad, las personas mayores, las personas en situación de dependencia y usuarios con necesidades sociales especiales, atendiendo a los principios de igualdad de oportunidades y no discriminación.

    k) Facilitar el acceso de los usuarios con discapacidad a los servicios de comunicaciones electrónicas y al uso de equipos terminales.

    l) Las leyes o normas emitidas por el Poder Ejecutivo deberán prevalecer sobre cualquier ordenanza o disposición emitida por gobiernos regionales o municipalidades provinciales, distritales o de centro poblado, que puedan limitar o contravenir cualquier iniciativa o inversión que busque mejorar la calidad del servicio de internet para los usuarios.

    Artículo 3. Promoción del servicio y acceso a la información

    Créanse los instrumentos o espacios que faciliten el acceso a la información de los usuarios respecto a la velocidad y calidad de la prestación de servicio de internet sin discriminación.

    Artículo 4. Registro y monitoreo

    Créase el Registro Nacional de Monitoreo y Vigilancia del Servicio de Internet (RENAMV), que estará a cargo el Organismo Supervisor de Inversión Privada en Telecomunicaciones (OSIPTEL), ente que establecerá la medición de la velocidad del servicio de internet, el cual será publicado mensualmente en su página web oficial y/o en aplicativos para dispositivos electrónicos como teléfonos celulares inteligentes, tabletas y otros dispositivos electrónicos de uso personal.

    Artículo 5. Infraestructura

    El Estado, como promotor de la inversión pública y privada, deberá facilitar las condiciones básicas para el desarrollo de infraestructura que coadyuven al buen funcionamiento de los servicios de internet, priorizando las zonas rurales, zonas de fronteras y comunidades indígenas.

    El Ministerio de Transportes y Comunicaciones, a través del Programa Nacional de Telecomunicaciones (PRONATEL), es el ente encargado de fortalecer el acceso inmediato y oportuno de los servicios de comunicaciones para zonas de pobreza y extrema pobreza.

    Artículo 6. Modificaciones normativas

    Modifícanse el artículo 5 de la Ley 29904, Ley de Promoción de la Banda Ancha y Construcción de la Red Dorsal Nacional de Fibra Óptica, con el siguiente texto:

    “Artículo 5. Velocidad mínima para el acceso a internet de banda ancha

    El Ministerio de Transportes y Comunicaciones determina y actualiza anualmente la velocidad mínima para que una conexión sea considerada como acceso a internet de banda ancha, que será aplicable con independencia de la ubicación geográfica de los usuarios.

    Los prestadores de servicios de internet deberán garantizar el 70% de la velocidad mínima ofrecida en los contratos con los consumidores o usuarios, y establecidas en sus planes (postpago, prepago y otros) publicitados en los diferentes medios de comunicación.

    El Organismo Supervisor de Inversión Privada en Telecomunicaciones (OSIPTEL), a través del Registro Nacional de Monitoreo y Vigilancia del Servicio de Internet (RENAMV), vigila y actualiza periódicamente la velocidad de internet y otras características técnicas de las conexiones a internet de banda ancha.”

    Artículo 7. Incorporación del numeral 66.8 al artículo 66 de la Ley 29571, Código de Protección y Defensa del Consumidor, con el siguiente texto:

    “Artículo 66. Garantía de protección a los usuarios de servicios públicos regulados

    […]

    66.8 El usuario de los servicios públicos de internet tiene los siguientes derechos:

    a) La defensa de sus intereses, asegurándose su derecho al acceso a los servicios de comunicaciones electrónicas en condiciones adecuadas de elección, precio y calidad, promoviendo su capacidad a acceder, distribuir la información o utilizar las aplicaciones los servicios de sus elecciones, en particular a través de un acceso abierto a internet.

    b) Tener a su disposición herramientas de medición de las velocidades del servicio de internet de bajada y de subida por la banda ancha. Estos aplicativos proporcionados por las empresas de telecomunicaciones son accesibles vía web. Estos registros se utilizan en procedimiento y son considerados medios probatorios.

    c) Obtener una velocidad mínima garantizada del servicio de internet de banda ancha que contratan. Dicha velocidad no puede ser menor al 70% de la velocidad de bajada y de subida contratada en áreas urbanas y rurales.

    d) A que, en la publicidad de los productos de telecomunicaciones, se consigne con claridad y en forma destacada la velocidad mínima garantizada del servicio de internet, la cantidad de megas por mes adquirida y la cantidad de los canales que incluyen el servicio de cable que ofrece”.

    Artículo 8. Dación de cuenta

    El titular del pliego del Ministerio de Transportes y Comunicaciones debe informar a la Comisión de Transportes y Comunicaciones del Congreso de la República la implementación de la universalización del acceso de internet cada primera semana del mes de junio.

    DISPOSICIONES COMPLEMENTARIAS FINALES

    PRIMERA.

    El Poder Ejecutivo, a través del Ministerio de Transportes y Comunicaciones y el Organismo Supervisor de Inversión Privada en Telecomunicaciones (OSIPTEL) serán los encargados de adecuar, supervisar, fiscalizar y actualizar el Reglamento General de Calidad de los servicios Públicos de Telecomunicaciones y verificará el cumplimiento de lo dispuesto en la presente ley. Asimismo, el OSIPTEL establecerá los mecanismos para la prestación de los servicios de internet, estableciendo la simetría y la asimetría máxima entre la relación de carga y descarga (3:1 “3 de descarga, 1 de carga” y 1:3 “1 de descarga, 3 de carga”), declarándose de forma explícita toda esta información en los contratos de los usuarios.

    SEGUNDA.

    En un plazo no mayor de sesenta (60) días calendario, computados desde la publicación de la presente ley, el Organismo Supervisor de Inversión Privada en Telecomunicaciones (OSIPTEL) adecuará la Resolución 05-2016-CD/OSIPTEL o emitirá las normas de carácter reglamentario que sean necesarias para garantizar el cumplimiento de las disposiciones de la presente ley.

    POR TANTO:

    Habiendo sido reconsiderada la Ley por el Congreso de la República, insistiendo en el texto aprobado en sesión del Pleno realizada el día diecinueve de marzo de dos mil veintiuno, de conformidad con lo dispuesto por el artículo 108 de la Constitución Política del Perú, ordeno que se publique y cumpla.

    En Lima, a los treinta y un días del mes de mayo de dos mil veintiuno.

    MIRTHA ESTHER VÁSQUEZ CHUQUILIN, Presidenta a. i. del Congreso de la República

    LUIS ANDRÉS ROEL ALVA, Segundo Vicepresidente del Congreso de la República

    05Dic/21

    SENTENCIA T-043 DE 2020 DE LA CORTE CONSTITUCIONAL, DE 10 DE FEBRERO DE 2020

    SENTENCIA T-043 DE 2020 DE LA CORTE CONSTITUCIONAL, DE 10 DE FEBRERO DE 2020. PRUEBA ELECTRONICA. Valor probatorio de las capturas de pantalla extraídas de las aplicaciones de texto whatsapp como prueba indiciaria

    Sentencia de Tutela nº 043/20 de Corte Constitucional, 10 de Febrero de 2020

    Acción de tutela instaurada por la señora D. P. R. M. en contra de la sociedad Corporación Educa S.A.S. (Universo Mágico Kindergarten).

    Magistrado ponente: JOSÉ FERNANDO REYES CUARTAS

    Bogotá D.C., diez (10) de febrero de dos mil veinte (2020)

    La Sala Octava de Revisión de tutelas de la Corte Constitucional, integrada por los Magistrados Carlos Bernal Pulido, Alberto Rojas Ríos y José Fernando Reyes Cuartas, quien la preside, en ejercicio de sus competencias constitucionales y legales, profiere la siguiente:

    SENTENCIA

    Dentro del proceso de revisión de los fallos emitidos el 19 de marzo de 2019 por el Juzgado Primero Civil Municipal de Chía, en primera instancia, y el 10 de mayo de 2019 por el Juzgado Primero de Familia de Zipaquirá, en segunda instancia, en la acción de tutela de la referencia.

    I. ANTECEDENTES

    El 5 de marzo de 2019, la señora D. P. R. M. instauró acción de tutela en contra de la sociedad Corporación Educa S.A.S. (Universo Mágico Kindergarten), al considerar que vulneró sus derechos fundamentales al trabajo, a la estabilidad laboral reforzada, a la seguridad social, al fuero de maternidad y a la “confianza legítima”. Fundamentó el amparo constitucional con base en los siguientes,

    Hechos 

    1.  Expresó que tuvo una relación laboral con la sociedad Corporación Educa S.A.S., al haber sido contratada para desempeñar el cargo de docente en el grado pre-jardín en el establecimiento educativo “Jardín Universo Mágico” con sede en el municipio de Chía (Cundinamarca).

    2.  Al respecto, manifestó que suscribió dos contratos de trabajo a término fijo menor a un año. El primero, cuyos extremos estuvieron comprendidos entre el 6 de marzo de 2017 hasta el 30 noviembre de 2017 y, el segundo, entre el 1º de febrero de 2018 al 18 de noviembre de 2018.

    3.  Informó que el 24 de noviembre de 2018, en la reunión de despedida organizada para los empleados, “el señor Jacinto, uno de los propietarios del plantel, agradeció a todas las profesoras por la labor realizada y expresó su voluntad de continuar con el mismo equipo de trabajo para el año 2019” (1).

    4.  Expresó que el 13 de diciembre de 2018 asistió a las instalaciones del centro educativo para firmar la liquidación del contrato, fecha en la que le preguntó a la señora M. L. S. C.–directora de sede, según la narración de la actora-, si su contrato sería renovado obteniendo por respuesta que se continuaría con el mismo personal para el 2019.

    5.  La señora D. P. señaló que el 15 de enero de 2019, a través del grupo interno de la institución Jardín Universo Mágico en la aplicación WhatsApp, se le preguntó por sus tallas de vestir con el propósito de elaborar su uniforme y calzado de dotación.

    6.  Mencionó que el 18 de enero de 2019 se realizó una prueba de embarazo casera que resultó positiva, por lo cual ese día se dirigió a la EPS para confirmar la respuesta obtenida a través de una prueba de sangre. En esa misma fecha, le comentó su estado de gravidez a su jefa directa, la señora M. L. S., quien le solicitó informar la conclusión de los exámenes médicos y le informó que comunicaría el suceso a la directora general, I. R. O..

    7.  Indicó que al día siguiente recibió un mensaje de la señora M. L. S., vía WhatsApp, en el cual le solicitó relatar cuánto tiempo de embarazo tenía, esto, por petición de la directora general. Así mismo, le precisó que esa situación debió haberla comentado antes de la finalización de la relación laboral de 2018.

    8.  Relató que el 23 de enero de 2019 obtuvo el resultado de la prueba de sangre, la cual fue positiva y con fecha de última regla (FUR) el 22 de noviembre de 2018, situación que la señora D. P. R. avisó a M. L. S., quien le dijo que informaría a la directora general y que posteriormente se comunicarían con ella.

    9.  Adujo que el 24 de enero, a través del grupo de WhatsApp del plantel educativo, recibió un comunicado en el que se estableció el 26 de enero de 2019 como fecha para realizar la suscripción de los nuevos contratos y la documentación requerida. Señaló que “(a)l leer este mensaje, di por hecho que mi contrato sería renovado. Sin embargo, con posterioridad recibí una llamada de la docente M. S., donde me comunicó que por orden de la directora general mi contrato no sería renovado” (2).

    10.  Manifestó que el 25 de enero fue eliminada del grupo de WhatsApp, no obstante, que para esa fecha seguía activa en la plataforma digital de la institución, incluso figuraba como personal docente para el año 2019.

    11.  Informó que en la calenda programada para diligenciar los contratos, se dirigió al lugar indicado para tal labor con el propósito de entrevistarse con la directora general, lo que no fue posible pues esta no la atendió. La actora indicó que en esa oportunidad radicó una petición en la que solicitó información sobre las razones por las cuales su contrato no fue renovado, requerimiento que no ha sido resuelto.

    12.  Comentó que el 18 de febrero de 2019 acudió a la oficina del inspector de trabajo del municipio de Chía, donde le indicaron que no le podrían conceder una entrevista hasta el mes de abril de ese año, en atención a la agenda de usuarios por atender. A juicio de la accionante, para ese momento habría acaecido un perjuicio irremediable, el cual pretendía evitar mediante la presente acción de tutela. Sin embargo, mencionó que uno de los empleados de la entidad le sugirió instaurar una acción de tutela.

    13.  A juicio de la señora D. P., existió un nexo causal entre el hecho de estar embarazada y la determinación de no haber renovado su contrato para el año 2019. Por otro lado, mencionó que se encuentra desafiliada del Sistema General de Seguridad Social en Salud -SGSSS-.

    14.  Por consiguiente, le solicitó al juez de tutela ordenar el reintegro, garantizar su derecho a la estabilidad laboral reforzada y ordenar el pago de los salarios dejados de percibir. Por último, como medida provisional pidió que se le ordenara a la accionada afiliarla al SGSSS.

    Trámite procesal

    15.  En auto del 6 de marzo de 2019 (3), el Juzgado Primero Civil Municipal de Cundinamarca avocó el conocimiento de la acción, vinculó al trámite a la Inspección del Trabajo del municipio de Chía y accedió a la medida provisional solicitada, por lo cual le ordenó a la sociedad Corporación Educa S.A.S. afiliar a la accionante al Sistema de Seguridad Social en Salud.

    16.  Al día siguiente, la representante legal suplente de la institución accionada (4), M. A. F. G., allegó un memorial al despacho de primera instancia (5), mediante el cual instauró los recursos de reposición y, en subsidio el de apelación, en contra de la decisión de acceder a la medida provisional, con base en que no se advertía la existencia de un perjuicio irremediable o la vulneración de derechos alegada. De igual forma, solicitó que, en caso de ser improcedentes los recursos, la autoridad judicial cesara los efectos de la determinación censurada.

    Respuesta de las entidades accionadas

    17.  La Corporación Educa S.A.S., a través de su representante legal suplente, se opuso a las pretensiones de la acción (6). Al efecto, manifestó que en el caso de la accionante se suscribieron dos contratos laborales “autónomos e independientes entre sí”. El primero, con vigencia entre el 7 de marzo de 2017 al 26 de noviembre de 2017, el segundo estuvo comprendido entre el 1º de febrero de 2018 y el 18 de noviembre de 2018, los cuales fueron concluidos y liquidados.

    Negó que la institución hiciera uso del grupo de comunicación mencionado por la actora, haber solicitado tallas de vestir de personal que no se hubiera contratado y citado a la accionante para que suscribiera un nuevo contrato. De otra parte, expresó que la señora I. R. O. (7) no tuvo conocimiento del embarazo de D. P. M durante el desarrollo de la relación laboral ni en los meses de enero o febrero de 2019, pues solo se enteró de esa situación a partir de lo narrado en el escrito de tutela.

    Adujo que al momento de la finalización del contrato no se conocía el estado de la empleada, por lo cual no era necesario tramitar la autorización ante la oficina del trabajo. En cuanto a la falta de afiliación de la accionante al SGSSS, argumentó que esta cuenta con varias posibilidades, por ejemplo, afiliarse como trabajadora independiente, como beneficiara del padre de su hijo o gestionar su vinculación al régimen subsidiado de salud.

    Señaló que la decisión de no contratar los servicios profesionales de la accionante para el año 2019 “obedeció a motivos serios y objetivos, tales como el número total de estudiantes matriculados, pero nunca a un estado de embarazo que no se conocía, ni a trato discriminatorio alguno por una gravidez desconocida”. Así mismo, relató que la última relación laboral con la accionante finiquitó en noviembre de 2018, momento para el cual no se tenía conocimiento de su estado de embarazo.

    Comentó que la presente controversia debía resolverse a través de la jurisdicción ordinaria laboral, “(m)áxime si se tiene en cuenta que la accionante no ha manifestado ni probado que esté desprotegida o que esté disminuida para laborar o que sea madre cabeza de familia. Igualmente presumimos que el padre de su hijo por nacer tiene obligaciones al respecto y que obviamente las está cumpliendo”. En ese sentido, afirmó que no se advertía la ocurrencia de un perjuicio irremediable. Finalmente, solicitó “declarar la improcedencia de la acción impetrada y la denegación de los amparos solicitados”.

    18.   La Dirección Territorial de Cundinamarca del Ministerio del Trabajo, a través de la Coordinación del grupo de atención al ciudadano y trámites (8), mencionó que tras consultar sus bases de datos no se encontró solicitud de la Corporación Educa S.A.S. – Jardines Universo Mágico para terminar el contrato laboral de la señora D. P. R. M.

    19.  El 12 de marzo de 2018, el Inspector del Trabajo del municipio de Chía (9) manifestó que la atención que brinda la entidad a los usuarios se hace de forma personal o vía telefónica. Respecto de la primera, adujo que mediante el uso de planillas se asignan citas a las personas interesadas, las cuales se extienden hasta el mes de mayo. De ahí que para el momento en que la accionante acudió a la institución se le dijera que solo en el mes de abril habría agenda para poder atenderla.

    De otra parte indicó que la accionante no sostuvo ninguna conversación con los dos inspectores de trabajo que laboran en esa sede, por lo cual la sugerencia de acudir a la acción de amparo pudo proceder de “otro funcionario de alguna de las dependencias que funcionan en (la) Casa de Justicia”. Por último, solicitó su desvinculación.

    Sentencias objeto de revisión

    Primera instancia (10)

    20.  El Juzgado Primero Civil Municipal de Chía, en sentencia del 19 de marzo de 2019, concedió el amparo transitorio de los derechos invocados por la accionante, ordenándole a la accionada reintegrarla al cargo de docente y, a la primera, acudir a la vía ordinaria en el término máximo de 6 meses. Así mismo, desvinculó a la inspección de trabajo de Chía.

    Al efecto, el juez consideró que a la señora D. P. R. se le comunicó, de forma oral, la renovación de su contrato para el 2019, situación que se reflejó en el hecho que aun figurara en la página virtual del plantel, además de habérsele preguntado sobre su talla de vestir para los implementos de dotación. Sin embargo, al informar sobre su estado de gravidez, los representantes de la institución educativa decidieron no renovar su contrato de trabajo, lo cual configuró un “trato discriminatorio por motivos o con ocasión del embarazo”, vulnerando así su derecho a la estabilidad laboral reforzada. De otra parte, a partir del artículo 46 del Código Sustantivo del Trabajo (11), adujo que el contrato de trabajo se renovaría para el año 2019 por el mismo término pactado en 2018.

    Impugnación

    21.  La representante legal de la Corporación Educa S.A.S. impugnó el fallo (12). Afirmó que la empresa realizó “en debida forma el preaviso del contrato para el año 2018”, momento en el cual la accionante no se encontraba en embarazo, por lo que no podía considerarse que la terminación de la relación fuera consecuencia de dicha circunstancia. Reiteró que el contrato suscrito en el 2018 había finalizado y liquidado. Así mismo, señaló que cuando la accionante quedó encinta no ostentaba ninguna relación laboral con la institución educativa.

    Mencionó que “(s)i la actora se lo comentó (su estado de preñez) a alguna de sus antiguas compañeras de trabajo (que tampoco se probó), ello pudo ocurrir antes de la contratación del año 2019, y por ese solo hecho no puede presumirse que alguno de los representantes legales de la encartada tuviere conocimiento idóneo o precario”. Por otro lado, reprochó que el juez a quo le hubiera otorgado valor probatorio a las conversaciones efectuadas en la aplicación WhatsApp, pues, a su juicio, por la forma en la que fueron presentadas no podían ser consideradas como una prueba “idónea”, y haberse dado por sentado que la señora M. L. S. ostentara representación en la empresa y que hubiera comunicado a los directivos de la institución el estado médico de la accionante.

    Indicó que entre las pruebas aportadas con el escrito de tutela no obra ningún documento con sello o firma de recibido por parte de la accionada o por alguien con facultad para ello. Finalmente, reiteró que el asunto debe zanjarse a través de la vía ordinaria. Con fundamento en lo anterior, solicitó revocar la decisión adoptada en primera instancia.

    22.  Mediante escrito radicado el 8 de abril de 2019 (13), la accionante se pronunció frente a lo expuesto en la impugnación. Por una parte, adujo que su caso era similar al estudiado en la sentencia T-169 de 2008. Por otro lado, manifestó que, a partir de las pruebas aportadas en la acción de tutela, se advertía que los directivos de la sociedad accionada sí conocían de su estado de embarazo, tanto así que antes de comunicarles tal situación, estaban desarrollando gestiones relacionadas con la continuidad de la relación laboral, lo cual cambió cuando les dio a conocer su estado de gravidez.

    Refirió que al terminar la relación laboral de 2018 los docentes recibieron un oficio “en el cual se informaba acerca de la finalización del contrato para ese periodo lectivo (…), pero nada se dijo en torno a que se abstendrían de renovarlo para el periodo inmediatamente siguiente”. Contrarió la afirmación de la parte accionada en el sentido que la no contratación se debió a razones objetivas relacionadas con las necesidades de la empresa, pues, según expresó, fueron contratadas tres nuevas docentes y sus antiguas compañeras.

    Para terminar, relató que la accionada no logró desvirtuar la presunción de despido injusto, y señaló que no cuenta con los recursos económicos suficientes para asumir la afiliación de su núcleo familiar al sistema de seguridad social. Ello, aunado a que su esposo está desempleado.

    Segunda instancia

    23.  El Juzgado Primero de Familia de Zipaquirá, mediante sentencia del 10 de mayo de 2019, revocó el fallo y, en su lugar, negó el amparo. Consideró que la accionante quedó en embarazo con posterioridad a la terminación del vínculo laboral, puesto que el último contrato suscrito con la Corporación Educa S.A.S. concluyó el 18 de noviembre de 2018; mientras que, según lo acreditado por la prueba de embarazo, la fecha de la última regla acaeció el 22 de noviembre de 2018.

    De ahí que dedujera que “la protección especial para la mujer embarazada no la cobija, por cuanto la jurisprudencia y la ley amparan la estabilidad laboral reforzada de la mujer que se encuentra en estado de gestación al momento de la terminación del vínculo laboral con independencia de que tengan las partes o no conocimiento del estado de gravidez de la empleado (…)”. Por último, manifestó que la interesada podía acudir a la jurisdicción ordinara para la resolución de la controversia.

    Pruebas que obran en el expediente

    24.  Las pruebas que obran en el expediente son las que a continuación se relacionan:

    (i)      Copia de la cédula de ciudadanía de la señora D. P. R. M. (14).

    (ii)   Copia del acta de grado del 1° de junio de 2015, de la señora D. P. R. como Licenciada en pedagogía infantil (15), y copia del respectivo diploma (16).

    (iii)  Copia de resultados de exámenes de laboratorio con fecha del 23 de enero de 2019, realizados a la señora  

    (iv)  Copia del resultado de la prueba de ecografía obstétrica transvaginal realizada a la señora D. P. R. el 22 de febrero de 2019 (17). 

    (v)   Captura de pantalla de la plataforma virtual “TuColegio.co”, en la que figura el nombre de la señora Patricia R. G.como “Docente-2019” (18).

    (vi)  Capturas de pantalla del grupo “Team Universo Mágico” tomadas de la aplicación WhatsApp (19).

    (vii)   Impresión de documento titulado “(l)ista de documentos personal antiguo”, que fue enviado al grupo “Team Universo Mágico” (20).

    (viii)     Capturas de pantalla de algunas comunicaciones sostenidas con el usuario denominado “Miss Mary Unimagico”, a través de la aplicación de WhatsApp, con fechas del 19 (21) y 24 de enero de 2019 (22).

    (ix)  Copia de la liquidación del contrato de trabajo de la señora D. P. R. M. con la sociedad Corporación Educa S.A.S., entre el 7 de marzo de 2017 al 30 de noviembre de 2017. El documento fue suscrito por las señoras R. G.e I. R. O. en calidad de gerente (23).

    (x)   Copia de la liquidación del contrato de trabajo de la señora D. P. R. M. con la sociedad Corporación Educa S.A.S. entre el 1° de febrero de 2018 al 18 de noviembre de 2018 (24).

    (xi)  Copia de comprobante de nómina de la señora D. P. R., correspondientes a los meses de febrero y marzo de 2018.

    (xii)   Copia del contrato de trabajo suscrito por las señoras D. P. R. M. e I. R. O. como empleadora de la empresa Corporación Educa S.A.S., con extremos laborales del 7 de marzo de 2017 al 26 de noviembre de 2017 (25).

    (xiii)     Petición suscrita por la señora D. P. R. M. y dirigida a la señora I. R. O en calidad de “directora general Jardines Universo Mágico”-. El escrito tiene sello de recibido de la institución con fecha del 26 de enero de 2019 (26).

    (xiv)     Un Cd contentivo del escrito de tutela y sus anexos, además de dos audios formato “Opus”, titulados “Audio de instrucciones para firmar contrato” y “Audio de instrucciones para uniformes(27). De igual manera, otro Cd con las actuaciones surtidas al interior del trámite de tutela tanto en primera como segunda instancia y dos audios formato “opus”, denominados “PTT-20190115-WA0000” y “PTT-20190124- WA0006”.

    Actuaciones en sede de revisión

    25.  La Sala de Selección número siete de la Corte Constitucional (28), en auto del 30 de julio de 2019 (29), escogió para revisión el presente asunto.

    26.  En proveído del 11 de septiembre de 2019 (30), el despacho del magistrado sustanciador decretó algunas pruebas tendientes a complementar las razones de juicio necesarias para el estudio del caso objeto de revisión, así:

    27.  A la señora D. P. R. M. se le solicitó informar sobre su situación socioeconómica, estado médico y afiliación en salud. Así mismo, expresar algunos detalles relacionados con las condiciones del servicio de docencia prestado a la sociedad accionada, por ejemplo, el número de estudiantes que tuvo a su cargo durante los periodos 2017 y 2018, manifestar si había adelantado algún proceso ordinario laboral contra la sociedad Corporación Educa S.A.S. por los hechos narrados en el escrito de tutela. Por último, indicar si había recibido respuesta a la petición radicada el 26 de enero de 2019.

    28.  Al representante legal de la sociedad accionada, el despacho le requirió comunicar algunos detalles relacionados con la labor llevada a cabo por la señora D. P. R. M. en los contratos suscritos en 2017 y 2018, verbi gratia, establecer en cuáles grados escolares enseñó y a cuántos estudiantes. Igualmente, se le pidió manifestar para el año 2019, cuántos estudiantes fueron matriculados en esos grupos y si fue contratado nuevo personal para que se hiciera a cargo de estos. De otra parte, allegar copia del documento de “preaviso” remitido a los docentes en el 2018 y expresar si la petición instaurada por la accionante en el mes de enero fue atendida.

    29.  El 24 de septiembre de 2019, la Secretaría General de la Corte Constitucional remitió al despacho del magistrado ponente un memorial suscrito por la señora D. P. R. (31) mediante el cual dio respuesta a los planteamientos solicitados. Al efecto, adujo que su núcleo familiar está compuesto por su esposo, la hija de ambos, quien nació el 17 de agosto de 2019, y la hija de su compañero sentimental, quien cuenta con 20 años de edad y es estudiante universitaria.

    Indicó que su estado de salud es estable, y que acude a controles médicos derivados del alumbramiento. De otro lado, mencionó que está afiliada al Sistema de Seguridad Social en Salud en el régimen contributivo como beneficiaria de su cónyuge.

    Señaló que no cuenta con ingresos económicos propios desde que la sociedad accionada decidió no renovar el contrato de trabajo y al haberse revocado el fallo de primera instancia que amparó sus derechos. Expresó que por su estado de gravidez no le fue posible encontrar otro empleo. De igual forma, comunicó que desde el 2 de mayo de 2019, su esposo labora en la Rama Judicial como oficial mayor, en provisionalidad, en un juzgado de categoría del circuito, de cuyo salario, además de los descuentos de ley, destina el 70% al pago de créditos bancarios, entre los cuales se encuentra el pago de la hipoteca del inmueble en el que habitan (32).

    Acerca de las labores desempeñadas durante la relación laboral con la sociedad accionada, relató que en los dos años ejerció como docente titular del grado pre-jardín. En 2017 tuvo a su cargo diez estudiantes y quince en 2018. Finalmente, manifestó que no ha promovido ningún proceso laboral en contra de su ex empleadora, pues ella y su cónyuge carecen de los recursos suficientes para contratar la asesoría y acompañamiento jurídico de un abogado litigante en el área laboral. Por otro lado, manifestó que no ha recibido respuesta a la petición radicada en enero de 2019.

    30.  El 24 de septiembre de 2019, se recibió una comunicación suscrita por I. R. O., en representación de la Corporación Educa S.A.S (33)., en la cual respondió que la señora D. P. R. se desempeñó como docente en el grado de pre-jardín, teniendo a su cargo diez estudiantes para el 2017 y quince en 2018. Así mismo, mencionó que en 2019 disminuyó a once el número de alumnos para ese grado escolar, mermando, en forma general, en las otras sedes. Indicó que a la accionante la reemplazó una empleada “vinculada con la institución desde hacía varios años”. Por último, respecto de la petición de información radicada por la actora, adujo: “(n)o recuerdo haber recibido ni tramitado tal escrito. No tengo a la vista el documento que fuere aportado. En esa época no me encontraba en el jardín tampoco(34).

     II. CONSIDERACIONES

    Competencia

    1.  Esta Sala es competente para revisar los fallos objeto de discusión, de conformidad con lo establecido en los artículos 86 y 241-9 de la Constitución Política y 31 a 36 del Decreto Estatutario 2591 de 1991.

    Planteamiento del caso y problema jurídico

    2.  La señora D. P. R. M. instauró acción de tutela en contra de su ex empleadora, la Corporación Educa S.A.S., con la cual suscribió dos contratos de trabajo en los años 2017 y 2018, para ejercer el cargo de docente en los grados de pre-jardín. A juicio de la actora, la relación laboral no fue renovada para el 2019 debido su estado de gravidez. Por su parte, la accionada adujo que para el momento en el que se comunicó tal circunstancia no mediaba vínculo laboral alguno, por lo cual no estaba en la obligación de contratarla nuevamente.

    A partir de lo anterior, la accionante consideró vulnerados sus derechos fundamentales al trabajo, estabilidad laboral reforzada, fuero de maternidad y a la seguridad social. El juez constitucional de primera instancia concedió el amparo de manera transitoria y, en consecuencia, le ordenó a la accionada proceder con el reintegro y vinculación al SGSSS. La decisión fue revocada por el juez de segunda instancia que, en su lugar, negó la protección.

    3.  Con base en lo anterior, le corresponde a la Sala Octava de Revisión determinar, en primer lugar, si la acción de tutela es procedente para verificar la presunta vulneración de los derechos invocados por la accionante. En caso de superar el examen de precedibilidad, la Sala deberá resolver el siguiente problema jurídico:

    4. ¿Una institución educativa de carácter privado desconoce el derecho a la igualdad y el principio de no discriminación de una mujer que laboró como docente, al manifestarle que su contrato de trabajo sería suscrito para el siguiente periodo lectivo y, posteriormente, haber cambiado de decisión al enterarse que esta se hallaba en estado de gestación?

    5.  Con el fin de desarrollar estos planteamientos, la Corte abordará el estudio de los siguientes temas:

    i) procedencia de la acción de tutela entre particulares;

    ii) protección jurídica a la mujer en estado de gestación o lactancia y cláusula constitucional de no discriminación;

    iii) aproximación a la prueba electrónica, y el valor probatorio atenuado de las capturas de pantalla o “pantallazos” extraídos de la aplicación WhatsApp; y

    iv) caso concreto.

    Procedencia de la acción de tutela entre particulares

    6.  La acción de tutela como mecanismo preferente y sumario para reclamar la protección inmediata de derechos fundamentales, al tiempo que procura materializar las garantías constitucionales de las personas, también permite ejercer un control ciudadano a las actuaciones del Estado, para que este, a través de sus representantes, encause su conducta por el sendero del ordenamiento jurídico.

    7.  Así mismo, la acción de tutela es una manifestación de la supremacía de la Constitución, en cuanto fuerza vinculante de sus disposiciones. En este sentido, tratándose de la relación persona/Estado, se habla de la “eficacia vertical de los derechos” (35). No obstante, en las relaciones entre particulares o privados pueden darse situaciones que vulneran o desconocen derechos fundamentales, por lo cual, el hecho de que el constituyente de 1991 haya admitido la posibilidad de instaurar la acción de tutela en estas condiciones permite también establecer la “eficacia horizontal de derechos” (36).

    8.  El artículo 86 de la Carta Política establece que “(t)oda persona tendrá acción de tutela para reclamar ante los jueces (…) la protección inmediata de sus derechos constitucionales fundamentales, cuando quiera que estos resulten vulnerados o amenazados por la acción o la omisión de cualquier autoridad pública” y, acto seguido, señala tres situaciones en las que procede contra particulares:

    i) “encargados de la prestación de un servicio público”;           

    ii) “cuya conducta afecte grave y directamente el interés colectivo”; y         

    iii) “respecto de quienes el solicitante se halle en estado de subordinación o indefensión”.

    A tono con lo anterior, el artículo 42 del Decreto 2591 de 1991, en desarrollo de la norma constitucional, establece nueve eventos en los cuales la acción de tutela procede contra particulares, entre ellos, “(c)uando la solicitud sea para tutelar (los derechos de) quien se encuentre en situación de subordinación o indefensión respecto del particular contra el cual se interpuso la acción. Se presume la indefensión del menor que solicite la tutela”.

    9.  La jurisprudencia constitucional ha definido y diferenciado los términos “subordinación” e “indefensión”. El primer concepto alude a la existencia de una relación jurídica de dependencia; mientras que la indefensión, “si bien hace referencia a una relación que también implica la dependencia de una persona respecto de otra, ella no tiene su origen en la obligatoriedad derivada de un orden jurídico o social determinado sino en situaciones de naturaleza fáctica en cuya virtud la persona afectada en su derecho carece de defensa, entendida ésta como posibilidad de respuesta efectiva ante la violación o amenaza de que se trate”(37).

    Respecto de la subordinación, en sentencia T- 188 de 2017, la Corte expresó que se ha entendido como “‘el acatamiento y sometimiento a órdenes proferidas por quienes, en razón de sus calidades, tienen la competencia para impartirlas’ (38), encontrándose entre otras,  

    (i) las relaciones derivadas de un contrato de trabajo;

    (ii) las relaciones entre estudiantes y directivas del plantel educativo;

    (iii) las relaciones de patria potestad originadas entre los hijos menores y los incapaces respecto de los padres, o

    (iv) las relaciones entre los residentes de un conjunto residencial y las juntas administradoras de los mismos (39)”.

    10.  A manera de colofón, la vulneración de derechos fundamentales no solo puede provenir de la conducta de autoridades públicas sino que también puede darse en ámbitos privados, por ejemplo, cuando un particular tiene a su cargo la prestación de servicios públicos, entre un estudiante y las directivas de una institución educativa, así mismo, en una relación laboral. En estos casos es necesario establecer la relación de dependencia derivada de una situación de subordinación o de indefensión por parte de quien instaura la acción de tutela respecto de aquel contra quien va dirigida.

    Protección jurídica a la mujer en estado de gestación o lactancia, y cláusula constitucional de no discriminación

    11.  La Constitución Política de 1991 consagra una cláusula de igualdad y no discriminación contenida en diferentes disposiciones. En ese sentido, el artículo 13 establece que “(t)odas las personas nacen libres e iguales ante la ley, recibirán la misma protección y trato de las autoridades y gozarán de los mismos derechos, libertades y oportunidades sin ninguna discriminación por razones de sexo, raza, origen nacional o familiar, lengua, religión, opinión política o filosófica. El Estado promoverá las condiciones para que la igualdad sea real y efectiva y adoptará medidas en favor de grupos discriminados o marginados”.

    12.  Tratándose específicamente de la proscripción de discriminación en contra de la mujer, el artículo 43 señala que “(l)a mujer y el hombre tienen iguales derechos y oportunidades. La mujer no podrá ser sometida a ninguna clase de discriminación”.

    13.  En el ámbito internacional de derechos humanos, también es posible identificar compendios normativos que abogan por la eliminación de la discriminación en contra de las mujeres. En el aspecto laboral, valga mencionar lo dispuesto en la “Convención sobre la eliminación de todas las formas de discriminación contra la mujer” (1979) que establece en el artículo 11 lo siguiente:

    “Artículo 11.

    1. Los Estados Partes adoptarán todas las medidas apropiadas para eliminar la discriminación contra la mujer en la esfera del empleo a fin de asegurar a la mujer, en condiciones de igualdad con los hombres, los mismos derechos, en particular: (…)

    2. A fin de impedir la discriminación contra la mujer por razones de matrimonio o maternidad y asegurar la efectividad de su derecho a trabajar, los Estados Partes tomarán medidas adecuadas para: a) Prohibir, bajo pena de sanciones, el despido por motivo de embarazo o licencia de maternidad y la discriminación en los despidos sobre la base del estado civil; (…)”

    Por otro lado, la “Convención interamericana para prevenir, sancionar y erradicar la violencia contra la mujer ‘convención de belém do pará’” (1994), señala en su artículo 6:

    “Artículo 6. El derecho de toda mujer a una vida libre de violencia incluye, entre otros:

    a. el derecho de la mujer a ser libre de toda forma de discriminación, y

    b. el derecho de la mujer a ser valorada y educada libre de patrones estereotipados de comportamiento y prácticas sociales y culturales basadas en conceptos de inferioridad o subordinación”

    14.  Por su parte, el legislador colombiano ha promulgado diferentes leyes tendientes a materializar la igualdad de trato y sanción de las conductas que discriminen a la mujer. Por ejemplo, el capítulo V del Código Sustantivo del Trabajo establece que la maternidad gozará de la protección especial del Estado (art. 235A) y prohíbe a los empleadores despedir a una mujer en estado de embarazo o lactancia sin la previa autorización del Ministerio del Trabajo, so pena de cancelar una indemnización equivalente al pago de sesenta días de trabajo (art. 239), entre otras medidas.

    15.  La Corte Constitucional en diferentes oportunidades se ha pronunciado en torno al derecho a la igualdad y no discriminación en contra de las mujeres. En temas laborales esta garantía se materializa con el fuero de maternidad. En la sentencia SU-075 de 2018 se adujo que la finalidad de esa institución “es impedir la discriminación que, a raíz del embarazo, pueda sufrir la mujer, específicamente la terminación o la no renovación del contrato por causa o con ocasión de esa condición o de la lactancia”. Así mismo, mencionó que el fuero de maternidad es “una acción afirmativa destinada a garantizar que las mujeres no sean discriminadas en el trabajo a causa de su rol reproductivo”.

    16.  En relación con el asunto objeto de estudio, en la sentencia T-169 de 2008 la Corporación analizó el caso de una docente quien suscribió un contrato de trabajo en el 2002 con el plantel educativo accionado, vínculo laboral que era renovado año tras año, hasta el 2006. No obstante, sus servicios no fueron contratados para el 2007, a pesar que el 12 de diciembre de 2006 sus empleadores le comunicaron que renovarían su contrato, esto debido a que al día siguiente, la trabajadora informó sobre su estado de gestación. En dicha oportunidad la Corte concedió el amparo y ordenó la contratación de la accionante y el pago de los salarios y aportes a seguridad social dejados de percibir. Al efecto, la Corte llegó a esa conclusión a establecer que:

    “Así, no aparece desvirtuada en este caso la presunción de discriminación por el embarazo para no efectuar ‘la recontratación’ de la señora Wilches Toro, toda vez que entre la Corporación Dios es Amor y ella se había venido renovando el contrato laboral desde enero 21 de 2002, según se aprecia en los documentos obrantes en el expediente, situación que evidencia que entre las partes ha persistido una relación contractual que implica el habitual empleo de la trabajadora, en lapsos como los acostumbrados en el sector estudiantil para excluir las vacaciones escolares de fin de año, sin que la entidad demandada hubiese demostrado, ni siquiera esbozado, razón alguna diferente, como sería que a partir de la fecha de la no ‘recontratación’, dejare de requerirse la labor que a ella usualmente se le venía encomendando”.

    17.  Así mismo, en la sentencia T-610A de 2017, este Tribunal analizó el caso de una docente quien había suscrito distintos contratos a término fijo desde el 2005 hasta el 2006 con una institución educativa. En esta última anualidad la accionante informó sobre su estado de embarazo razón por la cual el plantel decidió no suscribir un nuevo contrato bajo el argumento de requerir la acreditación de cierto título académico, el cual no había sido requerido con anterioridad. La Corporación protegió los derechos al considerar que la accionada no acreditó que las causas del contrato habían desaparecido o modificado sustancialmente. De igual forma, sostuvo que el colegio no demostró durante el proceso la existencia del supuesto plan de mejoramiento institucional ni la necesidad de su cumplimiento. Por consiguiente, ordenó la renovación de la relación laboral y el pago de la licencia de maternidad.

    18.  En conclusión, el texto constitucional consagra una cláusula general de igualdad y no discriminación, la cual se extiende a la protección a favor de la mujer en el ámbito laboral, para que sus condiciones no sean disminuidas o finalizadas de forma arbitraria por el hecho de encontrarse en estado de gestación o lactancia. Esta garantía también se circunscribe al mandato internacional de los derechos humanos. Por su parte, la jurisprudencia constitucional ha señalado que el hecho de no renovar la relación laboral de una mujer en estado de gestación puede llegar a constituirse como un acto discriminatorio cuando se han dado manifestaciones previas indicativas de que sí se haría, pero que, una vez se conoce el estado de gravidez de la trabajadora, se opta por no hacerlo sin aducir ninguna causa objetiva.

    Aproximación a la prueba electrónica. El valor probatorio atenuado de las capturas de pantalla o “pantallazos” extraídos de la aplicación WhatsApp

    19.  El derecho es una disciplina que evoluciona conforme los cambios que se producen en la sociedad, variaciones que surgen en diferentes ámbitos, ya se trate el cultural, económico o tecnológico. Por lo tanto, el derecho puede ser considerado como un instrumento dúctil.

    Es evidente el avance tecnológico en las últimas décadas, situación que ha influido en la vida de los individuos, desde sus relaciones interpersonales hasta su rutina diaria. Esta circunstancia no es ajena al derecho, que debe hacer frente a los distintos retos que presentan las exigencias de la vida en sociedad, por ejemplo, a través de regulaciones que atiendan los fenómenos actuales o desde la propia administración de justicia.

    En relación con este último punto, más allá de la implementación de nuevas herramientas tecnológicas que favorezcan la eficacia en el ejercicio de impartir justicia y mejorar la interrelación con el usuario, los avances tecnológicos conllevan otro desafío para el derecho probatorio, pues las nuevas formas de comunicación virtual en algunas ocasiones o escenarios pueden constituir supuestos de hecho con significancia en la deducción de determinada consecuencia jurídica. Por ello, los científicos de la dogmática probatoria han analizado las exigencias propias de la producción, incorporación, contradicción y valoración de elementos probatorios extraídos de plataformas o aplicativos virtuales.

    20.  En este sentido, la doctrina especializada ha hecho referencia a las siguientes denominaciones: “prueba digital”, “prueba informática”, “prueba tecnológica” y “prueba electrónica”. Al efecto, un sector se ha decantado por la expresión “prueba electrónica” como la más adecuada, partiendo de un punto de vista lingüístico, de tal forma que se obtenga una explicación que abarque la generalidad de los pormenores que se puedan presentar. Al respecto, valga traer a colación la siguiente cita:

    De esta manera vemos como el apelativo ‘electrónica’, según la RAE, sería todo lo pertinente a la electrónica, ofreciendo una acepción concreta cuando se conecta con algún dispositivo en la que ‘electrónica’ significaría máquina electrónica, analógica o digital, dotada de una memoria de gran capacidad y de métodos de tratamiento de la información, capaz de resolver problemas matemáticos y lógicos mediante la utilización automática de programas informáticos.

    Con ello se consideraría prueba electrónica a cualquier prueba presentada informáticamente y que estaría compuesta por dos elementos: uno material, que depende de un hardware, es decir la parte física de la prueba y visible para cualquier usuario de a pie, por ejemplo la carcasa de un Smartphone o un USB; y por otro lado un elemento intangible que es representado por un software, consistente en metadatos y archivos electrónicos modulados a través de unas interfaces informáticas” (40).

    En este sentido, se ha aludido a los documentos electrónicos como una especie al interior del género “prueba electrónica”. Otras manifestaciones de esta última son el correo electrónico, SMS (Short Message Service), y los sistemas de video conferencia aplicados a las pruebas testimoniales. Acerca de los SMS, es fácilmente reconocible el influjo que han tenido en la actualidad como método de comunicación y su empleo habitual en teléfonos móviles. En este escenario es relevante hacer mención de la aplicación WhatsApp, la cual se constituye como “un software multiplataforma de mensajería instantánea pues, además del envío de texto, permite la trasmisión de imágenes, video y audio, así como la localización del usuario” (41).

    21.  De otra parte, la doctrina argentina (42) se ha referido al valor de la prueba indiciaria que se debe otorgar a las capturas de pantallas, dada la informalidad de las mismas y las dudas que puedan existir entorno a su autenticidad frente a la vasta oferta de aplicaciones de diseño o edición que permiten efectuar alteraciones o supresiones en el contenido. Al respecto se dice lo siguiente:

    Técnicamente definimos a las capturas de pantalla como aquella imagen digital de lo que debería ser visible en un monitor de computadora, televisión u otro dispositivo de salida visual. (…) A través de los mismos se procura lograr un indicio sobre si un determinado contenido fue trasmitido por la red a un determinado usuario destinatario (caso sistemas de mensajería) o, por ejemplo, determinar la existencia de una publicación en una red social (v.gr. Facebook o Twitter) (…).

    Las capturas de pantalla impresas, no son prueba electrónica, sino una mera representación física materializada en soporte papel de un hecho acaecido en el mundo virtual. (…) || Reiteramos, esa copia no es el documento electrónico original generado a través de la plataforma de mensajería, sino una simple reproducción del mismo (carente de metadatos), que por más que permite entrever la ocurrencia de aquellos sucesos invocados, no causa per se la necesaria convicción como para tener a estos por ocurridos. Tampoco se podrá establecer la integridad del documento (es decir, que el mismo no fue alterado por la parte o por terceros), o asegurar su necesaria preservación a los efectos de ser peritado con posterioridad” (43).

    Sobre el tema de la autenticidad, los escritos especializados realzan que no puede desconocerse la posibilidad de que, mediante un software de edición, un archivo digital impreso que contenga texto pueda ser objeto de alteraciones o supresiones, de ahí el valor suasorio atenuado que el juzgador debe reconocerle a estos elementos, de tal manera que tomándolos como indicios los analice de forma conjunta con los demás medios de prueba (44).

    22.  A manera de colofón, los avances tecnológicos que a nivel global se han dado en distintos campos (ciencia, medicina, aplicativos digitales), también han influido en el entendimiento y el ejercicio del derecho. Al efecto, en el ámbito probatorio, por ejemplo, los operadores judiciales diariamente deben analizar elementos extraídos de aplicaciones de mensajería instantánea, ya sea que se cuente con metadatos que permitan realizar un mayor rastreo de la información o solo capturas de pantallas respecto de ciertas afirmaciones o negaciones realizadas por una de las partes en el litigio. Sobre estas últimas, la doctrina especializada les ha concedido el valor de prueba indiciaria ante la debilidad de dichos elementos frente a la posibilidad de realizar alteraciones en el contenido, por lo cual deben ser valoradas de forma conjunta con los demás medios de prueba.

    Caso concreto

    Breve presentación del asunto

    23.  La señora D. P. R. M. instauró acción de tutela en contra de la Corporación Educa S.A.S al considerar que trasgredió sus derechos fundamentales al trabajo, estabilidad laboral reforzada en razón del fuero de maternidad, a la seguridad social y la “confianza legítima”, al no suscribir un nuevo contrato de trabajo para el siguiente periodo lectivo, a su juicio, por hallarse en estado de gestación. Por su parte, la accionada adujo que para el momento en el que la actora informó sobre su gravidez, no existía entre ellas ningún vínculo laboral y que la determinación reprochada se debió a las necesidades de la empresa.

    El juez constitucional de primera instancia concedió el amparo de manera transitoria y, en consecuencia, le ordenó a la accionada proceder con el reintegro y vinculación al SGSSS. La decisión fue revocada por la autoridad judicial de segunda instancia que, en su lugar, negó la protección.

    Análisis de los requisitos de procedencia de la acción de tutela

    Antes de abordar el fondo del asunto, la Sala analizará el cumplimiento de los presupuestos de procedibilidad de la acción de tutela. Para ello, de forma concreta se establecerá si se cumplen los siguientes requisitos:

    i) legitimación por activa y pasiva;

    ii) inmediatez; y

    iii) subsidiariedad.

    (i)      Legitimación por activa y por pasiva

    24.  El primer inciso del artículo 86 Superior expresa que “toda persona tendrá acción de tutela para reclamar ante los jueces, en todo momento y lugar, mediante un procedimiento preferente y sumario, por sí misma o por quien actúe a su nombre, la protección inmediata de sus derechos constitucionales fundamentales, cuando quiera que estos resulten vulnerados o amenazados por la acción o la omisión de cualquier autoridad pública (…). La ley establecerá los casos en los que la acción de tutela procede contra particulares (…)”

    De la anterior transcripción se deriva que cualquier persona que considere que sus derechos fundamentales son vulnerados o puestos bajo amenaza podrá interponer acción de tutela, por sí misma o a través de agente oficioso, representante legal o judicial. Así las cosas, la legitimación por activa en el mecanismo de amparo exige que quien lo ejerza sea el titular de los derechos conculcados o mediante un tercero que actúe en su nombre, debidamente acreditado para tal fin; en cambio, la legitimación por pasiva hace alusión a la autoridad o el particular contra quien se dirige la acción de tutela, en tanto se considera que es efectivamente el llamado a responder por la vulneración o amenaza de la prerrogativa constitucional.

    Como se mencionó en el acápite dedicado a la procedencia de la acción de tutela contra particulares, para que el mecanismo de amparo proceda es necesario verificar que el particular accionado:

    i) tenga a su cargo la prestación de un servicio público;

    ii) su conducta afecte grave y directamente el interés colectivo; y

    iii) el actor se encuentre bajo una situación de indefensión o de subordinación respecto de aquel.

    25.  Al aplicar estas premisas al caso objeto de estudio, la Sala considera que el requisito de legitimación se cumple. Respecto de la legitimación por activa, se observa que la señora D. P. R. M. instauró la acción de tutela en nombre propio al considerar transgredidos sus derechos fundamentales al trabajo, estabilidad laboral reforzada, a la seguridad social y el fuero de maternidad y a la “confianza legítima”.

    En cuanto a la legitimación por pasiva, el mecanismo de amparo fue promovido en contra de la Corporación Educa S.A.S (Universo Mágico Kindergarten), la cual contrató a la accionante para que fungiera como docente del grado escolar de pre-jardín en una de sus sedes. A partir de esta circunstancia, es posible advertir la existencia de una relación de subordinación por parte de la señora D. P. R.a favor de la sociedad accionada al haber mediado un vínculo jurídico. Al efecto, recuérdese que, conforme lo expuesto por la jurisprudencia constitucional, las relaciones derivadas de un contrato de trabajo son una manifestación de situaciones en las que media un vínculo de subordinación por parte del trabajador hacia el empleador (45).

    (ii)    Inmediatez

    26.  El artículo 86 de la Constitución Política consagra que cualquier persona podrá interponer acción de tutela “en todo momento”, al considerar vulnerados sus derechos fundamentales, expresión que es reiterada en el artículo 1° del Decreto 2591 de 1991. Sin embargo, pese a la informalidad que caracteriza a este instrumento de protección de derechos, la jurisprudencia de la Corte ha establecido que su interposición debe hacerse dentro de un plazo oportuno y justo (46), contado a partir del momento en que ocurre la situación transgresora o que amenaza las garantías fundamentales.

    En consecuencia, acudir a la acción tutela después de haber transcurrido un tiempo considerable desde la ocurrencia del hecho o actuación transgresor de derechos fundamentales, desnaturalizaría su esencia y finalidad.

    27.  Conforme lo precedente, en criterio de la Sala este presupuesto también se cumple, teniendo en cuenta que, conforme lo acreditado en el expediente, el 24 de enero de 2019, la señora M. L. S. C.(usuario Miss Mary Unimagico en el grupo de WhatsApp denominado “Team Universo Mágico”), a través de una nota de voz enviada a ese medio, informó que el 26 de enero de 2019 se suscribirían los nuevos contratos, a partir de lo cual la accionante afirmó: “(a)l leer este mensaje, di por hecho que mi contrato sería renovado. Sin embargo, con posterioridad recibí una llamada de la docente M. S., donde me comunicó que por orden de la directora general mi contrato no sería renovado”.

    A tono con lo anterior, en el derecho de petición radicado el 26 de enero de 2019 por la accionante, dirigido a la señora I. R. O., en calidad de Directora general de la institución Jardines Universo Mágico, se registró lo siguiente: “(r)recibí con sorpresa el día 24 de enero una llamada por parte de Miss Mary (directora de sede) dónde (sic) me comunica que el Jardín no renovará mi contrato y el día de ayer 25 de enero soy eliminada del grupo de WhatsApp de la sede Chía” (47).

    Con base en lo expuesto, se advierte que el 24 de enero de 2019 la accionante tuvo conocimiento de que su contrato no sería nuevamente suscrito, y el 5 de marzo de 2019 instauró la presente acción de tutela, después de haber acudido a la oficina del trabajo sin obtener un acompañamiento jurídico efectivo. Bajo este entendido, entre las dos fechas mencionadas trascurrió aproximadamente mes y medio, tiempo que la Sala considera razonable para acudir al mecanismo de amparo.

    (iii)      Subsidiariedad

    28.  Este presupuesto demanda que la persona antes de acudir al mecanismo de tutela haya desplegado todas las herramientas e instrumentos establecidos en el ordenamiento legal para la resolución de la controversia jurídica. Sin embargo, esta regla presenta dos excepciones:

    i) cuando se pretende el amparo constitucional de forma transitoria mientras la jurisdicción ordinaria resuelve el asunto, siempre y cuando se pretenda evitar la ocurrencia de un perjuicio irremediable; y

    ii) cuando se acredite que la vía ordinaria para resolver el asunto no resulta idónea o eficaz (48) para la protección de los derechos fundamentales.

    29.  El juez constitucional tiene el deber de analizar con juicio el cumplimiento de los requisitos de procedibilidad del mecanismo de amparo antes de adoptar cualquier orden judicial en sede de tutela. De otro lado, el operador judicial debe ser más cuidadoso en casos en los que pueda acaecer un perjuicio irremediable o que se esté frente a sujetos en condiciones de vulnerabilidad o que sean merecedores de especial protección constitucional antes de declarar la improcedencia de la acción.

    30.  En sentencia T-589 de 2011, la Corte recordó que el conocimiento prevalente de la jurisdicción constitucional es excepcional, pues se activa  cuando así lo demande el principio de igualdad frente a sujetos de especial protección constitucional o cuando sea evidente que el asunto “posee una dimensión constitucional que escapa al diseño fines del recurso ordinario”. En palabras de la providencia en comento:

    “(…) (E)n el análisis de subsidiariedad de la tutela debe mantenerse presente la relevancia que supone para la vigencia del derecho sustancial el que los conflictos jurídicos sean resueltos en la jurisdicción adecuada para ello, mediante el conocimiento y experticia del juez natural de cada proceso. El debate fáctico y normativo que se da en un proceso judicial solo puede suplirse en el escenario constitucional de manera excepcional: cuando así lo ordene el principio de igualdad -en su faceta promocional- frente a sujetos de especial protección constitucional, población vulnerable o personas en situación de debilidad manifiesta; o cuando sea evidente que el asunto bajo estudio posee una dimensión constitucional que escapa al diseño y fines del recurso ordinario.

    3.3. Idéntica perspectiva debe asumir el juez de tutela al evaluar si el caso se enmarca en los supuestos de excepción del principio de subsidiariedad (in extenso, ausencia de idoneidad o eficacia del medio de defensa ordinario). Solo si el operador judicial encuentra que el medio ordinario, en las circunstancias del caso concreto, no es un escenario apto para la protección de un derecho constitucional estará justificada su intervención. A partir de esas premisas, la jurisprudencia constitucional ha establecido que ello ocurre cuando el medio judicial ordinario no está diseñado de forma adecuada para amparar las facetas comprometidas del interés iusfundamental amenazado en el caso concreto, o cuando no puede lograr una protección oportuna e integral del derecho en juego. En esos eventos, el mecanismo ordinario carece de idoneidad o eficacia.

    3.4. Las consideraciones recién expuestas explican la necesidad de que el juez tome en consideración las circunstancias personales de los accionantes al evaluar la procedencia de la acción, con el fin de otorgar un trato especial -de carácter favorable- a los sujetos de especial protección constitucional o a quienes se encuentran en condiciones de debilidad o hacen parte de grupos vulnerables, en aplicación de los incisos 2º y 3º del artículo 13 de la Carta, o de mandatos específicos de protección que cobijan a sujetos o colectivos vulnerables”

    31.  En la medida que la presente controversia es de naturaleza laboral, debe analizarse si su resolución corresponde a la jurisdicción del trabajo, puesto que el legislador previó que “(l)a Jurisdicción Ordinaria, en sus especialidades laboral y de seguridad social conoce de: 1. Los conflictos jurídicos que se originen directa o indirectamente en el contrato de trabajo” (49) en tanto se constituya como un mecanismo idóneo o eficaz para la protección de derechos de cara a las particularidades del caso.

    32.  Así las cosas, se ha establecido que el examen de procedencia de la acción de tutela se hace menos estricto, a través de criterios de análisis más amplios, pero no menos rigurosos, cuando quien acude a ella es sujeto de especial protección constitucional, por ejemplo, niños, niñas, adolescentes, mujeres en estado de gestación o lactancia, personas cabeza de familia, en situación de discapacidad, de la tercera edad o población desplazada, entre otros (50).

    33.  Por otro lado, en sentencia SU-075 de 2018, la Corte señaló que aunque la acción de tutela no es el mecanismo adecuado para solicitar el reintegro laboral y el pago de acreencias derivadas de un contrato de trabajo, “en los casos en que el accionante sea titular del derecho a la estabilidad laboral reforzada por encontrarse en una situación de debilidad manifiesta, la acción de tutela pierde su carácter subsidiario y se convierte en el mecanismo de protección preferente. (…) la procedencia del amparo constitucional se justifica en la necesidad de un mecanismo célere y expedito que permita dirimir esta clase de conflictos, en los cuales se vea inmerso un sujeto de especial protección constitucional, como es el caso de la madre gestante” (51)

    34.  Este Tribunal también ha indicado que los recién nacidos son sujetos de especial protección. En la decisión T-468 de 2018, la Corte expresó que “(u)na criatura que depende enteramente de su familia, la sociedad y el Estado para desarrollar su crecimiento integral es un sujeto de especial protección constitucional y un individuo valioso a quien se le debe garantizar el más alto nivel de bienestar”.

    35.  De los anteriores pronunciamientos jurisprudenciales se derivan las siguientes premisas:

    i) las mujeres en estado de gestación o lactancia y los recién nacidos son sujetos de especial protección del Estado, al hallarse en condición de indefensión; y

    ii) cuando quien acude al mecanismo de amparo se encuentra en situación de debilidad manifiesta, la acción de tutela se torna en un mecanismo de protección preferente.

    36.  A partir de estos planteamientos, la Sala considera que la vía ordinaria no resulta idónea (52) ni efectiva (53) en el caso objeto de estudio por las siguientes razones:

    i) están de por medio dos sujetos de especial protección constitucional: madre lactante y un recién nacido (sin olvidar que al momento de instaurar la acción amparo, la accionante se encontraba en estado de gestación);

    ii) el problema jurídico a resolver gira en torno a la presunta ocurrencia de un acto discriminatorio en contra de una mujer por el hecho de encontrarse en estado de gestación, lo cual requiere efectuar un análisis desde el punto de vista constitucional; y

    iii) en caso de hallarse que efectivamente ocurrió una vulneración al derecho  a la igualdad y no discriminación, la acción de tutela permitiría otorgar una protección oportuna e integral, posibilidad que disminuiría mediante un proceso ordinario laboral, dado el natural desgaste procesal que implica, aunado al tiempo que amerita su definición.

    37.  En conclusión, conforme a las razones expuestas, el presente caso satisface el requisito de subsidiariedad y la eventual protección a conceder sería de manera definitiva. Valga aclarar que si bien el juez de primera instancia concedió el amparo de forma transitoria, ello no es viable en tanto el presupuesto para que proceda la protección transitoria es que, en principio, la vía ordinaria sea idónea y efectiva, pero dicha impresión inicial se desvirtúa ante la posibilidad de evitar la ocurrencia de un perjuicio irremediable, de ahí que se requiera la intervención inmediata del juez de tutela (54); sin embargo, la Sala considera en el caso objeto de análisis que el mecanismo ordinario no es idóneo ni efectivo, de conformidad con lo atrás expuesto.

    Análisis de fondo de la vulneración de los derechos al trabajo, igualdad y no discriminación de la señora D. P. R. M.

    38.  A efectos de determinar si en el presente asunto la Corporación Educa S.A.S. discriminó en el ámbito laboral a la señora D. P. R. M. al no suscribir un nuevo contrato de trabajo, presuntamente, a causa de estar en estado de gestación, la Sala deberá resolver de forma previa los siguientes cuestionamientos:

    i) ¿el plantel educativo realizó actos indicativos de que la relación laboral continuaría?;

    ii) ¿la ex trabajadora informó de forma efectiva su estado de gravidez a los directivos de la institución?; y

    iii) ¿la determinación de no suscribir nuevamente el contrato de trabajo se debió a esta circunstancia?

    39.  Es necesario precisar que conforme la formulación del problema jurídico y los interrogantes planteados en el párrafo anterior, el análisis que realizará  la Sala se centrará en establecer si la institución accionada efectuó un acto discriminatorio sobre la señora D. P. R. M., y no frente a una eventual vulneración a la garantía de la estabilidad laboral reforzada en razón del fuero de maternidad.

    40.  Una vez efectuada esta precisión, se abordará lo relacionado con el primer cuestionamiento, en ese sentido, la Sala analizará si le asiste razón a la actora al argumentar que antes de informar sobre su estado de gestación, la empleadora había realizado manifestaciones indicativas de que se suscribiría un nuevo contrato.

    41.  Al efecto, recuérdese que la accionante mencionó que por parte de la institución accionada se le había solicitado expresar su tallaje para la elaboración de los implementos de dotación para el periodo lectivo de 2019. Así mismo, se le indicó cuáles documentos debía reunir con el propósito de la nueva contratación, incluso, se había fijado fecha y lugar para la suscripción de los contratos para el año 2019. Para verificar los anteriores puntos, se valorarán de forma cronológica los insumos probatorios que fueron aportados al expediente.

    42.  En ese sentido, la actora expresó que mediante una nota de voz enviada al grupo denominado “Team Universo Mágico”, se solicitó a sus miembros, ella incluida, informar sobre sus tallas de vestir. Para acreditar esta afirmación, la interesada aportó un disco compacto que contenía el respectivo audio (55). En el registro se dice lo siguiente:

    Niñas lindas, muy buenas tardes a todas. Espero que estén súper bien en casita, todo muy bien con las familias, iniciando nuevo año con actitud positiva. Niñas, esta información va para todas las que estamos en el grupo. Necesito que cada una me haga llegar la talla de sus pantalones, la talla de sus camisas, la talla de su número de calzado para todas, los servicios generales también, (…) necesito ese dato finalizando la tarde porfa para mandarles a hacer sus uniformes (…)”

    La anterior transcripción se complementa con un mensaje remitido el 15 de enero de 2019, por la usuaria “Miss Mary Unimagico” (sic) al mentado grupo de WhatsApp, en el cual se nombra a la accionante y sus requerimientos, así:

    (15 de enero de 2019)

    “Miss Mary Unimagico. –

    Sede Chía.

    Misses:

    Miss Johanna (…)

    Miss Tatiana (…)

    Miss Patricia Ramírez

    Pantalón talla 8

    Camisa talla M

    Zapatos 36

    Chaqueta talla M (…)”

    43.  En relación con los documentos necesarios para suscribir los nuevos contratos, y la fecha y lugar donde ello se llevaría a cabo, a partir de una captura de pantalla al grupo “Team Universo Mágico”, se avizora que el 24 de enero de 2019, “Miss Mary Unimagico” remitió un documento formato “pdf”, de cuyo contenido se lee el título “LISTA DE DOCUMENTOS PERSONAL ANTIGUO” (56) y a continuación una nota de voz de la misma persona. Sobre este último elemento, la accionante allegó el respectivo audio, en el que se dice:

    “Niñas, muy buenas tardes a todas. Espero que todo esté súper bien en casita, que esté todo súper bien con sus familias. Bueno, les acabo de enviar un archivo que es el listado de documentación para el personal antiguo de misses. Les cuento que el sábado 26 deben estar en la sede ‘Cedritos’ a las ocho de la mañana con una carpeta con esa documentación, para que por favor puedan firmar de una vez sus contratos. El sábado 26 van a hacer la contratación en Nicolás, perdónenme, en Cedritos, sede Cedritos, (…)”. 

    44.  Los anteriores elementos llevan a la conclusión de que la institución educativa accionada, para enero de 2019, tenía entre su lista de personal a la accionante, pues, de otro modo no le estaría solicitando informar sus tallas de vestir para la elaboración de los implementos de dotación, ni estaría incluida en el grupo de WhatsApp, el cual era utilizado para comunicar información útil de trabajo, en el que, incluso, se hizo una mención expresa a su nombre. A los anteriores elementos de juicio podría sumarse el hecho de que en la plataforma “TuColegio.co”, para la institución Jardín Infantil Universo Mágico, figurara el nombre de P. R. G. como “Docente-2019” (57).

    45.  Al continuar con el derrotero trazado, en segundo lugar, se pasará a analizar si, a partir de lo probado en el expediente, es factible establecer que la actora haya comunicado su estado de gravidez a la parte empleadora. En esos términos, la actora anexó al escrito de tutela diferentes capturas de pantalla, tomadas de su teléfono móvil, a algunas conversaciones o “chats” sostenidos en el grupo denominado “Team Universo Mágico” y con la usuaria “Miss Mary Unimagico”. En relación con la noticia del estado de gestación, se avizora el siguiente diálogo:

    “(19 de enero de 2019)

    Miss Mary. – Hola Mi Patty bonita muy buenos días!!! Te cuento que ayer hable (sic) con la jefe y me dijo: Que por favor mires cuanto (sic) tiempo de embarazo tienes?? por que (sic) la notificación se debía haber hecho antes de la finalización del contrato. Igual asesorate (sic) con tu esposo (…) y me cuentas (…) Abrazos… te quieroooo (sic)

    D. P. R.. – Hola Miss

    Miss Mary. – Hola Mi Patty como (sic) estás??

    D. P. R.. – El Lunes me hacen la otra prueba y de ahí tengo que pedir la (sic) para que me digan cuánto tiempo tengo”.

    De otra parte, se cuenta con un diálogo desarrollado por las mismas interlocutoras, cinco días después:

    “(24 de enero de 2019)

    D. P. R.. – Hola Miss… qué pena molestarte! Me gustaría que tu (sic) por favor le dijeras a Miss I. que por favor me notifique por escrito las razones además de estar embarazada por las cuáles (sic) no se me va a renovar el contrato. No se (sic) si sea posible, pero me gustaría al menos saber eso ya que obre (sic) de forma correcta al anunciarle de mi embarazo  antes de firmar contrato.

    Miss Mary. – Si (sic) Mi Patty ya le digo y te cuento

    D. P. R.. – Gracias Miss”

    46.  Estas dos conversaciones permiten establecer que antes de la firma de los contratos de trabajo para el 2019, la accionante le informó a la señora M. S. C. (58), que se encontraba en estado de gravidez. Igualmente, se deriva que esta última se encargaría de comunicar dicha situación a la señora I. R. O., lo cual efectivamente realizó, en tanto afirmó que la señora R. O. había solicitado informar cuándo había iniciado el embarazo.

    Es necesario aclarar que la anterior conclusión alberga dos presupuestos, a saber:

    i) M. S. C., al menos para el momento de los hechos, tenía poder de representación al interior de la institución accionada; y

    ii) esta persona le comunicó el estado de gestación en el que se encontraba la accionante a la señora I. R. O.; los cuales surgen a partir de lo acreditado en el expediente.

    (i) Por un lado, se cuenta con la comunicación remitida a la accionante en el mes de octubre de 2016 suscrita por la señora M. S. C. en calidad de “Directora de sede”, situación que refleja que ostentaba un cargo “directivo” al interior de la institución. En segundo lugar, en la conversación del 24 de enero de 2019, realizada por la accionante y M. S. en la aplicación WhatsApp, la accionante le solicita que se comunique con la señora “Miss I.” para que “notifique por escrito las razones (…) por las cuáles (sic) no se me va a renovar el contrato”, a lo cual la señora S. responde: “Si (sic) Mi Patty ya le digo y te cuento”.

    Al efecto, recuérdese que durante el trámite surtido en primera y segunda instancia, la accionada manifestó: “(n)o puedo saber lo que la mencionada señora (M. S. C.) (sin poder o representación alguna) le haya podido manifestar a la accionante” (59); sin embargo, esta aseveración se desvirtúa a partir del anterior razonamiento.

    Así mismo, es posible deducir la existencia de un diálogo laboral en torno a temas concernientes al plantel educativo entre las señoras M. e I. Por último, no pasa por desapercibido de la Sala el hecho de que la parte accionada no haya acreditado los fundamentos de su argumentación, aun cuando ello estaba a su alcance, teniendo en cuenta el debate surtido frente a temas relacionados con cuestiones contractuales y administrativos de la sociedad (personal y cargos ocupados, respectivamente). Ante esto, la accionada se limitó a oponerse a las pretensiones de la actora sin allegar elementos probatorios que sustentaran su dicho. 

    (ii)   De otro lado, en el expediente también obra copia de la petición suscrita por la accionante y dirigida a la señora I. R. O., en calidad de “Directora general Jardines Universo Mágico” (60), documento que presenta constancia de recibido con fecha del 26 de enero de 2019. A través de ella, la actora solicitó información sobre las razones para no renovar su contrato. Acerca de su estado de embarazo, en el escrito se lee lo siguiente:

    “Recibí con sorpresa el día 24 de enero una llamada por parte de Miss Mary (directora de sede) dónde me comunica que el Jardín no renovará mi contrato y el día de ayer 25 de enero soy eliminada del grupo de WhatsApp de sede Chía. // A mi manera de ver, se me está negando la oportunidad de trabajar por el simple hecho de estar embarazada, motivo que por ética personal decidí informar a la institución (…) Sin embargo, decidí ser honesta con la Institución (sic) e informar mi estado antes de firmar el contrato precisamente para que después no se presentarán inconvenientes por ocultar esta información”.

    47.  Las anteriores demostraciones son suficientes para asegurar que la accionante a través de diferentes medios  informó su estado de gravidez a los directivos de la institución en la que se desempañaba como docente, por lo cual no es de recibo la afirmación de la accionada, durante el trámite de primera instancia, en el sentido que solo conoció del estado de gestación de la señora D. P. R. M. a partir de lo narrado en la acción de tutela.

    De igual forma, al preguntarle a la señora I. R. O., por la petición que la actora radicó en enero de 2019, esta indicó: “(n)o recuerdo haber recibido ni tramitado tal escrito. No tengo a la vista el documento que fuere aportado. En esa época no me encontraba en el Jardín Tampoco” (61); no obstante, dicha solicitud fue aportada junto al escrito de tutela y presenta constancia de recibido con el logo de la institución y fecha del 26 de enero de 2019, por consiguiente, desde el 6 de marzo de 2019, fecha de radicación del mecanismo, la accionada tuvo acceso a tal información.

    Al respecto, es preciso señalar que la acción de tutela se caracteriza por ser un trámite informal y sumario, por lo cual, para la Sala la accionante cumplió con su deber de acreditar al menos “sumariamente” y conforme a sus posibilidades, los hechos en los que soporta su alegato. En ese sentido, al aportar la petición con un sello de recibido, el mismo que figura en la comunicación remitida el 16 de octubre de 2018 por la institución educativa, la actora obró de forma diligente, sin que la accionada, representada por la señora I. R., demostrara la ilegitimidad de dicha constancia. A juicio de la Sala, lo esperado es que el plantel accionado cuente con áreas administrativas y jurídicas que atiendan las necesidades que requiera la empresa, y en caso de no ser así, dicha circunstancia no puede ser utilizada en desmedro de la accionante.

    48.  Por último, el tercer planteamiento a determinar consiste en establecer si la decisión de no suscribir el contrato de trabajo para el periodo lectivo de 2019 se debió a que la señora D. P. R. M. se hallara en estado de gestación. Para este propósito es necesario analizar en conjunto las circunstancias acreditadas en los dos puntos precedentes, a la luz del mandato constitucional.

    49.  Al efecto, recuérdese que la Constitución de 1991 consagra una cláusula de prohibición de discriminación, que se encuentra contenida en diferentes disposiciones. Por ejemplo, el artículo 13 prescribe que “(t)odas las personas nacen libres e iguales ante la ley, recibirán la misma protección y trato de las autoridades y gozarán de los mismos derechos, libertades y oportunidades sin ninguna discriminación por razones de sexo, raza, origen nacional o familiar, lengua, religión, opinión política o filosófica”. Específicamente, tratándose de la protección a la mujer, el artículo 43 establece que “(l)a mujer y el hombre tienen iguales derechos y oportunidades. La mujer no podrá ser sometida a ninguna clase de discriminación”. Acto seguido, el constituyente estableció un acción afirmativa en cabeza de la mujer gestante o lactante al referir que “durante el embarazo y después del parto gozará de especial asistencia y protección del Estado”.

    La prohibición contenida en estas normas es clara en el sentido de proscribir cualquier tipo de discriminación en contra de las mujeres, circunstancia que con frecuencia ocurre en el ámbito laboral, ya sea por prejuicios propios de una tradición machista o por un acto natural de la maternidad como lo es el estado de gestación o lactancia. Por consiguiente, para la Sala el asunto de la referencia trasciende de la esfera legal y ostenta relevancia constitucional, pues aunque pueda ser cierta la afirmación de la accionada en el sentido de que “no existe norma que obligue a contratar a una mujer en estado de embarazo” (62) sí existe una obligación constitucional de no discriminar a una mujer gestante o lactante, juicio que contrae la atención de la Corporación.

    50.  Una vez efectuada esta acotación, del análisis hasta ahora efectuado se desprende que

    i) la institución educativa accionada realizó manifestaciones indicativas de que se volverían a contratar los servicios de docencia de la señora D. P. R. M. para el periodo lectivo de 2019; y

    ii) la accionante comunicó de forma efectiva a las directivas de la institución que se encontraba en estado de gestación.

    51.   Así las cosas, resta por establecer si el cambio de parecer de la Corporación Educa S.A.S se debió al estado de gravidez de la señora D. P.. En ese sentido, recuérdese que el plantel adujo que la decisión tuvo lugar ante la disminución de estudiante matriculados en el grado escolar en el que ejercía la docencia la accionante.

    Sin embargo, esta razón se desvirtúa a partir de las siguientes circunstancias:

    i) el contrato de trabajo suscrito por las partes en el año 2017 fue renovado para el 2018, periodos en los cuales la accionante tuvo a su cargo 10 y luego 15 estudiantes, respectivamente; y

    ii) según la respuesta de la institución accionada, para el año 2019 en el grupo escolar en el que se desempeñó la actora en los años anteriores, se matricularon 11 estudiantes.

    Estas situaciones permiten advertir para el año 2018 continuaba la necesidad del servicio en relación con el periodo lectivo 2017, de otro modo no se hubiera renovado la relación laboral; no obstante, causa suspicacia que una vez la docente informó su estado de gestación no se hubiera dado el mismo trato. Igualmente, es dable suponer que la necesidad continuaba para el 2019, pues en ese año se matricularon 11 estudiantes, es decir, uno más de los inscritos en el 2017.

    52.  Los anteriores raciocinios demuestran que el hecho de que la accionante se encontrara en estado de embarazo influyó en la decisión de no suscribir un nuevo contrato para el 2019, pues antes de que diera a conocer tal circunstancia, la accionada había emprendido actos relacionados con suscribir un nuevo vínculo de laboral, los cuales eran contundentes y precisos, descartándose así manifestaciones vagas y dubitativas que dieran a entender una mera expectativa o posibilidad. En consecuencia, el haber cambiado de parecer por el hecho de que la actora se encontrara en estado de gestación constituye un acto excluyente e injustificado que vulneró el derecho constitucional a la  igualdad y no discriminación.

    53.  En relación con los diferentes medios de prueba obrantes en el expediente y que fueron valorados por la Sala, debe precisarse que si bien la accionante allegó diferentes capturas de pantalla de conversaciones sostenidas en la aplicación WhatsApp, las cuales presentan un valor de prueba indiciaria, conforme lo señalado en precedencia (supra 21), estos elementos fueron analizados de forma conjunta con los demás rudimentos probatorios, entre ellos, el derecho de petición, el número de estudiantes matriculados en el 2018, y las razones ofrecidas por la accionada para no contratar nuevamente a la señora D. P. R. M., lo cual permitió estructurar el razonamiento efectuado en esta providencia.

    54.  De otra parte, la conducta de la accionada también desconoció el artículo 83 de la Constitución, relacionado con el principio de buena fe que debe existir en el seno de la sociedad. Sobre este postulado, en sentencia C-131 de 2004, la Corte expresó:

    “(…) el mencionado principio es entendido, en términos amplios,  como una exigencia de honestidad, confianza, rectitud, decoro y credibilidad que otorga la palabra dada, a la cual deben someterse las diversas actuaciones de las autoridades públicas y de los particulares entre sí y ante éstas, la cual se presume, y constituye un soporte esencial del sistema jurídico; de igual manera, cada una de las normas que componen el ordenamiento jurídico debe ser interpretada a luz del principio de la buena fe, de tal suerte que las disposiciones normativas que regulen el ejercicio de derechos y el cumplimiento de deberes legales, siempre deben ser entendidas en el sentido más congruente con el comportamiento leal, fiel y honesto que se deben los sujetos intervinientes en la misma. En pocas palabras, la buena fe incorpora el valor ético de la confianza y significa que el hombre cree y confía que una declaración de voluntad surtirá, en un caso concreto, sus efectos usuales, es decir, los mismos que ordinaria y normalmente ha producido en casos análogos. De igual manera, la buena fe orienta el ejercicio  de las facultades discrecionales de la administración pública y ayuda a colmar las lagunas del sistema jurídico”.

    55.  Este pronunciamiento jurisprudencial guarda consonancia con la afirmación de la accionante de sentir defraudada la “confianza legítima”. Valga aclarar que si bien el sentimiento de confianza puede surgir de enlaces o percepciones subjetivas en cada persona, en esta oportunidad la Sala determinó que la Corporación Educa S.A.S cometió un acto discriminatorio en contra de la actora que contrarió el ordenamiento constitucional.

    56.  De otra parte, la actuación de la accionada también trasgredió el derecho al trabajo de la accionante, en su fase precontractual, al haberla discriminado por hallarse en estado de gestación, desconociéndose así la importancia que reviste esta garantía en el ordenamiento constitucional en cuanto valor fundante del Estado social de derecho (art. 1), prerrogativa que goza de especial protección, además de constituirse como una obligación social (art. 25).

    Adicionalmente, conforme quedó establecido en el acápite destinado a la protección jurídica de la mujer en estado de gestación o lactancia (ver considerativa 11 y ss.), el sistema normativo colombiano contiene disposiciones de distintos rangos, (constitucional, de derecho internacional de derechos humanos, legal), que protegen la maternidad en el ámbito laboral y proscriben la discriminación hacia las mujeres (63).

    57.  A tono con lo anterior, con fundamento en estudios académicos y del sector industrial, así como estadísticas del DANE, en la sentencia SU-075 de 2018, la Corte se pronunció frente a la situación de empleo informal y desempleo de mujeres. En ese sentido, señaló que la mayoría de la población desempleada pertenece al grupo de mujeres de alta fertilidad (72%), mientras que en la empleada la mayoría de los trabajadores informales o que recurren al autoempleo pertenecen al grupo de baja fertilidad (56% y 65%), respectivamente (64).

    Por otro lado, refirió que “una de las causas de esta brecha responde a que los costos para el sector laboral de emplear a mujeres en edad reproductiva son mayores que para los hombres, luego se vuelve una preferencia no emplear mujeres en esa categoría para no tener que asumir el pago de los beneficios establecidos para las mujeres en embarazo o exponerse a pagos adicionales con el mismo fundamento” (65).

    Por último, no puede perderse de vista que el trabajo, entendido como fuerza laboral, ha sido considerado por la jurisprudencia de esta Corporación como un instrumento que permite al individuo obtener los recursos necesarios para procurarse una vida digna y, a su vez, como mecanismo de realización personal y profesional (66).

    58.  Conforme el artículo 86 superior, el juez de tutela tiene el deber de asegurar los derechos constitucionales, para lo cual deberá adoptar las medidas que considere pertinentes.

    59.  Con el propósito de reivindicar el derecho a la igualdad y no discriminación, garantías que le fueron vulneradas a la señora D. P. R. M., la Sala revocará el fallo de segunda instancia y, en su lugar, confirmará la sentencia del juez a quo, en cuanto concedió la protección constitucional; sin embargo, el amparo se concederá de manera definitiva.

    60.  Así las cosas, como medidas dirigidas a contrarrestar los efectos producidos por el acto discriminatorio efectuado sobre la accionante y remediar las posibilidades laborales que le fueron coartadas, la Corte ordenará a la Corporación Educa S.A.S. que en el término de diez (10) hábiles, 

    i) ofrezca disculpas a la señora D. P. R. M., de forma escrita, reconociendo que la conducta censurada constituyó una actuación contraria a los valores, principios y derechos fundamentales previstos en la Constitución Política de 1991, particularmente, la prohibición de discriminar a las mujeres que se encuentren en estado de gestación o lactancia. Así mismo, esta manifestación deberá ser publicada en el portal virtual de la institución por el término un (1) mes.

    Adicionalmente, en el término de diez (10) hábiles, la accionada deberá 

    ii) contratar a la accionante para el periodo lectivo correspondiente al año 2020, en una labor igual a la desempeñada en los contratos suscritos en el 2017 y 2018, respetando las condiciones pactadas en este último año, sin perjuicio de los ajustes salariales que se establezcan para el 2020. Esto, en caso que así lo desee la accionante.

    III. DECISIÓN

    En mérito de lo expuesto, la Sala Octava de Revisión de la Corte Constitucional, administrando justicia en nombre del pueblo y por mandato de la Constitución Política,

    RESUELVE:

    Primero.- REVOCAR la sentencia proferida en segunda instancia el 10 de mayo de 2019 por el Juzgado Primero de Familia de Zipaquirá, que negó el amparo, y, en su lugar, CONFIRMAR el fallo adoptado en primera instancia el 19 de marzo de 2019 por el Juzgado Primero Civil Municipal de Chía, en cuanto amparó los derechos fundamentales; sin embargo, se CONCEDERÁ la protección definitiva a los derechos al trabajo, igualdad y no discriminación de la señora D. P. R. M., de conformidad con lo expuesto en esta decisión.   

    Segundo.- Como consecuencia de lo anterior, ORDENAR a la Corporación Educa S.A.S. -a través de su representante legal o quien haga sus veces-, que en el término de diez (10) días hábiles contados a partir de la notificación de esta providencia, OFREZCA DISCULPAS a la señora D. P. R. M., de forma escrita, reconociendo que la conducta censurada constituyó una actuación contraria a los valores, principios y derechos fundamentales previstos en la Constitución Política de 1991, particularmente, la prohibición de discriminar a las mujeres que se encuentren en estado de gestación o lactancia. Este documento deberá ser publicado en el portal virtual de la institución por el término un (1) mes.

    Tercero.- ORDENAR a la Corporación Educa S.A.S, a través de su representante legal o quien haga sus veces, que en el término de diez (10) días hábiles contados a partir de la notificación de este proveído, realice las gestiones pertinentes para CONTRATAR a la señora D. P. R. M. para el periodo lectivo correspondiente al año 2020, en una labor igual a la desempeñada en los contratos suscritos en el 2017 y 2018, respetando las condiciones pactadas en este último año, sin perjuicio de los ajustes salariales que se establezcan para el 2020. Esto, en caso que así lo desee la accionante.

    Cuarto.- LÍBRENSE por Secretaría General las comunicaciones de que trata el artículo 36 del Decreto Estatutario 2591 de 1991.

    Cópiese, notifíquese, comuníquese, publíquese y cúmplase.

    JOSÉ FERNANDO REYES CUARTAS, Magistrado

    ALBERTO ROJAS RÍOS, Magistrado Con aclaración de voto

    CARLOS BERNAL PULIDO. Magistrado Con salvamento parcial de voto

    MARTHA VICTORIA SÁCHICA MÉNDEZ, Secretaria General

     SALVAMENTO PARCIAL DE VOTO DEL MAGISTRADO CARLOS BERNAL PULIDO,

    A LA SENTENCIA T-043/20 PROHIBICION DE DISCRIMINACION DE LA MADRE GESTANTE EN EL ACCESO AL TRABAJO-Alcance (Salvamento parcial de voto)

    No era pertinente que la Sentencia T-043 de 2019 aplicara las reglas y remedios propios del fuero de maternidad en vigencia de una relación laboral. La situación fáctica permitía analizar el alcance de la prohibición de discriminación de la madre gestante en el acceso al trabajo

    ACCION DE TUTELA DE MUJER EMBARAZADA EN CONTRATO DE PRESTACION DE SERVICIOS Y LIMITACION DE LA LIBERTAD CONTRACTUAL (Salvamento parcial de voto)

    Una cosa es la situación de la persona que está en un proceso de contratación y otra, la de la trabajadora que está ejecutando el contrato. Esta desproporción restringe la posibilidad de que la empresa seleccione la planta de personal conforme a sus necesidades operacionales del respectivo año lectivo. La Sala debió ordenar a la accionada que continuara con el proceso de contratación que le fue interrumpido a la tutelante por su estado de embarazo. Terminado el proceso de contratación, la empresa debía informar al juez de primera instancia acerca del cumplimiento de lo ordenado y éste verificaría que la accionada no incurrió en ningún otro acto discriminatorio en la etapa precontractual

    Ref.: Expediente T-7.461.559

    M.P.: JOSÉ FERNANDO REYES CUARTAS

    Comparto que en el caso en concreto se acreditó un acto de discriminación en razón del embarazo. No obstante, me aparto de la orden impartida en el resolutivo tercero de la sentencia de la referencia, con fundamento en las siguientes razones:

    1. Al presentarse la conducta vulneradora en la etapa precontractual no era pertinente que la Sentencia T-043 de 2019 aplicara las reglas y remedios propios del fuero de maternidad en vigencia de una relación laboral (67). La situación fáctica permitía analizar el alcance de la prohibición de discriminación de la madre gestante en el acceso al trabajo (68).

    2. Ordenar a la institución educativa que contrate -casi a modo de reintegro- a la accionante para el periodo lectivo 2020, implica una limitación desproporcionada de su libertad contractual, toda vez, que una cosa es la situación de la persona que está en un proceso de contratación y otra, la de la trabajadora que está ejecutando el contrato. Esta desproporción restringe la posibilidad de que la empresa seleccione la planta de personal conforme a sus necesidades operacionales del respectivo año lectivo.

    La Sala debió ordenar a la accionada que continuara con el proceso de contratación que le fue interrumpido a la tutelante por su estado de embarazo. Terminado el proceso de contratación, la empresa debía informar al juez de primera instancia acerca del cumplimiento de lo ordenado y éste verificaría que la accionada no incurrió en ningún otro acto discriminatorio en la etapa precontractual.

    Fecha ut supra,

    CARLOS BERNAL PULIDO, Magistrado

    ACLARACIÓN DE VOTO DEL MAGISTRADO ALBERTO ROJAS RIOS

    A LA SENTENCIA T-043/20 PRUEBA ELECTRONICA-Valor probatorio de las capturas de pantalla extraídas de las aplicaciones de texto whatsapp no se deben calificar como prueba indiciaria (Aclaración de voto)

    La decisión a la cual llegó la Sala, debió hacerse una remisión directa hacia los lineamientos establecidos en el Código General del Proceso y en la Ley 527 de 1999, pues resulta inadmisible y desacertado que la Corte Constitucional erosione las reglas de valoración probatoria y califique como un simple “indicio”, una prueba que, además de ostentar validez y fuerza obligatoria y probatoria por mandato normativo y jurisprudencial, evidenció fehacientemente la conducta vulneradora que desplegó la entidad accionada

    Referencia: Expediente T-7.461.559

    Acción de tutela instaurada por D. P. R. M. en contra de la Sociedad Corporación Educa S.A.S. (Universo Mágico Kindergarten).

    Magistrado Ponente: José Fernando Reyes Cuartas

    Comparto el sentido de la decisión adoptada por la Sala Octava de Revisión en el presente asunto. Sin embargo, disiento en cuanto al fundamento de la consideración “aproximación a la prueba electrónica, y el valor probatorio atenuado de las capturas de pantalla o pantallazos extraídos de la aplicación de WhatsApp.”

    Considero que calificar como simples “elementos indiciarios” a los pantallazos de WhatsApp, que sirvieron para comprobar la conducta discriminatoria que se ejerció sobre la accionante, una vez el empleador decidió no renovar el contrato laboral de la misma ante su estado de gravidez, desconoce las reglas sobre la apreciación probatoria de los mensajes de datos y sus impresiones.

    En tal sentido, debe precisarse que si bien en materia laboral, en especial en procedimiento laboral, no existe un tratamiento especial en relación con los mensajes de datos y su impresión, existen reglas aplicables en lo que a este asunto concierne. Por un lado, el artículo 247 (69) del Código General del Proceso, aplicable por analogía conforme al artículo 145 C.P.T.S.S., señala que los documentos aportados en el mismo formato en que fueron generados, deben ser catalogados como mensajes de datos; mientras que su simple impresión debe valorarse con base en las reglas generales de los documentos.

    Por otro lado, la Ley 527 de 1999 (70) reglamenta el acceso y el uso de los mensajes de datos, específicamente en los artículos 10 (71) y 11 (72), en donde se establece, entre otras cosas, la validez o fuerza obligatoria y probatoria que debe blindar este tipo de información y, a su vez, la prohibición de negar tal carácter por el solo hecho de tratarse de un mensaje de datos o en razón de no haber sido presentado en su forma original.

    Al respecto, esta Corporación, en sentencia C-831 de 2001, señaló que la aplicación de la mencionada ley, no se circunscribe únicamente al ámbito mercantil, sino al acceso y uso de datos de manera generalizada, como se expone a continuación:

    (…) ha de entenderse que la ley 527 de 1999 no se restringe a las operaciones comerciales sino que hace referencia en forma genérica al acceso y uso de los mensajes de datos, lo que obliga a una comprensión sistemática de sus disposiciones con el conjunto de normas que se refieren a este tema dentro de nuestro ordenamiento jurídico y en particular con las disposiciones que como el artículo 95 de la Ley Estatutaria de administración de Justicia se han ocupado de esta materia.  Dicha disposición señaló en efecto que los juzgados, tribunales y corporaciones judiciales podrán utilizar cualesquiera medios técnicos, electrónicos, informáticos y telemáticos, para el cumplimiento de sus funciones y que los documentos emitidos por los citados medios, cualquiera que sea su soporte, gozarán de la validez y eficacia de un documento original siempre que quede garantizada su autenticidad, integridad y el cumplimiento de los requisitos exigidos por las leyes procesales. Es decir que bajo el presupuesto del cumplimiento de los requisitos aludidos un mensaje de datos goza de validez y eficacia.”

    Esta ley, también ha sido aplicada en casos recientes por la Sala de Casación Laboral de la Corte Suprema de Justicia en Auto AL1377-2019 (73) y Sentencia SL 5246-2019 (74).

    Así las cosas, y teniendo en cuenta que los mensajes de datos deben ser valorados, como se indicó anteriormente, conforme a las reglas generales de los documentos, cabe señalar que, si bien los pantallazos extraídos de la aplicación WhatsApp no son un documento original, los mismos se presumen auténticos, según lo dispone el artículo 246 (75) del Código General del Proceso. A su vez, el artículo 262 (76) de la misma obra establece que, si durante el proceso, una impresión es entregada, la parte contraria deberá solicitar su rectificación, lo cual en este caso no sucedió.

    Ante el citado panorama, para fundamentar la decisión a la cual llegó la Sala, debió hacerse una remisión directa hacia los lineamientos establecidos en el Código General del Proceso y en la Ley 527 de 1999, pues resulta inadmisible y desacertado que la Corte Constitucional erosione las reglas de valoración probatoria y califique como un simple “indicio”, una prueba que, además de ostentar validez y fuerza obligatoria y probatoria por mandato normativo y jurisprudencial, evidenció fehacientemente la conducta vulneradora que desplegó la entidad accionada en contra de la señora D. P. R. M., cuyos efectos buscan ser revertidos a través del amparo constitucional otorgado.

    Con el mayor de los respetos, dejo así consignadas las razones por las cuales aclaro el voto en el presente asunto.

    Fecha ut supra,

    ALBERTO ROJAS RIOS, Magistrado

    ———————————————————————————————

    (1) Cuaderno de primera instancia, folio 2.

    (2) Cuaderno de primera instancia, folio 3.

    (3) Cuaderno de primera instancia, folio 37.

    (4) Conforme a lo expuesto en el Certificado de existencia y presentación obrante en el expediente. Documento visible en folios 77 a 81 del cuaderno de primera instancia.

    (5) Cuaderno de primera instancia, folios 82 a 86.

    (6) Cuaderno de primera instancia, folio 87 a 98.

    (7) Según el dicho de la accionante, la señora I. R. O.es la directora general de la institución educativa accionada, y conforme lo establecido en el Certificado de existencia y representación de la Corporación Educa S.A.S., la señora R. O. es su representante legal.

    (8) Cuaderno de primera instancia, folio 96.

    (9) Cuaderno de primera instancia, folios 97 y 98.

    (10) Cuaderno de primera instancia, folios 99 a 109.

    (11) “ARTICULO 46. CONTRATO A TERMINO FIJO. El contrato de trabajo a término fijo debe constar siempre por escrito y su duración no puede ser superior a tres años, pero es renovable indefinidamente. // 1. Si antes de la fecha del vencimiento del término estipulado, ninguna de las partes avisare por escrito a la otra su determinación de no prorrogar el contrato, con una antelación no inferior a treinta (30) días, éste se entenderá renovado por un período igual al inicialmente pactado, y así sucesivamente. // 2. No obstante, si el término fijo es inferior a un (1) año, únicamente podrá prorrogarse sucesivamente el contrato hasta por tres (3) períodos iguales o inferiores, al cabo de los cuales el término de renovación no podrá ser inferior a un (1) año, y así sucesivamente. // PARAGRAFO. En los contratos a término fijo inferior a un año, los trabajadores tendrán derecho al pago de vacaciones y prima de servicios en proporción al tiempo laborado cualquiera que éste sea”.

    (12) Cuaderno de primera instancia, folios 108 a 111.

    (13) Cuaderno de segunda instancia, folios 3 a 5.

    (14) Cuaderno de primera instancia, folio 9.

    (15) Idem, folio 10.

    (16) Idem, folio 11.

    (17) Idem, folios 12 a 14.

    (18) Idem, folio 15.

    (19) Idem, folios 16 a 22, y 24.

    (20) Idem, folio 23.

    (21) Idem, folio 25.

    (22) Idem, folio 26.

    (23) Idem, folio 27.

    (24) Idem, folio 28.

    (25) Idem, folios 31 y 32.

    (26) Idem, folios 33 y 34.

    (27) Cuaderno de primera instancia.

    (28) Integrada por las magistradas Diana Fajardo Rivera y Cristina Pardo Schlesinger.

    (29) Cuaderno de la Corte, folios 7 a 21.

    (30) Cuaderno de la Corte, folios 25 a 31.

    (31) Idem, folios 36 a 39.

    (32) Sobre los créditos contraídos por su esposo, la accionante hizo la siguiente acotación: “(q)uiero aclarar que estas deudas él las adquirió y las amortizó con normalidad cuando gozaba de un salario más alto como Abogado Asesor Grado 23 de la Sala Especializada en Restitución de Tierras del Tribunal Superior de Bogotá (hasta diciembre de 2018) y luego como Profesional Especializado Grado 33 de la Sala de Casación Civil de la Corte Suprema de Justicia (hasta febrero de 2019), cargos de los cuales fue separado por razones ajenas a su voluntad y a su desempeño”. Cuaderno de la Corte, folio 37.

    (33) Cuaderno de la Corte, folio 49 a 51 vuelto.

    (34) Idem, folio 50.

    (35) La doctrina constitucional española emplea este término para referirse a las relaciones del individuo con los poderes públicos. Al respecto, Francisco J. Bastida Freijedo y otros, refieren lo siguiente: “(a)unque los derechos fundamentales ya no pueden caracterizarse exclusivamente como derechos de reacción frente al Estado, lo cierto es que éstos siguen teniendo en los poderes públicos su principal referente y, por tanto, siguen desplegando una gran parte de su eficacia en las relaciones verticales en las que el individuo se puede ver unilateralmente obligado por aquéllos”. Teoría general de los derechos fundamentales en la Constitución Española de 1978”, editorial Tecnos, 2004, pg. 172.

    (36) Sentencia T-632 de 2007.

    (37) La jurisprudencia constitucional también ha establecido que relaciones de indefensión se pueden constituir en las siguientes situaciones:

    “(i) (l)a falta, ausencia o ineficacia de medios de defensa legales, materiales o físicos, que le permitan al particular que instaura la acción contrarrestar los ataques o agravios, que contra sus derechos sean inferidos por el particular contra el cual se impetra la acción;

    (ii) La imposibilidad de satisfacer una necesidad básica o vital, por la forma irracional, irrazonable y desproporcionada en la que un particular ejerce una posición o un derecho del que es titular;

    (iii) La existencia de un vínculo afectivo, moral, social o contractual, que facilite la ejecución de acciones u omisiones que resulten lesivas de derechos fundamentales de una de las partes;

    (iv) En el uso de medios o recursos que buscan, por medio de la presión social, que un particular haga o deje de hacer algo en favor de otro, por ejemplo la publicación de la condición de deudor de una persona por parte de su acreedor en un diario de amplia circulación, o la utilización de personas con determinadas características para efectuar el cobro de acreencias”, sentencia T-181 de 2017, reiterada en la sentencia T-030 de 2018.

    (38) Sentencia T-233 de 1994.

    (39) Sentencia T-233 de 1994.

    (40) Federico Bueno de Mata, “Prueba electrónica y proceso 2.0”, editorial Tirant lo Blanch, primera edición, 2014, pg. 130.

    (41) Idem, pg. 165.

    (42) Sobre este tema es pertinente consultar el análisis efectuado por el Gastón Bielli en el artículo “Prueba Electrónica: Incorporación, admisión y valoración de capturas de pantalla en el proceso de familia”, disponible en el siguiente enlace: https://www.pensamientocivil.com.ar/doctrina/4384-prueba-electronica-incorporacion-admision-y-valoracion-capturas  (visitado el 4 de diciembre de 2019)

    (43) Idem.

    (44) Idem.

    (45) Ver, por ejemplo, la sentencia T-188 de 2017.

    (46) Sentencias T-834 de 2005 y T-887 de 2009.

    (47) Cuaderno de primera instancia, folio 33.

    (48) En sentencia T-313 de 2017, la Corte adujo que una acción judicial es idónea “cuando es materialmente apta para producir el efecto protector de los derechos fundamentales” y efectiva “cuando está diseñada para brindar una protección oportuna a los derechos amenazados o vulnerados”. De otro lado, autores nacionales han identificado la idoneidad como “la capacidad o aptitud del medio para dar una respuesta a la pregunta constitucional”, situación en la que se valora, por ejemplo, la aceptación de las posturas adoptadas por la Corte a través de su jurisprudencia o la formalidad exigida en el mecanismo judicial. Frente a la eficacia aducen que “los criterios claves para la evaluación son la oportunidad e integralidad de la respuesta”, en este punto deben ser valoradas las categorías de “sujeto de especial protección”, “tercera edad”, “expectativa promedio de vida”, entre otras. (Luis Manuel Castro Novoa y Cesar Humberto Carvajal Santoyo, en “Acciones Constitucionales. Módulo I, acción de tutela” 2017).

    (49) Código Procesal del Trabajo y de la Seguridad Social, artículo 2do.

    (50) Sentencia T-583 de 2017.

    (51) En similar sentido, en la decisión T-406 de 2012 se adujo que “por regla general, la tutela no es el mecanismo idóneo para resolver conflictos relacionados con el reintegro. Sin embargo, excepcionalmente, cuando están en juego los derechos fundamentales de la mujer gestante y de quien está por nacer, tales derechos pueden ser protegidos a través de esta acción, toda vez que se trata de sujetos en condición de indefensión y por tal motivo merecen un trato especial por parte del Estado”

    (52) Entendiendo esta categoría como capacidad para “producir el efecto protector de los derechos fundamentales”, sentencia T-313 de 2017.

    (53) En tanto posibilidad de brindar una “protección oportuna a los derechos amenazados o vulnerados”, idem.

    (54) Ver sentencia T-662 de 2016, reiterada en la sentencia T-046 de 2019.

    (55) Inicialmente no fue posible verificar el contenido de la información aportada, pues la misma se encontraba en formato “opus” el cual no era admitido por los equipos de cómputo de la Corte, en consecuencia, el despacho del magistrado ponente le solicitó a la accionante remitir nuevamente dichos audios pero esta vez en formato Mp3.

    (56) Cuaderno de primera instancia, folio 51.

    (57) Cuaderno de primera instancia, folios 15 y 43.

    (58) La señora M. S. C. para el momento de los hechos se desempeñaba como Directora de la sede Chía de la institución educativa Universo Mágico, conforme a la comunicación con fecha del 16 de octubre de 2018 que fue remitida a la accionante con referencia “AVISO DE TERMINACIÓN DE CONTRATO” (Cuaderno de la Corte, folio 40).

    (59) Cuaderno de primera instancia, folio 87.

    (60) Cuaderno de primera instancia, folio 33.

    (61) Cuaderno de la Corte, folio 50.

    (62) Cuaderno de primera instancia, folio 91.

    (63) Al respecto, pueden consultarse la Constitución (art. 43); la Convención sobre la eliminación de todas las formas de discriminación contra la mujer (art. 11); y el Código Sustantivo del Trabajo (Capítulo V).

    (64) Esta información corresponde al periodo comprendido entre 2009 y 2013 y fue tomada a partir del texto “Desempleo femenino en Colombia” de Luis Eduardo Arango Thomas y otros. 2016.

    (65) Idem.

    (66) Sentencia C-614 de 2009, reiterada en la sentencia C-539 de 2014.

    (67) Código Sustantivo del Trabajo, artículo 239. Prohibición de despido. “1. Ninguna trabajadora podrá ser despedida por motivo de embarazo o lactancia (…)” (negritas fuera de texto).

    (68) Al respecto, en Sentencia SU-075 de 2018, la Corte puso en evidencia que “la mayoría de la población desempleada pertenece al grupo de mujeres de alta fertilidad (72%), mientras que en la empleada la mayoría de los trabajadores informales o que recurren al autoempleo pertenecen al grupo de baja fertilidad (56% y 65%, respectivamente)”. Así mismo señaló que “una de las causas de esta brecha responde a que los costos para el sector laboral de emplear a mujeres en edad reproductiva son mayores (…), luego se vuelve una preferencia no emplear mujeres en esa categoría”. Para llegar a esta conclusión, la Corte acudió a estudios académicos y del sector industrial, así como a estadísticas del DANE.

    (69) Articulo 247 CGP. Inciso 2. Valoración de mensajes de datos: “Serán valorados como mensajes de datos los documentos que hayan sido aportados en el mismo formato en que fueron generados, enviados, o recibidos, o en algún otro formato que lo reproduzca con exactitud. La simple impresión en papel de un mensaje de datos será valorada de conformidad con las reglas generales de los documentos.”

    (70) “Por medio de la cual se define y reglamenta el acceso y uso de los mensajes de datos, del comercio electrónico y de las firmas digitales, y se establecen las entidades de certificación y se dictan otras disposiciones”.

    (71) Artículo 10. Admisibilidad y fuerza probatoria de los mensajes de datos: “Los mensajes de datos serán admisibles como medios de prueba y su fuerza probatoria es la otorgada en las disposiciones del capítulo viii del título xiii, sección tercera, libro segundo del código de procedimiento civil. En toda actuación administrativa o judicial, no se negará eficacia, validez o fuerza obligatoria y probatoria a todo tipo de información en forma de un mensaje de datos, por el sólo hecho que se trate de un mensaje de datos o en razón de no haber sido presentado en su forma original.”

    (72) Artículo 11. Criterio para valorar probatoriamente un mensaje de datos: “Para la valoración de la fuerza probatoria de los mensajes de datos a que se refiere esta ley, se tendrán en cuenta las reglas de la sana crítica y demás criterios reconocidos legalmente para la apreciación de las pruebas. Por consiguiente habrán de tenerse en cuenta: la confiabilidad en la forma en la que se haya generado, archivado o comunicado el mensaje, la confiabilidad en la forma en que se haya conservado la integridad de la información, la forma en la que se identifique a su iniciador y cualquier otro factor pertinente.”

    (73) “(…) Ahora, si en gracia de discusión, las circunstancias antes descritas no generaran el suficiente grado de certeza al operador judicial, lo que le impidiera arribar a la conclusión, de que efectivamente en el caso en concreto, la reclamación se entiende efectuada en el municipio en el que reside la demandante, la Sala considera oportuno rememorar lo consagrado en la Ley 527 de 1999 (…)”.

    (74) “(…) La Sala destaca, conforme a lo visto, que los mensajes de datos, al ser admitidos como medios de prueba y otorgárseles el mismo tratamiento de los documentos contenidos en papel, se nutren, como de forma expresa se hace en la ley (…)”.  (Ley 527 de 1999).

    (75) Artículo 246. Valor probatorio de las copias. “Las copias tendrán el mismo valor probatorio del original, salvo cuando por disposición legal sea necesaria la presentación del original o de una determinada copia (…)”

    (76) Artículo 262. Documentos declarativos emanados de terceros. “Los documentos privados de contenido declarativo emanados de terceros se apreciarán por el juez sin necesidad de ratificar su contenido, salvo que la parte contraria solicite su ratificación”.

    15Nov/21

    Act nº 6614, Jan. 19, 2002, Framework Act on Electronic Documents and Transactions

    Act nº 6614, Jan. 19, 2002, Framework Act on Electronic Documents and Transactions. (Amended by Act nº 7440, Mar. 31, 2005; Act nº 7796, Dec. 29, 2005; Act nº 7988, Sep. 27, 2006; Act nº 8371, Apr. 11, 2007; Act nº 8362, Apr. 11, 2007: Act nº 8387, Apr. 27, 2007; Act nº 8466, May 17, 2007; Act nº 8461, May 17, 2007; Act nº 8802, Dec. 27, 2007; Act nº 8852, Feb. 29, 2008; Act nº 8979, Mar. 21, 2008; Act nº 8932, Mar. 21, 2008; Act nº 9246, Dec. 26, 2008; Act nº 9429, Feb. 6, 2009; Act nº 9504, Mar. 18, 2009; Act nº 9705, May 22, 2009; Act nº 9708, May 22, 2009; Act nº 10220, Mar. 31, 2010; Act nº 10250, Apr. 12, 2010; Act nº 10629, May 19, 2011; Act nº 10854, Jul. 14, 2011; Act nº 11461, jun. 1, 2012; Act nº 11688, Mar. 23, 2013; Act nº 11690, Mar. 23, 2013; Act nº 12781, Oct. 15, 2014; Act nº 12875, Dec. 30, 2014; Act nº 13347, jun. 22, 2015; Act nº 13587, Dec. 22, 2015; Act nº 13768, Jan. 19, 2016; Act nº 14839, Jul. 26, 2017; Act nº 14907, Oct. 24, 2017).

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to contribute to the development of the national economy by clarifying the legal relevance of electronic documents and electronic transactions, ensuring the security and reliability of electronic documents and electronic transactions, and creating infrastructure for facilitating the use thereof.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 2 (Definitions)

    The definitions of terms used in this Act shall be as follows:

    1. The term “electronic document” means information, prepared, transmitted, received, or stored in an electronic form by an information processing system;

    2. The term “information processing system” means an electronic mechanism or system capable of processing information used for preparing, converting, transmitting, receiving, or storing electronic documents;

    3. The term “originator” means a person who prepares and transmits an electronic document;

    4. The term “addressee” means another party to whom an originator transmits an electronic document;

    5. The term “electronic transaction” means a transaction fully or partially conducted by an electronic document when buying and selling goods or services;

    6. The term “electronic transaction business entity” means a person who conducts electronic transactions;

    7. The term “electronic transaction user” means a person, other than an electronic transaction business entity, who makes electronic transactions;

    8. The term “certified electronic address” means an address registered pursuant to Article 18-4, which is information comprised of letters and numbers to identify a person who sends or receives an electronic document;

    9. The term “certified electronic document center” means a person designated under Article 31-2 (1), who conducts the following affairs (hereinafter referred to as “storage of electronic documents, etc.”) for others:

    (a) Storage or certification of electronic documents;

    (b) Other affairs related to electronic documents;

    10. The term “certified electronic document intermediary” means a person designated under Article 31-18, who sends, receives, or relays electronic documents (hereinafter referred to as “distribution of electronic documents“) for others.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 3 (Scope of Application)

    This Act shall apply to all electronic documents and electronic transactions, except as otherwise expressly provided for in other Acts.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    CHAPTER II.- ELECTRONIC DOCUMENTS

    Article 4 (Validity of Electronic Documents)

    (1) No electronic document shall be denied legal effect as a document solely because it is in an electronic form, except as otherwise expressly provided for in other Acts.

    (2) An electronic document showing the intent of guaranty which has been drawn up by the guarantor for the purpose of his/her business or project shall, notwithstanding the proviso to Article 428-2 (1) of the Civil Act, be deemed a document under the main sentence of the same paragraph. (Inserted by Act nº 13768, Jan. 19, 2016)

    (3) Where acts of recording, reporting, preservation, keeping, preparation or otherwise under any Act as specified in attached Table have been conducted in the form of electronic documents, it shall be deemed that acts pursuant to such Act have been conducted.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 5 (Storage of Electronic Documents)

    (1) Where an electronic document meets the following requirements, the storage of such electronic document may take the place of the storage of the document provided for in the relevant statutes:

    1. That the content of the electronic document shall be available for public perusal;

    2. That the electronic document shall be kept in the same form as when prepared, transmitted, or received or in a form reproducible same as the afore-mentioned form;

    3. Where matters concerning an originator, an addressee, and the time of transmission or receipt of the electronic document are included therein, such matters shall remain therein.

    (2) Where a document converted to a form processible by an information processing system (hereinafter referred to as “digitized document“) from a paper document or other document not prepared in an electronic form (hereinafter referred to as “document to be digitized“) meets the following requirements, the storage of such digitized document may take the place of the storage of a document provided for in the relevant statutes: Provided, That this shall not apply where expressly provided for otherwise in any other statutes:

    1. That a digitized document shall be identical to a document to be digitized in its content and form;

    2. That a digitized document shall meet all requirements referred to in the subparagraphs of paragraph (1).

    (3) Requirements for the identity of the content and form of a digitized document and a document to be digitized, methods and procedures for preparing a digitized document and other necessary matters shall be determined and announced by the Minister of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (4) For the purposes of paragraphs (1) and (2), a part needed only for transmission or receipt may not be deemed an electronic document or digitized document.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 6 (Time and Place of Transmission or Receipt of Electronic Documents)

    (1) An electronic document (including a digitized document; hereinafter the same shall apply) shall be deemed sent at the time the electronic document is entered into an information processing system through which an addressee or his/her agent can receive the electronic document.

    (2) An electronic document shall be deemed received in any of the following cases:

    1. Where an addressee has designated an information processing system through which he/she will receive the electronic document: When it is entered into the designated information processing system: Provided, That where it is entered into an information processing system other than the designated information processing system, referring to the time the addressee prints it out;

    2. Where an addressee has not designated an information processing system through which he/she will receive the electronic document: When it is entered into the information processing system he/she manages.

    (3) An electronic document shall be deemed sent from or received at the location of the place of business of an originator or addressee; where at least two places of business exist, the electronic document shall be deemed sent from or received at the location of the place of business where the relevant electronic document is mainly controlled: Provided, That the originator or addressee has no place of business, such electronic document shall be deemed sent from or received at his/her habitual residence.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 7 (Where Originator is Deemed to have Sent Electronic Documents)

    (1) An expression of intent contained in any of the following electronic documents shall be deemed sent by an originator:

    1. An electronic document sent by his/her agent;

    2. An electronic document sent by a computer program developed to send or receive electronic documents automatically or by other electronic means.

    (2) In any of the following cases, an addressee of an electronic document may do an act, deeming an expression of intent contained in the electronic document to be the expression of intent of an originator:

    1. Where the addressee has followed the procedure on which he/she agreed upon in advance with the originator in order to verify whether the electronic document was originated from the originator;

    2. Where an electronic document received has been sent by a person who is deemed by the addressee to have sent such electronic document according to the intent of the originator or his/her agent, in view of his/her relationship with the originator or his/her agent.

    (3) Paragraph (2) shall not apply in any of the following cases:

    1. Where an addressee has received a notice from an originator that the electronic document is not originated from him/her, and there is a reasonable time to take necessary measures according thereto;

    2. In a case falling under paragraph (2) 2, where an addressee has become aware that the electronic document did not originate from an originator or he/she might have become aware that he/she paid due attention thereto or followed the procedure on which he/she agreed upon with the originator.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 8 (Independency of Electronic Document Received)

    Any electronic document received shall be deemed independent from each other document: Provided, That the same shall not apply where the addressee might have become aware that the same electronic document has been repeatedly transmitted if he/she had followed the procedure for verification agreed upon with the originator or paid due attention thereto.

    Article 9 (Acknowledgement of Receipt)

    (1)  Where an originator has transmitted an electronic document on condition that the receipt thereof shall be acknowledged, no such electronic document shall be deemed sent until the originator receives a notice of acknowledgment of receipt. In such cases, Article 534 of the Civil Act shall not apply.

    (2) Where an originator requests a notice of acknowledgment of receipt without specifying the acknowledgment of receipt as a condition, if the originator has not received any notice of acknowledgment of receipt within a reasonable period (referring to a period if such period is designated by the originator or the period agreed upon between the originator and the addressee), the originator may withdraw the transmission of such electronic document.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 10 (Alteration under Agreement between Originator and Addressee)

    An originator and an addressee may conclude an agreement on terms different from the provisions of Articles 6 through 9, except as otherwise expressly provided for in other statutes.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 11 (Matters Concerning Digital Signatures)

    Matters concerning digital signatures in electronic transactions shall be governed by the Digital Signature Act.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    CHAPTER III.- ENSURING SECURITY OF ELECTRONIC TRANSACTIONS AND PROTECTION OF CONSUMERS

    Article 12 (Protection of Personal Information)

    (1) The Government shall formulate and implement policies to protect personal information of electronic transaction users in order to ensure the security and reliability of electronic transactions.

    (2) Every electronic transaction business entity shall comply with related regulations, such as the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc., when collecting, using, providing or managing personal information of electronic transaction users.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 13 (Protection of Trade Secrets)

    (1) The Government shall formulate and implement policies to protect trade secrets of electronic transaction users in order to ensure the security and reliability of electronic transactions.

    (2) Every electronic transaction business entity (including any person entrusted with the operation of an information processing system; hereafter the same shall apply in this Article) shall take measures to protect trade secrets of electronic transaction users.

    (3) No electronic transaction business entity shall, without obtaining the consent of an electronic transaction user, provide or divulge a trade secret of the relevant user to any third person.

    (4) Matters necessary for the scope of trade secrets, protective measures, etc. under paragraphs (1) through (3) shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 14 (Use of Encryption Products)

    (1) Any electronic transaction business entity may use an encryption product to ensure the security and reliability of electronic transactions.

    (2) If the Government deems it necessary for national security, it may restrict the use of encryption products, and take necessary measures to gain access to the original text of encrypted information or encryption technology.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 15 (Formulation and Implementation of Consumer Protection Policies, etc.)

    (1) The Government shall formulate and implement policies to protect the basic rights and interests of consumers relevant to electronic transactions and to ensure consumer credibility on electronic transactions pursuant to related statutes, such as the Framework Act on Consumers and the Act on the Consumer Protection in Electronic Commerce, Etc.

    (2) The Government may recommend electronic transaction business entities and trade associations to voluntarily establish a code of conduct to prevent unfair conduct related to electronic transactions.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 16 (Prevention of Losses to and Remedies for Consumers)

    (1) The Government shall formulate and implement policies on the provision of information to consumers and the proliferation of education, etc., in order to prevent the occurrence of loss to consumers related to electronic transactions.

    (2) The Government shall formulate and implement necessary measures so that it may promptly and fairly deal with complaints from and losses to consumers related to electronic transactions.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 17 (Matters to be Generally Observed by Electric Transaction Business Entities)

    Every electric transaction business entity shall comply with the following matters in order to protect consumers related to electronic transactions and to ensure the security and reliability of electronic transactions:

    1. Provision of its trade name (including the name of the representative of a corporation, if applicable), information on itself and accurate information on goods, services, the terms of a contract, etc.;

    2. Provision and preservation of contractual terms and conditions so that consumers may easily have access to or recognize them;

    3. Formulation of procedures by which a consumer may cancel or change his/her order;

    4. Formulation of procedures for easy withdrawal of an application, cancellation or termination of a contract, exchange, return of goods and refund of payments, etc.;

    5. Formulation of procedures to promptly and fairly deal with consumer complaints and requests;

    6. Preservation of transaction records required for the verification of transactions for a fixed period.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Articles 18 through 18-3 Delelted (By Act nº 14907, Oct. 24, 2017)

    Article 18-4 (Registration of Certified Electronic Addresses)

    (1) Any person who intends to send or receive electronic documents using his/her certified electronic address shall register his/her certified electronic address with the exclusively responsible agency under Article 22 (1).

    (2) Upon receipt of an application for registration under paragraph (1), the exclusively responsible agency under Article 22 (1) shall confirm whether a certified electronic address applied for registration conforms to international standards, etc., and enter and store the details thereof in an information processing system.

    (3) The exclusively responsible agency under Article 22 (1) may collect fees from persons who apply for registration pursuant to paragraph (1).

    (4) Matters necessary for registration and storage of certified electronic addresses and registration fees under paragraphs (1) through (3) shall be prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 18-5 (Generation and Issuance of Distribution Certificates, etc.)

    (1) Where an electronic document is sent, received or read through a certified electronic address, the exclusively responsible agency under Article 22 (1) shall generate and store information including the following matters (hereinafter referred to as “distribution information“):

    1. Time the electronic document is sent and received;

    2. The sender and the addressee of the electronic document;

    3. Other matters prescribed by Presidential Decree concerning transmission and receipt of electronic documents.

    (2) An originator and a sender may be issued a distribution certificate from the exclusively responsible agency under Article 22 (1), which stores distribution information.

    (3) Where the exclusively responsible agency under Article 22 (1) has issued a distribution certificate according to the method and procedure prescribed by Presidential Decree, such distribution certificate shall be presumed true and correct.

    (4) Matters necessary for the generation, storage and issuance of distribution certificates under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 18-6 (Prohibition of Collection, etc. of Certified Electronic Addresses through Automated Programs, etc.)

    (1) No one shall collect certified electronic addresses through an automated program or technical mechanism that collects certified electronic addresses.

    (2) No person shall sell or provide any collected certified electronic address in violation of paragraph (1).

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 18-7 (Prohibition of Sending Advertisements)

    No one shall send any advertisement to the certified electronic address of any addressee for the purpose of profit-making or public relations.

    (Article Inserted by Act nº 11461, Jun. 2012)

    CHAPTER IV.- FORMULATION OF BASIC POLICIES ON ELECTRONIC DOCUMENTS AND ELECTRONIC TRANSACTIONS AND PROMOTION SYSTEM

    Article 19 (Principles of Basic Policies on Electronic Documents and Electronic Transactions and Responsibility of Government)

    The Government shall formulate and implement basic policies on electronic documents and electronic transactions according to the following principles to facilitate the use of electronic documents and the conduct of electronic transactions:

    1. Performance led by the private sector;

    2. Minimizing regulations;

    3. Ensuring the security and reliability of electronic documents and electronic transactions;

    4. Strengthening international cooperation.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 20 (Formulation and Implementation of Plan to Facilitate Use of Electronic Documents and Conduct of Electronic Transactions)

    (1) The Government shall formulate and implement a plan including the following matters are included (hereinafter referred to as “plan to facilitate the use of electronic documents and the conduct of electronic transactions”) according to the principles of basic policies on electronic documents and electronic transactions formulated under Article 19:

    1. Basic direction-setting for a plan to facilitate the use of electronic documents and the conduct of electronic transactions;

    2. Matters concerning international norms related to electronic documents and electronic transactions;

    3. Matters concerning the electronic payment system;

    4. Matters concerning the protection of intellectual property rights;

    5. Matters concerning the protection of the rights and interests of parties to electronic documents and electronic transactions;

    6. Matters concerning ensuring the security and reliability of electronic documents and electronic transactions;

    7. Matters concerning the development and standardization of technologies relating to electronic documents and electronic transactions;

    8. Matters concerning the creation of an environment to facilitate the use of electronic documents and the conduct of electronic transactions and the generation of demand therefor;

    9. Matters concerning international cooperation related to electronic documents and electronic transactions;

    10. Matters concerning support for creating infrastructure necessary for facilitating the use of electronic documents and the conduct of electronic transactions;

    11. Matters concerning the establishment of high-speed information and communication networks and the revitalization of the use thereof;

    12. Other matters necessary for facilitating the use of electronic documents and the conduct of electronic transactions.

    (2) The head of a central administrative agency related to a plan to facilitate the use of electronic documents and the conduct of electronic transactions (hereinafter referred to as “related central administrative agency“) shall formulate sectional plans for matters referred to in the subparagraphs of paragraph (1) under his/her jurisdiction, and take such plans into consideration when formulating and implementing major policies.

    (3) The Minister of Science and ICT shall formulate a plan to facilitate the use of electronic documents and the conduct of electronic transactions by integrating sectional plans of each related central administrative agency. (Amended by Act nº 11688, Mar. 23, 2013; Act nº 11690, Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 21 Deleted (By Act nº 9504, Mar. 18, 2009)

    Article 22 (Agency Exclusively Responsible for Promoting Use of Electronic Documents and Conduct of Electronic Transactions)

    (1) The Ministry of Science and ICT may designate an exclusively responsible agency to implement the following projects in an efficient and systematic manner for facilitating the use of electronic documents as well as the conduct of electronic transactions: (Amended by Act nº 13347, Jun. 22, 2015; Act nº 14839, Jul. 26, 2017)

    1. Deleted (By Act nº 14907, Oct. 24, 2017)

    2. Research and development and dissemination projects of standards related to electronic documents and electronic transactions under Article 24, and activities related to the international standardization of such standards;

    3. Support for technical development under Article 25;

    4. Support for fact-finding surveys of statistics on electronic documents and electronic transactions under Article 28;

    5. Support for duties of designating certified electronic document centers under Article 31-2;

    6. Support for reporting of working rules, such as the storage of electronic documents, under Article 31-8;

    7. Support for technologies on measures for protecting electronic documents by certified electronic document centers under Article 31-9 (3);

    8. Acquiring stored documents, etc. under Article 31-15 (3);

    9. Support for duties of designating certified electronic documents intermediaries under Article 31-18;

    10. Operation of the Mediation Committee of Disputes on Electronic Documents and Transactions under Article 32.

    (2) Delelted (By Act nº 14907, Oct. 24, 2017)

    (3) The Government may fully or partially subsidize expenses incurred by the exclusively responsible agency in performing projects to facilitate the conduct of electronic transactions and the use of electronic documents within budgetary limits or within the Information and Communication Technology Promotion Fund established under Article 41 of the Information and Communications Technology Industry Promotion Act.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    CHAPTER V.- FACILITATING USE OF ELECTRONIC DOCUMENTS AND CONDUCT OF ELECTRONIC TRANSACTIONS AND CREATING INFRASTRUCTURE

    Article 23 (Facilitating Use of Electronic Documents, etc.)

    (1) The Government shall formulate and implement necessary policies, such as amending various statutes, in order to facilitate the use of electronic documents.

    (2) The Minister of Science and ICT may determine and announce standard guidelines for requirements, methods and procedures for the preparation, transmission, receipt and storage of electronic documents to facilitate the use thereof. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) through (6) Delelted (By Act nº 14907, Oct. 24, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 24 (Standardization of Electronic Documents and Electronic Transactions)

    (1) The Government shall promote the following activities to efficiently use electronic documents and conduct electronic transactions and to ensure the compatibility of related technologies:

    1. Establishment, amendment, and repeal of standards related to electronic documents and electronic transactions and the dissemination thereof;

    2. Research, study, and development of domestic and overseas standards related to electronic documents and electronic transactions;

    3. Other activities necessary for standardization related to electronic documents and electronic transactions.

    (2) The Government may, if necessary for efficiently implementing a project falling under each of paragraph (1), request any related agency or private organization to conduct such projects on its behalf. In such cases, the Government may subsidize expenses incurred while the project is conducted by proxy as prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 25 (Promotion of Technical Development for Electronic Documents and Electronic Transactions)

    The Government shall promote the following to develop technology required for facilitating the use of electronic documents and the conduct of electronic transactions and to improve technical standards:

    1. Matters concerning surveys of technical levels related to electronic documents and transactions, research and development of technology, and utilization of developed technologies;

    2. Matters concerning technical cooperation, technical guidance, and technology transfer related to electronic documents and electronic transactions;

    3. Matters concerning the smooth distribution of technical information related to electronic documents and electronic transactions and industry-science-research cooperation;

    4. Other matters necessary for technical development related to electronic documents and electronic transactions.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 26 (Training of Professionals in Electronic Documents and Electronic Transactions)

    (1) The Government shall endeavor to train professionals required for facilitating the use of electronic documents and the conduct of electronic transactions.

    (2) In order to train professionals pursuant to paragraph (1), the Government may fully or partially subsidize expenses incurred in conducting such task to research institutes, such as government-funded research institutions, under the Act on the Establishment, Operation and Fostering of Government-Funded Research Institutes, Etc., schools under the Higher Education Act, private educational institutions, and other related institutions.

    (3) Matters necessary for subsidizing expenses to institutions training professionals under paragraph (2) and other matters shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 27 (Promotion of Electronic Transactions by Public Sectors)

    The State agencies, local governments, public institutions defined in Article 4 of the Act on the Management of Public Institutions, public organizations, etc. (hereinafter referred to as “State agencies, etc.”) shall formulate and implement a plan to procure goods or services necessary for the operation thereof, or to perform their projects through electronic transactions.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 28 (Fact-Finding Surveys of Statistics on Electronic Documents and Electronic Transactions)

    (1) The Minister of Science and ICT may conduct a fact-finding survey of statistics on electronic documents and electronic transactions, etc. in order to effectively formulate and implement policies for facilitating electronic documents and electronic transactions. In such cases, the Statistics Act shall apply mutatis mutandis to the compilation of statistics on electronic documents and electronic transactions. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) If necessary for conducting a fact-finding survey of statistics on electronic documents and electronic transactions under paragraph (1), the Minister of Science and ICT may request any of the following entities to submit data or state its opinion: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. A State agency, etc.;

    2. An electronic transaction business entity;

    3. A corporation or organization related to electronic documents or electronic transactions.

    (3) Any person in receipt of a request to submit data, etc. under paragraph (2) shall comply therewith.

    (4) Matters necessary for conducting a fact-finding survey of statistics on electronic documents and electronic transactions shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 29 (Internationalization of Electronic Documents and Electronic Transactions)

    (1) In order to promote international cooperation in electronic documents and electronic transactions, the Government may provide support for activities, such as exchanges of information, technology or human resources on electronic documents and electronic transactions, joint surveys, research and technical cooperation and international standardization.

    (2) The Government shall endeavor to fully participate in discussions related to electronic documents and electronic transactions in international organizations and to respond thereto, and to revitalize entry of electronic transaction business entities and business entities related to electronic documents into overseas markets.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 30 (Electronic Commerce Resource Centers)

    (1) The Government shall formulate and promote policies required for facilitating electronic transactions conducted by small and medium enterprises.

    (2) In order to facilitate electronic transactions conducted by small and medium enterprises, the Minister of Science and ICT may designate an institution which supports education and training, technological guidance, management consulting, provision of information, etc. related to electronic transactions as an electronic commerce resource center (hereinafter referred to as “resource center“). (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for criteria for designation of a resource center, reporting outcomes from performing activities, subsidization of expenses and other matters shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 30-2 (Revocation of Designation of Resource Centers)

    If a resource center falls under any of the following, the Minister of Science and ICT may revoke the designation thereof: Provided, That if it falls under subparagraph 1, he/she shall revoke the designation thereof: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where it has obtained designation as a resource center by fraudulent or other unlawful means;

    2. Where there is no outcome from activities for at least two consecutive years without just cause;

    3. Where it fails to comply with any of the criteria for designation under Article 30 (3).

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31 (Support for Facilitating Use of Electronic Documents and Conduct of Electronic Transactions)

    (1) In order to facilitate the use of electronic documents and the conduct of electronic transactions, the State or a local government may provide taxation support, such as tax reductions and exemptions, and financial support and other necessary administrative support, as prescribed by tax-related Acts, including the Restriction of Special Taxation Act and the Restriction of Special Local Taxation Act.

    (2) Where a corporation or organization related to electronic documents and electronic transactions implements a project specified in a plan to facilitate the use of electronic documents and the conduct of electronic transactions, the Government may fully or partially subsidize the relevant project cost within budgetary limits.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    CHAPTER V-II.- CERTIFIED ELECTRONIC DOCUMENT CENTERS AND CERTIFIED ELECTRONIC DOCUMENTS INTERMEDIARIES

    SECTION 1.- Certified Electronic Document Centers

    Article 31-2 (Designation of Certified Electronic Document Centers)

    (1) The Minister of Science and ICT may designate an entity specialized in the storage of electronic documents, etc. as a certified electronic document center and require it store electronic documents in order to ensure safety and accuracy in the storage of electronic documents. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) Only corporations, State agencies, etc. prescribed by Presidential Decree may be designated as a certified electronic document center.

    (3) An entity intending to be designated as a certified electronic document center shall apply for designation to the Minister of Science and ICT upon being equipped with human resources, technical ability, financial ability and independence in human and physical aspects under Article 31-9 (6) and other facilities, equipment, etc. necessary for the storage of electronic documents. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (4) Matters necessary for human resources, technical ability, financial ability and the criteria, methods and procedures for designation of facilities, equipment, etc. of a certified electronic document center under paragraphs (1) and (3) shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-3 (Grounds for Disqualification as Certified Electronic Document Centers)

    None of the following persons or entities shall be designated as a certified electronic document center: (Amended by Act nº 12875, Dec. 30, 2014; Act nº 13587, Dec. 22, 2015)

    1. An entity employing any of the following persons among its executive officers and staff members prescribed by Presidential Decree (hereinafter referred to as “executive officers, etc.”), who directly conduct the storage of electronic documents:

    (a) A person under adult guardianship or person under limited guardianship;

    (b) A person declared bankrupt, and not yet reinstated;

    (c) Any person for which two years have not passed since his/her sentence of imprisonment without labor or heavier punishment was completely executed (including where the execution is deemed completed) or exempted as declared by a court;

    (d) Any person who is subject to a suspended sentence of imprisonment without labor or heavier punishment as declared by a court;

    (e) Any person disqualified or whose qualification was suspended by court ruling or by other Acts;

    (f) Any person for whom two years have not passed since his/her designation as a certified electronic document center or certified electronic document intermediary was revoked (excluding cases where his/her designation has been revoked in accordance with the subparagraph 3 of Article 31-22 because he/she falls under subparagraph 1 (a) or (b)), who was an executive officer, etc. of the person whose designation was revoked pursuant to Articles 31-5 (1) and 31-22 (limited to a person directly responsible for the occurrence of the ground for revocation thereof or responsible therefor correspondingly, who is prescribed by Presidential Decree);

    2. Any person for who two years have not passed since its designation was revoked (excluding cases where its designation has been revoked in accordance with the subparagraph 3 of Article 31-22 because he/she falls under subparagraph 1 (a) or (b)) pursuant to Articles 31-5 (1) and 31-22.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-4 (Correction Orders)

    Where a certified electronic document center falls under any of the following, the Minister of Science and ICT may order it to make a correction within a fixed period not exceeding six months: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where it fails to comply with any of the criteria for designation of a certified electronic document center under Article 31-2 (4);

    2. Where an executive officer, etc. falls under any of the items of subparagraph 1 of Article 31-3;

    3. Where it fails to report on working rules for the storage of electronic documents, etc., in violation of Article 31-8 (1);

    4. Where it fails to report on any amendment to working rules for the storage of electronic documents, etc., in violation of Article 31-8 (2);

    5. Where it refuses to provide services of storing electronic documents, etc., in violation of Article 31-9 (1);

    6. Where it discriminates unfairly against a user, in violation of Article 31-9 (2);

    7. Where it fails to take measures necessary for preventing the content of any stored electronic document from being damaged or altered, in violation of Article 31-9 (3);

    8. Where security in the storage, transmission, or receipt of electronic documents or the accuracy of proof concerning electronic documents is at risk of being compromised because the method or procedure of a certified electronic document center for conducting its affairs is inappropriate;

    9. Where it fails to purchase insurance, in violation of Article 31-16 (2).

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-5 (Revocation of Designation and Penalty Surcharges)

    (1) Where an entity designated as a certified electronic document center pursuant to Article 31-2 falls under any of the following, the Minister of Science and ICT may revoke its designation or order it to fully or partially suspend within a fixed period not exceeding one year, as prescribed by Ordinance of the Ministry of Science, ICT and Future Planning: Provided, That where it falls under subparagraph 1 or 2, he/she shall revoke its designation: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where it has obtained designation under Article 31-2 (1) by fraudulent or other unlawful means;

    2. Where it has continued its affairs during a period for which its affairs are suspended;

    3. Where it fails to begin operations for at least one year from the date it has obtained designation under Article 31-2 (1), or fails to conduct its affairs, such as the storage of electronic documents, for at least one consecutive year after beginning operations;

    4. Where it fails to comply with a correction order issued under Article 31-4 within a fixed period.

    (2) Where the Minister of Science and ICT must impose the suspension of operations because an entity designated as a certified electronic document center falls under paragraph (1) 3 and 4 and he/she deems that the suspension of operations will cause serious inconvenience to users of a certified electronic document center, or harm public interests, he/she may impose a penalty surcharge not exceeding 100 million won in lieu of the suspension of operations. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) The amount of a penalty surcharge depending on the type and severity of an offense on which a penalty surcharge is imposed pursuant to paragraph (2) and methods for computing the penalty surcharge and other necessary matters shall be prescribed by Presidential Decree.

    (4) When any person liable to pay a penalty surcharge under paragraph (2) fails to pay it by the payment due date, the Minister of Science and ICT shall collect it in the same manner as delinquent national taxes are collected. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-6 (Effect of Storage through Certified Electronic Document Centers)

    Where a certified electronic document center stores electronic documents, such electronic documents shall be deemed stored under Article 5 (1) or (2).

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-7 (Presumption of Content of Electronic Documents, etc.)

    (1) The content of electronic documents stored in a certified electronic document center shall be presumed unmodified during the period of storage.

    (2) Where a certified electronic document center issues a certificate of matters on the storage, an originator, an addressee and the date and time of transmission and receipt of an electronic document stored in the relevant certified electronic document center according to methods and procedures prescribed by Presidential Decree, matters stated on the certificate shall be presumed true and correct.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-8 (Reporting on Working Rules for Storage of Electronic Documents, etc.)

    (1) Any certified electronic document center shall establish working rules for the storage of electronic documents, etc. (hereinafter referred to as “working rules for the storage of electronic documents, etc.”) before it begins operations, as prescribed by Ordinance of the Ministry of Science and ICT, and report to the Minister of Science and ICT. In such cases, the following matters shall be included in working rules for the storage of electronic documents, etc.: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Types of business affairs;

    2. Methods and procedures for conducting business affairs;

    3. Terms and conditions of use of services of storing electronic documents, etc. and user fees;

    4. Other matters prescribed by Ordinance of the Ministry of Science and ICT and necessary for conducting business affairs.

    (2) Where a certified electronic document center intends to modify matters reported pursuant to paragraph (1), it shall report in advance to the Minister of Science and ICT, as prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) Where the Minister of Science and ICT deems that the content of working rules for the storage of electronic documents, etc. reported pursuant to paragraph (1) is at risk of compromising security and accuracy in the storage of electronic documents, etc. or harm interests of users (hereinafter referred to as “user“) of services of storing electronic documents, etc., he/she may order the relevant certified electronic document center to amend the working rules for the storage of electronic documents, etc. within a fixed period. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (4) When a certified electronic document center has changed facilities or equipment used for the storage of electronic documents, etc., it shall report to the Minister of Science and ICT, as prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-9 (Matters to Observe)

    (1) No certified electronic document center shall refuse to provide services of storing electronic documents, etc. without just cause.

    (2) No certified electronic document center shall discriminate unfairly against any user.

    (3) A certified electronic document center shall take necessary measure, as prescribed by Presidential Decree, to prevent the content of stored electronic documents from being damaged or altered.

    (4) No certified electronic document center shall provide or disclose any electronic document stored in the relevant information processing system or other related information to any third person without following due process or without the consent of the originator, the addressee and the relevant user of the electronic document.

    (5) A certified electronic document center shall maintain independence in human and physical aspects in the relationship with its users in order to store electronic documents, etc., in a reliable manner and the specific criteria therefor shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-10 (Regular Inspections, etc.)

    (1) A certified electronic document center shall undergo regular inspections by the Minister of Science and ICT on the safety of the facilities and equipment it possesses. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) Where a certified electronic document center has reported a change under Article 31-8 (4) or succession under Article 31-14 (3), it shall undergo an inspection by the Minister of Science and ICT on the safety of the relevant facilities or equipment. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) Standards, timing, subject matter of, and procedures for inspections under paragraphs (1) and (2) and other necessary matters shall be prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-11 (Reporting, Inspections, etc.)

    (1) If deemed necessary, the Minister of Science and ICT may require a certified electronic document center to submit related data or file a report in writing or by electronic document, and require related public officials to enter an office, a place of business and other related place of the certified electronic document center to inspect facilities, equipment, documents or other articles relating to the storage of electronic documents, etc., as prescribed by Presidential Decree. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) Any public official who conducts an inspection under paragraph (1) shall carry a certificate of identification indicating his/her authority, and produce it to interested parties.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-12 (Security of Related Information, Such as Electronic Documents)

    (1) No one shall forge or falsify any electronic document or other related information stored in a certified electronic document center, or use forged or falsified information.

    (2) No one shall be issued a false certificate referred to in Article 31-7 (2) by entering false information or a false command into an information processing system of a certified electronic document center.

    (3) No one shall destroy or damage any electronic document or other related information stored in a certified electronic document center, or infringe on its confidentiality.

    (4) No current or former executive officer or employee of a certified electronic document center shall divulge the content of any electronic document or other related information he/she has become aware of in the course of performing his/her duty, or use it for himself/herself or allow any third party to use it.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-13 (Protection of User Information)

    Every certified electronic document center and certified electronic document intermediary shall protect personal information of users in relation to the storage of electronic documents, etc. and the distribution of electronic documents, as prescribed by related statutes.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-14 (Transfer, Acquisition, etc. of Business of Certified Electronic Document Centers)

    (1) Any certified electronic document center may fully or partially transfer its business to any third certified electronic document center or merge with any third certified electronic document center. In such cases, the certified electronic document center shall notify its users of such transfer or merger by no later than 60 days prior to the date it intends to transfer or merge, as prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) Any certified electronic document center which has transferred its business pursuant to paragraph (1) or any certified electronic document center surviving a merger or established in the course of a merger shall succeed to the status of the previous certified electronic document center.

    (3) Any entity that has succeeded to the status of the previous certified electronic document center pursuant to paragraph (2) shall report to the Minister of Science and ICT, as prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-15 (Discontinuance of Business of Storing Electronic Documents, etc.)

    (1) Where a certified electronic document center intends to discontinue its business of storing electronic documents, etc., it shall notify its users of the discontinuance of its business and report such fact to the Minister of Science and ICT, as prescribed by Ordinance of the Ministry of Science and ICT, by no later than 60 days prior to the date it intends to discontinue its business. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) A certified document center which have reported pursuant to paragraph (1) shall transfer electronic documents that it stores and other records on the storage of electronic documents, etc. (hereinafter referred to as “stored documents, etc.”) to any third certified electronic document center: Provided, That where it cannot transfer stored documents, etc. due to inevitable reasons, such as the refusal of any third certified electronic document center to acquire such stored documents, etc., it shall, without delay, report such fact to the Minister of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) Where any of the following cases arises and the Minister of Science and ICT deems an emergency measure necessary to ensure the continuity and security of its affairs, such as the storage of electronic documents, he/she may require the exclusively responsible agency to acquire the relevant stored electronic documents, etc. or may require it to take other necessary measures: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where he/she has received a report under the proviso to paragraph (2);

    2. Where he/she has revoked designation of a certified electronic document center pursuant to Article 31-5;

    3. Where there arises an inevitable reason making it impossible for a certified electronic document center to conduct its affairs, such as the storage of electronic documents.

    (4) Matters necessary for reporting the discontinuance of business, and transfer and acquisition of stored documents, etc. under paragraphs (1) through (3) and other matters shall be prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-16 (Liability for Compensation and Purchasing Insurance)

    (1) When a certified electronic document center has inflicted a loss on a user in connection with the storage of electronic documents, etc., it shall compensate the user for such loss: Provided, That where the certified electronic document center has proved that there is no intention or negligence on its part, this shall not apply.

    (2) A certified electronic document center shall purchase insurance, as prescribed by Presidential Decree, in order to compensate for losses under paragraph (1).

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 31-17 (Fees, etc.)

    A certified electronic document center may impose necessary charges, such as fees, on applicants for issuance of certificates or its users.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    SECTION 2.- Certified Electronic Document Intermediaries

    Article 31-18 (Designation of Certified Electronic Document Intermediaries, etc.)

    (1) The Minister of Science and ICT may designate an entity specialized in the distribution of electronic documents as a certified electronic document intermediary to distribute electronic documents in order to ensure stability and reliability in the distribution of electronic documents. In such cases, he/she may first designate a person who represents each field of finance, health care, national defense, etc. where necessary to protect personal information and trade secrets. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) Only corporations, State agencies, etc. prescribed by Presidential Decree may be designated as a certified electronic document intermediary.

    (3) Any person who intends to be designated as a certified electronic document intermediary shall apply for designation to the Minister of Science and ICT up being equipped with human resources, facilities, equipment and financial ability and technical ability necessary for distributing electronic documents (hereinafter referred to as “requirements for certified electronic document intermediaries”). (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (4) The Minister of Science and ICT may announce the working rules of certified electronic document intermediaries in order to ensure stability and reliability in the distribution of electronic documents. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (5) Where the Minister of Science and ICT designates a certified electronic document intermediary pursuant to the latter part of paragraph (1), he/she may attach a condition necessary to ensure stability and reliability in the distribution of electronic documents. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (6) Matters necessary for requirements for certified electronic document intermediaries and procedures for the designation thereof under paragraph (1) and (3) and other matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 31-19 (Grounds for Disqualification as Certified Electronic Document Intermediaries)

    None of the following entities shall be designated as a certified electronic document intermediary: (Amended by Act nº 13587, Dec. 22, 2015)

    1. An entity, any of the executive officers of which falls under any of the items of subparagraph 1 of Article 31-3;

    2. An entity for which two years have not passed since its designation was revoked (excluding cases where its designation has been revoked in accordance with the subparagraph 3 of Article 31-22 because he/she falls under subparagraph 1 (a) or (b)) pursuant to Article 31-5 (1) or 31-22.

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 31-20 (Reporting by Certified Electronic Document Intermediaries on Changes)

    When a certified electronic document intermediary has changed facilities or equipment used for distributing electronic documents, he/she shall report to the Minister of Science and ICT, as prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 31-21 (Regular Inspections, etc.)

    (1) Every certified electronic document intermediary shall undergo regular inspections by the Minister of Science and ICT on the safety of the facilities and equipment it possesses. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (2) When any certified electronic document intermediary has reported changes under Article 31-20, it shall undergo an inspection by the Minister of Science and ICT on the safety of the relevant facilities or equipment. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for standards, timing, subject matter of, and procedures for inspections under paragraphs (1) and (2) shall be prescribed by Ordinance of the Ministry of Science and ICT. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 31-22 (Revocation of Designation of Certified Electronic Document Intermediaries)

    Where any certified electronic document intermediary falls under any of the following, the Minister of Science and ICT may revoke its designation, as prescribed by Ordinance of the Ministry of Science and ICT: Provided, That where it falls under subparagraph 1, he/she shall revoke its designation: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where it has obtained designation by fraudulent or other unlawful means;

    2. Where it fails to meet requirements for certified electronic document intermediaries under Article 31-18 (3);

    3. Where its executive officer falls under subparagraph 1 of Article 31-19: Provided, That this shall not apply where it appoints another executive officer replacing such executive officer within three months;

    4. Where it fails to comply with a correction order issued under Article 31-23 within a fixed period.

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 31-23 (Correction Orders)

    Where any certified person replaying electronic documents falls under any of the following, the Minister of Science and ICT may order it to make a correction within a fixed period not exceeding six months: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where it violates any provision of working rules under Article 31-18 (4);

    2. Where it fails to comply with a condition attached pursuant to Article 31-18 (5);

    3. Where stability and reliability in the distribution of electronic documents is at risk of being substantially compromised because the method or procedure for conducting its affairs is inappropriate.

    (Article Inserted by Act nº 11461, Jun. 2012)

    CHAPTER VI.- MEDIATION COMMITTEE OF DISPUTES ON ELECTRONIC DOCUMENTS AND ELECTRONIC TRANSACTIONS

    Article 32 (Establishment and Composition of Mediation Committee of Disputes on Electronic Documents and Electronic Transactions, etc.)

    (1) There is hereby established a Mediation Committee of Disputes on Electronic Documents and Electronic Transactions (hereafter referred to as the “Committee” in this Chapter) to mediate disputes on electronic documents and electronic transactions.

    (2) The Committee shall be comprised of at least 15 up to 50 members, including one Chairperson.

    (3) Members shall be appointed or commissioned by the Minister of Science and ICT from among any of the following persons, and the Chairperson shall be elected by the Committee from among its members: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. A current or former associate professor or higher, or person in a position equivalent thereto in a university or officially-recognized research institution, who majored in the field related to electronic documents or electronic transactions;

    2. A current or former Grade IV public official or higher (including a public official in general service belonging to the Senior Civil Service) or a person in a position equivalent thereto in a public agency, who has experience in electronic documents or electronic transactions;

    3. A qualified judge, public prosecutor or attorney-at-law;

    4. A person recommended by a non-profit, non-governmental organization as defined in Article 2 of the Assistance for Non-Profit, Non-Governmental Organizations Act;

    5. Other person who has knowledge and experience in electronic documents or electronic transactions, and the mediation of disputes.

    (4) The members shall be non-standing members, and the terms of office of members shall be three years, and renewable for only one further term.

    (5) No member shall be dismissed or de-commissioned against his/her will except in any of the following cases: (Amended by Act nº 14907, Oct. 24, 2017)

    1. Where he/she is sentenced to the suspension of qualification or heavier punishment;

    2. Where he/she is no longer able to perform his/her duties due to a mental or physical disorder;

    3. Where any illegality exists relating to his/her duties;

    4. Where he/she is deemed ill-fitted as a member due to neglect of duty or injury to dignity;

    5. Where he/she fails to abstain even though he/she falls under any of the subparagraphs of Article 32-2 (1) or the former part of Article 32-2 (2).

    (6) The secretariat shall be established within the exclusively responsible agency to support the affairs of the Committee.

    (7) Except as otherwise expressly provided for in paragraphs (1) through (6), matters necessary for the operation of the Committee and other matters shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 32-2 (Abstention, Recusal or Withdrawal of Members)

    (1) Where a member of the Committee falls under any of the following, he/she shall abstain from the mediation of the relevant mediation case:

    1. Where the member or his/her current or former spouse becomes a party to the case or is in the relationship of a joint titleholder or co-obligor with the party to the case;

    2. Where the member a current or former relative of a party to the case;

    3. Where the member bore witness in or assessed the relevant case;

    4. Where the member is or was involved in the relevant case as an agent of the party to the case.

    (2) Where a party to the case is in a circumstance that he/she anticipates unfairness in mediation, he/she may apply for recusal of the relevant member to the Committee; and the Committee shall determine thereon by voting. In such cases, the member against whom the recusal is applied for shall not participate in the voting. (Amended by Act nº 14907, Oct. 24, 2017)

    (3) Where a member falls under a ground referred to in paragraph (1) or (2), he/she shall voluntarily withdraw from the mediation of the relevant case. (Amended by Act nº 14907, Oct. 24, 2017)

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 33 (Mediation of Disputes)

    (1) Any person who intends to obtain a remedy for any loss or seek mediation of a dispute related to an electronic document or electronic transaction may apply for mediation of the dispute to the Committee: Provided, That this shall not apply where the mediation of the dispute has been completed in accordance with other Acts.

    (2) The Mediation Board (hereinafter referred to as the “Mediation Board“) comprised of not more than three members shall conduct mediation: Provided, That the Committee shall conduct mediation if the Committee has resolved to mediate for itself.

    (3) Members of the Mediation Board shall be appointed for each case by the Chairperson from among the members of the Committee, and at least one person falling under Article 32 (3) 3 shall be included as a member.

    (4) The Committee or the Mediation Board shall prepare a draft mediation within 45 days after receipt of an application for mediation of a dispute under paragraph (1), and recommend the draft mediation to the parties to the dispute (hereinafter referred to as “parties“): Provided, That where it intends to extend such deadline due to extenuating circumstances, it shall notify the parties of its intention, specifying the grounds therefor and the new deadline.

    (5) A draft mediation referred to in paragraph (4) may include restoration, compensation and other measures necessary to remedy damage within the limit not contrary to the purport of the application. (Inserted by Act nº 13347, Jun. 22, 2015)

    (6) The parties concerned upon receipt of a recommendation under the main sentence of paragraph (4) shall notify the Committee or the Mediation Board of whether they consent to the draft mediation within 15 days from the date of receipt of such recommendation. In such cases, if any party fails to express his or her intention within 15 days, he/she shall be deemed to have accepted the draft mediation.

    (7) Except as otherwise provided for in paragraphs (1) through (6), necessary matters concerning procedures for mediation shall be prescribed by Presidential Decree. (Amended by Act nº 13347, Jun. 22, 2015)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

     Article 33-2 (Notification of Illegal Acts, and Other Related Matters)

    Where the Committee deems that any party or person concerned has violated any statute while conducting dispute mediation, the Committee shall notify the relevant agency of such violation and make a request that the agency take an appropriate measure: Provided, That this shall not apply in any of the following cases:

    1. Where any of the parties to dispute has agreed to compensate for damage and has redressed the violation of the statutes;

    2. Where the relevant agency has already become aware of and investigated into the violation of the statutes.

    (Article Inserted by Act nº 13347, Jun. 22, 2015)

    Article 34 (Requests for Data, etc.)

    (1) The Committee may request the parties or a witness to provide data required for the mediation of a dispute. In such cases, the relevant parties shall comply with such request unless they have just cause.

    (2) Where the Committee deems it necessary, it may require the parties or a witness to attend a meeting of the Committee to hear their opinions.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 34-2 (Refusal and Suspension of Mediation)

    (1) The Committee may refuse to mediate the case in any of the following cases:

    1. Where the mediation of a dispute has been completed in accordance with other Act;

    2. Where it is deemed inappropriate for the Committee to mediate a dispute in light of the nature of the case;

    3. Where the Committee deems that an application for the mediation of a dispute has been filed for any unlawful purpose.

    (2) Where a party brings a lawsuit against the other party before the mediation of a dispute finishes, the Committee may suspend such mediation.

    (3) Where the Committee refuses to mediate the case pursuant to paragraph (1) or suspends mediation pursuant to paragraph (2), it shall notify the parties of the fact and grounds therefor.

    (Article Inserted by Act nº 11461, Jun. 2012)

    Article 35 (Completion of Mediation)

    (1) Mediation shall be completed in any of the following cases:

    1. Where parties consent to a mediation plan under Article 33 (4);

    2. Where parties submit a mediated agreement to the Committee.

    (2) Where mediation is completed pursuant to paragraph (1), the Committee shall send to the parties a protocol of mediation signed and sealed by the Committee Chairperson and each party.

    (3) A protocol of mediation referred to in paragraph (2) shall have the same effect as a consent judgment under the Civil Procedure Act.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 36 (Cessation of Mediation)

    The Committee shall notify the parties of the cessation of mediation in any of the following cases:

    1. Where an application for mediation is withdrawn, or any of the parties fails to comply with the mediation of a dispute;

    2. Where the parties refuse a mediation plan of the Committee.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 36-2 (Interruption of Extinctive Prescription)

    An Application for mediation of a dispute under Article 33 (1) shall have an effect of interrupting extinctive prescription: Provided, That this shall not apply where the application for mediation of a dispute is withdrawn.

    (Article Inserted by Act nº 12781, Oct. 15, 2014)

    Article 37 (Expenses for Mediation, etc.)

    (1) The Committee may require an applicant for mediation of a dispute to bear expenses for mediation, as prescribed by Presidential Decree.

    (2) The Government may subsidize expenses incurred in the operation of the Committee within budgetary limits.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 37-2 (Confidentiality)

    No person who conducts or has conducted affairs related to the mediation of a dispute of the Committee shall divulge confidential information he/she has become aware of in the course of performing his/her duty to any third person or appropriate it for any purpose other than the official purpose: Provided, That this shall not apply where expressly provided for otherwise in any other Acts.

    (Article Inserted by Act nº 11461, Jun. 2012)

    CHAPTER VII.- SUPPLEMENTARY PROVISIONS

    Article 38 (Prohibition of Use of Similar Names)

    (1) No entity, other than one designated as a certified electronic document center, shall use a certified electronic document center or similar in its name.

    (2) No entity, other than one designated as a certified electronic document intermediary, shall use a certified electronic document intermediary or similar in its name.

    (3) No one shall use a certified electronic address or similar for non-certified electronic address.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 39 (Delegation or Entrustment of Authority)

    The Minister of Science and ICT may delegate part of his/her authority under this Act to the head of an agency under his/her jurisdiction or the head of a local government, or entrust such authority to the head of a related central administrative agency or an specialized institution, as prescribed by Presidential Decree. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 40 (Reciprocity)

    This Act shall also apply to foreigners and foreign corporations: Provided, That with respect to foreigners or foreign corporations of a State which does not provide protection corresponding to this Act to citizens or corporations of the Republic of Korea, protection under this Act or treaties to which the Republic of Korea acceded or concluded by the Republic of Korea may be restricted commensurately therewith.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 41 (Hearings)

    Where the Minister of Science and ICT falls under any of the following, he/she shall hold a hearing: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Where he/she intends to revoke the designation of a resource center pursuant to Article 30-2;

    2. Where he/she intends to revoke the designation of a certified electronic document center pursuant to Article 31-5 (1);

    3. Where he/she intends to revoke the designation of a certified electronic document intermediary pursuant to Article 31-22.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 42 (Deemed Public Officials for Purposes of Penalty Provisions)

    Any of the following persons shall be deemed a public official for the purposes of applying Articles 129 through 132 of the Criminal Act to his/her business affairs:

    1. An executive officer or employee of a certified electronic document center;

    2. An executive officer of a certified electronic document intermediary;

    3. A non-public official member of the Committee among its members.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    CHAPTER VIII.- PENALTY PROVISIONS

    Article 43 (Penalty Provisions)

    (1) Any of the following persons shall be punished by imprisonment with labor for not more than ten years or by a fine not exceeding 100 million won:

    1. A person who forges or falsifies an electronic document or other related information stored in a certified electronic document center or uses forged or falsified information, in violation of Article 31-12 (1);

    2. A person who is issued a false certificate under Article 31-7 (2) by entering false information or a false command into the information processing system of a certified electronic document center, in violation of Article 31-12 (2).

    (2) An attempted offender referred to in paragraph (1) shall be punished.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 44 (Penalty Provisions)

    Any of the following persons shall be punished by imprisonment with labor for not more than five years or by a fine not exceeding 50 million won:

    1. A person who destroys or damages an electronic document or other related information stored in a certified electronic document center, or infringes on its confidentiality, in violation of Article 31-12 (3);

    2. A current or former executive officer or employee of a certified electronic document center, who divulges the content of an electronic document or other related information he/she has become aware of in the course of performing his/her duty, or uses such content for himself/herself or allows any third party to use such content, in violation of Article 31-12 (4);

    3. A person who divulges confidential information he/she has become aware of in the course of performing his/her duty to any third person or appropriates it for any purpose other than the official purpose, in violation of Article 37-2.

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    Article 45 (Joint Penalty Provisions)

    If the representative of a corporation, or an agent, an employee or any other servant of a corporation or an individual has committed an offense under Article 43 or 44 in connection with the affairs of the corporation or individual, not only shall a relevant offender be punished accordingly, but the corporation or individual shall also be punished by a fine under the relevant provisions: Provided, That this shall not apply where such corporation or individual has not been negligent in giving due attention and supervision of the relevant affairs to prevent such offense.

    (Article Amended by Act nº 9246, Dec. 26, 2008)

    Article 46 (Administrative Fines)

    (1) Any of the following persons shall be punished by an administrative fine not exceeding 30 million won:

    1. A person who collects, sells or provides any certified electronic address, in violation of Article 18-6;

    2. A person who sends any advertisement to the certified electronic address of an addressee for the purpose of profit-making or public relations, in violation of Article 18-7;

    3. A certified electronic document center that provides or discloses any electronic document or other related information, in violation of Article 31-9 (4).

    (2) Any of the following persons shall be punished by an administrative fine not exceeding ten million won: (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    1. Deleted (By Act nº 14907, Oct. 24, 2017)

    2. A person who fails to report working rules for the storage of electronic documents, etc., in violation of Article 31-8 (1);

    3. A person who fails to report any amendment made to working rules for the storage of electronic documents, etc., in violation of Article 31-8 (2);

    4. A person who fails to comply with an order to amend working rules for the storage of electronic documents, etc., in violation of Article 31-8 (3);

    5. A person who fails to report the change of facilities or equipment, in violation of Article 31-8 (4);

    6. A person who refuses to provide services of storing electronic documents, etc. without just cause, in violation of Article 31-9 (1);

    7. A person who discriminates unfairly against a user, in violation of Article 31-9 (2);

    8. A person who fails to take measures necessary for preventing the content of electronic documents stored in a certified electronic document center from being damaged or altered, in violation of Article 31-9 (3);

    9. A person who fails to undergo an inspection, in violation of Article 31-10 (1) or (2);

    10. A person who fails to submit data or a report, who submits false data or a false report, or who refuses, interferes with or evades entry or inspection of a related public official under Article 31-11 (1);

    11. A person who fails to notify users of the transfer or merger of business of storing electronic documents, etc., in violation of the latter part of Article 31-14 (1);

    12. A person who fails to report succession to the status of a certified electronic document center, in violation of Article 31-14 (3);

    13. A person who fails to notify users of the discontinuance of business of storing electronic documents, etc. or fails to report such fact to the Minister of Science and ICT, in violation of Article 31-15 (1);

    14. A person who fails to transfer or report stored documents, etc., in violation of Article 31-15 (2);

    15. A person who fails to purchase insurance, in violation of Article 31-16 (2);

    16. A person who fails to report the change of facilities or equipment, in violation of Article 31-20;

    17. A person who fails to undergo an inspection, in violation of Article 31-21;

    18. An entity who uses a certified electronic document center or similar in its name, in violation of Article 38 (1);

    19. An entity who uses a certified electronic document intermediary or similar in its name, in violation of Article 38 (2);

    20. A person who uses a certified electronic address or similar, in violation of Article 38 (3).

    (3) Administrative fines under paragraphs (1) and (2) shall be imposed and collected by the Minister of Science and ICT, as prescribed by Presidential Decree. (Amended by Act nº 11690; Mar. 23, 2013, Act nº 14839, Jul. 26, 2017)

    (Article Amended by Act nº 11461, Jun. 1, 2012)

    ADDENDA

    (1) (Enforcement Date) This Act shall enter into force on July 1, 2002.

    (2) (Transitional Measures for Designation of Electronic Commerce Resource Center) Electronic commerce resource centers designated under the former provisions as at the time this Act enters into force, shall be deemed electronic commerce resource centers under Article 30.

    (3) (Relations with other Statutes) Where the former Framework Act on Electronic Commerce or its provisions are cited in other statutes at the time of enforcement of this Act, if there exist any corresponding provisions in this Act, this Act or the corresponding provisions in this Act shall be deemed to have been cited.

    ADDENDA (Act nº 7440, Mar. 31, 2005)

    (1) (Enforcement Date) This Act shall enter into force six months after the date of its promulgation.

    (2) (Transitional Measures for Council on Electronic Commerce Policy) The Council on Electronic Commerce Policy established and composed under the former provisions at the time of enforcement of this Act shall be deemed to be the Committee on Electronic Commerce Policy established and composed under the amended provisions of Article 21.

    (3) (Transitional Measures for Korea Electronic Documents Exchange Committee) The Korea Electronic Documents Exchange Committee established and composed under the former provisions at the time of enforcement of this Act shall be deemed to be the sectional committee on standards of electronic documents of the Committee on Electronic Commerce Policy established and composed under the amended provisions of Article 21 (5).

    ADDENDA (Act nº 7796, Dec. 29, 2005)

    Article 1 (Enforcement Date)

    This Act shall enter into force on July 1, 2006.

    Articles 2 through 6 Omitted.

    ADDENDA (Act nº 7988, Sep. 27, 2006)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 13 Omitted.

    ADDENDA (Act nº 8362, Apr. 11, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 8371, Apr. 11, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 8387, Apr. 27, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 9 Omitted.

    ADDENDUM (Act nº 8461, May 17, 2007)

    This Act shall enter into force six months after the date of its promulgation: Provided, That the amended provisions of Article 5 (2) through (4) shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 8466, May 17, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 5 Omitted.

    ADDENDA (Act nº 8802, Dec. 27, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 8852, Feb. 29, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDUM (Act nº 8932, Mar. 21, 2008)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 8979, Mar. 21, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Articles 2 through 6 Omitted.

    ADDENDUM (Act nº 9246, Dec. 26, 2008)

    This Act shall enter into force on the date of its promulgation.

    ADDENDUM (Act nº 9429, Feb. 6, 2009)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDUM (Act nº 9504, Mar. 18, 2009)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 9705, May 22, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 9708, May 22, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 12 Omitted.

    ADDENDA (Act nº 10220, Mar.31, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force on January 1, 2011.

    Articles 2 through 5 Omitted.

    ADDENDA (Act nº 10250, Apr. 12, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 9 Omitted.

    ADDENDA (Act nº 10629 May 19, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force two months after the date of its promulgation. (Proviso Omitted.)

    Article 2 Omitted.

    ADDENDA (Act nº 10854, Jul. 14, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 and 3 Omitted.

    ADDENDA (Act nº 11461, Jun. 1, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Article 2 (Applicability to Terms of Office of Members of Mediation Committee of Disputes on Electronic Documents or Electronic Transactions)

    The amended provisions of Article 32 (4) shall apply from the first members appointed or commissioned after this Act enters into force.

    Article 3 (Applicability to Mediation of Disputes on Electronic Documents or Electronic Transactions)

    The amended provisions of Articles 33, 34-2, 35 and 36 shall apply from the first application for mediation of a dispute filed after this Act enters into force.

    Article 4 (Transitional Measures concerning Certification of Exemplary Electronic Transaction Business Entities)

    The certification of exemplary electronic transaction business entity obtained under the former provisions as at the time this Act enters into force shall be deemed the certification of exemplary electronic transaction business entity obtained under the amended provisions of Article 18.

    Article 5 (Transitional Measures concerning Basic Policies on Electronic Transactions)

    Basic policies on electronic transactions formulated under the former provisions as at the time this Act enters into force shall be deemed basic polices on electronic documents and electronic transactions formulated under the amended provisions of Article 19.

    Article 6 (Transitional Measures concerning Plans to Facilitate Electronic Transactions)

    A plan to facilitate electronic transactions formulated under the former provisions as at the time this Act enters into force shall be deemed a plan to facilitate electronic documents and electronic transactions formulated under the amended provisions of Article 20.

    Article 7 (Transitional Measures concerning Certified Electronic Document Depositories)

    A corporation designated as a certified electronic document depository under the former provisions before this Act enters into force shall be deemed a certified electronic document center designed under the amended provisions of Article 31-2.

    Article 8 (Transitional Measures concerning Grounds for Disqualification)

    Where any executive officer of a certified electronic document center as at the time this Act enters into force newly falls under grounds for disqualification under the amended provision of subparagraph 1 (e) of Article 31-3 due to a ground which arose before this Act enters into force, notwithstanding the said amended provision, the former provision shall apply.

    Article 9 (Transitional Measures concerning Electronic Commerce Dispute Mediation Committee)

    The Electronic Commerce Dispute Mediation Committee established under the former provisions as at the time this Act enters into force shall be deemed the Mediation Committee of Disputes on Electronic Documents and Electronic Transactions established under the amended provisions of Article 32.

    Article 10 Omitted.

    ADDENDA (Act nº 11688, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 Omitted.

    ADDENDA (Act nº 11690, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    (1) This Act shall enter into force on the date of its promulgation.

    (2) Omitted.

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 12781, Oct. 15, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 (Applicability)

    The amended provisions of Article 36-2 shall apply beginning with the first case with respect to which an application for mediation of a dispute is filed after this Act enters into force.

    ADDENDA (Act nº 12875, Dec. 30, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 (Transitional Measures concerning Disqualification of Incompetent Persons, etc.)

    Notwithstanding the amended provisons of the subparagraph 1 (a) of Article 31-3, former provisons shall apply to the person who has already been declared as incompetent or quasi-incompetent by a court at the times when such amended provisons enter into force and for whom the effectiveness of the declaration of incompetence or quasi-competence is maintained in accordance with Article 2 of Addenda to the Civil Act partially amended by Act nº 10429.

    ADDENDA (Act nº 13347, Jun. 22, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Notification of Illegal Acts and Other Related Matters)

    The amended provisions of Article 33-2 shall apply with the first dispute mediation for which an application is filed in accordance with Article 33 after this Act enters into force.

    Article 3 (Transitional Measures concerning Transfer of Duties)

    Any acts conducted by or toward the National Information Technology (IT) Industry Promotion Agency, duties regarding which are transferred to an exclusively responsible agency designated by the Ministry of Science, Information and Communications Technology (ICT) and Future Planning in accordance with the amended provisions of Article 22 (1), shall be deemed conducted by or toward the relevant exclusively responsible agency.

    ADDENDUM (Act nº 13587, Dec. 22, 2015)

    This Act shall enter into force on the date of its promulgation.

    ADDENDUM (Act nº 13768, Jan. 19, 2016)

    This Act shall enter into force on February 4, 2016.

    ADDENDA (Act nº 14839, Jul. 26, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Provso Omitted.)

    Articles 2 through 6 Omitted.

    ADDENDUM (Act nº 14907, Oct. 24, 2017)

    This Act shall enter into force six months after the date of its promulgation.

    11Nov/21

    Act. nº 6687, March 30, 2002. Consumer Protection Act on Electronic Transaction, Mar. 30, 2002

    Act. nº 6687, March 30, 2002. Consumer Protection Act on Electronic Transaction, Mar. 30, 2002 (Amended by Act nº 7315, Dec. 31, 2004; Act nº 7344, Jan. 27, 2005; Act nº 7487, Mar. 31, 2005; Act nº 8538, Jul. 19, 2007; Act nº 8635, Aug. 3, 2007; Act nº 10172, Mar. 22, 2010; Act nº 10303, May 17, 2010; Act nº 11326, Feb. 17, 2012; Act nº 11461, jun. 1, 2012).

    ACT ON THE CONSUMER PROTECTION IN ELECTRONIC COMMERCE, ETC.

    Article 1 (Purpose)

    The purpose of this Act is to protect the rights and interests of consumers by prescribing matters relating to the fair trade of goods or services by means of electronic commerce transaction, mail order, etc. and to contribute to the sound development of national economy by enhancing market confidence.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 2 (Definitions)

    The definitions of terms used in this Act shall be as follows: (Amended by Act nº 11461, Jun. 1, 2012)

    1. The term “electronic commerce transaction” means conducting commercial activities by means of electronic commerce (referring to the electronic commerce as defined in subparagraph 5 of Article 2 of the Framework Act on Electronic Documents and Transactions; hereinafter the same shall apply);

    2. The term “mail order” means providing information on the sale of goods or services (including the right to use a specific facility or to be provided with services; hereinafter the same shall apply) by means of mail, telecommunications or other methods prescribed by Ordinance of the Prime Minister and selling goods or services (hereinafter referred to as “goods, etc.”) after receiving a consumer’s order: Provided, That sale by telemarketing as defined in subparagraph 3 of Article 2 of the Door-to-Door Sales, etc. Act shall be excluded from the scope of mail order;

    3. The term “mail order distributor” means a person who conducts sales by mail order as a business, or other person who is engaged in the mail order business in accordance with a contract with the former;

    4. The term “mail order brokerage” means the act of intermediating mail order between both parties to a transaction by allowing the use of a cybermall (referring to a virtual shopping mall established to transact goods, etc. by using computers, etc. and information communications facilities; hereinafter the same shall apply), or by other methods prescribed by Ordinance of the Prime Minister;

    5. The term “consumer” means any of the following persons:

    (a) A person who consumes (including using; hereinafter the same shall apply) goods, etc. supplied by the business operators for everyday consumption;

    (b) A person prescribed by Presidential Decree, who is not the one provided for in item (a) but conducts transactions virtually on the same standing and conditions as the one provided for in item (a);

    6. The term “business operator” means a person who manufactures (including processing or packaging; hereinafter the same shall apply), imports, or sells goods or provides services.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 3 (Exclusion of Application)

    (1) The provisions of this Act shall not apply to any transaction in which a business operator (excluding a multi-level salesman as defined in subparagraph 6 of Article 2 of the Door-to-Door Sales, etc. Act; hereafter the same shall apply in this paragraph) buys for the purpose of commercial activity: Provided, That this shall not apply where the transaction is actually conducted under the same terms of transaction as other consumers in the capacity of consumer despite being a business operator.

    (2) The provisions relating to the duty to deliver documents (including electronic documents; hereinafter the same shall apply) on the contents of the contract pursuant to Article 13 (2) shall not apply to the following transactions: Provided, That in the case falling under subparagraph 1, the contents or the methods of delivery of the documents on the contents of contract may be made differently, as prescribed by Ordinance of the Prime Minister:

    1. Transactions that the consumers conduct at any time in accordance with the already familiar terms and conditions, or standard methods of transaction, which are prescribed by Ordinance of the Prime Minister;

    2. Transactions stipulated in other Acts (excluding the Civil Act and the Door-to-Door Sales, etc. Act) that the duty, etc. to deliver a contract document shall be fulfilled by a method different from the ones provided for in this Act.

    (3) Articles 13 through 15 and 17 through 19 shall not apply to a mail order distributor conducting the mail order brokerage between persons, other than mail order distributors.

    (4) Articles 12 through 15, 17 through 20, and 20-2 shall not apply to the transactions of securities by investment traders and investment brokers under the Financial Investment Services and Capital Markets Act, transactions of financial instruments by financial companies, etc. prescribed by Presidential Decree, and transactions for sale of daily necessities, food, beverage, etc. in the neighborhood.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 4 (Relations with other Acts)

    Where this Act and other Acts are conflicting with each other in the consumer protection in the electronic commerce transactions or mail orders, this Act shall apply in preference: Provided, That where the application of other Acts is advantageous to consumers, such Acts shall apply.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    CHAPTER II.- ELECTRONIC COMMERCE TRANSACTIONS AND MAIL ORDERS

    Article 5 (Utilization of Electronic Documents)

    (1) Notwithstanding Article 6 (2) 2 of the Framework Act on Electronic Documents and Transactions, where a business operator fails to send an electronic document (referring to the electronic message as defined in subparagraph 1 of Article 2 of the Framework Act on Electronic Documents and Transactions; hereinafter the same shall apply) to the address (referring to the data processing system as defined in subparagraph 2 of Article 2 of the Framework Act on Electronic Documents and Transactions) designated beforehand in the agreement to make a transaction by means of electronic document), the business operator shall not assert his/her right out of such electronic document: Provided, That this shall not apply to cases prescribed by Presidential Decree, such as where it is of great urgency, the consumer also already anticipates the transaction shall be made by an electronic document, or the consumer has already printed the electronic document. (Amended by Act nº 11461, Jun. 1, 2012)

    (2) Where a business operator intends to use an electronic document with a digital signature (referring to the digital signature as defined in subparagraph 2 of Article 2 of the Digital Signature Act; hereinafter the same shall apply), he/she shall notify the consumer of the validity, procedures and methods necessary for receipt, etc. of the relevant electronic document, as prescribed by Presidential Decree.

    (3) In using electronic documents, a business operator shall neither compel (including de facto compulsion of any specific digital signature due to employment of special standards, etc.) the consumer to use a specific method of digital signature, and nor unreasonably limit the use of a certain method of digital signature chosen by the consumer.

    (4) Where a business operator who conducts electronic commerce transactions makes it possible for a consumer to join a membership, to subscribe for a contract, or to provide information related to the consumer, etc. through an electronic document, he/she shall also make it possible to withdraw a membership, cancel an order, terminate, revoke or change a contract, or withdraw consent to the provision and use of information, etc. through an electronic document.

    (5) If a business operator who conducts electronic commerce transactions is requested by a consumer to provide confirmation or certification concerning the transaction of goods, etc. through an electronic document, he/she shall comply with such request.

    (6) Paragraphs (4) and (5) shall not apply where a business operator who conducts electronic commerce transactions notifies consumers beforehand of the difficulty of providing electronic documents due to any apparent technical or security reason.

    (7) When a business operator who conducts electronic commerce transactions fulfills the obligations under paragraphs (4) and (5), business operators who are related to the establishment and operation of the relevant cybermall shall cooperate with him/her by taking measures for fulfilling such obligations or other necessary measures therefor.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 6 (Preservation, etc. of Transaction Records)

    (1) A business operator shall preserve the records on transactions, such as marks, advertisements in the electronic commerce transactions and mail orders, contents of contracts and execution thereof, for a substantial period of time. In such cases, an easy way of perusal and maintenance for consumers shall be provided.

    (2) Notwithstanding the provisions of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. and other Acts related to the protection of personal information prescribed by Presidential Decree, a business operator may preserve the transaction records that he/she is liable to preserve under paragraph (1), and personal information (limited to the information to identify the subject of a transaction, such as name, address and resident registration number) relating thereto, even if the consumer withdraws consent to the use of personal information.

    (3) Necessary matters regarding the object, scope, and period of transaction records to be preserved by a business operator under paragraph (1) and methods of perusal and maintenance made available to consumers shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 7 (Prevention of Errors in Manipulation, etc.)

    A business operator shall prepare procedures necessary for the confirmation and correction of contents, before the time of imposition of transaction amount or the placement of an order by a consumer, in order to prevent damage caused by discrepancies, etc. in the declaration of will due to consumer’s error in manipulation, etc. in the electronic commerce transaction.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 8 (Securing Confidence in Electronic Payment)

    (1) Where a business operator uses an electronic means prescribed by Presidential Decree in the payment of transaction amount (hereinafter referred to as “electronic payment“), the persons related with the electronic payment who are prescribed by Presidential Decree, such as the business operator, issuer of means of electronic settlement and provider of electronic settlement service (hereinafter referred to as “electronic settlement business operator, etc.”) shall take measures necessary for maintaining security of the relevant information.

    (2) Where an electronic payment is made, the business operator, electronic settlement business operator, etc. shall clearly notify the following matters to confirm whether the consumer’s intent of subscription is the declaration of his/her true will and shall prepare procedures for the consumer to confirm the notified matters, as prescribed by Presidential Decree:

    1. Contents and kind of goods, etc.;

    2. Prices of goods, etc.;

    3. Service period.

    (3) Where an electronic payment is made, the business operator, electronic payment business operator, etc. shall notify the consumer of such fact by a method prescribed by Ordinance of the Prime Minister, such as transmission of an electronic document, and make the consumer’s perusal of data on the electronic payment available at any time.

    (4) An issuer of the means of settlement by way of making advance payment of the price for the purchase or use of goods, etc. as means of electronic payment used in a cybermall shall indicate or announce matters regarding the confirmation of confidence of such means of payment, restriction on the use, or other matters that require attention, as prescribed by Ordinance of the Prime Minister.

    (5) Where a dispute between a business operator and a consumer arises on the electronic settlement, the electronic settlement business operator, etc. shall cooperate with the settlement of such dispute by allowing the perusal, etc. of the information regarding payment, as prescribed by Presidential Decree.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 9 (Cooperation of Delivery Business Operators, etc.)

    (1) A business operator who conducts delivery (including electronic transmission through the information communications network (hereinafter referred to as “information communications network“) pursuant to Article 2 (1) 1 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.) of goods, etc. consequent upon electronic commerce transaction or mail order, shall cooperate in the settlement of dispute, as prescribed by Presidential Decree, if a dispute arises out of an accident or obstruction, etc. of delivery.

    (2) Where a person who provides hosting services (referring to the services for the establishment of cybermalls, management of servers, etc. for business operators to conduct electronic commerce transactions; hereafter the same shall apply in this Article) concludes a contract for the use of hosting services with a business operator, he/she shall take measures for confirming the personal identity of the business operator.

    (3) Where any dispute arises between a business operator and a consumer, a person who provides hosting services shall, upon request of any of the following persons, shall cooperate for the settlement of such disputes by providing the data prescribed by Presidential Decree, such as personal identification information of the business operator:

    1. The Fair Trade Commission;

    2. Any of the Special Metropolitan City Mayor, Metropolitan City Mayors, Do Governors or the Governor of a Special Self-Governing Province (hereinafter referred to as “Mayor/Do Governor“) or the head of a Si/Gun or Gu (referring to the head of an autonomous Gu; hereinafter the same shall apply);

    3.  An investigation agency;

    4. The consumer who is a party to the dispute;

    5. Other entities prescribed by Presidential Decree as necessary for settlement of dispute.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 10 (Operation of Cybermalls)

    (1) The operator of a cybermall conducting the electronic commerce transaction shall indicate the following matters, as prescribed by Ordinance of the Prime Minister, so that consumers can easily identify the business operator’s identity, etc.:

    1. Trade name and name of the representative;

    2. Address of the location of the business place (including the address where consumer’s complaint can be settled);

    3. Telephone number and e-mail address;

    4. Business registration number;

    5. Contractual terms and conditions of service of the cybermall;

    6. Other matters prescribed by Presidential Decree as necessary for consumer protection.

    (2) The operator of a cybermall provided for in paragraph (1) shall cooperate in the measures necessary for correction in the part where the operator should take measures, if any violation of this Act is committed in the cybermall.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 11 (Utilization, etc. of Information on Consumers)

    (1) When a business operator collects or utilizes information (including provision of such information to a third party; hereinafter the same shall apply) on consumers for an electronic commerce transaction or mail order, he/she shall fairly collect or utilize it pursuant to the relevant provisions, such as the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.

    (2) Where property damage occurs to consumers or any special grounds exist for the possibility of occurrence of such damage due to fraudulent use of information on consumers in the transaction of goods, etc., the relevant business operator shall take necessary measures prescribed by Presidential Decree, such as verification of the person himself/herself or recovery from damage.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 12 (Reporting, etc. by Mail Order Distributors)

    (1) A mail order distributor shall file a report on each of the following matters to the Fair Trade Commission, a Special Metropolitan City Mayor, or the head of a Si/Gun/Gu, as prescribed by Presidential Decree: Provided, That this shall not apply where the frequency, scale, etc. of mail order transactions falls below the criteria determined by the Fair Trade Commission in a public notification:

    1. Trade name (including the name and resident registration number of the representative in the case of a corporation), address, and telephone number;

    2. E-mail address, Internet domain name, and location of host server computers;

    3. Other matters prescribed by Presidential Decree as necessary for the verification of identity of the business operator.

    (2) Where a mail order distributor intends to modify the matters reported pursuant to paragraph (1), he/she shall report thereon, as prescribed by Presidential Decree.

    (3) When a mail order distributor who has filed a report pursuant to paragraph (1) suspends or closes his/her business, or resumes his/her business after suspension, he/she shall report thereon, as prescribed by Presidential Decree.

    (4) The Fair Trade Commission may make public the information on the mail order distributor who has filed a report pursuant to paragraph (1), as prescribed by Presidential Decree.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 13 (Provision of Information on Identity and Terms of Transaction)

    (1) In placing indications or advertisements to take orders for transaction of goods, etc., a mail order distributor shall include therein each of the following matters:

    1. Trade name and name of the representative;

    2. Address, telephone number and e-mail address;

    3. Matters by which the fact of reporting can be verified, such as the number of a report filed with the Fair Trade Commission, a Special Metropolitan City Mayor, or the head of a Si/Gun/Gu under Article 12 and the name of the agency which has accepted such report.

    (2) A mail order distributor shall indicate, advertise, or notify the following matters in an appropriate manner so that the consumers can understand the terms of transaction of goods, etc. accurately before concluding a contract and make such a deal without any error or discrepancy, and, if the contract is concluded, issue documents stating the following matters regarding the contents of such contract to the other party of the contract before supplying the goods, etc.: Provided, That where any ground prescribed by Presidential Decree exists, the documents may be issued to a person who receives the goods, etc. in lieu of the other party to the contract to the extent that does not infringe upon the rights of the latter:

    1. Trade names of the supplier and seller of the goods, and names, addresses, telephone numbers, etc. of representatives thereof;

    2. Name, kind and contents of the goods, etc.;

    2-2. Matters concerning the information on the goods, etc. In such cases, the description marked on the product may substitute the written description on the contents of contract;

    3. Price (where the price is not decided, detailed method of decision thereof) of the goods, etc., method of payment and time to make payment;

    4. Method and date of supply of the goods, etc.;

    5. Matters regarding the time limit, method of excercise, and effect, of cancellation of an order or revocation of a contract (hereinafter referred to as “cancellation, etc. of an order“) (including forms necessary for exercising the right to withdraw an order, etc.);

    6. Exchange, return and guarantee of the goods, etc., terms and procedures of refund thereof, and the payment of the compensation for delay of the refund;

    7. Technical matters necessary for the electrical transmission, installation, etc. of the goods, etc. which can be supplied by means of electronic medium;

    8. Matters concerning handling of compensation to consumers’ damage, settlement of complaint on the goods, etc. and settlement of dispute between consumers and business operators;

    9. Terms and conditions of the transaction (including the ways to verify the details of such terms and conditions);

    10. Fact that the consumer may choose to deposit funds for settling the price of goods, etc. with a third party prescribed by Presidential Decree until he/she is supplied with the goods, etc. (hereinafter referred to as “escrow system“) or to require the mail order distributor to conclude a contract, etc. of consumer damage compensation insurance under Article 24 (1) for the purpose of securing the safety of purchase (limited only to the prepaid mail order under Article 15 (1) and excluding a transaction falling under any subparagraph of Article 24 (3));

    11. Other terms of transaction that may affect the consumer’s decision on the purchase or other matters prescribed by Presidential Decree as necessary for the relief of damage to consumer.

    (3) When a mail order distributor concludes a contract on the transaction of goods, etc. with a minor, he/she shall inform the minor of the fact that if his/her legal representative does not agree to the contract, the minor himself/herself or his/her legal representative can cancel the contract.

    (4) The Fair Trade Commission may determine and publicly notify the matters concerning the trade name, etc. of mail order distributors under paragraphs (1) and (2), the matters concerning the information on goods, etc. and contents and methods of indication, advertisement and announcement of the terms of transaction. In such cases, methods of indication, advertisement and announcement may be determined differently in consideration of the method of transaction or the characteristics of the goods, etc.

    (5) A mail order distributor shall execute conscientiously with honor the terms of transaction indicated, advertised, or announced to the consumers pursuant to paragraph (2).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 14 (Confirmation, etc. of Orders)

    (1) A mail order distributor shall promptly notify the consumer of the information regarding the confirmation of receipt of the declaration of will of order, and possibility of sale, if he/she takes an order from a consumer regarding the transaction of goods, etc.

    (2) A mail order distributor shall have the adequate procedures that enable consumers to confirm, correct or cancel the contents of order before concluding a contract.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 15 (Supply, etc. of Goods, etc.)

    (1) A mail order distributor shall take measures necessary for the supply of goods, etc. within seven days from the day the consumer orders, and, in the case of a mail order for which the consumer pays all or part of the price of such goods, etc. before being supplied with them (hereinafter referred to as “prepaid mail order“), he/she shall take measures necessary for the supply of the goods, etc. within three business days from the day the consumer pays all or part of the price: Provided, That this shall not apply where there is a separate agreement upon the supply timing of goods, etc. between the consumer and the mail order distributor.

    (2) When finding difficulties in the supply of ordered goods, etc., a mail order distributor shall inform the consumer of the reason without delay, and, in the case of a prepaid mail order, refund the price or take the measures necessary for refund within three business days from the day the consumer pays all or part of the price.

    (3) A mail order distributor shall take adequate measures so that consumers can confirm the supply procedure of goods, etc. and the processing status. In such cases, the Fair Trade Commission may determine and publicly notify matters necessary for such measures.

    (4) Article 18 (1) through (5) shall apply mutatis mutandis to refunding or taking necessary measures for refund in the prepaid mail order under paragraph (2).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 16 Deleted (By act nº 7487, Mar. 31, 2005)

    Article 17 (Cancellation, etc. of Orders)

    (1) A consumer who has concluded a contract with a mail order distributor on the purchase of goods, etc. may cancel, etc. the order relating to the relevant contract within the period provided for in the following subparagraphs (referring to the period agreed by the parties to a transaction, if it exceeds the period prescribed in the following subparagraphs):

    1. Seven days from the day a document on the contents of the contract provided for in Article 13 (2) was received: Provided, That where the supply of the goods, etc. has been performed later than the delivery of document, seven days from the day the goods, etc. have been supplied, or the supply of the goods, etc. has begun;

    2. Where a document on the contents of a contract provided for in Article 13 (2) has not been handed over, a document not stating the address, etc. of the mail order distributor has been received, or the cancellation, etc. of order cannot be made within the period of subparagraph 1 due to the change of address of the mail order distributor or other reasons, seven days from the day he/she knew or he/she could have known the address.

    (2) In any of the following cases, no consumer is entitled to cancel the order, etc. under paragraph (1) contrary to the will of a mail order distributor: Provided, That when the mail order distributor fails to take the measures under paragraph (6), the consumer may cancel the order, etc. even in cases falling under subparagraphs 2 through 4:

    1. Where the goods, etc. have been destroyed or damaged due to a cause attributable to the consumer: Provided, That this shall not apply where the package, etc. has been damaged to confirm the contents of the goods, etc.;

    2. Where the value of the goods, etc. has substantially decreased due to a cause attributable to the consumer;

    3. Where the value of the goods, etc. has substantially decreased as to cause difficulty in resale due to the elapse of time;

    4. Where the package of the reproducible goods, etc. has been destroyed;

    5. Other cases prescribed by Presidential Decree for the safety of the transaction.

    (3) Notwithstanding paragraphs (1) and (2), where the contents of the goods, etc. are different from the contents of indication or advertisement, or have been performed contrary to the contents of the contract, the consumer may cancel the order, etc. within three months from the day the goods, etc. have been supplied, or within 30 days from the day he/she knew or could have known the fact.

    (4) Where the cancellation, etc. of order pursuant to paragraph (1) or (3) are made in writing, the declaration of will shall come into force on the day the document bearing the declaration of will was sent.

    (5) In applying paragraphs (1) through (3), if a dispute arises as to whether the consumer is responsible for the damage to the goods, etc., whether and when the contract on the purchase of the goods, etc. was signed, and whether and when the goods, etc. were supplied, the mail order distributor shall testify it.

    (6) In the case of the goods, etc. that are impossible to cancel the order thereof under paragraphs (2) 2 through 4, a mail order distributor shall employ the methods, such as writing expressly the fact on the package of the goods, etc. or a place where the consumer can easily recognize, or supplying test goods, or other methods, and take necessary measures not to encumber the exercise of right to cancel, etc. the order.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 18 (Effect of Cancellation, etc. of Orders)

    (1) Where a consumer has performed the cancellation, etc. of an order pursuant to Article 17 (1) or (3), he/she shall return goods, etc. already supplied to him/her.

    (2) A mail order distributor (including a person who has been paid the price of goods, etc., or a person who has concluded a contract on mail order with a consumer; hereafter in paragraphs (2) through (10), the same shall apply) shall refund the price of goods, etc., which was already paid, within three business days from the date he/she has received the returned goods, etc. In such cases, if the mail order distributor delays the refund of the price of the goods, etc. to the consumer, the mail order distributor shall pay interest on delay calculated by multiplying a delayed period by the interest rate prescribed by Presidential Decree within 40 percentage per annum (hereinafter referred to as “compensation for delay“), taking into consideration an overdue interest rate applied by banks under the Banking Act and economic situation.

    (3) In refunding the price of goods, etc. pursuant to paragraphs (1) and (2), when a consumer has paid the price of goods, etc. with a credit card as defined in subparagraph 3 of Article 2 of the Specialized Credit Finance Business Act, or other means of settlement prescribed by Presidential Decree, a mail order distributor shall promptly request a business operator who has supplied the relevant means of settlement (hereinafter referred to as “settlement business operator“) to stop or cancel the request for the price of the goods, etc.: Provided, That if the mail order distributor has already received the price of the goods, etc. from the settlement business operator, he/she shall promptly refund it to the settlement business operator, and notify the consumer of this fact.

    (4) A settlement business operator who has received the refund of the price of goods, etc. pursuant to the proviso to paragraph (3) shall promptly refund it to a relevant consumer or take measures necessary to refund.

    (5) A mail order distributor who falls under the proviso to paragraph (3) and who had a consumer pay a price due to a delayed refund, shall pay compensation for delay for the delayed period to the consumer.

    (6) Notwithstanding the proviso to paragraph (3), where a mail order distributor fails to refund a price to a settlement business operator without any justifiable ground, a consumer may request the settlement business operator to offset the amount to be refunded by other debt he/she owes to the relevant mail order distributor. In such cases, the settlement business operator may offset by other debt that he/she owes to the relevant mail order distributor, as prescribed by Presidential Decree.

    (7) Where a settlement business operator delays an offset under paragraph (6) without any justifiable ground, the consumer may refuse to settle the price to the settlement business operator. In such cases, neither mail order distributor nor the settlement business operator shall do any act that gives disadvantage to the consumer, such as dealing the relevant consumer as a person who fails to fulfill his/her obligation within an agreed period because of the refusal of such settlement.

    (8) In cases falling under paragraph (1) where goods, etc. have already been partially used or consumed, a mail order distributor may request a consumer to pay the amount within the extent prescribed by Presidential Decree equivalent to the profit the consumer gained by use or consumption of part of the goods, etc., or equivalent to the expense incurred in the supply of the goods, etc.

    (9) In cases of cancellation, etc. of an order under Article 17 (1), the expense incurred in returning supplied goods, etc. shall be borne by a consumer and a mail order distributor shall not request the consumer either the penalty for breach of contract, or compensation for damage.

    (10) In cases of cancellation, etc. of an order under Article 17 (3), the expense incurred in returning goods, etc. shall be borne by a mail order distributor.

    (11) Where a mail order distributor, a person who has been paid the price of goods, etc., or a person who has concluded into a contract on a mail order with a consumer is not the same person, each one shall be liable jointly and severally to the fulfillment of obligation relating to the refund of the price of the goods, etc. pursuant to paragraphs (1) through (7) consequent upon the cancellation, etc. of an order pursuant to Article 17 (1) and (3).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 19 (Restriction, etc. on Amount of Compensation for Damage)

    (1) Where a contract on the sale of goods, etc. is cancelled due to a cause attributable to the consumer, the compensation for damage the mail order distributor claims against the consumer shall not exceed the amount computed by adding the compensation for delay following the nonpayment of price to the amount classified in the following:

    1. Where the supplied goods, etc. are returned: The amount whichever is bigger between the following items:

    (a) The usual rental fee of the returned goods, etc. or the amount equivalent to the usual benefit from the use of them;

    (b) The amount computed by subtracting the price of the returned goods, etc. at the time of return from the selling price of the goods, etc.;

    2. Where the supplied goods, etc. are not returned: The amount equivalent to the selling price of the goods, etc.

    (2) In order to smoothly resolve disputes following the claim on the compensation for damage between mail order distributors and consumers, the Fair Trade Commission may, if necessary, determine and publicly notify the standards to calculate the compensation amount for damage pursuant to paragraph (1).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 20 (Announcement, Provision of Information, etc. by Mail Order Brokers)

    (1) Each mail order broker shall announce beforehand the fact that he/she is not a party to the mail order, in the manner prescribed by Ordinance of the Prime Minister for consumers to easily recognize it.

    (2) If a person who has requested the mail order brokerage (hereinafter referred to as “requester of mail order brokerage“) is a business operator, a mail order broker who is a mail order distributor shall confirm the name (where the business operator is a corporation, the name thereof and the name of its representative), address, telephone number and other matters prescribed by Presidential Decree, and provide them to consumers before concluding an order, and if a requester of mail order brokerage is not a business operator, he/she shall confirm the name, telephone number and other matters prescribed by Presidential Decree and provide each party to the transaction with the method to inspect the information on the other party.

    (3) In order to resolve complaints or disputes occurring from the use of cybermalls, etc., a mail order broker shall find out the cause thereof, comprehend damage and take other necessary measures promptly. Detailed contents and method, etc. of measures to be taken in such cases shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 20-2 (Responsibility of Mail Order Brokers and Requesters of Mail Order Brokerage)

    (1) Where a mail order broker fails to make an announcement under Article 20 (1), he/she shall be jointly responsible with the requester of mail order brokerage for the compensation for the damage caused intentionally or negligently by the latter to the consumer’s property.

    (2) A mail order broker shall be jointly responsible with the requester of mail order brokerage for the compensation for the damage caused to the consumer’s property by failing to provide information or a method to inspect information under Article 20 (2), or by providing untruthful information: Provided, That this shall not apply where he/she has paid due attention to prevent any damage to the consumers.

    (3) Notwithstanding an announcement made under Article 20 (1), no mail order broker who is a mail order distributor shall be exempted from the responsibilities of a mail order distributor provided for in Articles 12 through 15, 17 and 18: Provided, That in conducting mail order brokerage on the mail order distributor’s request, the requester shall be responsible for the part agreed and announced to the consumer that the requester shall take the responsibility for such part.

    (4) No requester of mail order brokerage (limited to business operators) shall be exempted from the damage caused intentionally or negligently by a mail order broker to the consumer’s property on the ground that the act has been done by the latter: Provided, That this shall not apply where he/she has paid due attention to prevent any damage to the consumers.

    (Article Inserted by Act nº 11326, Feb. 17, 2012)

    Article 21 (Prohibited Acts)

    (1) Neither a business operator who conducts electronic commerce transactions nor a mail order distributor shall do any of the following acts:

    1. Inducing or making a deal with consumers or interfering with cancellation, etc. of orders or termination of contracts by telling falsehood or exaggerated fact or using deceptive methods;

    2. Changing or closing the address, telephone number, Internet domain name, etc. with the purpose of interfering with cancellation, etc. of orders;

    3. Neglecting deficiency of human resources needed to resolve disputes or complaints, or lack of facilities as it stands for a considerable time, thereby inflicting damage on consumers;

    4. Unilaterally supplying the goods, etc. without the consumer’s order and requesting the price thereof, or requesting only the price of the goods, etc. without supplying the goods, etc.;

    5. Enforcing the consumer to buy goods or to receive services through telephone, facsimile, computer communications, electronic mail, etc. even though the consumer made clear that he/she had no intention to buy the goods or receive the services;

    6. Using the information on a consumer without obtaining consent from the relevant person, or beyond the extent of such consent: Provided, That any of the following cases shall be excluded:

    (a) Cases prescribed by Presidential Decree as inevitable for the execution of the contract with the consumer, such as delivery of the goods, etc.;

    (b) Cases where such act is necessary for the settlement of accounts following the transaction of the goods, etc.;

    (c) Cases prescribed by Presidential Decree as necessary for the confirmation of the person himself/herself to prevent any illegal use;

    (d) Cases where any inevitable causes provided for in the provisions of the Act or in any Act exist;

    7. Making computer programs, etc. installed without the consumer’s consent or without explanation and announcement to the consumers in an easy and distinctive way in accordance with the method prescribed by Ordinance of the Prime Minister.

    (2) To prevent violations of this Act and damage to consumers, the Fair Trade Commission may determine and publicly notify the standards that the business operators of electronic commerce transaction or mail order distributor should observe.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 22 (Execution, etc. of Affairs Related to Cancellation, etc. of Orders during Closure, etc. of Business)

    (1) A mail order distributor shall continue the business of cancellation, etc. of orders under Article 17 (1) and (3), and the business related to the refund of price following the cancellation, etc. of order under Article 18 (1) through (5) even during closure or suspension of business.

    (2) Where a mail order distributor is deemed unable to practically continue business due to being declared bankrupt, etc. without reporting the closure of business, the Fair Trade Commission or the Governor of a Special Self-Governing Province or the head of a Si/Gun/Gu who has accepted reports filed under Article 12 (1) may cancel the reported matters ex officio.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    CHAPTER III.- PROTECTION OF CONSUMERS’ RIGHTS AND INTERESTS

    Article 23 (Formulation, etc. of Consumer Protection Guidelines in Electronic Commerce Transactions, etc.)

    (1) The Fair Trade Commission may hear the opinions of the parties to transactions, agencies and organizations of the related fields, and formulate guidelines (hereinafter referred to as “consumer protection guidelines“) to induce the spontaneous observance of business operator for the sound transaction order and consumer protection in the execution of electronic commerce transactions or mail orders.

    (2) Where the terms and conditions of a contract that the business operator employs are more disadvantageous to the consumers than the contents of consumer protection guidelines, the business operator shall indicate or announce the terms and conditions of the contract formulated differently from the consumer protection guidelines so that the consumers can easily recognize them.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 24 (Contracts, etc. of Consumer Damage Compensation Insurance)

    (1) The Fair Trade Commission may encourage the related business operators to conclude any of the following contracts (hereinafter referred to as “contract, etc. of consumer damage compensation insurance“) for the purpose of consumer protection in the electronic commerce transaction or mail order: Provided, That the issuer of settlement referred to in Article 8 (4) shall conclude a contract, etc. of consumer damage compensation insurance:

    1. An insurance contract under the Insurance Business Act;

    2. A contract of guarantee for payment against debt with the institution under Article 38 of the Act on the Establishment, etc. of Financial Services Commission to secure payment of consumer damage compensation;

    3. A mutual aid contract with the mutual aid association established pursuant to paragraph (10).

    (2) Notwithstanding paragraph (1), where a consumer chooses to use the escrow system under Article 13 (2) 10 or requires the mail order distributor to conclude a contract, etc. of consumer damage compensation insurance with respect to a prepaid mail order, the mail order distributor shall allow the consumer to use such system or conclude the contract, etc. of consumer damage compensation insurance.

    (3) Paragraph (2) shall not apply where a consumer performs any of the following transactions:

    1. A transaction of buying goods, etc. the price of which does not exceed the amount prescribed by Presidential Decree within the limit of 100,000 won;

    2. A transaction of paying the price of goods, etc. by using a credit card as defined in subparagraph 3 of Article 2 of the Specialized Credit Finance Business Act. In such cases, if a consumer fails to receive the goods, etc., the credit card company as defined in subparagraph 2-2 of Article 2 of the Specialized Credit Finance Business Act shall cooperate for the prevention and recovery of damage to the consumer, such as cancellation of the settlement of purchase price;

    3. A transaction of buying goods, etc. which are sent through information and communications networks or the forwarding of which is not confirmable by a third party referred to in Article 13 (2) 10;

    4. A transaction of buying goods, etc. supplied by installments for a certain period of time;

    5. Other transactions determined and publicly notified by the Fair Trade Commission as not requiring the escrow system or the conclusion of a contract, etc. of consumer damage compensation insurance or as having difficulty in the utilization of such escrow system or the conclusion of such contract because the safety of purchase is firmly secured by any other Act or there exists any other cause similar to those provided for in subparagraphs 1 through 4.

    (4) Matters necessary for the use of the escrow system or the conclusion of a contract, etc. of consumer damage compensation insurance under paragraph (2) shall be prescribed by Presidential Decree.

    (5) A contract, etc. of consumer damage compensation insurance shall reach an adequate level for the compensation of damage to consumers following any violation of this Act, or for securing the confidence of issuer of settlement means under Article 8 (4). In such cases, the detailed standards thereof shall be prescribed by Presidential Decree.

    (6) A person who is responsible to pay the consumer damage compensation pursuant to the contract, etc. of consumer damage compensation insurance shall pay it without delay when a cause of payment arises, and, if he/she delays the payment, he/she shall pay the compensation for delay.

    (7) A business operator who intends to conclude a contract, etc. of consumer damage compensation insurance shall not submit false data in submitting data on sales amount, etc. to conclude a contract, etc. of consumer damage compensation insurance.

    (8) A business operator who has concluded a contract, etc. of consumer damage compensation insurance under paragraph (1) may use a mark indicating the fact, but the business operator who has not concluded such contract, etc. shall not use a mark as provided for in the former part, or make or use any other similar mark.

    (9) Paragraph (8) shall apply mutatis mutandis to the use of the escrow system under paragraph (2).

    (10) Business operators who conduct the electronic commerce transaction or the mail order distributors may establish a mutual aid association to protect consumers pursuant to paragraph (1). In such cases, Article 35 of the Door-to-Door Sales, etc. Act shall apply mutatis mutandis to the establishment and operation of the mutual aid association on condition that, in Article 35 (1) of the said Act, “business operators” who have filed the report under Article 5 or had each of their business registered under Article 13 shall be construed as “business operators who conduct the electronic commerce transaction or the mail order distributors” and “Article 34 (1) 3“, “Article 24 (1) 3 of the Act on the Consumer Protection in Electronic Commerce, Etc.”, and, in Article 35 (9) and (10) of the Door-to-Door Sales, etc. Act, “this Act” shall be construed as “the Act on the Consumer Protection in Electronic Commerce, Etc.”, respectively.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 24-2 (Matters to be Observed, etc. When Sending Commercial Advertisements)

    (1) When a business operator or a mail order distributor does an act to solicit for the purchase of goods or being provided with services by means of telephone, facsimile, electronic mail, etc. (hereinafter referred to as “spam messages“), he/she shall comply with this Act and the provisions of related Acts, such as the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.

    (2) In order to take corrective measures against a business operator conducting electronic commerce transactions or a mail order distributor who has sent spam messages in violation of paragraph (1), the Fair Trade Commission may request the Korea Communications Commission or other related agency to provide the identification information of the violator. In such cases, the request for identification information shall be allowed only where it is difficult for the Fair Trade Commission to secure the identification information of the violator, and the Korea Communications Commission or other related agency may provide the identification information of the violator to the Fair Trade Commission, notwithstanding Article 64-2 (1) of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 25 (Assistance to Consumer Organizations on Electronic Commerce Transactions, etc.)

    The Fair Trade Commission may, within budgetary limits, assist the agencies or organizations executing the business for the establishment of fair trade order and protection of consumers’ rights and interests in the electronic commerce transactions and mail orders.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    CHAPTER IV.- INSPECTION AND SUPERVISION

     Article 26 (Inspection, etc. Of Violations)

    (1) When the Fair Trade Commission, a Mayor/Do Governor or the head of a Si/Gun/Gu acknowledges the fact that a violation of this Act exists, it or he/she may conduct necessary inspections ex onduc.

    (2) Where a Mayor/Do Governor or the head of a Si/Gun/Gu intends to onducta n inspection pursuant to paragraph (1), in the case of the Mayor/Do Governor, such intention shall be notified to the Fair Trade Commission, and in the case of the head of a Si/Gun/Gu, such intention shall be notified to the Fair Trade Commission and the relevant Mayor/Do Governor in advance of such intention, and where the inspection, etc. Is likely to be overlapped, the Fair Trade Commission may request the Mayor/Do Governor or the head of a Si/Gun/Gu to stop such inspection. In such cases, the Mayor/Do Governor or the head of a Si/Gun/Gu who is requested to stop the inspection shall stop it unless any reasonable ground exists.

    (3) Where the Fair Trade Commission, a Mayor/Do Governor or the head of a Si/Gun/Gu has conducted an inspection pursuant to paragraph (1) or (2), it or he/she shall notify the parties to the relevant case of the result (including the contents of disposition, where a disposition, such as an order, etc. For corrective measures is intended as a onducta  the inspection) in writing.

    (4) Anyone who finds a violation of the provisions of this Act may report such violation to the Fair Trade Commission, a Mayor/Do Governor or the head of a Si/Gun/Gu.

    (5) Where five years have elapsed since the completion of a violation of this Act, the Fair Trade Commission shall neither order the corrective measures pursuant to Article 32, nor impose penalty surcharge, etc. Pursuant to Article 34 to such violation: Provided, That this shall not apply where the parties concerned have accepted but failed to execute the recommendation or arbitration of the dispute arbitration organization on the consumer damage under Article 33 (1).

    (6) To onducta n inspection under paragraph (1), the Fair Trade Commission may organize an inspection team jointly with the Korea Consumer Agency established under Article 33 of the Framework Act on Consumers. In such cases, the methods and procedures for the composition of the inspection team and the inspection, and other necessary matters shall be prescribed by Presidential Decree.

    (7) The Fair Trade Commission may pay allowances or travel expenses within budgetary limits to the executives and employees of the Korea Consumer Agency who participates in an inspection conducted under paragraph (6).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 27 (Search, etc. of Open Information)

    (1) If necessary for securing fair trade order and preventing damage to the consumers in the electronic commerce transaction or mail order, the Fair Trade Commission may, through the use of electronic means, search and collect the open information made public via the information communications network by the business operators or organizations relating to consumer protection in the electronic commerce transaction or mail order.

    (2) No business operators or related organizations shall refuse or interfere with the search and collection of information by the Fair Trade Commission conducted under paragraph (1) without any justifiable ground.

    (3) If necessary for the efficient collection and use of information with respect to damage to consumers, the Fair Trade Commission may request agencies or organizations performing the businesses relating to consumer protection in the electronic commerce transaction or mail order to submit or share the relevant data, as prescribed by Presidential Decree.

    (4) Agencies or organizations requested for data by the Fair Trade Commission pursuant to paragraph (3) shall not refuse to submit or share the data unless any justifiable ground exists.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 28 (Disclosure of Information on Violations, etc.)

    In order to secure fair trade order and prevent damage to consumers in the electronic commerce transaction and mail order, the Fair Trade Commission may, as prescribed by Presidential Decree, disclose violations of this Act by business operators and other relevant information necessary for the prevention of damage to consumers among the information searched and collected under Article 27 (1).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 29 (Fairness of Evaluation and Authentication Business)

    (1) Regardless of title, a person who operates the business of evaluation and authentication of related business operators for fairness and consumer protection in the electronic commerce transaction and mail order (hereinafter referred to as “evaluation and authentication business operator“) shall, as prescribed by Presidential Decree, announce the standards, methods, etc. of such evaluation and authentication, and conduct evaluation and authentication in an impartial manner pursuant thereto.

    (2) Standards for, and methods of evaluation and authentication referred to in paragraph (1) shall be adequate to convey information on the effort and outcome exerted by the business operators for the fairness of transaction and consumer protection.

    (3) The Fair Trade Commission may require the evaluation and authentication business operator to submit data on the operation state, etc.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 30 (Reporting and Supervision)

    (1) Where a Mayor/Do Governor or the head of a Si/Gun/Gu recommends a correction pursuant to Article 31, in the case of the Mayor/Do Governor, the results thereof shall be reported to the Fair Trade Commission, and in the case of the head of a Si/Gun/Gu, the results thereof shall be reported to the Fair Trade Commission and the relevant Mayor/Do Governor, as prescribed by Presidential Decree.

    (2) When deemed necessary for the effective enforcement of this Act, the Fair Trade Commission may request a Mayor/Do Governor or the head of a Si/Gun/Gu to conduct an inspection or confirmation, or to submit data or take other measures necessary for correction with respect to the matters under its jurisdiction. In such cases, the relevant Mayor/Do Governor or the head of the relevant Si/Gun/Gu shall comply with the request unless any special circumstance arises.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    CHAPTER V.- CORRECTIVE MEASURES AND IMPOSITION OF PENALTY SURCHARGES

    Article 31 (Recommendation to Correct Violations)

    (1) Where a business operator commits a violation of this Act or fails to fulfill his/her duty under this Act, the Fair Trade Commission, a Mayor/Do Governor, or the head of a Si/Gun/Gu may, before issuing an order to take corrective measures under Article 32, formulate a correction plan to stop such violation, or to fulfill the duty prescribed in this Act or take necessary corrective measures under Article 32, and recommend the business operator to comply with it. In such cases, the purport that accepting such recommendation shall be construed as issuing an order to take corrective measures under paragraph (3) shall also be notified.

    (2) A business operator in receipt of a recommendation for correction pursuant to paragraph (1) shall notify the administration agency which has issued it whether he/she accepts it or not within ten days from the day such recommendation is received.

    (3) If a business operator in receipt of a recommendation of correction pursuant to paragraph (1) accepts such recommendation, it shall be deemed that the corrective measures under Article 32 are ordered.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 32 (Corrective Measures, etc.)

    (1) Where a business operator does any of the following acts or fails to fulfill a duty under this Act, the Fair Trade Commission may order him/her to take corrective measures:

    1. A violation of Articles 5 (2) through (5), 6 (1), 7, 8, 9 through 11, 12 (1) through (3), 13 (1) through (3) and (5), 14, 15, 17 (1) through (3) and (5), 18, 19 (1), 20, 20-2, 22 (1), 23 (2), 24 (1), (2) and (5) through (9), 27 (2) and (4), and 29 (1) and (2);

    2. Any prohibited act falling under any subparagraph of Article 21 (1).

    (2) The corrective measures referred to in paragraph (1) mean any of the following measures:

    1. Discontinuance of the relevant violation;

    2. Fulfillment of the duty stipulated in this Act;

    3. Public announcement of the fact that the corrective measures are imposed;

    4. Measures necessary for the prevention and relief of damage to consumers;

    5. Other measures necessary for the correction of the violation.

    (3) Matters necessary for the public announcement of the fact that the corrective measures are imposed under paragraph (2) 3 and details of measures necessary for the prevention and relief of damage to consumers under paragraph (2) 4 shall be prescribed by Presidential Decree.

    (4) In any of the following cases, the Fair Trade Commission may order to suspend all or part of the business for a fixed period not exceeding one year, as prescribed by Presidential Decree:

    1. Where a violation is repeated despite an order to take corrective measures issued under paragraph (1);

    2. Where an order to take corrective measures is not complied with;

    3. Where corrective measures alone are deemed significantly impractical to prevent damage to consumers.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 33 (Requests for Arbitration of Consumer Damage Disputes)

    (1) Where a request for relief relating to a violation of this Act in an electronic commerce transaction or mail order is filed by a consumer, the Fair Trade Commission, Mayor/Do Governor, or the head of a Si/Gun/Gu may, before making a recommendation for correction pursuant to Article 31 or taking corrective measures pursuant to Article 32, request a dispute arbitration organization on consumer damage prescribed by Presidential Decree, such as the agencies or organizations which perform the business relating to consumer protection in the electronic commerce transaction or mail order, to arbitrate the request.

    (2) Where the parties concerned accept and fulfill the recommendation or arbitration prepared by a dispute arbitration organization on the consumer damage, the Fair Trade Commission, Mayor/Do Governor, or the head of a Si/Gun/Gu shall notify the parties concerned of the purport that the corrective measures under Article 32 shall not be taken.

    (3) Where the parties concerned accept and fulfill the recommendation or arbitration of a dispute arbitration organization on the consumer damage pursuant to paragraph (1), the corrective measures under Article 32 shall not be taken, as prescribed by Presidential Decree.

    (4) Where the Fair Trade Commission requests an arbitration of dispute pursuant to paragraph (1), it may subsidize the funds needed for the arbitration of dispute within budgetary limits.

    (5) Where an agreement is reached in an arbitration of dispute, the dispute arbitration organization on the consumer damage shall report the result thereof, or where no agreement is reached therein, it shall report the process of arbitration, to the Fair Trade Commission, Mayor/Do Governor, or the head of a Si/Gun/Gu without delay.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 34 (Penalty Surcharges)

    (1) Where business suspension under Article 32 (4) is deemed likely to cause serious inconvenience to consumers, etc., the Fair Trade Commission may, in lieu of the suspension of all or part of the business, impose upon the relevant business operator a penalty surcharge within the extent not exceeding the sales amount related to the violation prescribed by Presidential Decree. In such cases, if the relevant sales amount is nonexistent or impossible to calculate, etc., a penalty surcharge within the extent not exceeding 50 million won may be imposed.

    (2) The Fair Trade Commission may determine and publicly notify the criteria for determination under which a penalty surcharge can be imposed in lieu of the suspension of all or part of the business.

    (3) In imposing penalty surcharges pursuant to paragraph (1), the Fair Trade Commission shall deliberate on the following matters:

    1. Degree of damage to consumers incurred by the relevant violation;

    2. Degree of compensation effort made by the business operator on the damage to consumers;

    3. Scale of profit obtained on account of the relevant violation;

    4. Details, period, frequency, etc. of the relevant violation.

    (4) Where a company which is the business operator who has violated this Act merges with another company, the Fair Trade Commission may impose a penalty surcharge on, and collect it from, the company surviving the merger or newly established in the course of the merger, deeming the relevant violation has been committed by such company.

    (5) Articles 55-4 through 55-6 of the Monopoly Regulation and Fair Trade Act shall apply mutatis mutandis to the extension of payment deadline and payment of the penalty surcharges in installments, and disposition on collection, default and refund thereof under paragraph (1).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    CHAPTER VI.- SUPPLEMENTARY PROVISIONS

    Article 35 (Prohibition of Contracts Disadvantageous to Consumers)

    A contract that violates Articles 17 through 19 and is disadvantageous to consumers shall become void.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 36 (Exclusive Jurisdiction)

    A lawsuit related to a transaction with a mail order distributor shall exclusively be governed by the district court having jurisdiction over the consumer’s address at the time of filing the lawsuit, but, in cases of nonexistence of address, the district court having jurisdiction over the consumer’s residence shall have the exclusive jurisdiction: Provided, That this shall not apply where the address or residence of the consumer at the time of filing the lawsuit is not evident.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 37 (Registration of Business Operator Organizations)

    (1) Business operator organizations, established for the sound development of electronic commerce transaction and mail order, enhancement of consumers’ confidence, and promotion of mutual profit, may register at the Fair Trade Commission, as prescribed by Presidential Decree.

    (2) The requirements, methods and procedures for registration under paragraph (1) and other matters shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 38 (Delegation and Entrustment of Authority)

    (1) Part of the authority of the Fair Trade Commission under this Act may be delegated to the heads of the agencies affiliated with it or a Mayor/Do Governor, or entrusted to the head of other administrative agency, as prescribed by Presidential Decree.

    (2) Part of the authority of a Mayor/Do Governor under this Act may be delegated to the head of a Si/Gun/Gu, as prescribed by Presidential Decree.

    (3) If necessary for the effective enforcement of this Act, the Fair Trade Commission may entrust part of its administrative affairs to the business operator organizations registered pursuant to Article 37 (1).

    (4) Where the Fair Trade Commission entrusts part of its administrative affairs to the business operator organizations pursuant to paragraph (3), it may fully or partially subsidize expenses incurred in performing the entrusted administrative affairs within budgetary limits.

    (5) Those entrusted with the administrative affairs under Article 26 (6) and paragraph (3) of this Article and perform, or have performed, the relevant affairs shall be deemed public officials for the purposes of penal provisions prescribed in Articles 127 and 129 through 132 of the Criminal Act.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 39 (Application Mutatis Mutandis of the Monopoly Regulation and Fair Trade Act)

    (1) Articles 42, 43, 43-2, 44, 45 and 52 of the Monopoly Regulation and Fair Trade Act shall apply mutatis mutandis to deliberation and decision of the Fair Trade Commission under this Act.

    (2) Article 50 (1) through (4) of the Monopoly Regulation and Fair Trade Act shall apply mutatis mutandis to the inspection, etc. of the Fair Trade Commission, Mayor/Do Governor, or the head of a Si/Gun/Gu on violations of this Act.

    (3) Articles 53, 53-2, 54, 55 and 55-2 of the Monopoly Regulation and Fair Trade Act shall apply mutatis mutandis to filing objections to the dispositions of the Fair Trade Commission pursuant to this Act, filing objections to the dispositions of the Mayor/Do Governor who has been delegated pursuant to Article 38, suspension of execution of orders of corrective measures, and exclusive jurisdiction of, filing of lawsuits, and lawsuits of dissatisfaction.

    (4) Article 62 of the Monopoly Regulation and Fair Trade Act shall apply mutatis mutandis to the commissioners of the Fair Trade Commission, or public officials who perform or have performed the duties prescribed in this Act.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    CHAPTER VII.- PENAL PROVISIONS

    Article 40 (Penal Provisions)

    A person who fails to comply with an order to take corrective measures issued under Article 32 (1) shall be punished by imprisonment for not more than three years or by a fine not exceeding 100 million won.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 41 (Penal Provisions)

    A person who carries on business in violation of a business suspension order issued under Article 32 (4) shall be punished by imprisonment for not more than two years or by a fine not exceeding 50 million won.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 42 (Penal Provisions)

    Any of the following persons shall be punished by a fine not exceeding 30 million won:

    1. A person who fails to file a report or files a false report, in violation of Article 12 (1);

    2. A person who uses a mark indicating the fact of having concluded a contract, etc. of consumer damage compensation insurance or of being allowed to use the escrow system, or makes or uses other similar marks, in violation of Article 24 (8) and (9).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 43 (Penal Provisions)

    Any of the following persons shall be punished by a fine not exceeding ten million won:

    1. A person who provides false information on the identification information of a business operator prescribed in Article 13 (1);

    2. A person who provides false information regarding the terms of transaction prescribed in Article 13 (2).

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    Article 44 (Joint Penal Provisions)

    If a representative of a corporation or an agent, employee, or other servant of a corporation or an individual commits a violation under Articles 40 through 43 in connection with the business of the corporation or the individual, in addition to punishment of the violator, the corporation or individual shall be punished by a fine under each relevant Article: Provided, That this shall not apply where such corporation or individual has not been negligent in giving due attention and supervision concerning the relevant duties to prevent such violation.

    (Article Amended by Act nº 10172, Mar. 22, 2010)

    Article 45 (Fines for Negligence)

    (1) Any of the following persons shall be punished by a fine for negligence not exceeding ten million won:

    1. A person who commits any violation falling under Article 21 (1) 1 through 5;

    2. A person who, as an issuer of the settlement means under Article 8 (4), fails to conclude a contract, etc. of consumer damage compensation insurance, in violation of the proviso to Article 24 (1);

    3. A person who, as a mail order distributor carrying out the prepaid mail order under Article 15 (1), violates Article 24 (2);

    4. A person who, as an issuer of the settlement means under Article 8 (4), submits false data and concludes a contract, etc. of consumer damage compensation insurance, in violation of Article 24 (7);

    5. A person who, as a mail order distributor carrying out the prepaid mail order under Article 15 (1), submits false data and concludes a contract, etc. of consumer damage compensation insurance, in violation of Article 24 (7);

    6. A person who fails to appear on at least two occasions without any justifiable ground and violates this Act, among the parties to whom a summon is issued under Article 50 (1) 1 of the Monopoly Regulation and Fair Trade Act, which is applied mutatis mutandis under Article 39 (2);

    7. A person who fails to submit a report, necessary data or things prescribed in Article 50 (1) 3 or (3) of the Monopoly Regulation and Fair Trade Act which is applied mutatis mutandis under Article 39 (2) or submits false report thereof;

    8. A person who refuses, interferes with, or evades an inspection prescribed in Article 50 (2) of the Monopoly Regulation and Fair Trade Act which is applied mutatis mutandis under Article 39 (2).

    (2) Any of the following persons shall be punished by a fine for negligence not exceeding five million won:

    1. A person who fails to preserve the transaction records, or fails to provide the consumers with the methods of inspection and preservation of transaction records, in violation of Article 6;

    2. A person who fails to indicate the information on the identity of the business operator prescribed in Article 10 (1) or 13 (1);

    3. A person who fails to report under Article 12 (2) and (3);

    4. A person who fails to indicate, advertise, or notify the stipulated matters or fails to hand over documents regarding the contents of contract, in violation of Article 13 (2);

    5. A person who fails to inform the other party to a transaction who is a minor of the fact that a contract on the transaction of goods, etc. can be cancelled, in violation of Article 13 (3).

    (3) Fines for negligence prescribed in paragraphs (1) and (2) shall be imposed and collected by the Fair Trade Commission, Mayor/Do Governor, or the head of a Si/Gun/Gu in accordance with the criteria prescribed by Presidential Decree.

    (Article Amended by Act nº 11326, Feb. 17, 2012)

    ADDENDA

    Article 1 (Enforcement Date)

    This Act shall enter into force on July 1, 2002.

    Article 2 (Transitional Measures concerning Report, etc. of Mail Order Distributor)

    (1) A person who has reported the mail order business pursuant to Article 17 of the previous Door-to-Door Sales, etc. Act shall be deemed to have reported to the Mayor/Do Governor pursuant to Article 12: Provided, That he/she shall complement the reported matters pursuant to Article 12 within two months from the enforcement of this Act

    (2) The mail order distributor, who has reported on the cessation, closedown of business, restart of business after cessation, etc., at the time of enforcement of this Act, pursuant to Article 24 of the previous Door-to-Door Sales, etc. Act, shall be deemed to have reported pursuant to this Act, and where he/she intends to restart business after cessation, he/she shall report pursuant to the provisions of this Act.

    Article 3 (Transitional Measures concerning Cancellation of Order)

    The cancellation, effect, etc. of order, which have been made pursuant to the provisions of the previous Door-to-Door Sales, etc. Act at the time of enforcement of this Act, shall be subject to the previous provisions.

    Article 4 (Transitional Measures concerning Suspension of Business)

    The disposition of suspension of business due to an act before the enforcement of this Act shall be subject to the provisions of the previous Door-to-Door Sales, etc. Act.

    Article 5 (Transitional Measures concerning Penal Provisions and Fine for Negligence)

    The application of penal provisions and fine for negligence to an act before the enforcement of this Act shall be subject to the provisions of the previous Door-to-Door Sales, etc. Act.

    Article 6 (Relations with Other Acts and Subordinate Statutes)

    In case where other Acts and subordinate statutes cite the previous Door-to-Door Sales, etc. Act or the provisions thereof at the time of enforcement of this Act, they are deemed to have cited this Act or the equivalent provisions of this Act in lieu of the previous provisions, if there are provisions equivalent to the previous ones in this Act.

    ADDENDA (Act nº 7315, Dec. 31, 2004)

    Article 1 (Enforcement Date)

    This Act shall enter into force on April 1, 2005. (Proviso Omitted.)

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 7344, Jan. 27, 2005)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Article 2 Omitted.

    ADDENDA (Act nº 7487, Mar. 31, 2005)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That the amended provisions of Articles 13 (2) 10, 24 (2) through (4), and 24-2 (2) shall take effect one year after the date of its promulgation; and the amended provisions of Articles 13 (3), 17 (2) and (6), and 32 (1), three months after the date of its promulgation, respectively.

    Article 2 (Applicability to Provision of Information on Identities of Mail Order Distributors and Terms of Transactions)

    The amended provisions of Articles 13 (1) 3 and (2) and 32 (1) shall apply to any indication or advertisement which is put by a mail order distributor for the purpose of taking orders for transaction of goods, etc. or to the indication, advertisement, or notification of the matters regarding the terms of transaction which is made by a mail order distributor before making a contract with consumers and the hand-over of documents stating the terms of transaction regarding the contents of contract pursuant to Article 13 (2) on or after the enforcement date of this Act.

    Article 3 (Applicability to Duty of Mail Order Distributors to Inform Minors)

    The amended provisions of Articles 13 (3) and 32 (1) shall apply to a contract on the transaction of goods, etc. which the mail order distributor intends to conclude with a minor on or after the enforcement date of this Act.

    Article 4 (Applicability to Measures for Supply of Goods, etc. and Refund of Prices by Mail Order Distributors)

    The amended provisions of Article 15 (1) and (2) shall apply to any contract for transaction of goods, etc. all or part of whose price is paid by a consumer to the mail order distributor, before being supplied with them, on or after the enforcement date of this Act.

    Article 5 (Applicability to Dispatch, etc. of Invoices by Mail Order Distributors)

    The amended provisions of Article 16 shall apply to any goods, etc. which are supplied by a mail order distributor on a consumer’s order on or after the enforcement date of this Act.

    Article 6 (Applicability to Cancellation, etc. of Orders Relating to Contracts Concluded by Consumers with Mail Order Distributors)

    The amended provisions of Article 17 (2) and (6) shall apply to the cancellation, etc. of the order relating to the contract for purchase of goods, etc. which is concluded by a consumer with a mail order distributor on or after the enforcement date of this Act.

    Article 7 (Applicability to Contracts, etc. of Consumer Damage Compensation Insurance Concluded by Business Operators Who are Engaged in Electronic Commerce Transactions or Mail Orders)

    The amended provisions of Article 24 (1) and (10) shall apply to any contract, etc. of consumer damage compensation insurance which the Fair Trade Commission encourages a business operator engaged in the electronic commerce transaction or mail order to conclude or which is concluded by the issuer of settlement means pursuant to Article 8 (4) on or after the enforcement date of this Act.

    Article 8 (Applicability to Use of Escrow System by Consumers or Conclusion of Contracts, etc. of Consumer Damage Compensation Insurance by Mail Order Distributor in Prepaid Mail Orders)

    The amended provisions of Article 24 (2) through (4) shall apply to a contract on the transaction of goods, etc. with respect to which a consumer chooses to use the escrow system or requires the mail order distributor to conclude a contract, etc. of consumer damage compensation insurance in relation to the terms of transaction of such goods, etc. on or after the enforcement date of this Act.

    Article 9 (Applicability to Use of Marks on Which Mail Order Distributors Indicate Fact of Allowing Use of Escrow System)

    The amended provisions of Article 24 (9) shall apply to the use of a mark on which a mail order distributor indicates the fact of allowing the use of the escrow system on or after the enforcement date of this Act.

    Article 10 (Applicability to Transmission of Spam Messages)

    The amended provisions of Articles 24-2 (2) and 32 (1) shall apply to spam messages which a mail order distributor sends consumers on or after the enforcement date of this Act.

    Article 11 (Applicability to Recommendation of Correction of Acts of Violation)

    The amended provisions of Article 31 (1) shall apply to the cases where a business operator commits an act in violation of the provisions of this Act or fails to fulfill his/her duty pursuant to the provisions of this Act on or after the enforcement date of this Act.

    Article 12 (Applicability to Additional Payment for Refund of Penalty Surcharges)

    The amended provisions of Article 34 (4) shall apply to the penalty surcharge which is refunded on or after the enforcement date of this Act.

    ADDENDUM (Act nº 8538, Jul. 19, 2007)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act nº 8635, Aug. 3, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year and six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 44 Omitted.

    ADDENDUM (Act nº 10172, Mar. 22, 2010)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 10303, May 17, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 11326, Feb. 17, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Joint Responsibility of Mail Order Distributors)

    The amended provisions of Article 20-2 (1) and (2) shall apply from the first mail order brokerage conducted after this Act enters into force.

    Article 3 (Applicability to Deemed Public Officials)

    The amended provisions of Article 38 (5) shall apply from the first person who conducts the entrusted administrative affairs after this Act enters into force.

    Article 4 (Transitional Measures concerning Small-Scale Mail Order Distributors’ Obligation to Report)

    A mail order distributor required to file a new report under the amended provisions of Article 12 (1) shall file such report within one year from the date this Act enters into force.

    ADDENDA (Act nº 11461, Jun. 1, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Articles 2 through 10 Omitted.

    11Nov/21

    Act nº 7929, Apr. 28, 2006, Electronic Financial Transactions Act

    Act nº 7929, Apr. 28, 2006, Electronic Financial Transactions Act. (Amended by Act nº 8387, Apr. 27, 2007, Act nº 8863, Feb. 29, 2008, Act nº 9325, Dec. 31, 2008, Act nº 10303, May 17, 2010, Act nº 11087, Nov. 14, 2011, Act nº 11407, Mar. 21, 2012, Act nº 11461, jun. 1, 2012, Act nº 11814, May 22, 2013, Act nº 12837, Oct. 15, 2014, Act nº 13929, Jan. 27, 2016, Act nº 14132, Mar. 29, 2016, Act nº 14828, Apr. 18, 2017, Act nº 14839, Jul. 26, 2017).

    ELECTRONIC FINANCIAL TRANSACTIONS ACT

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to ensure the safety and reliability of electronic financial transactions by clarifying their legal relations and to promote financial conveniences for people and contribute to national economic development by creating a foundation for the sound development of the electronic financial industry.

    Article 2 (Definitions)

    The definitions of terms used in this Act shall be as follows: (Amended by Act nº 8387, Apr. 27, 2007; Act nº 8863; Feb. 29, 2008; Act nº 11407, Mar. 21, 2012; Act nº 11461, Jun. 1, 2012; Act nº 11814, May 22, 2013)

    1. The term “electronic financial transaction” means any transaction whereby a financial company or an electronic financial business entity provides financial products and services through electronic apparatus (hereinafter referred to as “electronic financial business“) and users use them in a non-facing and automated manner without any direct contact with employees of the financial company or electronic financial business entity;

    2. The term “electronic payment transaction” means any electronic financial transaction whereby a person providing a payment (hereinafter referred to as “payer“) requires a financial company or an electronic financial business entity to transfer money to another person receiving the payment (hereinafter referred to as “payee“) by electronic payment means;

    3. The term “financial company” means any of the following institutions, organizations or business entities:

    (a) An institution referred to in subparagraphs 1 through 5, 7 and 8 of Article 38 of the Act on the Establishment, etc. of Financial Services Commission;

    (b) A specialized credit financial company established under the Specialized Credit Finance Business Act;

    (c) A postal service agency under the Postal Savings and Insurance Act;

    (d) A community credit cooperative and Korean Federation of Community Credit Cooperatives established under the Community Credit Cooperatives Act;

    (e) Any other person prescribed by Presidential Decree, which is an institution, organization, or a business entity carrying on financial business and other finance-related business pursuant to Acts;

    4. The term “electronic financial business entity” means any person who has obtained permission or whose business has been registered (excluding any financial company) pursuant to Article 28;

    5. The term “subsidiary electronic financial business entity” means any person prescribed by the Financial Services Commission established under Article 3 of the Act on the Establishment, etc. of Financial Services Commission (hereinafter referred to as the “Financial Services Commission“), who assists in electronic financial transactions; or vicariously performs the part of such transactions for a financial company or an electronic financial business entity; or who operates a payment gateway system;

    6. The term “payment gateway system” means any financial data processing system that deals with business affairs relating to the settlement of accounts and payments by transmitting electronic financial transaction information between a financial company and an electronic financial business entity;

    7. The term “user” means any person who conducts an electronic financial transaction under a contract concluded with a financial company or an electronic financial business entity for facilitating electronic financial transactions (hereinafter referred to as “electronic financial transaction contract“);

    8. The term “electronic apparatus” means any apparatus used to transmit or process electronic financial transaction information by electronic means, such as a cash dispenser, automatic teller machine, debit terminal, computer, telephone, or other devices that transmit or process information by electronic means;

    9. The term “electronic document” means any information prepared, transmitted, received or stored pursuant to subparagraph 1 of Article 2 of the Framework Act on Electronic Documents and Transactions;

    10. The term “means of access” means any of the following means or information which is used to issue a transaction request in electronic financial transactions or to secure the authenticity and accuracy of users and the details of such transaction:

    (a) An electronic card or other electronic information equivalent thereto;

    (b) An electronic signature creating key defined in subparagraph 4 of Article 2 of the Digital Signature Act and a certificate referred to in subparagraph 7 of the said Article;

    (c) A user number registered with a financial company or an electronic financial business entity;

    (d) Biological information of users;

    (e) A password required to use the means or information referred to in item (a) or (b);

    11. The term “electronic payment means” means an electronic funds transfer, electronic debit payment means, electronic prepayment means, electronic currency, a credit card, an electronic bond or other means of payment by electronic means;

    12. The term “electronic funds transfer” means any transfer of funds by any of the following methods from an account opened with a financial company or an electronic financial business entity (limited to any account linked to a financial company; hereinafter the same shall apply) to another account through electronic apparatus for the purpose of transferring funds between a payer and a payee:

    (a) A payment request made by a payer to a financial company or an electronic financial business entity;

    (b) A collection request made by a payee (hereinafter referred to as “collection transfer“) to a financial company or an electronic financial business entity;

    13. The term “electronic debit payment means” means any certificate (excluding any certificate available for loans), or information on such certificate, issued by a financial company or an electronic financial business entity to simultaneously supply goods or services and pay their prices by the method of transferring funds from the account of a financial company between a user and a chain store by electronic means;

    14. The term “electronic prepayment means” means any certificate, or information on such certificate, issued with transferable monetary values stored by electronic means, which meets all of the following requirements: Provided, That this shall not include any electronic currency:

    (a) It shall be used to purchase goods or services from a third person other than the issuer (including specially related persons prescribed by Presidential Decree) and pay their prices;

    (b) It shall be able to purchase goods or services in at least two business categories (referring to mid-classification business categories in the Korean Standard Industrial Classification publicly announced by the Commissioner of the National Statistical Office pursuant to Article 22 (1) of the Statistics Act; hereafter the same shall apply in this Article);

    15. The term “electronic currency” means any certificate, or information on such certificate, issued with transferable monetary values stored by electronic means, which meets all of the following requirements:

    (a) It shall be used in the areas and chain stores which meet the standards prescribed by Presidential Decree;

    (b) It shall meet the requirements referred to in subparagraph 14 (a);

    (c) It shall be able to purchase goods or services in at least five business categories and the number of such business categories shall be at least that prescribed by Presidential Decree;

    (d) It shall be issued in exchange for the same value of cash or deposits;

    (e) It shall be exchangeable for cash or deposits under guarantee of the issuer;

    16. The term “electronic bond” means any creditor’s monetary claims stated in an electronic document, which meets the following requirements:

    (a) The debtor shall designate the creditor;

    (b) It shall include the contents of debts;

    (c) It shall include the certified digital signature defined in subparagraph 3 of Article 2 of the Digital Signature Act;

    (d) It shall be registered with an electronic bond management agency under Article 29 (1) (hereinafter referred to as “electronic bond management agency“) via a financial company;

    (e) The debtor shall transmit an electronic document which meets all requirements referred to in items (a) through (c) to the creditor pursuant to Article 6 (1) of the Framework Act on Electronic Documents and Transactions and the creditor shall receive it in accordance with Article 6 (2) of the said Act;

    17. The term “transaction request” means any request whereby a user asks a financial company or an electronic financial business entity to process electronic financial transactions pursuant to the electronic financial transaction contract;

    18. The term “error” means any case where an electronic financial transaction fails to be made pursuant to the electronic financial transaction contract or the user’s transaction request neither intentionally nor with negligence;

    19. The term “electronic payment settlement agency service” means any service to transmit or receive payment settlement information in purchasing goods or using services by electronic means or to execute as an agent or mediate the settlement of prices thereof;

    20. The term “chain store” means any person, other than a financial company or an electronic financial business entity, who supplies goods or services to users in transactions conducted by an electronic debit payment means, electronic prepayment means or electronic currency under a contract concluded with a financial company or an electronic financial business entity;

    21. The term “electronic financial infrastructure” means any information processing system used in electronic financial transactions and information and communication network defined in Article 2 (1) 1 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.;

    22. The term “electronic infringement” means any attack on electronic financial infrastructure by means of hacking, computer virus, logic bomb, mail bomb, denial of service, high-powered electromagnetic wave, etc.

    Article 3 (Scope of Application)

    (1) Except as otherwise expressly provided for in other Acts, this Act shall apply to all electronic financial transactions: Provided, That this Act shall not apply to the electronic financial transactions prescribed by Presidential Decree among those conducted under a separate contract between a financial company and an electronic financial business entity. (Amended by Act nº 11814, May 22, 2013)

    (2) The provisions of Chapter V shall not apply to the financial companies referred to in subparagraph 3 (c) and (d) of Article 2. (Amended by Act nº 11814, May 22, 2013)

    (3) The following shall not apply to the financial companies prescribed by Presidential Decree, considering the frequency of electronic financial transactions, size of company, etc. among financial companies: (Inserted by Act nº 11814, May 22, 2013)

    1. Meeting the standards set by the Financial Services Commission for the information technology sector, in terms of human resources, facilities, electronic apparatus, etc. and electronic financial business under Article 21 (2);

    2. Establishing and submitting plans for the information technology sector under Article 21 (4);

    3. Appointing the chief information security officer under Article 21-2;

    4. Analyzing and assessing the vulnerability of electronic financial infrastructure under Article 21-3.

    Article 4 (Reciprocity)

    This Act shall also apply to a foreigner or foreign corporation: Provided, That with respect to any foreigner or foreign corporation of the State which fails to provide protections corresponding to this Act for any national or corporation of the Republic of Korea, any protection under this Act or the treaties acceded to or concluded by the Republic of Korea may be restricted commensurately therewith.

    CHAPTER II.- RIGHTS AND DUTIES OF PARTIES TO ELECTRONIC FINANCIAL TRANSACTIONS

    SECTION 1.- Common Provisions

    Article 5 (Use of Electronic Documents)

    (1) Articles 4 through 7, 9, and 10 of the Framework Act on Electronic Documents and Transactions shall apply to electronic documents used for electronic financial transactions. (Amended by Act nº 11461, Jun. 1, 2012)

    (2) Each electronic document received by a financial company or an electronic financial business entity in relation to a transaction request shall be deemed independent, respectively: Provided, That where the financial company or electronic financial business entity and a user undergoes the procedures for confirmation on an electronic financial transaction contract concluded among them, such procedures shall prevail. (Amended by Act nº 11814, May 22, 2013)

    Article 6 (Selection, Use and Management of Means of Access)

    (1) A financial company or an electronic financial business entity shall select, use and manage the means of access necessary for electronic financial transactions and confirm the identity and authority of a user, the details of a transaction request, etc. (Amended by Act nº 11814, May 22, 2013)

    (2) A financial company or an electronic financial business entity shall issue the means of access only if an application is made by the user after verifying the identity of such user: Provided, That it may be also issued without the user’s application nor the verification of the user’s identity in any of the following cases: (Amended by Act nº 11814, May 22, 2013)

    1. In case of an electronic prepayment means or electronic currency referred to in the proviso to Article 16 (1);

    2. Where a user’s consent is obtained for the renewal, replacement, etc. of the means of access, as prescribed by Presidential Decree.

    (3) No one shall commit any of the following acts unless otherwise expressly provided for in other Acts with respect to the use and management of a means of access: Provided, That the same shall not apply to cases (excluding the act referred to in subparagraph 3 and other acts of assisting the said act) where it is necessary to transfer an electronic prepayment means or electronic currency, or to offer it as security under Article 18: (Amended by Act nº 9325, Dec. 31, 2008; Act nº 13069, Jan. 20, 2015; Act nº 13929, Jan. 27, 2016)

    1. Transferring or taking over a means of access;

    2. Borrowing or lending a means of access, or storing, delivering or distributing a means of access, accompanied by receipt, demand or promise of any compensation;

    3. Borrowing or lending a means of access, or storing, delivering or distributing a means of access, for the purpose of using it for any crime or with the knowledge of the fact that it will be used for any crime;

    4. Providing a means of access as the object of pledge;

    5. Arranging or advertizing any act referred to in subparagraphs 1 through 4.

    Article 6-2 (Suspension, etc. of Using Telephone Numbers Used in Illegal Advertisements)

    (1) When the Prosecutor General, Commissioner of the National Police Agency, or Governor of the Financial Supervisory Service (referring to the Governor of the Financial Supervisory Service under Article 29 of the Act on the Establishment, etc. of Financial Services Commission; hereafter the same shall apply) identifies a telephone number used in illegal advertisements referred to in Article 6 (3) 5, he/she may request the Minister of Science and Information and Communications Technology (ICT) to suspend provision of telecommunications services related to the relevant telephone number. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) A person to whom provision of telecommunications services is suspended following a request made pursuant to paragraph (1) may raise an objection to the person who requested suspension of provision of telecommunications services.

    (3) Matters necessary for the procedures, etc. regarding raising of an objection under paragraph (2) shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 13929, Jan. 27, 2016)

    Article 7 (Confirmation of Transaction Details)

    (1) Any financial company or electronic financial business entity shall ensure that a user can confirm the transaction details through an electronic apparatus (including electronic apparatus, if any, stipulated in advance between the financial company or electronic financial business entity and the user) used for electronic financial transactions. (Amended by Act nº 11814, May 22, 2013)

    (2) Any financial company or electronic financial business entity shall, upon a user’s request to deliver relevant transaction details in writing (excluding any electronic document; hereinafter the same shall apply), deliver to him/her a document stating the details of his/her transaction within two weeks after receipt of such request. (Amended by Act nº 11814, May 22, 2013)

    (3) Matters concerning the coverage period, types and scope of the transaction details offered pursuant to paragraphs (1) and (2) and other matters shall be prescribed by Presidential Decree.

    Article 8 (Correction, etc. of Errors)

    (1) When a user recognizes the existence of any error in electronic financial transactions, he/she may request the relevant financial company or electronic financial business entity to correct such error. (Amended by Act nº 11814, May 22, 2013)

    (2) Upon receipt of a request to correct an error under paragraph (1), any financial company or electronic financial business entity shall immediately investigate and effect appropriate corrections to the processed transaction, and inform the user of the causes of the error and the results of correction by the methods prescribed by Presidential Decree within two weeks after receipt of such request. (Amended by Act nº 9325, Dec. 31, 2008; Act nº 11814, May 22, 2013)

    (3) When any financial company or electronic financial business entity recognizes the existence of any error in electronic financial transactions, it or he/she shall immediately investigate and effect appropriate corrections to the processed transaction, and inform the user of the causes of the error and the results of correction in the methods prescribed by Presidential Decree within two weeks after recognizing such error. (Amended by Act nº 9325, Dec. 31, 2008; Act nº 11814, May 22, 2013)

    Article 9 (Liability of Financial Companies or Electronic Financial Business Entities)

    (1) When a user suffers any loss due to any of the following incidents, the relevant financial company or electronic financial business entity shall be liable for indemnifying him/her for the loss: (Amended by Act nº 11814, May 22, 2013)

    1. An incident caused by the forgery or alteration of the means of access;

    2. An incident caused in the course of electronically transmitting or processing the conclusion of a contract or a transaction request;

    3. An incident caused by the use of a means of access acquired by fraudulent or other illegal means by invading electronic apparatus for electronic financial transactions or an information and communication network defined in Article 2 (1) 1 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.

    (2) Notwithstanding paragraph (1), a financial company or an electronic financial business entity may require a user to fully or partially bear the liability for any loss in any of the following cases: (Amended by Act nº 11814, May 22, 2013)

    1. Where, with respect to any incident caused by the intention or gross negligence of the user, a prior agreement is made with the user to the effect that all or part of the loss may be borne by the user;

    2. Where a corporate user (excluding any small enterprise defined in Article 2 (2) of the Framework Act on Small and Medium Enterprises) suffers any loss although the financial company or electronic financial business entity fulfills the duty of due care reasonably required to prevent incidents, such as the establishment and strict observance of security procedures.

    (3) The intention or gross negligence of the user referred to in paragraph (2) 1 shall be limited to that stipulated in the terms and conditions of electronic financial transactions (hereinafter referred to as “terms and conditions“) within the limits prescribed by Presidential Decree.

    (4) Every financial company or electronic financial business entity shall take measures necessary to discharge the liability provided for in paragraph (1), such as purchasing insurance, joining a mutual aid society or accumulating reserves, pursuant to the standards determined by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    Article 10 (Liability for Loss or Theft of Means of Access)

    (1) Upon receipt of a user’s notification of the loss or theft of the means of access, the relevant financial company or electronic financial business entity shall be liable for compensating the user for any loss he/she might suffer due to the use of such means of access by a third party from the time such notification is received: Provided, That the same shall not apply to cases prescribed by Presidential Decree where any damage is caused by the loss, theft, etc. of electronic prepayment means or electronic currency. (Amended by Act nº 11814, May 22, 2013)

    (2) Notwithstanding paragraph (1) of this Article and Article 9, if any provision of other Acts and subordinate statutes applicable favorably to the user exists, such provision shall prevail.

    Article 11 (Status of Subsidiary Electronic Financial Business Entities)

    (1) The intention or negligence of a subsidiary electronic financial business entity (including any electronic bond management agency; hereafter the same shall apply in this Chapter) in relation to electronic financial transactions shall be deemed the intention or negligence of the relevant financial company or electronic financial business entity. (Amended by Act nº 11814, May 22, 2013)

    (2) When any financial company or electronic financial business entity compensates the user for any loss caused by the intention or negligence of its or his/her subsidiary electronic financial business entity, it or he/she may exercise the right of indemnity over the subsidiary electronic financial business entity. (Amended by Act nº 11814, May 22, 2013)

    (3) Any user may give various notifications he/she is obligated to give to a financial company or an electronic financial business entity to its or his/her subsidiary electronic financial business entity pursuant to an agreement made with the financial company or electronic financial business entity. In such cases, a notification given to the subsidiary electronic financial business entity shall be deemed to have been given to the relevant financial company or electronic financial business entity. (Amended by Act nº 11814, May 22, 2013)

    SECTION 2.- Electronic Payment Transactions, etc.

    Article 12 (Validity of Electronic Payment Transaction Contracts)

    (1) Any financial company or electronic financial business entity shall make a payment by transmitting the amount requested by a payer or payee on a transaction request to the payee or his/her financial company or electronic financial business entity, pursuant to an agreement made with the payer or payee to facilitate electronic payment transactions. (Amended by Act nº 11814, May 22, 2013)

    (2) When any financial company or electronic financial business entity becomes unable to transmit the amount requested pursuant to paragraph (1), it or he/she shall return to the payer the amount received for electronic payment transactions. In such cases, when the failure to transmit the amount is caused by the negligence of the payer, the expenses incurred in relation to such transmission may be deducted. (Amended by Act nº 11814, May 22, 2013)

    Article 13 (Time when Payment Takes Effect)

    (1) Where a payment is made by electronic payment means, such payment shall take effect at the time set forth in the following: (Amended by Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    1. For electronic funds transfers: When the information on the amount transferred on a transaction request is completely recorded on the ledger of the account of a financial company or an electronic financial business entity with which the payee’s account is opened;

    2. For withdrawal of cash directly from electronic apparatus: When the payee receives such cash;

    3. For payments made by an electronic prepayment means or electronic currency: When the information on the amount requested on a transaction request gets to the electronic apparatus designated by the payee;

    4. For payments made by other electronic payment means: When the information on the amount requested on a transaction request is completely input in the electronic apparatus of a financial company or an electronic financial business entity with which the payee’s account is opened.

    (2) The financial companies or electronic financial business entities prescribed by Presidential Decree in consideration of their total assets, etc. shall, upon their user’s request, ensure that payment of electronic funds transfer takes effect after a certain time has elapsed since such user makes such transaction request, in accordance with the procedures and methods prescribed by Presidential Decree. (Inserted by Act nº 12837, Oct. 15, 2014)

    Article 14 (Withdrawal of Transaction Requests)

    (1) Any user may withdraw his/her transaction request before the payment takes effect pursuant to each subparagraph of Article 13 (1). (Amended by Act nº 12837, Oct. 15, 2014)

    (2) Notwithstanding paragraph (1), a financial company or an electronic financial business entity and its user may, pursuant to a prior agreement, determine differently the timing for withdrawing a transaction request with respect to any batch transaction, reserved transaction, etc. (Amended by Act nº 11814, May 22, 2013)

    (3) Any financial company or electronic financial business entity shall include in its or his/her terms and conditions the matters relating to the methods and procedures for withdrawing a transaction request under paragraph (1) and the prior agreement under paragraph (2). (Amended by Act nº 11814, May 22, 2013)

    Article 15 (Consent to Withdraw Deposits by Transfer)

    (1) Any financial company or electronic financial business entity shall obtain consent from the payer in advance to the withdrawal of deposits to effect a collection transfer, as prescribed by Presidential Decree. (Amended by Act nº 11814, May 22, 2013)

    (2) Any payer may request a financial company or an electronic financial business entity to revoke his/her consent to withdrawal under paragraph (1) before the withdrawal of deposits is completely recorded on the ledger of the payer’s account pursuant to a transaction request of the payee. (Amended by Act nº 11814, May 22, 2013)

    (3) Notwithstanding paragraph (2), a financial company or an electronic financial business entity may, pursuant to a prior agreement made with the payer, determine differently the timing for revoking the consent with respect to any batch transaction, reserved transaction, etc. (Amended by Act nº 11814, May 22, 2013)

    (4) Any financial company or electronic financial business entity shall include in its or his/her terms and conditions the matters relating to the methods and procedures for revoking the consent and the prior agreement under paragraphs (2) and (3). (Amended by Act nº 11814, May 22, 2013)

    Article 16 (Issuance, Use and Exchange of Electronic Currencies)

    (1) Any financial company or electronic financial business entity that issues an electronic currency (hereinafter referred to as “electronic currency issuer“) shall, in issuing the electronic currency, assign identifiable numbers to the means of access and manage it by linking the numbers to the user’s real name (hereinafter referred to as “real name“) defined in subparagraph 4 of Article 2 of the Act on Real Name Financial Transactions and Confidentiality or deposit account: Provided, That the same shall not apply to any electronic currency, the upper limit of whose face value does not exceed the amount prescribed by Presidential Decree. (Amended by Act nº 11814, May 22, 2013)

    (2) The electronic currency issuer shall issue the electronic currency in exchange for the same value of cash or deposits.

    (3) The electronic currency issuer shall take necessary measures to keep and use the issued electronic currency so that electronic currency holders can use it.

    (4) The electronic currency issuer shall, upon a request by its holder, have the duty to exchange such electronic currency for cash or deposits.

    (5) The methods and procedures for the issuance and exchange of electronic currency under paragraphs (1) through (4) shall be prescribed by Presidential Decree.

    Article 17 (Validity of Payment by Electronic Currencies)

    When an electronic currency holder pays the prices of goods or services by electronic currency pursuant to an agreement with the payee, the duty to pay such prices shall be deemed fulfilled.

    Article 18 (Transferability of Electronic Currencies, etc.)

    (1) The holder of an electronic prepayment means or electronic currency may transfer it to a third party or offer it as a security pursuant to an agreement with its issuer.

    (2) When an electronic prepayment means or electronic currency is transferred to a third party or offered as a security under paragraph (1), it shall be necessarily done via the issuer’s central computer system: Provided, That the same shall not apply to any electronic prepayment means whose real name is not confirmed or the electronic currency referred to in the proviso to Article 16 (1).

    Article 19 (Refund of Electronic Prepayment Means)

    (1) Any financial company or electronic financial business entity that issues an electronic prepayment means shall, upon a request by its holder, refund the balance recorded on such electronic prepayment means pursuant to a prior agreement. (Amended by Act nº 11814, May 22, 2013)

    (2) Any financial company or electronic financial business entity shall enter, in the terms and conditions, the agreement on the refund under paragraph (1) and the fact that it or he/she will fully pay the balance recorded on the electronic prepayment means in any of the following cases: (Amended by Act nº 11814, May 22, 2013)

    1. Where the electronic prepayment means becomes unavailable because it is impracticable for a chain store to supply goods or services due to an act of God, etc.;

    2. Where a chain store cannot supply goods or services due to any defect in the electronic prepayment means;

    3. Where the balance recorded on the electronic prepayment means falls below a fixed rate. In such cases, the fixed rate shall be less than 20/100.

    Article 20 (Requisite for Setting Up Transfer of Electronic Bonds)

    (1) The transfer of electronic bonds shall be deemed to satisfy the requisite for setting up against the obligor referred to in Article 450 (1) of the Civil Act when meeting all the following requirements:

    1. The notice made by the transferor to transfer the electronic bonds or the obligor’s consent thereto shall be given through an electronic document bearing the certified digital signature provided for in subparagraph 3 of Article 2 of the Digital Signature Act;

    2. The electronic document stating the notice or consent referred to in subparagraph 1 shall be registered with an electronic bond management agency.

    (2) The electronic document stating the notice or consent referred to in paragraph (1) shall be deemed to satisfy the requisite for setting up against the obligor referred to in Article 450 (2) of the Civil Act when completing the time-stamp stipulated in Article 20 of the Digital Signature Act and meeting all the requirements referred to in paragraph (1).

    CHAPTER III.- ENSURING SAFETY OF ELECTRONIC FINANCIAL TRANSACTIONS AND PROTECTION OF USERS

    Article 21 (Duty to Ensure Safety)

    (1) A financial company or an electronic financial business entity and its or his/her subsidiary electronic financial business entity (hereinafter referred to as “financial company, etc.”) shall perform its or his/her duties of a good manager to ensure the safe processing of electronic financial transactions. (Amended by Act nº 11814, May 22, 2013)

    (2) In order to ensure the safety and reliability of electronic financial transactions, a financial company etc. shall comply with the standards determined by the Financial Services Commission with respect to the information technology sector, such as human resources, facilities, electronic apparatus, and expenses for conducting electronic transmissions or processing, the electronic financial affairs and certification methods including the use of certificates under the Digital Signature Act. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    (3) The Financial Services Commission shall not compel the use of any specific technology or service when determining the standards referred to in paragraph (2) and shall endeavor to promote the fair competition of security technologies and certification technologies. (Amended by Act nº 12837, Oct. 15, 2014)

    (4) For safe electronic financial transactions, the financial companies or electronic financial business entities prescribed by Presidential Decree shall annually establish a plan for the information technology sector and submit it to the Financial Services Commission after obtaining confirmation and signature of its or his/her representative, as prescribed by Presidential Decree. (Inserted by Act nº 11814, May 22, 2013)

    Article 21-2 (Appointment of Chief Information Security Officers)

    (1) Any financial company or electronic financial business entity shall appoint a chief information security officer to be responsible for managing electronic financial business and information technology security which forms the basis of electronic financial business. (Amended by Act nº 11814, May 22, 2013)

    (2) A financial company or an electronic financial business entity prescribed by Presidential Decree in consideration of its or his/her total assets, number of employees, etc. shall appoint one of the executives (including any person prescribed in Article 401-2 (1) 3 of the Commercial Act) as a chief information security officer. (Amended by Act nº 11814, May 22, 2013)

    (3) The chief information security officer of the financial companies or electronic financial business entities prescribed by Presidential Decree in consideration of its or his/her total assets, number of employees, etc. shall not concurrently perform duties in the information technology sector other than those referred to in paragraph (4). (Inserted by Act nº 12837, Oct. 15, 2014)

    (4) A chief information security officer under paragraph (1) shall perform the following duties: (Amended by Act nº 12837, Oct. 15, 2014)

    1. Establishing strategies and plans for securing the stability of electronic financial transactions and protecting the users thereof;

    2. Protecting the information technology sector;

    3. Managing human resources and forming a budget, which are necessary for the security of the information technology sector;

    4. Preventing electronic financial transaction accidents, and taking measures therefor;

    5. Other matters prescribed by Presidential Decree for securing the stability of electronic financial transactions.

    (5) Matters necessary for qualifications, etc. for a chief information security officer shall be prescribed by Presidential Decree. (Amended by Act nº 12837, Oct. 15, 2014)

    (Article Inserted by Act nº 11087, Nov. 14, 2011)

    Article 21-3 (Analyzing and Assessing Vulnerability of Electronic Financial Infrastructure)

    (1) To ensure the safety and reliability of electronic financial transactions, a financial company and an electronic financial business entity shall analyze and assess the following matters with respect to its or his/her electronic financial infrastructure and report the findings therefrom (referring to the findings from analysis and assessment of vulnerability, where conducted under Article 9 of the Act on the Protection of Information and Communications Infrastructure) to the Financial Services Commission:

    1. Matters relating to the organization, facilities, and internal control of the information technology sector;

    2. Matters relating to electronic apparatus and the means of access of the information technology sector;

    3. Matters relating to measures to respond to infringements in order to maintain electronic financial transactions;

    4. Other matters prescribed by Presidential Decree.

    (2) A financial company and an electronic financial business entity shall establish and implement a plan to take necessary complementary measures based on the findings from analysis and assessment of vulnerability in the electronic financial infrastructure under paragraph (1).

    (3) The Financial Services Commission may require public officials under its control to inspect the findings from analysis and assessment of vulnerability in the electronic financial infrastructure under paragraph (1) and the actual status of implementing complementary measures pursuant to paragraph (2).

    (4) Details of and procedures for analysis and assessment of vulnerability in the electronic financial infrastructure under paragraph (1) and the establishment and implementation of the plan under paragraph (2) and other necessary matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11814, May 22, 2013)

    Article 21-4 (Prohibition against Electronic Infringement, etc.)

    No person shall commit any of the following offences:

    1. For anyone without access authority to access electronic financial infrastructure, or for anyone with access authority to fabricate, destroy, hide or lose the stored data beyond his/her authority;

    2. Installing programs, such as computer virus, logic bomb, or mail bomb, for the purpose of destroying data of electronic financial infrastructure or obstructing the operation of electronic financial infrastructure;

    3. Causing errors or hindrance to electronic financial infrastructure by methods, such as sending mass signal, high-powered electromagnetic wave or data simultaneously or having fraudulent commands be processed, for the purpose of obstructing the stable operation of electronic financial infrastructure.

    (Article Inserted by Act nº 11814, May 22, 2013)

    Article 21-5 (Notification, etc. of Infringement Incidents)

    (1) If an incident, such as disturbance or paralysis of electronic financial infrastructure, occurs due to an electronic infringement (hereinafter referred to as “infringement incident”), the relevant financial company and electronic financial business entity shall, without delay, inform the Financial Services Commission thereof.

    (2) If an infringement incident occurs, the relevant financial company and electronic financial business entity shall analyze the causes thereof and take necessary measures to prevent the spread of damage.

    (Article Inserted by Act nº 11814, May 22, 2013)

    Article 21-6 (Response to Infringement Incidents)

    (1) The Financial Services Commission shall perform the following duties to respond to infringement incidents:

    1. Collecting and disseminating information on infringement incidents;

    2. Issuing preannouncements and warnings about infringement incidents;

    3. Taking emergency measures against infringement incidents;

    4. Other matters prescribed by Presidential Decree for responding to infringement incidents.

    (2) Procedures and methods necessary for performing the duties referred to in paragraph (1) and other matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11814, May 22, 2013)

    Article 22 (Creation, Preservation and Destruction of Electronic Financial Transaction Records)

    (1) A financial company, etc. shall create the records (hereafter referred to as “electronic financial transaction records” in this Article) necessary to trace and search the details of electronic financial transactions or to verify or correct any error in such details and shall preserve them for a period prescribed by Presidential Decree within up to five years. (Amended by Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    (2) If the preservation period under paragraph (1) elapses and any commercial transaction relation, including financial transactions, is terminated, a financial company, etc. shall, within five years, destroy the relevant electronic financial transaction records (excluding credit information under the Credit Information Use and Protection Act; hereafter the same shall apply in this paragraph): Provided, That this shall not apply in any of the following cases: (Inserted by Act nº 12837, Oct. 15, 2014)

    1. Where it is inevitable to meet any obligation under other Acts;

    2. Other cases determined by the Financial Services Commission, where it is necessary to preserve electronic financial transaction records.

    (3) The types, preservation methods, destruction procedures and methods of electronic financial transaction records to be preserved by financial companies, etc. in accordance with paragraphs (1) and (2), and the standards for determining the day when a commercial transaction relation is terminated shall be prescribed by Presidential Decree. (Amended by Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    Article 23 (Issuance and Limit of Use of Electronic Payment Means, etc.)

    (1) The Financial Services Commission may require a financial company or an electronic financial business entity to set the following limits or take other necessary measures, in consideration of the characteristics of electronic payment means, as prescribed by Presidential Decree: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    1. The upper limit of the face value of an electronic currency and electronic prepayment means to be issued;

    2. The limit of use of electronic funds transfer;

    3. The limit of use of electronic debit payment means.

    (2) The Financial Services Commission may require a financial company or an electronic financial business entity to set the upper limit of cash withdrawal from electronic apparatus or may take other necessary measures, as prescribed by Presidential Decree. (Inserted by Act nº 11814, May 22, 2013)

    Article 24 (Clarification of Terms and Conditions and Notification of Alterations thereof)

    (1) Any financial company or electronic financial business entity shall clarify the terms and conditions in concluding a contract for electronic financial transactions with a user, and, at the request of a user, deliver a copy of the terms and conditions to the user, along with explaining the details thereof, in the manner prescribed by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (2) No financial company or electronic financial business entity shall, if it or he/she has concluded a contract in violation of paragraph (1), assert that the details of the terms and conditions are included in the relevant contract. (Amended by Act nº 11814, May 22, 2013)

    (3) Any financial company or electronic financial business entity shall, if it or he/she has altered the terms and conditions, publish the altered terms and conditions and inform the users thereof by one month prior to the enforcement of the altered terms and conditions, in the manner prescribed by the Financial Services Commission: Provided, That if the terms and conditions are urgently altered due to any amendment to Acts and subordinate statutes, it or he/she shall promptly publish the terms and conditions so altered and inform the users thereof in such manner prescribed by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (4) Any user may terminate a contract for electronic financial transactions by no later than the business day immediately preceding the enforcement date of the altered terms and conditions after the details of the altered terms and conditions are published or informed pursuant to paragraph (3). When the user fails to raise an objection against the details of the altered terms and conditions within the period referred to in the first sentence, he/she shall be deemed to have approved the altered terms and conditions.

    Article 25 (Preparation and Alteration of Terms and Conditions)

    (1) When a financial company or an electronic financial business entity intends to prepare or alter the terms and conditions for electronic financial transactions, it or he/she shall in advance report thereon to the Financial Services Commission: Provided, That in cases determined by the Financial Services Commission which do not adversely affect the rights, interests or duties of users, a report may be file to the Financial Services Commission within ten days after the terms and conditions is prepared or altered. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (2) The Financial Services Commission may recommend a financial company or an electronic financial business entity to alter the terms and conditions under paragraph (1) if necessary to maintain orderly electronic financial transactions. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (3) The Financial Services Commission may determine the period and procedures for reporting the preparation or alteration of the terms and conditions under paragraph (1) and other necessary matters. (Amended by Act nº 8863, Feb. 29, 2008)

    (4) Paragraphs (1) through (3) shall not apply to the financial companies defined in subparagraph 3 (c) and (d) of Article 2. (Amended by Act nº 11814, May 22, 2013)

    Article 26 (Provision, etc. of Electronic Financial Transaction Information)

    No one who recognizes the existence of any of the following matters in the course of performing duties relating to electronic financial transactions shall provide or disclose such information to any third party or use it for any purpose other than his/her duties without the consent of the relevant user: Provided, That the same shall not apply to cases provided for in the proviso to Article 4 (1) of the Act on Real Name Financial Transactions and Confidentiality or in any other Act:

    1. The matters relating to the identity of the user;

    2. The information or materials relating to the accounts, the means of access, and the details and results of electronic financial transactions of the user.

    Article 27 (Settlement and Mediation of Disputes)

    (1) Any financial company or electronic financial business entity shall prepare procedures to reflect reasonable opinions or complaints presented by users in relation to electronic financial transactions and to compensate for any loss sustained by users in the course of conducting electronic financial transactions, as prescribed by Presidential Decree. (Amended by Act nº 11814, May 22, 2013)

    (2) When a user has an objection to the processing of electronic financial transactions, he/she may demand the settlement of dispute, such as compensation for losses, pursuant to the procedures determined under paragraph (1) or file an application for mediation of dispute with the Financial Supervisory Service, the Korea Consumer Agency, etc. (Amended by Act nº 11814, May 22, 2013)

    (3) Detailed procedures and methods for the settlement of disputes and the application for mediation of disputes under paragraphs (1) and (2) and other matters shall be prescribed by Presidential Decree.

    (4) Any financial company or electronic financial business entity shall clarify the procedures referred to in paragraphs (1) through (3) in concluding a contract for electronic financial transactions. (Amended by Act nº 11814, May 22, 2013)

    CHAPTER IV.- PERMISSION, REGISTRATION AND FUNCTIONS OF ELECTRONIC FINANCIAL BUSINESS

    Article 28 (Permission and Registration of Electronic Financial Business)

    (1) Any person who intends to engage in a business issuing and managing electronic currencies shall obtain permission therefor from the Financial Services Commission: Provided, That the same shall not apply to the banks provided for in the Banking Act and other financial companies prescribed by Presidential Decree. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 10303, May 17, 2010; Act nº 11814, May 22, 2013)

    (2) Any person who intends to provide any of the following services shall register himself/herself with the Financial Services Commission: Provided, That the same shall not apply to the banks provided for in the Banking Act and other financial companies prescribed by Presidential Decree: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 10303, May 17, 2010; Act nº 11814, May 22, 2013)

    1. Electronic funds transfer services;

    2. Issuance and management of electronic debit payment means;

    3. Issuance and management of electronic prepayment means;

    4. Electronic payment settlement agency services;

    5. Other electronic financial services prescribed by Presidential Decree.

    (3) Notwithstanding paragraph (2), any of the following persons may provide the services referred to in each subparagraph of the said paragraph without registering himself/herself with the Financial Services Commission: (Amended by Act nº 8863, Feb. 29, 2008)

    1. Any person who issues an electronic prepayment means falling under any of the following cases:

    (a) Where it is only used at chain stores meeting the standards prescribed by Presidential Decree, such as the chain stores located within specially designated buildings;

    (b) Where the total balance of its issued amount does not exceed the amount prescribed by Presidential Decree;

    (c) Where it is an electronic prepayment means, the price of which has not been pre-paid directly by a user and is covered by a refund guarantee insurance, etc. as prescribed by Presidential Decree to discharge the liability for monetary values stored by the user;

    2. Any person who performs the electronic payment settlement agency services prescribed by Presidential Decree, such as delivering information only for the electronic processing of electronic payment transactions without direct involvement in the transfer of funds.

    (4) Article 4, Chapters II (excluding Article 19) and III (excluding Articles 21 (4), 21-2, 21-3, 23 and 25), and Articles 37, 38, 39 (1) and (6), 41 (1), 43 (2) and (3), 46, 46-2, and 47 concerning electronic financial business entities shall apply mutatis mutandis to the persons who issue electronic prepayment means exempted from registration under paragraph (3) 1 (c): Provided, That Articles 25, 39 (2) through (5), and 40 (2) and (3) shall apply mutatis mutandis where the financial incidents prescribed by Presidential Decree occur, such as insolvency due to any illegal or unjust act committed by the relevant employees or officers. (Amended by Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    (5) The Financial Services Commission may attach a condition to the permission granted under paragraph (1). (Amended by Act nº 8863, Feb. 29, 2008)

    Article 29 (Registration of Electronic Bond Management Agencies)

    (1) Any person who intends to engage in a business registering and managing electronic bonds shall register himself/herself with the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008)

    (2) Articles 21, 22, 39, 41, and 43 shall apply mutatis mutandis to the electronic bond management agencies which are registered to carry out the business of registering and managing electronic bonds pursuant to paragraph (1).

    (3) The procedures and methods for the registration of electronic bonds by electronic bond management agencies and other necessary matters shall be prescribed by Presidential Decree.

    Article 30 (Capital)

    (1) Any person who intends to obtain permission pursuant to Article 28 (1) shall be a stock company with a capital of at least five billion won.

    (2) Either of the following entities is eligible for registration pursuant to Article 28 (2) 1 through 3, and its capital or total investment shall exceed the amount prescribed by Presidential Decree, which is at least two billion won for each category of business: (Amended by Act nº 11814, May 22, 2013)

    1. A company provided for in Article 170 of the Commercial Act;

    2. A corporation incorporated under a special Act (limited to the issuance and management of electronic prepayment means under Article 28 (2) 3 to perform the duties provided for in the relevant Act).

    (3) An entity eligible for registration pursuant to Article 28 (2) 4 and 5 and Article 29 shall be a company provided for in Article 170 of the Commercial Act or a corporation stipulated in Article 32 of the Civil Act, the capital, total investments or fundamental property of which exceeds the amount prescribed by Presidential Decree, which is at least the amount referred to in the following subparagraphs for each category of business: (Amended by Act nº 14132, Mar. 29, 2016)

    1. A person who intends to operate below the standard defined by the Financial Services Commission, within the scope in which the total amount of electronic financial transactions per quarter does not exceed three billion won (excluding a person who intends to register pursuant to Article 29): An amount prescribed by Presidential Decree of at least 300 million won;

    2. A person not falling under subparagraph 1: An amount prescribed by Presidential Decree of at least 500 million won.

    (4) Where a person falling under paragraph (3) 1 registers pursuant to Article 28 and continues to exceed the standard defined by the Financial Services Commission under paragraph (3) 1 for at least two consecutive quarters, he/she shall report the relevant details to the Financial Services Commission, and shall satisfy the requirements for capital under paragraph (3) 2 within the period set by the Financial Services Commission. (Inserted by Act nº 14132, Mar. 29, 2016)

    Article 31 (Requirements for Permission and Registration)

    (1) Any person who intends to obtain permission or file for registration pursuant to Articles 28 and 29 shall meet all of the following requirements. Subparagraphs 4 and 5 shall only apply to permission:

    1. He/she shall hold the capital or fundamental property referred to in Article 30;

    2. He/she shall be equipped with professional human resources and physical installations, such as computer equipment, sufficient to protect users and carry out the intended business;

    3. He/she shall meet the standards of financial soundness prescribed by Presidential Decree;

    4. He/she shall have a proper and sound plan necessary to execute the business concerned;

    5. He/she shall secure the major investors prescribed by Presidential Decree, with sufficient investment capability, sound financial state and social credit.

    (2) Matters necessary for the detailed requirements for permission and registration under paragraph (1) shall be determined by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008)

    Article 32 (Disqualification for Permission and Registration)

    None of the following persons are entitled to permission or registration under Articles 28 and 29: (Amended by Act nº 8863, Feb. 29, 2008)

    1. A corporation for which one year has not yet passed since its registration was cancelled pursuant to Article 34, and a person who was a large stockholder (referring to any such investor prescribed by Presidential Decree; hereinafter the same shall apply) of the corporation at the time of cancellation of such registration and for whom one year has not yet passed since the registration was cancelled;

    2. A corporation for which three years have not yet passed since its permission or registration was revoked pursuant to Article 43 (1), and a person who was a large stockholder of the corporation at the time of such revocation and for whom three years have not yet passed since such revocation;

    3. A company which is in process of the rehabilitation procedure pursuant to the Debtor Rehabilitation and Bankruptcy Act and the large stockholders of such company;

    4. Any person who has failed to pay a debt within an agreed period in financial transactions and other commercial transactions and who is determined by the Financial Services Commission;

    5. Any person who has been punished by a fine or heavier punishment for violating the finance-related Acts or subordinate statutes prescribed by Presidential Decree within the three years preceding the date of application for permission or registration;

    6. A corporation whose large stockholder falls under any of subparagraphs 1 through 5.

    Article 33 (Applications, etc. for Permission, Registration and Authorization)

    (1) Any person who intends to obtain permission or authorization or file for registration pursuant to Article 28, 29, or 45 shall submit an application therefor to the Financial Services Commission, as prescribed by Presidential Decree. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (2) Upon receipt of an application under paragraph (1), the Financial Services Commission shall grant permission, registration, or authorization and notify the applicant of the results, as prescribed by Presidential Decree. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (3) When the Financial Services Commission grants permission, registration or authorization pursuant to Articles 28, 29, and 45, it shall, without delay, publish the details thereof in the Official Gazette and inform the general public thereof through computer communications, etc. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    Article 33-2 (Preliminary Permission)

    (1) Any person who intends to obtain permission under Article 28 (1) (hereafter referred to as “final permission” in this Article) may, in advance, file an application for preliminary permission with the Financial Services Commission.

    (2) When the Financial Services Commission decides whether to grant preliminary permission under paragraph (1), it shall verify that the person who intends to obtain preliminary permission meets all requirements for final permission.

    (3) The Financial Services Commission may attach a condition to preliminary permission under paragraph (2).

    (4) When any person who obtained preliminary permission files an application for final permission, the Financial Services Commission shall verify whether he/she has fulfilled the condition to preliminary permission under paragraph (3) and has met all requirements for final permission, before it decides whether to grant final permission.

    (5) Article 33 (1) and (2) shall apply mutatis mutandis to preliminary permission.

    (Article Inserted by Act nº 11814, May 22, 2013)

    Article 34 (Cancellation of Registration Subject to Application)

    (1) Any person who has been granted registration pursuant to Articles 28 (2) and 29 may file an application for the cancellation of such registration, as prescribed by Presidential Decree.

    (2) The Financial Services Commission shall, upon receipt of an application under paragraph (1), cancel the registration without delay. (Amended by Act nº 8863, Feb. 29, 2008)

    (3) When the Financial Services Commission has cancelled registration pursuant to paragraph (2), it shall, without delay, publish the details thereof in the Official Gazette and inform the general public thereof through computer communications, etc. (Amended by Act nº 8863, Feb. 29, 2008)

    Article 35 (Restriction on Concurrent Businesses)

    (1) Any electronic financial business entity who has obtained permission pursuant to Article 28 (1) shall be prohibited from concurrently engaging in any business other than the following:

    1. Services provided for in the subparagraphs of Article 28 (2) (limited to registered ones);

    2. Business permitted pursuant to Article 28 (1) and other business prescribed by Presidential Decree and necessary to provide the services referred to in subparagraph 1.

    (2) Notwithstanding paragraph (1), any electronic financial business entity who has obtained permission pursuant to Article 28 (1) may engage in the business other than those referred to in the subparagraphs of paragraph (1), if it or he/she is provided with payment guarantee by the financial companies prescribed by Presidential Decree or purchase refund guarantee insurance for all of the non-refunded portions of electronic currency. (Amended by Act nº 11814, May 22, 2013)

    Article 36 (Prohibition against Use of Similar Names)

    (1) The name ‘electronic currency’ shall be used only for the electronic currency referred to in subparagraph 15 of Article 2.

    (2) Any person who has failed to obtain permission pursuant to Article 28 (1) may not use the phrase ‘electronic currency’ in his/her trade name.

    Article 37 (Matters to be Observed by Chain Stores)

    (1) No chain store shall refuse to provide goods or services, or treat any user unfavorably, on the grounds that transactions are conducted by electronic debit payment means, electronic prepayment means or electronic currency (hereinafter referred to as “electronic currency, etc.”).

    (2) No chain store shall charge users a merchant fee to be borne by such store.

    (3) No chain store shall commit any of the following offences:

    1. Pretending that a transaction is conducted by electronic currency, etc. without providing goods or services;

    2. Conducting transactions by electronic currency, etc. in excess of actual turnover;

    3. Conducting transactions by electronic currency, etc. under the name of another chain store;

    4. Lending the name of the chain store to a third party;

    5. Conducting, as an agent, transactions by electronic currency, etc.

    (4) A person other than a chain store shall not conduct any transaction by electronic currency, etc. under the name of a chain store.

    Article 38 (Recruitment, etc. of Chain Stores)

    (1) In recruiting a chain store, any financial company or electronic financial business entity shall confirm whether the store seeking membership actually carries on its own business: Provided, That the same shall not apply to a chain store which has already been confirmed pursuant to Article 16-2 of the Specialized Credit Finance Business Act. (Amended by Act nº 11814, May 22, 2013)

    (2) No financial company or electronic financial business entity shall have its or his/her chain store bear a loss incurred by either of the following transactions: Provided, That the same shall not apply where a financial company or an electronic financial business entity concludes a contract with its or his/her chain store to the effect that such loss shall be fully or partially borne by the chain store when the financial company or electronic financial business entity proves the intention or gross negligence of the chain store in connection with the transaction: (Amended by Act nº 11814, May 22, 2013)

    1. A transaction conducted using a lost or stolen electronic currency, etc.;

    2. A transaction conducted using a forged or altered electronic currency, etc.

    (3) Any financial company or electronic financial business entity shall inform its or his/her chain stores of the following matters, in the manner prescribed by the Financial Services Commission: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    1. A merchant fee to be borne by chain stores;

    2. Liability for chain stores under paragraph (2);

    3. Matters to be observed by chain stores under Article 37.

    (4) When a chain store is sentenced to a punishment for violating Article 37 or receives a written notification of such violation from the relevant administrative agency, and thus falls under the grounds prescribed by Presidential Decree, the relevant financial company or electronic financial business entity shall, without delay, terminate the contract with the said chain store unless any special ground exists to the contrary. (Amended by Act nº 11814, May 22, 2013)

    CHAPTER V.- SUPERVISION OF ELECTRONIC FINANCIAL BUSINESS

    Article 39 (Supervision and Inspection)

    (1) The Financial Supervisory Service (referring to the Financial Supervisory Service established under Article 24 (1) of the Act on the Establishment, etc. of Financial Services Commission; hereinafter the same shall apply) shall supervise whether financial companies and electronic financial business entities abide by this Act or orders issued under this Act, following instructions from the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (2) The Governor of the Financial Supervisory Service may require a financial company or an electronic financial business entity to report on its or his/her business operations and financial conditions if necessary to conduct supervision under paragraph (1). (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013; Act nº 13929, Jan. 27, 2016)

    (3) The Governor of the Financial Supervisory Service may inspect the electronic financial business and other related financial conditions of a financial company and an electronic financial business entity and, if deemed necessary to conduct such inspection, ask the financial company and the electronic financial business entity to submit data relating to its or his/her business operations and financial conditions or to order the attendance of all relevant persons. (Amended by Act nº 11814, May 22, 2013)

    (4) Any person who conducts an inspection pursuant to paragraph (3) shall carry an identification indicating his/her authority and present it to relevant persons.

    (5) Upon conducting an inspection pursuant to paragraph (3), the Governor of the Financial Supervisory Service shall report the findings therefrom to the Financial Services Commission, as determined by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008)

    (6) When a financial company or an electronic financial business entity is deemed likely to undermine the sound operation of the financial company or electronic financial business entity in violation of any provision of this Act or any order issued under this Act, the Financial Services Commission may, upon recommendation of the Governor of the Financial Supervisory Service, take any of the following measures or authorize the Governor of the Financial Supervisory Service to take any measure referred to in subparagraphs 1 through 3: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013; Act nº 14828, Apr. 18, 2017)

    1. Issuing an order to correct the relevant offence;

    2. Issuing a caution or warning against a financial company or an electronic financial business entity;

    3. Demanding caution, warning or reprimand against an executive officer or employee;

    4. Recommending dismissal of an executive officer (excluding an operating officer under subparagraph 5 of Article 2 of the Act on Corporate Governance of Financial Companies; hereafter the same shall apply in Article 39-2) or suspending performance of his/her duties.

    Article 39-2 (Notification of Details of Measures against Retired Executive Officer, etc.)

    (1) Where, if a retired executive officer or employee (including an operating officer under subparagraph 5 of Article 2 of the Act on Corporate Governance of Financial Companies) of a financial company or electronic financial business entity held office as such, he/she would be deemed to be subject to any measure falling under Article 39 (6) 3 or 4, the Financial Services Commission (including the Governor of the Financial Supervisory Service authorized to take measures pursuant to Article 39 (6)) may notify the head of such financial company or electronic financial business entity of the details of such measure.

    (2) The head of a financial company or electronic financial business entity in receipt of a notification under paragraph (1) shall notify the retired executive officer or employee of such fact, and keep and maintain the content of such notification.

    (Article Inserted by Act nº 14828, Apr. 18, 2017)

    Article 40 (Supervision and Inspection of Outside Orders, etc.)

    (1) Where a financial company or an electronic financial business entity concludes or alters a contract with its or his/her subsidiary electronic financial business entity for affiliation, entrustment or outside orders (hereafter referred to as “outside order, etc.” in this Article) in relation to electronic financial transactions (including where a subsidiary electronic financial business entity concludes or alters a contract with another subsidiary electronic financial business entity for outside orders, etc.), it or he/she shall meet the standards determined by the Financial Services Commission to ensure the safety and reliability of electronic financial transactions and the soundness of the financial company and electronic financial business entity. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (2) Where the contents of a contract under paragraph (1) are deemed likely to undermine the operational soundness of a financial company or an electronic financial business entity and the rights and interests of users, the Financial Services Commission may direct the financial company or electronic financial business entity to correct or supplement the relevant contents of the contract. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (3) When the Governor of the Financial Supervisory Service conducts an inspection of a financial company or an electronic financial business entity in relation to outside orders, etc. under paragraph (1), he/she may request its or his/her subsidiary electronic financial business entity to submit data pursuant to the standards determined by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29. 2008; Act nº 11814, May 22, 2013)

    (4) When a subsidiary electronic financial business entity fails to submit data under paragraph (3) or submit insufficient data, the Governor of the Financial Supervisory Service may investigate the relevant subsidiary electronic financial business entity. (Inserted by Act nº 11814, May 22, 2013)

    (5) The Governor of the Financial Supervisory Service may request the following from a subsidiary electronic financial business entity, if deemed necessary for conducting an investigation under paragraph (4): (Inserted by Act nº 11814, May 22, 2013)

    1. Submitting a written statement relating to matters subject to such investigation;

    2. Submitting a ledger, document or other articles necessary for such investigation;

    3. Attendance of a relevant person.

    (6) A subsidiary electronic financial business entity entrusted with any duties related to the data protection of the information technology sector shall not re-entrust such duties to a third party: Provided, That this shall not apply to cases recognized by the Financial Services Commission within the extent not impairing the protection and safe processing of electronic financial transaction information. (Inserted by Act nº 12837, Oct. 15, 2014)

    (7) Article 39 (4) shall apply mutatis mutandis to investigations conducted under paragraph (4). (Inserted by Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    Article 41 (Requests, etc. for Submission of Data by Bank of Korea)

    (1) When the Monetary Policy Committee deems it necessary for implementing monetary credit policies and facilitating the smooth operation of payment and settlement systems in relation to electronic payment transactions, the Bank of Korea may request a financial company or an electronic financial business entity to submit data. In such cases, the scope of data so requested shall be limited to a necessary minimum in consideration of the work burden of the relevant financial company and electronic financial business entity. (Amended by Act nº 11814, May 22, 2013)

    (2) When the Monetary Policy Committee deems it necessary for implementing monetary credit policies, the Bank of Korea may request the Financial Supervisory Service to inspect the electronic currency issuer and the financial company and electronic financial business entity registered to provide the service referred to in Article 28 (2) 1 or to conduct a joint inspection thereof with the Bank of Korea. (Amended by Act nº 11814, May 22, 2013)

    (3) Articles 87 and 88 of the Bank of Korea Act and Article 62 of the Act on the Establishment, etc. of Financial Services Commission shall apply mutatis mutandis to the methods and procedures for making requests under paragraphs (1) and (2). (Amended by Act nº 8863, Feb. 29, 2008)

    Article 42 (Keeping Separate Accounts and Guidance for Sound Management)

    (1) A financial company and an electronic financial business entity shall keep separate accounts by the category of business provided for in Article 28 (1) and (2) to analyze the performance of business relating to fund management and electronic financial transactions, and prepare a report on the business relating to electronic financial transactions and the outcomes of management and submit it to the Financial Services Commission, as determined by the Financial Services Commission. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    (2) The Financial Services Commission may set the standards for management guidance for the following matters to direct the sound management of a financial company or an electronic financial business entity that performs the business relating to electronic financial transactions and to prevent electronic financial incidents, as prescribed by Presidential Decree: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    1. Matters relating to the appropriateness of capital;

    2. Matters relating to the soundness of assets;

    3. Matters relating to liquidity;

    4. Other matters necessary to ensure the soundness of management.

    (3) Where any financial company or electronic financial business entity that has obtained permission under Article 28 (1) is deemed likely to severely undermine the soundness of its or his/her own management, such as failing to meet the standards for management guidance under paragraph (2), the Financial Services Commission may request it or him/her to take necessary measures to improve its or his/her own management, such as increasing capital and limiting dividends. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    (4) Articles 10, 11 (1), (4) and (5), 13-2, 14, 14-2 through 14-4, 14-7, 15 through 19, 27, and 28 of the Act on the Structural Improvement of the Financial Industry shall apply mutatis mutandis to the measures, etc. necessary to be taken when the financial standing of the financial company or electronic financial business entity that has obtained permission under Article 28 (1) falls short of the standards for management guidance under paragraph (2) or is evidently deemed to fall short of the said standards due to any serious financial incident or insolvency claims. (Amended by Act nº 11814, May 22, 2013)

    Article 43 (Revocation, etc. of Permission or Registration)

    (1) When a financial company or an electronic financial business entity falls under any of the following cases, the Financial Services Commission may revoke permission or registration under Article 28: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    1. Where it or he/she has obtained permission or registration under Article 28 by fraudulent or other illegal means;

    2. Where it or he/she falls under any of subparagraphs 1 through 5 of Article 32;

    3. Where it or he/she has violated an order to suspend business issued under paragraph (2);

    4. Where it or he/she has failed to run a business for one or more consecutive years without any just ground;

    5. Where it or he/she has virtually closed its or his/her business due to the merger, bankruptcy or business closure of the relevant corporation or on other grounds.

    (2) When a financial company or an electronic financial business entity falls under any of the following cases, the Financial Services Commission may order it or him/her to wholly or partially suspend the relevant business with a given period of up to six months: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013; Act nº 14132, Mar. 29, 2016)

    1. Where it or he/she has violated Article 6 (1) or (2), 16 (1) through (4), 19 (1), 21 (1) or (2), 21-5 (2), 35, 36, or 38 (3) or (4);

    2. Where it or he/she has failed to investigate an error and effect appropriate corrections, in violation of Article 8 (2) and (3);

    3. Where it or he/she has failed to comply with any measure, direction or order taken or issued by the Financial Services Commission under Article 23, 39 (6), 40 (2) or 42 (3).

    4. Where it or he/she fails to file a report under Article 30 (4) or fails to satisfy the requirements within the period.

    (3) A financial company or an electronic financial business entity, whose business is wholly or partially suspended or permission or registration is revoked under paragraphs (1) and (2), may even so continue to perform the payment and settlement business of electronic financial transactions conducted prior to such disposition. (Amended by Act nº 11814, May 22, 2013)

    (4) When the Financial Services Commission revokes permission or registration under paragraph (1), it shall, without delay, publish the details thereof in the Official Gazette and inform the general public thereof through computer communications, etc. (Amended by Act nº 8863, Feb. 29, 2008)

    Article 44 (Hearings)

    When the Financial Services Commission intends to revoke permission or registration under Article 43 (1), it shall hold a hearing thereon. (Amended by Act nº 8863, Feb. 29, 2008)

    Article 45 (Authorization for Merger, Dissolution, Business Closure, etc.)

    (1) When any electronic financial business entity who has obtained permission pursuant to Article 28 (1) intends to engage in any of the following activities, he/she shall obtain authorization therefor from the Financial Services Commission, as prescribed by Presidential Decree: (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013)

    1. A merger with another financial company or electronic financial business entity;

    2. Dissolution or the closure of electronic financial business;

    3. Transfer and takeover all or part of business.

    (2) The Financial Services Commission may attach a condition to authorization under paragraph (1). (Amended by Act nº 8863, Feb. 29, 2008)

    Article 45-2 (Preliminary Authorization)

    (1) Any person who intends to obtain authorization under Article 45 (1) (hereafter referred to as “final authorization” in this Article) may, in advance, file an application for preliminary authorization with the Financial Services Commission.

    (2) When the Financial Services Commission decides whether to grant preliminary authorization under paragraph (1), it shall verify whether the person who intends to obtain preliminary authorization meets all requirements for final authorization.

    (3) The Financial Services Commission may attach a condition to preliminary authorization under paragraph (2).

    (4) When any person who obtained preliminary authorization files an application for final authorization, the Financial Services Commission shall verify whether he/she has fulfilled the condition to preliminary authorization under paragraph (3) and has met all requirements for final authorization before it decides whether to grant final authorization to him/her.

    (5) Article 33 (1) and (2) shall apply mutatis mutandis to preliminary authorization.

    (Article Inserted by Act nº 11814, May 22, 2013)

    Article 46 (Penalty Surcharges)

    (1) Where a financial company or an electronic financial business entity provides or discloses any electronic financial transaction information to any other person, or uses it for any purpose other than its duties in violation of Article 21 (1) or (2), the Financial Services Commission may impose a penalty surcharge not exceeding five billion won. (Inserted by Act nº 12837, Oct. 15, 2014)

    (2) Where a financial company or an electronic financial business entity comes to fall under any of the subparagraphs of Article 43 (2) (excluding cases where a penalty surcharge is imposed under paragraph (1)), the Financial Services Commission may, as prescribed by Presidential Decree, impose a penalty surcharge not exceeding 50 million won in lieu of an order to suspend business. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    (3) The amount of a penalty surcharge for each type, severity, etc. of violations subject to the imposition of a penalty surcharge under paragraph (1) or (2) and other necessary matters shall be prescribed by Presidential Decree. (Amended by Act nº 12837, Oct. 15, 2014)

    (4) Where a penalty surcharge under paragraph (1) or (2) is not paid within a prescribed period, the Financial Services Commission shall collect it in the same manner as delinquent national taxes are collected. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 12837, Oct. 15, 2014)

    (5) The Financial Services Commission may entrust duties concerning both collection of penalty surcharges and dispositions on default to the Commissioner of the National Tax Service, as prescribed by Presidential Decree. (Amended by Act nº 8863, Feb. 29, 2008; Act nº 12837, Oct. 15, 2014)

    Article 46-2 (Refund of Overpayments or Erroneous Payments)

    (1) Where a person obliged to pay a penalty surcharge requests a refund of the overpaid or erroneously paid penalty surcharge on grounds of adjudication on the objection or a court ruling, the Financial Services Commission shall, without delay, make a refund thereof, and shall refund the overpaid or erroneously paid penalty surcharge confirmed by the Financial Services Commission, even without a request from the person obliged to pay such penalty surcharge.

    (2) If a person entitled to a refund has to pay other penalty surcharges to the Financial Services Commission, the Financial Services Commission may appropriate the refund for such penalty surcharges when making a refund of overpayments or erroneous payments under paragraph (1).

    (3) When making a refund of overpayments or erroneous payments under paragraph (1), the Financial Services Commission shall refund additional money calculated by applying the interest rate on additional money prescribed by Presidential Decree, for the period from the day following the payment date of the penalty surcharge to the date of refund.

    (Article Inserted by Act nº 11814, May 22, 2013)

    CHAPTER VI.- SUPPLEMENTARY PROVISIONS

    Article 47 (Statistical Surveys of Electronic Financial Transactions)

    (1) The Bank of Korea may conduct a statistical survey of electronic financial businesses and electronic financial transactions to apprehend the current status of electronic financial transactions and to establish and implement effective monetary credit policies. In such cases, it may request necessary data from a government agency, financial company, etc., and a corporation and organization related to electronic financial transactions. (Amended by Act nº 11814, May 22, 2013)

    (2) Upon receipt of a request for data under paragraph (1), a government agency, financial company, etc., and a corporation and organization related to electronic financial transactions shall comply with such request unless any just ground exists to the contrary. (Amended by Act nº 11814, May 22, 2013)

    (3) Matters necessary for the subject matter, methods and procedures of the statistical survey under paragraph (1) shall be prescribed by Presidential Decree.

    Article 48 (Entrustment of Authority)

    The Financial Services Commission may entrust the Governor of the Financial Supervisory Service with part of its authority under this Act, as prescribed by Presidential Decree. (Amended by Act nº 8863, Feb. 29, 2008)

    CHAPTER VII.- PENALTY PROVISIONS

    Article 49 (Penalty Provisions)

    (1) Any of the following persons shall be punished by imprisonment with labor for not more than ten years, or by a fine not exceeding 100 million won: (Inserted by Act nº 12837, Oct. 15, 2014)

    1. A person who accesses any electronic financial infrastructure or fabricate, destroy, conceal, or leak any stored data, in violation of subparagraph 1 of Article 21-4;

    2. A person who destroys any data or installs programs, such as a computer virus, a logic bomb, a mail bomb, in violation of subparagraph 2 of Article 21-4;

    3. A person who sends mass signal, high-powered electromagnetic wave or data simultaneously or causes errors or hindrance to electronic financial infrastructure, in violation of subparagraph 3 of Article 21-4;

    4. A person who provides or leaks any electronic financial transaction information to any other person or uses such information for any purpose other than his/her duties (including a person issuing an electronic prepayment means applicable mutatis mutandis pursuant to Article 28 (4)), in violation of Article 26.

    (2) Any of the following persons shall be punished by imprisonment with labor for not more than seven years, or by a fine not exceeding 50 million won: (Amended by Act nº 11814, May 22, 2013; Act nº 12837, Oct. 15, 2014)

    1. A person who forges or alters a means of access;

    2. A person who intermediates the sale of, sells, exports, imports, or uses a forged or altered means of access;

    3. A person who intermediates the sale of, sells, exports, imports, or uses a lost or stolen means of access;

    4. A person who intrudes into any electronic financial infrastructure or any electronic apparatus for electronic financial transactions to acquire a means of access by fraud or other unjustifiable means, or conducts electronic financial transactions by using the means of access so acquired;

    5. A person who intermediates the sale of, sells, exports, imports or uses a means of access which was extorted, embezzled, or acquired by deceiving or blackmailing other person;

    6. Deleted (By Act nº 12837, Oct. 15, 2014)

    (3) Electronic currencies shall be deemed valuable securities with respect to which a person might be charged with any of the crimes prescribed in Articles 214 through 217 of the Criminal Act, and a crime involving with electronic currencies shall be subject to the punishment provided for in each of such Articles, correspondingly. (Amended by Act nº 12837, Oct. 15, 2014)

    (4) Any of the following persons shall be punished by imprisonment with labor for not more than three years, or by a fine not exceeding 20 million won: (Amended by Act nº 9325, Dec. 31, 2008; Act nº 13069, Jan. 20, 2015; Act nº 13929, Jan. 27, 2016)

    1. Any person who acquires or transfers a means of access in violation of Article 6 (3) 1;

    2. Any person who borrows or lends a means of access, or storing, delivering or distributing a means of access, in violation of Article 6 (3) 2 or 3;

    3. Any pledger or pledgee who violates Article 6 (3) 4;

    4. Any person who arranges or advertises any act in violation of Article 6 (3) 5;

    5. Any person who performs the duties without permission or registration under Article 28 or 29;

    6. Any person who obtains permission or registration under Article 28 or 29 by fraudulent or other illegal means;

    7. Any person who conducts a transaction by electronic currency, etc. under the name of another chain store in violation of Article 37 (3) 3;

    8. Any person who has conducted, as an agent, transactions by electronic currency, etc. in violation of Article 37 (3) 5;

    9. Any person who conducts a transaction by electronic currency, etc. under the name of another chain store in violation of Article 37 (4);

    10. Any person who peruses or is provided with electronic financial transaction information by fraudulent or other illegal means.

    (5) Any of the following persons shall be punished by imprisonment with labor for not more than one year, or by a fine not exceeding ten million won:

    1. Deleted (By Act nº 9325, Dec. 31, 2008)

    2. Deleted; (By Act nº 11814, May 22, 2013)

    3. Any person who refuses to provide goods or services, or treats any user unfavorably, on grounds of transaction by electronic currency, etc. in violation of Article 37 (1);

    4. Any person who charges a user a merchant fee to be borne by the relevant chain store in violation of Article 37 (2);

    5. Any person who lend the name of a chain store to a third party in violation of Article 37 (3) 4;

    6. Any person who engages in an activity falling under any subparagraph of Article 45 (1) without authorization under Article 45 (1).

    (6) An attempt to commit the crimes referred to in paragraphs (1) 1, 2, and 3 and (2) 1, 2, and 4 shall be subject to punishment. (Amended by Act nº 12837, Oct. 15, 2014)

    (7) The imprisonment with labor and fines referred to in paragraphs (1) through (6) may be concurrently imposed.

    Article 50 (Joint Penalty Provisions)

    (1) If the representative of a corporation, or any agent, employee or other employed persons of a corporation or individual has committed any offence falling under Article 49 (1), (2), (3) (limited to where any person is subject to the punishment prescribed in Article 216 of the Criminal Act) and (4) through (6) in connection with the duties of such corporation or individual, not only shall such offender be punished, but also such corporation or individual shall be punished by the fines prescribed in the relevant Article: Provided, That where such corporation or individual has not been negligent in giving due attention and supervision concerning the relevant duties to prevent such offense, this shall not apply. (Amended by Act nº 12837, Oct. 15, 2014)

    (2) If the representative of a corporation, or any agent, employee or other employed persons of a corporation or individual has committed any offense falling under Article 49 (3) (limited to where any person is subject to the punishment prescribed in Article 214, 215, or 217 of the Criminal Act) in connection with the duties of such corporation or individual, not only shall such offender be punished, but also such corporation or individual shall be punished by a fine not exceeding 50 million won: Provided, That where such corporation or individual has not been negligent in giving due attention and supervision concerning the relevant duties to prevent such offense, this shall not apply. (Amended by Act nº 12837, Oct. 15, 2014)

    (Article Amended by Act nº 11087, Nov. 14, 2011)

    Article 51 (Administrative Fines)

    (1) Any of the following persons (in cases falling under subparagraph 3, including persons who issue electronic prepayment means to which the relevant provisions apply mutatis mutandis pursuant to the proviso to Article 28 (4)) shall be subject to an administrative fine not exceeding 50 million won: (Amended by Act nº 12837, Oct. 15, 2014; Act nº 14828, Apr. 18, 2017)

    1. A person who fails to either perform his/her duties with the due care of a good manager or comply with the standards determined by the Financial Services Commission, in violation of Article 21 (1) or (2);

    2. A person who uses the name ‘electronic currency’, in violation of Article 36;

    3. A person who refuses, obstructs or evades an inspection, data submission, a request for attendance and an investigation under Article 39 (3) (including cases where Article 39 (3) applies mutatis mutandis in Article 29 (2)) or Article 40 (3) and (4);

    4. A person who fails to submit a report or submits a false report, in violation of Article 42 (1).

    (2) Any of following persons (including a person issuing an electronic prepayment means applicable mutatis mutandis pursuant to Article 28 (4), in cases falling under subparagraph 2) shall be subject to an administrative fine not exceeding 20 million won: (Amended by Act nº 12837, Oct. 15, 2014; Act nº 14828, Apr. 18, 2017)

    1. A person who fails to have the payment of electronic funds transfer take effect, in violation of Article 13 (2);

    2. A person who fails to appoint the chief information security officer or appoint an executive officer as the chief information security officer, in violation of Article 21-2 (1) or (2);

    3. A person who has the chief information security officer concurrently perform duties in the information technology sector other than those under Article 21-2 (4) or himself/herself concurrently performs duties in such sector, in violation of paragraph (3) of that Article;

    4. A person who fails to analyze and assess the vulnerabilities of the electronic financial infrastructure, in violation of Article 21-3 (1);

    5. A person who fails to formulate and implement a plan for complying with complementary measures, in violation Article 21-3 (2);

    6. A person who fails to destroy any record of electronic financial transactions, in violation of Article 22 (2);

    7. A person who makes a re-entrustment to a third party, in violation of Article 40 (6).

    (3) Any of the following persons (including any person issuing an electronic prepayment means applicable mutatis mutandis pursuant to Article 28 (4), in cases falling under subparagraphs 1, 6 through 8, and 10) shall be punished by an administrative fine not exceeding ten million won: (Amended by Act nº 14828, Apr. 18, 2017)

    1. Any person who fails to deliver a document stating the details of a transaction, in violation of Article 7 (2);

    2. Any person who fails to inform the relevant user of the causes of an error and results of correction, in violation of Article 8 (2) and (3);

    3. Any person who transfers an electronic prepayment means or electronic currency to a third party or provides it as a security, in violation of Article 18 (2);

    4. Any person who fails to submit a plan for the information technology sector, in violation of Article 21 (4);

    5. Any person who fails to report the findings from analysis and assessment of vulnerability in electronic financial infrastructure, in violation of Article 21-3 (1);

    6. Any person who fails to inform the Financial Services Commission of an infringement incident, in violation of Article 21-5 (1);

    7. Any person who fails to create or keep records in violation of Article 22 (1) (including where it is applicable mutatis mutandis under Article 29 (2));

    8. Any person who fails to clarify, explain, deliver, publish or notify the terms and conditions, in violation of Article 24 (1) or (3);

    9. Any person who fails to report to the Financial Services Commission, in violation of Article 25 (1);

    10. Any person who fails to prepare the procedures for the settlement of disputes, in violation of Article 27 (1);

    11. Deleted (By Act nº 14828, Apr. 18, 2017)

    12. Any person who fails to keep separate accounts by the category of business provided for in Article 28 (1) and (2), in violation of Article 42 (1).

    (4) The administrative fines under paragraphs (1) through (3) shall be imposed and collected by the Financial Services Commission, as prescribed by Presidential Decree. (Amended by Act nº 14828, Apr. 18, 2017)

    (Article Amended by Act nº 11814, May 22, 2013)

    ADDENDA

    Article 1 (Enforcement Date)

    This Act shall enter into force on January 1, 2007.

    Article 2 (Transitional Measures concerning Means of Access, etc.)

    The means of access and electronic payment means issued as at the time this Act enters into force shall be deemed to have been issued pursuant to this Act.

    Article 3 (Transitional Measures concerning Permission and Registration)

    (1) Any person who is engaged in issuing or managing electronic currency as at the time this Act enters into force shall obtain permission therefor from the Financial Supervisory Commission pursuant to Article 28 (1) within three months from the date when this Act takes effect.

    (2) Any person who is engaged in performing electronic funds transfer services, the issuance and management business of electronic debit payment means or electronic prepayment means or electronic payment settlement agency services, etc. as at the time this Act enters into force shall file a registration with the Financial Supervisory Commission pursuant to Article 28 (2) within six months from the date when this Act takes effect.

    (3) Any person who is engaged in the business of electronic bond management agency as at the time this Act enters into force shall file a registration with the Financial Supervisory Commission pursuant to Article 29 within three months from the date when this Act takes effect.

    Article 4 Omitted.

    ADDENDA (Act nº 8387, Apr. 27, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 9 Omitted.

    ADDENDA (Act nº 8863, Feb. 29, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Articles 2 though 5 Omitted.

    ADDENDUM (Act nº 9325, Dec. 31, 2008)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act nº 10303, May 17, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 though 10 Omitted.

    ADDENDUM (Act nº 11087, Nov. 14, 2011)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDA (Act nº 11407, Mar. 21, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 and 3 Omitted.

    ADDENDA (Act nº 11461, Jun. 1, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 11814, May 22, 2013)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Submission of Plans for Information Technology Sector)

    The submission of a plan for the information technology sector under the amended provisions of Article 21 (4) shall begin to apply from the business year beginning after this Act enters into force.

    Article 3 (Transitional Measures concerning Penalty Provisions and Administrative Fines)

    The application of penalty provisions and the imposition of administrative fines for violations committed before this Act enters into force shall be governed by the former provisions.

    ADDENDA (Act nº 12837, Oct. 15, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation: Provided, That the amended provisions of Articles 13 (2) and 21 (2) and (3) shall enter into force one year after the date of its promulgation.

    Article 2 (Applicability to Prohibition against Concurrent Position of Chief Information Security Officers)

    The amended provisions of Article 21-2 (3) shall apply beginning with the first chief information security officer appointed (including cases where he/she is reappointed) after this Act enters into force.

    Article 3 (Applicability to Prohibition against Re-Entrustment of Duties Related to Information Protection)

    The amended provisions of Article 40 (6) shall apply beginning with the first case where any duty is re-entrusted or a re-entrustment period is extended after this Act enters into force.

    Article 4 (Applicability to Imposition of Penalty Surcharges)

    The amended provisions of Article 46 (1) shall apply beginning with the first financial company or electronic financial business entity who commits any violation after this Act enters into force.

    Article 5 (Transitional Measures concerning Penalty Provisions and Administrative Fines)

    The application of penalty provisions and the imposition of an administrative fine for any violation committed before this Act enters into force shall be governed by the former provisions of this Act.

    ADDENDA (Act nº 13069, Jan. 20, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 (Transitional Measures concerning Penalty Provisions)

    The application of penalty provisions to any violation committed before this Act enters into force shall be governed by the former provisions of this Act.

    ADDENDUM (Act nº 13929, Jan. 27, 2016)

    This Act shall enter into force on the date of its promulgation: Provided, That the amended provisions of Article 6-2 shall enter into force six months after the date of its promulgation.

    ADDENDUM (Act nº 14132, Mar. 29, 2016)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act nº 14828, Apr. 18, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Notification of Details of Measures against Retired Executive Officer)

    The amended provisions of Article 39-2 shall also apply to the executive officers and employees who have committed an violation before this Act enters into force, but resign or retire thereafter.

    Article 3 (Transitional Measures concerning Demand for Suspension of Performance of Duties)

    Notwithstanding the amended provisions of Article 39 (6) 4 (limited to the suspension of performance of duties), the former provision shall apply to the violations committed before this Act enters into force.

    ADDENDA (Act nº 14839, Jul. 26, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That among the Acts amended pursuant to Article 5 of the Addenda, amendments to the Acts which have been promulgated before this Act enters into force, but the enforcement dates of which have not yet arrive, shall enter into force on the enforcement dates of the relevant Acts, respectively.

    Articles 2 through 6 Omitted.

    10Nov/21

    Act nº 9705, May 22, 2009, Electronic Government

    Act nº 9705, May 22, 2009, Electronic Government (Amended by: Act nº 10012, Feb. 4, 2010, Act nº 10303, May 17, 2010, Act nº 10465, Mar. 29, 2011, Act nº 10580, Apr. 12, 2011, Act nº 11461, jun. 1, 2012, Act nº 11688, Mar. 23, 2013, Act nº 11690, Mar. 23, 2013, Act nº 11735, Apr. 5, 2013, Act nº 12346, Jan. 28, 2014, Act nº 12592, May 20, 2014, Act nº 12738, jun. 3, 2014, Act nº 13459, Aug. 11, 2015, Act nº 14474, Dec. 27, 2016, Act nº 14914, Oct. 24, 2017).

    ELECTRONIC GOVERNMENT ACT

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to facilitate the efficient realization of electronic government, enhance productivity, transparency and democracy in the public administration, and improve the quality of life of citizens by providing for fundamental principles, procedures, methods of promotion, and other relevant matters for the electronic processing of administrative affairs.

    Article 2 (Definitions)

    The terms used in this Act shall be defined as follows: (Amended by Act n º 11690, Mar. 23, 2013; Act nº 12346, Jan. 28, 2014; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. The term “electronic government” means a government that efficiently coordinates administrative affairs between administrative agencies and public institutions (hereinafter referred to as “administrative agencies, etc.“) or conducts administrative affairs for citizens by digitalizing administrative affairs of administrative agencies, etc. using information technology;

    2. The term “administrative agency” means an agency responsible for the processing of administrative affairs of the National Assembly, the Judiciary, the Constitutional Court, or the National Election Commission; a central administrative agency (including agencies under the jurisdiction of the President or of the Prime Minister; hereinafter the same shall apply) and an affiliate thereof; a local government;

    3. The term “public institution” means any of the following:

    (a) A corporation, organization, or institution under Article 4 of the Act on the Management of Public Institutions;

    (b) A local government-invested public corporation or local government public corporation under the Local Public Enterprises Act;

    (c) A special corporation established under a special-purpose Act;

    (d) Any level of school, established under the Elementary and Secondary Education Act, the Higher Education Act, or any other Act;

    (e) Other corporations, organizations, or institutions specified by Presidential Decree;

    4. The term “central agency responsible for administrative affairs” means the National Assembly Secretariat for affiliates of the National Assembly, the National Court Administration for affiliates of the Judiciary, the Department of Court Administration of the Constitutional Court for affiliates of the Constitutional Court, the National Election Commission Secretariat for affiliates of the National Election Commission, and the Ministry of the Interior and Safety for central administrative agencies, their affiliates, and local governments;

    5. The term “electronic government service” means any administrative service rendered by administrative agencies, etc., to other administrative agencies, etc. and citizens, enterprises, etc., through access to electronic government;

    6. The term “administrative information” means data prepared or acquired and managed by administrative agencies, etc. within the scope of their duties, which have been processed by means of digital technology to be expressed in code, characters, voice, sound, images, or any other mode;

    7. The term “electronic document” means standardized information prepared and transmitted, received, or stored in digital format by devices capable of processing information, such as computers;

    8. The term “digitized document” means a document converted from a hard-copy or any other non-electronic version to a format that can be processed on information systems;

    9. The term “administrative digital signature” means information by which one can verify the identity of any of the following agencies that have prepared an electronic document or the person directly in charge of the relevant work in any of such agencies as well as any modification to the electronic document, which is specific to the electronic document:

    (a) An administrative agency;

    (b) An auxiliary agency or support agency of an administrative agency;

    (c) An institution, corporation, or organization that exchanges electronic documents with an administrative agency;

    (d) An institution, corporation, or organization under Article 36 (2);

    10. The term “information and communications network” means an information and communications system through which information is collected, processed, stored, searched, transmitted, or received by using telecommunications systems under subparagraph 2 of Article 2 of the Framework Act on Telecommunications or by utilizing telecommunications systems, computers, and computer technologies;

    11. The term “information resources” means administrative information held by administrative agencies, etc.; information systems constructed so as to facilitate the collection, processing, and search of administrative information by electronic means; information technologies for the establishment of information systems; budgets and human resources for informatization and other related resources;

    12. The term “information technology architecture” means a systematic framework formulated following the comprehensive analysis of the components of an entire organization, including the scope of its work, applications, data, technologies, and security, conducted based on specific guidelines and processes, and methodologies for optimizing the components through informatization, etc. based on such framework;

    13. The term “information system” means a systematic network of devices and software for collecting, processing, storing, searching, transmitting, receiving, or using information;

    14. The term “supervision of information system” means the comprehensive monitoring of matters regarding the construction, operation, etc., of the information system to resolve its problems from the third-person perspective by a person independent of the interests of the person awarding the contract for supervision and the person subject to supervision, with the aim of improving efficiency and ensuring safety of the information system;

    15. The term “supervisor” means a person who meets the requirements specified in Article 60 (1) to perform supervision of an information system (hereinafter referred to as “supervisory duty”).

    Article 3 (Duties of Administrative Agencies, etc. and Public Officials, etc.)

    (1) The head of each administrative agency, etc. shall implement this Act and improve related systems with the aim of facilitating the realization of electronic government and improving the quality of life of citizens and shall actively cooperate in interlinking information and communications networks, sharing administrative information, etc.

    (2) Public officials and employees of public institutions shall be capable of utilizing information technologies necessary for the electronic processing of their work and give priority to citizens’ convenience over the convenience of the relevant agencies in electronically processing their work.

    Article 4 (Principles of Electronic Government)

    (1) Each administrative agency, etc. shall consider, among other things, the following matters in materializing, operating, and developing electronic government, and take measures necessary therefor:

    1. Digitizing public services and improving citizens’ convenience;

    2. Innovating administrative affairs and improving their productivity and efficiency;

    3. Ensuring the security and reliability of information systems;

    4. Protecting personal information and privacy;

    5. Expanding disclosure and sharing of administrative information;

    6. Preventing duplicative investment and improving interoperability.

    (2) Each administrative agency, etc. shall promote the realization, operation, and development of electronic government, based on an information technology architecture.

    (3) Each administrative agency, etc. shall not require civil petitioners to submit matters that can be electronically verified through the sharing of administrative information between the agencies, etc.

    (4) No personal information maintained and managed by administrative agencies, etc. shall be used against the wishes of the relevant person, unless otherwise provided for in other Acts or subordinate statutes.

    Article 5 (Formulation of Master Plans for Electronic Government)

    (1) The head of each central agency responsible for administrative affairs shall formulate a master plan for electronic government every five years combining the plans of each of administrative agencies, etc. referred to in Article 5-2 (1) to realize, operate, and develop electronic government.

    (2) A master plan for electronic government under paragraph (1) (hereinafter referred to as “master plan for electronic government“) shall include the following matters:

    1. Basic direction-setting for the realization and mid- and long-term development of electronic government;

    2. Modification of related Acts and subordinate statutes and systems for the realization of electronic government;

    3. Facilitation of the delivery and utilization of electronic government services;

    4. Electronic administrative management;

    5. Increased sharing and securement of safety of administrative information;

    6. Adoption and utilization of information technology architecture;

    7. Integration, sharing, and efficient management of information resources;

    8. Standardization of electronic government, ensuring interoperability and expansion of services for sharing;

    9. Promotion of electronic government projects and local informatization projects and the management of the outcomes thereof;

    10. Re-design of work process for realization of electronic government;

    11. International cooperation on electronic government;

    12. Other matters necessary for the realization, operation, and development of electronic government, such as training of human resources for informatization.

    (3) When the head of each related central administrative agency intends to formulate and implement an implementation plan for national informatization pursuant to Article 7 of the Framework Act on National Informatization, he/she shall take a master plan for electronic government into consideration.

    (4) Matters necessary for the procedure, etc. for formulation of master plans for electronic government shall be prescribed by National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, and Presidential Decree.

    (Article Amended by Act nº 12346, Jan. 28, 2014)

    Article 5-2 (Formulation and Evaluation of Plan for Each Agency)

    (1) The head of an administrative agency, etc. shall formulate a master plan for the realization, operation, and development of electronic government in a relevant agency (hereinafter referred to as “plan for each agency”) every five years and submit such plan to the head of the relevant central agency responsible for administrative affairs.

    (2) The head of each administrative agency, etc. shall endeavor to secure financial resources necessary for the implementation of the plan for each agency.

    (3) The head of each central agency responsible for administrative affairs may examine the current status of the plan for each administrative agency, etc. and the outcomes thereof.

    (4) Matters necessary for the standards for formulation of the plan for each agency, procedures for the formulation and examination of the current status therof, etc. shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, and Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 5-3 (Electronic Government Day)

    (1) In order to continuously accelerate the development of electronic government by, for example, informing the public about the excellence and convenience of electronic government and enhancing the national status of the Republic of Korea, June 24 shall be designated as the Electronic Government Day.

    (2) The State may host events that meet the intent of the Electronic Government Day.

    (Article Inserted by Act nº 14914, Oct. 24, 2017)

    Article 6 (Relationship with other Acts)

    Except as otherwise provided for in other Acts, this Act shall govern the realization, operation, and development of electronic government, such as digitization of public services and administrative management of administrative agencies, etc. and the sharing of administrative information.

    CHAPTER II.- PROVISION AND UTILIZATION OF ELECTRONIC GOVERNMENT SERVICES

    SECTION 1.- Electronic Processing of Civil Petitions

    Article 7 (Application, etc. for Electronic Processing of Civil Petitions)

    (1) The head of an administrative agency, etc. (including any person to whom administrative authority has been entrusted: hereafter the same shall apply in this Section) may allow citizens to file, report, or submit a civil application or petition (hereinafter referred to as “application, etc.”) in electronic form even where relevant Acts and subordinate statutes (including ordinances and municipal rules of a local government; hereinafter the same shall apply) require application, etc. for a civil petition, etc. subject to processing of the said agency in paper form, such as a written document, statement, or form.

    (2) When the head of an administrative agency, etc. processes a civil petition, etc., he/she may give notice or notification (hereinafter referred to as “notice, etc.”) of the results of the processing in electronic form, if the petitioner wishes to receive such results in such manner or files an application, etc, for the civil petition, etc. in electronic form, even where relevant Acts and subordinate statutes require notice, etc. of the results of the processing in paper form, such as a written document, statement, or form.

    (3) When filing an application, etc. or giving notice, etc. pursuant to paragraph (1) or (2), a digitized document may serve as a document to be attached to the electronic document.

    (4) An application, etc. filed or notice, etc. provided in electronic form pursuant to paragraph (1) or (2) shall be deemed to have been filed or provided in compliance with the procedures provided for by relevant Acts and subordinate statutes.

    (5) When the head of an administrative agency, etc. allows citizens to file an application, etc. or gives notice, etc. in electronic or digitized form pursuant to paragraphs (1) through (3), he/she shall publish the type of such application, etc. for or notice, etc. of the civil petition, etc. and the processing procedure therefor in advance via the Internet.

    (6) Matters necessary for the utilization of digitized documents, verification of their authenticity, and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 8 (Electronic Verification, etc. of Required Documentation)

    (1) The head of each administrative agency, etc. shall process relevant work after directly receiving an electronic document from an administrative agency, etc., if any document or certificate required to be attached or submitted by the civil petitioner is to be issued by the administrative agency, etc. in electronic form.

    (2) A civil petition may be processed in accordance with paragraph (1) only where the civil petitioner pays the full fees prescribed by relevant Acts and subordinate statutes (including expenses incurred by an administrative agency, etc. in remitting fees to the issuing agency) to the administrative agency, etc. for the civil petition and required documents.

    (3) If the head of an administrative agency, etc. can verify information about required documents by sharing administrative information pursuant to Article 36 (1), he/she may substitute such verification for the issuance of the documents. In such cases, the head of the administrative agency, etc. may waive or reduce fees for the relevant documents, subject to consultation with the heads of issuing agencies.

    (4) Where the head of an administrative agency, etc. has processed required documents pursuant to paragraphs (1) through (3), such required documents are deemed processed in compliance with the procedures provided for by relevant Acts and subordinate statutes.

    (5) When the head of each administrative agency, etc. intends to process required documents in a way specified in paragraphs (1) through (3), he/she shall publish the types and the scope of such required documents, related civil petitions, and other necessary matters in advance via the Internet.

    (6) The procedure for processing work pursuant to paragraphs (1) through (5) and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 9 (Processing of Civil Petitions without Appearance)

    (1) In order for civil petitioners to have their civil petitions, etc. processed without necessarily appearing in person at the relevant agency, the head of each administrative agency, etc. shall take measures, such as the improvement of relevant Acts and subordinate statutes and the establishment of facilities and systems as necessary.

    (2) The head of an administrative agency, etc. may open and operate a window for electronic civil petitions on the Internet to implement a system for processing civil petitions without appearance pursuant to paragraph (1): Provided, That if a window has yet to be opened for electronic civil petitions, the head of the administrative agency, etc. may authorize an integrated electronic civil petition window under paragraph (3) to process electronic civil petitions, etc.

    (3) The head of a central agency responsible for administrative affairs may provide support for administrative agencies, etc. to open and operate electronic civil petition windows and may open and operate an integrated electronic civil petition window by interlinking such windows.

    (4) An application, etc. filed by a civil petitioner through an electronic civil petition window under paragraphs (2) and (3) is deemed an application, etc. filed in person with the competent agency responsible for the civil petition prescribed by relevant Acts and subordinate statutes.

    (5) The head of an administrative agency, etc. may charge additional fees for processing civil petitions, etc. filed through an electronic civil petition window under paragraphs (2) and (3), apart from the fees prescribed by related Acts and subordinate statutes, if such fees are required by means prescribed in Article 14.

    (6) The head of an administrative agency, etc. may waive or reduce fees for processing civil petitions, etc. submitted through an electronic civil petition window under paragraphs (2) and (3), notwithstanding the provisions of other Acts and subordinate statutes.

    (7) Necessary matters concerning the opening and operation of an electronic civil petition window under paragraphs (1) through (4), processing fees under paragraph (5), and the scope of civil petitions, etc. subject to waiver or reduction of processing fees under paragraph (6), the rates of such waiver or reduction, and other related matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 9-2 (Provision of Daily Life Information through Integrated Electronic Civil Petition Window)

    (1) The Minister of the Interior and Safety may provide civil petitioners with the services through which such daily life information as the their health examination dates, vaccination dates, renewal dates of drivers’ license, etc. can be perused (hereinafter referred to as “life information viewing services” in this Article). In such cases, the Minister of the Interior and Safety may interlink the integrated electronic civil petition window under Article 9 (3) with information systems of other central administrative agencies, etc. following consultation with the heads of other central administrative agencies, etc. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) The types of daily life information viewing services provided under paragraph (1) shall be determined and publicly announced by the Minister of the Interior and Safety following consultation with the heads of related central administrative agencies, etc. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) In order to provide daily life information viewing services, the Minister of the Interior and Safety may request the heads of other central administrative agencies, etc. to provide data. In such cases, the related central administrative agencies, etc. upon receipt of such request for provision of data shall comply with such request, except in extenuating circumstances. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) The Minister of the Interior and Safety may provide daily life information viewing services only where the relevant civil petitioner agrees to do so. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 10 (Verification of Identities of Civil Petitioners, etc.)

    Whenever it is necessary to verify the identity of a civil petitioner in processing a civil petition, etc., the head of an administrative agency, etc. may verify the identity with the petitioner’s officially authenticated digital signature under subparagraph 3 of Article 2 of the Digital Signature Act (hereinafter referred to as “authenticated digital signature“) or in ways prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 11 (Electronic Notice or Information)

    (1) The head of an administrative agency, etc. may provide notice, etc. to a citizen by an electronic document, even where relevant Acts and subordinate statutes require to give such notice, etc. by a paper document, such as a written notice or information.

    (2) Any notice, etc. given by an electronic document pursuant to paragraph (1) shall be deemed notice, etc. provided in compliance with the procedure provided for by relevant Acts and subordinate statutes.

    (3) The head of each administrative agency, etc. shall, when he/she intends to provide notice, etc. by an electronic document pursuant to paragraph (1), publish the types of and procedure for giving such notice, etc. in advance via the Internet.

    (4) Necessary matters concerning the provision of notice, etc. by an electronic document shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 12 (Electronic Provision of Administrative Information)

    (1) The head of each administrative agency, etc. shall separately provide citizens with information related to civil petitions, such as Acts relevant to civil petitions and subordinate statutes thereof, manuals related to the processing of civil petitions, and the guidelines for processing civil petitions, and other administrative information specified by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree as administrative information related to citizens’ lives, by posting them on the Internet.

    (2) The head of an administrative agency, etc. may separately provide citizens with information published in the Official Gazette, newspapers, bulletins, etc. by posting them on the Internet.

    Article 12-2 (Designation of Public Services and Notification, etc. of Lists)

    (1) The head of a central administrative agency, etc. shall designate the goods, services, etc. provided to those who fulfill prerequisites, such as the elderly, the disabled, and persons entitled to veterans benefits, as public services (hereinafter referred to as “public services”) in accordance with the Acts and subordinate statutes (including ordinances and regulations of local governments) under his/her jurisdiction, and shall notify the Minister of the Interior and Safety of such list. The same shall also apply to cases where a list of public services is modified. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) Matters necessary for the standards for designation of public services and notification, etc. of lists shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 12-3 (Construction, Operation, etc. of Registration System)

    (1) The Minister of the Interior and Safety may construct and operate a system for the registration, management, and utilization of lists of public services (hereinafter referred to as “registration system“). In such cases, such system can be interlinked with information systems of other central administrative agencies, etc., and consultations thereon shall be held with the relevant agencies. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) For the construction, operation, etc. of a registration system, the Minister of the Interior and Safety may request the provision of data on resident registration, family registration, national taxes, local taxes, finance, real estate, national pension, health insurance, etc. held by other administrative agencies, etc. after obtaining prior consent from the relevant civil petitioner. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Article 42 (1) shall apply mutatis mutandis to prior consent set forth in paragraph (2).

    (4) Where a civil petitioner’s individual consent to a request for provision of data under paragraph (2) is obtained, an application filed by a civil petitioner under Article 12-4 (1) shall be deemed a prior consent the Minister of the Interior and Safety is required to obtain from the civil petitioner under the same paragraph. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (5) Where necessary for the construction and operation of a registration system, the Minister of the Interior and Safety may advance pilot projects. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (6) Matters necessary for the construction and operation of a registration system shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 12-4 (Provision, etc. of Lists of Public Services)

    (1) If any civil petitioner applies for the perusal of lists of public services, the head of a local government (referring to the Mayor of a Special Self-Governing City, the Governor of a Special Self-Governing Province, the head of a Si/Gun/Gu (referring to an autonomous Gu); hereafter the same shall apply in this Article) may provide the lists of public services required by the civil petitioner through a registration system.

    (2) When a civil petitioner provided with the lists of public services under paragraph (1) files an application for the provision of any civil services, the head of a local government shall forward the relevant application to the head of the relevant central administrative agency, etc.

    (3) Matters necessary for the provision of lists of public services, application for public services, transfer, etc. shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 13 (Bearing Expenses Incurred in Electronic Provision of Administrative Information)

    (1) The head of an administrative agency, etc. may collect fees from a person, if any, who gains special benefits from administrative information provided via the Internet.

    (2) Necessary matters concerning the criteria for collecting fees under paragraph (1), the procedures therefor, and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 14 (Electronic Payment of Taxes, etc.)

    The head of an administrative agency, etc. may allow citizens to pay taxes, fees, administrative fines, penalty surcharges, penalties, fines, minor fines, etc. by means of electronic money, electronic payment, etc. through information and communications networks, even where other Acts and subordinate statutes require payment thereof by cash, revenue stamp, or other means.

    Article 15 (Electronic Payment of Grants and Benefits)

    When the head of an administrative agency, etc. pays specific grants and benefits to citizens pursuant to the provisions of any Act and subordinate statutes, he/she may pay such specific grants and benefits via information and communications networks.

    SECTION 2.- Provision of Electronic Government Services and Promotion of Their Utilization

    Article 16 (Development and Provision of Electronic Government Services)

    (1) The head of each administrative agency, etc. shall develop and provide electronic government services for enhancing public welfare and convenience, ensuring people’s security, and facilitating business activities such as starting a business and establishing factories, and take measures to continuously supplement and improve such services.

    (2) The head of each administrative agency, etc. shall ensure that users of its electronic government services have easy access to such services and utilize them in a safe and convenient manner and shall keep its electronic government services up-to-date.

    (3) When the head of each administrative agency, etc. develops electronic government services, he/she shall take into account the demands and convenience of users of such services.

    Article 17 (Increased User Involvement)

    When the head of each administrative agency, etc. provides electronic government services, he/she shall guarantee opportunities for their users to participate in the relevant process and express various opinions by means, such as discussions, recommendations, and policy suggestions, and shall actively reflect such recommendations, policy suggestions, etc. in the process of amending relevant Acts and subordinate statutes and systems, improving the electronic government services, etc.

    Article 18 (Introduction and Utilization of Ubiquitous Electronic Government Services)

    (1) The head of each administrative agency, etc. shall deliver services for public administration, transportation, welfare, environment, disaster safety, etc. (hereafter referred to as “ubiquitous electronic government services” in this Article) that can be utilized by citizens, enterprises, etc. anywhere anytime, using advanced information and communications technologies, and shall formulate policies necessary therefor.

    (2) The Minister of the Interior and Safety may pursue pilot projects, if necessary, to facilitate the introduction and utilization of ubiquitous electronic government services under paragraph (1). (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Necessary matters concerning the introduction and utilization of ubiquitous electronic government services under paragraph (1) and pilot projects under paragraph (2) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 19 (Measures for Broader Use of Electronic Government Services)

    The head of each administrative agency, etc. shall take necessary measures to ensure that citizens do not have difficulty accessing or utilizing electronic government services due to their economic, regional, physical, or social conditions.

    Article 20 (Operation of Electronic Government Portal)

    (1) The State shall establish, manage, and facilitate the use of an Internet-based integrated information system (hereinafter referred to as “electronic government portal“) to efficiently deliver electronic government services.

    (2) Matters necessary for the establishment, management, and facilitation of the use of the electronic government portal shall be prescribed by Presidential Decree.

    Article 21 (Engagement and Use of Private Sector in Electronic Government Services)

    (1) The head of an administrative agency, etc. may develop and provide a new service in combination with a service delivered by an individual, enterprise, organization, etc. by entering into a memorandum of understanding, etc. therewith, in order to facilitate the use of electronic government services.

    (2) The head of an administrative agency, etc. may provide necessary assistance to individuals, enterprises, organizations, etc. to develop and provide new services using specific technologies or administrative information of a highly public nature delivered as part of electronic government services (excluding personal information as defined in subparagraph 1 of Article 2 of the Personal Information Protection Act). (Amended by Act nº 10465, Mar. 29, 2011)

    (3) Necessary matters concerning the memorandum of understanding under paragraph (1) and the criteria, procedures, etc. for assistance under paragraph (2) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 22 (Investigation and Analysis of Actual Use of Electronic Government Services)

    (1) The head of an administrative agency, etc. shall, at regular intervals, investigate, analyze, and manage the actual use, etc. of the electronic government services delivered by the agency, and prepare measures to improve such use.

    (2) Detailed matters necessary for the investigation, analysis, and management of the actual use of electronic government services under paragraph (1) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 23 (Efficient Management of Electronic Government Services)

    (1) Where electronic government services provided by administrative agencies, etc. are similar to, or overlap with, one another, or their operational value is considered not high, the head of a central agency responsible for administrative affairs may recommend the integration or scrapping thereof, or other measures to improve such services. (Amended by Act nº 11688, Mar. 23, 2013)

    (2) Necessary matters concerning the criteria and procedures for the integration or scrapping, etc. of electronic government services under paragraph (1) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 24 (Security Measures for Electronic Public Services)

    (1) The Minister of the Interior and Safety shall formulate security measures related to electronic public services through prior consultation with the Director of the National Intelligence Service. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) The head of each central administrative agency, each affiliate thereof, and each local government shall formulate and implement security measures for his/her agency in accordance with the security measures provided for in paragraph (1).

    CHAPTER III.- ELECTRONIC ADMINISTRATIVE MANAGEMENT

    Article 25 (Preparation, etc. of Electronic Documents)

    (1) Documents of each administrative agency, etc. shall be prepared, dispatched, received, stored, preserved, and utilized basically in electronic form: Provided, That the same shall not apply where the nature of specific work requires any other format, or under exceptional circumstances.

    (2) Each administrative agency, etc. shall make the forms of documents sent or received by such agency appropriate for electronic documents.

    (3) Necessary matters concerning the preparation, delivery, receipt, storage, preservation, and utilization of electronic documents of each administrative agency, etc., the method of preparing forms of electronic documents, and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 26 (Formation, Effects, etc. of Electronic Documents, etc.)

    (1) An electronic document prepared by an administrative agency, etc. shall be duly formed when it is approved (referring to approval by electronic means specified by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree).

    (2) An electronic document that has been approved by an ancillary agency or support agency of an administrative agency, etc. with power delegated by the administrative agency or vicariously for and on behalf of the administrative agency may be delivered with the administrative digital signature of the ancillary or support agency under Article 29.

    (3) Any electronic document and digitized document under this Act shall have the same effect as a paper document, except as otherwise provided for in other Acts.

    Article 27 (Transmission and Receipt of Electronic Documents)

    (1) Any individual, corporation, or organization seeking to transmit to an administrative agency, etc. an electronic document that requires verification of the identity of the transmitter shall transmit such document with an authenticated digital signature or by electronic means recognized by other Acts and subordinate statutes as means that may be used for the verification of the identity of a person: Provided, That any public institution seeking to exchange electronic documents with an administrative agency shall use its administrative digital signature in transmitting and receiving such electronic documents.

    (2) If clarification of the time of delivery or arrival of an electronic document is required, the electronic document shall be transmitted or received by electronic means specified by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree so that the time of delivery or arrival can be objectively verified.

    Article 28 (Timing of Delivery or Arrival of Electronic Documents)

    (1) An electronic document transmitted to an administrative agency, etc. shall be deemed delivered by the transmitter at the time the transmission of the electronic document is electronically recorded by using an information system.

    (2) An electronic document transmitted by an administrative agency, etc. shall be deemed to arrive at the addressee at the time it is entered in the information system, etc. designated by the addressee: Provided, That if the information system, etc. is not designated, such electronic document is deemed to arrive at the addressee at the time it is entered in the information system, etc. under the control of the addressee.

    (3) If a transmitter had delivered a document, etc. required to arrive by a specific deadline in electronic form by electronic means described in Article 27 (2) prior to the deadline, but the document did not arrive by the deadline due to failure of the information system or related device of the addressee, the deadline that applies only to the transmitter is deemed to fall on the day immediately following the date on which the failure is eliminated.

    (4) If an electronic document that arrives at, and is received by, an administrative agency, etc. is illegible, the administrative agency, etc. shall regard it as a defective document and shall demand the transmitter correct the defect within a period reasonably prescribed as necessary for such correction, while if an electronic document delivered by an administrative agency, etc. that arrives at the addressee is illegible, such document shall not be deemed a document that duly arrives.

    Article 29 (Authentication of Administrative Digital Signatures)

    (1) Each electronic document prepared by an administrative agency shall bear an administrative digital signature: Provided, That any administrative agency may use an authenticated digital signature to efficiently operate electronic transactions under subparagraph 5 of Article 2 of the Framework Act on Electronic Documents and Transactions. (Amended by Act nº 11461, Jun. 1, 2012)

    (2) The head of each central agency responsible for administrative affairs shall authenticate administrative digital signatures.

    (3) In authenticating administrative digital signatures under paragraph (2), the head of each central agency responsible for administrative affairs shall prepare technical standards for administrative digital signatures in consultation with the Minister of the Interior and Safety to increase compatibility with authenticated digital signatures and shall also prepare measures to link administrative digital signatures with authenticated digital signatures. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) An administrative digital signature authenticated pursuant to paragraph (2) and applied to an electronic document shall be deemed the official seal or official authentication of the administrative agency or public institution indicated in the electronic document or the signature of the person in direct charge of relevant affairs in the relevant agency, and the content thereof shall be presumed not to have been modified after the administrative digital signature was applied thereto.

    (5) Necessary matters concerning the authentication of administrative digital signatures shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 30 (Electronic Management of Administrative Knowledge)

    The head of an administrative agency, etc. may establish and operate an electronic processing system for utilizing matters deemed considerably valuable as data that can be used to make decisions on important policies thereof, out of administrative information relevant to duties under his/her jurisdiction, personal experiences, practical knowledge and techniques produced and circulated within the agency.

    Article 30-2 (Inter-Linkage and Integration of Electronic Systems)

    (1) For improving administrative efficiency and the integrated and efficient provision of services to the public, the head of a central administrative agency, etc., may interlink or integrate the electronic systems under his/her jurisdiction with those of other central administrative agencies, etc.

    (2) Necessary matters concerning the standards for inter-linkage and integration of electronic systems and the procedures, methods, etc. therefor, shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 30-3 (Construction and Utilization of Data-Sharing Hub)

    (1) The Minister of the Interior and Safety may construct and operate a system for sharing data collected and managed through electronic systems (hereinafter referred to as “data-sharing hub“). (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) The head of a central administrative agency, etc., may, through the data-sharing hub, jointly use the data collected and managed by the heads of other central administrative agencies, etc.

    (3) Necessary matters concerning the scope of data and sharing procedures set forth in paragraphs (1) and (2) shall be prescribed by Presidential Decree. (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 30-4 (Collection and Utilization of Disclosed Internet Data)

    (1) For the formulation of policies, decision-making, etc., the head of an administrative agency, etc. may collect and utilize disclosed Internet data, other than the personal information defined in subparagraph 1 of Article 2 of the Personal Information Protection Act, through the data-sharing hub.

    (2) Necessary matters concerning the scope of collection of open Internet data, procedures for utilization thereof, etc. under paragraph (1), shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 31 (Gathering Opinions through Information and Communications Networks)

    (1) With regard to the enactment and amendment of an Act or a subordinate statute relevant to affairs under the control of an administrative agency, etc., the matters that require pre-announcement of administration pursuant to Article 46 (1) of the Administrative Procedures Act, and other matters that require holding of a public hearing, poll, or others pursuant to relevant Acts and subordinate statutes, the head of the responsible administrative agency, etc. shall proceed in tandem to gather opinions through information and communications networks.

    (2) The head of each administrative agency, etc. shall allow a party or any interested party who has an opinion with regard to a disposition made by the agency to present his/her opinion through an information and communications network.

    (3) The head of each administrative agency, etc. shall readjust relevant Acts and subordinate statutes and take other measures in order to facilitate the gathering and presentation of opinions under paragraphs (1) and (2).

    (4) The head of each administrative agency, etc. shall, when he/she conducts any statistical survey subject to citizens, a survey on citizens’ satisfaction with the processing of civil petitions, or any similar survey, actively take measures to utilize information and communications networks.

     Article 32 (Electronic Performance of Work, etc.)

    (1) The head of an administrative agency, etc. may adopt an online video conferencing method using information and communications networks in conducting administrative affairs. In such cases, the head of an administrative agency, etc. shall endeavor to preferentially utilize such online video conferencing when conducting business between distant locations. (Amended by Act nº 12346, Jan. 28, 2014)

    (2) The head of a central agency responsible for administrative affairs may provide necessary assistance for the adoption, utilization, etc. of online video conferencing under paragraph (1). (Inserted by Act nº 12346, Jan. 28, 2014)

    (3) The head of an administrative agency, etc. may, whenever necessary, allow his/her employees to conduct some form of remote work through information and communications networks without necessarily designating a specific place of service. In such cases, the head of an administrative agency, etc. shall formulate measures to prevent illegal access to information and communications networks and other security measures. (Amended by Act nº 12346, Jan. 28, 2014)

    (4) The head of an administrative agency, etc. may provide online remote educational and training programs for his/her employees through information and communications networks. (Amended by Act nº 12346, Jan. 28, 2014)

    (5) Matters necessary to facilitate the performance of remote work under paragraphs (1) through (4) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree. (Amended by Act nº 12346, Jan. 28, 2014)

    Article 33 (Reduction of Paper Documents)

    (1) The head of each administrative agency, etc. shall minimize the formulation, receipt, circulation, and storage of paper documents by digitalizing administrative affairs and civil petitions, sharing administrative information with other agencies, or by other means, and shall formulate plans to continuously reduce paper documents in the relevant agency.

    (2) The head of each administrative agency, etc. shall revise its methods of working, etc. in the relevant agency in a manner that minimizes unnecessary printing of paper documents in the process of formulating and reporting documents.

    (3) With the aim of reducing paper documents, the head of each administrative agency, etc. shall amend or supplement Acts and subordinate statutes, directives, etc. that stipulate application, reports, submission, notice, or notification in paper form to allow such application, etc. by electronic means as well, except under exceptional circumstances.

    (4) The head of a central agency responsible for administrative affairs may, if necessary, formulate and implement directives to reduce paper documents or investigate the actual use, etc. of paper documents.

    Article 34 (Identities of Persons in Charge and their Rights of Access)

    The head of each administrative agency, etc. shall manage and check the identity, rights of access, etc. of a person in charge of relevant work, seeking to access an information system or to use administrative information for electronically processing civil petitions or conducting relevant affairs, in a manner prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 35 (Prohibited Acts)

    No person shall commit any of the following acts when handling or utilizing administrative information: (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. Forging, altering, damaging, or deleting administrative information for the purpose of interfering with affairs related to the processing of such information;

    2. Forging, altering, damaging, or using an information system for the sharing of administrative information without good cause;

    3. Disclosing or disseminating, to the public, any method or program by which administrative information can be altered or deleted;

    4. Divulging administrative information, the disclosure of which is prohibited, without good cause;

    5. Processing administrative information without due authority or beyond the authority accorded;

    6. Aiding or abetting another person, without due authority, to use administrative information;

    7. An agency having obtained the approval for sharing administrative information from the Minister of the Interior and Safety pursuant to Article 39 (2), but sharing administrative information in a manner that has not been approved or storing administrative information in an information system or storage device that has not been approved;

    8. Receiving administrative information from an administrative agency, etc. or accessing administrative information by fraud or other improper means.

    CHAPTER IV.- SHARING ADMINISTRATIVE INFORMATION

    Article 36 (Efficient Management and Use of Administrative Information)

    (1) The head of each administrative agency, etc. shall share administrative information collected and held by such agency with other administrative agencies, etc. that need such information and shall not endeavor to separately gather identical information where he/she can be provided with reliable administrative information from other administrative agencies, etc.

    (2) The head of each administrative agency, etc. collecting and possessing administrative information (hereinafter referred to as “agency in possession of administrative information“) may allow other administrative agencies, etc., banks authorized to engage in banking business pursuant to Article 8 (1) of the Banking Act, and legal entities, organizations, or institutions specified by Presidential Decree to share administrative information held by the agency in possession of such administrative information. (Amended by Act nº 10303, May 17, 2010)

    (3) The Minister of the Interior and Safety may publicly announce the detailed examination of the lists of administrative information held by administrative agencies, etc. and the outcomes thereof through information systems and conduct research on demand for the administrative information that administrative agencies, etc. need to share with each other. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12346, Jan. 28, 2014; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) The head of each central agency responsible for administrative affairs shall promote the readjustment of relevant Acts, subordinate statutes, and systems in order to ensure the effective management of administrative information, such as production, processing, utilization, provision, storing, scrapping, etc. of administrative information.

    (5) The Minister of the Interior and Safety may establish and publish guidelines for the criteria, procedures, etc. for sharing administrative information, in consultation with the heads of other central agencies responsible for administrative affairs. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (6) Necessary matters concerning the methods, etc. for examination of lists of administrative information under paragraph (3) shall be prescribed by Presidential Decree. (Inserted by Act nº 12346, Jan. 28, 2014)

    Article 37 (Administrative Information-Sharing Center)

    (1) In order to ensure the effective sharing of administrative information, the Minister of the Interior and Safety may establish an Administrative Information-Sharing Center (hereinafter referred to as the “Sharing Center“) under his/her jurisdiction to implement policies necessary to share administrative information, as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) Any agency sharing administrative information pursuant to Article 36 (2) shall share such information through the Sharing Center unless good cause exists.

    Article 38 (Administrative Information Subject to Sharing)

    (1) Administrative information that can be shared through the Sharing Center pursuant to Articles 36 and 37 shall be as follows:

    1. Administrative information necessary to process civil petitions, etc.;

    2. Administrative information that can be used as reference to carry out administrative affairs, such as statistical information, bibliographic information, and policy information;

    3. Administrative information deemed essential by an administrative agency, etc. to carry out its official duties prescribed by any Act and subordinate statutes, etc.

    (2) Administrative information related to national security of the State, administrative information classified as confidential under any Act or subordinate statute, or any similar administrative information may be excluded from information subject to sharing.

    (3) Each agency in possession of administrative information shall ensure that it provides the most up-to-date and accurate administrative information for sharing.

    (4) Administrative information shall be shared to the extent necessary for satisfying the specific purpose of its use.

    (5) The type, scope, category, etc. of information subject to sharing in the scope of administrative information under paragraph (1) shall be prescribed by Presidential Decree.

    Article 39 (Applications for Sharing Administrative Information and Approvals thereof)

    (1) Any agency intending to use administrative information through the Sharing Center pursuant to Article 37 (2) shall apply for the sharing of administrative information to the Minister of the Interior and Safety by specifying the administrative information to be subject to sharing and the scope thereof, the purpose and method of sharing, the agency in possession of such administrative information, etc., as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) Upon receipt of an application for the sharing of administrative information under paragraph (1), the Minister of the Interior and Safety may approve such application by specifying conditions for sharing, etc. as prescribed by Presidential Decree: Provided, That he/she shall not approve an application for sharing in any of the following cases: (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. Where the administrative information, the sharing of which has been applied for, is defined as confidential or non-disclosable by any other Act or an order delegated by such other Act (limited only to the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, the Board of Audit and Inspection Regulations, Presidential Decrees, ordinances of the Prime Minister, Ministerial ordinances, and municipal ordinances and rules);

    2. Where the administrative information, the sharing of which has been applied for, is related to the guarantee of national security or the national defense, unification of the two Koreas, diplomatic relations, etc. and deemed likely to significantly harm the material national interest if it is so shared;

    3. Where the administrative information, the sharing of which has been applied for, is deemed as unnecessary for the performance of inherent duties of the agency that has applied for the sharing (hereinafter referred to as “applicant agency“);

    4. Other cases deemed likely to defeat the purpose of sharing administrative information under this Act or the security and reliability of administrative information prescribed by Presidential Decree.

    (3) The Minister of the Interior and Safety shall, prior to the grant of the approval pursuant to paragraph (2), obtain the consent of the head of the agency holding relevant administrative information, and in such cases, the head of the agency holding relevant administrative information shall cooperate in sharing administrative information, except under exceptional circumstances. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) Where administrative information that an applicant agency intends to share is a personal information file described in Article 32 of the Personal Information Protection Act, the Minister of the Interior and Safety shall grant the approval therefor pursuant to paragraph (2) after deliberation and resolution by the Personal Information Protection Committee referred to in Article 7 of the said Act: Provided, That this shall not apply where otherwise provided for in any other Act. (Amended by Act. nº 10465, Mar. 29, 2011; Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (5) The Minister of the Interior and Safety may approve the sharing of administrative information by simplifying or skipping the procedures described in paragraphs (1) through (4), in either of the following cases: (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 13459, Aug. 11, 2015; Act nº 14839, Jul. 26, 2017)

    1. Where, with regard to an administrative affair, the sharing of which has already been approved, a simple change in its name, department in charge, etc. is to be made due to enactment or amendment of an Act or subordinate statutes;

    2. Where sharing administrative information is required to process civil petitions listed in the standards for performing clerical services for civil petitions referred to in Article 36 (1) of the Civil Petitions Treatment Act.

    (6) Where an administrative affair subject to sharing is an affair common to several administrative agencies, etc. as prescribed by Acts and subordinate statutes, the Minister of the Interior and Safety may approve the sharing of such administrative affair among all the agencies handling such affair, even though no separate application therefor is filed by individual agencies. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (7) Each agency that has obtained approval pursuant to paragraph (2) shall designate any of the following persons to operate the relevant business as prescribed by Presidential Decree:

    1. A person with the right to engage in overall management of matters related to the sharing in the relevant agency;

    2. A person with the right to grant authority to access administrative information to responsible persons in the relevant agency;

    3. A person with the right to access relevant work and administrative information processed by such sharing.

    Article 40 (Constructive Review, Approval and Consultations)

    (1) Where an applicant agency has obtained approval for sharing pursuant to Article 39 (2) with regard to administrative information set forth in the main sentences of the provisions referred to in each of the following subparagraphs, it shall be deemed capable of providing such administrative information to the applicant agency pursuant to the provisos to the corresponding provisions: (Amended by Act nº 12346, Jan. 28, 2014; Act nº 14474, Dec. 27, 2016)

    1. Article 81-13 (1) of the Framework Act on National Taxes;

    2. Article 116 (1) of the Customs Act;

    3. Article 86 (1) of the Framework Act on Local Taxes.

    (2) Where an applicant agency has obtained approval to share administrative information pursuant to Article 39 (2) and such administrative information contains any of the following, the following review, approval, consultations, etc. corresponding thereto shall be deemed done, obtained, or provided for such administrative information: (Amended by Act. nº 10580, Apr. 12, 2011; Act nº 12592, May 20, 2014; Act nº 12738, Jun. 3, 2014)

    1. Review, approval, or consultation with regard to the use or utilization of computerized registration data as prescribed in Article 109 (2) of the Registration of Real Estate Act;

    2. Review, approval, or consultation with regard to the use or utilization of computerized data on registration as prescribed in Article 13 (1) of the Act on the Registration, etc. of Family Relationships;

    3. Review or approval with regard to the use or utilization of computer processing information data on resident registration as prescribed in Article 30 of the Resident Registration Act;

    4. Review or approval with regard to the use or utilization of cadastral computerized data as prescribed in Article 76 of the Act on the Establishment, Management, etc. of Spatial Data;

    5. Review or approval with regard to the use of computerized data as prescribed in Article 69 (2) of the Motor Vehicle Management Act;

    6. Review or approval with regard to the use of computerized data as prescribed in Article 32 of the Building Act;

    7. Review, approval or consultation with regard to the use or utilization of computerized registration data as prescribed in Article 21 (2) of the Commercial Registration Act.

    Article 41 (Withdrawal or Suspension of Approval for Sharing Administrative Information)

    (1) Where an agency using administrative information after obtaining the approval for sharing pursuant to Article 39 (2) (hereinafter referred to as “user agency“) or an employee belonging to such agency falls under any of the following, the Minister of the Interior and Safety may withdraw the approval granted to the relevant user agency: (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. Where the agency or employee violates the conditions for sharing determined pursuant to Article 39 (2);

    2. Where an event corresponding to any of the subparagraphs of Article 39 (2) arises after the agency files an application for sharing;

    3. Where the agency or employee commits a prohibited act under Article 35 or violates the duty to comply under Article 74;

    4. Other cases similar to subparagraphs 1 through 3 where there is any unavoidable reason to justify prohibiting the sharing of administrative information, as prescribed by Presidential Decree.

    (2) Where it is deemed that a reason falling under any of the subparagraphs of paragraph (1) arises temporarily, the Minister of the Interior and Safety may temporarily suspend the relevant user agency’s sharing of administrative information until the cause for the event is settled, notwithstanding paragraph (1). (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Where any user agency sharing administrative information or any employee belonging to such agency falls under any of the subparagraphs of paragraph (1), an agency in possession of such administrative information may request the Minister of the Interior and Safety to withdraw the approval granted to the relevant agency for the sharing of administrative information under its jurisdiction or to temporarily suspend the relevant user agency’s sharing of such information. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) Where the Minister of the Interior and Safety withdraws the approval for the sharing of administrative information under paragraph (1) or suspends such sharing under paragraph (2), he/she shall notify the relevant user agency and the agency in possession of such administrative information of the detailed grounds therefor. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (5) Matters necessary for the withdrawal or suspension of sharing administrative information, and other relevant matters shall be prescribed by Presidential Decree.

    Article 42 (Prior Consent of Owners of Information)

    (1) When any user agency shares administrative information containing personal information through the Sharing Center, it shall obtain the prior consent of the owner of the said information as defined in subparagraph 3 of Article 2 of the Personal Information Protection Act (hereinafter referred to as “owner of information“) so that he/she is aware of the following matters. In such cases, the consent under Article 18 (2) 1, subparagraph 1 of Article 19 or Article 24 (1) 1 shall be deemed obtained. (Amended by Act. nº 10465, Mar. 29, 2011; Act nº 12346, Jan. 28, 2014)

    1. The purpose of sharing the information;

    2. The administrative information subject to sharing and the scope of sharing;

    3. The name of the user agency sharing the information.

    (2) Notwithstanding paragraph (1), where it is impossible for a user agency to obtain prior consent from the owner of information or it is deemed improper to obtain such prior consent in any of the following cases, the user agency shall make the matters listed in the subparagraphs of paragraph (1) known to the said owner of information after the relevant administrative information is shared, as prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree: Provided, That where a user agency shares administrative information for a criminal investigation in the case of subparagraph 3, it shall make those listed in the subparagraphs of paragraph (1) known to the owner of information on or after the date public prosecution is initiated or a disposition not to arrest or initiate public prosecution (except for a decision to suspend indictment) is made with regard to the relevant case:

    1. Where sharing the relevant information is urgently required to protect the life or body of the owner of information;

    2. Where sharing the relevant information is unavoidable to impose a duty on the owner of information or revoke or withdraw any right or interest of the owner of information pursuant to any Act or subordinate statute;

    3. Where sharing the relevant information is unavoidable to perform affairs related to sanctions on the owner of information who has violated any Act or subordinate statute, such as investigation or punishment of the owner of information;

    4. Other cases deemed considerably improper to obtain the consent of the owner of information in performing affairs stipulated by an Act or subordinate statute, in consideration of the nature of the relevant affairs or information, as prescribed by Presidential Decree.

    (3) The Minister of the Interior and Safety shall disclose the detailed scope of affairs and administrative information that can be shared without the prior consent of the owner of information pursuant to paragraph (2), as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    Article 43 (Rights of Owners of Information to Request Access)

    (1) Any owner of information may apply to the Minister of the Interior and Safety or the head of the relevant user agency for access to the following matters with regard to the administrative information about him/herself, among the information shared through the Sharing Center: (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. The user agency;

    2. The purpose of sharing the information;

    3. The type of the information shared;

    4. The time of sharing the information;

    5. Legal grounds for sharing the administrative information.

    (2) Upon receipt of an application filed by an owner of information under paragraph (1), the Minister of the Interior and Safety and the head of each user agency shall notify the owner of information about the matters listed in the subparagraphs of paragraph (1) within ten days from the date of filing an application, unless any good reason exists. In such cases, if there is any good reason making it impossible to give notice within ten days, he/she shall notify without delay when the relevant reason ceases to exist. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Where a user agency shares administrative information for a criminal investigation in cases under paragraph (2), it shall notify the owner of information thereof within 30 days of the date public prosecution is initiated or a disposition not to arrest or initiate public prosecution (except for a decision to suspend indictment) is made with regard to the relevant case.

    (4) If a user agency fails to give notice under paragraph (2), the owner of information may directly apply to the Minister of the Interior and Safety for access to the matters listed in the subparagraphs of paragraph (1) related to him/herself, among the information shared by the user agency. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (5) Matters necessary for the procedures for the access, etc. under paragraphs (1) through (4) shall be prescribed by Presidential Decree.

    (6) The Minister of the Interior and Safety shall keep, manage, and disclose records related to the administrative information shared through the Sharing Center, such as its title and frequency of sharing, as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    Article 44 (Charges for Sharing Administrative Information)

    (1) Any agency that provides administrative information through the Sharing Center may charge fees therefor, to the agency that uses the information.

    (2) Necessary matters concerning the subject matters and scope of the charges for providing administrative information and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    CHAPTER V.- STRENGTHENING OPERATIONAL BASIS FOR ELECTRONIC GOVERNMENT

    SECTION 1.- Introduction and Utilization of Information Technology Architecture

    Article 45 (Formulation, etc. of Master Plan for Information Technology Architecture)

    (1) The Minister of the Interior and Safety shall formulate a master plan to introduce and disseminate an information technology architecture (hereinafter referred to as the “Master Plan“) in a systematic manner in consultation with the heads of related administrative agencies, etc. (Amended by Act nº 11688, Mar. 23, 2013; Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) The Minister of the Interior and Safety shall formulate a pan-Governmental information technology architecture in compliance with the Master Plan. (Amended by Act nº 11688, Mar. 23, 2013; Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) The Minister of the Interior and Safety shall establish and publish guidelines for the introduction and operation of an information technology architecture as well as the construction and operation of an information system, and the head of each administrative agency, etc. shall comply with such guidelines. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) The Minister of the Interior and Safety shall formulate policies for interlinking an information technology architecture with related systems, such as budgets and performance, and for developing them in consultation with the heads of related central administrative agencies, and the head of each administrative agency, etc. shall endeavor to reflect such policies in any work under his/her jurisdiction, except under exceptional circumstances. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    Article 46 (Introduction and Operation of Information Technology Architecture for each Agency)

    (1) The head of each administrative agency, etc. prescribed by Presidential Decree (hereinafter referred to as “agency to introduce an architecture“) shall formulate a plan for the introduction of an information technology architecture and submit such plan to the Minister of the Interior and Safety, as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) The head of each agency to introduce an architecture shall introduce and operate the information technology architecture in accordance with the plan under paragraph (1) and maintain and develop the architecture, to ensure the efficient work processing and facilitation of informatization in the relevant agency.

    Article 47 (Facilitating Introduction and Operation of Information Technology Architecture)

    (1) In order to facilitate the introduction and operation of an information technology architecture, the Minister of the Interior and Safety may develop and disseminate a reference model for an information technology architecture jointly usable by administrative agencies, etc. (referring to a model for securing consistency, compatibility, etc. by defining the components of an information technology architecture in line with the standardized classification system and format; hereinafter the same shall apply). (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) The Minister of the Interior and Safety may provide administrative agencies, etc. seeking to introduce and operate an information technology architecture, with technology relating to the introduction and operation of such architecture, education and training, and other necessary assistance, as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) In order to make information relating to an information technology architecture available to every administrative agency, etc., the Minister of the Interior and Safety shall establish and operate a system for managing and providing information relating to the reference model, pan-Governmental information technology architecture, the current status of implementation and operation of the information technology architecture for each agency, and other relevant matters. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) The Minister of the Interior and Safety may recommend that the private sector in close relationship with an administrative agency, etc., which establishes or operates an information system in connection with the information system of administrative agency, etc., implement and operate an information technology architecture. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    Article 48 (Re-Design of Work Processes Compatible with Information and Communications Technologies)

    (1) When the head of each administrative agency, etc. introduces information and communications technologies to any work under his/her jurisdiction, he/she shall re-design its pre-existing organization, placement of manpower, work processes, etc. in a manner compatible with the implementation of the information and communications technologies, and shall implement such re-design.

    (2) If the scope of work process re-designed pursuant to paragraph (1) involves work of two or more administrative agencies, etc., the head of a relevant administrative agency, etc. may request the heads of related administrative agencies, etc. to cooperate in such re-design, and the heads of related administrative agencies, etc. so requested shall comply with such request, except under exceptional circumstances.

    (3) The head of each administrative agency, etc. shall, if necessary, readjust Acts, subordinate statutes, and systems relevant to work under his/her jurisdiction in accordance with the re-design of work processes under paragraphs (1) and (2) and may request improvement of Acts, subordinate statutes, and systems under jurisdiction of other administrative agencies, etc.

    SECTION 2.- Laying Groundwork for Efficient Management of Information Resources

    Article 49 (Technical Evaluations for Securing Interoperability, etc.)

    (1) When the head of an administrative agency, etc. intends to undertake a project to build an information system, the characteristics and the project size of which meet the criteria prescribed by Presidential Decree, he/she shall conduct technical evaluations of each of the following in accordance with the guidelines under Article 45 (3) before confirming the project plan:

    1. Interoperability of the information system;

    2. Information sharing;

    3. Efficiency of the information system;

    4. Technical convenience of access to information;

    5. Technical suitability of establishment and operation of the information system.

    (2) The head of an administrative agency, etc. may, if necessary, allow an agency meeting the qualifications prescribed by Presidential Decree to conduct technical evaluations under paragraph (1) before formulating the project plan.

    Article 50 (Standardization)

    The head of each central agency responsible for administrative affairs may take necessary measures for the standardization of official electronic documents, administrative codes, and computers and other devices commonly used by administrative agencies, etc., as prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 51 (Designation and Utilization of Services for Sharing)

    (1) The head of a central agency responsible for administrative affairs may designate, modify, or revoke standardized information resources that can be utilized by multiple administrative agencies, etc. or the private sector (hereinafter referred to as “services for sharing“), among the information resources held by administrative agencies, etc., in consultation with the heads of related administrative agencies, etc. and may find and select outstanding information resources among them and distribute such resources to other administrative agencies, etc.

    (2) The head of a central agency responsible for administrative affairs may build and operate a system to manage services for sharing to facilitate the efficient distribution and utilization of such services.

    (3) The head of each administrative agency, etc. shall prioritize utilizing the services for sharing designated under paragraph (1) in building its information system, and register services that can be utilized by other administrative agencies, etc. or the private sector, among the services developed by the agency, with the system to manage services for sharing under paragraph (2) and continue to manage them.

    (4) Any agency developing and distributing outstanding information resources may charge fees therefor to the agency that uses the information resources.

    (5) The head of each central agency responsible for administrative affairs shall formulate policies for distributing and disseminating services for sharing.

    (6) Detailed matters concerning the provisions of paragraphs (1) through (5) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 52 (Establishment of Information and Communications Networks)

    (1) The head of each central agency responsible for administrative affairs shall formulate a plan for the establishment and operation of an information and communications network through which administrative agencies, etc. are integrated and interlinked, in consultation with the Minister of the Interior and Safety. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) When the head of an administrative agency, etc. intends to establish and operate an information and communications network, he/she shall design and operate such network in a manner that can be linked to the information and communications networks of other administrative agencies, etc. to ensure the efficient operation of the networks and the smooth flow of various kinds of administrative information.

    (3) The Minister of the Interior and Safety shall establish and implement a system for the use of information and communications services, necessary to enable administrative agencies, etc. to use information and communication networks at a minimum cost. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    Article 53 (Formulation, etc. of Plans for Fostering Experts on Informatization)

    (1) The head of a central agency responsible for administrative affairs may formulate and promote plans for fostering experts on informatization, developing experts on informatization, qualification systems, etc. with the aim of enhancing informatization capability of public officials and facilitating the efficient management of information resources.

    (2) The head of each central administrative agency and the head of each local government shall formulate and implement its own action plan in accordance with the plans for fostering experts on informatization referred to in paragraph (1).

    (3) Necessary matters concerning the development of experts on informatization, etc. other than those provided for in paragraphs (1) and (2) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 54 (Integrated Management of Information Resources)

    (1) The head of each administrative agency, etc. shall systematically prepare and manage the current status of the information resources possessed by the relevant agency and statistical data thereon (hereinafter referred to as “current status of information resources, etc.”).

    (2) The Minister of the Interior and Safety may survey the demand for informatization in order to facilitate the sharing of information resources between administrative agencies, etc. and their efficient management, and may establish integrated standards, principles, etc. for information resources (hereinafter referred to as “standards for integrating information resources“) for the comprehensive integration and management of information resources. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12346, Jan. 28, 2014; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for the preparation and management of the current status of information resources, etc., matters to be included in the standards for integrating information resources, and other relevant matters shall be prescribed by Presidential Decree.

    Article 55 (Establishment and Operation of Local Information Integration Centers)

    (1) A local government may establish and operate a Local Information Integration Center to efficiently manage information resources and promote informatization at the local level on an integrated basis and may, if necessary, establish and operate the Local Information Integration Center together with the State or any other local government or governments.

    (2) The State may provide administrative, financial, technical, and other necessary assistance in establishing and operating the Local Information Integration Centers referred to in paragraph (1).

    (3) The head of a local government intending to establish a Local Information Integration Center shall have prior consultation with the Minister of the Interior and Safety to prevent duplicative investment, etc, pursuant to Article 67 (1). (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) Matters necessary for the establishment and operation of the Local Information Integration Centers, other than those provided for in paragraphs (1) through (3), shall be prescribed by Presidential Decree.

    SECTION 3.- Improving Safety and Reliability of Information Systems

    Article 56 (Formulation and Implementation of Security Measures for Information and Communications Networks)

    (1) The National Assembly, the Judiciary, the Constitutional Court, the National Election Commission, and the Executive Branch shall prepare security measures for ensuring the safety and reliability of information and communications networks, administrative information, etc. necessary for the realization of electronic government.

    (2) The head of each administrative agency shall formulate and implement security measures for information and communications networks, administrative information, etc. under his/her jurisdiction in conformity with the security measures under paragraph (1).

    (3) The head of each administrative agency shall take security measures, the safety of which has been confirmed by the Director of the National Intelligence Service, to prevent electronic documents from being forged, altered, damaged, or leaked in the course of preserving and circulating electronic documents through an information and communications network, and the Director of the National Intelligence Service may conduct an inspection to ensure such measures have been taken.

    (4) Paragraph (3) shall be applicable to an agency responsible for processing administrative affairs of the National Assembly, the Judiciary, the Constitutional Court, or the National Election Commission, only if the head of the agency deems it necessary to take such measures: Provided, That the head of the agency shall, when he/she deems it unnecessary, take security measures similar to those provided for in paragraph (3).

    Article 56-2 (Prevention of, Responses to, etc. System Failures)

    (1) The head of each administrative agency shall formulate measures for preventing and responding to system failures for the stable operation and management of the information systems belonging to the relevant agency and the agencies under its jurisdiction.

    (2) Matters necessary for the prevention of and response to system failures under paragraph (1), shall be prescribed by National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, and Presidential Decree.

    (Article Inserted by Act nº 12346, Jan. 28, 2014)

    Article 57 (Supervision of Information Systems in Administrative Agencies, etc.)

    (1) The head of each administrative agency, etc. shall request a supervisory corporation under Article 58 (1) to supervise its information system, the characteristics and the project size of which meet the criteria prescribed by Presidential Decree: Provided, That the same shall not apply to electronic government projects prescribed by Presidential Decree the management of which is entrusted under Article 64-2. (Amended by Act nº 12346, Jan. 28, 2014)

    (2) The head of each administrative agency, etc. shall, with regard to a project subject to supervision, allow his/her employees and the business operator constructing the relevant information system to provide necessary assistance to supervisors in performing their duties, and shall not intervene in, nor interfere with, their work without good cause.

    (3) The head of each administrative agency, etc. shall, with regard to a project subject to supervision under paragraph (1), allow the business operator constructing the relevant information system to reflect the results of the supervision in the project.

    (4) Notwithstanding paragraph (1), the head of an agency dealing with information prescribed by Presidential Decree, such as information for guaranteeing national security, may allow an institution determined by the head of the agency to supervise its information system.

    (5) The Minister of the Interior and Safety shall determine and publicly announce standards necessary for carrying out supervision of information systems, such as the scope of supervision, procedures for supervision, matters to be observed, etc. (hereinafter referred to as “supervision standards“): Provided, That for matters relating to the security of information systems, he/she shall consult in advance with the heads of relevant agencies. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (6) A corporation or institution carrying out supervision pursuant to paragraphs (1) and (4) shall verify whether the relevant information system is being developed and constructed appropriately, in compliance with the supervision standards.

    (7) The scope of duty of a corporation or institution carrying out supervision pursuant to paragraph (6), procedures for supervision, and other necessary matters shall be prescribed by Presidential Decree.

    Article 58 (Registration of Supervisory Corporations)

    (1) Any person intending to carry out supervision of an information system shall register him/herself with the Minister of the Interior and Safety as a corporation after meeting requirements prescribed by Presidential Decree, such as technical and financial capability and other matters necessary for supervision of an information system. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (2) When a corporation registered under paragraph (1) (hereinafter referred to as “supervisory corporation“) intends to modify any registered matters, he/she shall report such modification to the Minister of the Interior and Safety in advance: Provided, That this shall not apply to modification of any insignificant matters prescribed by Presidential Decree, such as modification of equity capital within the extent of registration requirements. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for the registration of supervisory corporations, modification of registered matters, and other relevant matters shall be prescribed by Presidential Decree.

    Article 59 (Matters to be Observed by Supervisory Corporations)

    (1) Each supervisory corporation shall require supervisors under Article 60 (1) to perform supervisory duties.

    (2) No supervisory corporation shall prepare a false report on supervision, and it shall carry out supervision of information systems in good faith.

    (3) No supervisory corporation shall allow another person to carry out supervision of information systems using its own name.

    Article 60 (Supervisors)

    (1) Any person intending to work as a supervisor shall meet specific requirements for qualification prescribed by Presidential Decree, such as technical requirements for each grade, and shall receive education necessary for performing supervisory duties, as prescribed by Presidential Decree.

    (2) The Minister of the Interior and Safety shall issue supervisor’s certificates to persons satisfying the requirements for qualification under paragraph (1) and manage those certificates, as prescribed by Presidential Decree. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) No supervisor shall allow another person to perform supervisory duties using his/her own name, or lend his/her supervisor’s certificate to another person.

    Article 61 (Disqualification of Supervisory Corporations, etc.)

    (1) No corporation with either of the following persons serving as its executive officer shall be registered as a supervisory corporation under Article 58 (1): (Amended by Act nº 12346, Jan. 28, 2014)

    1. An incompetent under the adult guardianship or a quasi-incompetent under the limited guardianship;

    2. An executive officer of a supervisory corporation of which registration has been revoked pursuant to Article 62, for whom two years have not elapsed from the date the registration was revoked (referring to a person who has committed an act constituting a cause for such revocation and its representative).

    (2) No person corresponding to paragraph (1) 1 shall become a supervisor under Article 60.

    (3) Matters necessary to confirm grounds for disqualification of supervisory corporations, etc. shall be prescribed by Presidential Decree.

    Article 62 (Revocation of Registration of Supervisory Corporations, etc.)

    (1) When any supervisory corporation falls under any of the following subparagraphs, the Minister of the Interior and Safety may revoke its registration or order suspension of its business for a prescribed period not exceeding one year: Provided, That he/she shall revoke the registration of a supervisory corporation where it falls under subparagraphs 1 through 3 or subparagraph 10: (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. Where its registration is made by fraud or other improper means;

    2. Where it has been subject to a disposition for suspension of business on at least three occasions for the last three years;

    3. Where it carries out supervision of an information system during the period of suspension of business: Provided, That this shall not apply where it carries out supervision during the period of suspension of business pursuant to Article 63;

    4. Where it carries out supervision in breach of the supervision standards, in violation of Article 57 (6);

    5. Where it falls short of the requirements for registration under Article 58 (1);

    6. Where it fails to report, or falsely reports, modified matters under Article 58 (2);

    7. Where it allows persons other than supervisors to perform supervisory duties, in violation of Article 59 (1);

    8. Where it prepares a false report on supervision, in violation of Article 59 (2);

    9. Where it allows another person to carry out supervision of information systems using its own name, in violation of Article 59 (3);

    10. Where any of its executive officers falls under a ground for disqualification provided for in Article 61 (1): Provided, That this shall not apply where it appoints another executive officer instead of the relevant executive within six months of the date such executive officer falls under disqualification requirements.

    (2) The Minister of the Interior and Safety shall hold a hearing if he/she intends to revoke the registration pursuant to paragraph (1). (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Necessary matters concerning the standards and procedures for dispositions under paragraph (1) and other relevant matters shall be prescribed by Presidential Decree.

    Article 63 (Continuance of Business, etc. of Supervisory Corporations on which Disposition of Revocation of Registration, etc. has been Imposed)

    (1) Any supervisory corporation on which a disposition of revocation of registration or suspension of business has been imposed pursuant to Article 62 (1) may continue to perform its supervisory duties under a contract concluded before the relevant disposition was imposed. In such cases, the supervisory corporation shall, without delay, notify the relevant person awarding the contract of the details of such disposition.

    (2) Where a person awarding a contract for the supervision of an information system is notified pursuant to paragraph (1) or learns the fact that revocation of registration or suspension of business has been imposed on the relevant supervisory corporation, he/she may terminate the contract only within 30 days from the date he/she learns such fact, except under exceptional circumstances.

    CHAPTER VI.- PROMOTION OF POLICIES, ETC. FOR REALIZATION OF ELECTRONIC GOVERNMENT

    Article 64 (Promotion of and Support for Electronic Government Projects)

    (1) The head of each administrative agency, etc. shall actively pursue projects for the realization, operation, and development of electronic government (hereinafter referred to as “electronic government projects“).

    (2) The Minister of the Interior and Safety may provide the heads of administrative agencies, etc. with administrative, financial, technical, or other support necessary to help them efficiently pursue electronic government projects. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for the selection and management of electronic government projects supported under paragraph (2) (hereinafter referred to as “supported electronic government projects“), and other relevant matters shall be prescribed by Presidential Decree.

    Article 64-2 (Entrustment of Management of Electronic Government Projects)

    (1) In order to efficiently implement electronic government projects, the heads of administrative agencies, etc. may entrust all or part of their business concerning the management and supervision of any of the following projects (hereinafter referred to as “management of electronic government projects“) to a person equipped with expertise and technical capacity, and the specific scope of electronic government projects which may be entrusted and the qualifications of a person eligible for being entrusted with the management of electronic government projects shall be prescribed by Presidential Decree:

    1. Projects that significantly affect the efficiency in pubic services and public administration;

    2. Projects that require special management because of a high level of difficulty;

    3. Other cases where the heads of administrative agencies, etc. deem it necessary to entrust the management of electronic government projects.

    (2) When the head of an administrative agency selects a person to whom he/she intends to entrust the management of electronic government projects (hereinafter referred to as “manager of electronic government projects“) pursuant to paragraph (1), he/she shall take into consideration human resources capable of managing such projects, a plan for conducting business, the past records of management of electronic government projects, etc., and detailed criteria for the selection shall be prescribed by Presidential Decree.

    (3) No manager of electronic government projects shall give advice to anyone to have relevant electronic government projects subcontracted to him/herself or his/her affiliated company (referring to an affiliated company defined under subparagraph 3 of Article 2 of the Monopoly Regulation and Fair Trade Act).

    (4) Where the head of an administrative agency entrusts the management of electronic government projects, he/she shall submit data about relevant electronic government projects, entrusted services, and performance of such services to the Minister of the Interior and Safety. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (5) The Minister of the Interior and Safety may determine and publicly notify matters necessary for the management of electronic government projects, including the guidelines for the calculation of fees for the entrustment under paragraph (1) and the submission of data under paragraph (4). (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (Article Inserted by Act nº 11735, Apr. 5, 2013)

    Article 64-3 (Liability, etc. of Manager of Electronic Government Projects)

    The manager of electronic government projects shall be liable for any loss or damage suffered by a person from or in connection with his/her placing an order, which has been inflicted due to breach of contract or by intention or negligence in the course of the management of electronic government projects.

    (Article Inserted by Act nº 11735, Apr. 5, 2013)

    Article 65 (Promotion of and Support for Local Informatization Projects)

    (1) The State and a local government may pursue the following local informatization projects with the aim of enhancing regional competitiveness and improving the quality of life for local residents:

    1. Development and dissemination of local information services covering the history, culture, welfare, environment, etc. of the relevant region;

    2. Construction of information systems and laying the foundations for informatization of the relevant region;

    3. Intensive support for regions lagging behind in informatization;

    4. Efficient management of information resources, such as integrated management of information systems and information services;

    5. Other matters necessary for local informatization.

    (2) A local government may pursue a local informatization project under paragraph (1) in collaboration with central administrative agencies or other local governments, if it is necessary to prevent duplicative investment, etc.

    (3) The State and a local government may establish and operate a commonly applicable operating foundation for the efficient provision of services through integrated linkage between the public and private sector information systems in the relevant region. In such cases, they shall prepare measures to prevent unlawful access to information networks and other protective measures.

    (4) In order to pursue local informatization projects under paragraphs (1) through (3), the State may provide administrative, financial, technical, and other necessary support, as prescribed by Presidential Decree.

    (5) Matters necessary for the promotion of and support for local informatization projects, other than those provided for in paragraphs (1) through (4), shall be prescribed by Presidential Decree.

    Article 66 (Promotion of Pilot Projects)

    (1) The head of an administrative agency, etc. may promote a pilot project if necessary for the realization, operation, and development of electronic government and the facilitation of efficient informatization at the local level.

    (2) Matters necessary for the implementation of pilot projects shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 67 (Prior Consultation)

    (1) When the head of an administrative agency, etc. intends to pursue an electronic government project or local informatization project for interconnection or sharing with other administrative agencies, etc., he/she shall have prior consultation with the heads of central agencies responsible for administrative affairs to prevent duplicative investment, etc.: Provided, That the local informatization projects being pursued by the head of a Si/Gun/Gu (referring to an autonomous Gu) shall be subject to consultation with the competent Special Metropolitan City Mayor, Metropolitan City Mayor or Do Governor. (Amended by Act nº 12346, Jan. 28, 2014)

    (2) The head of each administrative agency, etc. shall reflect the results of prior consultations held under paragraph (1), in the course of pursuing the relevant project.

    (3) Necessary matters concerning projects subject to prior consultation, the methods and procedures therefor, and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 68 (Analysis and Examination of Performance)

    (1) The head of each central agency responsible for administrative affairs shall conduct comprehensive analysis and examination of the results and performance of major projects prescribed by Presidential Decree, such as projects concerning electronic government and local informatization which relate to multiple administrative agencies, etc., as well as the status of administrative information sharing, submit the results thereof to the National Assembly, and reflect such results in its business plan, etc. for the next year (Amended by Act nº 11688, Mar. 23, 2013)

    (2) The Minister of the Interior and Safety shall, every year, analyze and examine the current status and outcomes of the introduction and operation of information technology architectures under Article 46 (2) and shall reflect the results thereof in the Master Plan. (Amended by Act nº 11688, Mar. 23, 2013; Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for the analysis and examination of outcomes under paragraphs (1) and (2) shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 69 (Cooperation, such as Submission of Materials)

    (1)  If necessary for performing business affairs provided for in this Act, the head of a central agency responsible for administrative affairs may request the head of any related administrative agency, etc. to submit data, etc. for investigating the current conditions.

    (2) The head of each related administrative agency, etc. shall actively cooperate with the request for submitting data under paragraph (1).

    (3) The head of a central agency responsible for administrative affairs may provide statistical data, etc. collected pursuant to paragraph (1) upon receipt of a request of the head of any other administrative agency, etc.

    Article 70 (International Collaboration for Electronic Government)

    (1) The head of each central agency responsible for administrative affairs shall stay informed of international trends in electronic government and improve the international competitiveness of electronic government through international collaboration.

    (2) The head of a central agency responsible for administrative affairs may carry out the following activities:

    1. Collaboration with international organizations and foreign governments in connection with electronic government;

    2. Management of an international rating index with regard to electronic government;

    3. Other matters prescribed with regard to international collaboration for electronic government by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    (3) The head of a central agency responsible for administrative affairs may request the head of a related administrative agency, etc. to cooperate in connection with international collaboration for electronic government, and the head of the related administrative agency, etc. so requested shall comply with such request, except under exceptional circumstances.

    Article 71 (Designation, etc. of Specialized Institutions)

    (1) The head of a central agency responsible for administrative affairs may designate specialized institutions to entrust them with business affairs in order to comprehensively and efficiently conduct the following affairs assigned to each agency: (Amended by Act nº 11735, Apr. 5, 2013)

    1. Affairs related to the development, provision, and promotion of the use of electronic government services;

    2. Affairs related to the sharing of administrative information;

    3. Affairs related to the introduction and utilization of an information technology architecture;

    4. Affairs related to research on and improvement of the supervision system;

    5. Research on the entrustment of the management of electronic government projects under Article 64-2 (1) and on the improvement therein;

    6. Affairs related to the promotion of and assistance in supported electronic government projects and local informatization projects;

    7. Other affairs prescribed for the realization, operation, and development of electronic government by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    (2) The head of a central agency responsible for administrative affairs may contribute or subsidize funds within budgetary limits as necessary for the performance of the affairs specified in paragraph (1) to the relevant specialized agency.

    (3) Professional characteristics of the relevant affairs, etc. shall be considered in designating a specialized institution, and necessary matters concerning requirements, methods, and procedures for the designation of specialized institutions and other relevant matters shall be prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 72 (Establishment, etc. of Korea Local Information Research and Development Institute)

    (1) At least two local governments may jointly establish a Korea Local Information Research and Development Institute (hereinafter referred to as the “Development Institute“) to jointly pursue informatization projects under their control.

    (2) The Development Institute shall be a corporation.

    (3) The Development Institute shall perform the following affairs:

    1. Assistance in informatization projects being pursued by local governments for the realization of electronic government and the facilitation of local informatization;

    2. Administrative affairs entrusted by a related central administrative agency or a local government in connection with the promotion of informatization of local governments;

    3. Survey, research, education, and training to facilitate informatization of local governments;

    4. Other projects determined by Presidential Decree for the facilitation of local informatization.

    (4) The head of an administrative agency, etc. may entrust the Development Institute with the affairs assigned to the agency in order to efficiently pursue local informatization projects.

    (5) A local government may contribute funds to the Development Institute so that it can be appropriated for the establishment, installation of facilities, and operation of the Development Institute, and the State may provide support as necessary for the Development Institute’s smooth performance of duties.

    (6) The Development Institute may request an administrative agency, etc. to wholly or partially bear expenses incurred in providing its services.

    (7) Except as otherwise provided for in this Act, provisions regarding incorporated foundations of the Civil Act shall apply mutatis mutandis to the Development Institute.

    (8) Matters necessary for the promotion and support of local informatization by the Development Institute and other relevant matters shall be prescribed by Presidential Decree.

    Article 73 (Delegation and Entrustment of Authority, etc.)

    (1) The head of a central agency responsible for administrative affairs may delegate part of his/her authority under this Act to heads of affiliates under his/her control or the Special Metropolitan City Mayor, Metropolitan City Mayors, and Do Governors or may entrust such authority to the head of any other administrative agency, etc., as prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    (2) The head of a central agency responsible for administrative affairs may entrust to any related corporation or organization some of its affairs under this Act, as prescribed by the National Assembly Regulations, the Supreme Court Regulations, the Constitutional Court Regulations, the National Election Commission Regulations, or by Presidential Decree.

    Article 74 (Prevention of Divulgence of Confidential Information, etc.)

    No person who was or is engaged in any of the following duties shall, without good cause, divulge to a third party any confidential information he/she acquires while performing his/her duties or steal such confidential information: (Amended by Act nº 11735, Apr. 5, 2013)

    1. An administrative duty for which sharing administrative information is required;

    2. A supervisory duty;

    3. A duty of managing an electronic government project entrusted pursuant to Article 64-2 (1).

    Article 75 (Legal Fiction as Public Official in Application of Penalty Provisions)

    In applying Articles 129 through 132 of the Criminal Act, any of the following persons shall be deemed a public official, even though he/she is not a public official: (Amended by Act nº 11735, Apr. 5, 2013)

    1. A person engaged in work relating to the sharing of administrative information;

    2. A person working for an agency that receives administrative information (limited to persons relating to the sharing of administrative information);

    3. A supervisor performing supervisory duties;

    4. A person in charge of managing an electronic government project entrusted pursuant to Article 64-2 (1).

    CHAPTER VII.- PENALTY PROVISIONS

    Article 76 (Penalty Provisions)

    (1) Any person who forges, alters, damages, or deletes administrative information in violation of subparagraph 1 of Article 35 shall be punished by imprisonment with labor for not more than ten years.

    (2) Any of the following persons shall be punished by imprisonment with labor for not more than five years or by a fine not exceeding 50 million won:

    1. A person who forges, alters, damages, or uses an information system for sharing administrative information without good cause, in violation of subparagraph 2 of Article 35;

    2. A person who discloses or disseminates to the public, any method or program by which administrative information can be altered or deleted, in violation of subparagraph 3 of Article 35.

    (3) Any of the following persons shall be punished by imprisonment with labor for not more than three years or by a fine not exceeding 30 million won:

    1. A person who divulges administrative information, in violation of subparagraph 4 of Article 35;

    2. A person who processes administrative information without due authority or beyond the authority accorded, in violation of subparagraph 5 of Article 35;

    3. A person who aids or abets another person, without due authority, to use administrative information, in violation of subparagraph 6 of Article 35;

    4. A person who shares administrative information in a manner that has not been authorized, or stores administrative information in an information system or a storage device that has not been authorized, in violation of subparagraph 7 of Article 35;

    5. A person who divulges or steals any secret to which he/she has acquired in the course of his/her official duties, in violation of Article 74.

    (4) Any person who receives administrative information from an administrative agency, etc. or peruses administrative information by fraud or other improper means, in violation of subparagraph 8 of Article 35, shall be punished by imprisonment with labor for not more than two years or by a fine not exceeding seven million won.

    (5) Any person who carries out supervision of an information system without registration under Article 58 (1) shall be punished by imprisonment with labor for not more than two years or by a fine not exceeding 20 million won.

    (6) Any person who allows another person to carry out supervision of an information systems using its own name or lends his/her supervisor’s certificate to another person, or any person who carries out supervision using another person’s name or borrows supervisor’s certificate shall be punished by imprisonment with labor for not more than one year or by a fine not exceeding ten million won.

    Article 77 (Joint Penalty Provisions)

    If the representative of a corporation, or an agent or employee of, or any other person employed, by a corporation or an individual commits a violation under Article 76 (3) 5 or Article 76 (5) or (6) in connection with the business affairs of the corporation or individual, not only shall such violator be punished, but also the corporation or individual shall be punished by a fine under the relevant provisions: Provided, That this shall not apply where such corporation or individual has not been negligent in giving due attention and supervision concerning the relevant duties to prevent such violation.

    Article 78 (Administrative Fines)

    (1) An administrative fine not exceeding 30 million won shall be imposed on any of the following persons:

    1. A person who fails to obtain the prior consent of an owner of information, in violation of Article 42 (1);

    2. A person who fails to notify an owner of information of the matters listed in the subparagraphs of Article 43 (1) without good cause, in violation of Article 42 (2) and (3).

    (2) Administrative fines under paragraph (1) shall be imposed and collected by the Minister of the Interior and Safety. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    ADDENDA

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation: Provided, That the amended provisions of Article 5 (5) of this Addenda shall enter into force on January 1, 2011.

    Article 2 (Repeal of other Act)

    The Act on the Efficient Introduction, Operation, etc. of Information Systems is hereby repealed.

    Article 3 (Transitional Measures concerning Sharing of Administrative Information)

    (1) Any administrative information being shared through the Sharing Center under the previous provisions as at the time this Act enters into force shall be deemed authorized in accordance with the procedures determined by this Act.

    (2) Any person corresponding to the amended provisions of the subparagraphs of Article 39 (7) shall be deemed designated in accordance with the procedures determined by this Act.

    Article 4 (Transitional Measure following Repeal of the Act on the Efficient Introduction, Operation, etc. of Information Systems)

    (1) Any agency designated as an agency introducing an information technology architecture under Article 5 of the previous Act on the Efficient Introduction, Operation, etc. of Information Systems (hereafter referred to as “Information Systems Act” in this Article) before this Act enters into force shall be deemed an agency designated under this Act.

    (2) Any project on which supervision is carried out under Article 11 of the previous Information Systems Act as at the time this Act enters into force shall be deemed a project on which supervision is carried out under this Act.

    (3) Any supervisory corporation registered as a supervisory corporation under Article 12 of the previous Information Systems Act before this Act enters into force shall be deemed registered under this Act.

    (4) Any person educated as a supervisor under Article 14 of the previous Information Systems Act before this Act enters into force shall be deemed to have received education under this Act.

    (5) Any person having received a supervisor’s certificate under Article 14 of the previous Information Systems Act before this Act enters into force shall be deemed to have received such certificate under this Act.

    (6) Any administrative disposition imposed with regard to supervision on any information system under Article 16 of the previous Information Systems Act before this Act enters into force shall be deemed to have been imposed under this Act.

    (7) Any application of penalty provisions or administrative dispositions with regard to a violation of any provision of the previous Information Systems Act before this Act enters into force shall be governed by the previous Information Systems Act.

    Article 5 Omitted.

    Article 6 (Relationship with other Acts and Subordinate Statues)

    Where the previous Electronic Government Act or the previous Act on the Efficient Introduction, Operation, etc. of Information Systems, or the provisions thereof are cited in other Acts or subordinate statutes as at the time this Act enters into force, this Act or the corresponding provisons hereof shall be deemed cited in place of the previous provisions, if provisions corresponding thereto exist in this Act.

    ADDENDA (Act nº 10303, May 17, 201)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 10465, Mar. 29, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 10580, Apr. 12, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 5 Omitted.

    ADDENDA (Act nº 11461, Jun. 1, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Articles 2 through 10 Omitted.

    ADDENDA (Act nº 11688, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 Omitted.

    ADDENDA (Act nº 11690, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    (1) This Act shall enter into force on the date of its promulgation.

    (2) Omitted.

    Articles 2 through 7 Omitted.

    ADDENDUM (Act nº 11735, Apr. 5, 2013)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act nº 12346, Jan. 28, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability concerning Master Plans for Electronic Government)

    The first master plan for electronic government under the amended provisions of Article 5 shall be formulated in the year immediately following the enforcement of this Act.

    Article 3 (Applicability concerning Plan for Each Agency)

    The first plan for each agency under the amended provisions of Article 5-2 shall be formulated in the year immediately following the enforcement of this Act.

    Article 4 (Applicability concerning Supervision of Information Systems)

    The amended provisions under the proviso to Article 57 (1) shall apply to electronic government projects, the notices of tender for the entrustment of management of which are announced after this Act enters into force.

    Article 5 (Transitional Measures concerning Incompetents, etc.)

    The incompetents under the adult guardianship or quasi-incompetents under the limited guardianship under the amended provisions of Article 61 (1) 1 shall be deemed to include persons currently incompetent or quasi-incompetent under Article 2 of the Addenda to the partially amended Civil Act (Act nº 10429).

    ADDENDA (Act nº 12592, May 20, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 5 Omitted.

    ADDENDA (Act nº 12738, Jun. 3, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year after the date of its promulgation. (Proviso Omitted.)

    Articles 2 and 3 Omitted.

    ADDENDA (Act nº 12844, Nov. 19, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 13459, Aug. 11, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 5 Omitted.

    ADDENDA (Act nº 14474, Dec. 27, 2016)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Articles 2 through 14 Omitted.

    ADDENDA (Act nº 14839, Jul. 26, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That among the Acts amended in accordance with Article 5 of these Addenda, amendments to Acts, which were promulgated before this Act enters into force, but the dates on which they are to enter into force have yet to arrive, shall enter into force on the enforcement dates of the respective Acts.

    Articles 2 through 6 Omitted.

    ADDENDUM (Act nº 14914, Oct. 24, 2017)

    This Act shall enter into force on the date of its promulgation.

    09Nov/21

    Presidential Decree nº 21698, Aug. 21, 2009. Enforcement Decree of the Framework act on National Informatization

    Presidential Decree nº 21698, Aug. 21, 2009. Enforcement Decree of the Framework act on National Informatization. (Amended by Presidential Decree nº 21847, Nov. 26, 2009, Presidential Decree nº 21882, Dec. 14, 2009, Presidential Decree nº 22075, Mar. 15, 2010, Presidential Decree nº 22151, May 4, 2010, Presidential Decree nº 22218, jun. 28, 2010, Presidential Decree nº 22475, Nov. 10, 2010, Presidential Decree nº 23488, Jan. 6, 2012, Presidential Decree nº 24018, Aug. 3, 2012, Presidential Decree nº 24020, Aug. 3, 2012, Presidential Decree n º 24466, Mar. 23, 2013, Presidential Decree nº 24844, Nov. 20, 2013, Presidential Decree nº 25339, Apr. 29, 2014, Presidential Decree nº 25331, Apr. 29, 2014, Presidential Decree nº 25448, Jul. 7, 2014, Presidential Decree nº 25456, Jul. 14, 2014, Presidential Decree nº 25751, Nov. 19, 2014).

    ENFORCEMENT DECREE OF THE FRAMEWORK ACT ON NATIONAL INFORMATIZATION

    Article 1 (Purpose)

    The purpose of this Decree is to stipulate matters delegated by the Framework Act on National Informatization and necessary matters for the enforcement thereof.

    Article 2 (Publication of Basic Plans for National Informatization)

    The Minister of Science, ICT and Future Planning shall publish a basic plan for national informatization (hereinafter referred to as “basic plan“) confirmed in accordance with Article 6 (2) of the Framework Act on National Informatization (hereinafter referred to as the “Act“) in the official gazette. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 3 Deleted (By Presidential Decree nº 24466, Mar. 23, 2013)

    Article 4 (Establishment and Execution of National Informatization Implementation Plans)

    (1) The heads of central administrative agencies and the heads of local governments shall each submit to the Minister of Science, ICT and Future Planning, by the deadlines in the following subparagraphs, records pertaining to the execution of an implementation plan for national informatization under Article 7 (1) of the Act (hereinafter referred to as “implementation plan“) carried out during the preceding year and an implementation plan for the next year, and matters concerning modifications to important matters under the latter part of Article 7 (2) of the Act: (Amended by Presidential Decree nº 22218, Jun. 28, 2010; Presidential Decree nº 24466, Mar. 23, 2013)

    1. Central administrative agencies: April 30 of each year;

    2. Local governments: July 31 of each year.

    (2) “Important matters prescribed by Presidential Decree” under the latter part of Article 7 (2) of the Act means those matters having significant influence on the informatization policies of central administrative agencies or local governments which are related to no less than two central administrative agencies or local governments, or require a budgetary measure in excess of an amount determined by the Minister of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) The Minister of Science, ICT and Future Planning shall present its examination opinion on the implementation plan of a central administrative agency to the Minister of Strategy and Finance and the head of the relevant central administrative agency by June 30 of each year and examination opinion on the implementation plan of a local government to the Minister of Strategy and Finance and the head of the relevant local government by September 30 of each year, in accordance with Article 7 (3) of the Act. (Amended by Presidential Decree nº 22218, Jun. 28, 2010; Presidential Decree nº 24466, Mar. 23, 2013)

    (4) The heads of central administrative agencies and the heads of local governments shall consult with the Minister of Science, ICT and Future Planning in establishing their implementation plan so that the implementation plan is interlinked with the basic plan. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (5) The heads of central administrative agencies and the heads of local governments shall consult in advance with the heads of the relevant administrative agencies when they include matters concerning the protection of information in their implementation plans.

    (6) The heads of central administrative agencies and the heads of local governments shall confirm their implementation plan by December 31 of each year after reflecting examination opinions of the Minister of Science, ICT and Future Planning under paragraph (3), unless there is a compelling reason not to do so. (Amended by Presidential Decree nº 22218, Jun. 28, 2010; Presidential Decree nº 24466, Mar. 23, 2013)

    Article 5 (Procedures and Methods of Adjustment)

    (1) When the heads of central administrative agencies or the heads of local governments request adjustment to the Minister of Science, ICT and Future Planning pursuant to Article 8 (1) of the Act, he/she shall write the following matters clearly:

    1. Counterparts of adjustment;

    2. National informatization policies or projects requiring adjustment;

    3. Matters requiring adjustment.

    (2) When the adjustment pursuant to paragraph (1) is required, the Minister of Science, ICT and Future Planning may make a request to the head of an agency requesting adjustment and its counterparts for presentation of opinions or materials with respect to the matters requiring adjustment. In such cases, the head of an agency shall, upon receipt of such request, comply therewith unless there is a compelling reason not to do so.

    (3) The Minister of Science, ICT and Future Planning may, where necessary, hear the opinions of the head of an agency related to the matters requiring adjustment and experts in relevant fields.

    (Article Amended by Presidential Decree nº 25339, Apr. 29, 2014)

    Articles 6 through 9-3 Deleted (By Presidential Decree nº 24466, Mar. 23, 2013)

    Articles 10 and 11 Deleted, (By Presidential Decree nº 25339, Apr. 29, 2014)

    Article 12 (Operation of Consultative Council of Officials in Charge of Informatization)

    (1) To deal with the affairs of the Consultative Council of Officials in Charge of Informatization under Article 12 of the Act (hereinafter referred to as the “Consultative Council”), the Consultative Council may have two secretaries, who shall be each appointed by the Minister of Science, ICT and Future Planning and the Minister of Government Administration and Home Affairs from among public officials belonging to the Senior Civil Service Corps in charge of informatization affairs of the Ministry of Science, ICT and Future Planning and the Ministry of Government Administration and Home Affairs. (Amended by Presidential Decree nº 24466, Mar. 23, 2013; Presidential Decree nº 25751, Nov. 19, 2014)

    (2) Each chairperson of the Consultative Council shall represent the Consultative Council and exercise overall control over the affairs thereof. (Inserted by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) Where each chairperson of the Consultative Council is unable to perform his/her duties due to unavoidable reasons, members shall act for him/her in the order predetermined by the Consultative Council. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) In addition to those provided for in paragraphs (1) through (3), necessary matters for the operation of the Consultative Council shall be determined jointly by each chairperson of the Consultative Council following deliberation by the Consultative Council. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 13 (Projects, etc. Subject to Implementation of Informatization Plans)

    (1) The term “large-scale investment projects prescribed by Presidential Decree” in Article 13 (1) of the Act means large-scale investment projects specified in attached Table 1. (Amended by Presidential Decree nº 24844, Nov. 20, 2013)

    (2) The Minister of Science, ICT and Future Planning may recommend the heads of central administrative agencies or local governments who intend to carry out a project, other than the large-scale investment projects listed in attached Table 1, the total cost of which is not less than 10 billion won, to formulate and implement a plan equivalent to the informatization plan under Article 13 (1) of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013; Presidential Decree nº 24844, Nov. 20, 2013)

    (3) The Minister of Science, ICT and Future Planning may determine and publicly notify the guidelines for establishing an informatization plan referred to in Article 13 (1) of the Act. (Amended by Presidential Decree nº 24844, Nov. 20, 2013)

    (4) Where requested by the heads of central administrative agencies or local governments, the Minister of Science, ICT and Future Planning may provide support by organizing a technical support team consisting of relevant experts pursuant to Article 13 (4) of the Act, and if deemed necessary, may require the National Information Society Agency referred to in Article 14 of the Act to provide technical support. (Amended by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 14 (Operation of the National Information Society Agency)

    The National Information Society Agency under Article 14 of the Act may, where necessary to carry out projects, such as the management and operation of an information communications network for national agencies, local governments and public institutions (hereinafter referred to as “national agencies, etc.”), the promotion of informatization projects, and the support for evaluation pursuant to paragraph (3) of the said Article, request the provision of relevant materials from national agencies, etc.

    Article 15 (Preparation and Management of Materials on Current Status, etc. of Information Resources)

    (1) The heads of national agencies, etc. shall systematically prepare and manage materials on the current status and statistical data on information resources retained by their respective agencies (hereinafter referred to as “materials on the current status, etc. of information resources“) in order to efficiently promote informatization under Article 15 (1) of the Act.

    (2) Where necessary to systematically prepare and manage materials on the current status, etc. of information resources under paragraph (1), the heads of national agencies, etc. shall establish an information resources management plan containing the following:

    1. Basic direction of the preparation and management of materials on the current status, etc. of information resources;

    2. Matters concerning the current status and operation (including entrusted operation) of information resources;

    3. Matters concerning the introduction and investment management of information technology;

    4. Matters related to securing the safety and reliability of information resources;

    5. Other matters necessary for the preparation and management of materials on the current status, etc. of information resources.

    (3) The Minister of Science, ICT and Future Planning shall provide necessary support through consultation with the heads of relevant agencies such as the Minister of Government Administration and Home Affairs, in order to efficiently establish the information resources management plan under paragraph (2). (Amended by Presidential Decree nº 24466, Mar. 23, 2013; Presidential Decree nº 25751, Nov. 19, 2014)

    Article 16 (Support for Informatization of Private Sectors)

    The Government may carry out the following projects to support the informatization of private sectors under Article 17 of the Act:

    1. Creating informatization infrastructure for private sectors, such as industry, finance, etc.;

    2. Conducting training on informatization for private sectors, such as industry, finance, etc., consulting thereof, and distribution and dissemination of information technology;

    3. Other projects necessary for the informatization of private sectors.

    Article 17 (Sharing and Distribution of Knowledge and Information)

    (1) For the purpose of establishing an infrastructure for sharing and distributing knowledge and information under Article 18 of the Act, national agencies, etc. shall make information retained by their respective agencies available for convenient search and utilization by the public.

    (2) The Minister of Science, ICT and Future Planning may provide necessary support, such as the establishment, etc. of standards for the sharing and distribution of knowledge and information, following consultation with the heads of relevant national agencies, etc. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 18 (Common Use of Information among National Agencies, etc.)

    (1) For the purpose of creating an infrastructure for sharing and distributing knowledge and information under Article 18 of the Act, the heads of national agencies, etc. may designate a database, among those retained by the national agencies, etc., which is highly useful for dealing with administrative affairs and providing services for the people as the national main database, and may allow other national agencies, etc. to commonly use it in preference to any other database. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) In respect of matters which may be checked through the common use of the national main database, the heads of national agencies, etc. shall reduce, to a minimum level, requests for the presentation of documents required to check the matters in question.

    Article 19 (Organization and Operation of Consultative Council with Private Organizations, etc.)

    (1) The heads of national agencies, etc. may organize and operate a consultative council (hereinafter referred to as “private consultative council“) with private business operators or an association of private business operators, following consultation with the Minister of Science, ICT and Future Planning pursuant to Article 19 (2) of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) The private consultative council shall be chaired by a person appointed or commissioned by the heads of national agencies, etc. which organize and operate the private consultative council under paragraph (1) from among public officials or executives and employees of the relevant national agencies, etc., or the representatives of private business operators and the association of private business operators which constitute the private consultative council.

    (3) The chairperson of the private consultative council shall represent the private consultative council and exercise overall control over its affairs.

    (4) National agencies, etc. shall endeavor to ensure that opinions presented via the private consultative council are reflected in the establishment and execution of national informatization policies to the greatest extent possible.

    (5) Detailed matters necessary for the operation of the private consultative council, such as convening the meetings of the private consultative council, shall be determined by the chairperson of the private consultative council after seeking the opinions of the members of the private consultative council.

    Article 20 (Management of Knowledge Information Resources)

    The Minister of Science, ICT and Future Planning may formulate guidelines concerning the management of knowledge information resources and give notice thereof to the heads of national agencies or the heads of local governments pursuant to Article 25 (1) of the Act in order to ensure that national agencies and local governments can efficiently and systematically manage the knowledge information resources under their jurisdiction. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 21 (Establishment of Mid- to Long-Term Knowledge Information Resources Management Plans)

    (1) The Minister of Science, ICT and Future Planning shall establish a mid- to long-term knowledge information resources management plan under Article 25 (2) of the Act on a five-year basis, and establish an annual implementation plan for the management of knowledge information resources within the scope of the mid- to long-term knowledge information resources management plan. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) The Minister of Science, ICT and Future Planning shall confirm and publish the annual implementation plan for the management of knowledge information resources for the following year by September 30 of each year, unless there is a compelling reason not to do so. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) The Minister of Science, ICT and Future Planning shall consult with the Minister of Strategy and Finance on budget-related matters included in the mid- to long-term knowledge information resources management plan and the annual implementation plan for the management of knowledge information under paragraph (1). (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) The Minister of Science, ICT and Future Planning shall ensure that the mid- to long-term knowledge information resources management plan and the annual implementation plan for the management of knowledge information resources under paragraph (1) are interlinked with the basic plan. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (5) Where it is deemed necessary for establishing the mid- to long-term knowledge information resources management plan and the annual implementation plan for the management of knowledge information resources under paragraph (1), the Minister of Science, ICT and Future Planning may request the heads of national agencies or the heads of local governments to submit data on the management of knowledge information resources under their jurisdiction. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 22 (Evaluation of Management of Knowledge Information Resources)

    (1) In cases of evaluating central administrative agencies and local governments with respect to their management of knowledge information resources pursuant to Article 25 (2) 5 of the Act, the Minister of Science, ICT and Future Planning shall publicly announce in advance the subjects, criteria and methods of such evaluation. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) An evaluation under paragraph (1) shall contain the following matters:

    1. Outcomes of the management of knowledge information resources and comparison of such outcomes among agencies;

    2. Current status and utilization of knowledge information resources;

    3. Defects and improvement measures;

    4. Other matters deemed necessary for the evaluation of the management of knowledge information resources.

    (3) Where necessary for the evaluation of the management of knowledge information resources, the Minister of Science, ICT and Future Planning may request the presentation of relevant data from the heads of central administrative agencies and the heads of local governments, or investigate the outcomes of the management of knowledge information resources. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) Where necessary for the investigation of the outcomes of the management of knowledge information resources under paragraph (3), the Minister of Science, ICT and Future Planning may receive support from a specialized institution or relevant expert under Article 28 of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (5) The Minister of Science, ICT and Future Planning shall notify the heads of relevant institutions of the outcomes of the evaluation of the management of knowledge information resources. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 23 (Facilitation of Utilization of Knowledge Information Resources)

    (1) The heads of central administrative agencies and the heads of local governments shall endeavor to ensure that citizens can use knowledge information resources, other than such information as may not be disclosed under the proviso to Article 9 (1) of the Official Information Disclosure Act, in an electronic form via information communications networks to an extent not infringing upon the rights protected under relevant Acts, such as the Copyright Act.

    (2) The heads of central administrative agencies and the heads of local governments shall endeavor to keep the information provided in an electronic form under paragraph (1) up-to-date, accurate and interlinked by continuous management.

    (3) The Minister of Science, ICT and Future Planning may provide knowledge information resources by collecting, interlinking and integrating them in an electronic form in order to facilitate unrestricted access to and use of knowledge information resources. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 24 (Standardization of Knowledge Information Resources)

    (1) A specialized institution under Article 28 of the Act or a person having an interest in the standardization of knowledge information resources may present a draft standard concerning the matters under the subparagraphs of Article 26 (1) of the Act, and request the Minister of Science, ICT and Future Planning to reflect the details thereof in the standards. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) The Minister of Science, ICT and Future Planning shall, when enacting, amending or repealing standards concerning knowledge information resources, publish such in the official gazette following consultation with the heads of relevant central administrative agencies. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 25 (Designation Procedures for Important Knowledge Information Resources)

    (1) The Minister of Science, ICT and Future Planning may designate knowledge information resources under Article 27 (2) of the Act (hereinafter referred to as “important knowledge information resources“) either directly or upon application by the heads of central administrative agencies or the heads of local governments pursuant to Article 27 (1) of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) The heads of central administrative agencies or the heads of local governments shall submit the following to the Minister of Science, ICT and Future Planning when making an application for designation as important knowledge information resources pursuant to paragraph (1): (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Purpose and reason for designation;

    2. Types and details of the knowledge information resources subject to designation;

    3. Management status of the knowledge information resources and management plan of the knowledge information resources subject to designation;

    4. Other matters necessary for the designation of important knowledge information resources.

    (3) The Minister of Science, ICT and Future Planning may, when intending to designate important knowledge information resources, require a specialized institution under Article 28 of the Act to form an evaluating body consisting of relevant experts and require the evaluating body to investigate and review the relevant knowledge information resources. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) The Minister of Science, ICT and Future Planning shall, when having designated important knowledge information resources under paragraph (1), publish such fact in the Official Gazette. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 26 (Special Management of Important Knowledge Information Resources)

    (1) The heads of central administrative agencies and the heads of local governments shall endeavor to ensure that important knowledge information resources are digitized and interlinked to an extent not infringing upon the rights protected under relevant Acts, such as the Copyright Act.

    (2) The heads of central administrative agencies and the heads of local governments shall comply with the standards established under Article 26 of the Act in carrying out the digitization and interlinking of important knowledge information resources. In such cases, the Minister of Science, ICT and Future Planning may investigate whether the standards are complied with, and request correction, based on the findings of the investigation. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) The Minister of Science, ICT and Future Planning may render administrative, technical and financial support preferentially for the management of important knowledge information resources. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) For purposes of facilitating the common use and utilization of important knowledge information resources, the Minister of Science, ICT and Future Planning may provide support to national agencies, etc. to jointly digitize and distribute important knowledge information resources, and to provide the services thereof. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 27 (Collection of Knowledge Information Resources)

    Where the heads of national agencies, etc. enact or amend statutes under their jurisdiction, or enter into a contract, the Minister of Science, ICT and Future Planning may advise them to include details regarding the collection and utilization of knowledge information resources in a digitized form in such subordinate statutes or contract. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 28 (Designation and Operation of Specialized Institutions)

    (1) When the Minister of Science, ICT and Future Planning and the Minister of Government Administration and Home Affairs have designated a specialized institution (hereinafter referred to as the “specialized institution”) under Article 28 of the Act, the Ministers shall publish such fact in the official gazette. (Amended by Presidential Decree nº 24466, Mar. 23, 2013; Presidential Decree nº 25751, Nov. 19, 2014)

    (2) The specialized institution shall perform the following affairs for the management of knowledge information resources: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Support for the establishment and implementation of a mid-to long-term knowledge information resources management plan under Article 25 (2) of the Act;

    2. Support for the development of management policies of knowledge information resources;

    3. Support for the building, operation, management, interlinking, distribution and integration of information systems to facilitate the utilization of knowledge information resources;

    4. Support for affairs related to the creation of a classification system, such as assignment of identifiers allowing access to digitized knowledge information resources or distribution thereof via the information communications network;

    5. Support for investigations into the management status and actual conditions of knowledge information resources;

    6. Support for evaluations of the management of knowledge information resources;

    7. Other affairs requested or entrusted by the heads of relevant central administrative agencies and the heads of local governments for the management of knowledge information resources.

    (3) The Minister of Science, ICT and Future Planning and the Minister of Government Administration and Home Affairs may require a specialized institution designated and publicly announced under paragraph (1) to establish and submit a detailed project plan for the management of knowledge information resources and a plan for the execution of funds. (Amended by Presidential Decree nº 24466, Mar. 23, 2013; Presidential Decree nº 25751, Nov. 19, 2014)

    (4) Where the heads of relevant central administrative agencies and the heads of local governments request or entrust their affairs to a specialized institution, the budget required therefor may be wholly or partially subsidized within budgetary limits.

    Article 29 (Advancement of Information Culture)

    (1) In order to efficiently implement policies on the advancement and expansion of information culture under Article 29 (1) of the Act, national agencies and local governments may select a private institution or organization related to the project in question and have it carry out the affairs thereof.

    (2) National agencies and local governments may provide an institution or organization selected under paragraph (1) with the financial support necessary for implementing policies on the advancement and expansion of information culture. In such cases, an institution or organization which has received financial support shall use it appropriately for the intended purposes of implementing relevant policies.

    (3) An institution or organization which intends to receive support from a national agency or local government under paragraph (2) shall apply for support by submitting the following to the national agency or local government:

    1. Purpose and details of the project;

    2. Necessity and ripple effect of the project;

    3. Details of the support it seeks to receive;

    4. Expenses to be incurred in conducting the project.

    (4) National agencies and local governments shall comprehensively consider the following matters when selecting a private institution or organization under paragraph (1), or selecting an entity eligible to receive support upon receiving an application under paragraph (3) from the selected institutions or organizations:

    1. Details and scale of the projects conducted by the relevant institutions or organizations;

    2. The relevant institutions or organizations’ capability to implement the projects and recent performance;

    3. The social demand for and ripple effect of the relevant policy projects and activities for the advancement and expansion of information culture.

    (5) The Minister of Science, ICT and Future Planning may present his/her opinion regarding curriculum to the Minister of Education so that the educational content on information culture may be included in the standards and details of the curriculum pursuant to Article 29 (2) of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (6) Necessary matters for selection under paragraph (1) and the methods, procedures, etc. of support under paragraph (2) shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 30 (Formulation, etc. of Comprehensive Plan for Prevention and Solution of Internet Addiction)

    (1) The comprehensive plan for the prevention and solution of Internet addiction under Article 30 (1) of the Act (hereinafter referred to as “comprehensive plan“) shall contain the following: (Amended by Presidential Decree nº 24844, Nov. 20, 2013)

    1. The goal and basic direction of comprehensive plan;

    2. Analysis of the actual conditions of Internet addiction and the performance of relevant policies;

    3. Prospects of and implementation strategies for the prevention and solution of Internet addiction;

    4. Research and development for the prevention and solution of Internet addiction;

    5. Education, counseling and awareness campaign for the prevention and solution of Internet addiction;

    6. Training of specialized human resources for the prevention and solution of Internet addiction;

    7. Countermeasures against Internet addiction caused by the use of information communications services utilizing new technology;

    8. International cooperation on the prevention and solution of Internet addiction;

    9. Other matters necessary for the prevention and solution of Internet addiction.

    (2) The heads of relevant central administrative agencies shall prepare plans for policies and projects under their jurisdiction which are to be reflected in the comprehensive plan, and submit it to the Minister of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24844, Nov. 20, 2013)

    (3) The Minister of Science, ICT and Future Planning shall publicly announce the comprehensive plan on the Internet homepage of the Ministry of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013; Presidential Decree nº 24844, Nov. 20, 2013)

    Article 30-2 (Formulation, etc. of Promotion Plan for Prevention and Solution of Internet Addiction)

    (1) The Minister of Science, ICT and Future Planning and the head of each relevant central administrative agency shall formulate an implementation plan to prevent and solve Internet addiction under Article 30 (2) of the Act (hereinafter referred to as “implementation plan“) by the end of February each year.

    (2) The Minister of Science, ICT and Future Planning shall notify the head of each relevant central administrative agency of the guidelines for formulating an implementation plan by December 15 of the preceding year.

    (3) The head of each relevant central administrative agency shall submit an implementation plan formulated pursuant to the guidelines under paragraph (2) as well as performance records of the preceding year to the Minister of Science, ICT and Future Planning by January 31 each year.

    (4) The Minister of Science, ICT and Future Planning shall put together the implementation plans submitted pursuant to paragraph (3) and notify it to the head of each relevant administrative agency.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 30-3 (Standards for Green Internet Certification)

    The standards for Green Internet certification referred to in Article 30-3 (3) of the Act shall be determined and publicly notified by the Minister of Science, ICT and Future Planning in accordance with the following classifications:

    1. Whether relevant statutes for the prevention and solution of Internet addiction are complied with;

    2. Whether the management of the media and content of information communications services for the prevention and solution of Internet addiction is appropriate;

    3. Whether the guidelines for diagnostic methods for Internet addiction, counseling centers, etc. are appropriate;

    4. Whether other necessary measures for the prevention and solution of Internet addiction are implemented.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 30-4 (Effective Period of Green Internet Certification)

    The effective period of Green Internet certification under Article 30-3 (3) of the Act shall be two years.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 30-5 (Indication of and Publicity for Green Internet Certification)

    (1) The indication of the Green Internet certification mark referred to in Article 30-5 (1) of the Act shall be as specified in attached Table 2.

    (2) Where a person who has obtained Green Internet certification publicizes the fact that he/she has obtained such certification under Article 30-5 (1) of the Act, he/she shall indicate the effective period of the certification.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 30-6 (Establishment, etc. of Internet Addiction Response Center)

    (1) The criteria for establishing and operating an Internet Addiction Response Center under Article 30-6 (3) of the Act shall be as specified in attached Table 3.

    (2) The State or local governments shall establish and operate an Internet Addiction Response Center in a manner that fulfills the criteria referred to in paragraph (1), and endeavor to secure related budgets and to provide education and conduct management smoothly.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 30-7 (Provision of Education on Internet Addiction)

    (1) The term “Other public agencies prescribed by Presidential Decree” referred to in Article 30-8 (2) 4 of the Act means institutions designated by the Minister of Strategy and Finance pursuant to Article 4 (1) of the Act on the Management of Public Institutions.

    (2) The heads of the institutions referred to in Article 30-8 (2) of the Act shall provide education on Internet addiction at least once every year.

    (3) Education on Internet addiction referred to in paragraph (2) may be provided by various methods, such as lectures and audio-visual education, and the education content shall include the following:

    1. The current state and cases of Internet addiction;

    2. The methods of prevention and time management against Internet addiction;

    3. The method of identifying a harmful Internet environment;

    4. Other matters necessary to prevent and solve Internet addiction.

    (4) The Minister of Science, ICT and Future Planning may provide necessary textbooks and materials to institutions or organizations that provide education on Internet addition.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31 (Guaranteeing Access to and Use of Information by Persons with Disabilities, Aged Persons, etc.)

    The Minister of Science, ICT and Future Planning shall carry out the following matters in order to guarantee accessibility to the websites of national agencies, etc. under Article 32 (1) of the Act: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Fact-finding surveys on accessibility to websites;

    2. Standardization of accessibility to websites and support for the development of related technologies;

    3. Education and consulting for guaranteeing accessibility to websites;

    4. Other matters necessary for guaranteeing accessibility to websites.

    Article 31-2 (Criteria for Designating Web Accessibility Quality Certification Institution)

    The criteria for designating a Web accessibility quality certification institution referred to in Article 32-2 (1) of the Act (hereinafter referred to as “certification institution“) shall be determined and publicly notified by the Minister of Science, ICT and Future Planning in accordance with the following classifications:

    1. Whether it has an organization and human resources necessary for certification business;

    2. Whether it has facilities necessary for certification business and environmental conditions necessary for the operation of such facilities;

    3. Whether it has internal regulations stipulating the management and operation of human resources, organization, facilities, etc. relating to certification business, as well as the methods and procedures for conducting examination for certification.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31-3 (Criteria, Procedures, etc. for Web Accessibility Quality Certification)

    (1) The criteria for Web accessibility quality certification referred to in Article 32-2 (1) of the Act (hereinafter referred to as “quality certification“) shall be determined and publicly notified by the Minister of Science, ICT and Future Planning in accordance with the following classifications:

    1. All content shall be recognizable by users regardless of disability types, such as visual and hearing impairment;

    2. It shall be presented in a manner manageable by users, including visually and aurally impaired persons;

    3. Content or control methods shall be structured in a way easily understandable by users;

    4. Content shall be made solid so as to be accessible by various methods of technology.

    (2) Where a certification institution receives an application for quality certification pursuant to Article 32-2 (3) of the Act, it shall carry out written and technical examinations by applying the criteria for quality certification referred to in paragraph (1).

    (3) Where the head of a certification institution deems that the criteria for quality certification are not satisfied as a result of examination, he/she shall inform the applicant of the rejection of the certification and the reason therefor.

    (4) Details necessary for Web accessibility quality certification, other than the matters referred to in subparagraphs 1 through 3, shall be determined and publicly notified by the Minister of Science, ICT and Future Planning.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31-4 (Effective Period of Web Accessibility Quality Certification)

    The effective period of quality certification under Article 32-2 of the Act shall be one year.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31-5 (Certification Institution’s Business Procedures)

    (1) Where the name, representative, location, examination specialist or business regulations of a certification institution are altered, the certification institution shall submit a document verifying the details of such alteration to the Minister of Science, ICT and Future Planning, within 30 days from the date of alteration.

    (2) A certification institution shall submit a report on certification records of the preceding year to the Minister of Science, ICT and Future Planning by January 31 each year.

    (3) The Minister of Science, ICT and Future Planning may require a certification institution to submit necessary materials, or conduct an on-the-spot inspection to ascertain whether the certification institution falls under any subparagraph of Article 32-3 (1) of the Act.

    (4) When a certification institution is unable to carry out business as a certification institution due to discontinuance, suspension, etc. of its business, it shall inform the Minister of Science, ICT and Future Planning of such fact without delay.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31-6 (Fees)

    The standards for fees which a certification institution receives from applicants for quality certification shall be determined by the Minister of Science, ICT and Future Planning, taking into account the number of certification examiners participating in certification examination, the period necessary for certification examination, etc.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31-7 (Revocation of Designation, etc. as Certification Institution)

    (1) The criteria for the revocation of designation, business suspension, etc. of a certification institution referred to in Article 32-3 (2) of the Act shall be as specified in attached Table 4.

    (2) Where the Minister of Science, ICT and Future Planning intends to revoke the designation of a certification institution or to order business suspension thereof pursuant to Article 32-3 of the Act, he/she shall hold a hearing, and where the designation has been revoked or business suspension has been ordered, he/she shall publish such fact in an official gazette.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 31-8 (Indication of and Publicity for Web Accessibility Quality Certification)

    (1) The indication of Web accessibility quality certification referred to in Article 32-4 (1) of the Act shall be as specified in attached Table 5.

    (2) Where a person who has obtained web accessibility quality certification intends to indicate or publicize the details of certification pursuant to Article 32-4 (1) of the Act, he/she shall indicate the scope and the effective period of certification.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 32 (Support of Business Operators Related to Narrowing of Digital Divide)

    (1) A business operator who intends to receive support from a national agency or local government under Article 33 (2) of the Act shall apply for support by submitting the necessary matters under the following classifications to the national agency or local government:

    1. A business operator who develops and produces information communications equipment and software (hereinafter referred to as “information communications products“) for improving access to information by persons with disabilities, aged persons, etc. and the related user environment: Details of the information communications products in question and the details of financial and technical support applied for;

    2. A business operator who provides content for persons with disabilities, aged persons, farmers, fishermen and low-income earners: Details of the information communications products in question and the details of financial and technical support applied for;

    3. A business operator who develops and distributes relevant technology under Article 33 (1) of the Act (hereinafter referred to as “technology related to narrowing of the digital divide“): Details of the technology related to narrowing of the digital divide in question and the details of financial and technical support applied for.

    (2) Upon receiving an application under paragraph (1), national agencies and local governments shall comprehensively consider the following matters when selecting a person eligible to receive support:

    1. A business operator’s record of performance on the development, production and provision of information communications products and content and on the development of technologies related to narrowing of the digital divide;

    2. Usefulness of information communications products, content, or technologies related to narrowing of the digital divide which a business operator intends to develop, produce, provide and distribute;

    3. Appropriateness of the production plan of information communications products, provision plan of content, and development plan of the technologies related to narrowing of the digital divide.

    (3) Necessary matters for the methods and procedures of applying for support under paragraph (1) shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 33 (Support, etc. of Information Communications Products)

    (1) “Persons prescribed by Presidential Decree” in subparagraph 3 of Article 34 of the Act means the following persons: (Amended by Presidential Decree nº 24018, Aug. 3, 2012; Presidential Decree nº 24020, Aug. 3, 2012)

    1. Children subject to protection under subparagraph 4 of Article 3 of the Child Welfare Act;

    2. Persons who have received rating of injury between grade one to seven, among persons of distinguished service to the State who are registered under Article 6 of the Act on the Honorable Treatment and Support of Persons, etc. of Distinguished Service to the State;

    3. Immigrants by marriage, etc. under subparagraph 2 of Article 2 of the Multicultural Families Support Act;

    4. Persons who are currently receiving social welfare services under subparagraph 6 of Article 2 of the Social Welfare Services Act from social welfare foundations or social welfare facilities under subparagraph 3 or 4 of Article 2 of the same Act;

    5. Other persons deemed necessary by a national agency or local government for the improvement of access to information and user environment.

    (2) National agencies and local governments shall comprehensively consider the following matters in providing information communications products under Article 34 of the Act:

    1. Usability of information communications products;

    2. Capability of a person eligible to receive support to use information communications products;

    3. Economic conditions of a person eligible to receive support.

    (3) Where it is inevitable for the performance of business affairs for the support of information communications products under Article 34 of the Act, national agencies and local governments may process materials containing resident registration numbers under subparagraph 1 of Article 19 of the Enforcement Decree of the Personal Information Protection Act. (Inserted by Presidential Decree nº 23488, Jan. 6, 2012)

    Article 34 (Targets and Types, etc. of Education for Narrowing Digital Divide)

    (1) “Persons prescribed by Presidential Decree” in Article 35 (2) 1 of the Act means persons with disabilities under Article 2 (1) of the Enforcement Decree of the Act on Welfare of Persons with Disabilities.

    (2) “Persons prescribed by Presidential Decree” in Article 35 (2) 4 of the Act means the following persons: (Amended by Presidential Decree nº 21847, Nov. 26, 2009; Presidential Decreenº 24018, Aug. 3, 2012; Presidential Decree nº 24020, Aug. 3, 2012)

    1. Children subject to protection under subparagraph 4 of Article 3 of the Child Welfare Act;

    2. The aged under subparagraph 1 of Article 2 of the Act on Prohibition of Age Discrimination in Employment and Elderly Employment Promotion;

    3. Immigrants by marriage, etc. under subparagraph 2 of Article 2 of the Multicultural Families Support Act;

    4. Persons under protection at single-parent family welfare facilities under Article 19 (1) of the Single-Parent Family Support Act;

    5. Farmers and fishermen under subparagraph 2 of Article 3 of the Framework Act on Agriculture and Fisheries, Rural Community, and Food Industry;

    6. Deleted.; (By Presidential Decree nº 21847, Nov. 26, 2009)

    7. Other persons deemed necessary by a national agency or local government for narrowing of the digital divide.

    (3) The targets of education for narrowing the digital divide under Article 35 (4) of the Act shall be persons falling under any subparagraph of Article 35 (2) of the Act.

    (4) The types of education for narrowing the digital divide under Article 35 (4) of the Act shall be as follows:

    1. Basic education concerning computers and the Internet, etc.;

    2. Education concerning how to search, process and produce necessary information utilizing computers and the Internet, etc.;

    3. Other education deemed necessary by a national agency or local government.

    Article 35 (Supplementation, etc. of Information Protection System)

    (1) The Minister of Science, ICT and Future Planning shall consult in advance with the heads of relevant agencies when the Minister establishes standards for the performance and reliability of information protection systems under Article 38 (1) of the Act, or determines detailed matters on the affairs of evaluating or certifying whether such standards are complied with. In such cases, where the head of a relevant agency determines the detailed matters on certification affairs and gives notice thereof to the Minister of Science, ICT and Future Planning, the consultation thereof shall be deemed to have undergone. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) When a person who manufactures or imports information protection systems requests confirmation of whether the said systems comply with the standards under Article 38 (1) of the Act, the Minister of Science, ICT and Future Planning may require the President of the Korea Internet and Security Agency under Article 52 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc., or the head of any institution meeting the standards under relevant international conventions to investigate, test or evaluate the said systems. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) A person who requests an investigation, test or evaluation under paragraph (2) shall pay the fees determined by the President of the Korea Internet and Security Agency or the head of any institution meeting the standards under relevant international conventions pursuant to the standards prescribed and published by the Minister of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 36 (Establishment of Sound Information Communications Ethics)

    (1) The Minister of Science, ICT and Future Planning may advise the heads of national agencies, etc. who have installed equipment which allows many unspecified persons to search, save, send and receive information using information communications networks to install and supplement relevant equipment or software which prevents access to unwholesome information, such as obscene materials, violent materials, etc., in accordance with Article 40 of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) The Minister of Science, ICT and Future Planning may establish and publish standards for managerial and technical measures, etc. required for the wholesome use of the information communications services by juveniles under Article 40 of the Act, and advise the providers of information communications services under Article 2 (1) 3 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. (hereinafter referred to as “providers of information communications services“) to comply with the said standards. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 37 (Prevention, etc. of Harm to Users)

    Where necessary to prevent harm to life, body and property resulting from information communications-related equipment and services provided for users under Article 41 (1) 3 of the Act, the Minister of Science, ICT and Future Planning may establish standards to prevent harm to users caused by information communications-related equipment and services, and standards to indicate the use, cautions for use, etc. of information communications-related equipment and services, thereby advising the manufacturers and importers of information communications-related equipment, or the providers of information communications services, etc. to comply with the said standards. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 38 (Fact-Finding Surveys)

    (1) “Matters prescribed by Presidential Decree” under Article 43 (2) 4 of the Act means the following: (Amended by Presidential Decree nº 22151, May 4, 2010; Presidential Decree nº 24466, Mar. 23, 2013)

    1. Actual conditions related to the execution of national informatization by national agencies, etc.;

    2. Actual conditions related to support provided by national agencies, etc. for the informatization of private sectors;

    3. Actual conditions related to information culture concerning the utilization and use patterns of information communications services and information communications products;

    4. Actual conditions related to the digital divide concerning access, retention, use, etc. of information communications services and information communications products;

    5. Actual conditions related to the addiction of the users of information communications services, such as the Internet, mobile phone, etc. and information communications products ;

    6. Actual conditions related to the introduction and operation of information technology architectures under subparagraph 12 of Article 2 of the Electronic Government Act and the record of performance thereof;

    7. Current status of the volume of knowledge information resources retained by national agencies, etc. and the digitization thereof;

    8. Current status of the management of knowledge information resources and important knowledge information resources by national agencies, etc.;

    9. Other matters concerning national informatization which are deemed necessary by the Minister of Science, ICT and Future Planning.

    (2) The Minister of Science, ICT and Future Planning may annually directly conduct surveys of national agencies, etc., the public, private enterprises and associations or request the submission of necessary data thereto, if necessary for fact-finding surveys under Article 43 (2) of the Act. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 39 (Development and Distribution of Indices)

    The Minister of Science, ICT and Future Planning shall develop and distribute the following indices under Article 44 of the Act: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Indices by which the level of national informatization may be measured;

    2. Indices by which the level of information culture may be measured;

    3. Other indices necessary for the management of national informatization and knowledge information resources, and narrowing of the digital divide.

    Article 39-2 (Entrustment of Business relating to Green Internet Certification)

    The Minister of Science, ICT and Future Planning shall entrust the following affairs, among business affairs relating to Green Internet certification, to the National Information Society Agency pursuant to Article 46 (2) 1 of the Act:

    1. Acceptance of applications for Green Internet certification;

    2. Examination for Green Internet certification;

    3. Issuance of Green Internet certificates;

    4. Management concerning the use of the Green Internet certification mark.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    Article 40 (Sectors, etc. for which Dedicated Institution can be Designated)

    (1) Sectors for which the Minister of Science, ICT and Future Planning may designate a dedicated institution under Article 48 (1) of the Act (hereinafter referred to as “dedicated institution“) are as follows: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Building and management of the national information super-highway under Article 49 (1) of the Act;

    2. Projects for broadband integrated research and development networks to build a B-ISDN;

    3. Leading projects for verifying new technology on B-ISDN, such as the future Internet, etc.;

    4. Application technology development projects for broadband integrated information communications;

    5. Pilot area projects for quality control of B-ISDN and the enhancement of LAN;

    6. Establishment of joint support facilities for promoting the building of B-ISDN infrastructure;

    7. Core technology development projects for the building of B-ISDN;

    8. Public relations projects for the public;

    9. Research projects on laws and institutions;

    10. International cooperation projects;

    11. Development projects related to platform technology for competitiveness;

    12. Pilot projects for facilitating the building of B-ISDN infrastructure and for revitalizing the use thereof;

    13. Other projects necessary for facilitating the building and use of B-ISDN infrastructure.

    (2) The head of a dedicated institution shall establish a detailed project plan and funds execution plan for each designated sector and submit it to the Minister of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) Matters necessary for the performance of dedicated institution’s affairs, such as project management, etc. shall be prescribed by the Minister of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 41 (Building and Management of National Information Super-Highway)

    (1) A dedicated institution shall carry out the following affairs when building and managing the national information super-highway pursuant to Article 49 (1) and (3) of the Act: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Establishment of detailed project plans for the building and operation of the national information super-highway;

    2. Establishment, execution and management of government-contributed financial resources;

    3. Building, operation, maintenance and repair of the national information super-highway;

    4. Surveys on demand for the national information super-highway and the establishment of a utilization plan thereof;

    5. Ensuring the security of the national information super-highway;

    6. Other affairs deemed necessary by the Minister of Science, ICT and Future Planning for the building and operation of the national information super-highway.

    (2) The head of a dedicated institution may require a key communications business operator to implement part of the following affairs in order to efficiently carry out the affairs under paragraph (1) 3: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Design and building of the national information super-highway;

    2. Operation of the national information super-highway;

    3. Maintenance and repair of the national information super-highway and the efficient recovery from obstacles that arise;

    4. Imposition, collection and management of charges to/from agencies using the national information super-highway;

    5. Other affairs deemed necessary by the Minister of Science, ICT and Future Planning for the efficient building and operation of the national information super-highway.

    (3) The head of a dedicated institution shall determine the standards, procedures, etc. of selecting key communications business operators capable of efficiently carrying out relevant affairs and obtain approval therefor from the Minister of Science, ICT and Future Planning when he/she requires a key communications business operator to implement part of the affairs under paragraph (2). (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) The head of a dedicated institution shall determine agencies, conditions, etc. for the use of the national information super-highway and obtain approval therefor from the Minister of Science, ICT and Future Planning. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 42 (Scope of Non-Profit Organizations)

    Non-profit organizations prescribed by Presidential Decree” under Article 49 (1) of the Act means the following organizations: (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    1. Schools of any level established under the Elementary and Secondary Education Act, Higher Education Act and other Acts;

    2. Research institutions which are non-profit corporations;

    3. Medical institutions established by any person prescribed under the provisions of Article 33 (2) 2 through 4 of the Medical Service Act, the National Health Insurance Corporation established under the National Health Insurance Act, and the National Pension Service under the National Pension Act;

    4. Museums and art galleries under the Museum and Art Gallery Support Act;

    5. Libraries under the Libraries Act;

    6. Other non-profit organizations deemed necessary by the Minister of Science, ICT and Future Planning for facilitating the building and use of the national information super-highway.

    Article 43 (Requests, etc. for Construction or Lease of Conduits, etc.)

    (1) Key communications business operators, etc. under Article 51 (2) of the Act (hereinafter referred to as “key communication business operators, etc.”) shall, when they request the construction of conduits, common utility ducts, electric poles, etc. (hereinafter referred to as “conduits, etc.”), consult in advance with other key communication business operators, etc. regarding demand for conduits, etc.

    (2) Where an agency which constructs, operates and manages roads, railroads, subways, waterworks and sewerage, electrical facilities, telecommunications circuit facilities, etc. (hereinafter referred to as “facilities management agency“) is requested to construct or lease conduits, etc. under Article 51 (2) of the Act, the agency shall endeavor to enter into an agreement related to such construction or lease with key communications business operators, etc. within three months from the date of receiving such request, unless there is a compelling reason not to do so to the extent that it does not impede the proper business purpose of a facilities management agency.

    Article 44 (Requests for Mediation and Deliberation)

    (1) Key communications business operators, etc. may submit a request for mediation to the Minister of Science, ICT and Future Planning under Article 51 (3) of the Act if an agreement between a key communications business operator, etc. and a facilities management agency is not concluded within the period specified in Article 43 (2), or such an agreement cannot be concluded. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (2) The Minister of Science, ICT and Future Planning shall hear the opinions of the parties involved and may investigate the facts where necessary, when conducting mediation on the construction or lease of conduits, etc. upon receiving a request for mediation under paragraph (1). (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (3) In conducting mediation under paragraph (2), where the Minister of Science, ICT and Future Planning determines that a failure to reach an agreement between the parties appears severely detrimental to public interest, the Minister may make a mediatory decision for the conclusion of a fair agreement through consultation with the heads of relevant central administrative agencies, taking account of the interests, etc. of the parties involved. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    (4) Where the Minister of Science, ICT and Future Planning has made a mediatory decision under paragraph (3), the parties involved shall comply with the mediatory decision unless there is a compelling reason not to do so. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 45 (Requests for Mediation on Construction or Lease of Conduits, etc.)

    A person who intends to request mediation on an agreement for construction or lease of conduits, etc. under Article 44 (1) shall submit to the Minister of Science, ICT and Future Planning a request for mediation on an agreement for the construction, etc. of conduits, etc. accompanied with documents concerning the agreement history and execution status. (Amended by Presidential Decree nº 24466, Mar. 23, 2013)

    Article 46 (Imposition of Administrative Fine)

    The criteria for the imposition of administrative fine referred to in Article 47 (1) and (2) of the Act shall be as specified in attached Table 6.

    (Article Inserted by Presidential Decree nº 24844, Nov. 20, 2013)

    ADDENDA

    Article 1 (Enforcement Date)

    This Decree shall enter into force on August 23, 2009.

    Article 2 (Repeal of other Statutes)

    The following Acts and subordinate statutes are hereby each repealed:

    1. Enforcement Decree of the Act on Narrowing of the Digital Divide;

    2. Enforcement Decree of the Knowledge Information Resource Management Act.

    Article 3 Omitted.

    Article 4 (Relationship to other Statutes)

    Where other statutes cite the former Enforcement Decree of the Framework Act on Informatization Promotion, the former Enforcement Decree of the Act on Narrowing of the Digital Divide, the former Enforcement Decree of the Knowledge Information Resource Management Act or the provisions thereunder at the time this Decree enters into force, this Decree or the relevant provisions of this Decree shall be deemed cited in lieu of the former provisions if the provisions corresponding thereto exist in this Decree.

    ADDENDA (Presidential Decree nº 21847, Nov. 26, 2009)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on November 28, 2009.

    Articles 2 through 6 Omitted.

    ADDENDA (Presidential Decree nº 21882, Dec. 14, 2009)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Presidential Decree nº 22075, Mar. 15, 2010)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on March 19, 2010. (Proviso Omitted.)

    Article 2 Omitted.

    ADDENDA (Presidential Decreenº. 22151, May 4, 2010)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on May 5, 2010.

    Articles 2 through 4 Omitted.

    ADDENDA (Presidential Decree nº 22218, Jun, 28, 2010)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on the date of its promulgation.

    Articles 2 (Applicability concerning Establishment of Implementation Plans for National Informatization)

    The amended provisions of Article 4 shall also apply to an implementation plan for which establishment procedures are still in progress at the time this Decree enters into force.

    ADDENDUM (Presidential Decree nº 22475, Nov. 10, 2010)

    This Decree shall enter into force on the date of its promulgation.

    ADDENDA (Presidential Decree nº 23488, Jan. 6, 2012)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Article 2 Omitted.

    ADDENDA (Presidential Decree nº 24018, Aug. 3, 2012)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on August 5, 2012.

    Articles 2 through 7 Omitted.

    ADDENDA (Presidential Decree nº 24020, Aug. 3, 2012)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on August 5, 2012. (Proviso Omitted.)

    Articles 2 and 3 Omitted.

    ADDENDA (Presidential Decree nº 24466, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on the date of its promulgation.

    Article 2 Omitted.

    ADDENDUM (Presidential Decree nº 24844, Nov. 20, 2013)

    This Decree shall enter into force on November 23, 2013.

    ADDENDUM (Presidential Decree nº 25331, Apr. 29, 2014)

    This Decree shall enter into force on the date of its promulgation.

    ADDENDA (Presidential Decree nº 25339, Apr. 29, 201)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on the date of its promulgation.

    Articles 2 and 3 Omitted.

    ADDENDA (Presidential Decree nº 25448, Jul. 7, 2014)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on July 8, 2014.

    Articles 2 through 4 Omitted.

    ADDENDA (Presidential Decree nº 25456, Jul. 14, 2014)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on July 15, 2014.

    Articles 2 through 6 Omitted.

    ADDENDA (Presidential Decree nº 25751, Nov. 19, 2014)

    Article 1 (Enforcement Date)

    This Decree shall enter into force on the date of its promulgation: Provided, That among the Presidential Decrees which are amended according to Article 5 of Addenda, each amended part of the Decree, which is promulgated before this Decree enters into force but of which the enforcement date has not come, shall enter into force on the date of the promulgation of the relevant Presidential Decree.

    Articles 2 through 5 Omitted.

    08Nov/21

    Act nº 432, January 28, 1957. Copyright Act 1957

    Act nº 432, January 28, 1957. Copyright Act 1957. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9529, Mar. 25, 2009; Act nº 9625, Apr. 22, 2009; Act nº 9785, Jul. 31, 2009; Act nº 10807, Jun. 30, 2011; Act nº 11110, Dec. 2, 2011; Act nº 11903 Jul. 16, 2013; Act nº 12137, Dec. 30, 2013; Act nº 13978, Feb. 3, 2016; Act nº 14083, Mar. 22, 2016; Act nº 14432, Dec. 20, 2016; Act nº 14634, Mar. 21, 2017) .

    COPYRIGHT ACT

    Expand Act nº 14634, Mar. 21, 2017

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)          

    The purpose of this Act is to protect the rights of authors and the rights neighboring on them and to promote fair use of works in order to contribute to the improvement and development of culture and related industries. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 2 (Definitions)

    The terms used in this Act shall be defined as follows: (Amended by Act nº 9625, Apr. 22, 2009; Act nº 10807, Jun. 30, 2011; Act nº 11110, Dec. 2, 2011; Act nº 14083, Mar. 22, 2016)

    1. The term “work” means a creative production that expresses human thoughts and emotions;

    2. The term “author” means a person who creates a work;

    3. The term “public performance” means to present to the public works, performances, phonograms or broadcasts by acting, musical playing, singing, narrating, reciting, screening, playback or other means, including transmission (excluding interactive transmission) made in the connected premises in the possession of one and the same person;

    4. The term “performer” means a person who gives a stage performance by expressing works through acting, dancing, musical playing, singing, narrating, reciting or other artistic means or by expressing things other than works in a similar way, including a person who conducts, directs or supervises a stage performance;

    5. The term “phonogram” means the medium in which the sound (referring to voice or sound; the same hereinafter) is fixed (including a digitalized sound): Provided, That excluding the sound fixed along with images;

    6. The term “phonogram producer” means a person who makes an overall plan and takes charge of producing an original phonogram;

    7. The term “public transmission” means transmitting works, stage performances, phonograms, broadcasts or database (hereinafter referred to as “works, etc.”) by making such available to the public by wire or wireless means so that the public may receive them or have access to them;

    8. The term “broadcasting” means, among the public transmission, transmitting sound or image, or sound and image so that the public may receive it at the same time;

    8-2. The term “encrypted broadcasting signal” means electronically encrypted broadcasting signals originated by a broadcasting organization or a person who has obtained consent from a broadcasting organization for the purpose to prevent or hinder from receiving broadcasting (limited to broadcasting by means of radio or satellite communications) without authorization;

    9. The term “broadcast organization” means a person who engages in broadcasting business;

    10. The term “interactive transmission” means, among types of public transmission, to make works, etc. available for the public so that the members of the public may have access at the time and place of their own choice, including transmission to be done accordingly;

    11. The term “digital sound transmission” means, among types of public transmission, the transmission of sound in the digital form initiated at the request of the members of the public for the purpose of having the public receive simultaneously among the public transmission, excluding interactive transmission;

    12. The term “digital sound transmission organizations” means a person who engages in digital sound transmission business;

    13. The term “cinematographic work” means a creative production in which a series of images (regardless of whether accompanied by sound) are recorded, and which may be played by mechanical or electronic devices to be seen, or seen and heard through a reproduction;

    14.  The term “producer of cinematographic works” means one who plans and takes responsibility for the whole in the production of cinematographic works;

    15. The term “works of applied art” means the works of art that may be reproduced in the same shapes as article, and whose originality may be recognized apart from the articles used for reproduction. And designs, etc. are included;

    16. The term “computer program work” means a creation expressed in a series of instructions or command which are directly or indirectly applied within devices having a capability of processing information, such as a computer (hereinafter referred to as “computer”), in order to obtain certain results;

    17. The term “compilation” means the collections of works, symbols, letters, sounds, images and other forms of data (hereinafter referred to as “materials”), but shall include the database;

    18. The term “compilation works” means the compilations which are of creative nature in terms of selection, arrangement or composition of their materials;

    19. The term “database” means compilation whose materials are systematically arranged or composed, so that they may be individually accessed or retrieved;

    20. The term “producer of database” means one who has made a substantial investment in human or material resource for the production of database, or for the renewal, verification or supplement of their materials (hereinafter referred to as “renewal, etc.”);

    21. The term “joint works” means the works jointly created by two or more persons, and of which the part of their contributions may not be separately exploited;

    22. The term “reproduction” means the temporary or permanent fixation of works in a tangible medium or a remaking of works by means of printing, photographing, copying, sound or visual recording, or other means; in cases of architectural structures, it includes carrying out construction of works in accordance with the models or plans for the relevant construction works;

    23. The term “distribution” means a transfer by assignment or lending of the original or its reproduction etc. to the public for free or at charge;

    24. The term “publication” means a reproduction and distribution of the works or phonograms to meet public demand;

    25. The term “making works public” means to make the works open to the public by means of public performance, public transmission, or exhibit and by other means, and to publish the works;

    26. The term “copyright trust service” means a business which continuously manages rights on behalf of the holder of economic rights of author, an exclusive publication right, publication right, or neighboring right or a person who has the right as a database producer, and which includes the case of a general agent regarding exploitation of works;

    27. The term “copyright agency or brokerage service” means a business which acts as an agent or a broker on behalf of the holder of economic rights of author, an exclusive right of publication, publication right, or neighboring right or a person who has the right as a database producer, regarding exploitation of works;

    28. The term “technological protection measures” means either of the following measures:

    (a) Technological measures taken by a right holder or a person who has obtained the said holder’s consent, in order to effectively prevent or control the access to works, etc. protected under this Act, in relation to the exercise of copyright or other rights protected pursuant to this Act;

    (b) Technological measures taken by a right holder or a person who has obtained the said holder’s consent in order to effectively prevent or restrict an act of infringing copyright or other rights protected pursuant to this Act;

    29. The term “rights management information” means any of the following information or the numerals or symbols representing the said information, where each information is attached to the original or copies of the works, etc. protected by copyright or other rights protected pursuant to this Act, or is accompanied with public performance, implementation or public transmission thereof:

    (a) Information to identify the works, etc.;

    (b) Information to identify a person who has copyright or other rights protected pursuant to this Act;

    (c) Information relating to the methods and conditions of the use of works, etc.;

    30. The term “online service provider” means either of the following persons:

    (a) A person who transmits, designates a route of, or provides connections to the works, etc. selected by users to deliver such works, etc. without any modification of their content through the information and communications networks (referring to the information and communications networks under Article 2 (1) 1 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.; hereinafter the same shall apply) between the points designated by users;

    (b) A person who provides the services to allow users to access the information and communications networks or reproduce or interactively transmit the works, etc. through the information and communications networks, or who provides or operates facilities therefor;

    31. The term “work made for hire” means a work made by an employee of a legal person, organization or other employers (hereinafter referred to as “juristic person, etc.”) during the course of his or her duties and on the initiative of legal person etc.;

    32. The term “public” means a large number of unspecified persons (including a large number of specified persons);

    33. The term “authentication” means to verify the justifiable holder of right for authorization of use of the works, etc.;

    34. The term “decompilation of program code” means to reproduce or convert computer program work code in order to obtain information necessary for compatibility of independently created computer program works with other computer programs;

    35. The term “label” means a sign to be attached, enclosed or added, or a sign devised for such purposes, to tangible copies, packages or documents of works, etc. in order to indicate that such copies have been produced with legitimate authority;

    36. The term “movie theater, etc.” means movie theaters, premier theaters or other places to screen cinematographic works to the public, the entrance to which is controlled by a person who screen such works.

    Article 2-2 (Formulation of Measures for Protection of Copyright)

    (1) The Minister of Culture, Sports and Tourism may formulate and execute the following measures to achieve the purposes of this Act:

    1. Matters concerning a basic policy for the protection of copyright and creation of an environment for fair use of works;

    2. Matters concerning education and publicity for raising public awareness of copyright;

    3. Matters concerning policies for the rights management information of works, etc. and for technological protection measures thereof.

    (2) Matters necessary for formulation and enforcement of policies pursuant to paragraph (1) shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 3 (Foreigners’ Works)      

    (1) Foreigners’ works shall be protected in accordance with the treaties which the Republic of Korea has acceded to or concluded.

    (2) The works of foreigners who permanently reside in the Republic of Korea (including stateless persons and foreign legal persons whose principal offices are located in the Republic of Korea), or foreigners’ works which are first made public in the Republic of Korea (including works made public in the Republic of Korea within 30 days after their making public in a foreign country) shall be protected under this Act.

    (3) Even when foreigners’ works are to be protected under paragraphs (1) and (2) (excluding foreigners who permanently reside in the Republic of Korea and stateless persons; hereinafter the same shall apply in this Article), if the relevant foreign country does not protect the works of the nationals of the Republic of Korea, their protection under treaties and this Act may be correspondingly restricted. (Amended by Act nº 10807, Jun. 30, 2011)

    (4) Even in cases of foreigners’ works protected pursuant to paragraphs (1) and (2), where the period of protection has expired in the relevant foreign country, the period of protection under this Act shall not be recognized. (Inserted by Act nº 10807, Jun. 30, 2011)

    CHAPTER II.- COPYRIGHT

    SECTION 1.- Works

    Article 4 (Examples of Works)     

    (1) The following shall be the examples of works referred to in this Act:

    1. Novels, poems, theses, lectures, speeches, plays and other literary works;

    2. Musical works;

    3. Theatrical works including dramas, choreographies, pantomimes, etc.;

    4. Paintings, calligraphic works, sculptures, printmaking, crafts, works of applied art, and other works of art;

    5. Architectural works including buildings, architectural models and design drawings;

    6. Photographic works (including those produced by similar methods);

    7. Cinematographic works;

    8. Maps, charts, design drawings, sketches, models and other diagrammatic works;

    9. Computer program works.

    (2) Deleted. (by Act nº 9625, Apr. 22, 2009)

    Article 5 (Derivative Works)         

    (1) A creative work produced by means of translation, arrangement, alteration, dramatization, cinematization, etc. of an original work (hereinafter referred to as a “derivative work”) shall be protected as an independent work.

    (2) The protection of a derivative work shall not affect the rights of the author of the original work.

    Article 6 (Compilation Works)     

    (1) Compilation works shall be protected as independent works.

    (2) The protection of compilation works shall not affect the copyright of materials constituting such compilation work and other rights protected under this Act.

    Article 7 (Works Not Protected)  

    No work which falls under any of the following subparagraphs shall be protected under this Act:

    1. Constitution, Acts, treaties, decrees, and municipal ordinances and rules;

    2. Bulletins, public notifications, directives and others similar thereto which are issued by the central or local government;

    3. Judgments, decisions, orders, or adjudications of courts, as well as rulings and decisions made by the administrative appeals procedures, or other similar procedures;

    4. Compilations or translations of works as referred to in subparagraphs 1 through 3 which are produced by the central or local government;

    5. Current news reporting which delivers simple facts.

    SECTION 2.- Authors

    Article 8 (Presumption of Authors, etc.)  

    (1) Any person who falls under any of the following subparagraphs shall be presumed to have the copyright for his or her works as an author: (Amended by Act nº 10807, Jun. 30, 2011)

    1.A person whose real name or well-known pseudonym (referring to the stage name, pen name, abbreviated name, etc.; hereinafter the same shall apply) is indicated as the name of the author in a usual manner on the original or copies of a work;

    2.A person whose real name or well-known pseudonym is indicated as the name of the author in the public performance or public transmission of a work.

    (2)If the name of the author is not indicated as prescribed under any of the subparagraphs of paragraph (1), the person who is indicated as a publisher, public performer or a person making the work public shall be presumed to have the copyright. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 9 (Author of Works Made for Hire)             

    The authorship of a work made for hire which is made by an employee of a legal person, etc. during the course of his duties and is made public under the name of such a legal person, etc. as the author shall be attributed to that legal person, etc., unless otherwise stipulated in the contract or work regulation, etc.: Provided, That in cases of a computer program work (hereinafter referred to as “program”), being made public is not required. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 10 (Copyright)     

    (1) The author shall hold the rights under Articles 11 through 13 (hereinafter referred to as “author’s moral right“) and the rights falling under Articles 16 through 22 (hereinafter referred to as “author’s economic right“).

    (2) A copyright shall commence from the time of its creation, and shall not require a fulfillment of any procedures or formalities.

    SECTION 3.- Author’s Moral Right

    Article 11 (Right to Make Public)               

    (1) The author shall have the right to decide whether or not to make his or her work public.

    (2) If the author has transferred by assignment his or her economic right on a work which is not yet made public pursuant to Article 45, authorized its use pursuant to Article 46, or established the exclusive publication rights pursuant to Article 57 or publication rights pursuant to Article 63, he or she shall be presumed to have given the other party his or her consent to make it public. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    (3) If the author has transferred by assignment the original of his or her work of art, architectural work or photographic work (hereinafter referred to as “work of art, etc.”) which has not been made public, he or she shall be presumed to have given the other party his or her consent to make it public in the manner of exhibition.

    (4) If a derivative work or compilation work produced with the consent of the author has been made public, its original shall be also considered to have been made public.

    (5) Where the author donates his or her pieces of unpublished work, etc. to libraries, etc. under Article 31, it shall be presumed that he or she consents to making them public at the time of his or her donation unless otherwise expressly stated. (Inserted by Act nº 11110, Dec. 2, 2011)

    Article 12 (Right of Paternity)     

    (1) The author shall have the right to indicate his or her real name or pseudonym on the original or copy of his or her work, or on the medium of publication by which his or her work is made public.

    (2) Unless otherwise expressly stated by the author, the person using his or her work shall indicate the author’s name in accordance with the author’s manner of indicating his or her real name or pseudonym: Provided, That the same shall not apply where deemed unavoidable in the light of the nature of a work as well as the purpose and manner of its use.

    Article 13 (Right of Integrity)       

    (1) The author shall have a right to maintain the integrity of the content, form and title of his or her work.

    (2) No author shall raise an objection to a modification falling under any of the following subparagraphs: Provided, That the same shall not apply to the modifications of substantial contents: (Amended by Act nº 9625, Apr. 22, 2009)

    1. In cases of using a work pursuant to Article 25, the modification of expression within the limit as deemed unavoidable for the purpose of school education;

    2. Extension, rebuilding or other modifications of an architectural structure;

    3. Modification within the necessary limit to enable a program used only on a specific computer to be run on other computers;

    4. Modification within the necessary limit to use a program more effectively for a specific computer than others;

    5. Other modifications within the limit as deemed unavoidable in the light of the nature of a work as well as the purpose and manner of its use.

    Article 14 (Inalienability of Author’s Moral Right)              

    (1) Author’s moral rights shall belong exclusively to the author.

    (2) Even after the death of the author, no person who use his or her work shall commit an act which would be prejudicial to author’s moral rights if he or she were alive: Provided, That if such act is deemed to have not defamed the honor of the author in the light of the nature and extent of the act, and in view of the prevailing social norms, the same shall not apply.

     Article 15 (Author’s Moral Right to Joint Work)  

    (1) Author’s moral right to a joint work may not be exercised without the unanimous agreement of all the authors concerned. In such cases, each of the authors may not, in bad faith, prevent the agreement from being reached.

    (2) Authors of a joint work may designate one of them as a representative in the exercise of their moral rights.

    (3) Limitations imposed on the representation under paragraph (2), if any, shall not be effective against a bona fide third person.

    SECTION 4.- Author’s Economic Right

    SubSection 1.- Types of Author’s Economic Rights

    Article 16 (Right of Reproduction)            

    The author shall have the right to reproduce his or her work.

    Article 17 (Right of Public Performance)                

    The author shall have the right to perform his or her work publicly.

    Article 18 (Right of Public Transmission)                

    The author shall have the right to transmit his or her work in public.

    Article 19 (Right of Exhibition)    

    The author shall have the right to exhibit the original or copy of his or her work of art, etc.

    Article 20 (Right of Distribution)                

    The author shall have the right to distribute the original or copy of his or her work: Provided, That if the original or reproduction of the work has been offered to a deal by means of sale, etc. with permission of the relevant holder of author’s property right, the same shall not apply. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 21 (Right of Rental)           

    Notwithstanding the proviso to Article 20, the author shall have the right to authorize the commercial rental of phonograms made public (hereinafter referred to as commercial phonograms”) or programs made public for pursuit of profit. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 14083, Mar. 22, 2016)

    Article 22 (Right of Production of Derivative Works )        

    The author shall have the right to produce and use a derivative work based on his or her original work.

    SubSection 2.- Limitations on Author’s Economic Rights

    Article 23 (Reproduction for Judicial Proceedings, etc.)  

    It shall be permissible to reproduce a work if and to the extent deemed necessary for the purpose of judicial proceedings and of internal use in the legislative or administrative bodies: Provided, That the same shall not apply where such reproduction unreasonably prejudice the interests of the holder of author’s economic rights in the light of the nature of a work as well as the number of copies and the nature of reproduction.

    Article 24 (Use of Political Speech, etc.)  

    Political speeches delivered in public and statements made in public in the court, the National Assembly or local councils may be used in some way or other: Provided, That if the speeches and statements of the same author are used after compilation, the same shall not apply.

    Article 24-2 (Free Use of Public Works)   

    (1) A work produced as part of official duties and already made public by the State or a local government, or a work of which the author’s economic right is owned in its entirety by the State or a local government under a contract, may be used without permission: Provided, That the same shall not apply when the work falls under any of the following cases:

    1. Where it includes any information pertaining to national security;

    2. Where it corresponds to an individual’s privacy or confidential business information;

    3. Where it includes any information of which disclosure is limited under other Acts;

    4. Where it is registered with the Korea Copyright Commission under Article 112, and is managed as State-owned property under the State Property Act or as public property under the Public Property and Commodity Management Act.

    (2) The State may establish and enforce policies to invigorate use of public works, as prescribed by Presidential Decree, in order to promote the use of works which are produced and made public by a public institution or of which the author’s economic right is owned in its entirety under a contract by a public institution pursuant to Article 4 of the Act on the Management of Public Institutions.

    (3) When it is acknowledged as necessary for free use, the State or a local government may permit the use of public works among those prescribed in paragraph (1) 4, as prescribed by Presidential Decree, notwithstanding the State Property Act or the Public Property and Commodity Management Act.

    (Article Inserted by Act nº 12137, Dec. 30, 2013)

    Article 25 (Use for the Purpose of School Education)        

    (1) A work already made public may be reproduced in textbooks to the extent deemed necessary for the purpose of education at high schools, their equivalents or lower level schools.

    (2) Schools established by special Acts, the Early Childhood Education Act, the Elementary and Secondary Education Act, or the Higher Education Act, educational institutions which are operated by the State or local governments and education supporting institutions belonging to the State or local governments to support lessons of those educational institutions may reproduce, distribute, perform in public, display, or publicly transmit part of the works already made public where it is recognized as necessary for the lessons and for the purpose of support thereof: Provided, That it is inevitable to the whole work in view of the character of the work, the purpose, form, etc. of the work, they may use the work in whole. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 12137, Dec. 30, 2013)

    (3) Those who receive education at an educational institution provided for in paragraph (2) may reproduce or interactively transmit the works made public within the extent of paragraph (2) where it is recognized as necessary for the purpose of education.

    (4) Any person who intends to use a work pursuant to paragraphs (1) and (2) shall pay the relevant holder of author’s economic right the remuneration according to the standards stipulated and announced by the Minister of Culture, Sports and Tourism: Provided, That the reproduction, distribution, public performance, broadcasting, or interactive transmission of a work under paragraph (2) is done at high schools, their equivalents or lower level schools, no remuneration thereof shall be paid. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    (5)          The right to receive remuneration under paragraph (4) shall be exercised through an organization meeting the following requirements, which has been designated by the Minister of Culture, Sports and Tourism. When the Minister of Culture, Sports and Tourism designates an organization, he or she shall obtain prior consent from the organization: (Amended by Act nº 8852, Feb. 29, 2008)

    1. Organization comprised of persons who have the right to receive remuneration within the Republic of Korea (hereinafter referred to as “holder of right to remuneration“);

    2. Organization not aiming at profit-making;

    3. Organization fully capable of performing the duties of collection, distribution, etc. of remuneration.

    (6) When there is an application from the holder of a right to remuneration who is not a member of the organization, the organization under paragraph (5) shall not refuse to exercise the right for him or her. In such cases, the organization shall have the authority to perform an act in its own name in court or out of court regarding the right.

    (7) Where an organization under paragraph (5) falls under any of the following cases, the Minister of Culture, Sports and Tourism may revoke the designation thereof: (Amended by Act nº 8852, Feb. 29, 2008)

    1. When it fails to meet the requirements under paragraph (5);

    2. When it violates regulations defining the duties on remuneration;

    3. When it is possible to harm the interest of the holder of right to remuneration as it has suspended the duties on remuneration for a considerable period.

    (8) Any organization under paragraph (5) may use the remuneration that has been left undistributed for three years from the date of public announcement of remuneration distribution for the purpose of public interest with approval by the Minister of Culture, Sports and Tourism. (Amended by Act nº 8852, Feb. 29, 2008)

    (9) Matters necessary for the designation and revocation of an organization, work regulations, public announcement of remuneration distribution, approval for use of undistributed remuneration for the purpose of public interest, etc. under paragraphs (5), (7), and (8) shall be prescribed by Presidential Decree.

    (10) Where an educational institution performs interactive transmission pursuant to the provisions of paragraph (2), it shall take necessary measures prescribed by Presidential Decree, such as the measures to prevent reproduction, in order to prevent infringement of copyright or other rights protected pursuant to this Act.

    Article 26 (Use for News Reporting)         

    In cases of reporting current events by means of broadcasts or newspapers, or by other means, it shall be permissible to reproduce, distribute, perform publicly, transmit publicly a work seen or heard in the relevant courses, to the extent justified by the reporting purpose.

     Article 27 (Reproduction, etc. of News Articles or Editorials)        

    News articles or editorials inserted in the newspapers and online newspapers under Article 2 of the Act on the Promotion of Newspapers, etc. or the news agencies under Article 2 of the Act on the Promotion of News Communications may be reproduced, distributed or broadcasted by other media organizations: Provided, That if there is an indication prohibiting the use thereof, the same shall not apply. (Amended by Act nº 9785, Jul. 31, 2009)

    Article 28 (Quotation from Works Made Public)  

    Works already made public may be quoted for news report, criticism, education, research, etc., in compliance with the fair practices within the reasonable extent.

    Article 29 (Public Performance and Broadcasting for Non-Profit Purposes)           

    (1) It shall be permissible to perform publicly (excluding cases where any commercial phonograms or cinematographic works made public for commercial purposes are played) or broadcast a cinematographic work already made public for non-profit purposes and without receiving any benefit in return from audience, spectators or third persons: Provided, That the same shall not apply to cases where performers are paid any normal remuneration. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) It shall be permissible to play and perform publicly any commercial phonograms or cinematographic works made public for commercial purposes for the general public if no benefit in return for the relevant public performance is received from audience or spectators: Provided, That the same shall not apply to the cases as prescribed by Presidential Decree. (Amended by Act nº 14083, Mar. 22, 2016)

    Article 30 (Reproduction for Private Use)              

    It shall be permissible for a user to reproduce in private, without any commercial purposes, a work already made public, within the limit of personal, family or the equivalent use: Provided, That this shall not apply to the case of reproductions by a photocopier installed for the use by the general public.

    Article 31 (Reproductions, etc. in Libraries, etc.)                

    (1) Libraries under the Libraries Act and the facilities prescribed by Presidential Decree (including the heads of relevant facilities; hereinafter referred to as “libraries, etc.”) among facilities which provide books, documents, records and other materials (hereinafter referred to as “books, etc.”) designed for public access, may reproduce the works by using books, etc. held by the relevant libraries, etc. (including the books, etc. reproduced by or transmitted to the relevant libraries, etc. under the provisions of paragraph (3), in cases of subparagraph 1) when it falls under any of the following subparagraphs: Provided, That they shall not reproduce the works in digital format in the cases of subparagraphs 1 and 3:

    1. Where a copy of a part of the books, etc. already made public is provided to one per person at the request of a user with the purpose of research and study;

    2. Where it is necessary to make a self preservation of books, etc.;

    3. Where copies of books, etc., which are hard to obtain due to out of print or other equivalent causes, are made and provided to other libraries, etc., at their request, for their preservation purposes.

    (2) The libraries, etc. may reproduce or interactively transmit the books, etc. held thereby so as to have the users peruse them within the relevant libraries, etc. by using computers. In such cases, the number of users allowed to peruse simultaneously shall not exceed the number of copies of the books, etc. held by said libraries, etc. or authorized to be used by the person holding copyright or other rights protected under this Act. (Amended by Act nº 9625, Apr. 22, 2009)

    (3) The libraries, etc. may reproduce or interactively transmit the books, etc. held by them so as to have the users peruse them inside other libraries, etc. by using computers: Provided, That the same shall not apply where the whole or part of books, etc. are published for commercial purposes, and five years have not passed from the date of their publication. (Amended by Act nº 9625, Apr. 22, 2009)

    (4) In making any reproductions of the books, etc. under paragraph (1) 2 and those of the books, etc. under paragraphs (2) and (3), if the said books, etc. are sold in digital format, the libraries, etc., shall be prohibited from reproducing them in digital format.

    (5) Where the libraries, etc. reproduce the books, etc. in digital format under paragraph (1) 1, and where they reproduce or interactively transmit the books, etc. pursuant to paragraph (3) so as to make them available for perusal inside other libraries, etc., they shall pay the remuneration to the holder of author’s economic right under the standards determined and published by the Minister of Culture, Sports and Tourism: Provided, That the same shall not apply to the case of books, etc. for which the holders of author’s economic right are the State, local governments or schools under Article 2 of the Higher Education Act (excluding the whole or part of books, etc. which have been published for commercial purposes). (Amended by Act nº 8852, Feb. 29, 2008)

    (6) The provisions of Article 25 (5) through (9) shall apply mutatis mutandis to the payment, etc. of remuneration under paragraph (5).

    (7) Where the libraries, etc. reproduce or interactively transmit the books, etc. in digital format pursuant to paragraphs (1) through (3), they shall take necessary measures prescribed by Presidential Decree, such as those to prevent any reproduction, in order to prevent any infringements on copyright and other rights protected under this Act.

    (8) Where the National Library of Korea collects online materials to preserve pursuant to Article 20-2 of the Libraries Act, it may reproduce the relevant materials. (Inserted by Act nº 9529, Mar. 25, 2009)

    Article 32 (Reproduction for Examination Questions)      

    It shall be permissible to reproduce or distribute a work already made public in questions of entrance examinations or other examinations of knowledge and skills, within the reasonable extent deemed necessary for that purpose: Provided, That where it is for profit-making purposes, the same shall not apply. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 33 (Reproduction, etc. for the Visually Impaired, etc.)       

    (1) It shall be permissible to reproduce the works already made public in braille, and distribute them for the visually impaired, etc.

    (2) It shall be permissible for the facilities prescribed by Presidential Decree (including the heads of relevant facilities) from among those for the promotion of welfare of the visually impaired, etc. to make a sound recording of the literary works already made public, for the purpose of offering it for the use by the visually impaired, etc., but not for the profit-making purpose, or to reproduce, distribute or interactively transmit them by an exclusive recording method for the visually impaired, etc. prescribed by Presidential Decree. (Amended by Act nº 9529, Mar. 25, 2009)

    (3) The scope of the visually impaired, etc. under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    Article 33-2 (Reproduction, etc. for the Hearing Impaired, etc.)  

    (1) It shall be permissible for anyone to convert the works already made public into Korean sign language, and reproduce, distribute, perform in public, or publicly transmit such Korean sign language for the hearing impaired, etc. (Amended by Act nº 13978, Feb.3, 2016)

    (2) It shall be permissible for facilities prescribed by Presidential Decree (including the heads of relevant facilities) from among those for the promotion of welfare of the hearing impaired, etc. to convert the voice, sound, etc. contained in the works, etc. which have already been made public to any format that the hearing impaired can recognize, such as captions, for the purpose of offering it for the use by the hearing impaired, etc. but not for the profit-making purpose; or to reproduce, distribute, perform in public, or publicly transmit them for the hearing impaired, etc.

    (3) The scope of the hearing impaired, etc. under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11903, Jul. 16, 2013)

     Article 34 (Ephemeral Sound or Visual Recordings by Broadcasting Organization)             

    (1) Broadcasting organizations who have the authority to broadcast works may make ephemeral sound or visual recordings of a work for the purpose of their own broadcasting and by means of their own facilities.

    (2) Sound or visual recordings made under paragraph (1) may not be kept for a period exceeding one year from the date of sound or visual recording: Provided, That if they are kept as materials for public records at places prescribed by Presidential Decree, the same shall not apply.

    Article 35 (Exhibition or Reproduction of Works of Art, etc.)         

    (1) The holder of the original of a work of art, etc., or a person who has obtained the holder’s consent, may exhibit the work in its original form: Provided, That where the work of art is to be permanently exhibited on the street, in the park, on the exterior of a building, or other places open to the public, the same shall not apply.

    (2) Works of art, etc. exhibited at all times at an open place as referred to in the proviso to paragraph (1) may be reproduced and used by any means: Provided, That in any of the following cases, the same shall not apply:

    1. Where a building is reproduced into another building;

    2. Where a sculpture or painting is reproduced into another sculpture or painting;

    3. Where the reproduction is made in order to exhibit permanently at an open place under the proviso to paragraph (1);

    4. Where the reproduction is made for the purpose of selling its copies.

    (3) A person who exhibits works of art, etc. pursuant to paragraph (1), or who intends to sell originals of works of art, etc., may reproduce and distribute them in a pamphlet for the purpose of explaining or introducing them.

    (4) No portrait nor a similar photographic work produced by commission shall be used without the consent of the commissioner.

    Article 35-2 (Temporary Reproduction in Course of Using Works, etc.)    

    Where a person uses works, etc. on a computer, he or she may temporarily reproduce such works, etc. in that computer to the extent deemed necessary for the purpose of smooth and efficient information processing: Provided, That this shall not apply where the use of such works, etc. infringes on copyright.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 35-3 (Fair Use of Works, etc.)       

    (1) Except as provided in Articles 23 through 35-2 and 101-3 through 101-5, where a person does not unreasonably prejudice an author’s legitimate interest without conflicting with the normal exploitation of works, he or she may use such works. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) In determining whether an act of using works, etc. falls under paragraph (1), the following shall be considered: (Amended by Act nº 14083, Mar. 22, 2016)

    1. Purposes and characters of use including whether such use is for or not-for nonprofit;

    2. Types and natures of works, etc.;

    3. Amount and substantiality of portion used in relation to the whole works, etc.;

    4. Effect of the use of works, etc. on the current or potential market for or value of such work etc.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 36 (Use by Means of Translation, etc.)     

    (1) If a work is used under Article 24-2, 25, 29, 30 or 35-3, the work may be used by means of translation, arrangement, or adaptation. (Amended by Act nº 11110, Dec. 2, 2011; Act nº 12137, Dec. 30, 2013)

    (2)          If a work is used under Article 23, 24, 26, 27, 28, 32, 33, or 33-2, the work may be used by means of translation. (Amended by Act nº 11110, Dec. 2, 2011; Act nº 11903, Jul. 16, 2013)

    Article 37 (Indication of Sources)              

    (1) A person who uses a work under this subsection shall indicate its sources: Provided, That the same shall not apply to the cases of Articles 26, 29 through 32, 34 and 35-2. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) The sources shall be clearly indicated in the manner and to the extent deemed reasonable by the situation in which the work is used, and in cases of a work which bears the author’s real name or pseudonym, such real name or pseudonym shall be indicated.

    Article 37-2 (Exclusion from Application)               

    Articles 23, 25, 30 and 32 shall not apply to programs.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 38 (Relationship with Author’s Moral Rights)        

    No provisions of each Article of this Sub-section may be interpreted as affecting author’s moral rights.

    SubSection 3.- Duration of Protection of Author’s Economic Right

    Article 39 (Principles of Copyright Term)               

    (1) The author’s economic right to a work shall continue to subsist during the lifetime of an author and until the end of a period of 70 years after the death of the author, unless otherwise provided in this Sub-section. (Amended by Act nº 10807, Jun. 30, 2011)

    (2) The author’s economic right to a joint work shall continue to subsist for a period of 70 years after the death of the last surviving co-author. (Amended by Act nº 10807, Jun. 30, 2011)

    Article 40 (Copyright Term of Anonymous and Pseudonymous Works)    

    (1) The author’s economic right to a work that is anonymous or bears the pseudonym which is not widely known shall continue to subsist for a period of 70 years after it has been made public: Provided, That within such period, if there are reasonable grounds for recognizing that 70 years have lapsed after the death of the author, such economic right shall be deemed to be extinguished at the time when it deems that 70 years have lapsed after the death of the author. (Amended by Act nº 10807, Jun. 30, 2011)

    (2) The provisions of paragraph (1) shall not apply to any of the following cases:

    1. Where the real name or the well-known pseudonym of an author is revealed during the period referred to in paragraph (1);

    2. Where the real name of an author is registered under Article 53 (1) during the period referred to in paragraph (1).

    Article 41 (Copyright Term of Works Made for Hire)         

    The author’s economic right to a work made for hire shall continue to subsist for a period of 70 years after it has been made public: Provided, That if it has not been made public within 50 years after its creation, the author’s economic right shall continue to exist for a period of 70 years after its creation. (Amended by Act nº 10807, Jun. 30, 2011)

    Article 42 (Copyright Term of Cinematographic Works)  

    Notwithstanding the provisions of Articles 39 and 40, the author’s economic right to cinematographic works shall continue to subsist for 70 years from the time of being made public: Provided, That if they have not been made public within 50 years from the time of their creation, the said right shall continue to subsist for 70 years from the time of creation. (Amended by Act nº 10807, Jun. 30, 2011)

    Article 43 (Time when Serial Publications, etc. Have Been Made Public)  

    (1) In cases of works which are made public in the form of volumes, issues, or installments or in cases of works which are completed by making public in parts in a successive manner, the time when a work has been made public pursuant to Article 40 (1) or 41 shall be determined by making public of each volume, issue or installment or by making public of the last part. (Amended by Act nº 10807, Jun. 30, 2011)

    (2) In cases of works to be completed by making public in parts in a successive manner, the last part already made public shall be considered to be the last one under paragraph (1) if the part supposed to follow next is not made public after three years following the preceding part made public.

    Article 44 (Commencement of Copyright Term)  

    The protection period of author’s economic right prescribed under this subsection shall commence from the next year of the death of the author, or the creation of the work, or is the making public of the work.

    SubSection 4.- Transfer, Exercise and Expiry of Author’s Economic Right

    Article 45 (Transfer of Author’s Economic Right)                

    (1) Author’s economic right may be transferred by assignment in whole or in part.

    (2) Where author’s economic right is transferred by assignment in whole, the right of the production and use of a derivative work under Article 22 shall be presumed not to be included in the transfer, unless otherwise stipulated: Provided, That in cases of a program, the right of production of a derivative work shall be presumed to have been transferred together unless otherwise stipulated. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 46 (Authorization to Use Works)  

    (1) The holder of author’s economic right may grant another person authorization to use the work.

    (2) The person who obtained such authorization pursuant to paragraph (1) shall be entitled to exploit the work in such a manner and within the limit of such conditions so authorized.

    (3) The right of exploitation as authorized under paragraph (1) may not be transferred by assignment to the third party without the consent of the holder of author’s economic right.

    Article 47 (Exercise, etc. of Pledge Rights on Author’s Economic Right)    

    (1) The pledge right on the author’s economic right may be exercised with respect to money or other goods to be received by the holder of author’s economic right as a result of a transfer of the author’s economic right or exploitation of the work (including remuneration for the establishment of the right of exclusive publication under Article 57 and the right of publication under Article 63): Provided, That the money or other goods shall be seized before payment or delivery. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    (2) The author’s economic right which has become the object of the pledge rights shall be exercised by the holder of author’s economic right unless otherwise stipulated in the contract of establishment of the pledge rights. (Inserted by Act nº 9625, Apr. 22, 2009)

    Article 48 (Exercise of Author’s Economic Right to Joint Works)  

    (1) Author’s economic right to a joint work may not be exercised without the unanimous agreement of all the holders of author’s economic right, and no holder of author’s economic right shall be entitled to transfer by assignment or pledge his or her share of author’s economic right without the consent of the other authors. In such cases, each holder may not prevent the agreement from being reached or refuse the consent in bad faith.

    (2) The profit accruing from the exploitation of a joint work may be apportioned among authors according to the degrees of contribution by each author, unless otherwise stipulated. In such cases, if the degree of each contribution is not clear, the profit may be equally apportioned to all the authors.

    (3) The holder of author’s economic right to a joint work may renounce his or her share. In cases of renunciation or death of a holder of author’s economic right without heir, his or her share may be apportioned among other authors according to the ratio of their holding shares.

    (4) The provisions of Article 15 (2) and (3) shall apply mutatis mutandis to the exercise of author’s economic right to a joint work.

    Article 49 (Expiry of Author’s Economic Rights)   

    Author’s economic right shall expire in any of the following cases:

    1. Where, after the author’s death without heir, author’s economic right are attributed to the State according to provisions of the Civil Act and other Acts;

    2. Where, after the dissolution of a legal person or an organization who is the holder of author’s economic right, author’s economic right are attributed to the State according to the provisions of the Civil Act and other Acts.

    SECTION 5.- Exploitation of Works Under Statutory License

    Article 50 (Exploitation of Works Whose Holder of Author’s Economic Right is Unknown)             

    (1) Where any person fails, despite his or her considerable efforts to meet the standards prescribed by Presidential Decree, to identify the holder of author’s economic right to a work (excluding foreigners’ works) made public, or his or her place of residence, and therefore is unable to obtain any authorization for its exploitation, he or she may exploit the work by depositing a remuneration as determined by the Minister of Culture, Sports and Tourism after obtaining his or her approval as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008)

    (2) The person who exploits a work pursuant to paragraph (1) shall indicate the intention to use and the approval date.

    (3) When the work legally licensed pursuant to the provisions of paragraph (1) becomes the object of statutory license again, the procedures of considerable endeavors corresponding to the standards prescribed by Presidential Decree pursuant to the provisions of paragraph (1) may be omitted: Provided, That if the holder of author’s economic right raises an objection according to the procedures prescribed by Presidential Decree before approval on statutory license to the work, the same shall not apply.

    (4) The Minister of Culture, Sports and Tourism shall post the content of statutory license on the information and communication network as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008)

    Article 51 (Broadcasting of Works Made Public)  

    Where a broadcasting organization which intends to broadcast a work already made public for the sake of the public benefit has negotiated with the holder of author’s economic rights but failed to reach an agreement, it may broadcast the work with approval of the Minister of Culture, Sports and Tourism as prescribed by Presidential Decree, and by paying to the holder of author’s economic right or depositing remuneration as determined by the Minister of Culture, Sports and Tourism. (Amended by Act nº 8852, Feb. 29, 2008)

    Article 52 (Production of Commercial Phonogram)           

    If three years have passed after the date of the first sale of a commercial phonogram in the Republic of Korea, and if any person who intends to produce a commercial phonogram by recording works already recorded on such phonogram has negotiated with the holder of author’s economic right but failed to reach an agreement, he or she may produce the phonogram with approval of the Minister of Culture, Sports and Tourism as prescribed by Presidential Decree, and by paying to the holder of author’s economic right or depositing remuneration under the standards determined by the Minister of Culture, Sports and Tourism. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    SECTION 6.- Registration and Authentication

    Article 53 (Registration of Copyright)      

    (1) An author may register any of the following:

    1. Real name, pseudonym (limited to the case where pseudonym is used at the time of making it public), nationality, domicile or residence of an author;

    2. Title, types or date of creation of a work;

    3. Whether a work has been made public, and the country and date/month/year in which the work was first made public;

    4. Other matters prescribed by Presidential Decree.

    (2) In the absence of any special intention of the author at his or her death, the person designated by the will of the author or his or her heir may register the items falling under any of the subparagraphs of paragraph (1).

    (3) The person whose real name is registered as the author pursuant to paragraphs (1) and (2) shall be presumed to be the author of the registered work, and the work whose date of creation or the date on which it has been made public for the first time is registered shall be presumed to have been created or made public for the first time on the date it has been registered: Provided, That where the date, month and year of creation has been registered after one year passed from the time when a work had been created, it shall not be presumed to have been created on the date, month and year registered. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 54 (Registration and Effect of Changes in Rights, etc.)       

    The following may be registered, and shall not bind third parties without their registration: (Amended by Act nº 11110, Dec. 2, 2011)

    1. Transfer by assignment of author’s economic right (excluding that by inheritance or other successions in general), or limitation on the disposal of author’s economic right;

    2. Establishment, transfer, alteration, extinction or limitation on the disposal of the right of exclusive publication under Article 57 or the right of publication under Article 63;

    3. Establishment, transfer, alteration, or expiry, or the limitation on the disposal of the right of pledge on author’s property rights, exclusive rights of publication pursuant to Article 57, and publication rights pursuant to Article 63.

    Article 55 (Procedures, etc. for Registration)       

    (1) The registration under Articles 53 and 54 shall be made by the Minister of Culture, Sports and Tourism by making an entry in the copyright register (in cases of programs, referring to a program register; hereafter the same shall apply in this Article). (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    (2) Where it falls under any of the following subparagraphs, the Minister of Culture, Sports and Tourism may return the application: Provided, That if the deficiency in the application can be corrected and the applicant corrects it on the day, the same shall not apply: (Amended by Act nº 8852, Feb. 29, 2008)

    1. Where the matters that have been applied for registration are not fit for registration;

    2. Where the application for registration does not conform to the form stipulated by Ordinance of the Ministry of Culture, Sports and Tourism, or is not accompanied with other necessary materials or documents.

    (3) The Minister of Culture, Sports and Tourism shall publish a registration gazette or post on the information and communications network regarding the registration stated on the copyright register pursuant to the provisions of paragraph (1), and where there is an applicant, he or she shall have him or her peruse the copyright register or deliver copies thereof. (Amended by Act nº 8852, Feb. 29, 2008)

    (4) Matters necessary for registration under paragraphs (1) through (3), return of application for registration, publication of registration gazette or posting, perusal of the copyright register and issuance of copies thereof, etc. shall be prescribed by Presidential Decree.

    Article 55-2 (Confidentiality Obligation)  

    Any person who conducts registration business pursuant to Articles 53 through 55 and who was in that position shall not divulge any secret he or she obtained on his or her duty to others.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 56 (Authentication of Holder of Right, etc.)            

    (1) The Minister of Culture, Sports and Tourism may designate an authentication organization for the security of transaction of works, etc. and protection of confidence. (Amended by Act nº 8852, Feb. 29, 2008)

    (2) Matters necessary for the designation and revocation of the designation of authentication organization, authentication procedures, etc. pursuant to paragraph (1) shall be prescribed by Presidential Decree. (Amended by Act nº 9625, Apr. 22, 2009)

    (3) The authentication organization under paragraph (1) may collect fees for authentication and the amount thereof shall be determined by the Minister of Culture, Sports and Tourism. (Amended by Act nº 8852, Feb. 29, 2008)

    SECTION 7.- Exclusive Publication Right

    Article 57 (Establishment of Exclusive Publication Right)                

    (1) A person who holds the right to publish or reproduce and interactively transmit (hereinafter referred to as “publication, etc.”) works, etc. may establish an exclusive right (hereinafter referred to as “exclusive publication right” and excluding the right of publication under Article 63; hereinafter the same shall apply) for a person who intends to use such works, etc. for publication, etc. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) The holder of author’s economic right may establish a new exclusive publication right to the extent that the methods and conditions of publication, etc. of relevant works, etc. do not overlap. (Inserted by Act nº 11110, Dec. 2, 2011)

    (3) The person for whom the exclusive publication right (hereinafter referred to as “holder of the exclusive publication right”) has been established under paragraph (1) shall have the right to use the work that is the object of such exclusive publication right by means of publication, etc., according to the terms of the contract of establishment. (Amended by Act nº 11110, Dec. 2, 2011)

    (4) If the right of pledge is established on the right of reproduction, distribution or interactive transmission of a work, the holder of author’s economic right may establish the exclusive publication right only with the authorization of the pledgee. (Amended by Act nº 11110, Dec. 2, 2011)

    Article 58 (Obligations of Holder of Exclusive Publication Right)  

    (1) Unless otherwise stipulated in the contract of establishment, the holder of the exclusive publication right shall use the work by means of publication, etc. within the period of nine months from the date when he or she received manuscripts or other similar materials which are necessary for the reproduction of the work. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) Unless otherwise stipulated in the contract of establishment, the holder of the exclusive publication right shall continue to use the work by means of publication, etc. in accordance with customary practice. (Amended by Act nº 11110, Dec. 2, 2011)

    (3) Unless otherwise stipulated in the contract, the holder of the exclusive publication right shall put a mark of holder of author’s economic right on each reproduction, as stipulated by Presidential Decree. (Amended by Act nº 11110, Dec. 2, 2011)

    Article 58-2 (Revision, Addition or Reduction of Work)    

    (1) If the holder of the exclusive publication right reuses a work that is the object of its right by means of publication, etc., the author may revise, add or reduce the contents of the work to the extent that it is justified. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) Whenever the holder of the exclusive publication right intends to reuse a work that is the object of its right by means of publication, etc., unless otherwise stipulated in the contract, he or she shall notify the author of his or her intention in advance. (Amended by Act nº 11110, Dec. 2, 2011)

    Article 59 (Duration, etc. of Exclusive Publication Right)  

    (1) The duration of the exclusive publication right shall be three years from the date of its first publication, etc., unless otherwise stipulated in the contract of establishment: Provided, That the duration shall be five years where the exclusive publication right is established to cinematize such work. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) If the author of the work which is the object of the exclusive publication right dies within the duration of the exclusive publication right, the holder of author’s economic right, notwithstanding the provisions of paragraph (1), may reproduce the work in a complete collection of works or other compilation work, or use the work by means of publication, etc. by separating it from a complete collection of works or other compilation work. (Amended by Act nº 11110, Dec. 2, 2011)

    Article 60 (Notification of Termination of Exclusive Publication Right)      

    (1) If the holder of the exclusive publication right has violated Article 58 (1) or (2), the holder of author’s economic right may call on him or her to fulfill his or her obligation for a prescribed period of not shorter than six months. If the holder of the exclusive publication right fails to do so during such period, the holder of author’s economic right may notify him or her of the termination of his or her exclusive publication right. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) The holder of author’s economic right may immediately notify the holder of the exclusive right of publication of its termination, notwithstanding the provisions of paragraph (1), when it is obvious that it is impossible for the holder of the exclusive publication right to use the work by means of publication, etc., or that he or she has no intention to do so. (Amended by Act nº 11110, Dec. 2, 2011)

    (3) When the termination of the exclusive publication right is notified under the provisions of paragraph (1) or (2), the exclusive publication right is presumed to have been terminated on the date the holder of the exclusive publication right has received such notification. (Amended by Act nº 11110, Dec. 2, 2011)

    (4) In cases of paragraph (3), the holder of author’s economic right may, at any time, claim to the holder of the exclusive publication right for restitution or compensation for damages accruing from the suspension of publication, etc. of the work. (Amended by Act nº 11110, Dec. 2, 2011)

     Article 61 (Distribution of Reproductions after Termination of Exclusive Publication Right)           

    After the termination of the exclusive publication right on account of the expiration of the duration of the right or other reasons, the holder of the exclusive publication right shall not distribute copies reproduced within the duration of the right, except in any of the following cases: (Amended by Act nº 11110, Dec. 2, 2011)

    1. Where otherwise stipulated in the contract of establishment;

    2. Where he or she has already paid any remuneration to the holder of author’s economic right for publication, etc. within the duration of the exclusive publication right, and he or she distributes the number of copies equivalent to such payment.

    Article 62 (Transfer by Assignment of, and Limitations on, Exclusive Publication Right, etc.)          

    (1) No holder of the exclusive publication right shall transfer or pledge such right without the consent of the holder of author’s economic right.

    (2) Articles 23, 24, 25 (1) through (3), 26 through 28, 30 through 33, 35 (2) and (3), 35-2, 35-3, 36 and 37 shall apply mutatis mutandis to the reproduction, etc. of works, etc. that are the object of the exclusive publication right.

    (Article Amended by Act nº 11110, Dec. 2, 2011)

    SECTION 7-2.- Special Provisions Concerning Publication

    Article 63 (Establishment of Publication Right)    

    (1) A person who holds the right to reproduce or distribute a work (hereinafter referred to as “holder of the right of reproduction“) may establish the right to publish such work (hereinafter referred to as “publication right“) for a person who intends to publish such work in documents or pictures by printing them or by other method similar thereto.

    (2) A person for whom the publication right is established pursuant to paragraph (1) (hereinafter referred to as “holder of the publication right“) may hold the right to publish the original copy of the work that is the object of the publication right as prescribed by the act of establishment.

    (3) Where the pledge has been established for the right of reproduction of relevant work, the holder of the right of reproduction may establish the publication right therefor only with the pledgee’s permit.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 63-2 (Mutatis Mutandis Application)         

    Articles 58 through 62 shall apply mutatis mutandis to the publication right. In such cases, “exclusive publication right” shall be construed as “publication right” and “holder of author’s economic right” as “holder of the right of reproduction.”

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    CHAPTER III.- NEIGHBORING RIGHTS

    SECTION 1.- General Provisions

    Article 64 (Protected Performance, Phonogram and Broadcast)  

    (1) The following performances, phonogram and broadcasts shall be protected pursuant to this Act: (Amended by Act nº 11110, Dec. 2, 2011)

    1. Performances:

    (a) Performances conducted by nationals of the Republic of Korea (including legal persons established under the Acts of the Republic of Korea, and foreign legal persons maintaining their principal offices in the Republic of Korea; hereinafter the same shall apply);

    (b) Performances protected under the international treaties to which the Republic of Korea has acceded or which it has ratified;

    (c) Performances fixed in phonograms as referred to in any item of subparagraph 2;

    (d) Performances transmitted by broadcasts as referred to in any item of subparagraph 3 (excluding those included in sound or visual recordings before transmission);

    2. Phonograms:

    (a) Phonograms produced by nationals of the Republic of Korea;

    (b) Phonograms in which sounds have been fixed for the first time in the Republic of Korea;

    (c) Phonograms in which sounds have been fixed for the first time in a foreign country party to the treaties and thus protected under such treaties to which the Republic of Korea has acceded or which it has ratified and thus protected under such treaties;

    (d) Phonograms which are protected according to treaties in which the Republic of Korea has acceded to or concluded, and whose producers are nationals (including any legal person established pursuant to the Acts of the relevant contracting country and any legal person whose main office is located in the relevant contracting country) of the contracting country;

    3. Broadcasts:

    (a) Broadcasts made by broadcasting organizations which are nationals of the Republic of Korea;

    (b) Broadcasts made from broadcasting facilities located in the Republic of Korea;

    (c) Broadcasts made by broadcasting organizations who are nationals of a foreign country party, from broadcasting facilities located in the foreign country party to the treaties to which the Republic of Korea has acceded or which it has ratified and thus protected under such treaties.

    (2) Even in cases of performances, phonogram and broadcasts of foreigners protected pursuant to paragraph (1), where the period of protection has expired in the relevant foreign country, the period of protection under this Act shall not be recognized. (Inserted by Act nº 11110, Dec. 2, 2011)

    Article 64-2 (Presumption of Performers, etc.)   

    A person whose real name or widely known pseudonym as a performer, phonogram producer, or broadcasting organizations is indicated in a general manner in relation to performance, phonogram or broadcasting protected pursuant to this Act shall be presumed to have the right for such performance, phonogram or broadcasts as a performer, phonogram producer or broadcasting organizations, respectively.

    (Article Inserted by Act nº 10807, Jun. 30, 2011)

    Article 65 (Relationship with Copyright)  

    The provisions of each Article in this Chapter shall not be construed as affecting copyright.

    SECTION 2.- Performers Right

    Article 66 (Right of Paternity)     

    (1) A performer shall have the right to indicate his or her real name or pseudonym on his or her performance or the copy of his or her performance.

    (2) Those who intend to exploit a performance shall indicate the real name or pseudonym of the performer as he or she has indicated insofar as there is no special declaration of intention by the performer: Provided, That if it is recognized as unavoidable in view of the character of the performance, the purpose and form of exploitation, etc., the same shall not apply.

    Article 67 (Right of Integrity)       

    A performer shall have the right to maintain the identity of the content and form of his or her performance: Provided, That if it is recognized as unavoidable in view of the nature, or the purpose and manner of exploitation, etc., the same shall not apply.

    Article 68 (Inalienability of Performer’s Moral Rights)     

    The rights prescribed in Articles 66 and 67 (hereinafter referred to as “moral rights of performer”) shall belong exclusively to the performer.

    Article 69 (Right of Reproduction)            

    A Performer shall have the right to reproduce his or her performances.

    Article 70 (Right of Distribution)                

    Performers shall have the right to distribute the copies of his or her performance: Provided, That if the copies of performance have been offered to transactions by means of sale, etc. with authorization of the performer, the same shall not apply.

    Article 71 (Right of Rental)           

    Performers shall have the right to lend the commercial phonogram, in which his or her performance is recorded, for profit-making purpose notwithstanding the provisions of the proviso to Article 70. (Amended by Act nº 14083, Mar. 22, 2016)

    Article 72 (Right of Public Performance)                

    Performers shall have the right to perform his or her performance publicly which has not been fixed: Provided, That if the performance is for broadcasting, the same shall not apply.

    Article 73 (Right of Broadcasting)              

    Performers shall have the right to broadcast their stage performances: Provided, That the same shall not apply to the performance which has been recorded with authorization of the performer.

    Article 74 (Right of Interactive Transmission)      

    Performers shall have the right to interactively transmit their performances.

    Article 75 (Remuneration by Broadcasting Organizations to Performers)               

    (1) When a broadcasting organizations sends out a broadcast by using commercial phonograms in which performances are recorded, it shall pay reasonable remuneration to the performers: Provided, That when the performer is a foreigner and the relevant foreign country does not recognize remuneration pursuant to the provisions of this paragraph to the performer who is a national of the Republic of Korea, the same shall not apply. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) The provisions of Article 25 (5) through (9) shall apply mutatis mutandis to the payment, etc. of remuneration under paragraph (1).

    (3) The amount of remuneration which the organization referred to in paragraph (2) may claim on behalf of the holder of right to remuneration shall be determined each year by an agreement between the relevant organization and the broadcasting organizations.

    (4) If the organization and the broadcasting organization fails to reach an agreement pursuant to paragraph (3), the organization or the broadcasting organization may request for conciliation to the Korea Copyright Commission under Article 112 as prescribed by Presidential Decree. (Amended by Act nº 9625, Apr. 22, 2009)

     Article 76 (Remuneration by Digital Audio Transmission Organizations to Performers)   

    (1) When a digital audio transmission organization transmits by using phonogram in which stage performances are recorded, it shall pay reasonable remuneration to the performer.

    (2) The provisions of Article 25 (5) through (9) shall apply mutatis mutandis to payment of remuneration, etc. under paragraph (1).

    (3) The amount of remuneration which the organization referred to in paragraph (2) may claim on behalf of the holder of right to remuneration shall be determined every year by an agreement between the organization and the digital audio transmission organization within the period prescribed by Presidential Decree.

    (4) If an agreement referred to in paragraph (3) is not reached, the amount fixed and announced in public by the Minister of Culture, Sports and Tourism shall be paid. (Amended by Act nº 8852, Feb. 29, 2008)

    Article 76-2 (Remuneration to Performers by Persons Doing Public Performance Using Commercial Phonograms)             

    (1) Any person doing a public performance using commercial phonogram on which the performance is recorded shall pay a reasonable remuneration to the relevant performer: Provided, That where a performer is a foreigner, the same shall not apply when the performer’s country does not recognize a remuneration under this paragraph to a performer who is a national of the Republic of Korea. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) Articles 25 (5) through (9) and 76 (3) and (4) shall apply mutatis mutandis to the payment, amount, etc. of a remuneration under paragraph (1).

    (Article Inserted by Act nº 9529, Mar. 25, 2009)

    Article 77 (Joint Performers)       

    (1) If two or more performers perform jointly in a chorus, concert, or drama, etc., the rights of performers (excluding the performer’s moral right) prescribed under this Section shall be exercised by a representative elected by the joint performers: Provided, That where such a representative is not elected, the conductor or director shall exercise the rights.

    (2) In exercising the rights of performers under paragraph (1), if a solo vocalist or a solo instrument player participates in the performance, the consent of such vocalist or instrument player shall be obtained.

    (3) The provisons of Article 15 shall apply mutatis mutandis to the exercise of the moral rights of joint performers.

    SECTION 3.- Rights of Phonogram Producers

    Article 78 (Right of Reproduction)            

    Phonogram producers shall have the right to reproduce their phonogram.

    Article 79 (Right of Distribution)                

    Phonogram producers shall have the right to distribute their phonogram: Provided, That the copies of phonogram have been offered to transactions by means of sale, etc. with authorization of the phonogram producers, the same shall not apply.

    Article 80 (Right of Rental)           

    Notwithstanding the provisions of the proviso to Article 79, phonogram producers shall have the right to authorize commercial rental of phonogram for the purpose of making profits. (Amended by Act nº 14083, Mar. 22, 2016)

    Article 81 (Right of Interactive Transmission)      

    Phonogram producers shall have the right to interactively transmit their phonograms.

    Article 82 (Remuneration to Phonogram Producers by Broadcasting Organization)            

    (1) Where a broadcasting organization sends out broadcasts by using commercial phonograms, it shall pay reasonable remuneration to the phonograms producer: Provided, That when the phonograms producer is a foreigner and the foreign country concerned does not recognize remuneration under this paragraph to the phonograms producer who is a national of the Republic of Korea, the same shall not apply. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) The provisions of Articles 25 (5) through (9) and 75 (3) and (4) shall apply mutatis mutandis to the payment, amount, etc. of remuneration under paragraph (1).

    Article 83 (Remuneration to Phonogram Producers by Digital Audio Transmission Organization)                 

    (1) Where a digital audio transmission organization transmits by using commercial phonogram, it shall pay reasonable remuneration to the phonogram producer.

    (2) The provisions of Articles 25 (5) through (9) and 76 (3) and (4) shall apply mutatis mutandis to the payment, amount, etc. of remuneration under paragraph (1).

    Article 83-2 (Remuneration to Phonogram Producers by Persons Performing in Public Using Commercial Phonogram)    

    (1) Any person doing a public performance using a commercial phonogram shall pay a reasonable remuneration to the relevant phonogram producer: Provided, That where a phonogram producer is a foreigner, the same shall not apply when the producer’s country does not recognize remuneration under this paragraph to a phonogram producer who is a national of the Republic of Korea. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) Articles 25 (5) through (9) and 76 (3) and (4) shall apply mutatis mutandis to the payment, amount, etc. of a remuneration under paragraph (1).

    (Article Inserted by Act nº 9529, Mar. 25, 2009)

    SECTION 4.- Rights of Broadcasting Organization

    Article 84 (Right of Reproduction)            

    Broadcasting organizations shall have the right to reproduce their broadcasts.

    Article 85 (Right of Simultaneous Broadcasting)  

    Broadcasting organizations shall have the right to authorize their broadcasts to rebroadcast simultaneously.

    Article 85-2 (Right of Public Performance)            

    A broadcasting organization has the right to publicly perform its broadcasts, when the public performance is made in place ccesible to the general public charging an entrance fee with regard to watching the broadcast.

    (Article Inserted by Act nº 10807, Jun. 30, 2011)

    SECTION 5.- Term of Protection for Neighboring Right

     Article 86 (Term of Protection)  

    (1) Neighboring rights shall commence from the time that falls under the following and shall not require any procedures or formalities: (Amended by Act nº 11110, Dec. 2, 2011)

    1. For performances, when the performance took place;

    2. For phonograms, when the first fixation of sound was done;

    3. For broadcasts, when the broadcasts was sent out.

    (2) Neighboring rights (excluding moral rights of performers; hereinafter the same shall apply) shall continue to remain for 70 years (50 years in cases of broadcasts) counting from the year following the year falling under any of the following: (Amended by Act nº 11110, Dec. 2, 2011)

    1. For performances, when the performance took place: Provided, That if a phonogram on which the performance is fixed is published within 50 years from the time such performance took place, when the phonogram is published;

    2. For phonogram, when the phonogram was released: Provided, That phonograms have not been released until after 50 years have passed counting from the year after the year when the sound was first fixed on the phonogram, the time when the sound was first fixed on the phonogram;

    3. For broadcasts, when the broadcast was sent out.

    SECTION 6.- Limitations on, Transfers of Ownership, Exercise, etc. of Neighboring Rights

    Article 87 (Limitations on Neighboring Rights)     

    (1) Articles 23, 24, 25 (1) through (3), 26 through 32, 33 (2), 34, 35-2, 35-3, 36 and 37 shall apply mutatis mutandis to the use of performances, phonograms or broadcasts that are the objects of neighboring rights. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) Where a digital audio transmission organization transmits by making use of a phonogram on which performance is recorded pursuant to Articles 76 (1) and 83 (1), he or she may temporarily reproduce a phonogram on which performance is recorded by his or her own means. In such cases, Article 34 (2) shall apply mutatis mutandis to the period of keeping such copy. (Inserted by Act nº 9625, Apr. 22, 2009)

    Article 88 (Transfers by Assignment, Exercise, etc. of Neighboring Rights)              

    Article 45 (1) shall apply mutatis mutandis to the transfer by assignment of neighboring rights; Article 46 to authorization to exploit performance, phonogram or broadcast; Article 47 to the exercise of the right of pledge established on neighboring rights; Article 49 to the termination of neighboring rights; and Articles 57 through 62 to the establishment, etc. of the exclusive publication right of performance, phonogram or broadcast, respectively.

    (Article Amended by Act nº 11110, Dec. 2, 2011)

    Article 89 (Statutory License for Use of Performance, Phonogram and Broadcast)             

    The provisions of Articles 50 through 52 shall apply mutatis mutandis to the use of performances, phonograms and broadcasts.

    Article 90 (Registration of Neighboring Rights)    

    Articles 53 through 55 and 55-2 shall apply mutatis mutandis to the registration of neighboring rights or the right of exclusive publication of neighboring rights. In such cases, the term “copyright register” in Article 55 shall be construed as “register of neighboring rights“. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    CHAPTER IV.- PROTECTION OF DATABASE PRODUCERS

    Article 91 (Database Under Protection)  

    (1) The database of persons falling under any of the following subparagraphs shall be protected under this Act:

    1. Nationals of the Republic of Korea;

    2. Foreign nationals protected by the treaties to which the Republic of Korea has acceded or which it has concluded in relation with the protection of database.

    (2) Even for a foreign national database protected under paragraph (1), if the foreigner’s country does not protect the database of nationals of the Republic of Korea, the protection under the treaties and this Act may be limited proportionately therewith.

    Article 92 (Exception from Application)  

    The provisions of this Chapter shall not be applicable to the database falling under either of the following subparagraphs:

    1. Computer programs which are used for the production, renewal, etc. or operation of the database;

    2. Database which are produced or renewed, etc. in order to have wireless or wire communications technically possible.

    Article 93 (Rights of Database Producers)             

    (1) Database producers shall hold the rights to reproduce, distribute, broadcast, or interactively transmit (hereafter referred to as the “reproduction, etc.” in this Article) the whole or considerable parts of relevant database.

    (2) Individual materials of the database shall not be considered as the considerable parts of relevant database under the provisions of paragraph (1): Provided, That even for the reproductions, etc. of individual materials of database or of the portions falling short of their considerable parts, if the said reproductions conflict with the normal exploitation of relevant database, or infringe unduly on the interests of database producers, by making them repeatedly or systematically for specific purposes, they shall be considered as the reproductions, etc. of the considerable parts of relevant database.

    (3) Protections under this Chapter shall not affect the copyright of materials forming constituent parts of the database, and other rights protected under this Act.

    (4) Protections under this Chapter shall not extend to the materials themselves forming constituent parts of the database.

    Article 94 (Limitations on Rights of Database Producers)               

    (1) Articles 23, 28 through 34, 35-2, 35-3, 36 and 37 shall apply mutatis mutandis to the use of database which is the object of the rights of database producers. (Amended by Act nº 11110, Dec. 2, 2011)

    (2) In either of the following cases, a person may reproduce, distribute, broadcast or interactively transmit the whole or considerable parts of database: Provided, That the same shall not apply where it is in conflict with the normal exploitation of relevant database:

    1. Where being used for education, scholarship or research: Provided, That the same shall not apply to the case aiming at profit-making;

    2. Where being used for the news reporting.

    Article 95 (Period of Protection)                

    (1) The rights of database producers shall commence from the time of completing a production of database, and shall continue to exist for five years counting from the next year of the completion.

    (2) Where a considerable investment in human or material resources has been made for the renewal, etc. of database, the rights of database producers for the relevant parts shall commence from the time of making relevant renewal, etc., and shall remain effective for five years counting from the next year of the renewal.

    Article 96 (Transfer, Exercise, etc. of Rights of Database Producers)         

    The proviso to Article 20 shall apply mutatis mutandis to the offer of database for transaction, Article 45 (1) to the transfer of rights of database producers, Article 46 to the authorization of the use of database, Article 47 to the exercise of the right of pledge established on the rights of database producers, Article 48 to the exercise of rights by the database producers of joint databases, Article 49 to the termination of rights of database producers, and Articles 57 through 62 to the establishment, etc. of the exclusive publication right of database, respectively.

    (Article Amended by Act nº 11110, Dec. 2, 2011)

    Article 97 (Statutory License for Use of Database)             

    The provisions of Articles 50 and 51 shall apply mutatis mutandis to the use of database.

    Article 98 (Registration of Rights of Database Producers)              

    Articles 53 through 55 and 55-2 shall apply mutatis mutandis to the registration of rights of database producers and the exclusive publication right of database producer’s right. In such cases, the term “copyright register” in Article 55 shall be construed as “database producer’s right register“. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    CHAPTER V.- SPECIAL CASES CONCERNING CINEMATOGRAPHIC WORKS

    Article 99 (Cinematization of Works)       

    (1) If the holder of author’s economic right authorizes another person to exploit his or her work by means of cinematization, such authorization shall be presumed to include the following rights, unless otherwise expressly stipulated:

    1. To dramatize a work for the production of a cinematographic work;

    2. To publicly screen a cinematographic work aiming at a public screening;

    3. To broadcast a cinematographic work aiming at broadcasting;

    4. To interactively transmit a cinematographic work aiming at a interactive transmission;

    5. To reproduce and distribute a cinematographic work for its original purpose;

    6. To exploit the translation of a cinematographic work in the same manner as the cinematographic work.

    (2) If the holder of author’s economic right authorizes a person to exploit his or her work by means of cinematization, unless otherwise stipulated, he or she may authorize, after the lapse of five years from the date of his or her authorization, the cinematization of the work in another form of cinematographic work.

    Article 100 (Rights to Cinematographic Works)   

    (1) Where a producer of a cinematographic work and a person who agreed to cooperate in the production of a cinematographic work have obtained a copyright to the said cinematographic work, the rights necessary for the exploitation of such cinematographic work shall be presumed to have been transferred to the producer of the cinematographic work unless otherwise expressly stipulated.

    (2) The copyright to a novel, play, work of art or musical work used for the production of a cinematographic work shall not be affected by the provision of paragraph (1).

    (3) The right to reproduce under Article 69, the right to distribute under Article 70, the right to broadcast under Article 73, and the right to interactively transmit under Article 74 with regard to the use of a cinematographic work of a performer who agreed with the producer of a cinematographic work to cooperate in the production of a cinematographic work shall be presumed to have been transferred to the producer of cinematographic works, unless otherwise expressly stipulated.

    Article 101 (Rights of Producers of Cinematographic Works)        

    (1) Rights necessary for the exploitation of a cinematographic work to be transferred by a person, who agreed to cooperate in the production of a cinematographic work, to a producer of a cinematographic work shall be the right to exploit the cinematographic work by means of reproduction, distribution, public presentation, broadcasting, interactive transmission, and others, and the said producer may transfer the rights, or establish the pledge thereon.

    (2) The right to be transferred from a performer to a producer of a cinematographic work shall be the right to reproduce, distribute, broadcast or interactive transmit the said cinematographic work, and it may be interactively transferred or a pledge may be established thereon.

    CHAPTER V-2.- SPECIAL RULES CONCERNING CINEMATOGRAPHIC WORKS

    Article 101-2 (Objects of Protection)       

    This Act shall not apply to the following subparagraphs used to prepare programs:

    1. Programming language: Characters, symbols and their systems as means expressing programs;

    2. Protocol: A special agreement on how to use programming language in a specific program;

    3. Algorithm: Combination methods of instructions and commands in a program.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 101-3 (Limitations on Author’s Economic Right of Program)           

    (1) In any of the following cases, a program released may be reproduced or distributed to the extent necessary for that purpose: Provided, That where it unreasonably prejudices the interest of the holder of author’s economic right in the light of types and purposes of programs, relative importance of a reproduced part in a program and the number of copies of reproduction or such, the same shall not apply:

    1. Where a program is reproduced for a trial or investigation;

    2. Where a program is reproduced or distributed for the purpose of providing it to a course of lessons by any person who is responsible for education at schools under the Early Childhood Education Act, the Elementary and Secondary Education Act and the Higher Education Act, and in educational institutions (limited to educational institutions by which educational attainments for entrance into a school of higher level are authorized or which confer an academic degree) established pursuant to other Acts;

    3. Where a program is reproduced to be published in textbooks for the educational purpose of schools under the Elementary and Secondary Education Act and schools equivalent thereto;

    4. Where a program is reproduced for personal purposes (excluding cases for the purpose of profit-making) in the confined place like home;

    5. Where a program is reproduced or distributed for the purpose (excluding cases for the purpose of profit-making) of entrance examinations of schools under the Elementary and Secondary Education Act and the Higher Education Act and of schools equivalent thereto, or of other examinations or official approval for scholarship or skill;

    6. Where a program is reproduced for the purpose of research, study, test of functions of a program to confirm ideas and principles which form the foundation of a program (only when any person who uses a program with legitimate authority is using the relevant program).

    (2) Programs (limited to cases in which they are legitimately acquired) may be temporarily reproduced during the course of using a computer for the maintenance and repair of such computer. (Inserted by Act nº 11110, Dec. 2, 2011)

    (3) Any person who intends to publish a program in textbooks pursuant to paragraph (1) 3 shall pay a remuneration under the standards determined and announced by the Minister of Culture, Sports and Tourism to the relevant holder of author’s economic right. The provisions of Article 25 (5) through (9) shall apply mutatis mutandis to payment of a remuneration.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 101-4 (Decompilation of Program Codes)               

    (1) Where any person who uses a program with legitimate authority or any person who has obtained his or her permission cannot easily obtain necessary information for compatibility and it is inevitable for him or her to obtain the information, he or she may perform decompilation of program codes without obtaining permission of the holder of author’s economic right of the program limited to necessary part for compatibility of the relevant program.

    (2) Where information obtained through decompilation of program codes under paragraph (1) falls under any of the following subparagraphs, it shall not be used:

    1. Where information is exploited for the purpose other than the purpose of compatibility or is provided to a third party;

    2. Where a program or expression subject to a reverse engineering of program code is exploited in development, production and sale of substantially similar programs or in infringement of copyright of the program.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 101-5 (Reproduction for Storage by Legitimate Users)      

    (1) Any person who possesses and uses a copy of program with legitimate authority may reproduce the relevant copy to the extent necessary to provide against destruction, damage or deterioration or such of the copy.

    (2) When any person who possesses or uses a copy of program has lost the right to possess and use a copy of the relevant program, he or she shall destroy the copy made pursuant to paragraph (1) unless the holder of author’s economic right of the program specially expresses his or her intention: Provided, That where he or she has lost the right to possess and use a copy of program because the relevant copy of program has been destroyed, the same shall not apply.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

     Article 101-6 (Article Amended by Act nº 11110, Dec. 2, 2011)

     Article 101-7 (Bailment of Program)       

    (1) The holder of author’s economic right of a program and any person who has been authorized to use the program may bail the source code and technical information or such of the program to a person prescribed by Presidential Decree (hereafter referred to as “bailee” in this Article) by mutual consent.

    (2) Any person who has been authorized to use a program may, when a reason stipulated in the consent obtained pursuant to paragraph (1) has arisen, request the bailee to provide him or her the source code and technical information or such of the program.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    CHAPTER VI.- LIMITATION ON LIABILITY OF ONLINE SERVICE PROVIDERS

    Article 102 (Limitation on Liability of Online Service Providers)   

    (1) Even if copyright or other rights protected pursuant to this Act are infringed in relation to any of the following subparagraphs, an online service provider shall not be responsible for such infringement, where he or she meets all of the following requirements in the items pursuant to each subparagraph: (Amended by Act nº 10807, Jun. 30, 2011; Act nº 11110, Dec. 2, 2011)  

    1. An act of transmitting, routing or providing connections for works etc. without modifying their contents, or automatic, intermediate or temporary storage of such works etc. in the course thereof within a reasonably necessary period for such transmission:

    (a) Where an online service provider has not initiate the transmission of works, etc.;

    (b) Where an online service provider has not selected works, etc. or the recipients thereof;

    (c) Where an online service provider has adopted and reasonably implemented a policy that provides for termination of the accounts (referring to the accounts with the right to use relevant services, used by an online service provider to identify and manage users; hereafter the same shall apply in this Article and Articles 103-2, 133-2 and 133-3) of persons who repeatedly infringe on copyright or other rights protected pursuant to this Act;

    (d) Where the online service provider has accommodated and has not interfered with standard technical measures used by the holder of right that are designed to identify and protect works, etc. and meet the conditions under Presidential Decree;

    2. An act of storing works, etc. transmitted at the request of service users in an automatic, mediating or temporary manner so that subsequent users can efficiently access or receive such works, etc.:

    (a) Where the requirements under the items of subparagraph 1 are all met;

    (b) Where an online service provider has not modified such works, etc.;

    (c) If any condition exists to access such works, etc. provided, where the access to temporarily stored works, etc. is permitted to users who have complied with such condition;

    (d) Where an online service provider has complied with the rules on updating works, etc. that are determined by a person who reproduces or interactively transmits works, etc. (hereinafter referred to as “interactive transmitter or reproducer”) under data communications protocol for computers or information and communications networks generally recognized in the industry: Provided, That this shall not apply where an interactive transmitter or reproducer has determined rules on updating for the purposes of unreasonably restricting such storage;

    (e) Where an online service provider has not interfered with the use of technologies generally recognized within such industry, which are applied to obtain information on the use of works, etc. at the originating site of the works, etc.;

    (f) Where an online service provider immediately removed or disabled access to the works etc., when an online service provider is required to suspend reproduction or interactive transmission under Article 103 (1), where such works, etc. are removed or made inaccessible at the original website, or where he or she actually becomes aware of the fact that the court or the head of a central administrative agency has issued an order to delete such works, etc. or make them inaccessible;

    3. An act of storing works, etc. in the computer of an online service provider at the request of a reproducer or interactive transmitter:

    (a) Where the requirements under the items of subparagraph 1 are all met;

    (b) When an online service provider has the right and ability to control the infringing activity, where he or she has not obtained any financial benefit directly attributable to the infringing activity;

    (c) When an online service provider actually becomes aware of infringement or obtains actual knowledge of the fact or circumstance that infringement is evident through the request, etc. to suspend reproduction or interactive transmission under Article 103 (1), where he or she has immediately suspended the reproduction or interactive transmission of such works, etc.;

    (d) Where an online service provider has designated and announced a person to receive demand to suspend reproduction or interactive transmission pursuant to Article 103 (4);

    4. An act of allowing users to know the location of works, etc. on information and communications networks or connecting them thereto through information search tools:

    (a) Where the requirements under subparagraph 1 (a) are met;

    (b) Where the requirements under subparagraph 3 (b) through (d) are met.

    (2) Notwithstanding the provisions of paragraph (1), where it is technologically impossible for an online service provider to take measures under paragraph (1), he or she shall not be responsible for the infringement of copyright or other rights protected pursuant to this Act due to the reproduction or interactive transmission of works, etc. by other persons. (Amended by Act nº 10807, Jun. 30, 2011)

    (3) In relation to the limitation on liability under paragraph (1), an online service provider shall not be obligated to monitor any infringement within his or her services or actively investigating such infringement. (Inserted by Act nº 10807, Jun. 30, 2011)

    Article 103 (Suspension of Reproduction or Interactive Transmission)     

    (1) Any person who claims that his or her copyright and other rights protected under this Act are infringed (hereafter referred to in this Article as “claimant to a right“) due to the reproduction or interactive transmission of works, etc. through the use of services by an online service provider (excluding cases under Article 102 (1) 1; hereafter the same shall apply in this Article), may demand the online service provider, by vindicating the said facts, to suspend the reproduction or interactive transmission of the works, etc. (Amended by Act nº 10807, Jun. 30, 2011)

    (2) Where an online service provider is requested to suspend the reproduction or interactive transmission under paragraph (1), he or she shall immediately suspend the reproduction or interactive transmission of such works, etc. and notify a claimant to the right of such fact: Provided, That an online service provider referred to in Article 102 (1) 3 or 4 shall also notify the reproducer or interactive transmitter of such works, etc. (Amended by Act nº 10807, Jun. 30, 2011)

    (3) Where the reproducer or interactive transmitter, upon receipt of notification under paragraph (2), vindicates that his or her reproduction or interactive transmission is made with legitimate authority, and demands a resumption of such reproduction or interactive transmission, the online service provider shall promptly notify the claimant to the right of the fact of demanding a resumption and the scheduled date of resumption, and shall have the reproduction or interactive transmission resumed on the said scheduled date: Provided, That this shall not apply where the claimant to a right notifies an online service provider before the scheduled date of resumption, of the fact that he or she has filed a lawsuit against the act of infringement of reproducer or interactive transmitter. (Amended by Act nº 11110, Dec. 2, 2011)

    (4) The online service provider shall make an announcement, by designating the person who is demanded to suspend or to resume the reproduction or interactive transmission under paragraphs (1) and (3) (hereafter referred to in this Article as “recipient”), so as to have the users of facilities or services of the provider know with ease.

    (5) Where the online service provider has made an announcement pursuant to paragraph (4), and has suspended or resumed the reproduction or interactive transmission of relevant works, etc. under paragraphs (2) and (3), the liability of the online service provider for the infringement on third parties’ copyright and other rights protected under this Act, and the liability of the online service provider for the losses incurred to the reproducer or interactive transmitter, shall be exempted: Provided, That this shall not apply to the liability arisen from the time when the online service provider has known the facts that the copyright and other rights protected under this Act were infringed due to the reproduction or interactive transmission of works, etc. by third parties to the time of demanding the suspension under paragraph (1). (Amended by Act nº 10807, Jun. 30, 2011; Act nº 11110, Dec. 2, 2011)  

    (6) Any person who demands, without legitimate authority, the suspension or resumption of the reproduction or interactive transmission of relevant works, etc. under paragraphs (1) and (3), shall make a compensation for any losses incurred thereby.

    (7) Matters necessary for the vindication, suspension, notification, resumption of reproduction or interactive transmission, designation of a recipient, and public notice, etc. under paragraphs (1) through (4) shall be prescribed by Presidential Decree. In such cases, the Minister of Culture, Sports and Tourism shall make a prior consultation with the heads of related central administrative agencies. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 10807, Jun. 30, 2011)  

    Article 103-2 (Scope of Court Orders Issued to Online Service Providers)               

    (1) Where the court orders necessary measures pursuant to Article 123 (3) to an online service provider who meets the requirements under Article 102 (1) 1, it may order the following measures only:

    1. Termination of certain accounts;

    2. Reasonable measures to prevent the access to specific foreign websites.

    (2) Where the court orders necessary measures pursuant to Article 123 (3) to an online service provider who meets the requirements under Article 102 (1) 2 through 4, it may order the following measures only:

    1. Deletion of illegal copies;

    2. Measures to prevent the access to illegal copies;

    3. Termination of specific accounts;

    4. Other measures deemed by the court as necessary to the extent a minimum burden is imposed on an online service provider.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 103-3 (Request for Information on Reproducers and Interactive Transmitters)     

    (1) Where the claimant to a right has requested an online service provider to provide information owned by such online service provider, such as the names and addresses of the relevant reproducer and interactive transmitter to the minimum extent necessary to file a civil lawsuit or bring criminal charges, but the online service provider has refused such request, the claimant to the right may request the Minister of Culture, Sports and Tourism to issue an order to the online service provider to provide such information.

    (2) In receipt of a request under paragraph (1), the Minister of Culture, Sports and Tourism may order the online service provider to submit information on the relevant reproducer and interactive transmitter, after undergoing deliberation by the Copyright Protection Deliberation Committee referred to in Article 122-6. (Amended by Act nº 14083, Mar. 22, 2016)

    (3) The online service provider shall submit relevant information to the Minister of Culture, Sports and Tourism within seven days from receipt of an order under paragraph (2), and the Minister of Culture, Sports and Tourism shall provide such information to a person who has made a request under paragraph (1), without delay.

    (4) No person provided with information on the relevant reproducer or interactive transmitter pursuant to paragraph (3) shall use such information for the purposes other than those requested under paragraph (1).

    (5) Other matters necessary for the provision of information on reproducers or interactive transmitters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 104 (Obligation, etc. of Online Service Providers of Special Type)                

    (1) The online service provider who aims principally at enabling interactive transmission of works, etc. by using computers between other persons (hereinafter referred to as “online service provider of special type”) shall take necessary measures, such as technological measures, etc. that block illegal forwarding of the relevant work, etc. upon request from the holder of rights. In such cases, matters regarding the request of holder of rights and necessary measures shall be prescribed by Presidential Decree. (Amended by Act nº 9625, Apr. 22, 2009)

    (2) The Minister of Culture, Sports and Tourism may lay down and announce the extent of online service provider of special type under paragraph (1). (Amended by Act nº 8852, Feb. 29, 2008)

    CHAPTER VI-2.- PROHIBITION OF CIRCUMVENTING TECHNOLOGICAL PROTECTION MEASURES, ETC

    Article 104-2 (Prohibition of Circumventing Technological Protection Measures)               

    (1) No person shall circumvent the technological protection measures under subparagraph 28 (a) of Article 2 by intention or negligence without legitimate authority by removing, altering or bypassing such measures: Provided, That this shall not apply in any of the following:

    1. Where a person engaged in research of encryption circumvents technological protection measures to the extent necessary to research flaws or vulnerability of encryption technologies applied to such works, etc. after legitimately obtaining the copy of the works, etc.: Provided, That the foregoing shall be limited to cases where he or she has made a considerable effort to obtain a permission for the use necessary for such research from the holder of rights, but failed to do so;

    2. Where he or she includes components or parts circumventing technological protection measures in technology, products, services or devices in order to prevent minors from accessing online works, etc. harmful to minors: Provided, That the foregoing shall be limited to cases where no ban is imposed pursuant to paragraph (2);

    3. Where it is necessary to identify functions of non-disclosure collecting and distributing personally identifiable information capable of verifying individuals’ online activities and circumventing them: Provided, That the foregoing shall not apply where it affects other persons’ access to works, etc.;

    4. Where it is necessary for law enforcement, legitimate information collection, guarantee of security, etc. by the State;

    5. Where it is necessary for educational institutions and education supporting institutions under Article 25 (2), libraries under Article 31 (1) (limited to non-profit libraries) or archive management institutions under the Public Records Management Act to determine whether to purchase works, etc.: Provided, That the foregoing shall be limited to cases where any access thereto is impossible without circumventing technological protection measures;

    6. Where a person who uses programs with legitimate authority engages in decompilating program codes to the extent necessary to secure compatibility with other programs;

    7. Where it is necessary for a person who has legitimate authority to inspect, investigate, or correct the security of computers or information and communications networks;

    8. Cases determined and notified by the Minister of Culture, Sports and Tourism according to the procedures prescribed by Presidential Decree as it is deemed that the legitimate use of works, etc. of specific types is unreasonably affected or likely to be affected by the prohibition of circumventing technological protection measures. In such cases, the effect of such exception shall be valid for three years.

    (2) No person may manufacture, import, distribute, interactively transmit, sell or rent, offer to the general public for subscription, advertise to sell or rent, store or possess to distribute the following devices, products or parts, or provide the relevant services, without legitimate authority:

    1. Those publicized, advertised or promoted for the purpose of circumventing technological protection measures;

    2. Those having limited business purposes or uses other than circumventing technological protection measures;

    3. Those designed, produced or remodeled, or performed for the main purpose of making circumventing technological protection measures possible or easy.

    (3) Notwithstanding the provisions of paragraph (2), the aforementioned shall not apply in either of the following cases:

    1. Cases falling under paragraph (1) 1, 2, 4, 6 and 7 in relation to technological protection measures under subparagraph 28 (a) of Article 2;

    2. Cases falling under paragraph (1) 4 and 6 in relation to technological protection measures under subparagraph 28 (b) of Article 2.

    (Article Inserted by Act nº 10807, Jun. 30, 2011)

    Article 104-3 (Prohibition of Removal, Alteration, etc. of Rights Management Information)          

    (1) No person shall do any of the following acts without legitimate authority either knowingly or without knowing by negligence that such acts may cause or conceal the infringement of copyright or other rights protected pursuant to this Act: (Amended by Act nº 11110, Dec. 2, 2011)

    1. Act of deliberately removing, altering or falsely adding rights management information;

    2. Act of distributing rights management information or importing such information for the purpose of distribution, upon knowing that such information has been removed or altered without legitimate authority;

    3. Act of distributing, publicly performing or publicly transmitting the original or copies of relevant works, etc. or the reproduction thereof or of importing them for the purpose of distribution, upon knowing that rights management information has been removed, altered or falsely added without legitimate authority.

    (2) Paragraph (1) shall not apply where it is necessary for national law enforcement, legitimate information collection, guarantee of security, etc.

    (Article Inserted by Act nº 10807, Jun. 30, 2011)

    Article 104-4 (Prohibition of Circumvention, etc. of Encrypted Broadcasting Signals)         

    No person shall conduct any of the following acts:

    1. Act of manufacturing, assembling, altering, importing, exporting, selling, or renting, or delivering with other means, devices, products, major components, programs, or other tangible or intangible measures for the purposes of decoding (encoding) encrypted broadcasting signals without consent of a broadcasting organization, either knowingly or without knowing by negligence that such measures will be mainly used for such purposes: Provided, That this shall not apply to cases falling under Article 104-2 (1) 1, 2 or 4;

    2. Where encrypted broadcasting signals have been decoded with legitimate authority, act of publicly transmitting such signals upon knowing such fact to other persons for profit without consent of a broadcasting organization;

    3. Act of listening to or viewing or publicly transmitting to other persons by receiving encrypted broadcasting signals, upon knowing that such signals have been decoded without consent of a broadcasting organization.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 104-5 (Prohibition of Forging, etc. of Labels)         

    No person shall conduct any of the following acts without legitimate authority:

    1. Act of forging labels of works, etc. to be attached, enclosed or added to illegal copies or their documents or packaging, or act of distributing forged labels or owning them for the purpose of distribution upon knowing such fact;

    2. Act of distributing labels produced upon obtaining a permit from the holder of right of works, etc. or a person who has received consent from the holder of right, beyond the permitted range, or act of redistributing forged labels or owning them for the purpose of redistribution upon knowing such fact;

    3. Act of forging documents or packaging distributed together with legitimate copies of works, etc. to use them for illegal copies, or act of distributing forged documents or packaging or owning them for the purpose of distribution upon knowing such fact.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 104-6 (Prohibition of Recording, etc. of Cinematographic Works)                

    No person shall record cinematographic works protected by copyright at a movie theater, etc. screening such works with a recording device without consent of the holder of author’s economic right, or publicly transmit such works.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 104-7 (Prohibition of Transmitting Signals Prior to Broadcasting)  

    No person shall transmit signals to be transmitted to a broadcasting organization (excluding cases in which the signals are transmitted for the purposes of allowing the public to directly receive them) to any third person without legitimate authority.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 104-8 (Claim, etc. of Suspension or Prevention of Infringement)  

    A person who holds copyrights or other rights protected pursuant to this Act may request suspension or prevention of infringement, security for damages, damages or statutory damages in lieu thereof against a person who has violated Articles 104-2 through 104-4, and may request suspension and prevention of infringement against a person who has done an act under Article 104-2 (1) without intention or negligence. In such cases, Articles 123, 125, 125-2, 126 and 129 shall apply mutatis mutandis. (Amended by Act nº 11110, Dec. 2, 2011)

    (Article Inserted by Act nº 10807, Jun. 30, 2011)

    CHAPTER VII.- COPYRIGHT TRUST SERVICE

    Article 105 (Permission, etc. for Copyright Trust Service)               

    (1) Any person who intends to engage in a copyright trust service shall obtain permission from the Minister of Culture, Sports and Tourism as prescribed by Presidential Decree; and a person who intends to engage in a copyright agency or brokerage service shall report thereon to the Minister of Culture, Sports and Tourism as prescribed by Presidential Decree: Provided, That the Minister of Culture, Sports and Tourism may designate a public institution under the Act on the Management of Public Institutions as an organization that provides copyright trust service. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    (2) Anyone who intends to operate the copyright trust service pursuant to the provisions of paragraph (1) shall satisfy the following requirements, prepare regulations defining the duties of copyright trust service as prescribed by Presidential Decree and submit them together with an application for permission for copyright trust service to the Minister of Culture, Sports and Tourism: Provided, That the requirements prescribed in subparagraph 1 shall not apply to a public institution referred to in the proviso to paragraph (1): (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    1. That it shall be an organization comprised of the holders of right to works, etc.;

    2. That it shall not aim at profit-making;

    3. That it shall have sufficient capability to execute the duties, such as the collection, distribution, etc. of fees.

    (3) Any person falling under any of the following subparagraphs shall not be eligible to obtain a license to engage in a copyright trust service or copyright agency or brokerage service (hereinafter referred to as “copyright trust service”) under paragraph (1) or report it: (Amended by Act nº 14634, Mar. 21, 2017) 

    1. Any incompetent person under the adult guardianship or quasi-incompetent person under the limited guardianship;

    2. Any person who has been declared bankrupt and has not yet been reinstated;

    3. Any person who is within one-year period following the execution of criminal penalties of a fine or more severe punishment, or the final decision to suspend the execution of a sentence for violation of this Act, or who is in the probation period following a suspended sentence;

    4. Any person who has no domicile in the Republic of Korea;

    5. Any legal person or organization in which a person falling under any of subparagraphs 1 through 4 is the representative or executive officer.

    (4) Any person who has obtained permission or reported for copyright trust service under paragraph (1) (hereinafter referred to as “copyright trust service provider”) may collect fees for his or her services from the holder of author’s economic rights or other interested persons.

    (5) The rate and amount of fees under paragraph (4) and the rate and amount of usage fee that a copyright trust service provider receives from users shall be determined by the copyright trust service provider after he or she obtains approval from the Minister of Culture, Sports and Tourism. In such cases, the Minister of Culture, Sports and Tourism shall collect opinions of interested persons, as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    (6) As for approval under paragraph (5), the Minister of Culture, Sports and Tourism may approve after going through the deliberation of the Korea Copyright Commission pursuant to Article 112, and may ,if necessary, set the period of time for the approval or approve after correcting the content in the application . (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    (7) Where there is an application for approval on the rate or amount of usage fee pursuant to the provisions of paragraph (5) or where the Minister of Culture, Sports and Tourism has granted approval, he or she shall announce the content thereof as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008)

    (8) Where it is necessary for the protection of rights of the holder of author’s economic right and other parties or for the contribution of convenience of use of works, etc., the Minister of Culture, Sports and Tourism may change the content of approval pursuant to the provisions of paragraph (5). (Amended by Act nº 8852, Feb. 29, 2008)

    Article 106 (Obligation of Copyright Trust Service Provider)          

    (1) The copyright trust service provider shall prepare a list of works, etc. that he or she manages on a quarter year basis in written or electronic form as prescribed by Presidential Decree so that all the people may peruse the list during business hours at the least.

    (2) Where a user requests in writing, the copyright trust service provider shall supply the information under his or her management necessary for concluding exploitation contract of works, etc., which is prescribed by Presidential Decree, within a considerable period of time in writing, unless there are justifiable causes to the contrary.

    (3) Where necessary for users’ convenience, the Minister of Culture, Sports and Tourism may request a copyright trust service provider that receives usage fees under Article 105 (5) or an organization that collects remunerations from persons who do public performance using commercial phonogram under Articles 76-2 and 83-2 to make an integrated collection, as prescribed by Presidential Decree. In such cases, the copyright trust service provider or remuneration collection organization in receipt of such request shall comply therewith unless there is any good cause. (Inserted by Act nº 14083, Mar. 22, 2016)

    (4) A copyright trust service provider or remuneration collection organization may entrust the affairs related to the integrated collection of usage fees and remunerations as prescribed in paragraph (3) to a person prescribed by Presidential Decree. (Inserted by Act nº 14083, Mar. 22, 2016)

    (5) A copyright trust service provider or remuneration collection organization that entrusts affairs related to collection under paragraph (4), shall pay entrustment commission, as prescribed by Presidential Decree. (Inserted by Act nº 14083, Mar. 22, 2016)

    (6) Necessary matters concerning the time frame for, and methods, etc. of, settlement of usage fees and remunerations collected under paragraph (3) shall be prescribed by Presidential Decree. (Inserted by Act nº 14083, Mar. 22, 2016)

    Article 107 (Request for Perusal of Documents)  

    The copyright trust service provider may request for perusal of documents needed for the calculation of usage fee for the relevant works from the person who uses the works, etc. under his or her management for commercial purposes. In such cases, the user shall comply therewith unless there is a justifiable reason to the contrary.

    Article 108 (Supervision)              

    (1) The Minister of Culture, Sports and Tourism may demand a copyright trust service provider to submit a necessary report on the duties of the copyright trust service. (Amended by Act nº 8852, Feb. 29, 2008)

    (2) In order to promote the protection of rights and interests of authors and the convenient use of works, the Minister of Culture, Sports and Tourism may issue necessary orders concerning copyright trust service. (Amended by Act nº 8852, Feb. 29, 2008)

    Article 109 (Cancellation, etc. of Permission)       

    (1) The Minister of Culture, Sports and Tourism may order the suspension of business for a specified period of not longer than six months, if a copyright trust service provider commits any of the following subparagraphs: (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    1. Where he or she has received an amount in excess of the fee approved pursuant to the provisions of Article 105 (5);

    2. Where he or she has received an additional usage fee in addition to the usage fee approved pursuant to the provisions of Article 105 (5);

    3. Where he or she has failed to make a report under Article 108 (1) without any justifiable reason or made a false report;

    4. Where he or she has received an order under Article 108 (2), and failed to fulfill the order without any justifiable reason;

    5. Where he or she has received a request to make integrated collection under Article 106 (3), and failed to comply with the request without any justifiable reason.

    (2) The Minister of Culture, Sports and Tourism may cancel permission for, or order to close copyright trust service if a copyright trust service provider commits any of the following subparagraphs: (Amended by Act nº 8852, Feb. 29, 2008)

    1. That the copyright trust service provider has obtained permission or made a report by fraudulent or unlawful means;

    2. That the copyright trust service provider continues to engage in the business after receiving an order of suspension under paragraph (1).

    Article 110 (Hearings)     

    If the Minister of Culture, Sports and Tourism intends to cancel the permission for, or order to close copyright trust service pursuant to the provisions of Article 109 (2), he or she shall hold a hearing. (Amended by Act nº 8852, Feb. 29, 2008)

    Article 111 (Imposition of Penalty Surcharge)      

    (1) When a copyright trust service provider falls under any of the subparagraphs of Article 109 (1) and thus has to be given a disposition of business suspension, the Minister of Culture, Sports and Tourism may impose and collect a penalty surcharge not exceeding 1/100 of the usage fees and remunerations collected in the immediately preceding year, in lieu of the disposition of business suspension, as prescribed by Presidential Decree: Provided, That where it is impractical to calculate the amount to be collected, the Minister may impose and collect a penalty surcharge in an amount not exceeding one billion won. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    (2) When the person who has been given a disposition of business suspension pursuant to the provisions of paragraph (1) fails to pay the penalty surcharge by the payment deadline, the Minister of Culture, Sports and Tourism shall collect it in the same manner as delinquent national taxes are collected. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 14083, Mar. 22, 2016)

    (3) The penalty surcharge collected pursuant to the provisions of paragraphs (1) and (2) may be used by the collecting body to establish order of healthy use of works. (Amended by Act nº 14083, Mar. 22, 2016)

    (4) Matters necessary for the amount of penalty surcharge in accordance with the kind, degree, etc. of violation for which a penalty surcharge is imposed pursuant to the provisions of paragraph (1), procedures for use of penalty surcharge pursuant to the provisions of paragraph (3), etc. shall be prescribed by Presidential Decree. (Amended by Act nº 14083, Mar. 22, 2016)

    CHAPTER VIII.- KOREA COPYRIGHT COMMISSION

    Article 112 (Establishment of Korea Copyright Commission)         

    (1) In order to deliberate on matters concerning copyright and other rights (hereafter referred to as “copyright” in this Chapter) protected pursuant to this Act, and to mediate and conciliate disputes concerning copyright (hereinafter referred to as “dispute”), and to conduct business necessary for the promotion of the rights and interests of right holders and protection and fair use of works, etc., the Korea Copyright Commission (hereinafter referred to as the “Commission”) shall be established. (Amended by Act nº 14083, Mar. 22, 2016)

    (2) The Commission shall be a legal person.

    (3) The provisions on an incorporated foundation under the Civil Act shall apply mutatis mutandis to matters not prescribed in this Act regarding the Commission. In such cases, a member of the Commission shall be deemed a director.

    (4) Any person who is not the Commission shall not use the name of the Korea Copyright Commission.

    (Article Amended by Act nº 9625, Apr. 22, 2009)

    Article 112-2 (Organization of the Commission)  

    (1) The Commission shall be comprised of members no less than 20 but no more than 25 including one chairperson and two vice-chairpersons.

    (2) Members shall be appointed by the Minister of Culture, Sports and Tourism from among the persons referred to in the following subparagraphs, and the chairperson and vice-chairpersons shall be elected from among the members. In such cases, the Minister of Culture, Sports and Tourism shall strike a balance between the number of members who reflect the interest of holders of rights which are protected by this Act and the number of members who reflect the interest of users thereof, and may request organizations of holders of a right by field or organizations of users by field or such to recommend members:

    1. Those who majored in the field related to copyright as those who are or were associate professors or higher, or in the position equivalent thereto in a college or authorized research institution;

    2. Those who are in the position of a judge or public prosecutor, or those who have qualification for a lawyer;

    3. Those who are experienced in business in the field of copyright or cultural industry as those who are or were public officials in Grade IV or higher, or in the position in a public institution equivalent thereto;

    4. Those who are or were in the position of executive officer of an organization related to copyright or cultural industry;

    5. Those who have extensive knowledge and wide experience in business related to copyright or cultural industry.

    (3) A term of office of members shall be three years and they may be reappointed: Provided, That a term of office of a member who is appointed to the designated post shall be the term of the post he or she holds.

    (4) When a vacancy occurs in the membership of the Commission, a substitute member shall be appointed pursuant to paragraph (2), and a term of office of the substitute member shall be the remainder of his or her predecessor’s term of office: Provided, That if the number of members is no less than 20, a substitute member need not be appointed.

    (5) Subcommittees by field may be established in order to efficiently conduct business of the Commission. A resolution made by a subcommittee with respect to matters entrusted by the Commission shall be deemed made by the Commission.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 113 (Functions)   

    The Commission shall perform the following functions: (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    1. Mediation or conciliation of disputes;

    2. Deliberation of the matters concerning the rate or amount of fee and usage fee for copyright trust service provider pursuant to the provisions of Article 105 (6) and deliberation of the matters presented for consideration by the Minister of Culture, Sports and Tourism or jointly by three or more members;

    3. Projects for setting up order in the use of works, etc. and for promoting fair use of works;

    4. International cooperation for the protection of copyright;

    5. Research, education and publicity of copyright;

    6. Support to the formulation of policy on copyright;

    7. Measures of technological protection and support to the formulation of policy on rights management information;

    8. Construction and operation of information management system for the provision of copyright information;

    9. Appraisal of infringement, etc. of copyright;

    10. Deleted (By Act nº 14083, Mar. 22, 2016)

    11. Duties prescribed as duties of the Commission or duties entrusted to the Commission pursuant to statutes;

    12. Other duties entrusted by the Minister of Culture, Sports and Tourism.

    Article 113-2 (Mediation)             

    (1) Any person seeking for mediation for dispute settlement may apply for mediation by filing an application with the Commission.

    (2) When the Commission has received an application for mediation pursuant to paragraph (1), the chairperson shall appoint a member from among the members and have him or her mediate.

    (3) Where a member responsible for mediation deems that a dispute is not possible to be settled through mediation, he or she may discontinue mediation.

    (4) When an application for conciliation has been made under this Act with respect to a dispute under mediation, the relevant mediation shall be deemed to have been suspended.

    (5) When mediation has been effected, a member responsible for mediation shall prepare a written mediation and put his or her name and seal on it with the relevant persons.

    (6) Matters necessary for application of and procedures for mediation shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 114 (Conciliation Division)              

    (1) In order for the Commission to effectively execute the duties of dispute conciliation, a conciliation division comprised of one member, or three or more members, including one member qualified as a lawyer.

    (2) Matters necessary for the composition, operation, etc. of conciliation division pursuant to the provisions of paragraph (1) shall be prescribed by Presidential Decree.

    Article 114-2 (Application, etc. for Conciliation)  

    (1) Any person who wants for dispute conciliation may apply for conciliation by filing an application for conciliation in which the intention and cause of application is stated with the Commission.

    (2) The conciliation division under Article 114 shall make conciliation of a dispute pursuant to paragraph (1).

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 115 (Non-Disclosure)       

    The procedures of conciliation shall be kept closed to the public in principle: Provided, That the head of conciliation division may permit those who are recognized as appropriate with the consent of the relevant parties to attend the procedures.

    Article 116 (Limitation on Use of Statement)       

    The statements made by the relevant parties or interested persons at the conciliation procedures shall not be used at the lawsuit or arbitration proceeding.

    Article 117 (Conclusion of Conciliation)   

    (1) Conciliation shall take effect by entering the matters that have been agreed upon between the relevant parties in the record.

    (2) The record pursuant to the provisions of paragraph (1) shall have the same effect as the court settlement: Provided, That the same shall not apply to the matters that cannot be disposed of voluntarily by the relevant parties.

    Article 118 (Conciliation Expense, etc.)  

    (1) Conciliation expense shall be borne by the applicant: Provided, That where conciliation has been concluded and unless special agreement exists, the relevant parties shall share the expense equally.

    (2) Matters necessary for application of and procedures for conciliation, and payment methods of conciliation expense shall be prescribed by Presidential Decree. (Inserted by Act nº 9625, Apr. 22, 2009)

    (3) The amount of conciliation expense pursuant to paragraph (1) shall be determined by the Commission. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 119 (Appraisal)    

    (1) The Commission may, where a case falls under any of the following subparagraphs, make an appraisal: (Amended by Act nº 9625, Apr. 22, 2009)

    1. Where a court or investigation agency requests for an appraisal of infringement of copyright or other rights for a trial or investigation;

    2. Where both parties to conciliation of a dispute request for an appraisal of a program and electronic information or such related to the program for dispute conciliation pursuant to Article 114-2 to make

    (2) Matters necessary for the procedures, methods, etc. of appraisal pursuant to the provisions of paragraph (1) shall be prescribed by Presidential Decree.

    (3) When the Commission makes an appraisal pursuant to the provisions of paragraph (1), it may collect appraisal fee and the amount shall be determined by the Commission.

    Article 120 (Copyright Technology Center)           

    (1) In order to effectively execute the duties in subparagraphs 7 and 8 of Article 113, the Commission shall have Copyright Technology Center. (Amended by Act nº 9625, Apr. 22, 2009)

    (2) Matters necessary for operation of Copyright Technology Center shall be prescribed by Presidential Decree. (Inserted by Act nº 9625, Apr. 22, 2009)

    Article 121 Deleted. (by Act nº 9625, Apr. 22, 2009)          

    Article 122 (Subsidy, etc.)             

    (1) The State may contribute money or provide subsidy for expenses necessary for operation of the Commission within budgetary limits. (Amended by Act nº 9625, Apr. 22, 2009)

    (2)          Individuals, legal persons or organizations may contribute money or other property to the Commission in order to support the execution of duties pursuant to the provisions of subparagraphs 3, 5 and 8 of Article 113.

    (3) The contributions pursuant to the provisions of paragraph (2) shall be held in a separate account and approval from the Minister of Culture, Sports and Tourism shall be obtained for the use thereof. (Amended by Act nº 8852, Feb. 29, 2008)

    CHAPTER VIII-II.- KOREA COPYRIGHT PROTECTION AGENCY

    Article 122-2 (Establishment of Korea Copyright Protection Agency)        

    (1) There is hereby established the Korea Copyright Protection Agency (hereinafter referred to as the “Protection Agency“) to provide services related to the protection of copyright.

    (2) The Protection Agency shall be a corporation.

    (3) The Government may contribute money or provide subsidy for expenses required for the establishment, facilities, operation, etc. of the Protection Agency within budgetary limits.

    (4) Except as expressly provided for in this Act and the Act on the Management of Public Institutions, the provisions of the Civil Act that are relevant to an incorporated foundation shall apply mutatis mutandis in regard to the Protection Agency.

    (5) No one other than the Protection Agency under this Act shall not use the title of the Korea Copyright Protection Agency or any title similar thereto.

    (Article Inserted by Act nº 14083, Mar. 22, 2016)

    Article 122-3 (Articles of Incorporation of Protection Agency)     

    The articles of incorporation of the Protection Agency shall include the following matters:

    1. Purpose;

    2. Name;

    3. Matters concerning the main office;

    4. Matters concerning executive officers and employees;

    5. Matters concerning the operation of the board of directors;

    6. Matters concerning the Copyright Protection Deliberation Committee referred to in Article 122-6;

    7. Matters concerning duties;

    8. Matters concerning property and accounting;

    9. Matters concerning the amendment of the articles of incorporation;

    10. Matters concerning the establishment, amendment and repeal of internal regulations.

    (Article Inserted by Act nº 14083, Mar. 22, 2016)

    Article 122-4 (Executive Officers of Protection Agency)  

    (1) The Protection Agency shall have not more than nine directors including one chairperson, and one auditor; the auditor and directors excluding the chairperson shall be part-time, and the chairperson shall preside over meetings of the board of directors.

    (2) The chairperson shall be appointed and dismissed by the Minister of Culture, Sports and Tourism.

    (3) The term of office of the chairperson shall be three years.

    (4) The chairperson shall represent and exercise overall control over the Protection Agency.

    (5) Where the chairperson is unable to perform his or her duties in extenuating circumstances, one of directors in the order enumerated in the articles of incorporation shall act on behalf of the chairperson.

    (6) No person who falls under any subparagraph of Article 33 of the State Public Officials Act shall be an executive officer of the Protection Agency referred to in paragraph (1).

    (Article Inserted by Act nº 14083, Mar. 22, 2016)

    Article 122-5 (Functions)              

    The functions of the Protection Agency shall be as follows:

    1. Support for the establishment and implementation of policies for protection of copyrights;

    2. Fact-finding survey and production of statistics on infringement of copyrights;

    3. Research and development of technology for protection of copyrights;

    4. Provision of support to the investigation and regulation of infringements on copyrights under subparagraph 26 of Article 5 of the Act on the Persons Performing the Duties of Judicial Police Officers and the Scope of Their Duties;

    5. Deliberation on corrective orders issued by the Minister of Culture, Sports and Tourism under Article 133-2;

    6. Making recommendations to online service providers to take corrective measures and making requests to the Minister of Culture, Sports and Tourism to issue corrective orders under Article 133-3;

    7. Affairs prescribed as duties of the Protection Agency or entrusted to it, by Acts and subordinate statutes;

    8. Other affairs entrusted by the Minister of Culture, Sports and Tourism.

    (Article Inserted by Act nº 14083, Mar. 22, 2016)

    Article 122-6 (Composition of Deliberation Committee)  

    (1) In order to conduct deliberations under Articles 103-3, 133-2 and 133-3 and to deliberate on the matters requested by the chairperson of the Protection Agency or referred to by the chairperson of the Deliberation Committee in connection with the protection of copyright, the Copyright Protection Deliberation Committee (hereinafter referred to as the “Deliberation Committee“) shall be established under the Protection Agency.

    (2) The Deliberation Committee shall be comprised of not less than five nor more than ten members, including one chairperson, and there shall be a balance between the number of the members representing the interest of the holders of the rights protected by this Act and the number of the members representing the interest of the users. (Amended by Act nº 14432, Dec. 20, 2016)

    (3) The chairperson of the Deliberation Committee shall be elected by and from among its members.

    (4) Members of the Deliberation Committee shall be commissioned by the Minister of Culture, Sports and Tourism in compliance with Presidential Decree from among persons with extensive knowledge of and experience in copyright, cultural industry, law, etc.,.

    (5) The term of office of a member of the Deliberation Committee shall be three years, and the consecutive appointment may be permitted.

    (6) Other matters necessary for the composition and operation of the Deliberation Committee shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 14083, Mar. 22, 2016)

    CHAPTER IX.- REMEDIES FOR INFRINGEMENT OF RIGHTS

    Article 123 (Right of Demanding Suspension, etc. of Infringement)           

    (1) Any person who holds the copyright or other rights protected under this Act (excluding the rights to be compensated under Articles 25, 31, 75, 76, 76-2, 82, 83 and 83-2; hereafter the same shall apply in this Article) may demand of a person infringing his or her rights to suspend such act or demand a person likely to infringe on his or her rights to take preventive measures or to provide a security for compensation for damages. (Amended by Act nº 9529, Mar. 25, 2009)

    (2) If a person who holds the copyright or other rights protected under this Act makes a demand under paragraph (1), he or she may demand destruction of the objects made by the act of infringement or other necessary measures.

    (3) In the cases of paragraphs (1) and (2), or in the case where a criminal indictment under this Act has been filed, on request of a plaintiff or accuser, the court may, with or without security, issue an order to temporarily suspend the act of infringement, or seize the objects made by the act of infringement, or to take other necessary measures.

    (4) With respect to paragraph (3), where a final judicial decision was made that no infringement of copyright and other rights protected under this Act has been made, the applicant shall pay compensation for the damages caused by his or her request.

    Article 124 (Act Construed as Infringement)        

    (1) Any act falling under any of the following subparagraphs shall be considered to be infringement of copyright or other rights protected under this Act: (Amended by Act nº 9625, Apr. 22, 2009)

    1. The importation into the Republic of Korea, for the purpose of distribution therein of goods made by an act which would infringe on copyright or other rights protected under this Act, if they were made within the Republic of Korea at the time of such importation;

    2. The possession, for the purpose of distribution, of goods produced by an act that constitutes an infringement on copyright or other rights protected under this Act (including those imported as referred to in subparagraph 1) with the knowledge of such infringement;

    3. Exploitation in business of a copy (including imported goods pursuant to subparagraph 1) of a program made in infringement of copyright of a program by a person who has acquired it with the knowledge of such infringement.

    (2) An act of using a work in a manner prejudicial to the honor or reputation of the author shall be considered to be an infringement of his or her moral rights. (Amended by Act nº 10807, Jun. 30, 2011)

    (3) Deleted (By Act nº 10807, Jun. 30, 2011)

    Article 125 (Claim for Damages)                

    (1) Where the holder of author’s economic right or other rights (excluding author’s moral right and performer’s moral right) protected under this Act (hereinafter referred to as “holder of author’s economic right, etc.”) claims compensation against a person who has infringed on his or her rights intentionally or by negligence for damages sustained from the relevant infringement, if the infringing person has gained any profit by his or her infringement, the relevant amount of profit shall be presumed to be the amount of damages sustained by the holder of author’s economic right, etc.

    (2) Where the holder of author’s economic right, etc. claims compensation against a person who has infringed on his or her rights intentionally or by negligence for damages sustained from the relevant infringement, the amount corresponding to that normally gained by an exercise of such rights shall be made as the amount of damages sustained by the holder of author’s economic right, etc., and a claim therefor may be made.

    (3) Notwithstanding the provisions of paragraph (2), where the amount of damages sustained by the holder of author’s economic right, etc. exceeds the amount under paragraph (2), a claim for such exceeding amount may be made.

    (4) Any person who has infringed on copyright, exclusive publication right (including cases applied mutatis mutandis under Articles 88 and 96), publication right, neighboring right or right of database producer which is registered shall be presumed to have been negligent in the relevant infringement. (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    Article 125-2 (Claim of Statutory Damages)          

    (1) A holder of author’s economic right, etc. may claim considerable damages within the scope of up to ten million won (50 million won in cases of intentionally infringing rights for profit) for each work, etc. whose right is infringed in lieu of the actual amount of damages or the amount of damages determined pursuant to Article 125 or 126 against a person who has infringed on rights intentionally or by negligence before a trial proceedings of the relevant is concluded.

    (2) For the purpose of paragraph (1), compilation works and derivative works which use two or more works as their material shall be deemed a single work.

    (3) In order for the holder of author’s economic right, etc. to make a claim pursuant to paragraph (1), relevant works, etc. shall be registered pursuant to Articles 53 through 55 (including cases applied mutatis mutandis under Articles 90 and 98) before the act of infringement occurs.

    (4) In receipt of a claim under paragraph (1), the court may recognize a considerable amount of damages within the scope under paragraph (1) in consideration of the purport of defense and the results of evidence examination.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 126 (Acknowledgement of the Amount of Damages)         

    When the fact is admitted that some damages have been done, but it is difficult to estimate the amount of damage under Article 125, the court may acknowledge a considerable amount of damage, in the light of the purport of pleading and the results of evidence examination.

    Article 127 (Claim for Restoration of Reputation, etc.)    

    An author or performer may demand of the person who has infringed on the author’s moral right or performer’s moral right wilfully or by negligence to take measures necessary for the restoration of his or her reputation in lieu of or together with compensation for damages.

    Article 128 (Protection of Author’s Moral Interests after Death)  

    After the death of an author, his or her bereaved family (referring to the surviving spouse, children, parents, grand children, grand parents, brothers and sisters of the deceased author) or the executor of his or her will may, pursuant to Article 123, claim compensation from a person who has violated or is likely to violate the provisions of Article 14 (2) in respect of the work concerned, or, may, pursuant to Article 127, demand restoration of his or her reputation from a person who has infringed on author’s moral right intentionally or by negligence or who has violated the provisions of Article 14 (2).

    Article 129 (Infringement on Rights to Joint Work)            

    Each author of a joint work or each holder of author’s economic right to a joint work shall be entitled to make the demand pursuant to Article 123 without the consent of other authors or other holders of author’s economic right, or to claim compensation for damages to his or her share in a joint work regarding the infringement on author’s economic right pursuant to Article 125.

    Article 129-2 (Provision of Information)  

    (1) Where deemed necessary for collecting evidence upon request of the party concerned in a lawsuit against the infringement of copyright or other rights protected pursuant to this Act, the court may order the other party concerned to provide the following information that he or she holds or knows:

    1. Information capable of identifying the act of infringement or a party related to the production and distribution of illegal copies;

    2. Information on the routes of production and distribution of illegal copies.

    (2) Notwithstanding the provisions of paragraph (1), the other party concerned may refuse to provide information in any of the following cases:

    1. Where any of the following persons might be indicted or found guilty:

    (a) The other party concerned;

    (b) A person who is or was a relative of the other party concerned;

    (c) Guardian of the other party concerned;

    2. Where it is intended to protect trade secrets (referring to trade secrets under subparagraph 2 of Article 2 of the Unfair Competition Prevention and Trade Secret Protection Act; hereinafter the same shall apply) or privacy, or where other justifiable grounds for refusing the provision of information exist.

    (3) Where the other party concerned fails to comply with the order to provide information without any justifiable ground, the court may recognize argument on information by the party concerned as true.

    (4) Where deemed necessary to determine whether there are justifiable grounds prescribed in paragraph (2) 2, the court may require the other party concerned to provide necessary information. In such cases, the court shall not disclose the provided information to anyone, unless it is necessary to hear the opinion of the party concerned who has requested the provision of information or his or her representative in order to determine whether the justifiable grounds exist.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 129-3 (Order of Secrecy Maintenance)    

    (1) Where all of the following grounds have been substantiated in regard to the trade secrets owned by the party concerned in a lawsuit against the infringement of copyright or other rights protected pursuant to this Act (excluding rights to receive compensation under Articles 25, 31, 75, 76, 76-2, 82, 83, 83-2 and 101-3; hereafter the same shall apply in this Article), the court may, by decision, order the other party concerned, an agent representing the party concerned in the lawsuit or other persons who have become aware of the trade secrets from the lawsuit to neither use such trade secrets for purposes other than the purpose of continuing the lawsuit, nor disclose such trade secrets to persons other than those related to the trade secrets and issued with the order under this paragraph, upon request of the party concerned: Provided, That this shall not apply where, until such request is made, the other party concerned, an agent representing the party concerned in the lawsuit or other persons who have become aware of the trade secrets from the lawsuit have already obtained such trade secrets by means other than the perusal of preparatory documents or evidence examination under subparagraph 1:

    1. That trade secrets are included in preparatory documents to have already been submitted or to be submitted, or in evidence (including information provided pursuant to Article 129-2 (4)) to have already been investigated or to be investigated;

    2. That the use or disclosure of trade secrets under subparagraph 1 for purposes other than the purpose of carrying out the lawsuit is likely to harm the business of the party concerned, and thus it is necessary to restrict the use or disclosure of trade secrets in order to prevent such harm.

    (2) The application for an order under paragraph (1) (hereinafter referred to as “order of secrecy maintenance“) shall be made in documents stating the following matters:

    1. The party subject to order of secrecy maintenance;

    2. The facts that are sufficient to identify the trade secrets subject to order of secrecy maintenance;

    3. The facts falling under the grounds prescribed in each subparagraph of paragraph (1).

    (3) Where an order of secrecy maintenance has been decided, the written decision shall be served on the party subject to order of secrecy maintenance.

    (4) Order of secrecy maintenance shall take effect from the time the written decision under paragraph (3) is served on the party subject to it .

    (5) An immediate appeal may be made against the ruling that has dismissed or rejected the application for an order of secrecy maintenance.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 129-4 (Revocation of Secrecy Maintenance Order)             

    (1) Where the party who has applied for or received an order of secrecy maintenance fails to meet, or no longer meets, the requirements prescribed in Article 129-3 (1), he or she may request the court keeping the records of proceedings (where no court is keeping the records of proceedings, referring to the court that has issued the confidentiality order) to revoke the order.

    (2) The court ruling on the application for revocation of a secrecy maintenance order shall serve the applicant and the other party concerned with the written decision.

    (3) An immediate appeal may be made against the court ruling of the application for revocation of the confidentiality order.

    (4) A court ruling to revoke a secrecy maintenance order shall take its effect only when it becomes final and conclusive.

    (5) Where any person other than the applicant for revocation of a secrecy maintenance order and the other party concerned has received the secrecy maintenance order about the relevant trade secrets, the court that held the trial to revoke the confidentiality order shall immediately notify such person of the purport of the trial to revoke the secrecy maintenance order.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    Article 129-5 (Notification, etc. of Application Including Perusal of Records of Proceedings)         

    (1) Where a decision under Article 163 (1) of the Civil Procedure Act has been made on the records of proceedings of the trial that issued an secrecy maintenance order (excluding a trial that has revoked secrecy maintenance order in whole), if the party concerned applied for the perusal, etc. of the part containing confidential information prescribed in the same paragraph through a person not subject to secrecy maintenance order in the relevant lawsuit, the court administrative officer, junior court administrative officer, chief court clerk or senior court clerk (hereafter referred to as “junior court administrative officer, etc.” in this Article) shall notify a person who made application under Article 163 (1) of the Civil Procedure Act (excluding a person who applied for the perusal, etc. thereof) of the purport of such an application, right after the application for perusal, etc. thereof is made.

    (2) In cases falling under paragraph (1), no junior court administrative officer, etc. shall allow the person who has taken the procedures for such application for perusal, etc. the part containing confidential information under paragraph (1) until two weeks pass from the date of the application under paragraph (1) (where the application for the secrecy maintenance order for the person who has taken the procedures for such application is made within the period, referring to the point when the trial for such application becomes final and conclusive).

    (3) In regard to allowing the person who has applied for the perusal, etc. under paragraph (1) to peruse, etc. the part containing confidential information under paragraph (1), paragraph (2) shall not apply where all of the parties concerned who have made an application under Article 163 (1) of the Civil Procedure Act consent thereto.

    (Article Inserted by Act nº 11110, Dec. 2, 2011)

    CHAPTER X.- SUPPLEMENTARY PROVISIONS

    Article 130 (Delegation and Entrustment of Authority)   

    The Minister of Culture, Sports and Tourism may delegate part of his or her authority pursuant to this Act to the Special Metropolitan City Mayor, a Metropolitan City Mayor, Do Governor and Special Self-Governing Province Governor as prescribed by Presidential Decree, or may entrust it to the Commission, Protection Agency, or copyright-related organizations. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009; Act nº 14083, Mar. 22, 2016)

    Article 131 (Legal Fiction as Public Official in Application of Penal Provisions)       

    Members and employees of the Commission, executive officers and employees of the Protection Agency, and members of the Deliberation Committee shall be deemed public officials in the application of Articles 129 through 132 of the Criminal Act. (Amended by Act nº 14083, Mar. 22, 2016)

    Article 132 (Fees)             

    Those who apply, etc. for a matter falling under any of the following subparagraphs pursuant to this Act shall pay a fee, as stipulated by Ordinance of the Ministry of Culture, Sports and Tourism: (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    1. Those who apply for approval of statutory license (including the cases applied mutatis mutandis pursuant to Articles 89 and 97) pursuant to Articles 50 through 52;

    2. Those who apply for registration (including the cases applied mutatis mutandis pursuant to Articles 90 and 98), modifications of the registered matters, perusal of registers and issuance of copies thereof pursuant to Articles 53 through 55;

    3. Those who apply for permission or report copyright trust service pursuant to Article 105.

    Article 133 (Collection, Destruction and Deletion of Illegal Copies)            

    (1) When the Minster of Culture, Sports and Tourism, the Special Metropolitan City Mayor, a Metropolitan City Mayor, a Do Governor and a Special Self-Governing Province Governor or the head of a Si/Gun/Gu (referring to the head of an autonomous Gu) finds out copies (excluding copies which are interactively transmitted through information and communication networks) that infringe on copyright or other rights protected pursuant to this Act, or tools, devices, information and programs manufactured to circumvent technological protection measures for works, etc., he or she may have the relevant public officials collect, destroy or delete them pursuant to the procedures and methods prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    (2) The Minster of Culture, Sports and Tourism may entrust the duties pursuant to the provisions of paragraph (1) to an organization prescribed by Presidential Decree. In such cases, those who are engaged in these duties shall be deemed public officials. (Amended by Act nº 8852, Feb. 29, 2008)

    (3) Where the relevant public officials, etc. collect, destroy or delete them pursuant to paragraphs (1) and (2), the Minster of Culture, Sports and Tourism may request the relevant organization for cooperation if necessary. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    (4) Deleted. (by Act nº 9625, Apr. 22, 2009)

    (5) The Minister of Culture, Sports and Tourism may set up and operate structures necessary for the duties pursuant to paragraph (1). (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9625, Apr. 22, 2009)

    (6) Where the provisions of paragraphs (1) through (3) conflict with the provisions of other Acts, this Act shall prevail to the extent of the conflict. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 133-2 (Orders, etc. for Deletion of Illegal Copies, etc. through Information and Communications Networks)           

    (1) Where a copy or information which infringes on copyright or other rights protected under this Act, or a program or information (hereinafter referred to as “illegal copies, etc.”) which circumvents technological protection measures is interactively transmitted through information and communications network, the Minister of Culture, Sports and Tourism may order, following deliberation by the Deliberation Committee, an online service provider to take measures referred to in the following subparagraphs, as prescribed by Presidential Decree: (Amended by Act nº 14083, Mar. 22, 2016)

    1. Warnings to reproducers and interactive transmitters of illegal reproductions, etc.;

    2. Deletion or suspension of interactive transmission of illegal reproductions, etc.

    (2) Where any reproducer and interactive transmitter who receives warnings pursuant to paragraph (1) 1 three times or more interactively transmits illegal reproductions, etc., the Minister of Culture, Sports and Tourism may order, following deliberation by the Deliberation Committee, an online service provider to suspend an account (excluding an exclusive account for e-mail and including other accounts given by the relevant online service provider; hereinafter the same shall apply) of the relevant reproducer or interactive transmitter within a fixed period of up to six months. (Amended by Act nº 11110, Dec. 2, 2011; Act nº 14083, Mar. 22, 2016)

    (3) An online service provider who has received orders pursuant to paragraph (2) shall, seven days before he or she suspends an account of the relevant reproducer or interactive transmitter, notify the relevant reproducer or interactive transmitter of the fact that the relevant account will be suspended, as prescribed by Presidential Decree.

    (4) Where a bulletin board for which orders pursuant to paragraph (1) 2 have been issued more than three times from among bulletin boards (referring to bulletin boards providing commercial interests or convenience of use from among the bulletin boards referred to in Article 2 (1) 9 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.; hereinafter the same shall apply) established in information and communications network of an online service provider is judged to seriously harm healthy use of copyright in the light of the form of the relevant bulletin board and the quantity and nature of copies posted, the Minister of Culture, Sports and Tourism may order, following deliberation by the Deliberation Committee, the online service provider to suspend the whole or part of the relevant bulletin board service within a fixed period not exceeding six months, as prescribed by Presidential Decree. (Amended by Act nº 14083, Mar. 22, 2016)

    (5) An online service provider who has received orders pursuant to paragraph (4) shall, from ten days before he or she suspends the relevant bulletin board service, post the fact that the relevant bulletin board service is suspended on the website of the relevant online service provider and on the relevant bulletin board, as prescribed by Presidential Decree.

    (6) An online service provider shall notify the Minister of Culture, Sports and Tourism of the result of measures taken within five days from receiving an order pursuant to paragraph (1), within ten days from receiving an order pursuant to paragraph (2), within 15 days from receiving an order pursuant to paragraph (4), as prescribed by Presidential Decree.

    (7) The Minister of Culture, Sports and Tourism shall give an opportunity of submission of an opinion in advance to online service providers subject to orders referred to in paragraphs (1), (2) and (4), to reproducers and interactive transmitters who have direct stake in orders pursuant to paragraph (2) and to operators of bulletin boards pursuant to paragraph (4). In such cases, Articles 22 (4) through (6) and 27 of the Administrative Procedures Act shall apply mutatis mutandis to the submission of an opinion.

    (8) The Minister of Culture, Sports and Tourism may establish and operate an organization necessary to perform affairs pursuant to paragraphs (1), (2) and (4).

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 133-3 (Recommendation of Correction, etc.)        

    (1) Where the Protection Agency, as a result of investigation into information and communications network of an online service provider, has found a fact that illegal copies, etc. have been interactively transmitted, it may recommend an online service provider to take corrective measures falling under the following subparagraphs, following deliberation by the Deliberation Committee: (Amended by Act nº 14083, Mar. 22, 2016)

    1. Warnings to reproducers or interactive transmitters of illegal copies, etc.;

    2. Deletion and suspension of interactive transmission of illegal copies, etc.;

    3. Suspension of accounts of reproducers or interactive transmitters who have repeatedly transmitted illegal copies, etc.

    (2) Within five days from receiving recommendation pursuant to paragraph (1) 1 and 2, and within ten days from receiving recommendation pursuant to paragraph (1) 3, an online service provider shall notify the Protection Agency of the result of performing the correction measures. (Amended by Act nº 14083, Mar. 22, 2016)

    (3) Where an online service provider fails to comply with the recommendation pursuant to paragraph (1), the Protection Agency may request the Minister of Culture, Sports and Tourism to issue an order pursuant to Article 133-2 (1) and (2) to him or her. (Amended by Act nº 14083, Mar. 22, 2016)

    (4) Where, pursuant to paragraph (3), the Minister of Culture, Sports and Tourism gives an order pursuant to Article 133-2 (1) and (2), no deliberation by the Deliberation Committee shall be required. (Amended by Act nº 14083, Mar. 22, 2016)

    (Article Inserted by Act nº 9625, Apr. 22, 2009)

    Article 134 (Creation of Environment for fair Use of Works)          

    (1) The Minister of Culture, Sports and Tourism may execute projects necessary for promotion of fair use of works, such as provision of information on works, etc., copyright of which has expired. (Amended by Act nº 9625, Apr. 22, 2009)

    (2) Matters necessary for projects under paragraph (1) shall be prescribed by Presidential Decree. (Amended by Act nº 9625, Apr. 22, 2009)

    (3) Deleted. (by Act nº 9625, Apr. 22, 2009)

    Article 135 (Donation of Author’s Economic Right, etc.)  

    (1) The holder of author’s economic right, etc. may donate their rights to the Minister of Culture, Sports and Tourism. (Amended by Act nº 8852, Feb. 29, 2008)

    (2) The Minister of Culture, Sports and Tourism may designate an organization capable of equally managing the rights to the works, etc. donated by the holder of author’s property right, etc. (Amended by Act nº 8852, Feb. 29, 2008)

    (3) The organization designated pursuant to the provisions of paragraph (2) shall not use the works, etc. for commercial purposes or against the intention of the relevant holder of author’s economic right, etc.

    (4) Matters necessary for the procedures of donation, designation of organization, etc. pursuant to the provisions of paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    CHAPTER XI.- PENALTY PROVISIONS

    Article 136 (Penalty Provisions)  

    (1) Any person who falls under any of the following subparagraphs may be punished by imprisonment with labor up to five years or by a fine up to 50 million won, or may be punished by both: (Amended by Act nº 11110, Dec. 2, 2011)

    1. A person who infringes on author’s economic right or other property rights protected pursuant to this Act (excluding the rights under Article 93) by means of reproduction, performance, public transmission, exhibition, distribution, rental, or production of derivative works;

    2. A person who violates the court order under Article 129-3 (1) without justifiable grounds.

    (2) Any person who falls under any of the following subparagraphs shall be punished by imprisonment with labor for up to three years or by a fine up to 30 million won, or may be punishable by both: (Amended by Act nº 9625, Apr. 22, 2009; Act nº 10807, Jun. 30, 2011; Act nº 11110, Dec. 2, 2011)

    1. A person who defames the honor of author or performer by infringing on author’s or performer’s moral rights;

    2. A person who files for false registration pursuant to Articles 53 and 54 (including cases applied mutatis mutandis pursuant to Articles 90 and 98) deceitfully;

    3. A person who infringes on the right of a database producer protected pursuant to Article 93 by means of reproduction, distribution, broadcasting or interactive transmission;

    3-2. A person who violates Article 103-3 (4);

    3-3. A person who violates Article 104-2 (1) or (2) for his or her own business or for profit;

    3-4. A person who violates Article 104-3 (1) for his or her own business or for profit: Provided, That a person who, by negligence, has not known that such act causes or conceals the infringement of copyright or other rights protected pursuant to this Act shall be excluded herefrom;

    3-5. A person who commits an act falling under subparagraph 1 or 2 of Article 104-4;

    3-6. A person who violates Article 104-5;

    3-7. A person who violates Article 104-7;

    4. A person who commits an act deemed an infringement pursuant to Article 124 (1);

    5. and 6. Deleted (By Act nº 10807, Jun. 30, 2011)

    Article 137 (Penalty Provisions)  

    (1) Any person who falls under any of the following subparagraphs shall be punished by imprisonment with labor up to one year or by a fine up to ten million won: (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    1. A person who makes a work public under the real name or pseudonym of a person other than the author;

    2. A person who publicly performs or publicly transmits a performance, or distributes copies of performance under the real name or pseudonym of a person other than the performer;

    3. A person who violates Article 14 (2);

    3-2. A person who conducts an act falling under subparagraph 3 of Article 104-4;

    3-3. A person who violates Article 104-6;

    4. A person who operates copyright trust service without obtaining permission pursuant to Article 105 (1);

    5. A person who commits an act deemed an infringement pursuant to Article 124 (2);

    6. A person who obstructs the business of an online service provider by making a demand by intention for the suspension or resumption of a reproduction or interactive transmission under Article 103 (1) or (3), upon knowing that he or she had no legitimate authority;

    7. A person who violates Article 55-2 (including cases applied mutatis mutandis pursuant to Articles 90 and 98).

    (2) A person who attempts to commit a crime under paragraph (1) 3-3 shall be punished. (Inserted by Act nº 11110, Dec. 2, 2011)

    Article 138 (Penalty Provisions)  

    Any person who falls under any of the following subparagraphs shall be punished by a fine up to five million won: (Amended by Act nº 11110, Dec. 2, 2011)

    1. A person who violates Article 35 (4);

    2. A person who fails to indicate the sources, in violation of Article 37 (including the cases applied mutatis mutandis pursuant to Articles 87 and 94);

    3. A person who fails to the holder of author’s economic right, in violation of Article 58 (3) (including cases applied mutatis mutandis under Articles 63-2, 88 and 96);

    4. A person who fails to notify the author, in violation of Article 58-2 (2) (including cases applied mutatis mutandis under Articles 63-2, 88 and 96);

    5. A person who engages in a copyright agency or brokerage service without reporting pursuant to Article 105 (1), or who continues the services after receipt of an order to close the services pursuant to Article 109 (2).

    Article 139 (Confiscation)             

    Among copies made by infringing on copyright or other rights protected pursuant to this Act and tools and materials mainly used to produce such copies, which are owned by the infringing person, printer, distributor or public performer shall be confiscated. (Amended by Act nº 11110, Dec. 2, 2011)

    (Article Amended by Act nº 10807, Jun. 30, 2011)

    Article 140 (Complaint)  

    The crimes under this Chapter shall be prosecuted only when the injured party has made a complaint: Provided, That in cases falling under any of the following subparagraphs, the same shall not apply: (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011)

    1. Where an act falling under Article 136 (1) 1 or 136 (2) 3 and 4 (in cases falling under Article 124 (1) 3, the act shall not be punishable against the explicit opinion of the victim) has been committed habitually for profit-making;

    2. Cases falling under Article 136 (2) 2 and 3-2 through 3-7, Article 137 (1) 1 through 4, 6 and 7, and subparagraph 5 of Article 138;

    3. Deleted. (By Act nº 11110, Dec. 2, 201)

    Article 141 (Joint Penal Provisions)          

    If a representative of a legal person, or an agent, employee or other employed persons of a legal person or an individual has committed a crime as prescribed under this Chapter with respect to the affairs of the legal person or the individual, the fine prescribed under the relevant Articles shall be imposed on such a legal person or an individual in addition to the punishment of the offender: Provided, That where a legal person or an individual has not neglected to pay reasonable attention to and supervise the relevant affairs in order to prevent such an offense, the same shall not apply. (Amended by Act nº 9625, Apr. 22, 2009)

    Article 142 (Administrative Fine)               

    (1) A person who has failed to take necessary measures pursuant to Article 104 (1) shall be punished by an administrative fine not exceeding 30 million won. (Amended by Act nº 9625, Apr. 22, 2009)

    (2) A person who falls under any of the following subparagraphs shall be punished by an administrative fine not exceeding ten million won: (Amended by Act nº 9625, Apr. 22, 2009; Act nº 11110, Dec. 2, 2011; Act nº 14083, Mar. 22, 2016)

    1. A person who fails to comply with the order of the Minister of Culture, Sports and Tourism under Article 103-3 (2);

    2. A person who fails to perform his or her duty pursuant to Article 106;

    3. A person who uses the title of the Korea Copyright Commission, in violation of Article 112 (4);

    3-2. A person who uses the title of the Korea Copyright Protection Agency, in violation of Article 122-2 (5);

    4. A person who fails to execute orders given by the Minister of Culture, Sports and Tourism pursuant to Article 133-2 (1), (2) and (4);

    5. A person who fails to give notice pursuant to Article 133-2 (3), to post notice pursuant to paragraph (5) of the same Article, to give notice pursuant to paragraph (6) of the same Article.

    (3) An administrative fine pursuant to paragraphs (1) and (2) shall be imposed and collected by the Minister of Culture, Sports and Tourism, as prescribed by Presidential Decree. (Amended by Act nº 9625, Apr. 22, 2009)

    (4) and (5) Deleted. (by Act nº 9625, Apr. 22, 2009)

    ADDENDA

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation: Provided, That the provisions of Article 133 (1) and (3) shall enter into force on the date of its promulgation.

    Article 2 (Transitional Measures concerning Extent of Application)

    (1) Regarding the works, etc. whose copyright has become extinct entirely or in part or has not been protected entirely or in part pursuant to the former provisions before this Act enters into force, this Act shall not apply to that part.

    (2) The utilization of works, etc. performed before the enforcement of this Act shall be governed by the previous provisions.

    (3) The provisions of the previous Addenda shall continue to apply even after this Act enters into force: Provided, That the provisions of transitional measures concerning the protection period of neighboring rights under paragraph (3) of the Addenda of the Copyright Act amended by Act nº 4717 shall be excluded herefrom. (Amended by Act nº 11110, Dec. 2, 2011)

    Article 3 (Transitional Measures concerning Phonogram Producer)

    Phonogram producers pursuant to the previous provisions shall be deemed phonogram producers under this Act.

    Article 4 (Transitional Measures concerning Author of Work in Organization’s Name)

    The previous provisions shall apply to the author of a work that has been made out pursuant to the previous provisions of Article 9 before this Act enters into force.

    Article 5 (Transitional Measures concerning Designation of Organization)

    The organization designated to receive compensation pursuant to the previous provisions before this Act enters into force shall be deemed an organization designated pursuant to this Act.

    Article 6 (Transitional Measures concerning Statutory License)

    The legal license under the previous provisions at the time this Act enter into force shall be deemed the legal license under this Act.

    Article 7 (Transitional Measures concerning Registration)

    The registration pursuant to the previous provisions at the time this Act enters into force shall be deemed the registration under this Act: Provided, That the registration of name, etc. of the holder of author’s property right made pursuant to the previous provisions of Article 51 shall be governed by the previous provisions.

    Article 8 (Transitional Measures concerning Counting of Protection Period of Phonogram)

    The counting of protection period of a phonogram that was fixed before this Act entered into force but has not been released yet shall be governed by this Act.

    Article 9 (Transitional Measures concerning Undistributed Compensation)

    The provisions of Article 25 (8) of this Act (including the cases applied mutatis mutandis pursuant to the provisions of Articles 31 (6), 75 (2) and 82 (2)) shall also apply to the compensation money that has been received pursuant to the previous provisions of Articles 23 (3), 28 (5), 65 and 68 before this Act enters into force. In such cases, the date of notification of distribution for each compensation shall be deemed the last day of the year to which the day when the holder of right is able to receive the compensation concerned for the first time from the compensation paying organization belongs.

    Article 10 (Transitional Measures concerning Performer’s Moral Right)

    The provisions of Articles 66 and 67 of this Act shall not apply to the performance presented before this Act enters into force.

    Article 11 (Transitional Measures concerning Copyright Trust Service Provider)

    Those who have received permission for copyright trust service pursuant to the previous provisions at the time this Act enters into force shall be deemed those who have received the permission for copyright trust management business, and those who have reported the copyright trust service shall be deemed those who have reported the copyright agency or brokerage service.

    Article 12 (Transitional Measures concerning Fee and Usage Fee for Copyright Trust Service Provider)

    The rate or amount of fee and usage fee for copyright trust management business provider that has been approved pursuant to the previous provisions shall be deemed to have been approved pursuant to this Act.

    Article 13 (Transitional Measures concerning Copyright Committee, etc.)

    The Copyright Deliberation and Conciliation Committee and the members therof under the previous provisions shall be deemed the Copyright Committee and the members therof pursuant to the provisions of Chapter VIII of this Act.

    Article 14 (Transitional Measures concerning Application of Penalty Provisions)

    The application of penal provisions to an act before this Act enters into force shall be governed by the previous provisions.

    Article 15 Omitted.

    Article 16 (Relationship with Other Statutes)

    Where the previous provisions are cited in other Acts and subordinate statutes at the time this Act enters into force, the corresponding provisions in this Act shall be deemed to have been cited.

    ADDENDA (Act nº 8852, Feb. 29, 200)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDUM (Act nº 9529, Mar. 25, 2009)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDA (Act nº 9625, Apr. 22, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Article 2 (Repeal of Computer Programs Protection Act)

    The Computer Programs Protection Act shall be repealed.

    Article 3 (Preparation of Establishment of Commission)

    (1) An action of preparation made to establish the Commission pursuant to this Act may be made before this Act enters into force.

    (2) The Minister of Culture, Sports and Tourism shall organize the founding committee to take charge of affairs relating to the establishment of the Commission.

    (3) The founding committee shall be comprised of not more than five members appointed by the Minister of Culture, Sports and Tourism, and the chairperson of the Copyright Commission pursuant to Article 112 of the previous Copyright Act shall be the chairperson of the founding committee.

    (4) The founding committee shall prepare the articles of association to obtain authorization of the Minister of Culture, Sports and Tourism before this Act enters into force.

    (5) When the founding committee has obtained authorization pursuant to paragraph (4), it shall make registration for the establishment of the Commission.

    (6) Expenses incurred in the establishment of the Commission shall be borne by the State.

    (7) After the founding committee has registered the establishment of the Commission pursuant to paragraph (5), it shall transfer affairs to the chairperson of the Commission without delay, and the founding committee members shall be deemed to have been dismissed when transfer of affairs has been completed.

    Article 4 (Transitional Measures concerning Affairs, Rights and Duties, Employment of Copyright Commission and Computer Programs Protection Committee)

    (1) The Korea Copyright Commission shall take over affairs, rights and duties and employment of staff of the Copyright Commission and the Computer Programs Protection Committee pursuant to Articles 112 through 122 of the previous Copyright Act and Articles 35 through 43 of the previous Computer Programs Protection Act at the time this Act enters into force.

    (2) The chairperson and members of the Copyright Commission pursuant to Article 112 of the previous Copyright Act at the time this Act enters into force shall be deemed the chairperson and members of the Korea Copyright Commission, and the term of office shall be reckoned from the time when a term of office of the chairperson and members of the previous Copyright Commission began.

    Article 5 (Transitional Measures concerning Scope of Application)

    (1) With respect to works, etc. the whole or part of the right of which, protected by the previous Copyright Act and the previous Computer Programs Protection Act, has terminated or has not been protected before this Act enters into force, this Act shall not apply to the part thereof.

    (2) Use of programs made before this Act enters into force shall be in accordance with the previous Computer Programs Protection Act.

    Article 6 (Transitional Measures concerning Statutory License)

    Acts referred to in the following subparagraphs done under the previous Computer Programs Protection Act before this Act enters into force shall be deemed to have been done pursuant to this Act:

    1. Statutory license;

    2. Designation of an entrusted managing institution of copyright of programs;

    3. Designation of bailor and bailee of a program;

    4. Registration of programs;

    5. Transfer registration of copyright of programs;

    6. Measures for collection of illegal reproductions;

    7. Orders for correction and recommendation of correction of illegal reproductions, etc.;

    8. Mediation and conciliation of disputes;

    9. Appraisal of programs.

    Article 7 (Transitional Measures concerning Application of Penalty Provisions)

    In application of the penal provisions pursuant to the previous Computer Programs Protection Act to acts done before this Act enters into force, it shall be in accordance with the previous Computer Programs Protection Act.

    Article 8 Omitted.

    Article 9 (Relation with Other Statutes)

    Where the previous Computer Programs Protection Act or the provisions thereof are cited by other statutes as at the time when this Act enters into force, this Act or the corresponding provisions of this Act shall be deemed to have been cited.

    ADDENDA (Act nº 9785, Jul. 31, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 9 Omitted.

    ADDENDA (Act nº 10807, Jun. 30, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date on which the Free Trade Agreement between the Republic of Korea, of the one part, and the European Union and its Member States, of the other part, takes effect: Provided, That the amended provisions of Articles 39 through 42 shall enter into force two years from the date on which the Free Trade Agreement between the Republic of Korea, of the one part, and the European Union and its Member States, of the other part, takes effect.

    Articles 2 (Transitional Measures concerning Scope of Application)

    With regard to works, etc. for which all or some of copyright or other rights protected pursuant to this Act have been extinct or not protected pursuant to the former provisions before this Act enters into force, this Act shall not apply.

    Article 3 (Transitional Measures concerning Restriction on Responsibilities of Online Service Providers)

    Restriction on responsibilities of online service providers for the infringement of copyright or other rights protected pursuant to this Act before this Act enters into force shall be governed by the former provisions, notwithstanding the amended provisions of Articles 102 and 103.

    Article 4 (Transitional Measures concerning Application of Penalty Provisions)

    Application of penal provisions to acts done before this Act enters into force shall be governed by the former provisions.

    ADDENDA (Act nº 11110, Dec. 2, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date on which the Free Trade Agreement between the Republic of Korea and the United States of America and Exchange of Letters on the Free Trade Agreement between the Republic of Korea and the United States of America takes effect: Provided, That the amended provisions of Articles 64 (2) and 86 shall enter into force on August 1, 2013.

    Article 2 (Applicability)

    The amended provisions of Articles 103-3, 125-2 and 129-2 through 129-5 shall apply, starting with the first infringement of rights or violation of obligations after this Act enters into force.

    Article 3 (Transitional Measures concerning Scope of Application)

    With regard to works whose copyright or other rights protected pursuant to this Act have ceased to exist or have not been protected in full or in part under the former provisions before this Act enters into force, this Act shall not apply to the relevant parts.

    Article 4 (Special Rules concerning Protection Period of Neighboring Rights)

    (1) Notwithstanding the provisions of Article 3, the neighboring rights that come into being between July 1, 1987, and June 30, 1994, pursuant to the amended provisions of Article 2 (3) of the Addenda of the Copyright Act amended by Act nº 8101 shall remain for 50 years counting from the year following the time when such rights come into being pursuant to the amended provisions of Article 70 of the Copyright Act amended by Act nº 4717, which entered into force on July 1, 1994 (hereafter referred to as “the same Act” in this Article).

    (2) Among the neighboring rights that come into being between July 1, 1987, and June 30, 1994, pursuant to paragraph (3) of the Addenda of the same Act, those that have become extinct because the 20-year protection period under the former Act (referring to the Copyright Act before the Copyright Act amended by Act nº 4717 enters into force; hereafter the same shall apply in this Article) has lapsed before this Act enters into force shall be reinstated from the enforcement date of this Act and reverted to the holder of neighboring rights. In such cases, such neighboring rights shall remain for the remaining period of the protection period that would have been acknowledged if they had been protected for 50 years counting from the year following the time they came into being for the first time.

    (3) Act of using performances, phonograms or broadcasts for which neighboring rights have been reinstated pursuant to paragraph (2) before this Act enters into force shall not be deemed infringement of rights prescribed by this Act.

    (4) Reproductions manufactured before this Act enters into force by using relevant performance, phonograms or broadcasts after neighboring rights under paragraph (2) become extinct pursuant to the former Act may be continuously distributed without the permit from the holder of neighboring rights for two years after this Act enters into force.

    Article 5 (Transitional Measures concerning Restriction, etc. on Responsibilities of Online Service Providers)

    Notwithstanding the amended provisions of Articles 102 and 103-2, the restriction on responsibilities of online service providers in regard to the infringement of copyright or other rights protected pursuant to this Act before this Act enters into force shall be governed by the former provisions.

    Article 6 (Transitional Measures concerning Exclusive Publication Right of Program)

    Exclusive publication right of programs established and registered before this Act enters into force shall be governed by the former provisions.

    Article 7 (Transitional Measures concerning Application of Penalty Provisions)

    Application of penal provisions to acts taken before this Act enters into force shall be governed by the former provisions.

    Article 8 Omitted.

    ADDENDUM (Act nº 11903, Jul. 16, 2013)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDUM (Act nº 12137, Dec. 30, 2013)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDA (Act nº 13978, Feb. 3, 2016)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 and 3 Omitted.

    ADDENDA (Act nº 14083, Mar. 22, 2016)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Preparation for Establishment of Protection Agency)

    (1) Preparatory activities to incorporate the Protection Agency may be performed before this Act enters into force.

    (2) In order to deal with the affairs related to the incorporation of the Protection Agency, the Minister of Culture, Sports and Tourism shall organize a steering group for incorporation of the Protection Agency (hereinafter referred to as the “steering group for incorporation“)

    (3) The steering group for incorporation shall be comprised of and operated by not more than five incorporators commissioned by the Minister of Culture, Sports and Tourism.

    (4) The steering group for incorporation shall prepare the articles of incorporation of the Protection Agency, obtain approval thereof from the Minister of Culture, Sports and Tourism, register incorporation of the Protection Agency under a joint name of incorporators, and then, transfer their duties to the chairperson of the Protection Agency.

    (5) When the transfer of duties under paragraph (4) is completed, the steering group for incorporation shall be deemed dissolved and incorporators dismissed.

    Article 3 (Transitional Measures concerning Affairs under Jurisdiction of Korea Copyright Commission, and Its Rights and Obligations, Employment Relationship, etc.)

    (1) Affairs under the jurisdiction of the Korea Copyright Commission under subparagraph 10 of the former Article 113, and its rights and obligations and employment relationship existing as at the time this Act enters into force shall be succeeded by the Protection Agency.

    (2) Any activities performed by or toward the Korea Copyright Commission pursuant to subparagraph 10 of the former Article 113 before the establishment of the Protection Agency shall be deemed performed by or toward the Protection Agency.

    ADDENDUM (Act nº 14432, Dec. 20, 2016)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 14634, Mar. 21, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 (Transitional Measures concerning Ineligibility of the Incompetent, etc.)

    Notwithstanding the amended provisions of Article 105 (3) 1, the former provisions shall apply to the persons who has already been declared incompetent or quasi-incompetent at the time this Act enters into force, and of whom the effect of the declaration of the incompetency or quasi-incompetency remains valid pursuant to Article 2 of the Addenda to the Civil Act partially amended by Act 10429.

    05Nov/21

    Act nº 10166, Mar. 22, 2010. Telecommunications Business Act

    Act nº 10166, Mar. 22, 2010. Telecommunications Business Act (Amended by Act nº 10656, May 19, 2011, Act nº 11201, Jan. 17, 2012).

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purposes)

    The purpose of this Act is to contribute to the promotion of public welfare by encouraging sound development of the telecommunications business and ensuring convenience to the users of the telecommunications business through proper management of such business and efficient operation of telecommunications.

    Article 2 (Definitions)

    The terms used in this Act shall be defined as follows: (Amended by Act nº 10656, May 19, 2011)

    1. The term “telecommunications” means any transmission or reception of signs, signals, writing, sounds and images by wire, radio, optics or other electromagnetic systems;

    2. The term “telecommunications equipment and facilities” means equipment and facilities necessary for telecommunications, such as machinery, appliances, lines, etc.;

    3. The term “telecommunications line equipment and facilities” means equipment and facilities which constitute communications channels between transmission and reception points for telecommunications among the telecommunications equipment and facilities, such as the transmission and line equipment and facilities, exchange facilities installed as one body of the transmission and line equipment and facilities, and all facilities attached thereto;

    4. The term “commercial telecommunications equipment and facilities” means telecommunications equipment and facilities to be provided for tele communications business;

    5. The term “private telecommunications equipment and facilities” means telecommunications equipment and facilities, other than commercial telecommunications equipment and facilities, installed by an individual to be used for his/her own telecommunications;

    6. The term “telecommunications services” means services to advocate a third party’s communications through telecommunications equipment and facilities or to provide telecommunications equipment and facilities for a third party’s communications;

    7. The term “telecommunications business” means any business which provides telecommunications services;

    8. The term “telecommunications business operator” means an entity that provides telecommunications services upon obtaining a license, or completing registration or reporting (including cases of exemption from reporting) under this Act;

    9. The term “user” means a person who concludes a contract for the use of telecommunications services with a telecommunications business operator in order to procure telecommunications services;

    10. The term “pervasive services” means basic telecommunications services which any user may use at reasonable fees regardless of time and place;

    11. The term “common telecommunications services” means telecommunications services for transmitting or receiving sounds, data, images, etc. without any change in the form or contents thereof and to lease telecommunications line equipment and facilities for the use of transmission or reception of sounds, data, images, etc., such as telephone services or Internet services: Provided, That this shall not include telecommunications services (referring to detailed independent services among telecommunications services under subparagraph 6; hereinafter the same shall apply) determined and publicly announced by the Korea Communications Commission;

    12. The term “value-added telecommunications services” means telecommunications services, other than common telecommunications services:

    13. The term “special value-added telecommunications services” shall be as follows:

    (a) Value-added telecommunications services provided by a special on-line service provider under Article 104 of the Copyright Act;

    (b) Other value-added telecommunications services for the purpose of storing and transmitting, or transmitting information under subparagraph 1 of Article 3 of the Framework Act on National Informatization by using computers among others.

    Article 3 (Duties to Provide Services, etc.)

    (1) No telecommunications business operator may refuse to provide any telecommunications service, without justifiable grounds.

    (2) A telecommunications business operator shall perform his/her business in a fair, swift and accurate manner.

    (3) Fees for telecommunications services shall be reasonably determined so as to ensure the efficient development of the telecommunications business and to provide users with convenient and various telecommunications services fairly and inexpensively.

    Article 4 (Provision, etc. of Pervasive Services)

    (1) Each telecommunications business operator shall have obligations to provide pervasive services or to compensate for losses incurred therefrom.

    (2) Notwithstanding paragraph (1), the Korea Communications Commission may release any of the following telecommunications business operators from the obligations mentioned under paragraph (1):

    1. A telecommunications business operator, prescribed by Presidential Decree, for whom the imposition of obligations under paragraph (1) is deemed inadequate in consideration of the nature of telecommunications services;

    2. A telecommunications business operator whose profits from telecommunications services is not more than the amounts determined by Presidential Decree within 1/100 of the total profits from all telecommunications services.

    (3) Details of pervasive services shall be determined by Presidential Decree in consideration of the following matters:

    1. Level of the development of information and communications technology;

    2. Level of the dissemination of telecommunications services;

    3. Public interest and safety;

    4. Promotion of social welfare;

    5. Acceleration of informatization.

    (4) In order to provide pervasive services in an efficient and stable manner, the Korea Communications Commission may, according to standards and procedures prescribed by Presidential Decree, designate a telecommunications business operator who provides pervasive services, taking into account the scope, quality and level of fees of pervasive services, and the technical capability of the telecommunications business operator.

    (5) The Korea Communications Commission may distribute the burden of compensation for losses incurring from providing pervasive services to telecommunications business operators, based on their profits, in accordance with the methods and procedures prescribed by Presidential Decree.

    CHAPTER II.- TELECOMMUNICATIONS BUSINESS

    SECTION 1.- General Provisions

    Article 5 (Classification, etc. of Telecommunications Businesses)

    (1) The telecommunications business shall be classified into the common telecommunications business, special category telecommunications business and value-added telecommunications business.

    (2) The common telecommunications business shall install telecommunications line equipment and facilities, and thereby provide telecommunications services.

    (3) The special category telecommunications business shall be as follows:

    1. Business that provides common telecommunications services by using telecommunications line equipment and facilities, etc. of a person who has obtained a license for the common telecommunications business under Article 6 (hereinafter referred to as “common telecommunications business“);

    2. Business that installs telecommunications equipment and facilities in the premises prescribed by Presidential Decree, and provides telecommunications services therein by using such equipment and facilities.

    (4) The value-added telecommunications business shall provide value-added telecommunications services.

    SECTION 2.- Common Telecommunications Business

    Article 6 (Licenses, etc. for Common Telecommunications Business)

    (1) A person who intends to operate the common telecommunications business shall obtain a license from the Korea Communications Commission.

    (2) When granting a license under paragraph (1), the Korea Communications Commission shall comprehensively examine the following matters:

    1. Financial capability to implement plans for providing common telecommunications services;

    2. Technical capability to implement plans for providing common telecommunications services;

    3. Adequacy of plans for protecting users;

    4. Other matters prescribed by Presidential Decree concerning capabilities necessary for the stable provision of common telecommunications services.

    (3) The Korea Communications Commission shall establish detailed criteria for examination by subject matter to be examined, under paragraph (2), a period for granting licenses and guidelines for application for licenses, and publicly announce them.

    (4) When granting a license for the common telecommunications business under paragraph (1), the Korea Communications Commission may place necessary conditions to facilitate fair competition, protect users, improve service quality and efficiently utilize information and telecommunications resources. In such cases, details of such conditions shall be published on the Official Gazette or posted on the web site.

    (5) A license under paragraph (1) shall be granted only to a corporation.

    (6) Procedures for granting licenses under paragraph (1) and other necessary matters shall be determined by Presidential Decree.

     Article 7 (Grounds for Disqualification of Licenses)

    No person falling under any of the following subparagraphs shall be entitled to obtain a license for the common telecommunications business under Article 6:

    1. The State or local governments;

    2. Foreign governments or foreign corporations;

    3. Corporations, stocks of which are held by foreign governments or foreigners in excess of the limitation on stock holdings referred to in Article 8 (1).

    Article 8 (Limitation on Stock Holdings by Foreign Governments or Foreigners)

    (1) A foreign government or foreigner may hold stocks of the common telecommunications business (excluding non-voting stocks under Article 370 of the Commercial Act, but including voting stock equivalents, such as security depositary receipts, and equity shares; hereinafter the same shall apply) within 49/100 of the total number of outstanding stocks of the common telecommunications business, when aggregating all of those held by foreign governments or foreigners.

    (2) Where a foreign government or foreigner (including a specially related person under Article 9 (1) 1 of the Financial Investment Services and Capital Markets Act; hereinafter the same shall apply) holds 15/100 or more of the total number of outstanding stocks of a corporation and is the largest shareholder under Article 9 (1) 1 of the Financial Investment Services and Capital Markets Act, such corporation shall be deemed as a foreign corporation (hereinafter referred to as “deemed-foreign corporation“).

    (3) Any corporation which holds less than 1/100 of the total number of outstanding stocks of the common telecommunications business may not be deemed as a foreign corporation, even if it satisfies the requirements under paragraph (2).

    Article 9 (Grounds for Disqualification as Executives)

    (1) Any person falling under any of the following subparagraphs shall be disqualified as an executive of any common telecommunications business operator:

    1. A minor, or an incompetent or quasi-incompetent person;

    2. A person who is not yet reinstated after having been declared bankrupt by a court;

    3. A person in whose case three years have not passed since he/she had been sentenced to imprisonment without prison labor or heavier punishment for a violation of this Act, the Framework Act on Telecommunications, the Radio Waves Act or the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. (excluding matters not directly related to the telecommunications business; hereinafter referred to as “this Act, etc.”), and the execution of the punishment was completed (including cases that the execution is deemed to have been completed) or he/she was exempted from the enforcement of the sentence;

    4. A person who was sentenced to a suspended execution of imprisonment without prison labor or heavier punishment for a violation of this Act, etc. and is still under the period of suspension;

    5. A person in whose case one year has not passed since he/she had been sentenced to a fine for a violation of this Act, etc.;

    6. A person in whose case three years have not passed since he/she has been subject to a disposition to fully or partially cancel his/her license in accordance with Article 20 (1), a disposition to fully or partially revoke his/her registration in accordance with Article 27 (1) or an order to fully or partially discontinue the business in accordance with Article 27 (2). In cases of a corporation, “person” refers to a person who causes cancellation of its license, revocation of its registration or an order to discontinue the business, and its representative.

    (2) Where any executive falls under any subparagraph of paragraph (1) or is found to fall under any subparagraph of paragraph (1) at the time he/she is appointed as an executive, he/she shall duly resign from office.

    (3) Any activity in which any executive has been involved prior to his/her resignation under paragraph (2) may not lose its legal effect.

    Article 10 (Examination on Public Benefits of Possession, etc. of Stocks by Common Telecommunications Business)

    (1) A Public Benefit Examination Committee (hereinafter referred to as the “Committee“) shall be established in the Korea Communications Commission in order to examine as to whether any of the following cases impairs public interests prescribed by Presidential Decree (hereinafter referred to as “examination on public benefits“), such as national security, public safety and maintenance of order:

    1. Where a person holds not less than 15/100 of the total number of outstanding stocks of the common telecommunications business, including those stocks held by a specially related person under Article 9 (1) 1 of the Financial Investment Services and Capital Markets Act (hereinafter referred to as “specially related person“);

    2. Where the largest stockholder of the common telecommunications business changes;

    3. Where the common telecommunications business operator or any stockholder of a common telecommunications business concludes a contract with a foreign government or a foreigner for important managerial matters prescribed by Presidential Decree, such as the appointment and dismissal of executives and the transfer or acquisition of business;

    4. Where any stockholder who has de facto management rights for the common telecommunications business changes, as prescribed by Presidential Decree

    (2) Where a common telecommunications business operator or any stockholder of the common telecommunications business falls under paragraph (1), he/she shall report thereon to the Korea Communications Commission within 30 days from the date when such case occurs.

    (3) Where a common telecommunications business operator or any stockholder of the common telecommunications business falls under paragraph (1), he/she may request the Korea Communications Commission to examine public benefits before such case occurs.

    (4) Where the Korea Communications Commission has received reporting under paragraph (2) or a request for examination under paragraph (3), it shall refer such matters to the Committee for deliberation.

    (5) Where the Korea Communications Commission determines as a result of examination on public benefits under paragraph (1) that the cases under any subparagraph of paragraph (1) are likely to impair public interests, it may issue an order to modify the details of a contract, suspend the implementation of a contract, suspend the exercise of voting rights, or sell relevant stocks.

    (6) The scope of common telecommunications business operators who shall report or may request an examination on public benefits pursuant to paragraph (2) or (3), procedures for reporting and examinations on public benefits and other necessary matters shall be prescribed by Presidential Decree.

    Article 11 (Organization, Operation, etc. of the Committee)

    (1) The Committee shall consist of not less than five but not more than 10 members, including one chairperson.

    (2) The Vice Chairperson of the Korea Communications Commission shall hold office as the chairperson, and members shall be commissioned by the chairperson, from among public officials ranking Grade III of the relevant central administrative agencies prescribed by Presidential Decree, public officials in general service belonging to the Senior Civil Service, and those falling under any of the following persons:

    1. Persons who have advanced knowledge and career backgrounds in information and communications;

    2. Persons recommended by Government-funded research institutes which is related to the national security, public safety or maintenance of order;

    3. Persons recommended by nonprofit, non-governmental organizations referred to in Article 2 of the Assistance for Non-profit, Non-Governmental Organizations Act;

    4. Other persons deemed necessary by the chairperson.

    (3) The Committee may conduct investigations necessary for the examination on public benefits, or request an interested party or a reference witness to provide necessary data. In such cases, the relevant interested party or reference witness shall comply with such request unless justifiable grounds exist.

    (4) Where the Committee deems it necessary, it may require an interested party or a reference witness to appear at a Committee meeting and state his/her opinions. In such cases, the relevant interested party or reference witness shall appear at a Committee meeting unless justifiable grounds exist.

    (5) Matters necessary for the organization, operation, etc. of the Committee shall be prescribed by Presidential Decree.

    Article 12 (Restrictions, etc. on Excess Stock Holdings)

    (1) Where a foreign government or a foreigner has acquired stocks in violation of Article 8 (1), it or he/she shall not exercise the voting rights in the excess stocks.

    (2) The Korea Communications Commission may order a stockholder who has acquired stocks in violation of Article 8 (1), a common telecommunications business operator to which the stockholder belongs, or a stockholder of the deemed-foreign corporation to correct the violation within a period up to six months.

    (3) Any person in receipt of a corrective order under paragraph (2) shall correct the violation within a specified period.

    (4) Where a stockholder has acquired stocks in violation of Article 8 (1), a common telecommunications business operator may refuse to renew the register of stockholders or register of members to record the excess portion.

    Article 13 (Charges for Compelling Compliance)

    (1) The Korea Communications Commission may impose a charge for compelling compliance, on a person who has been subjected to the order referred to in Article 10 (5), 12 (2) or 18 (8) (hereinafter referred to as “corrective order“) and fails to comply with such order within a specified period. In such cases, the charge for compelling compliance leviable daily shall not be more than 3/1,000 of the purchase price of stocks held by such person, but in cases not related with stock holdings, it shall not exceed 100 million won.

    (2) A period for which charges for compelling compliance are imposed pursuant to paragraph (1) shall be from the date following the date the period prescribed by the corrective order expires to the date the corrective order is complied with. In such cases, the charge for compelling compliance shall be imposed within 30 days from the date following the date the period prescribed by the corrective order expires, in the absence of special grounds.

    (3) The provisions of Article 53 (5) shall apply mutatis mutandis to the surcharge on compelling compliance.

    (4) Matters necessary for the imposition, payment, refund, etc. of charges for compelling compliance shall be prescribed by Presidential Decree.

    Article 14 (Issuance of Stocks)

    Where a common telecommunications business operator issues stocks, such stocks shall be registered.

    Article 15 (Obligation to Commence Business)

    (1) A common telecommunications business operator shall install telecommunications equipment and facilities and commence the business within the period prescribed by the Korea Communications Commission.

    (2) Where a common telecommunications business operator fails to commence the business within the period under paragraph (1) due to natural disasters or other unavoidable circumstances, the Korea Communications Commission may extend the relevant period only once, upon an application from the common telecommunications business operator.

    Article 16 (Modification of Licenses)

    (1) Where a common telecommunications business operator intends to modify the importance matters prescribed by Presidential Decree among the matters of his/her license under Article 6, he/she shall obtain a revised license from the Korea Communications Commission, as prescribed by Presidential Decree.

    (2) The provisions of Articles 6 (4) and 15 shall apply mutatis mutandis to a revised license pursuant to paragraph (1).

    Article 17 (Concurrent Management of Business)

    (1) Where a common telecommunications business operator intends to manage any of the following businesses, he/she shall obtain approval from the Korea Communications Commission: Provided, That this may not apply to a common telecommunications business operator whose profits do not exceed 30 billion won:

    1. Communications equipment manufacturing business;

    2. Information and communications construction business (excluding any improvement and integration business of telecommunications networks) under subparagraph 3 of Article 2 of the Information and Communications Construction Business Act;

    3. Service business (excluding any improvement and integration business of telecommunications networks) under subparagraph 6 of Article 2 of the Information and Communications Construction Business Act.

    (2) The Korea Communications Commission shall grant approval under paragraph (1) if it deems that the common telecommunications business is unlikely to impede the management of the telecommunications business due to the management of the business under paragraph (1), and that it is necessary for the development of telecommunications.

    Article 18 (Acquisition of Business and Merger of Corporations, etc.)

    (1) Any person falling under any of the following subparagraphs shall obtain authorization from the Korea Communications Commission, as prescribed by Presidential Decree: Provided, That where the person sells telecommunications line equipment and facilities, except major telecommunications line equipment and facilities prescribed by Presidential Decree, he/she shall report thereon to the Korea Communications Commission, as prescribed by Presidential Decree, notwithstanding the provisions of subparagraph 3:

    1. Any person who intends to fully or partially acquire the business of a common telecommunications business operator;

    2. Any person who intends to merge with a corporate common telecommunications business;

    3. Any common telecommunications business operator who intends to sell the telecommunications line facilities necessary for providing licensed common telecommunications services;

    4. Any person who intends to hold not less than 15/100 of the total number of outstanding stocks of a common telecommunications business, or to become the largest stockholder of a common telecommunications business, including those stocks held by a specially related person;

    5. Any person who intends to acquire stocks of a common telecommunications business operator or conclude an agreement with a common telecommunications business operator with the intent to exercise dominant influence over the right of the common telecommunications business operator to manage the business, as prescribed by Presidential Decree;

    6. Any common telecommunications business operator who intends to establish a corporation to partially provide licensed common telecommunications services.

    (2) Where the Korea Communications Commission intends to grant authorization under paragraph (1), it shall comprehensively examine the following matters:

    1. Appropriateness of financial, technical and managerial capabilities;

    2. Appropriateness of the management of information and communications resources, such as frequencies and telecommunications numbers;

    3. Influence over competition among common telecommunications business operators;

    4. Protection of users;

    5. Utilization of telecommunications equipment and facilities and communications networks, efficiency of research and development, and influence over public benefits, such as international competitiveness of the telecommunications industry.

    (3) Matters necessary for the detailed guidelines for examinations for each subject matter and procedures for examinations under paragraph (2) shall be determined and publicly announced by the Korea Communications Commission.

    (4) Any person falling under any of the following subparagraphs shall succeed to the status of the relevant common telecommunications business operator which is related to his/her license:

    1. Any person who acquires the common telecommunications business by obtaining authorization under paragraph (1) 1;

    2. Any corporation which survived a merger or has been newly established in the course of a merger by obtaining authorization under paragraph (1) 2;

    3. Any corporation which is established to partially provide common telecommunications services by obtaining authorization under paragraph (1) 6.

    (5) The Korea Communications Commission may place conditions provided for in Article 6 (4) when granting authorization under paragraph (1).

    (6) The Korea Communications Commission shall consult with the Fair Trade Commission when intending to grant authorization under paragraph (1).

    (7) The provisions of Article 7 shall apply mutatis mutandis to the grounds for disqualification of authorization under paragraph (1).

    (8) Where a person falling under paragraph (1) 4 or 5 fails to obtain authorization referred to in paragraph (1), the Korea Communications Commission may order him/her to suspend the exercise of the voting right or to sell the relevant stocks and, where such person fails to comply with the conditions under paragraph (5), issue an order to comply with such conditions within a specified period set by it.

    (9) Any person who intends to obtain authorization under paragraph (1) shall be prohibited from engaging in the following conducts, prior to obtaining such authorization:

    1. Integration of telecommunications networks;

    2. Appointment of executives;

    3. Acquisition of business, or execution of agreements for merger or sales of equipment and facilities;

    4. Follow-up measures for the establishment of a company.

    (10) Where any person falling under paragraph (1) is subject to the examination on public benefits, he/she may present the documents required to be submitted for the examination on public benefits, when applying for authorization under paragraph (1).

    Article 19 (Suspension or Discontinuation of Business)

    (1) Where a common telecommunications business operator intends to fully or partially suspend or discontinue his/her common telecommunications business, he/she shall notify users by not later than 60 days before the scheduled date of such suspension or discontinuance and obtain approval therefor from the Korea Communications Commission.

    (2) Where the Korea Communications Commission deems it necessary to protect users in a separate means due to the suspension or discontinuation of the common telecommunications business, it may order the relevant common telecommunications business operator to take necessary measures for the protection of users, such as the vicarious execution of subscription change, payment of expenses incurred therein or cancellation of subscription.

    (3) Where the Korea Communications Commission is in receipt of an application for approval under paragraph (1) and deems that the suspension or discontinuation of the relevant business threatens to impair public benefits, it shall not grant such approval.

    Article 20 (Cancellation, etc. of Licenses)

    (1) Where a common telecommunications business operator falls under any of the following subparagraphs, the Korea Communications Commission may fully or partially cancel his/her license or issue an order to fully or partially suspend business operation for up to one year:

    1. Where he/she obtains a license by fraudulent or other illegal means;

    2. Where he/she fails to satisfy the conditions under Articles 6 (4) and 18 (5);

    3. Where he/she fails to comply with an order under Article 12 (2);

    4. Where he/she fails to commence business within a period prescribed by Article 15 (1) (referring to an extended period, if such period is extended under paragraph (2) of the same Article);

    5. Where he/she fails to comply with the terms and conditions of use, which are authorized or reported under Article 28 (1) and (2);

    6. Where he/she fails to comply with an order under Article 52 (1) or a corrective order under Article 92 (1) without any justifiable ground.

    (2) Guidelines and procedures for the dispositions under paragraph (1) and other necessary matters shall be prescribed by Presidential Decree.

    SECTION 3 .- Special Category Telecommunications Business and Value-Added Telecommunications Business

    Article 21 (Registration of Special Category Telecommunications Business)

    (1) Any person who intends to operate the special category telecommunications business shall satisfy the following conditions and file for registration (including any registration through an information and telecommunications network) with the Korea Communications Commission, as prescribed by Presidential Decree:

    1. Financial and technical capabilities;

    2. Plans for protecting users;

    3. Business plans, etc. and other matters prescribed by Presidential Decree.

    (2) The Korea Communications Commission in receipt of registration for the special category telecommunications business under paragraph (1) may place necessary conditions to facilitate fair competition, protect users, improve service quality, efficiently utilize information and telecommunications resources.

    (3) Any registration for the special category telecommunications business under paragraph (1) shall be granted only to a corporation.

    (4) Any person who has completed registration for the special category telecommunications business (hereinafter referred to as “special category telecommunications business operator”) shall commence his/her business within one year after the date he/she has completed such registration.

    (5) Requirements, procedures and other necessary matters for the registration under paragraph (1) shall be prescribed by Presidential Decree.

    Article 22 (Reporting, etc. on Value-Added Telecommunications Business)

    (1) Any person who intends to operate the value-added telecommunications business shall report (including cases of reporting through information and telecommunications networks) to the Korea Communications Commission, in accordance with conditions and procedures prescribed by Presidential Decree. In such cases, a small-scale value-added telecommunications business operator shall be deemed to have reported if he/she meets the standards for capital, etc. prescribed by Presidential Decree.

    (2) Notwithstanding the provisions of paragraph (1), any person who intends to conduct special value-added telecommunications business shall register (including registration through an information and communications network) with the Korea Communications Commission along with the following: (Inserted by Act nº 10656, May 19, 2011)

    1. An implementation plan to take technical measures to comply with the provisions of Articles 42, 42-2, 42-3 and 45 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. and Article 104 of the Copyright Act;

    2. Human resources and physical facilities necessary to conduct affairs;

    3. Financial soundness;

    4. Other matters prescribed by Presidential Decree, such as a business plan.

    (3) Where the Korea Communications Commission accepts the registration of value-added telecommunications business pursuant to paragraph (2), it may attach conditions necessary for the implementation of a plan under subparagraph 1 of the same paragraph thereto. (Inserted by Act nº 10656, May 19, 2011)

    (4) Where a common telecommunications business operator intends to operate the value-added telecommunications business, he/she shall be deemed to have reported thereon. (Amended by Act nº 10656, May 19, 2011)

    (5) Any person who has reported on value-added telecommunications business pursuant to the forepart of paragraph (1) and any person who has registered value-added telecommunications business pursuant to paragraph (2) shall commence his/her business within one year after he/she reports or registers such business. (Amended by Act nº 10656, May 19, 2011)

    (6) A report under the forepart of paragraph (1), requirements and procedures for registration under paragraph (2), and other necessary matters shall be prescribed by Presidential Decree. (Inserted by Act nº 10656, May 19, 2011)

    Article 22-2 (Disqualifications for Registration)

    Any individual or corporation, for whom three years have not passed from the date the registration thereof is cancelled pursuant to Article 27 (2), or a person who is a major stockholder (referring to an investor prescribed by Presidential Decree) of such corporation at the time of such cancellation shall not conduct registration under Article 22 (2).

    (Article Inserted by Act nº 10656, May 19, 2011)

    Article 23 (Modification of Registered or Reported Matters)

    Where any special category telecommunications business operator or any person who has reported on the value-added telecommunications business pursuant to the forepart of Article 22 (1) or any person who has registered value-added telecommunications business pursuant to paragraph (2) of the same Article intends to modify matters prescribed by Presidential Decree among registered or reported matters, he/she shall make a revised registration or a revised report (including cases of making a revised registration or a revised report through information and telecommunications networks) with the Korea Communications Commission, as prescribed by Presidential Decree. (Amended by Act nº 10656, May 19, 2011)

    Article 24 (Transfer, Acquisition. etc. of Business)

    Where any person transfers or acquires all or part of his/her special category telecommunications business or value-added telecommunications business, or a corporate special category telecommunications business operator or a corporate value-added telecommunications business operator (referring to a person who has reported value-added telecommunications business pursuant to the forepart of Article 22 (1), a person who has registered value-added telecommunications business pursuant to paragraph (2) of the same Article or a person deemed to have reported value-added telecommunications business pursuant to the latter part of paragraph (1) of the same Article or paragraph (4); hereinafter the same shall apply) is merged with another corporation or comes into an inheritance, any of the following persons shall report (including cases of reporting through information and telecommunications networks) to the Korea Communications Commission, in accordance with conditions and procedures prescribed by Presidential Decree: (Amended by Act nº 10656, May 19, 2011)

    1. A person who acquires the relevant business;

    2. A corporation which survived or has been newly established following the merger;

    3. A person who inherits the relevant business.

    Article 25 (Succession of Business)

    Where any person transfers or acquires the special category telelcommunications business or the value-added telecommunications business, a corporate special category telecommunications business operator or a corporate value-added telecommunications business operator merges with another corporation, or any person inherits the value-added telecommunications business, pursuant to Article 24, a person who falls under any of the following subparagraphs shall succeed to the status of the preceding special category telecommunications business operator or the value-added telecommunications business operator:

    1. A person who acquires the relevant business;

    2. A corporation which survived or has been newly established in the course of the merger;

    3. A person who inherits the relevant business.

    Article 26 (Suspension, Discontinuation, etc. of Business)

    (1) Where a special category telecommunications business operator or a value-added telecommunications business operator intends to fully or partially suspend or discontinue his/her business, he/she shall notify the users of the relevant telecommunications services of such suspension or discontinuation, and report (including cases of reporting through information and telecommunications networks) thereon to the Korea Communications Commission by not later than 30 days prior to the scheduled date of such suspension or discontinuation. In such cases, the duration of suspension of the business shall not exceed one year.

    (2) Where a corporate special category telecommunications business operator or a corporate value-added telecommunications business operator is dissolved for a reason other than a merger, the relevant liquidator (referring to the trustee in bankruptcy, when such corporate business operator is dissolved by bankruptcy) shall promptly report thereon (including cases of reporting through information and telecommunications networks) to the Korea Communications Commission.

    Article 27 (Cancellation of Business Registration, Order to Discontinue Business, etc.)

    (1)          Where a special category telecommunications business operator falls under any of the following subparagraphs, the Korea Communications Commission may fully or partially cancel his/her business registration, or issue an order to fully or partially suspend the business operation for up to one year: Provided, That if he/she falls under subparagraph 1, the Korea Communications Commission shall fully or partially cancel his/her business registration:

    1. Where he/she registers the business by fraudulent or other illegal means;

    2. Where he/she fails to satisfy the conditions under Article 21 (2);

    3. Where he/she fails to commence the business within one year from the date he/she has completed the business registration, in violation of Article 21 (4) or where he/she suspends the business operation for at least one year, in violation of the latter part of Article 26 (1);

    4. Where he/she fails to comply with an order under Article 52 (1) or a corrective order under Article 92 (1) without justifiable grounds.

    (2) Where a value-added telecommunications business operator falls under any of the following subparagraphs, the Korea Communications Commission may order him/her to discontinue all or part of his/her business (in cases of a special value-added telecommunication business operator, referring to the cancellation of all or part of registration) or to suspend all or part of his/her business operation for up to one year: Provided, That if he/she falls under subparagraph 1, the Korea Communications Commission shall order a partial or whole closure of the business: (Amended by Act nº 10656, May 19, 2011)

    1. Where he/she reports or registers such business by fraudulent or other illegal means;

    2. Where he/she fails to fulfill the conditions under Article 22 (3);

    3. Where he/she fails to commence the business within one year from the date he/she reports or registers such business, in violation of Article 22 (5) or where he/she suspends the business operation for at least one year, in violation of the latter part of Article 26 (1);

    4. Where he/she fails to comply with an order under Article 52 (1) or a corrective order under Article 92 (1) without justifiable grounds;

    5. Where he/she fails to execute an order to take corrective measures under Article 64 (4) of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.;

    6. Where a person who has been subjected to the disposition of a fine for negligence not less than three times pursuant to Article 142 (1) and (2) 3 of the Copyright Act is subjected to the disposition of a fine for negligence again, in whose case the Minister of Culture, Sports and Tourism requests such disposition through deliberation by the Korea Copyright Commission under Article 112 of the same Act.

    (3) Guidelines, procedures and other matters necessary for the dispositions under paragraph (1) or (2) shall be prescribed by Presidential Decree.

    CHAPTER III.- TELECOMMUNICATIONS SERVICES

    Article 28 (Reporting, etc. on Terms and Conditions of Use)

    (1) A common telecommunications business operator shall determine the service charges and the terms and conditions of use for each service type he/she intends to provide (hereinafter referred to as “terms and conditions of use“), and report thereon (including cases of reporting modified matters; hereafter the same shall apply in this Article) to the Korea Communications Commission.

    (2) Notwithstanding paragraph (1), in cases of common telecommunications services to be provided by a common telecommunications business operator who satisfies the standards prescribed by Presidential Decree, such as the scale of business and market share, the common telecommunications business operator shall obtain authorization (including revised authorization; hereafter the same shall apply in this Article) from the Korea Communications Commission: Provided, That if a common telecommunications business operator reduces the service charges which are stated in the terms and conditions of use already authorized, he/she shall report thereon to the Korea Communications Commission.

    (3) In cases under the main sentence of paragraph (2), the Korea Communications Commission shall authorize the terms and conditions of use, if they satisfy the following requirements:

    1. Telecommunications service charges shall be determined with reasonable consideration of the cost for supply, profits, classification of expenses and profits corresponding to each service, cost saving depending on the methods of service delivery, influence over fair competition environments, etc.;

    2. They shall not put users at a disadvantage in terms of matters concerning the responsibility of common telecommunications business operators and relevant users or cost-sharing methods for installation works of telecommunications facilities and other works;

    3. They shall not unfairly restrict the use of telecommunications line facilities by other telecommunications business operators or users;

    4. They shall not unfairly discriminate specific persons;

    5. They shall secure major telecommunications under Article 85, taking into consideration the efficient implementation of functions of the State.

    (4) Any person who intends to report on the terms and conditions of use of telecommunications service or obtain authorization therefor under paragraphs (1) and (2) shall submit to the Korea Communications Commission the materials stating the basis of the calculation of telecommunications service charges (in cases of any alteration, including a comparative table on matters before and after the alteration), including subscription expenses, basic rates, user’s fees, additional service charges, actual expenses, etc.

    (5) Necessary matters concerning the scope of and procedures for report or authorization, other than those under paragraphs (1) through (4), shall be prescribed by Presidential Decree.

    Article 29 (Reduction or Exemption of Fees)

    A common telecommunications business operator may reduce or exempt telecommunications service charges, as prescribed by Presidential Decree, to the extent necessary to sustain national security, disaster relief, social welfare, public interests, etc.

    Article 30 (Restrictions on Use by Third Parties)

    No person shall advocate a third party’s communications through telecommunications services provided by a telecommunications business operator or provide such services for a third party’s communications: Provided, That the same shall not apply in the following cases:

    1. Where it is required to ensure the prevention and rescue from disaster, traffic and communications, and the supply of electricity, and to maintain order in a national emergency situation;

    2. Where a person renders ancillary telecommunications services to clients while running his/her business other than the telecommunications business;

    3. Where a person is allowed to use telecommunications services on a trial basis for the purpose of developing and marketing telecommunications equipment and facilities, such as terminal devices, etc. which enable to use the telecommunications services;

    4. Where any user allows any third party to use telecommunications services to the extent that the latter does not use them repeatedly;

    5. Where it is necessary for the public interests or where the use of telecommunications services do not impede the business operations by a telecommunications business, as prescribed by Presidential Decree.

    Article 31 (Use of Transmission or Line Equipment and Facilities, etc.)

    (1) Any composite cable TV business operator, transmission network business operator, or relay cable broadcasting business operator under the Broadcasting Act may permit common telecommunications business operators to use his/her own transmission or line equipment and facilities or cable broadcasting equipment and facilities in a manner prescribed by Presidential Decree.

    (2) Where a common telecommunications business operator intends to provide value-added telecommunications services by using transmission or line equipment and facilities or cable broadcasting equipment and facilities owned by any composite cable TV business operator, transmission network business operator, or relay cable broadcasting business operator under the Broadcasting Act, he/she shall report thereon to the Korea Communications Commission pursuant to Article 22 (1).

    (3) Articles 35 through 37, and 39 through 55 shall apply mutatis mutandis to a permit to use transmission or line equipment and facilities or cable broadcasting equipment and facilities pursuant to paragraph (1).

    (4) Article 28 (2) through (7) of the Framework Act on Broadcasting Communications Development shall apply mutatis mutandis to the provision of services pursuant to paragraph (2).

    Article 32 (Protection of Users)

    (1) A telecommunications business operator shall promptly address the reasonable opinions or dissatisfactions raised by users with respect to telecommunications services. In such cases, if it is difficult to promptly address them, he/she shall notify the users of the reasons thereof and the schedule for treatment.

    (2) Compensation for losses incurred by the occurrence of reasons causing the opinions or dissatisfactions under paragraph (1) and by the delay in addressing them shall be governed by Article 33.

    (3) Where a telecommunications business operator who provides common telecommunications services intends to receive service charges from users in advance, prior to providing such telecommunications services, he/she shall purchase a guarantee insurance policy by which the person designated by the Korea Communications Commission is insured and which covers an amount calculated according to the guidelines prescribed by Presidential Decree within the total amount of advance service charges so as to compensate for losses suffered by users due to a failure to provide such telecommunications services: Provided, That a telecommunications business operator may choose not to purchase a guarantee insurance policy in any case prescribed by Presidential Decree taking into consideration the financial capability of the relevant telecommunications business operator, service charges, etc.

    (4) Any insured person who has been designated under paragraph (3) shall pay the amount of coverage provided under a guarantee insurance policy referred to in paragraph (3) to the users, etc. who fail to receive telecommunications services after pre-paying service charges.

    (5) Matters necessary for the purchase of guarantee insurance policies, renewal of guarantee insurance, procedures for paying insurance, etc. pursuant to paragraphs (3) and (4) shall be prescribed by Presidential Decree.

    Article 32-2 (Notification of Excess, etc. of Limits on Charges)

    (1) Where any telecommunications business operator who uses frequency allocated pursuant to the Radio Waves Act falls under any of the followings, he/she shall notify users of such fact:

    1. Where he/she exceeds the limits on a charge for each telecommunications service on which he/she agreed with a user at the beginning;

    2. Where a charge is imposed following the use of international telecommunications service, such as international telephone service.

    (2) Matters necessary for objects, methods, etc. of a notification under paragraph (1) shall be determined and announced by the Korea Communications Commission.

    (Article Inserted by Act nº 11201, Jan. 17, 2012)

    Article 33 (Compensation for Losses)

    A telecommunications business operator shall compensate for any losses suffered by a user when he/she has caused such losses in the course of providing telecommunications services: Provided, That if such loss results from a force majeure event or such user causes such losses on purpose or by gross negligence, the liability for compensation for the relevant losses shall be mitigated or exempted.

    CHAPTER IV.- PROMOTION OF COMPETITION IN TELECOMMUNICATIONS BUSINESS

    Article 34 (Promotion of Competition)

    (1) The Korea Communications Commission shall endeavor to establish an efficient competition system and to promote environments of fair competition in the telecommunications business.

    (2) The Korea Communications Commission shall appraise the conditions of competition in the common telecommunications business every year for the purpose of developing competition policies to establish an efficient competition system and to promote environments of fair competition in the telecommunications business under paragraph (1).

    (3) The detailed guidelines, procedures and methods for appraising competition conditions under paragraph (2) and other necessary matters shall be prescribed by Presidential Decree.

    Article 35 (Provision of Equipment and Facilities)

    (1) Where a telecommunications business operator requests a common telecommunications business operator or an authority that constructs, operates or manages roads, railroads, subways, water and sewage systems, electrical equipment, telecommunications line equipment and facilities, etc. (hereinafter referred to as “facility management authority“) to provide him/her with ducts, common utility conduits, poles, cables, stations, or other equipment (including telecommunications equipment and facilities; hereinafter the same shall apply) or facilities (hereinafter referred to as “equipment and facilities“), such common telecommunications business operator or such facility management authority may provide equipment and facilities by contract with him/her.

    (2) Any of the following common telecommunications business operators or facility management authorities shall provide equipment and facilities by contract, notwithstanding the provisions of paragraph (1): Provided, That this shall not apply in cases where a facility management authority plans to use such equipment and facilities;

    1. A common telecommunications business operator who possesses equipment and facilities indispensable for other telecommunications business operators to provide telecommunications services;

    2. Any of the following facility management authorities who possess equipment and facilities, such as ducts, common utility conduits, or poles:

    (a) Korea Highway Corporation established under the Korea Highway Corporation Act;

    (b) Korea Water Resources Corporation established under the Korea Water Resources Corporation Act;

    (c) Korea Electric Power Corporation established under the Korea Electric Power Corporation Act;

    (d) Korea Rail Network Authority established under the Korea Rail Network Authority Act;

    (e) A local public enterprise under the Local Public Enterprises Act;

    (f) A local government under the Local Autonomy Act;

    (g) A regional construction management administration under the Road Act;

    3. A common telecommunications business operator or facility management authority whose scale of the business, market share, etc. of common telecommunications services meet the standards prescribed by Presidential Decree.

    (3) The Korea Communications Commission shall establish and publicly announce the scope of equipment and facilities under paragraphs (1) and (2) and the guidelines for the conditions, procedures, methods and calculation of prices for providing such equipment and facilities. In such cases, the scope of equipment and facilities to be provided under paragraph (2) shall be determined in consideration of the demand for equipment and facilities by common telecommunications business operators or facility management authorities falling under any subparagraph of the same paragraph.

    (4) A telecommunications business operator who has been provided with equipment and facilities may install the apparatus enhancing the efficiency of the relevant equipment and facilities to the extent necessary to provide telecommunications services.

    (5) The Korea Communications Commission may, as prescribed by Presidential Decree, order a telecommunications business operator or facility management authority to submit data concerning equipment and facilities, so as to efficiently utilize and manage equipment and facilities. In such cases, the telecommunications business operator or facility management authority shall comply with such order unless justifiable grounds exist.

    (6) The Korea Communications Commission may designate a specialized institution to provide equipment and facilities under paragraphs (1) and (2).

    (7) Matters necessary for the designation of a specialized institution under paragraph (6) and the methods of business operations shall be determined and publicly announced by the Korea Communications Commission.

    Article 36 (Joint Use of Subscriber Lines)

    (1) Where a telecommunications business operator determined and publicly announced by the Korea Communications Commission requests a common telecommunications business operator to jointly use the lines installed in the section from modems directly connected with the users to the users (hereafter referred to as “subscriber lines” in this Article), the common telecommunications business operator shall permit the joint use of subscriber lines.

    (2) The Korea Communications Commission shall establish and publicly announce the scope of, and the guidelines for the conditions, procedures, methods and calculation of prices for the joint use of subscriber lines under paragraph (1).

    Article 37 (Joint Utilization of Radio Communications Facilities)

    (1) Where a common telecommunications business operator receives a request for joint utilization of radio communications facilities (hereinafter referred to as “joint utilization“) from other common telecommunications business operators, he/she may permit joint utilization by contract. In such cases, the prices for joint utilization by common telecommunications business operators which are determined and publicly announced by the Korea Communications Commission shall be computed and adjusted in a fair and reasonable manner.

    (2) Where a common telecommunications business operator determined and publicly announced by the Korea Communications Commission receives a request for joint utilization of radio communications facilities from another common telecommunications business operator determined and publicly announced by the Korea Communications Commission, he/she shall permit the joint utilization by contract, notwithstanding paragraph (1), in order to enhance the efficiency of the telecommunications business and protect users.

    (3) The guidelines for calculating the prices for the joint utilization under the latter part of paragraph (1), procedures and methods for paying such prices, and the scope of, and the guidelines for the conditions, procedures, methods and calculation of prices for the joint utilization under paragraph (2) shall be determined and publicly announced by the Korea Communications Commission.

    Article 38 (Wholesale Provision of Telecommunications Services)

    (1) Where a common telecommunications business operator receives a request from another telecommunications business operator, he/she may reach agreements with such telecommunications business operators to provide his/her telecommunications services to them or permit them to fully or partially use telecommunications equipment and facilities required for the provision of telecommunications services (hereinafter referred to as “wholesale services“) so as to enable them to provide his/her telecommunications services to users (hereinafter referred to as “resale“).

    (2) For the purpose of the promotion of competition in the telecommunications business, the Korea Communications Commission may designate and publicly announce telecommunications services (hereinafter referred to as “mandatory wholesale services“) to be provided by a common telecommunications business operator who shall provide wholesale services by contract (hereinafter referred to as “mandatory wholesale service provider“), upon receipt of a request from other telecommunications business operators who intend to provide resale telecommunications services. In such cases, mandatory wholesale services to be provided by a mandatory wholesale service provider shall be designated among telecommunications services provided by a common telecommunications business operator who satisfies the standards determined by Presidential Decree, such as the scale of the business and market share.

    (3) Where the Korea Communications Commission deems, as a result of the annual assessment of competition in communications markets, that the purposes of wholesale telecommunications services are achieved by vitalizing the competition in the telecommunications business or mandatory wholesale services fail to meet the standards for designation, it may revoke the designation of mandatory wholesale services provided by a mandatory wholesale service provider.

    (4) The Korea Communications Commission shall determine and publicly announce the guidelines for the conditions, procedures, methods and calculation of prices for providing wholesale services to be observed by a mandatory wholesale service provider when reaching an agreement for the provision of mandatory wholesale services. In such cases, in principle, the prices for providing wholesale services shall be calculated by subtracting avoidable costs (referring to the relevant costs that can be avoided if a common telecommunications business operator does not directly provide telecommunications services to users) from the resale prices for mandatory wholesale services.

    (5) A common telecommunications business operator shall, upon receipt of a request for wholesale services from other telecommunications business operators, reach an agreement for such wholesale services within 90 days, unless justifiable grounds exist, and the telecommunications business operator who has reached an agreement for wholesale services with a common telecommunications business operator shall report to the Korea Communications Commission within 30 days after the date of such agreement, as prescribed by Presidential Decree. The same shall apply to the amendment to or revocation of an agreement for wholesale services.

    (6) An agreement under paragraph (5) shall comply with the guidelines publicly announced by the Korea Communications Commission pursuant to paragraph (4).

    Article 39 (Interconnection)

    (1) Where a telecommunications business operator receives a request for interconnection of telecommunications equipment and facilities from other telecommunications business operators, he/she may permit the interconnection by contract.

    (2) The Korea Communications Commission shall determine and publicly announce the scope of, and the guidelines for the conditions, procedures, methods and calculation of prices for interconnections of telecommunications equipment and facilities under paragraph (1).

    (3) Notwithstanding paragraphs (1) and (2), any of the following common telecommunications business operators shall permit the interconnection by contract, upon receipt of a request under paragraph (1):

    1. The common telecommunications business operator who possesses equipment and facilities indispensable for other telecommunications business operators to provide telecommunications services;

    2. The common telecommunications business operator whose scale of the business, market share, etc. of common telecommunications services meet the standards determined by Presidential Decree.

    Article 40 (Prices of Interconnection)

    (1) Prices for interconnection shall be calculated in a fair and reasonable manner and adjusted by mutual agreements, and detailed guidelines, procedures and methods for calculating prices for interconnection shall be governed by the guidelines under Article 39 (2).

    (2) Where a telecommunications business operator experiences any disadvantage in a method of interconnection, connection quality, the provision of information required for interconnection, etc. for reasons not attributable to him/her, he/she may pay the prices for interconnection reduced according to the guidelines under Article 39 (2).

    Article 41 (Joint Use, etc. of Telecommunications Equipment and Facilities)

    (1) Where a common telecommunications business operator receives a request for access to or joint use of his/her own telecommunications equipment and facilities, such as ducts, cables, poles or stations, from other telecommunications business operators who intend to establish or operate equipment and facilities required for interconnection, he/she may enter reach agreement with them to permit such access or joint use.

    (2) The Korea Communications Commission shall determine and publicly announce the scope of and the guidelines for conditions, procedures, methods and calculation of prices for access to or joint use of telecommunications equipment or facilities under paragraph (1).

    (3) Notwithstanding the provisions of paragraph (1), any of the following common telecommunications business operators shall permit access to or joint use of the telecommunications equipment or facilities under paragraph (1) by contract, upon receipt of a request under paragraph (1):

    1. A common telecommunications business operator who possesses equipment and facilities indispensable for another telecommunications business operator to provide telecommunications services;

    2. A common telecommunications business operator whose business scale, market share, etc. of common telecommunications services meet the standards prescribed by Presidential Decree.

    Article 42 (Provision of Information)

    (1) Where a telecommunications business operator requests a common telecommunications business operator to provide technical information or users’ personal information needed for the provision of equipment and facilities, wholesale services, interconnection services, joint-use services, billing and collections, and telephone number information services, the common telecommunications business operator may provide such information by contract with the telecommunications business operator.

    (2) The Korea Communications Commission shall determine and publicly announce the scope of and the guidelines for conditions, procedures, methods and calculation of prices for providing information under paragraph (1).

    (3) Notwithstanding the provisions of paragraph (1), any of the following common telecommunications business operators shall provide information requested by contract, upon receipt of a request under paragraph (1):

    1. A common telecommunications business operator who possesses equipment and facilities indispensable for other telecommunications business operator to provide telecommunications services;

    2. A common telecommunications business operator whose business scale, market share, etc. of common telecommunications services meet the standards prescribed by Presidential Decree.

    (4) A common telecommunications business operator under paragraph (3) shall determine the technical standards to be satisfied by other telecommunications business operator or users who intend to connect their terminal devices, etc. with his/her own telecommunications equipment and facilities, the requirements for the provision and use, and other standards required for the creation of environments for fair competition, and publicly announce them by obtaining approval from the Korea Communications Commission.

    Article 43 (Prohibition of Misuse of Information)

    (1) No telecommunications business operator shall disclose any user’s personal information that he/she has obtained in the course of providing his/her own services, telecommunications equipment and facilities, wholesale services, interconnection services or joint-use services: Provided, That the same shall not apply in cases where a telecommunications business operator discloses such information with the user’s consent or under a lawful procedure pursuant to any Act.

    (2) A telecommunications business operator shall use the technical information or user’s personal information obtained under Article 42 (1) and (3) only for its original purposes, and shall not misuse such information or provide such information to a third party.

    Article 44 (Reporting, etc. on Agreement on Interconnection, etc.)

    (1) Where a common telecommunications business operator or a facility management authority has received a request for the provision of equipment and facilities, joint utilization, interconnection or joint-use services or provision of information from other telecommunications business operators, he/she shall reach an agreement under Article 35 (1) and (2), the former part of Article 37 (1), Article 39 (1), 41 (1) or 42 (1) within 90 days unless special grounds exist and report it to the Korea Communications Commission within 30 days after the date of such agreement, as prescribed by Presidential Decree. The same shall apply to the amendment to or revocation of an agreement.

    (2) Notwithstanding paragraph (1), if a common telecommunications business operator under the latter part of paragraph (1) and paragraph (2) of Article 37, and Articles 39 (3), 41 (3) or 42 (3) is a party to an agreement and requests another common telecommunications business operator to reach such agreement, the common telecommunications business operator who has received the request shall enter into the agreement within 90 days unless special grounds exist and apply for authorization to the Korea Communications Commission within 30 days after the date of agreement as prescribed by Presidential Decree, and disclose the details of such agreement within 30 days after the date of authorization. The same shall apply to the amendment to or revocation of an agreement.

    (3) Agreements under paragraphs (1) and (2) shall comply with the guidelines publicly announced by the Korea Communications Commission pursuant to Articles 35 (3), 37 (3), 39 (2), 41 (2), or 42 (2).

    (4) Where it is necessary to supplement an application for authorization under paragraph (2), the Korea Communications Commission may issue an order for supplementation by specifying a time limit for supplementation.

    (5) Agreements under Articles 41 (1) and 42 (1) may be included in agreements under Article 39 (1).

    Article 45 (Ruling by the Korea Communications Commission)

    (1) A telecommunications business operator or user may apply for a ruling on the following matters to the Korea Communications Commission, when the parties concerned have failed to reach an agreement thereon or it is impossible to reach an agreement thereon:

    1. Compensation for losses under Article 33;

    2. Conclusion of an agreement within 90 days on the provision of equipment and facilities, joint utilization, wholesale services, interconnection or joint-use services, provision of information, etc.;

    3. Implementation of an agreement on the provision of equipment and facilities, joint utilization, wholesale services, interconnection or joint-use services, provision of information, etc. or compensation for losses rising from the implementation of such agreement;

    4. Other disputes related to the telecommunications business or subject matters of the ruling by the Korea Communications Commission under other Acts.

    (2) The Korea Communications Commission shall, upon receipt of an application for a ruling under paragraph (1), give notice thereof to the other party and provide an opportunity to state his/her opinion within a specified period: Provided, That this shall not apply in cases where the party concerned fails to state his/her opinion without any justifiable ground.

    (3) The Korea Communications Commission shall make a ruling within 90 days from the date of receipt of the application for a ruling: Provided, That if it fails to make a ruling within such period due to inevitable circumstances, the period may be extended only once for up to 90 days following a resolution passed by the Korea Communications Commission.

    (4) Where one of the parties files a lawsuit during the ruling procedures, the Korea Communications Commission shall suspend such procedures and give notice thereof to the other party. The same shall apply in cases where it is confirmed that a lawsuit has been filed before the application for a ruling.

    (5) Where the Korea Communications Commission makes a ruling on the matters under paragraph (1), it shall promptly serve the ruling documents on the parties concerned.

    (6) Where no lawsuit is filed over the dispute between business operators or between a business operator and a user within 60 days after the date the certified transcripts of the ruling documents of the Korea Communications Commission are served on the business operator or user who is a party to the ruling or the lawsuit over such dispute is withdrawn or both parties clearly express their consent for the ruling to the Korea Communications Commission, both parties shall be deemed to have reached an agreement with the same effect as the ruling.

    Article 46 (Referral of Disputes)

    The Korea Communications Commission may establish a dispute settlement panel on a case-by-case basis and refer disputes to the relevant dispute settlement panel if it deems it appropriate or necessary to make a ruling on the matters under Article 45 (1).

    Article 47 (Request for Appearance, Hearing of Opinions, etc.)

    Where the Korea Communications Commission deems it necessary to deal with ruling cases, it may take any of the following measures upon receipt of an application by the party concerned or ex officio:

    1. Requests for appearance by or hearing of opinions from the party concerned or a witness;

    2. Requests for appraisal by an appraiser;

    3. Requests for submission of documents or articles related to disputes and keeping documents or articles submitted in custody.

    Article 48 (Management Plan for Telecommunications Numbers, etc.)

    (1) The Korea Communications Commission shall develop and implement management plans for telecommunications numbers in order to efficiently provide telecommunications services, to promote user convenience and to create environments for fair competition among telecommunications business operators.

    (2) Where the Korea Communications Commission has developed the plans under paragraph (1), it shall publicly announce them. The same shall also apply to an amendment to the developed plan.

    (3) Any telecommunications business operator shall comply with the matters publicly announced under paragraph (2).

    Article 49 (Settlement of Accounts)

    (1) Any common telecommunications business operator shall complete settlement of accounts as prescribed by Presidential Decree, prepare a business report for the preceding year and submit it to the Korea Communications Commission by not later than three months after the end of each fiscal year, and retain the related books and source documents.

    (2) Where the Korea Communications Commission intends to determine the matters concerning settlement of accounts under paragraph (1), it shall first consult with the Minister of Strategy and Finance.

    (3) The Korea Communications Commission may verify the details of any business report submitted by a common telecommunications business operator in accordance with paragraph (1).

    (4) If it is necessary to conduct the verification referred to in paragraph (3), the Korea Communications Commission may order the relevant common telecommunications business operator to submit related material or conduct an inspection necessary to ascertain the facts.

    (5) Where the Korea Communications Commission intends to conduct an inspection pursuant to paragraph (4), it shall notify the relevant common telecommunications business operator of the inspection plan, including the period for and reasons and details of the inspection by not later than seven days before such inspection.

    (6) Any person who conducts an inspection pursuant to paragraph (4) shall present a certificate indicating his/her authority to the persons concerned, and deliver thereto a document stating his/her name, the period and purpose of visit, etc. at the time of his/her first visit.

    Article 50 (Prohibited Acts)

    (1)          No telecommunications business operator may commit any of the following acts (hereinafter referred to as “prohibited acts“) which undermine or are feared to undermine fair competition or users’ interests, or allow other telecommunications business operators or third parties to commit such acts:

    1. Acts which place unfair or discriminative conditions or restrictions on the provision of equipment and facilities, joint utilization, interconnection or joint-use services, wholesale services, provision of information, etc.;

    2. Acts which unfairly refuse to conclude an agreement on the provision of equipment and facilities, joint utilization, interconnection or joint-use services, wholesale services, provision of information, etc. or failing to implement a concluded agreement without justifiable grounds;

    3. Acts which misuse the information of other telecommunications business operators that he/she has obtained in the course of the provision of equipment and facilities, joint utilization, interconnection or joint-use services, wholesale services, provision of information, etc., for his/her business operations;

    4. Acts which compute telecommunications service charges or the prices for the provision of equipment and facilities, joint utilization, interconnection or joint-use services, wholesale services, provision of information, etc., by unfairly itemizing the expenses or revenues;

    5. Acts which provide telecommunications services in a manner different from the terms and conditions of use (limited to the terms and conditions of use reported or authorized under Article 28 (1) and (2)), or in a manner which substantially undermines telecommunications users’ interests;

    6. Acts which determine that the prices for the provision of equipment and facilities, joint utilization, interconnection or joint-use services, wholesale services, provision of information, etc. which are unfairly higher than the supply prices;

    7. Acts which refuse or restrict appropriate profit sharing when trading digital content through telecommunications services using the frequencies allocated under the Radio Waves Act.

    (2) Where the provisions of Articles 52 and 53 apply to the acts under paragraph (1) 5 committed by a person who acts for a telecommunications business operator to conclude contracts (or modify the terms of concluded contracts) with users under an agreement with the telecommunications business operator, such acts shall be deemed to have been committed by the telecommunications business operator: Provided, That the same shall not apply in cases where the telecommunications business operator has paid considerable attention in order to prevent such acts.

    (3) Matters necessary for categories of and standards for the acts prohibited under paragraph (1) shall be prescribed by Presidential Decree.

    Article 51 (Fact-Finding Investigations, etc.)

    (1) Where the Korea Communications Commission is notified or become aware that any act has been committed in violation of Article 50 (1), it may order the public officials under its control to conduct a fact-finding investigation necessary for the verification thereon.

    (2) Ifthe Korea Communications Commission deems a fact-finding investigation under paragraph (1) is necessary, it may order the public official under its control to visit the offices or places of business of a telecommunications business operator or places of business of a person entrusted with the affairs of a telecommunications business operator (if the affairs entrusted by a telecommunications business operator are related to the provisions of Article 50, limited only to such affairs; hereafter the same shall apply in this Article) for an investigation on books, documents, other data or articles.

    (3) Where the Korea Communications Commission intends to conduct a fact-finding investigation under paragraph (1), it shall notify the relevant telecommunications business operator of an investigation plan, including a period for and reasons and details of the investigation by not later than seven days before such investigation: Provided, That this shall not apply in cases of emergency or in cases where deemed that any prior notification might cause the destruction of any evidence to make it impossible to attain the purposes of such investigation.

    (4) A person who visits the offices or places of business of a telecommunications business operator or the places of business of a person entrusted with the affairs of a telecommunications business operator to conduct a fact-finding investigation under paragraph (2) shall present a certificate indicating his/her authority, and allow the persons interested in the relevant offices or places of business to participate in such fact-finding investigation.

    (5) Any public official in charge of a fact-finding investigation under paragraph (2) may order a telecommunications business operator or a person entrusted with the affairs of a telecommunications business operator to submit necessary data or articles, and temporarily keep such data or articles in his/her custody if the destruction of evidence, such as the disposal, concealment, or replacement of such data or articles, is anticipated.

    (6) The Korea Communications Commission shall promptly return the data or articles kept in custody if they fall under any of the following subparagraphs:

    1. Where it is deemed upon examination that they are not associated with the relevant investigation;

    2. Where it is no longer necessary to keep them in custody because the purposes of the relevant investigation are achieved.

    Article 52 (Measures on Prohibited Acts)

    (1) The Korea Communications Commission may order a telecommunications business operator to take any of the following measures if it deems that a violation of Article 50 (1) has been committed:

    1. Separation of the supply system of telecommunications services;

    2. Amendment to internal accounting regulations, etc. concerning telecommunications services;

    3. Disclosure of information concerning telecommunications services;

    4. Conclusion, implementation or change of terms of an agreement between telecommunications business operators;

    5. Amendment to the terms and conditions of use and the articles of incorporation of telecommunications business operators;

    6. Suspension of prohibited acts;

    7. Public announcement of a fact that a corrective order is issued due to prohibited acts;

    8. Measures necessary for correcting the violation caused by prohibited acts, such as the removal of telecommunications equipment and facilities;

    9. Business process improvement for telecommunications services;

    10. Prohibition on the recruitment of new users for up to three months (limited to the cases where a violation is repeated at least three times even though the measures under subparagraphs 1 through 9 have been taken on such violation or where it is clearly recognized that such measures are not sufficient to prevent damage to users);

    11. Other matters prescribed by Presidential Decree as may be necessary to take the measures referred to in subparagraphs 1 through 10.

    (2) Telecommunications business operators shall comply with an order issued by the Korea Communications Commission under paragraph (1) within a period specified by Presidential Decree: Provided, That the Korea Communications Commission may extend the relevant period only once, if it is deemed that the telecommunications business operator is unable to comply with the order within the specified period due to natural disasters and other extenuating circumstances.

    (3) The Korea Communications Commission shall notify the parties concerned of the details of measures and provide them with an opportunity to state their opinions within a prescribed period before it takes measures under paragraph (1), and where deemed necessary, it may request an interested party or witness to appear and state his/her opinions or request an appraiser to conduct appraisal: Provided, That this shall not apply in cases where the parties concerned fail to state their opinions without justifiable grounds.

    (4) The Korea Communications Commission shall not take any measures under paragraph (1) or impose penalty surcharges under Article 53 on a violation of Article 50 (1) if five years have passed after such violation: Provided, That this shall not apply where any measure already taken or the imposition of a penalty surcharge is revoked by a court and a new measure is to be taken based on such decision.

    Article 53 (Imposition, etc. of Penalty Surcharge on Prohibited Acts)

    (1) Where any act is committed in violation of Article 50 (1), the Korea Communications Commission may impose a penalty surcharge on the relevant telecommunications business operator in an amount not exceeding 3/100 of his/her profit prescribed by Presidential Decree. In such cases, if the telecommunications business operator refuses to submit data necessary for the calculation of his/her profit or submits false data, such profit may be estimated based on financial statements and other accounting materials of the relevant telecommunications business operator and the business operators providing the same or similar type of services, and the materials concerning the current status of business operations, such as the number of subscribers, service charges, etc.: Provided, That where there is no profit or it is difficult to calculate the profit as prescribed by Presidential Decree, a penalty surcharge may be imposed in an amount not exceeding one billion won.

    (2) Where a common telecommunications business operator who shall submit a business report under Article 49 falls under any of the following subparagraphs, the Korea Communications Commission may impose a penalty surcharge on the relevant common telecommunications business operator in an amount not exceeding 3/100 of his/her profit prescribed by Presidential Decree:

    1. Where he/she fails to submit a business report under Article 49 or to comply with an order to submit relevant materials;

    2. Where he/she fails to include important matters in a business report under Article 49 or includes false matters;

    3. Where he/she fails to perform accounting, in violation of Article 49 (1) or to retain books or source documents.

    (3) The Korea Communications Commission shall imposes a penalty surcharge under paragraph (1) or (2) in consideration of the following matters:

    1. Details and severity of the violation;

    2. Duration and frequency of the violation;

    3. Scale of the gains from the violation;

    4. Profits related to the performance of prohibited acts or the violation of accounting rules by a telecommunications business operator.

    (4) A penalty surcharge under paragraph (1) or (2) shall be determined in consideration of paragraph (3) and the detailed guidelines and procedures for determination shall be prescribed by Presidential Decree.

    (5) Where a person liable to pay a penalty surcharge under paragraph (1) or (2) fails to do so by the payment deadline, the Korea Communications Commission shall collect 6/100 per annum of the penalty surcharge in arrears as an additional due from the day following the expiry of such payment deadline.

    (6) Where a person liable to pay a penalty surcharge under paragraph (1) or (2) fails to do so by the payment deadline, the Korea Communications Commission shall demand him/her to pay it within a prescribed period, and if he/she fails to pay the penalty surcharge and the additional due under paragraph (5) within the prescribed period, it shall collect them in the same manner as dispositions on default of national taxes.

    (7) Where the penalty surcharge imposed pursuant to paragraph (1) or (2) is refunded by a court, etc., additional dues shall be paid at a rate of 6/100 per annum for a period from the date when the penalty surcharge is paid to the date of such refund.

    Article 54 (Relations with Other Acts)

    Where a telecommunications business operator is subject to a measure under Article 52 or a penalty surcharge under Article 53 on the grounds that he/she violates Article 50 (1), the telecommunications business operator shall not be subject to a corrective measure or penalty surcharge under the Monopoly Regulation and Fair Trade Act on the same grounds.

    Article 55 (Compensation for Losses)

    Where a measure has been taken under Article 52 (1), a person who suffers losses from a prohibited act may claim compensation for losses against the telecommunications business operator who has committed such prohibited act, and the relevant telecommunications business operator may not be exempt from liability to compensate for losses unless he/she is able to prove that there was no malicious intention or negligence.

    Article 56 (Quality Improvement, etc. of Telecommunications Services)

    (1) A telecommunications business operator shall endeavor to improve the quality of telecommunications services he/she provides.

    (2) The Korea Communications Commission shall develop policy measures, such as an evaluation of quality of telecommunications services, in order to improve the quality of telecommunications services and to enhance the conveniences of users.

    (3) The Korea Communications Commission may order a telecommunications business operator to submit data necessary for the evaluation of quality of telecommunications services, etc. under paragraph (2).

    Article 57 (Preselection Systems)

    (1) The Korea Communications Commission shall implement the systems in which users may select in advance the telecommunications business operator who is to provide telecommunications services thereto (hereinafter referred to as “preselection systems“). In such cases, the telecommunications services shall refer to telecommunications services determined by Presidential Decree among the same telecommunications services provided by multiple telecommunications business operators.

    (2) A telecommunications business operator shall not force users to select a specified telecommunications business operator in advance, or recommend or induce by unlawful means.

    (3) The Korea Communications Commission may designate a specialized institute in charge of the affairs concerning registration of preselection or modification thereto (hereinafter referred to as “preselection registration center“) in order to efficiently and neutrally implement the preselection systems.

    (4) Matters necessary for the implementation of the preselection systems, the designation of the preselection registration center and the method of business operations, etc. shall be determined and publicly announced by the Korea Communications Commission.

    Article 58 (Telephone Number Portability)

    (1) The Korea Communications Commission may establish and implement a plan for telephone number portability (hereafter referred to in this Article as “plan for number portability“) to enable users to retain their telephone numbers when changing from one telecommunications business operator to another.

    (2) A plan for number portability shall include the following matters:

    1. Kinds of services subject to telephone number portability;

    2. Time to start telephone number portability for each service;

    3. Matters concerning sharing of expenses incurred in the implementation of a plan for number portability among telecommunications business operators.

    (3) The Korea Communications Commission may order the relevant telecommunications business operator to take measures necessary for the implementation of a plan for number portability.

    (4) The Korea Communications Commission may designate a specialized institution in charge of registration of number portability and modification thereto (hereinafter referred to as “number portability management institution“) to efficiently and neutrally implement telephone number portability.

    (5) Matters concerning the implementation of telephone number portability and matters necessary for the designation of a number portability management institution and the operation of its affairs shall be determined and publicly announced by the Korea Communications Commission.

    Article 59 (Limitation on Mutual Holding of Stocks)

    (1) Where a common telecommunications business operator under Article 39 (3) 1 or 2 (including a person in a special relation with him/her) holds in excess of 5/100 of the total number of voting stocks issued by another common telecommunications business operator, he/she shall not be allowed to exercise any voting rights in excess of the relevant ceiling.

    (2) Paragraph (1) shall not apply to holding relationship between a common telecommunications business operator under Article 39 (3) 1 or 2 and a common telecommunications business operator established by the said common telecommunications business operator by becoming the largest stockholder.

    Article 60 (Provision of Number Information Services)

    (1) A telecommunications business operator shall provide a service to inform the general public of the telephone numbers of users by means of voice, booklets or the Internet, etc. (hereinafter referred to as “number information service“) by obtaining a consent from users: Provided, That the same shall not apply to minor business determined and publicly announced by the Korea Communications Commission in consideration of the numbers of users, profits, etc.

    (2) The Korea Communications Commission may place restrictions on the provision of number information services to the extent necessary to protect personal information.

    (3) Matters necessary for the provision of number information services may be prescribed by Presidential Decree.

    CHAPTER V.- TELECOMMUNICATIONS EQUIPMENT AND FACILITIES

    SECTION 1.- Commercial Telecommunications Equipment and Facilities

    Article 61 (Maintainment and Repair of Telecommunications Equipment and Facilities)

    A telecommunications business operator shall maintain and repair his/her own telecommunications equipment and facilities in compliance with the technical standards prescribed by Presidential Decree so as to reliably provide his/her telecommunications services.

    Article 62 (Reporting and Approval on Installation of Telecommunications Equipment and Facilities)

    (1) Where a common telecommunications business operator intends to install or change important telecommunications equipment and facilities, he/she shall submit a prior report to the Korea Communications Commission, as prescribed by Presidential Decree: Provided, That in terms of telecommunications equipment and facilities installed for the first time thanks to a new telecommunications technology, the operator shall obtain approval from the Korea Communications Commission, as prescribed by Presidential Decree.

    (2) Scope of important telecommunications equipment and facilities under paragraph (1) shall be prescribed and publicly announced by the Korea Communications Commission.

    Article 63 ( Joint Installation of Telecommunications Equipment and Facilities)

    (1) A common telecommunications business operator may install and use telecommunications equipment and facilities jointly with other common telecommunications business operators through consultation thereon with them.

    (2) Where common telecommunications business operators have consultation under paragraph (1), the Korea Communications Commission may conduct researches on necessary data and provide them to common telecommunications business operators, as prescribed by Presidential Decree.

    (3) The Korea Communications Commission may request an institution specialized in telecommunications to conduct researches under paragraph (2) as prescribed by Presidential Decree, so as to efficiently conduct the relevant researches.

    (4) In any case described in the following subparagraphs, the Korea Communications Commission may recommend a common telecommunications business operator under paragraph (1) to jointly install telecommunications equipment and facilities, as prescribed by Presidential Decree:

    1. Where consultation under paragraph (1) fails to lead to agreement, and the relevant common telecommunications business operator makes a request;

    2. Where it is deemed necessary to promote public interests.

    (5) Where it is necessary for a common telecommunications business operator to use land, buildings, etc. owned by the State, local governments, public institutions under the Act on the Management of Public Institutions (hereafter referred to as “public institutions” in this Article) or other common telecommunications business operators for the joint installation of telecommunications equipment and facilities, and consultation fails to lead to agreement on the use of such land, buildings, etc., the common telecommunications business operator may request the Korea Communications Commission to provide cooperation for the use of the relevant land, buildings, etc.

    (6) Where the Korea Communications Commission receives a request for cooperation under paragraph (5), it may request the State agencies, local governments, the heads of public institutions, or other common telecommunications business operators to respond to the consultation on the use of the relevant land, buildings, etc. with the common telecommunications business operator who submits a request for cooperation under paragraph (5). In such cases, the State agencies, local governments, the heads of public institutions, or other common telecommunications business operators shall respond to the consultation with the common telecommunications business operator unless justifiable grounds exist.

    SECTION 2.- Private Telecommunications Equipment and Facilities

    Article 64 (Installation of Private Telecommunications Equipment and Facilities)

    (1) Any person who intends to install private telecommunications equipment and facilities shall report to the Korea Communications Commission, as prescribed by Presidential Decree. The same shall apply in cases where he/she intends to change any important matter prescribed by Presidential Decree, among the reported matters.

    (2) Notwithstanding paragraph (1), other Acts shall apply to private wireless telecommunications equipment and facilities and military telecommunications equipment and facilities, if otherwise prescribed by such other Acts.

    (3) Where a person who has reported on the installation of private telecommunications equipment and facilities or reported on the change thereof pursuant to paragraph (1) completes the installation works or installation change works, he/she shall obtain prior confirmation from the Korea Communications Commission, as prescribed by Presidential Decree.

    (4) Notwithstanding paragraph (1), private telecommunications equipment and facilities prescribed by Presidential Decree may be installed without reporting.

    Article 65 (Restrictions on Use for other Purposes)

    (1) No person who installs private telecommunications equipment and facilities shall advocate a third party’s communications through such equipment and facilities or operate such equipment and facilities not in accordance with the purposes of installation: Provided, That this shall not apply in cases where he/she uses them for any of the following purposes to the extent permitted by other Acts or to the extent that does not impede the purposes of installation:

    1. Cases of allowing a policeman or a person engaged in disaster relief to use private telecommunications equipment and facilities for the maintenance of public order or for emergency disaster relief;

    2. Cases of using private telecommunications equipment and facilities between a person who installs such equipment and facilities and a person in a special business relationship with him/her, as publicly announced by the Korea Communications Commission.

    (2) A person who has installed private telecommunications equipment and facilities may provide his/her own telecommunications equipment and facilities, such as ducts or cables, to common telecommunications business operators, as prescribed by Presidential Decree.

    (3) Articles 35, 44 (excluding paragraph (5)), 45 through 47 shall apply mutatis mutandis to the provision of equipment and facilities under paragraph (2).

    Article 66 (Procurement of Communications in Cases of Emergency)

    (1) The Korea Communications Commission may order a person who has installed private telecommunications equipment and facilities to carry out the telecommunications business or other important communications business or to connect his/her telecommunications equipment and facilities with other telecommunications equipment and facilities, at the time of war, an upheaval, natural disaster or any national emergency equivalent thereto or if an outbreak of such emergency is highly apprehended. In such cases, the provisions of Articles 28 through 55 shall apply mutatis mutandis.

    (2) If he Korea Communications Commission deems necessary, he/she may require a common telecommunications business operator to carry out the business under paragraph (1).

    (3) In cases under paragraph (1), the expenses incurred in carrying out the business and connecting equipment and facilities shall be reimbursed by the Government: Provided, That where private telecommunications equipment and facilities are used for telecommunications services, the expenses incurred therein shall be reimbursed by the common telecommunications business operator who uses such equipment and facilities.

    Article 67 (Corrective Order, etc. Issued to Private Telecommunications Equipment and Facilities Installers)

    (1) Where a person who has installed private telecommunications equipment and facilities violates this Act or any order under this Act, the Korea Communications Commission may order him/her to take a corrective measure within a prescribed period.

    (2) Where a person who has installed private telecommunications equipment and facilities falls under any of the following subparagraphs, the Korea Communications Commission may order him/her to suspend the use of such equipment and facilities for up to one year:

    1. Where he/she fails to comply with the corrective order under paragraph (1);

    2. Where he/she uses private telecommunications equipment and facilities without confirmation in violation of Article 64 (3);

    3. Where he/she advocates a third party’s communications or operates private telecommunications equipment and facilities not in accordance with the purpose of installation in violation of Article 65 (1).

    (3) Where it is deemed that private telecommunications equipment and facilities are feared to impede a third party’s telecommunications or to harm a third party’s telecommunications equipment and facilities, the Korea Communications Commission may order the person who has installed such private telecommunications equipment and facilities to suspend the use of his/her equipment and facilities, to reform or repair them, or to take other necessary measures.

    SECTION 3.- Integrated Management, etc. of Telecommunications Equipment and Facilities

    Article 68 (Installation of Conduits, Ducts, etc.)

    (1) Any person who installs or constructs any of the following facilities (hereinafter referred to as “facility installer“) shall consider the opinions of a common telecommunications business operator on the installation of common utility conduits, ducts, etc. that can carry telecommunications equipment and facilities and reflect them on the installation or construction of such facilities: Provided, That this shall not apply in cases where he/she fails to reflect the opinions of the common telecommunications business operator due to any extenuating circumstance:

    1. Roads under Article 2 (1) 1 of the Road Act;

    2. Railroads under subparagraph 1 of Article 2 of the Railroad Enterprise Act;

    3. Urban railroads under subparagraph 1 of Article 3 of the Urban Railroad Act;

    4. Industrial complexes under subparagraph 5 of Article 2 of the Industrial Sites and Development Act;

    5. Free trade zones under subparagraph 1 of Article 2 of the Act on Designation and Management of Free Trade Zones;

    6. Airport zones under subparagraph 9 of Article 2 of the Aviation Act;

    7. Harbor zones under subparagraph 4 of Article 2 of the Harbor Act;

    8. Other facilities or sites prescribed by Presidential Decree.

    (2) A common telecommunications business operator shall present his/her opinions on the installation of common utility conduits, ducts, etc. under paragraph (1) in compliance with the guidelines prescribed by Presidential Decree for installing conduits.

    (3) Articles 35, and 44 (excluding paragraph (5)) and 45 through 47 shall apply mutatis mutandis to the provision of common utility conduits, ducts, etc. established under paragraph (1).

    (4) Where a facility installer is unable to reflect the opinions of a common telecommunications business operator pursuant to paragraph (1), he/she shall notify the relevant common telecommunications business operator of the reasons therefor within 30 days after the date of receipt of such opinions.

    (5) Where a facility installer fails to reflect the opinions of a common telecommunications business operator pursuant to paragraph (1), the relevant common telecommunications business operator may submit a request for mediation to the Korea Communications Commission.

    (6) Where the Korea Communications Commission intends to provide mediatory suggestions upon receipt of a request for mediation under paragraph (5), it shall first consult with the head of the relevant central administrative agency.

    (7) Matters necessary for mediation under paragraphs (5) and (6) shall be prescribed by Presidential Decree.

    Article 69 (Establishment of Building Telecommunications Cabling Systems, etc.)

    (1) A building under Article 2 (1) 2 of the Building Act shall be equipped with the building telecommunications cabling systems, and secure a certain space for connection with telecommunications line equipment and facilities.

    (2) Matters necessary for the scope of buildings, guidelines for establishing the telecommunications cabling systems, and securing a space for connection with telecommunications line equipment and facilities pursuant to paragraph (1) shall be prescribed by Presidential Decree.

     Article 70 (Integrated Management of Telecommunications Equipment and Facilities, etc.)

    (1) Where it is necessary for the efficient management and operation of telecommunications equipment and facilities, the Korea Communications Commission may entrust the integrated management of telecommunications equipment and facilities installed under this Act or any other Act and land, buildings or other structures attached thereto (hereinafter referred to as “telecommunications equipment and facilities, etc.”) to the common telecommunications business operator who has been selected in accordance with the guidelines and procedures prescribed by Presidential Decree (hereinafter referred to as “telecommunications business operator entrusted with the integrated management“).

    (2) Where the Korea Communications Commission intends to entrust the integrated management of telecommunications equipment and facilities under paragraph (1), it shall develop a plan for the integrated management of telecommunications equipment and facilities (hereinafter referred to as “integrated management plan“) and obtain approval therefor from the President through consultation with the head of the relevant administrative agency and through deliberation by the State Council.

    (3) An integrated management plan shall include the following matters:

    1. Subjects, periods, methods and procedures of the integrated management;

    2. Matters concerning the management of telecommunications equipment and facilities, etc. after integration;

    3. Other matters prescribed by Presidential Decree.

    (4) Where the Korea Communications Commission intends to develop an integrated management plan, it shall first consult with the person who installs telecommunications equipment and facilities to be integrated.

    Article 71 (Purchase of Telecommunications Equipment and Facilities, etc.)

    (1) If it is necessary for the integrated management of telecommunications equipment and facilities, a telecommunications business operator entrusted with the integrated management may claim for the purchase of the relevant telecommunications equipment and facilities. In such cases, the owner of the relevant telecommunications equipment and facilities shall not refuse the claim without any justifiable ground.

    (2) Notwithstanding Article 27 of the State Property Act or Article 19 of the Public Property and Commodity Management Act, State-owned or publicly-owned telecommunications equipment and facilities, etc. claimed by a telecommunications business operator entrusted with the integrated management may be sold to the telecommunications business operator entrusted with the integrated management. In such cases, matters necessary for the sales, such as the methods of calculating the sale price, procedures for sales, and payment methods of the purchase prices shall be prescribed by Presidential Decree.

    (3) With respect to the methods and guidelines for calculating the sale price of non-state-owned or non-publicly-owned telecommunications equipment and facilities to be purchased by a telecommunications business operator entrusted with the integrated management under paragraph (1), the provisions of Articles 67 (1), 70, 71, 74, 75, 75-2, 76, 77 and 78 (5) through (7) shall apply mutatis mutandis.

    SECTION 4.- Installation and Preservation of Telecommunications Equipment and Facilities

    Article 72 (Use of Land, etc.)

    (1) If it is necessary for the installation of lines, antennas, and their appurtenant facilities to be available for telecommunications services (hereinafter referred to as “lines, etc.”), a common telecommunications business operator may use a third party’s land, or buildings and structures attached thereto, and surface and bottom of the water (hereinafter referred to as “land, etc.”). In such cases, the common telecommunications business operator shall consult with the owners or occupants of the relevant land, etc, in advance.

    (2) Where consultation under paragraph (1) fails to lead to agreement or fails to take place, a common telecommunications business operator may use a third party’s land, etc. pursuant to the Act on the Acquisition of Land, etc. for Public Works and the Compensation therefor.

    Article 73 (Temporary Use of Land, etc.)

    (1) If it is necessary for the measurement of lines, etc. and the installation works or preservation works of telecommunications equipment and facilities, a common telecommunications business operator may temporarily use private, national or public telecommunications equipment and facilities and land, etc. to the extent that does not substantially impede the current use thereof.

    (2) No person shall impede the measurement of lines, etc., the installation works or preservation works of telecommunications equipment and facilities and the temporary use of telecommunications equipment and facilities and land, etc. under paragraph (1) without any justifiable ground.

    (3) When a common telecommunications business operator intends to temporarily use private, national or public property under paragraph (1), he/she shall notify the occupants, in advance, of the purposes of and period for such use: Provided, That in cases where it is difficult to give prior notice, he/she shall give prompt notice during or after the use, and in cases where he/she is unable to notify the purposes of and period for the use due to an obscurity of an address and residence of occupants, he/she shall publicly announce them.

    (4) No period of temporary use of land, etc. under paragraph (1) may exceed six months.

    (5) A person who temporarily uses private, national or public telecommunications equipment and facilities or land, etc. under paragraph (1) shall carry with him/her a certificate indicating his/her authority, and present it to the persons concerned.

    Article 74 (Entrance to Land, etc.)

    (1) A common telecommunications business operator may enter into a third party’s land, etc., to the extent necessary for the measurement, inspection , etc., for the installation and preservation of his/her telecommunications equipment and facilities: Provided, That in cases where the place where he/she intends to enter into is a residential building, a consent from residents shall be obtained.

    (2) No person shall impede the measurement, inspection, etc. for the installation or preservation of telecommunications equipment and facilities and a entrance to land, etc. under paragraph (1) without any justifiable ground.

    (3) Article 73 (3) and (5) shall apply mutatis mutandis to notification and presentation of a certificate if a person engaged in the measurement, inspection, etc. under paragraph (1) enters private, national or public land, etc.

    Article 75 (Request for Removal of Obstacles, etc.)

    (1) A common telecommunications business operator may request the owners or users of gas pipes, water pipes, drain pipes, electric lamp lines, power lines or private telecommunications equipment and facilities, which impede or are feared to impede the installation of lines, etc. or common telecommunications equipment and facilities (hereinafter referred to as “obstacles, etc.”) to relocate, reform, or repair them or to take other necessary measures.

    (2) A common telecommunications business operator may request the owners or the persons in possession of plants, which impede or are feared to impede the installation or maintenance of lines, etc. or telecommunications to remove such plants.

    (3) Where an owner or a persons in possession of a plant fails to comply with the request under paragraph (2), or where extenuating circumstances exist, a common telecommunications business operator may fell or transplant the relevant plant by obtaining permission from the Korea Communications Commission. In such cases, he/she shall promptly notify the owner or the person in possession of the relevant plant.

    (4) Where an obstacle, which impedes or is likely to impede the telecommunications equipment and facilities of a common telecommunications business operator, needs to be newly established, enlarged, improved, removed or changed, the owner or user of such obstacles shall consult with the common telecommunications business operator, in advance.

    Article 76 (Obligation for Reinstatement)

    Where the use of land, etc. under Articles 72 and 73 is terminated or it is no longer necessary to provide land, etc. used for telecommunications services, a common telecommunications business operator shall reinstate the relevant land, etc., and where it is impossible to reinstate the relevant land, etc., he/she shall properly compensate for any losses suffered by the owners or users.

    Article 77 (Compensation for Losses)

    Where a common telecommunications business operator causes losses to a third party in cases under Article 73 (1), 74 (1) or 75, he/she shall compensate the third party for such losses.

    Article 78 (Procedures for Compensation for Losses to Land, etc.)

    (1) Where a common telecommunications business operator compensates for any losses pursuant to Article 76 or 77 on any of the following grounds, he/she shall consult with the person who suffered such losses:

    1. Temporary use of land, etc. under Article 73 (1);

    2. Entrance to land, etc. under Article 74 (1);

    3. Relocation, reform or repair of obstacles, etc. or removal of plants under Article 75;

    4. Impossibility of reinstatement under Article 76.

    (2) When consultation under paragraph (1) fails to lead to agreement or fails to take place, an application for adjudication shall be filed with the competent Land Expropriation Commission under the Act on the Acquisition of Land, etc. for Public Works and the Compensation therefor.

    (3) Except as otherwise prescribed by this Act, the Act on the Acquisition of Land, etc. for Public Works and the Compensation therefor shall apply mutatis mutandis to the standards, methods and procedures for compensation for losses, etc. to land, etc. under paragraph (1), and an application for adjudication under paragraph (2).

    Article 79 (Protection of Telecommunications Equipment and Facilities)

    (1) No person shall destroy telecommunications equipment and facilities, nor obstruct the flow of telecommunications by impeding the functions of telecommunications equipment and facilities by means of contacting other objects with them or by any other means.

    (2) No person may contaminate telecommunications equipment and facilities or damage measurement marks of telecommunications equipment and facilities by means of throwing any object at the telecommunications equipment and facilities or tying an animal, vessel or a log raft thereto.

    (3) In order to protect telecommunication cables or supplementary facilities laid on the seabed (hereafter referred to as “submarine cable“), a common telecommunications business operator may file an application for the designation of a submarine cable zone to the Korea Communications Commission.

    (4) The Korea Communications Commission upon receipt of application under paragraph (3), shall examine the necessity for such designation and may designate a submarine cable zone and publicly announce it, following consultation with the head of the relevant central administrative agency.

    (5) Matters concerning application for designation of a submarine cable zone, methods and procedures for designation and public announcement, methods of installing warning signs, etc. shall be prescribed by Presidential Decree.

    Article 80 (Relocation, etc. of Equipment and Facilities.)

    (1) Where telecommunications equipment and facilities of a common telecommunications business operator impede the use of land, etc. in which they are located due to changes to the purposes or methods of using such land, etc. or land adjacent thereto, the owner or occupant of such land, etc. may request the common telecommunications business operator to relocate the telecommunications equipment and facilities, and take other necessary measures to remove the impediment.

    (2) A common telecommunications business operator shall, upon receipt of a request under paragraph (1), take necessary measures unless he/she has a difficulty in business operations or a technical difficulty to take such measures.

    (3) Expenses incurred in the measures under paragraph (2) shall be reimbursed by a person who has made measures necessary to relocate the relevant equipment and facilities or remove the impediment after installation of the equipment and facilities: Provided, That in cases where a person who is liable to reimburse the expenses is the owner or occupant of the relevant land, etc. and falls any of the following subparagraphs, a common telecommunications business operator may reduce or exempt expenses to be reimbursed by such owner or occupant, taking into account the amount of compensation at the time of the installation of the equipment and facilities and the period for the installation thereof:

    1. Where a common telecommunications business operator develops and implements plans for the relocation of the relevant telecommunications equipment and facilities or for the removal of the impediments;

    2. Where the relocation of the relevant telecommunications equipment and facilities or removal of the impediments is beneficial for other telecommunications equipment and facilities;

    3. Where the State or a local government requests the relocation of the relevant telecommunications equipment and facilities or removal of the impediments;

    4. Where telecommunications equipment and facilities installed in private land is relocated because they substantially impede the use of such private land.

    Article 81 (Cooperation, etc. with Other Organizations)

    A common telecommunications business operator may ask the relevant public agencies for a cooperation, in case where the operation of vehicles, vessels, airplanes and other carriers is necessary for the installation and preservation of his/her telecommunications equipment and facilities. In such cases, upon receipt of a request for cooperation, the public agency shall comply with the request unless justifiable grounds exist.

    Article 82 (Inspection, Reporting, etc.)

    (1) Where it is necessary for the development of telecommunications policies or where it is prescribed by Presidential Decree, the Korea Communications Commission may inspect the current installation status, books or documents of a person who has installed telecommunications equipment and facilities or require him/her to report on his/her equipment and facilities.

    (2) Where a person has installed telecommunications equipment and facilities in violation of this Act, the Korea Communications Commission may order him/her to remove the relevant equipment and facilities or take other necessary measures.

    CHAPTER VI.- SUPPLEMENTARY PROVISIONS

    Article 83 (Protection of Confidentiality of Communications)

    (1) No person may infringe or divulge the confidentiality of communications carried by telecommunications business operators.

    (2) No person who is or has been engaged in telecommunications services may divulge a third party’s confidential information with respect to communications obtained in the course of performance of his/her duties.

    (3) A telecommunications business operator may comply with a request for the perusal or provision of any of the following data (hereinafter referred to as “provision of communications data“) from a court, a prosecutor, the head of an investigative agency (including the head of a military investigative agency, the Commissioner of the National Tax Service and the Commissioner of a Regional Tax Office; hereinafter the same shall apply) or the head of an intelligence and investigation agency, who intends to collect information or intelligence in order to prevent any threat to a trial, an investigation (including the investigation of a violation committed by means of a telephone, the Internet, etc. among the offenses prescribed in Article 10 (1), (3) and (4) of the Punishment of Tax Evaders Act), the execution of a sentence or the guarantee of the national security:

    1. Names of users;

    2. Resident registration numbers of users;

    3. Addresses of users;

    4. Phone numbers of users;

    5. User identification word (referring to the identification codes of users used to identify the rightful users of computer systems or communications networks);

    6. Dates on which users subscribe or terminate their subscriptions.

    (4) The request for provision of communications data under paragraph (3) shall be made in writing (hereinafter referred to as “written request for provision of data“), which states a reason for such request, relation with the relevant user and the scope of necessary data: Provided, That where it is impossible to make a request in writing due to an urgent reason, such request may be made without resorting to writing, and when such reason disappears, a written request for provisions of data shall be promptly filed with the telecommunications business operator.

    (5) Where a telecommunications business operator provides communications data according to the procedures under paragraphs (3) and (4), he/she shall retain the ledgers prescribed by Presidential Decree, which contain necessary matters, such as the records that communications data are provided, and the related materials, such as the written requests for provision of data.

    (6) A telecommunications business operator shall report on the current status, etc. of provision of communications data, to the Korea Communications Commission twice a year, in accordance with the methods prescribed by Presidential Decree, and the Korea Communications Commission may ascertain whether the details of a report submitted by a telecommunications business operator are correct and the management status of related materials under paragraph (5).

    (7) A telecommunications business operator shall, in accordance with the methods prescribed by Presidential Decree, notify the details entered in the ledgers under paragraph (5) to the head of the central administrative agency whereto a person requesting the provision of communications data under paragraph (3) belongs: Provided, That in cases where a person who requests the provision of communications data is a court, the relevant telecommunications business operator shall notify the Minister of the Court Administration thereof.

    (8)  A telecommunications business operator shall establish and operate a department in exclusive charge of the affairs related to users’communication secrets; and the matters concerning the function, composition, etc. of the relevant development shall be prescribed by Presidential Decree.

    (9) Matters necessary for the scope of persons having authority to grant approval on the written requests for provision of data shall be prescribed by Presidential Decree.

    Article 84 (Information, etc. of Caller’s Phone Number)

    (1) A telecommunications business operator may, upon request from a receiver, inform him/her of a caller’s phone number: Provided, That this shall not apply in cases where the caller expresses his/her intent refusing the transmission of his/her phone number.

    (2) Where any of the following cases occurs, a telecommunications business operator may inform a receiver a caller’s phone number, etc, notwithstanding the proviso to paragraph (1);

    1. Where the receiver requests to inform the caller’s phone number under conditions and procedures prescribed by Presidential Decree in order to protect the receiver from verbal abuse, threats, harassment, etc.;

    2. Where it is prescribed by Presidential Decree for national security, crime prevention, disaster relief, etc. when providing phone services with special numbers.

    (3) No person shall fabricate or falsify a caller’s phone number while making phone calls for the purpose of making financial profits by deceiving other persons or of harming them by verbal abuse, threats, harassment, etc.

    (4) No person shall provide services for forging or falsely indicating a caller’s phone number for profit-making: Provided, That this shall not apply to any case having justifiable grounds, such as for public interests or offering convenience to the receiver, etc.

    Article 85 (Restriction on, and Suspension of Business)

    The Korea Communications Commission may order a telecommunications business operator to fully or partially restrict or suspend telecommunications services in order to secure major telecommunications, as prescribed by Presidential Decree at the time of war, an upheaval, natural disaster or any national emergency equivalent thereto or if an outbreak of such emergency is highly apprehended or if extenuating circumstances exist.

    Article 86 (Approval for International Telecommunications Services)

    (1) When any special provisions concerning international telecommunications services are included in treaties or agreements signed by the Government, those provisions shall govern.

    (2) Where a telecommunications business operator intends to enter into an agreement on international telecommunications services prescribed by Presidential Decree, he/she shall obtain approval from the Korea Communications Commission after satisfying the requirements prescribed by Presidential Decree. The same shall apply to an amendment to or revocation of such agreement.

    (3) Where a telecommunications business operator who provides common telecommunications services intends to enter into an agreement for the adjustments of international telecommunications service charges with a foreign government or a foreigner, he/she shall report to the Korea Communications Commission: Provided, That this shall not apply to the telecommunications business operator who satisfies the requirements prescribed by Presidential Decree for the size of telecommunications equipment and facilities, capital, whether to grant phone numbers, etc.

    (4) Where a telecommunications business operator who provides common telecommunications services intends to enter into an agreement for the adjustments of roaming service charges, he/she shall obtain approval from the Korea Communications Commission, notwithstanding paragraph (3).

    (5) Matters necessary for reporting under paragraph (3) or approval under paragraph (4) shall be determined and publicly announced by the Korea Communications Commission.

    Article 87 (Cross-Border Provision of Common Telecommunications Services)

    (1) Where a person intends to provide common telecommunications services from abroad into Korea without establishing any place of business in Korea (hereinafter referred to as “cross-border provision of common telecommunications services“), he/she shall enter into an agreement for cross-border provision of common telecommunications services with a domestic common telecommunications business operator or special category telecommunications business operator who provides the same common telecommunications services.

    (2) Articles 28, 32, 33, 45 through 47, 50 through 55, 83 through 85, 88, 92 of this Act and Article 44-7 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. shall apply mutatis mutandis to the provision of services under an agreement concluded by a common telecommunications business operator or a special category telecommunications business operator under paragraph (1).

    (3) Where a person who intends to provide cross-border common telecommunications services under paragraph (1), or a common telecommunications business operator or special category telecommunications business operator who has entered into an agreement with such person, violates the relevant provisions which apply mutatis mutandis under paragraph (2), the Korea Communications Commission may revoke approval under Article 86 (2), or issue an order to fully or partially suspend the cross-border provision of common telecommunications services under the relevant agreement for up to one year.

    (4) Guidelines and procedures for imposing dispositions under paragraph (3) and other necessary matters shall be prescribed by Presidential Decree.

    Article 88 (Reporting, etc. on Statistics)

    (1) A telecommunications business operator shall report to the Korea Communications Commission on the statistics on the provision of telecommunications services prescribed by Presidential Decree, such as the current status of equipment and facilities, subscription record and current status of users for each type of telecommunications services, and the data related to telephone traffic required for billing and collections and retain the related data, as prescribed by Presidential Decree.

    (2) A common telecommunications business operator and stockholders thereof, or a special category telecommunications business operator and stockholders thereof shall submit the related data necessary for a verification of matters under Article 8, as prescribed by Presidential Decree.

    (3)          In order to verify the matters under paragraph (2), or to examine the genuineness of the data submitted, The Korea Communications Commission may request the administrative agencies and other related agencies to examine the data submitted or to submit the related materials. In such cases, the agencies in receipt of such request shall comply with it unless justifiable grounds exist.

    Article 89 (Hearings)

    Where the Korea Communications Commission intends to impose any of the following dispositions, it shall hold a hearing:

    1. To fully or partially cancel the license of a common telecommunications business operator under Article 20 (1);

    2. To fully or partially cancel registration of a special category telecommunications business operator under Article 27 (1);

    3. To fully or partially cease the value-added telecommunications business under Article 27 (2);

    4. To revoke approval under Article 87 (3).

    Article 90 (Imposition, etc. of Penalty Surcharge)

    (1) Where a business suspension order to be issued to a telecommunications business operator who falls under each subparagraph of Article 20 (1), each subparagraph of Article 27 (1) or any subparagraph of Article 27 (2), causes substantial inconvenience to the users, etc. of the relevant business or threatens to impair public interests, the Korea Communications Commission may impose a penalty surcharge in an amount not exceeding 3/100 of the turnover calculated under Presidential Decree in lieu of the business suspension order. In such cases, if the telecommunications business operator refuses to submit materials relating to the calculation of the profit or submits any false material, the profit may be estimated based on the financial statements and other accounting materials of the relevant telecommunications business operator and the business operators providing the same or similar types of services, and the materials concerning the current status of business operations, such as the number of subscribers, service charges, etc.: Provided, That where there is no profit or it is difficult to calculate the profit, as prescribed by Presidential Decree, a penalty surcharge not exceeding one billion won may be imposed.

    (2) Where an order to suspend the use of private telecommunications equipment and facilities under Article 67 (2) causes substantial inconvenience to the users of telecommunications services provided with the relevant private telecommunications equipment and facilities or threatens to impair public interests, the Korea Communications Commission may impose a penalty surcharge not exceeding one billion won in lieu of the order to suspend the use thereof.

    (3) Detailed guidelines for the imposition of penalty surcharges under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    (4) The provisions of Article 53 (5) through (7) shall apply mutatis mutandis to additional dues, demands, and collection of penalty surcharges under paragraphs (1) and (2).

    Article 91 (Extension of Payment Deadline of Penalty Surcharges and Payment in Installments)

    (1) Where a penalty surcharge to be paid by a telecommunications business operator under Articles 53 and 90 exceeds an amount prescribed by Presidential Decree, and where deemed that the person liable to pay a penalty surcharge has difficulty in paying it in a lump sum on any of the following grounds, the Korea Communications Commission may either extend the payment deadline, or permit him/her to pay it in installments. In such cases, the Commission may, if deemed necessary, require him/her to provide a security therefor:

    1. Where he/she suffers a severe financial loss due to natural disasters or fire, etc;

    2. Where his/her business faces a serious crisis due to an aggravation of business environments;

    3. Where it is expected that he/she will be in great financial difficulty if he/she pays the penalty surcharge in a lump sum.

    (2) Matters necessary for an extension of the payment deadline of penalty surcharges, the payment in installments and the provision of a security shall be prescribed by Presidential Decree.

    Article 92 (Corrective Orders, etc.)

    (1) The Korea Communications Commission shall issue a corrective order to a telecommunications business operator who falls under any of the following subparagraphs:

    1. Where he/she violates the provisions of Article 3, 4, 6 through 11, 14 through 24, 26 through 28, 30 through 44, 47 through 49, 51, 56 through 62, 64 through 67, 69, 73 through 75, 79 or 82 through 88, or the orders issued under these provisions;

    2. Where the procedures for his/her business operations are deemed to inflict significant harm on the users’ interests;

    3. Where he/she fails to promptly take measures necessary for removing an obstruction, such as repair, etc. when an accident, etc. impedes the provision of telecommunications services.

    (2) The Korea Communications Commission may order a telecommunications business operator to conduct any of the following matters, when necessary for the development of telecommunications:

    1. Integrated operation and management of telecommunications equipment and facilities;

    2. Expansion of communications equipment and facilities for the enhancement of social welfare;

    3. Establishment and management of communications networks for important communications to achieve efficient performance of the State’s functions;

    4. Other matters prescribed by Presidential Decree.

    (3) The Korea Communications Commission may order a person who falls under any of the following subparagraphs to suspend the provision of telecommunications services or to take measures necessary for the removal of telecommunications equipment and facilities:

    1. A person who operates a common telecommunications business without obtaining a license under Article 6 (1);

    2. A person who operates a special category telecommunications business without registration under Article 21 (1);

    3. A person who operates the value-added telecommunications business without reporting thereon under Article 22 (1).

    Article 93 (Delegation of Authority)

    The Korea Communications Commission may partially delegate its authority under this Act to the head of its affiliated agency, as prescribed by Presidential Decree.

    CHAPTER VII.- PENAL PROVISIONS

     Article 94 (Penal Provisions)

    A person who falls under any of the following subparagraphs shall be punished by imprisonment for not more than five years or by a fine not exceeding 200 million won:

    1. A person who operates the common telecommunications business without obtaining a license under Article 6 (1);

    2. A person who operates the common telecommunications business, in violation of an order to partially cancel his/her license under Article 20 (1);

    3. A person who obstructs the flow of telecommunications by impeding a function of telecommunications equipment and facilities by means of damaging telecommunications equipment and facilities, or contacting the objects with them or by other means, in violation of Article 79 (1);

    4. A person who divulges a third party’s confidential information with respect to communications obtained in the course of performance of his/her duties, in violation of Article 83 (2);

    5. A person who provides communication data, and a person who receives communications data, in violation of Article 83 (3).

    Article 95 (Penal Provisions)

    Any of the following persons shall be punished by imprisonment for not more than three years or by a fine not exceeding 150 million won: (Amended by Act nº 10656, May 19, 2011)

    1. A person who refuses to provide telecommunications services without justifiable grounds, in violation of Article 3 (1);

    2. A person who violates a disposition taken to suspend his/her business operation under Article 20 (1);

    3. A person who operates the special category telecommunications business without registration under Article 21 (1);

    3-2. A person who conducts value-added telecommunications business without conducting registration under Article 22 (2);

    4.  A person who operates a special category telecommunications business, in violation of an order to partially cancel registration under Article 27 (1);

    5. A person who fails to comply with an order under Article 52 (1);

    6. A person who obstructs the measurement of lines, etc. and the installation and preservation works for telecommunications equipment and facilities under Article 73 (2);

    7. A person who violates the confidentiality of communications of telecommunications business operators or divulges such confidential information, in violation of Article 83 (1).

    Article 96 (Penal Provisions)

    A person who falls under any of the following subparagraphs shall be punished by imprisonment for not more than two years or by a fine not exceeding 100 million won:

    1. A person who fails to obtain a revised license under Article 16;

    2. A person who fails to obtain approval under Articles 17 (1) and 42 (4);

    3. A person who fails to obtain authorization under the main sentence of the part other than each subparagraph of Article 18 (1) or approval under Article 19 (1);

    4. A person who integrates telecommunications networks, appoints executives, acquires business, executes an agreement for merger or sale of equipment and facilities, or takes follow-up measures for the establishment of a company prior to obtaining authorization, in violation of Article 18 (9):

    5. A person who fails to comply with an order to take measures to protect users under Article 19 (2);

    6. A person who operates a value-added telecommunications business without reporting under Article 22 (1);

    7. A person who violates a disposition taken to suspend his/her business operation under Article 27 (1);

    8. A person who fails to comply with an order to discontinue his/her business under Article 27 (2);

    9. A person who fails to purchase a guarantee insurance policy, in violation of Article 32 (3)

    10. A person who discloses, uses or provides information, in violation of the main sentence of Article 43 (1) or paragraph (2) of the same Article;

    11. A person who fails to comply with an order to restrict or suspend telecommunications services under Article 85;

    12. A person who fails to obtain approval or approval for an amendment or revocation, under Article 86 (2) or (4).

    Article 97 (Penal Provisions)

    A person who falls under any of the following subparagraphs shall be punished by imprisonment for not more than one year or by a fine not exceeding 50 million won:

    1. A person who fails to comply with an order under Article 10 (5), 12 (2) (including cases where the provisons apply mutatis mutandis under Article 4 (4) of the Addenda of the Telecommunications Business Act amended by Act nº 5385) or 18 (8);

    2. A person who fails to report under the proviso to Article 18 (1);

    3. A person who fails to file a revised registration or a revised report under Article 23;

    4. A person who fails to report under Article 24;

    5. A person who violates a disposition taken to suspend his/her business operation under Article 27 (2);

    6. A person who provides telecommunications services without submitting a report or revised report under Article 28 (1) and (2) (proviso) or without obtaining authorization or revised authorization under Article 28 (2);

    7. A person who advocates a third party’s communications through telecommunications services provided by a telecommunications business operator or provides such services for a third party’s communications, in violation of the body of Article 30.

    Article 98 (Penal Provisions)

    A person who falls under any of the following subparagraphs shall be punished by imprisonment for not more than one year or by a fine not exceeding 100 million won:

    1. A person who installs or changes important telecommunications equipment and facilities without reporting under the main sentence of Article 62 (1) or a person who installs telecommunications equipment and facilities without obtaining approval under the proviso to Article 62 (1);

    2. A person who installs private telecommunications equipment and facilities without submitting a report or a revised report under Article 64 (1);

    3. A person who advocates a third party’s communications through private telecommunications equipment and facilities or operates such equipment and facilities not in accordance with the purposes of installation, in violation of Article 65 (1);

    4. A person who fails to comply with an order to carry out the telecommunications business or other important communications business or to connect his/her equipment and facilities with other telecommunications equipment and facilities under Article 66 (1);

    5. A person who fails to comply with an order to suspend the use under Article 67 (2) or an order under Article 67 (3);

    6. A person who fails to comply with an order to remove telecommunications equipment and facilities or an order to take other necessary measures under Article 82 (2).

    Article 99 (Penal Provisions)

    A person who commits a prohibited act under each subparagraph of Article 50 (1) (excluding any act of providing telecommunications services in a manner different from the terms and conditions of use under Article 50 (1) 5) shall be punished by a fine not exceeding 300 million won.

    Article 100 (Penal Provisions)

    A person who falls under any of the following subparagraphs shall be punished by a fine not exceeding 50 million won:

    1. A person who fabricates or falsifies a caller’s phone number while making a phone call for the purpose of making financial profits by deceiving other persons or of harming them by verbal abuse, threats, sexual harassment, etc., in violation of Article 84 (3);

    2. A person who provides services for fabricating for falsifying a caller’s phone number for profit-making, in violation of Article 84 (4).

    Article 101 (Penal Provisions)

    A person who contaminates telecommunications equipment and facilities or damages measurement marks of telecommunications equipment and facilities, in violation of Article 79 (2) shall be punished by a fine or a minor fine not exceeding one million won.

    Article 102 (Attempted Criminals)

    An attempted criminal under subparagraphs 3 and 4 of Article 94 and subparagraph 7 of Article 95 shall be punished.

    Article 103 (Joint Penal Provisions)

    When a representative of a corporation or an agent, an employee or any other employed person of a corporation or an individual commits any violation under Articles 94 through 100 in connection with the business of such corporation or individual, not only shall such violator be punished accordingly, but the corporation or individual shall be punished by a fine under the relevant provisions, respectively: Provided, That the same shall not apply in cases where the corporation or individual has paid due attention to or diligently supervised the relevant business in order to prevent such violation.

    Article 104 (Fines for Negligence)

    (1) A person who falls under any of the following subparagraphs shall be punished by a fine for negligence not exceeding 30 million won:

    1. A person who impedes a temporary use of private telecommunications equipment and facilities or land, etc. without any justifiable ground, in violation of Article 73 (2);

    2. A person who impedes an entrance to land, etc. without any justifiable ground, in violation of Article 74 (2);

    3. A person who refuse to relocate, reform or repair obstacles, etc. or to take other necessary measures under Article 75 (1) or to remove plants under Article 75 (2) without any justifiable ground.

    (2) A person who fails to apply for authorization on the conclusion of an agreement, in violation of Article 44 (2) shall be punished by a fine for negligence not exceeding 200 million won.

    (3) A person who falls under any of the following subparagraphs shall be punished by a fine for negligence not exceeding 15 million won:

    1. A person who fails to report on the conclusion of an agreement under Article 44 (1);

    2. A person who fails to report under the main sentence of Article 86 (3).

    (4) A person who falls under any of the following subparagraphs shall be punished by a fine for negligence not exceeding 10 million won:

    1. A person who fails to report under Article 10 (2) or fails to comply with a request for the provision of necessary data or an order to appear under Article 11 (3) or (4);

    2. A person who fails to notify users by not later than 60 days before a scheduled date of suspension or discontinuance, in violation of Article 19 (1);

    3. A person who fails to report under Article 26;

    4. A person who violates duties to protect users under Article 32 (1);

    5. A person who fails to comply with an order to submit data issued by the Korea Communications Commission under Article 35 (5) or submits false data;

    6. A person who fails to publicly announce the technical standards, the requirements for the provision and use, and other standards required for the creation of environments for fair competition, in violation of Article 42 (4);

    7. A person who fails to comply with the matters publicly announced under Article 48 (2), in violation of Article 48 (3);

    8. A person who refuses, avoids or impedes an investigation under Article 51 (2);

    9. A person who refuses, avoids or impedes an order to submit necessary data or articles under Article 51 (5), or temporary custody of such data or articles;

    10. A person who fails to comply with an order to submit data under Article 56 (3);

    11. A person who uses private telecommunications equipment and facilities without verification, in violation of Article 64 (3);

    12. A person who refuses, interferes with or avoids an inspection under Article 82 (1);

    13. A person who fails to report under Article 82 (1) or falsely reports;

    14. A person who fails to retain the related materials or retains false materials, in violation of Article 83 (5);

    15. A person who fails to notify details of the ledgers which include the provision of communications data, etc. to the head of a central administrative agency, in violation of Article 83 (7);

    16. A person who fails to report or submit data under Article 88, or falsely reports or submits false materials;

    17. A person who fails to comply with a corrective order under Article 92.

    (5) Fines for negligence under paragraphs (1) through (4) shall be imposed and collected by the Korea Communications Commission, as prescribed by Presidential Decree.

    ADDENDA

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Term of Validity)

    The amended provisions of Article 38 (2) through (4) shall be valid for three years from the date this Act enters into force.

    Article 3 (Transitional Measures concerning Scope of Application)

    The former provisions of the Addenda shall apply even after this Act enters into force.

    Article 4 (Transitional Measures concerning Licenses of Common Telecommunications Business Operators)

    A common telecommunications business operator who has obtained a license under the former provisions to operate common telecommunications business as at the time this Act enters into force shall be deemed a common telecommunications business operator who has obtained a license under the amended provisions of Article 6 to operate common telecommunications business under the amended provisions of Article 5 (2).

    Article 5 (Transitional Measures concerning Guarantee Insurance)

    A special category telecommunications business operator registered under the former provisions as at the time this Act enters into force who has collected service charges from users in advance, and then purchased a guarantee insurance policy to provide services, shall be deemed to have purchased a guarantee insurance policy under the amended provisions of Article 32 (3).

    Article 6 (Transitional Measures concerning Penal Provisions, etc.)

    In applying penal provisions or provisions concerning the fine for negligence against a violation committed before this Act enters into force, the former provisions shall apply: Provided, That this Act shall apply in cases where the application of the provisions of this Act is favorable to a violator.

    Article 7 Omitted.

    Article 8 (Transitional Measures following Amendment to Other Acts)

    In applying penal provisions or provisions concerning fines for negligence against a violation of the former Framework Act on Telecommunications (referring to the Framework Act on Telecommunications before the amendment under Article 7 (5) of this Addenda), the former Framework Act on Telecommunications shall apply.

    Article 9 (Relations with Other Acts and Subordinate Statutes)

    A citation of the former Framework Act on Telecommunications and the former Telecommunications Business Act or any provision thereof by any other Act or subordinate statute in force as at the time this Act enters into force shall be deemed a citation of this Act or a corresponding provision thereof in lieu of the former provisions, if such corresponding provision exists in this Act.

    ADDENDA (Act nº 10656, May. 19, 2011)

    (1) (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    (2) (Transitional Measures concerning Registration of Value-added Telecommunications Business)

    Among those who conduct value-added telecommunications business in accordance with the former provisions as at the time this Act enters into force, any person who needs to make registration in accordance with the amended provisions of Article 22 (2) shall make registration within six months after this Act enters into force.

    ADDENDA (Act nº 11201, Jan. 17, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Notification)

    The amended provisions of Article 32-2 shall apply, starting with the first person who enters into a contract for the use of telecommunications services with a telecommunications business operator after this Act enters into force.

    03Nov/21

    Act nº 12032, Aug. 13, 2013, Special Act on Promotion of Information and Communications Technology, Vitalization of Convergence Thereof, etc.

    Act nº 12032, Aug. 13, 2013, Special Act on Promotion of Information and Communications Technology, Vitalization of Convergence Thereof, etc. (Amended by Act nº 13016, Jan. 20, 2015, Act nº 14839, Jul. 26, 2017).

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to contribute to improving the quality of life of the people through the elevation of international competitiveness of information and communications and through the promotion of continuous development of national economy by promoting information and communications technology and by prescribing a system to promote policies for the vitalization of convergence of information and communications technology, rationalization of restrictions, fostering of human resources, development of venture businesses, support of research and development, etc.

    Article 2 (Definitions)

    (1) The definitions of terms used in this Act are as follows:

    1. The term “information and communications” refers to a series of activities and means, such as equipment, technologies, services, and industries, related to the collection, processing, storage, handling, search, transmission, and reception, of information, supply of services, and so forth, using or making full use of telecommunications equipment and facilities defined in subparagraph 2 of Article 2 of the Telecommunications Business Act, computers, etc., which include following:

    (a) Information and communications services defined in subparagraph 2 of Article 2 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.;

    (b) Broadcast communications services defined in subparagraph 5 of Article 2 of the Framework Act on Broadcasting Communications Development;

    (c) Information and communications technology industry defined in subparagraph 2 of Article 2 of the Information and Communications Technology Industry Promotion Act;

    (d) Technologies, services, and industries relating to the production, distribution, etc. of digital contents defined in subparagraph 5 of Article 2 of the Framework Act on the Promotion of Cultural Industries;

    2. The term “convergence of information and communications technology” refers to creative and innovative activities and phenomena creating new social and market value by combining or mixing technologies and services between information and communications technology or between information and communications technologies and other industries;

    3. The term “small and medium enterprises” refers to small and medium enterprises defined in Article 2 (1) of the Framework Act on Small and Medium Enterprises;

    4. The term “venture business” refers to a venture business defined in Article 2 (1) of the Act on Special Measures for the Promotion of Venture Businesses or a self-employed creative business defined in Article 2 of the Act on the Fostering of Self-Employed Creative Enterprises;

    5. The term “commercialization” refers to a series of processes in which technologies, products, and services developed, manufactured, or produced in making full use of research and development concerning information and communications are linked with business activities, such as sale, distribution, and supply, for the purpose of profit-making, or in which associations or organizations engaged in business activities are formed;

    6. The term “software” refers to software defined in subparagraph 1 of Article 2 of the Software Industry Promotion Act;

    7. The term “digital contents” refers to digital contents defined in subparagraph 5 of Article 2 of the Framework Act on the Promotion of Cultural Industries;

    8. The term “digital content enterpriser” refers to a person who is engaged in economic activities for the purpose of profit-making by producing, duplicating, transmitting, distributing digital contents and conducting other activities related thereto;

    9. The term “information and communications equipment” refers to devices, machinery, tools, parts, cables, and other necessary equipment and facilities concerning information and communications technology;

    10. The term “public institutions” refers to the following institutions:

    (a) Legal entities, organizations, or institutions under Article 4 of the Act on the Management of Public Institutions;

    (b) Local government-invested or -funded public corporations under the Local Public Enterprises Act;

    (c) Special legal entities established pursuant to special Acts;

    (d) Other legal entities, organizations, or institutions prescribed by Presidential Decree.

    (2) Except as otherwise provided for in paragraph (1), the definitions of terms used in this Act shall be as prescribed by other Acts, including the Framework Act on Broadcasting Communications Development, the Framework Act on Telecommunications, the Telecommunications Business Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc., the Information and Communications Technology Industry Promotion Act, and the Internet Multimedia Broadcast Services Act.

    Article 3 (Basic Principles)

    (1) The State and each local government shall endeavor to create an environment that enables open and reasonable use of information and communications technology and to achieve sound and sustainable development of an information and communications technology ecosystem.

    (2) The State and each local government shall endeavor to respect the creative spirit of the private sector and make the formation of market-oriented opinions possible.

    (3) The State and each local government shall make an effort for collaborative cooperation among large enterprises, small and medium enterprises, and venture businesses relating to information and communications technology and the harmonious development thereof.

    (4) The State and each local government shall actively support the advance of the industry of information and communications technology into overseas markets, and ensure that discriminatory treatment between domestic and foreign enterprisers does not occur in enacting or amending statutes or in formulating policies.

    (5) The State and each local government shall endeavor to minimize regulation hindering the promotion and vitalization of technologies, services, etc. for information and communications and for the convergence of information and communications technology (hereinafter referred to as “convergence, etc. of information and communications technology“).

    (6) The State and each local government shall endeavor to apply the same regulation to any services deemed the same in comprehensive consideration of the characteristics of information and communications technology, users’ behavior in the use of service, and so forth.

    (7) The State and each local government shall, in principle, allow new technologies and services for the convergence, etc. of information and communications technology insofar as relevant statutes are not violated, and make active efforts to vitalize such matters.

    Article 4 (Relationship with other Acts)

    This Act shall prevail over other Acts concerning the promotion of technologies, services, etc. for information and communications technology and the vitalization of convergence thereof.

    CHAPTER II.- CONSTRUCTION OF A SYSTEM TO DRIVE THE PROMOTION OF INFORMATION AND COMMUNICATIONS TECHNOLOGY AND THE ACTIVATION OF CONVERGENCE THEREOF

    Article 5 (Formulation and Implementation of Master Plans)

    (1) The Minister of Science and ICT shall, every three years, formulate and implement a three-year master plan (hereinafter referred to as “master plan”) for the promotion of information and communications technology and the vitalization of convergence thereof, but may shorten the planning cycle or change such master plan if necessary. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) A master plan (including modification of a master plan; hereinafter the same shall apply) shall include the following matters:

    1. Direction-setting for and objectives of policies to promote information and communications technology and to vitalize the convergence thereof;

    2. Matters concerning the construction of human and material foundations, such as fostering of specialized human resources and expansion of investment in facilities, for the promotion of information and communications technology and the vitalization of convergence thereof;

    3. Matters concerning the protection of intellectual property rights, such as the convergence of information and communications technology;

    4. Matters concerning support for research and development, dissemination of the outcomes of research, and promotion of commercialization of the outcomes of research to promote information and communications technology and to vitalize the convergence thereof;

    5. Matters concerning the improvement of relevant laws and systems to promote information and communications technology and to vitalize the convergence thereof;

    6. Matters concerning the protection and security of information;

    7. Matters concerning support for international cooperation and advancement into overseas markets relating to the promotion of information and communications technology and the vitalization of convergence thereof;

    8. Matters concerning cooperation in policies and duties among relevant central administrative agencies;

    9. Other matters necessary for the promotion of information and communications technology and the vitalization of convergence thereof.

    (3) A master plan shall be deliberated by the Strategic Committee for Information and Communications Technologies under Article 7 (1).

    (4) In order to formulate a master plan, the Minister of Science and ICT may request the heads of relevant central administrative agencies, local governments, and public institutions to provide him/her with their plans, data, etc. In such cases, the agency requested to provide a plan, data, etc. shall cooperate therein unless any special reason exists to the contrary. (Amended by Act nº 14839, Jul. 26, 2017)

    (5) The Minister of Science and ICT shall evaluate the implementation and track record of promotion, and reflect the results of evaluation in formulating a next master plan. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 6 (Formulation and Implementation of Action Plans)

    (1) In order to materialize a master plan, the heads of relevant central administrative agencies shall, every year, formulate and implement an action plan for the promotion of information and communications technology and the vitalization of convergence thereof (hereinafter referred to as “action plan“).

    (2) Where the heads of relevant central administrative agencies formulate an action plan, they shall reflect the results of deliberation of the Strategic Committee for Information and Communications Technology under Article 7 (1) therein, and submit the action plan to the Strategic Committee for Information and Communications Technology together with the track record of promotion of the action plan for the previous year.

    (3) If necessary for the formulation of an action plan, the heads of relevant central administrative agencies may request the heads of local governments and relevant public institutions to provide data, etc. In such cases, the institution requested to provide data, etc. shall cooperate therein unless any special circumstances exist to the contrary.

    (4) Matters necessary for the formulation, implementation, submission, etc. of an action plan, except otherwise provided for in paragraphs (1) through (3), shall be prescribed by Presidential Decree.

    Article 7 (Establishment, etc. of Strategic Committee for Information and Communications Technology)

    (1) In order to deliberate, and adopt resolutions, on policies for the promotion of information and communications technology and for the vitalization of convergence thereof, the Strategic Committee for Information and Communications Technology (hereinafter referred to as the “Strategic Committee“) shall be established under the jurisdiction of the Prime Minister.

    (2) The Strategic Committee shall be comprised of not more than 25 members, including one chairperson and one secretary; the Prime Minister shall serve as Chairperson, the Minister of Science and ICT shall serve as executive secretary, and its members shall be appointed by the Prime Minister from among the heads of relevant central administrative agencies prescribed by Presidential Decree and from among the following persons: (Amended by Act nº 14839, Jul. 26, 2017)

    1. An associate professor or higher at a university or a person who has served or is serving in a research institute related to information and communications technology for at least 15 years;

    2. A person who has served or is serving in an industry related to information and communications technology as an executive officer or employee for at least 15 years;

    3. A person who has served or is serving in a civil organization related to information and communications technology for at least 15 years;

    4. A person who is qualified as a judge, prosecutor, or attorney-at-law and has at least 15 years of career experience in his/her field;

    5. Other persons recognized by the Prime Minister as having expertise in information and communications technology.

    (3) The Strategic Committee shall deliberate, or adopt resolutions, on the following matters:

    1. Determining a master plan;

    2. Analyzing, examining, and evaluating the track record of promotion of a master plan and action plan;

    3. Requesting the heads, etc. of relevant central administrative agencies to take measures pursuant to Article 10 (3);

    4. Recommending an order of priority among research and development relating to the promotion of information and communications technology and the vitalization of convergence thereof;

    5. Coordination of pending issues on policies and duties among relevant central administrative agencies for the promotion of information and communications technology and the vitalization of convergence thereof;

    6. Important matters concerning the promotion of national informatization under the Framework Act on National Informatization;

    7. Other important matters concerning the promotion of information and communications technology and the vitalization of convergence thereof, which are submitted by the Chairperson for deliberation.

    (4) In order to efficiently implement the duties of the Strategic Committee, a working committee, etc. for the promotion of vitalization of information and communications technology under Article 9 (1) (hereinafter referred to as the “working committee for the promotion of vitalization“) shall be established under the Strategic Committee.

    (5) In order to support the Strategic Committee and the working committee for the promotion of vitalization, specialized committees consisting of experts in technology, law, etc. may be established.

    (6) Matters necessary for the organization, composition, and operation of the Strategic Committee, working committee for the promotion of vitalization, and specialized committee shall be prescribed by Presidential Decree.

    Article 8 (Fact-Finding Surveys)

    (1) The Minister of Science and ICT and the heads of relevant central administrative agencies may survey or prepare the current state, statistics, actual condition, etc. concerning the following matters in order to formulate and implement a master plan and action plan: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Actual condition of and statistics on technologies and services for the convergence, etc. of information and communications;

    2. Current state of human resources by field and function, and forecast of demand therefor;

    3. Research and development by field and function, and the scale of investment therein;

    4. Other matters necessary for the formulation and implementation of a master plan and action plan.

    (2) The Minister of Science and ICT may request the heads of relevant central administrative agencies, Special Metropolitan City Mayor, Metropolitan City Mayors, Special Self-Governing City Mayor, Do Governors, Special Self-Governing Province Governor, enterprises, research institutes, and other public institutions or organizations to provide data necessary for a fact-finding survey, etc. under paragraph (1). In such cases, persons requested to submit data shall cooperate therein unless any special circumstances exist to the contrary. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) The Minister of Science and ICT may announce the results of a fact-finding survey conducted under paragraph (1). (Amended by Act nº 14839, Jul. 26, 2017)

    (4) Matters necessary for the methods and procedures for fact-finding surveys under paragraph (1), public announcement, etc. thereof under paragraph (3) shall be prescribed by Presidential Decree.

    Article 9 (Operation of the Working Committee for the Promotion of Vitalization)

    (1) For the promotion of information and communications technology and the vitalization of convergence thereof, a working committee for the promotion of vitalization of information and communications technology shall be organized and operated in order to receive or inspect difficulties and suggestions of organizations, enterprises, etc. relating to information and communications technology, and to efficiently implement the duties of formulating plans for the improvement of a system therefor.

    (2) If necessary for the prompt implementation of duties, the working committee for the promotion of vitalization may receive public officials, executive officers or employees dispatched by the heads of relevant central administrative agencies, the heads of public institutions, or the heads of relevant institutions or organizations.

    (3) Matters necessary for the composition and operation of the working committee for the promotion of vitalization shall be prescribed by Presidential Decree.

    Article 10 (Duties, etc. of the Working Committee for the Promotion of Vitalization)

    (1) The working committee for the promotion of vitalization shall conduct the following affairs as its duties:

    1. Improvement of laws and systems hindering collaborative cooperation and harmonious development among large enterprises, small and medium enterprises, and venture businesses under Article 3 (3);

    2. Improvement of laws and systems causing discrimination between domestic enterprises and foreign enterprises under Article 3 (4);

    3. Improvement of laws and systems obstructing the promotion and vitalization of technologies, services, etc. for the convergence, etc. of information and communications technology under Article 3 (5);

    4. Handling of difficulties and suggestions of organizations, enterprises, etc. related to information and communications technology;

    5. Other improvement of laws and systems necessary for the promotion of information and communications technology and the vitalization of convergence thereof.

    (2) The working committee for the promotion of vitalization shall submit to the Strategic Committee a report on matters under paragraph (1) and plans for the improvement thereof, which are received from enterprises, organizations, etc. relating to information and communications technology or are searched directly by the working committee for the promotion of vitalization.

    (3) Where the Strategic Committee deems it necessary after deliberating on matters reported by the working committee for the promotion of vitalization pursuant to paragraph (2), it may request the heads, etc. of relevant central administrative agencies to take necessary measures, such as improving related laws and systems; in such cases, the heads, etc. of relevant central administrative agencies shall formulate an action plan for necessary measures within three months and submit a report thereon to the Strategic Committee.

    (4) The Strategic Committee may examine an action plan reported pursuant to paragraph (3) and announce the results of examination.

    CHAPTER III.- PROMOTION OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

    SECTION 1.- Construction of Foundation for Promotion of Information and Communications Technology

    Article 11 (Fostering of Domestic Experts)

    (1) The Minister of Science and ICT shall formulate and implement policy measures to foster human resources with specialized technology, knowledge, etc. in the field of information and communications technology (hereinafter referred to as “specialized human resources”), and especially endeavor to vitalize education specialized in software engineering for the expansion of foundation for the education of software engineering and the development of regional industries. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The policy measures under paragraph (1) shall include the following matters:

    1. Matters concerning the fostering, education, and training of specialized human resources;

    2. Matters concerning the supply of and demand for specialized human resources and making full use thereof;

    3. Matters concerning support, etc. for the career management of specialized human resources;

    4. Other matters necessary for the fostering, management, etc. of specialized human resources.

    (3) If necessary for the promotion of policies to foster specialized human resources, the Minister of Science and ICT may support relevant organizations, enterprises, etc., and operate a Korean comprehensive software education school to foster experts in software engineering through the systematic education of practical skills in software engineering. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) Matters necessary for the fostering and support of specialized human resources, operation, etc. of the Korean comprehensive software education school under paragraphs (1) through (3) shall be prescribed by Presidential Decree.

    Article 12 (Credited Internship Program)

    (1) The Government may require persons attending departments related to information and communications prescribed by Presidential Decree in universities, colleges, industrial colleges, teachers’ colleges, junior colleges, cyber colleges, or technical colleges under subparagraphs 1 through 6 of Article 2 of the Higher Education Act (hereinafter referred to as “universities“) to work as an intern for a period not exceeding two years, for small and medium enterprises, venture businesses, etc. prescribed by Presidential Decree.

    (2) Persons who work for small and medium enterprises, venture businesses, etc. as an intern pursuant to paragraph (1) shall be deemed to have completed a bachelor’s course of their universities and obtained credits, as determined by university bylaws.

    (3) The Government may grant necessary support, such as personnel expenses, to the universities, small and medium enterprises, venture businesses, etc. that adopt the internship system under paragraph (1).

    (4) Matters necessary for the operation, support, etc. of the internship system under paragraphs (1) through (3) shall be prescribed by Presidential Decree.

    Article 12-2 (Fact-Finding Surveys, etc. of Industrial Technical Personnel)

    (1) The Minister of Science and ICT shall annually conduct a fact-finding survey of industrial technical personnel designed to identify demand for industrial technical personnel in the field of information and communications in order to prevent the career of excellent specialized human resources from being interrupted and to efficiently promote information and communications. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) Where the Commissioner of the Military Manpower Administration assigns personnel pursuant to Article 36 (4) of the Military Service Act, the Minister of Science and ICT may request him/her to determine an adequate number of persons to be assigned in consideration of the results of a fact-finding survey conducted pursuant to paragraph (1). In this case, the Commissioner of the Military Manpower Administration so requested shall comply with such request. (Amended by Act nº 14839, Jul. 26, 2017)

    (Article Inserted by Act nº 13016, Jan. 20, 2015)

    Article 13 (Search and Fostering of Excellent Overseas Human Resources)

    (1) The Government shall formulate and implement policy measures for searching and fostering excellent overseas human resources having core technologies, knowledge, knowhow, etc. of information and communications technology.

    (2) The policy measures referred to in paragraph (1) shall include the following matters:

    1. Easing of requirements for an employment visa;

    2. Easing of procedures for immigration;

    3. Improvement of working conditions and treatment;

    4. Establishment of a whole-of-government promotion system;

    5. Other support necessary for searching and fostering excellent overseas human resources.

    (3) The Government may link the programs for fostering excellent overseas human resources relating to information and communications technology promoted by enterprises with the policy measures under paragraph (1), or grant support thereto.

    Article 14 (Enhancement of Information and Communications Technology Networks)

    (1) The Minister of Science and ICT shall continuously promote the enhancement of information and communications technology networks for the promotion of information and communications technology and the vitalization of convergence thereof. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT shall develop a policy necessary to induce and support active investment from the private sector for the enhancement of information and communications technology networks. (Amended by Act nº 14839, Jul. 26, 2017)

    SECTION 2.- Promotion of New Technologies, Services, etc. for Information and Communications

    Article 15 (Designation, etc. of Promising Technologies, Services, etc.)

    (1) In order to vitalize new technologies and services for information and communications and to link them with other industries, the Minister of Science and ICT may, each year, designate and support promising technologies and services (including digital contents) for the convergence, etc. of information and communications technology, as prescribed by Presidential Decree. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) Where the Minister of Science and ICT makes designation pursuant to paragraph (1), he/she shall publicly notify such designation; and the methods for designation and the scope and details of support shall be prescribed by Presidential Decree. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) In order to construct foundations for the vitalization of promising technologies and services, etc. for the convergence, etc. of information and communications technology designated pursuant to paragraph (1), the Minister of Science and ICT may support the vitalization of cooperation among central administrative agencies, public institutions, enterprises, universities, and research institutes. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 16 (Standardization of Technologies, Services, etc.)

    (1) In order to promote information and communications technology and to vitalize the convergence thereof, the Minister of Science and ICT may implement the following projects concerning the standardization of technologies, services, etc. for the convergence, etc. of information and communications technology: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Establishment, amendment, repeal, and dissemination of standards concerning new technologies, services, etc. for the convergence, etc. of information and communications technology: Provided, That where a Korean industrial standard thereof is established pursuant to the Industrial Standardization Act, such standard shall govern;

    2. Inspection, research and development of domestic and foreign standards concerning new technologies, services, etc. for the convergence, etc. of information and communications technology;

    3. Other matters necessary for the standardization of new technologies, services, etc. for the convergence, etc. of information and communications technology.

    (2) The Minister of Science and ICT may support projects for the standardization of technologies, services, etc. for the convergence, etc. of information and communications technology promoted by the private sector. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) The Minister of Science and ICT may designate institutions specialized in conducting projects for the standardization of technologies, services, etc. for the convergence, etc. of information and communications technology, and fully or partially subsidize them the necessary expenses. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) Matters necessary for the projects under paragraph (1) and the designation, etc. of specialized institutions under paragraph (3) shall be prescribed by Presidential Decree.

    Article 17 (Quality Certification of Technologies, Services, etc.)

    (1) The Minister of Science and ICT may determine and publicly notify the standards for certification (hereinafter referred to as “quality standards”) concerning the convenience, stability, reliability, expandability, etc. of technologies, services, etc. for the convergence, etc. of information and communications technology. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT may certify whether the quality of technologies, services, etc. for the convergence, etc. of information and communications technology complies with the quality standards publicly notified pursuant to paragraph (1). In such cases, expenses incurred for certification shall be borne by applicants. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) In order to efficiently implement certification duties under paragraph (2), the Minister of Science and ICT may designate certification organizations. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) Persons who obtain certification pursuant to paragraph (2) may indicate or publicize the contents of certification, as prescribed by Presidential Decree. No person who fail to obtain certification shall indicate a certification mark or similar thereto.

    (5) Where certification under paragraph (2) falls under any of the following subparagraphs, the Minister of Science and ICT shall revoke the certification: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Where certification is obtained by deceit or other wrongful means;

    2. Where it fails to meet quality standards;

    3. Where this Act or orders issued under this Act are violated.

    (6) An insurance company under subparagraph 6 of Article 2 of the Insurance Business Act may guarantee compensation for damage suffered by users due to certification under paragraph (2), as prescribed by Presidential Decree.

    (7) Matters necessary for procedures for certification under paragraph (2), revocation of certification under paragraph (5), etc. shall be prescribed by Presidential Decree.

    Article 18 (Support for Research and Development of Small and Medium Enterprises, etc.)

    (1) In implementing a research and development project concerning information and communications technology prescribed by this Act, the Minister of Science and ICT shall preferentially use above the rate prescribed by Presidential Decree, out of the budget of the relevant project, for small and medium enterprises and venture businesses. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT shall endeavor to vitalize investment in and financing for the intellectual property rights of small and medium enterprises and venture businesses. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for the procedures, methods, etc. for implementation under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    Article 19 (Support for Commercialization of Promising Technologies, Services, etc. for Convergence, etc. of Information and Communications Technology)

    (1) The Minister of Science and ICT may provide necessary support for the commercialization of promising technologies, services, etc. for the convergence, etc. of information and communications technology publicly announced by the Minister of Science and ICT pursuant to Article 15. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT may collect a price for the use, transfer, lease, or export of the results of projects from a person who makes success in commercialization after receiving support under paragraph (1). (Amended by Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for support and the collection, management, etc. of money under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    Article 20 (Vitalization of Public Purchase of Technologies and Services for Convergence, etc. of Information and Communications)

    In order to create demand for technologies and services for the convergence, etc. of information and communications of which the quality is certified by the Minister of Science and ICT pursuant to Article 17, the Government shall take necessary supportive measures, such as preferential purchase thereof. (Amended by Act nº 14839, Jul. 26, 2017)

    SECTION 3.- Promotion of Digital Contents, Software, etc.

    Article 21 (Promotion and Vitalization of Digital Contents)

    (1) The Government shall create an environment in which creativity of the producers of digital contents is heightened and promising digital contents are created, distributed, and used, and endeavor to strengthen the competitiveness of related industries.

    (2) In order to promote and vitalize digital contents, the Government may implement the following projects:

    1. Support for the production and distribution of digital contents;

    2. Regional cooperation and demonstration projects concerning digital contents;

    3. Support for the construction of infrastructure for digital contents;

    4. Support for fostering specialized human resources concerning digital contents;

    5. Projects for the study of policies for the promotion and vitalization of digital contents;

    6. Other matters prescribed by Presidential Decree for the promotion and vitalization of digital contents.

    (3) The Government may designate an institution to take exclusive charge of the projects referred to in paragraph (2) for their efficient promotion, and fully or partially subsidize the necessary expenses.

    (4) Matters necessary for the support projects under paragraph (2) and the designation, etc. of institutions to take exclusive charge under paragraph (3) shall be prescribed by Presidential Decree.

    Article 22 (Establishment of Order in Distribution of Digital Contents)

    (1) The Government shall endeavor to establish fair order in the distribution of digital contents, and formulate and implement related policy measures.

    (2) The Minister of Science and ICT may conduct a fact-finding survey of the channels, etc. of distribution in order to establish fair order in the distribution of digital contents, and publish the results of such survey. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) In order to establish fair order in the transaction and distribution of digital contents, the Minister of Science and ICT shall prepare a standard form contract concerning digital contents transaction after consultation with the Fair Trade Commission, the Ministry of Culture, Sports and Tourism, and the Korea Communications Commission, and recommend digital content business entities and organizations to use such contract. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) Where the Minister of Science and ICT enacts or amends the standard form contract under paragraph (3), he/she shall hear the opinions of the relevant digital content business entities and organizations. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 23 (Rationalization of Software Projects in Public Sector)

    (1) Where the head of a relevant central administrative agency, local government, or public institution places an order for a software project, he/she shall calculate appropriate period for the project; where the period for the project exceeds one year, he/she may conclude a long-term continuing contract. In such cases, he/she shall issue an order to implement the relevant contract within budgetary limit for each fiscal year.

    (2) The Minister of Science and ICT may determine and publicly notify standards for the calculation of appropriate period for projects under paragraph (1). (Amended by Act nº 14839, Jul. 26, 2017)

    Article 24 (Operation of the Software Policy and Research Institute)

    (1) The Minister of Science and ICT may operate a software policy research institute (hereinafter referred to as the “research institute”) to effectively support research in software engineering. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The research institute shall implement the following projects:

    1. Research of software policies;

    2. Analyzing, providing, and sharing statistics and information on the software industry;

    3. Searching and planning new software projects;

    4. Other projects prescribed by Presidential Decree.

    (3) The Government may make contributions to the research institute to cover the expenses incurred for the operation, etc. within budgetary limit.

    Article 25 (Facilitation of Convergence of Software)

    (1) In order to facilitate the convergence of software, the Government shall prepare necessary policy measures.

    (2) The policy measures under paragraph (1) shall include the following matters:

    1. Formulation and implementation of policies to facilitate the convergence of software;

    2. Vitalization of demand, such as promotion and expansion of pilot projects concerning the convergence of software;

    3. Development of technologies for the convergence of software and support for the standardization thereof;

    4. Fostering of the industry of software convergence, support for export, creation and development of clusters;

    5. Other matters necessary for the facilitation of software convergence.

    Article 26 (Vitalization of Research and Development of Software)

    (1) In conducting national research and development projects of software pursuant to related statutes, the Government may determine a separate support system and evaluation method in consideration of the characteristics of the software industry as an asset in knowledge and information.

    (2) The support system and evaluation method under paragraph (1) shall be prescribed by Presidential Decree.

    Article 27 (Promotion for Making Full Use of Commercial Software)

    (1) The heads of State agencies, etc. shall endeavor to promote making full use of commercial software and to calculate appropriate price, including maintenance expenses.

    (2) The Minister of Science and ICT may implement the following projects in order to support the promotion for making full use of commercial software pursuant to paragraph (1): (Amended by Act nº 14839, Jul. 26, 2017)

    1. Collection and analysis of information on commercial software products;

    2. Examination of quality and technological support for the promotion for making full use of commercial software;

    3. Comparison and evaluation of the quality and performance of commercial software;

    4. Support for technological development of commercial software and the standardization thereof;

    5. Other projects necessary for the vitalization of distribution of commercial software.

    (3) In order to calculate the appropriate price of commercial software pursuant to paragraph (1), the Minister of Science and ICT may collect and analyze the following information on commercial software and provide the results of such analysis to State agencies, etc.: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Product identification information on commercial software;

    2. Operating environment for commercial software;

    3. Commercial software component elements and applicable standards;

    4. Information on product characteristics, such as functionality, reliability, usability, and maintainability;

    5. Other matters necessary for the calculation of appropriate price, including expenses for the maintenance of commercial software.

    (4) In order to comprehensively manage information on commercial software under paragraph (3), the Minister of Science and ICT may request the heads of State agencies, etc., or software enterprisers to submit necessary data. (Amended by Act nº 14839, Jul. 26, 2017)

    (5) The Minister of Science and ICT may entrust specialized institutions designated pursuant to Article 14 (5) of the Software Industry Promotion Act with duties under paragraphs (2) through (4) in order to efficiently perform such duties. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 28 (Installation Projects of Information and Communications Technology Equipment in Public Sector)

    (1) Where the heads of central administrative agencies, local governments, and public institutions conclude a contract for installing information and communications technology equipment, they shall preferentially adopt a contract method by which a bidder under Article 10 (2) 3 of the Act on Contracts to which the State is a Party shall be a successful bidder: Provided, That if necessary when considering the characteristics of an installation project of information and communications technology equipment, this shall not apply.

    (2) The Minister of Science and ICT and the Minister of Government Administration and Home Affairs may determine and publicly notify matters concerning contracts and operations under paragraph (1); the Minister of Government Administration and Home Affairs may publicly notify matters concerning the information system under subparagraph 13 of Article 2 of the Electronic Government Act; and the heads of central administrative agencies, local governments, and public institutions shall comply therewith. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) The heads of central administrative agencies, local governments, and public institutions shall, each year, notify the Minister of Science and ICT and the Minister of Government Administration and Home Affairs of the information prescribed by Presidential Decree, such as the current state of contracts for installing information and communications technology equipment. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) The Minister of Science and ICT and the Minister of Government Administration and Home Affairs may, each year, inspect the current state of use of information and communications technology equipment by public institutions. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    Article 29 (Forecast of Demand for Information and Communications Technology Equipment)

    (1) The heads of central administrative agencies, local governments, and public institutions shall formulate a promotional plan to efficiently implement installation projects of information and communications technology equipment under Article 28 (1).

    (2) The heads of central administrative agencies, local governments, and public institutions shall submit a promotional plan under paragraph (1) and information on demand for purchase of information and communications technology equipment to the Minister of Science and ICT and the Minister of Government Administration and Home Affairs. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (3) The Minister of Science and ICT and the Minister of Government Administration and Home Affairs shall publish the promotional plan and information on demand for purchase submitted pursuant to paragraph (2). (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (4) In order to efficiently perform duties under paragraphs (2) and (3), the Minister of Science and ICT and the Minister of Government Administration and Home Affairs may designate specialized institutions, and fully or partially subsidize them the necessary expenses. (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    (5) Frequency of, timing for, method of, and procedure for submission under paragraph (2) and publication under paragraph (3), designation and support of specialized institutions under paragraph (4), and other necessary matters shall be prescribed by Presidential Decree.

    CHAPTER IV.- SUPPORT, ETC. FOR ACTIVATION OF CONVERGENCE, ETC. OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

    SECTION 1.- Support for Venture Businesses and Vitalization of Technology Transactions, etc.

    Article 30 (Establishment of Small and Medium Enterprises, Venture Businesses, etc., Entry into Overseas Markets, etc.)

    (1) In order to vitalize and support the establishment of small and medium enterprises, venture businesses, etc. related to the convergence, etc. of information and communications technology, the Minister of Science and ICT may implement the following projects: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Support for the establishment of small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology in Korea and abroad, and for entry into overseas markets;

    2. Supply of work space and conference halls to small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology;

    3. Supply of information on financing, human resources, markets, etc., and support therefor to small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology;

    4. Consultation on laws, management, tax, etc. for small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology;

    5. Overseas publicity of technologies developed by small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology, supply of information on purchasers, and referral and brokerage of sale;

    6. Support for translation services and legal services for the easy entry into overseas markets by small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology;

    7. Supply of information on overseas markets concerning the convergence, etc. of information and communications technology and support for the inducement of investment;

    8. Building and operation of a base for entry into overseas markets by small and medium enterprises, venture businesses, etc. relating to the convergence, etc. of information and communications technology;

    9. Exchange and cooperation with relevant institutions in Korea and abroad for the development of venture businesses relating to the convergence, etc. of information and communications technology;

    10. Other projects necessary for the vitalization and support of business startups and entry into overseas markets.

    (2) In order to efficiently implement projects listed in paragraph (1), the Minister of Science and ICT may designate and operate institutions or organizations prescribed by Presidential Decree as specialized institutions, and fully or partially subsidize them the necessary expenses. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 31 (International Cooperation and Operation, etc. of Global Consultative Body)

    (1) The Minister of Science and ICT shall ascertain relevant international trend necessary for the promotion of information and communications technology and the vitalization of convergence thereof, and promote international cooperation. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) In order to promote international cooperation under paragraph (1), the Minister of Science and ICT may perform the following duties: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Support for international exchange of human resources relating to the convergence, etc. of information and communications technology;

    2. Support for overseas specialized education of human resources relating to the convergence, etc. of information and communications technology and for overseas training;

    3. Support for international standardization relating to the convergence, etc. of information and communications technology and for international joint research and development projects, etc.;

    4. Cooperation with international organizations relating to the convergence, etc. of information and communications technology, and with foreign governments;

    5. Support for international cooperation in the private sector relating to the convergence, etc. of information and communications technology;

    6. Other matters prescribed by Presidential Decree concerning international cooperation.

    (3) For the promotion of information and communications technology and the vitalization of convergence thereof, the Minister of Science and ICT may organize a global consultative body consisting of foreign experts relating to information and communications technology. In such cases, the Minister of Science and ICT may subsidize expenses incurred for the composition and operation of the global consultative body. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) Matters necessary for the composition, operation, etc. of the global consultative body under paragraph (3) shall be prescribed by Presidential Decree.

    Article 32 (Support for Development, etc. of Technologies and Services for Convergence, etc. of Information and Communications Technology)

    (1) The Minister of Science and ICT shall endeavor to enhance the productivity and value of information and communications technology by grafting information and communications technology onto other industries, services, etc. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) In order to facilitate the development of technologies and services for the convergence, etc. of information and communications technology, the Minister of Science and ICT may implement the following projects: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Research and development projects concerning technologies and services for the convergence, etc. of information and communications technology;

    2. Planning, evaluation, and management of tasks to be performed pursuant to subparagraph 1;

    3. Support for referral and brokerage for the transfer of technologies, such as transactions, etc. of technologies for the convergence, etc. of information and communications technology held by the State, local governments, universities, government-funded research institutes, civilians, etc.;

    4. Evaluation of technologies for the convergence, etc. of information and communications technology, and development and dissemination of evaluation methods;

    5. Collection, analysis, and supply of information on the statistical surveys, research, etc. concerning the transfer and commercialization of technologies for the convergence, etc. of information and communications technology;

    6. Support for the research and development of commercialization of technologies for the convergence, etc. of information and communications technology after the technologies are transferred;

    7. Fostering of human resources specializing in the commercialization of technologies for the convergence, etc. of information and communications technology;

    8. Development and making full use of an information system to facilitate transactions and commercialization of technologies for the convergence, etc. of information and communications technology;

    9. Management, publicity, and making full use of outcomes from research concerning the convergence, etc. of information and communications technology, such as intellectual property rights;

    10. Projects of research on policies, such as surveys of the level of technologies and services for the convergence, etc. of information and communications technology;

    11. Demonstration projects concerning technologies and services for the convergence, etc. of information and communications technology;

    12. Other projects necessary for the promotion of information and communications technology.

    (3) In order to implement projects listed in paragraph (2), the Minister of Science and ICT may establish an institution, which is a legal entity to take exclusive charge thereof, or entrust legal entities or organizations with the operation thereof, and may make contributions to or fully or partially subsidize the necessary expenses within budgetary limit. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) The heads of central administrative agencies and local governments may require institutions in exclusive charge under paragraph (3) to perform projects listed in paragraph (2), and fully or partially subsidize them the expenses incurred in performing such projects.

    (5) Except as otherwise provided for in this Act, the provisions of the Civil Act concerning incorporated foundation shall apply mutatis mutandis to institutions in exclusive charge under paragraph (3); and matters necessary for the operation of institutions in exclusive charge and for the performance of projects listed in paragraph (2) shall be prescribed by Presidential Decree.

    Article 33 (Vitalization of Technology Transactions)

    (1) The Minister of Science and ICT shall endeavor to create an environment in which transactions of technologies for the convergence, etc. of information and communications are vitalized. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) In order to vitalize the transactions of technologies for the convergence, etc. of information and communications, the Minister of Science and ICT may evaluate new technologies, collect, analyze, and supply relevant information, provide support for the development of commercialization, and perform other duties. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 34 (Collection and Use of Royalties)

    (1) Where the projects of developing technologies and services for the convergence, etc. of information and communications under Article 32 (2) are completed, the Minister of Science and ICT may collect royalties from persons who intend to use, transfer, lease, or export the outcomes of such projects. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT shall use the royalties collected pursuant to paragraph (1) for the projects of developing technologies and services for the convergence, etc. of information and communications under Article 32 (2). (Amended by Act nº 14839, Jul. 26, 2017)

    (3) Matters necessary for the collection, management, use, etc. of royalties under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    SECTION 2.- Vitalization of Convergence, etc. of Information and Communications Technology

    Article 35 (Encouragement of Expansion of Culture of Convergence, etc. of Information and Communications Technology)

    (1) In order to heighten people’s understanding of the convergence, etc. of information and communications technology and to disseminate the culture of convergence, etc. of information and communications technology, the Minister of Science and ICT may implement the following projects: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Searching exemplary cases of public institutions and enterprises contributed to the convergence, etc. of information and communications technology, awarding prizes thereto, and publicizing them;

    2. Giving education and holding seminars for the proliferation and vitalization of the convergence, etc. of information and communications technology;

    3. Other projects that the Minister of Science and ICT deems necessary.

    (2) Matters necessary for the methods, procedures, etc. for implementation of projects under paragraph (1) shall be prescribed by Presidential Decree.

    Article 36 (Prompt Handling of New Technologies and Services for Convergence, etc. of Information and Communications)

    (1) Where a person who develops new technologies and services for the convergence, etc. of information and communications fails to obtain permission, approval, registration, authentication, verification, etc. (hereinafter referred to as “permission, etc.”) under statutes due to any of the following causes, or whether he/she needs permission, etc. is not clear, he/she may file with the Minister of Science and ICT an application for prompt handling of the new technologies and services for the convergence, etc. of information and communications, as prescribed by Presidential Decree: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Where standards, specifications, requirements, etc. compatible with new technologies and services for the convergence, etc. of information and communications are not prescribed by statutes being the grounds for permission, etc.;

    2. Where applying the standards, specifications, requirements, etc. under statutes being the grounds for permission, etc. to the relevant new technologies and services for the convergence, etc. of information and communications is not appropriate.

    (2) Where the Minister of Science and ICT receives an application under paragraph (1), he/she shall notify the head of a relevant central administrative agency of the fact that an application for permission, etc. for new technologies and services for the convergence, etc. of information and communications is filed and of the details of the application. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) The head of the relevant central administrative agency shall reply to the Minister of Science and ICT whether the new technologies and services for the convergence, etc. of information and communications are under his/her jurisdiction or whether permission, etc. therefor are needed within 30 days from the date he/she receives notification under paragraph (2). Where he/she fails to make reply within 30 days, the duties shall be deemed not to fall under his/her jurisdiction or permission therefor of the head of the relevant central administrative agency shall be deemed unnecessary. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) The Minister of Science and ICT shall immediately notify the applicant of a reply under paragraph (3) (including whether permission, etc. pursuant to statutes under the jurisdiction of the Ministry of Science and ICT are necessary), or whether temporary permission, etc. under Article 37 (1) is needed, etc. (Amended by Act nº 14839, Jul. 26, 2017)

    (5) Except for cases in which notification received from the Minister of Science and ICT pursuant to paragraph (4) states that permission, etc. of the Minister of Science and ICT or the head of the relevant central administrative agency are needed or that temporary permission under Article 37 (1) is needed, the relevant applicant may freely launch new technologies and services for the convergence, etc. of information and communications on the market. (Amended by Act nº 14839, Jul. 26, 2017)

    (6) Where the head of the relevant central administrative agency deems that an application for new technologies and services for the convergence, etc. of information and communications under paragraph (1) is in need of permission, etc. under related statutes, he/she shall reply the conditions, procedures, etc. necessary for permission, etc.; and where the applicant applies for permission, etc. according to the contents of the reply, he/she shall promptly handle it according to the related statutes.

    (7) Except as otherwise provided for in paragraphs (1) through (6), matters necessary for prompt handling, etc. of new technologies and services for convergence, etc. of information and communications shall be prescribed by Presidential Decree.

    Article 37 (Temporary Permission)

    (1) Where the Minister of Science and ICT receives a reply that new technologies and services for the convergence, etc. of information and communications for which an application for prompt handling is filed pursuant to Article 36 (1) do not fall under the jurisdiction of the heads of other relevant central administrative agencies according to abovementioned Article or deems that they do not fall under the jurisdiction of the heads of other relevant central administrative agencies, and needs to establish proper or appropriate standards, specifications, requirements, etc. in consideration of the characteristics of the relevant new technologies and services for the convergence, etc. of information and communications, he/she may temporarily grant permission, etc. (hereinafter referred to as “temporary permission“). In such cases, the Minister of Science and ICT may attach necessary conditions for the stability, etc. of new technologies and services for the convergence, etc. of information and communications. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT may conduct any test and inspection for temporary permission or designate an institution or organization having specialized human resources and technology as an institution for testing and inspection. (Amended by Act nº 14839, Jul. 26, 2017)

    (3) The term of validity of temporary permission shall be up to one year, as prescribed by Presidential Decree. The term of validity may be extended one time only; a person who intends to have the term of validity extended shall file an application with the Minister of Science and ICT two months before the term of validity expires. (Amended by Act nº 14839, Jul. 26, 2017)

    (4) In order to compensate for damage that the users of new technologies and services for the convergence, etc. of information and communications may suffer if a person who intends to supply new technologies and services for the convergence, etc. of information and communications after obtaining temporary permission fails to supply such services, he/she shall, before supplying such services, take out guarantee insurance which names a person designated by the Minister of Science and ICT as the insured in an amount calculated according to the standard prescribed by Presidential Decree within the scope of total fees that he/she is to charge: Provided, That where the Minister of Science and ICT deems guarantee insurance is unnecessary in consideration of the characteristics of new technologies and services for the convergence, etc. of information and communications or the financial ability of the enterpriser, he/she may be allowed not to take out guarantee insurance. (Amended by Act nº 14839, Jul. 26, 2017)

    (5) A person designated as the insured pursuant to paragraph (4) shall pay insurance claims which he/she receives according to the guarantee insurance to users who are not supplied with services after paying fees.

    (6) A person who obtains temporary permission shall notify the users of the relevant new technologies and services for the convergence, etc. of information and communications of the temporary permission and the term of validity.

    (7) The heads of relevant central administrative agencies who are influenced by temporary permission may submit their opinions to the Minister of Science and ICT. (Amended by Act nº 14839, Jul. 26, 2017)

    (8) Necessary matters, such as standards for examination of new technologies and services for the convergence, etc. of information and communications, and the procedures, methods, etc. therefor shall be prescribed by Presidential Decree.

    Article 38 (Revocation of Temporary Permission)

    (1) Where a person who obtains temporary permission pursuant to Article 37 (1) falls under any of the following subparagraphs, the Minister of Science and ICT shall revoke the temporary permission: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Where he/she has obtained the temporary permission by deceit or other wrongful means;

    2. Where he/she fails to meet conditions under Article 37 (1);

    3. Where he/she no longer meets the standards for examination under Article 37 (8).

    (2) A person whose temporary permission is revoked pursuant to paragraph (1) shall not sell, use, supply relevant technologies and services, or conduct any other business related thereto.

    CHAPTER V.- SUPPLEMENTARY PROVISIONS

    Article 39 (Raising of Funds)

    In order to promote information and communications technology and to vitalize the convergence thereof, the Minister of Science and ICT may use funds of the Broadcast Communications Development Fund under Article 24 of the Framework Act on Broadcasting Communications Development and the Fund for the Promotion of Information and Communications under Article 41 of the Information and Communications Technology Industry Promotion Act. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 40 (Hearings)

    Where the Minister of Science and ICT intends to issue the following disposition, he/she shall hold a hearing: (Amended by Act nº 14839, Jul. 26, 2017)

    1. Revocation of certification under Article 17 (5);

    2. Revocation of temporary permission under Article 38 (1).

    Article 41 (Delegation and Entrustment of Authority and Duties)

    (1) The authority of the Minister of Science and ICT under this Act may be partially delegated to the heads of affiliated agencies, as prescribed by Presidential Decree. (Amended by Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT may partially entrust relevant institutions, organizations, etc. with the duties under this Act, as prescribed by Presidential Decree. (Amended by Act nº 14839, Jul. 26, 2017)

    Article 42 (Legal Fiction as Public Official for Purposes of Penalty Provisions)

    Any of the following executive officers and employees of institutions, juristic persons, or organizations shall be deemed a public official for the purposes of Articles 129 through 132 of the Criminal Act: (Amended by Act nº 12844, Nov. 19, 2014; Act nº 14839, Jul. 26, 2017)

    1. A working committee for the promotion of vitalization under Article 9;

    2. A Korean comprehensive software education school under Article 11;

    3. A specialized institution for projects for the standardization of technologies, services, etc. for the convergence, etc. of information and communications technology designated by the Minister of Science and ICT pursuant to Article 16 (3);

    4. A certification organization of technologies, services, etc. for the convergence, etc. of information and communications technology designated by the Minister of Science and ICT pursuant to Article 17 (3);

    5. An institution in exclusive charge of projects for the promotion and vitalization of digital contents designated by the Government pursuant to Article 21 (3);

    6. A research institute under Article 24;

    7. A specialized institution designated by the Minister of Science and ICT or the Minister of Government Administration and Home Affairs pursuant to Article 29 (4);

    8. An legal entity or organization established, entrusted, or operated by the Minister of Science and ICT pursuant to Article 32 (3);

    9. An institution for testing and inspection designated by the Minister of Science and ICT pursuant to Article 37 (2);

    10. An institution or organization entrusted with some of the duties under this Act by the Minister of Science and ICT pursuant to Article 41 (2).

    Article 43 (Prohibition of Divulging Classified Information)

    The executive officers and employees of institutions, juristic persons, or organizations falling under any of the subparagraphs of Article 42 or persons who have been in such post shall not divulge classified information that they have become aware of in the course of performing their duties.

    CHAPTER VI.- PENALTY PROVISONS

    Article 44 (Penalty Provisions)

    (1) Each of the following persons shall be punished by imprisonment with labor for not more than three years or by a fine not exceeding 30 million won:

    1. A person who obtains certification under Article 17 (2) by deceit or other wrongful means;

    2. A person who obtains temporary permission under Article 37 by deceit or other wrongful means;

    3. A person who divulges classified information that he/she has become aware of in the course of performing his/her duties, in violation of Article 43.

    (2) A person indicating a mark of certification or similar thereto without obtaining certification, in violation of the latter part of Article 17 (4) shall be punished by a fine not exceeding five million won.

    Article 45 (Joint Penalty Provisions)

    If the representative of a juristic person or organization or an agent, employee, or other servant of a juristic person, organization, or individual commits any violation described in Article 44 in conducting the business affairs of the juristic person, organization, or individual, not only shall the violator be punished but the juristic person, organization, or individual shall also be punished by a fine prescribed in the relevant provisions: Provided, That where the juristic person, organization, or individual has not been negligent in giving considerable due care and supervision in connectin with the business in order to prevent such violation, this shall not apply.

    Article 46 (Administrative Fines)

    (1) Any of the following persons shall be punished by an administrative fine not exceeding ten million won:

    1. A person who fails to take out guarantee insurance, in violation of Article 37 (4);

    2. A person who sells, uses, supplies, etc. relevant technologies and services after temporary permission is revoked, in violation of Article 38 (2).

    (2) Administrative fines under paragraph (1) shall be imposed and collected by the Minister of Science and ICT. (Amended by Act nº 14839, Jul. 26, 2017)

    ADDENDUM

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDA (Act nº 12844, Nov. 19, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That among the Acts amended pursuant to Article 6 of the Addenda, the amended provisions of the Acts, which were promulgated before this Act enters into force but the dates on which they are to enter into force have yet to arrive, shall enter into force on the date each relevant Act enters into force, respectively.

    Articles 2 through 7 Omitted.

    ADDENDUM (Act nº 13016, Jan. 20, 2015)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 14839, Jul. 26, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That among the Acts amended pursuant to Article 5 of the Addenda, the amended provisions of the Acts, which were promulgated before this Act enters into force but the dates on which they are to enter into force have yet to arrive, shall enter into force on the enforcement dates of the respective Acts.

    Articles 2 through 6 Omitted.

    02Nov/21

    Act nº 7372, Jan. 27, 2005, on the Protection, Use, etc. of Location Informatión

    Act nº 7372, Jan. 27, 2005, on the Protection, Use, etc. of Location Informatión. (Amended by Act nº 8002, Sep. 27, 2006, Act nº 8367, Apr. 11, 2007, Act nº 8486, May 25, 2007, Act nº 8775, Dec. 21, 2007, Act nº 8867, Feb. 29, 2008, Act nº 9481, Mar. 13, 2009, Act nº 9483, Mar. 13, 2009, Act nº 11423, May 14, 2012, Act nº 11690, Mar. 23, 2013, Act nº 11717, Mar. 23, 2013, Act nº 12840, Oct. 15, 2014, Act nº 13203, Feb. 3, 2015, Act nº 13540, Dec. 1, 2015, Act nº 14224, May 29, 2016, Act nº 14839, Jul. 26, 2017, Act nº 14840, Jul. 26, 2017, Act nº 15608, Apr. 17, 2018, Act nº 16087, Dec. 24, 2018).

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to protect privacy from the divulging, abuse and misuse of location information, provide a safe environment for using location information, and activate the use of location information, thus contributing to the improvement of people’s standard of living and the promotion of public welfare.

    Article 2.- (Definitions)

    The definitions of the terms used in this Act shall be as follows: (Amended by Act nº 10166, Mar. 22, 2010; Act nº 13203, Feb. 3, 2015)

    1. The term “location information” means information about a place where a portable object or an individual exists or has existed at a certain time, which is collected using telecommunications equipment facilities or telecommunications line equipment and facilities prescribed in subparagraph 2 or 3 of Article 2 of the Telecommunications Business Act;

    2. The term “personal location information” means the location information regarding a particular person (including information readily combinable with other information to track the location of a particular person even though location information alone is not sufficient to identify the location of such person);

    3. The term “subject of personal location information” means a person identified with personal location information;

    4. The term “data verifying the collection of location information” means data regarding a person who has requested the collection of location information and the date, time, and methods of collection thereof (excluding location information);

    5. The term “data verifying the use and provision of location information” means data regarding the person receiving location information, the channel of acquisition thereof, and the date, time, and methods of use and provision thereof (excluding location information);

    6. The term “location information business” means engaging in the business of collecting location information and providing such information to location-based service providers;

    7. The term “location-based service business” means engaging in the business of providing services based on location information (hereinafter referred to as “location-based services“);

    8. The term “location information system” means a combination of computer hardware, software, database, and human resources organically interlinked through information and communications networks defined in Article 2 (1) 1 of the Act on Promotion of Information and Communications Network Utilization and Information Protection to collect, store, analyze, use, and provide location information for location information business and location-based service business.

    Article 3 (Seeking Measures to Protect and Use Location Information)

    In order to ensure the safe protection and sound use, etc. of location information, the Korea Communications Commission shall seek measures including the following, after consultation with the heads of relevant central administrative agencies: (Amended by Act nº 8867, Feb. 29, 2008; Act nº 16087, Dec. 24, 2018)

    1. The basic policy direction for protecting and using location information;

    2. Matters concerning the protection of location information (including matters relating to protection of location information of a child under the age of 14 who may not have a clear understanding of the risks and consequences arising from the processing of location information, the rights of a subject of personal location information, and other relevant issues);

    3. Matters concerning the use of location information for public purposes;

    4. Matters concerning the development and standardization of technology related to location information business and location-based service business;

    5. Matters concerning the enhancement of safety and reliability of location information business and location-based service business;

    6. Matters concerning the improvement and evaluation of the quality of location information business and location-based service business;

    7. Other matters necessary for the protection and use of location information.

    Article 4 (Relationship with Other Statutes)

    Except as otherwise provided in other statutes, the collection, storage, protection, and use of location information shall be subject to such conditions as provided in this Act.

    CHAPTER II.- PERMISSION FOR LOCATION INFORMATION BUSINESS

    Article 5 (Permission for Location Information Business Handling Personal Location Information)

    (1) Any person who intends to engage in location information business handling personal location information shall obtain permission from the Korea Communications Commission for his/her trade name, location of the main office, type and description of the relevant location information business, and major business facilities, including location information systems, as prescribed by Presidential Decree. (Amended by Act nº 8775, Dec. 21, 2007; Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    (2) Deleted. (by Act nº 9481, Mar. 13, 2009)

    (3) In order to grant permission under paragraph (1), the Korea Communications Commission shall comprehensively examine the following: (Amended by Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    1. Feasibility of a plan for location information business;

    2. Plans to take technical and managerial measures relating to the protection of personal location information;

    3. Propriety of the scale of facilities relating to location information business;

    4. Financial and technical capabilities;

    5. Other matters necessary for running the business.

    (4) When the Korea Communications Commission grants permission pursuant to paragraph (1), it may attach conditions necessary to conduct research and development to improve accuracy and reliability of location information, fair competition, or protection of personal location information. (Amended by Act nº 8867, Feb. 29, 2008)

    (5) Only corporations shall be eligible for permission under paragraph (1). (Amended by Act nº 15608, Apr. 17, 2018)

    (6) Matters concerning guidelines and procedures for obtaining permission prescribed in paragraph (1); and detailed examination standards for each item for examination under paragraph (3), shall be prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008)

    (7) When any person who has obtained permission for location information business in accordance with paragraph (1) (hereinafter referred to as “personal location information provider“) intends to change a location information system (limited to where such change results in deteriorating the level of technology for protecting personal location information, subsequent to obtaining the permission) among permitted matters, he/she shall obtain permission to change such matter from the Korea Communications Commission as prescribed by Presidential Decree; and when he/she intends to change the trade name or the location of the main office, he/she shall report such change to the Korea Communications Commission. (Amended by Act nº 8775, Dec. 21, 2007; Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    (8) Upon receiving an application for permission under paragraph (1) or for permission to change a matter under paragraph (7), the Korea Communications Commission shall grant such permission or the permission to change such matter, except in any of the following cases: (Inserted by Act nº 13203, Feb. 3, 2015)

    1. Where the application fails to pass the examination under paragraph (3);

    2. Where the applicant is not a corporation;

    3. Where an executive officer of the applicant corporation falls under any subparagraph of Article 6 (1);

    4. Where three years have not passed since the applicant corporation received a disposition to revoke permission or an order to discontinue business operations under Article 13 (1);

    5. Where the application contravenes any restriction under this Act or any other statute.

    Article 5-2 (Reporting on Location Information Business Not Handling Personal Location Information)

    Any person who intends to engage in location information business not handling personal location information, shall report the following matters to the Korea Communications Commission, as prescribed by Presidential Decree:

    1. Trade name;

    2. Principal place of business;

    3. Type and details of location information business;

    4. Main business facilities, including a location information system.

    (2) Any person (if the person is a corporation, including its representative) for whom one year has not passed since the person was ordered to cease business operations under Article 13 (1) shall be prohibited from reporting another location information business under paragraph (1).

    (3) If a person who has reported his/her location information business pursuant to paragraph (1) (hereinafter referred to as “object location information provider”) intends to change any of the following matters already reported, the person shall report such change to the Korea Communications Commission, as prescribed by Presidential Decree:

    1. Trade name;

    2. Principal place of business;

    3. Location information system (limited to where such change results in deteriorating the level of technology for protecting personal location information, subsequent to filing a report).

    (4) Upon receiving a report under paragraph (1) or a report on a change in the matter specified in paragraph (3) 3, the Korea Communications Commission shall review and accept the report if it meets the requirements of this Act.

    (5) If a personal location information provider has submitted documents necessary for reporting his/her location information business not handling personal location information, as at the time of filing an application for permission under Article 5 (1), such provider shall be deemed to have filed a report under paragraph (1).

    (Article Inserted by Act nº 15608, Apr. 17, 2018)

    Article 6 (Grounds for Disqualification of Executive Officers or Employees)

    (1) None of the following persons shall be qualified to be an executive officer of either a personal location information provider or an object location information provider (hereinafter referred to as “location information provider“); and none of the following employees shall be designated as a person with authorized access under Article 16 (1) (hereafter in this Article referred to as a person with authorized access): (Amended by Act nº 12840, Oct. 15, 2014; Act nº 13203, Feb. 3, 2015; Act nº 13540, Dec. 1, 2015; Act nº 15608, Apr. 17, 2018)

    1. A minor or a person under adult guardianship or under limited guardianship;

    2. A person declared bankrupt but not yet reinstated;

    3. A person for whom three years have not elapsed since his/her imprisonment without labor or heavier punishment declared by a court for violating this Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, the Framework Act on Telecommunications, the Telecommunications Business Act, or the Radio Waves Act, was completely executed (including where it is deemed to completely executed) or was remitted;

    4. A person subject to suspended execution of his/her imprisonment without labor or heavier punishment, declared by a court for violating this Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, the Framework Act on Telecommunications, the Telecommunications Business Act, or the Radio Waves Act;

    5. A person for whom three years have not elapsed since he/she was sentenced to punishment by a fine for violating this Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, the Framework Act on Telecommunications, the Telecommunications Business Act, or the Radio Waves Act;

    6. A person for whom three years have not elapsed since he/she received a disposition to revoke permission or an order to discontinue business operations under Article 13 (1); and in cases of a corporation, a person engaged in conduct giving rise to so revoking permission or an order to discontinue business operations, as well as its representative.

    (2) Where an executive officer falls or is found falling under any subparagraph of paragraph (1) as at the time he/she is appointed, he/she shall resign from office ipso facto; and where a person with authorized access falls or is found falling under any subparagraph of paragraph (1) as at the time he/she is designated, such designation shall be null and void. (Amended by Act nº 13540, Dec. 1, 2015)

    (3) Any conduct in which a resigned executive officer is involved before his/her resignation, or in which an employee whose designation as a person with authorized access is null and void is involved before the nullification under paragraph (2), shall remain in effect. (Amended by Act nº 13540, Dec. 1, 2015)

    Article 7 (Acquisition of Location Information Business or Merger of Corporations)

    (1) Any person who intends to acquire all or part of the business of a personal location information provider, or to merge or split off an incorporated location information provider (including split-off and merger; hereinafter the same shall apply) shall obtain authorization from the Korea Communications Commission, as prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    (2) The Korea Communications Commission shall comprehensively examine the following matters before granting authorization under paragraph (1): (Inserted by Act  13203, Feb. 3, 2015)

    1. Adequacy of financial and technical capacities and capability to manage business;

    2. Impact on protecting subjects of personal location information and location-based service providers;

    3. Impact on public interests, including the efficiency in using personal location information for emergency rescue and in research and development for protecting personal location information.

    (3) Upon receiving an application for authorization under paragraph (1), the Korea Communications Commission shall grant authorization, except in any of the following cases: (Inserted by Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Where the application fails to pass an examination under paragraph (2);

    2. Where the applicant is not a corporation;

    3. Where an executive officer of the applicant corporation falls under any subparagraph of Article 6 (1);

    4. Where three years have not passed since the applicant corporation’s permission was revoked or it was ordered to discontinue business operations under Article 13 (1);

    5. Where the application contravenes any restriction under this Act or any other statute.

    (4) Where all or part of the business of an object location information provider is transferred or inherited; or where an incorporated object location information provider is merged or split off, the transferee or inheritor of the business or the corporation incorporated by the merger or split-off or the corporation surviving the merger or split-off shall report such acquisition, inheritance, merger or split-off to the Korea Communications Commission, as prescribed by Presidential Decree. (Inserted by Act nº 15608, Apr. 17, 2018)

    (5) Upon receiving a report under paragraph (4), the Korea Communications Commission shall review and accept the report if it meets the requirements of this Act. (Inserted by Act nº 15608, Apr. 17, 2018)

    (6) A transferee authorized under paragraph (1), a transferee or inheritor who filed a report under paragraph (4), a corporation incorporated by a merger or split-off, or a corporation surviving a merger or split-off shall succeed to the status of the transferor, the decedent, or the incorporated location information provider existing prior to the merger or split-off, respectively. (Amended by Act nº 15608, Apr. 17, 2018)

    (7) Matters concerning the methods, procedures, etc. for filing an application for authorization under paragraph (1); detailed guidelines for examining each item under paragraph (2); and the methods, procedures, etc. for filing a report under paragraph (4), shall be prescribed by Presidential Decree. (Inserted by Act nº 13203, Feb. 3, 2010; Act nº 15608, Apr. 17, 2018)

    Article 8 (Suspension or Discontinuation of Operations of Location Information Business)

    (1) If a location information provider intends to fully or partially suspend business operations, such provider shall determine the period of suspension of business operations; shall develop a plan to notify the subjects of personal location information of the suspension of business operations (only if the location information provider handles personal location information); and shall either obtain approval therefor from the Korea Communications Commission or report the plan to the Korea Communications Commission as follows. In such cases, the period of suspension of business operations shall not exceed one year:

    1. Personal location information provider: Approval;

    2. Object location information provider: Reporting.

    (2) If a location information provider intends to discontinue business operations fully or partially, such provider shall develop a plan to notify the subjects of personal location information of the discontinuation of business operations (only if the location information provider handles personal location information); and shall either obtain approval therefor from the Korea Communications Commission or report the plan to the Korea Communications Commission as follows:

    1. Personal location information provider: Approval;

    2. Object location information provider: Reporting.

    (3) A personal location information provider who has obtained approval under paragraph (1) 1 or (2) 1 shall notify the subjects of personal location information of the following matters, by not later than the scheduled date of suspension or discontinuation of business operations:

    1. Approval to suspend business operations under paragraph (1) 1: The scope of the suspended location information business and the period of suspension of business operations;

    2. Approval to discontinue business operations under paragraph (2) 1: The scope of the discontinued location information business and the date of discontinuation of business operations.

    (4) When a personal location information provider fully or partially suspends operations of his/her location information business with approval under paragraph (1) 1, or when a location information provider fully or partially discontinues operations of his/her location information business under paragraph (2), such provider shall destroy personal location information and data verifying the collection of location information as follows simultaneously with suspending or discontinuing business operations:

    1. Approval to suspend business operations under paragraph (1) 1: Personal location information (limited to the personal location information, related to the suspended business operations if business operations are partially suspended);

    2. Approval to discontinue business operations under paragraph (2) 1: Personal location information and data verifying the collection of location information (limited to the personal location information and the data verifying the collection of location information, related to the discontinued business operations if business operations are partially discontinued);

    3. Reporting the discontinuation of business operations under paragraph (2) 2: Data verifying the collection of location information (limited to the data verifying the collection of location information related to the discontinued business operations if business operations are partially discontinued).

    (5) Upon receiving an application for approval of a plan to notify the subjects of personal location information on suspending or discontinuing business operations under paragraph (1) 1 or (2) 1, the Korea Communications Commission shall approve the plan, unless it is unreasonable.

    (6) Upon receiving a report under paragraph (1) 2 or (2) 2, the Korea Communications Commission shall review and accept the report, unless it is unreasonable.

    (7) Except as otherwise expressly provided in paragraphs (1) through (6), matters necessary for suspending and discontinuing location information business shall be prescribed by Presidential Decree.

    (Article Amended by Act nº 15608, Apr. 17, 2018)

     Article 9 (Reporting on Location-Based Service Business)

    (1) Any person who intends to engage in location-based service business (excluding location-based service business not handling personal location information; hereafter the same shall apply in this Article and Articles 9-2, 10, and 11) shall report, to the Korea Communications Commission, the trade name; the principal place of business; the type of business; and main business facilities, including location information systems, etc., as prescribed by Presidential Decree. (Amended by Act nº 8775, Dec. 21, 2007; Act nº 8867, Feb. 29, 2008; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    (2) Any person for whom one year has not passed since the person was ordered to discontinue business operations under Article 13 (1) (if the person is a corporation, including its representative) shall be prohibited from reporting another location-based service business under paragraph (1). (Amended by Act nº 15608, Apr. 17, 2018)

    (3) If a person who has reported a location-based service business under paragraph (1) intends to change any of the following, the person shall report the change to the Korea Communications Commission, as prescribed by Presidential Decree: (Amended by Act nº 15608, Apr. 17, 2018)

    1. Trade name;

    2. Principal place of business;

    3. Location information system (limited to where such change results in deteriorating the level of technology for protecting personal location information, subsequent to reporting the business).

    (4) Where a location information provider has submitted the documents required for reporting his/her location-based service business under paragraph (1), when filing an application for permission under Article 5 (1), such provider shall be deemed to have completed the reporting on the location-based service business under paragraph (1) (in cases of micro enterprises, etc. referred to in the main sentence of Article 9-2 (1), referring to reporting under the proviso to the same paragraph). (Amended by Act nº 15608, Apr. 17, 2018)

    (5) Upon receiving a report under paragraph (1) or a report on a change in the matter specified in paragraph (3) 3, the Korea Communications Commission shall review and accept the report if it meets the requirements of this Act. (Inserted by Act nº 15608, Apr. 17, 2018)

     Article 9-2 (Reporting on Location-Based Service Business of Micro Enterprises)

    (1) Notwithstanding Article 9 (1), if a person who is either a micro enterprise, defined in Article 2 of the Act on the Protection of and Support for Micro Enterprises, or a self-employed creative enterprise, defined in Article 2 of the Act on the Fostering of Self-Employed Creative Enterprises, (hereinafter referred to as “micro enterprise or self-employed creative enterprise“) intends to engage in location-based service business, such person may do so without filing a report under Article 9 (1): Provided, That if such person intends to continue location-based service business even one month after the commencement of the business shall report the following matters to the Korea Communications Commission within one month from the commencement date of the business, as prescribed by Presidential Decree:

    1. Trade name;

    2. Principal place of business;

    3. Type and details of business.

    (2) Any person for whom one year has not passed since the person was ordered to discontinue business operations under Article 13 (1) (if the person is a corporation, including its representative) shall be prohibited from reporting another location-based service business under paragraph (1).

    (3) If a person who has filed a report under the proviso to paragraph (1) changes either of the following, the person shall report the change to the Korea Communications Commission within one month from the date of change, as prescribed by Presidential Decree:

    1. Trade name;

    2. Principal place of business.

    (4) If a person who has commenced location-based service business in accordance with the main sentence of paragraph (1) or a person who has filed a report in accordance with the proviso to the same paragraph ceases to be a micro enterprise or self-employed creative enterprise, such person shall file a report with the Korea Communications Commission to supplement matters necessary for reporting under Article 9 (1), within one month from the date the relevant event occurs, as prescribed by Presidential Decree.

    (Article Inserted by Act nº 15608, Apr. 17, 2018)

     Article 10 (Acquisition of Location-Based Service Business or Merger of Corporations)

    (1) If the business of a person who has reported location-based service business in accordance with Article 9 (1) or the proviso to Article 9-2 (1) is fully or partially transferred or inherited; or if a corporation that has reported location-based service business in accordance with Article 9 (1) or the proviso to Article 9-2 (1) is merged or split off, the transferee or inheritor of the business or the corporation incorporated during the merger or split-off or the corporation surviving the merger or split-off shall report such event to the Korea Communications Commission, as prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    (2) Upon receiving a report under paragraph (1), the Korea Communications Commission shall review and accept the report if it meets the requirements of this Act. (Inserted by Act nº 15608, Apr. 17, 2018)

    (3) The transferee or inheritor who has filed a report in accordance with paragraph (1) or the corporation incorporated during a merger or split-off or the corporation surviving a merger or split-off shall succeed to the status of the transferor, the decedent, or the corporation existing prior to the merger or split-off, respectively. (Amended by Act nº 15608, Apr. 17, 2018)

    Article 11 (Suspension or Discontinuation of Operations of Location-Based Service Business)

    (1) If a location-based service provider intends to fully or partially suspend business operations, he/she shall determine the period of suspension; shall notify subjects of personal location information thereof by not later than 30 days before the scheduled date of suspension; and shall report to the Korea Communications Commission thereon. In such cases, the period of suspension shall not exceed one year, and the location-based service provider shall destroy personal location information (limited to personal location information related to the suspended business operations if business operations are partially suspended), simultaneously with suspending the business operations. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    (2) If a location-based service provider intends to fully or partially discontinue business operations, he/she shall notify the subjects of personal location information thereof by not later than 30 days before the date of discontinuation; and shall report to the Korea Communications Commission thereon. In such cases, personal location information and data verifying the use and provision of personal location information (limited to personal location information and data verifying the use and provision of location information related to the discontinued business operations if business operations are partially discontinued) shall be destroyed simultaneously with discontinuing the business operations. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    (3) Matters necessary for reporting the suspension or discontinuation of operations of location-based service business; and for destroying personal location information under paragraphs (1) and (2) shall be prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 15608, Apr. 17, 2018)

    Article 12 (Disclosure of Terms and Conditions of User Agreement)

    (1) Either of the following persons shall disclose to the public, details of the services that the person intends to provide and fee rates, terms and conditions, etc. regarding collecting, using and providing location information (hereinafter referred to as “terms and conditions”) by posting such terms and conditions on the person’s website or by any of the methods prescribed by Presidential Decree so that subjects of personal location information and users of the location-based service business can easily access such terms and conditions at any time; shall disclose grounds for and details of any intended amendment to such terms and conditions by any of the methods prescribed by Presidential Decree, when the person intends to amend the terms and conditions; and shall take measures to ensure that the amended terms and conditions can be easily noticed:

    1. A location information provider;

    2. A person who has reported his/her location-based service business in accordance with Article 9 (1) or a person who engages in location-based service business in accordance with Article 9-2 (1) (hereinafter referred to as “location-based service provider“).

    (2) If the Korea Communications Commission deems that the terms and conditions of a person falling under either subparagraph of paragraph (1) are likely to compromise personal location information, fair competition, or public interest, it may order such person to revise such terms and conditions.

    (Article Inserted by Act nº 15608, Apr. 17, 2018)

    Article 13 (Revocation of Permission and Discontinuation or Suspension of Business Operations)

    (1) In any of the following cases, the Korea Communications Commission may revoke the permission or authorization granted to a location information provider or a location-based service provider (hereinafter referred to as “location information provider or location-based service provider“); or may order a location information provider or location-based service provider to discontinue business operations or fully or partially suspend business operations for a period of up to six months (hereinafter referred to as “suspension of business operations“): Provided, That the permission or authorization granted to a location information provider or location-based service provider shall be revoked, or a location information provider or location-based service provider shall be ordered to discontinue business operations, in the case of subparagraph 1: (Amended by Act nº 8867, Feb. 29, 2008; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Where a location information provider or location-based service provider has obtained permission, modified permission, or authorization under Article 5 (1) or (7) or 7 (1) by fraud or other improper means; or has filed a report under Article 5-2 (1) or 9 (1) or the proviso to Article 9-2 (1) by fraud or other improper means;

    2. Where a location information provider or location-based service provider fails to resume business operations, without good cause, after the period of suspension under Article 8 (1) or 11 (1);

    3. Where a location information provider or location-based service provider fails to continue business operations for at least six months without obtaining approval or filing a report in accordance with any of the following:

    (a) Approval under Article 8 (1) 1 or (2) 1;

    (b) Reporting under Article 8 (1) 2 or (2) 2;

    (c) Reporting under the former part of Article 11 (1) or the former part of Article 11 (2);

    4. Where a material change occurs to the facilities related to the collection of location information or the technical and managerial measures related to the protection of location information, thus preventing continued services;

    5. Where a location information provider or location-based service provider fails to take technical and managerial measures under Article 16 (1) or measures to preserve data verifying the collection of location information and data verifying the collection, use, and provision of location information under Article 16 (2) (hereinafter referred to as “data verifying the collection, use, and provision of location information“);

    6. Where a location information provider or location-based service provider collects, uses, or provides location information without specifying his/her intention to collect, use, or provide location information in his/her terms and conditions or without obtaining consent thereto, in violation of Article 18 (1) or 19 (1);

    7. Where a location information provider or location-based service provider collects, uses, or provides location information, beyond the scope of consent, in violation of Article 18 (2) or 19 (5);

    8. Where a location information provider or location-based service provider uses or provides, to a third party, location information, beyond the scope specified in his/her terms and conditions or notified to the pertinent subject, in violation of Article 21.

    (2) Detailed criteria for administrative measures under paragraph (1) shall be prescribed by Presidential Decree, based upon the type and gravity of the relevant violation.

    Article 14 (Imposition of Penalty Surcharges)

    (1) Where the suspension of business under Article 13 (1) is likely to substantially harm to the interests of subjects of personal location information, the Korea Communications Commission may impose a penalty surcharge not exceeding 3/100 of the sales of the relevant location information business or location-based service business in lieu of an order for business suspension. (Amended by Act nº 8867, Feb. 29, 2008)

    (2) Matters necessary for the criteria and procedures for the imposition of penalty surcharges, such as calculation of the sales referred to in paragraph (1), shall be prescribed by Presidential Decree.

    (3) Where a person obligated to pay a penalty surcharge under paragraph (1) fails to pay such surcharge by the due date, the Korea Communications Commission may collect an additional charge at the rate prescribed by Presidential Decree, from the date after such due date, within the extent not exceeding 8/100 per annum of the surcharge in arrears. (Amended by Act nº 8867, Feb. 29, 2008)

    (4) Where a person obligated to pay a penalty surcharge fails to pay such surcharge by the due date, the Korea Communications Commission shall urge him/her to pay the surcharge, setting the deadline; and where he/she fails to pay the surcharge and the additional charge under paragraph (3) by the deadline, it shall collect them in the same manner as delinquent national taxes are collected. (Amended by Act nº 8867, Feb. 29, 2008)

    CHAPTER III.- PROTECTION OF LOCATION INFORMATION

    SECTION 1.- General Provisions

    Article 15 (Prohibition on Collection of Location Information)

    (1) No one shall collect, use, or provide any location information without consent of the subject of relevant location information: Provided, That the foregoing shall not apply in any of the following cases: (Amended by Act nº 11423, May 14, 2012; Act nº 15608, Apr. 17, 2018)

    1. Where an emergency rescue agency requests emergency rescue under Article 29 (1) or for the issuance of a warning under Article 29 (7);

    2. Where a police agency makes a request under Article 29 (2);

    3. Where otherwise provided in other statutes.

    (2) No one shall obtain personal location information about another person by deceiving a personal location information provider or a location-based service provider (hereinafter referred to as “personal location information provider or a location-based service provider“), by copying the person’s telecommunications device or misappropriating such information. (Amended by Act nº 15608, Apr. 17, 2018)

    (3) Any person who sells, lends, or transfers an object with a built-in device capable of collecting location information shall notify the person who purchases, borrows, or acquires such object of the fact that the object has such built-in device capable of collecting location information. (Amended by Act nº 15608, Apr. 17, 2018)

    Article 16 (Measures for Protecting Location Information)

    (1) Each location information provider, etc. shall take managerial measures, such as establishing guidelines on processing and management of location information to prevent the divulging, alteration, impairment, etc. of location information or designating those with authorized access, and take technical measures, such as installing a firewall or using encryption software. In such cases, details of the managerial measures and technical measures shall be prescribed by Presidential Decree.

    (2) Each location information provider, etc. shall cause data verifying the collection, use, and provision of location information to be automatically recorded and preserved in a location information system.

    (3) In order to protect location information and prevent abuse and misuse of location information, the Korea Communications Commission may authorize affiliated public officials to examine details of the technical and managerial measures taken under paragraph (1), and the preservation status of records under paragraph (2), as prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008)

    (4) Each public official who examines the details of the technical and managerial measures and the status of preservation of records under paragraph (3), shall carry a certificate indicating his/her authority and produce it to persons involved. (Amended by Act nº 13203, Feb. 3, 2015)

    Article 17 (Prohibition on Divulging Location Information)

    No location information provider, etc. nor their current or former employees shall divulge, alter, impair, or disclose any location information acquired in the course of performing their duties.

    Article 17-2 (Notification of Processing of Location Information to Subjects of Personal Location Information)

    Where any location information provider, etc. notify matters regarding processing of location information to a subject of personal location information, such provider, etc. shall use an easy-to-understand form and clear and plain language.

    (Article Inserted by Act nº 16087, Dec. 24, 2018)

    SECTION 2.- Protection of Personal Location Information

    Article 18 (Collection of Personal Location Information)

    (1) Where any location information provider intends to collect personal location information, such provider shall specify, in advance, the following in his/her terms and conditions; and shall obtain consent from the subjects of personal location information: (Amended by Act nº 15608, Apr. 17, 2018)

    1. Trade name, address, phone number and other contact information of the location information provider;

    2. Rights held by the subjects of personal location information and their legal representatives (limited to where consent is required from a legal representative under Article 25 (1)); and methods of exercising such rights;

    3. Details of the services to be provided by the location information provider to a location-based service provider;

    4. Grounds for and period of retaining data verifying the collection of location information;

    5. Other matters prescribed by Presidential Decree as necessary for protecting personal location information.

    (2) A subject of personal location information may withdraw his/her consent for part of the scope of personal location information collected and the terms and conditions, when he/she has given consent under paragraph (1).

    (3) Where any location information provider collects personal location information, he/she shall collect such information to the minimum extent necessary for attaining the purpose of the collection.

    Article 19 (Use or Provision of Personal Location Information)

    (1) Where any location-based service provider intends to provide services using personal location information, such provider shall specify, in advance, the following in his/her terms and conditions; and shall obtain consent from the subjects of personal location information: (Amended by Act nº 15608, Apr. 17, 2018)

    1. Trade name, address, phone number and other contact information of the location-based service provider;

    2. Rights held by the subjects of personal location information and their legal representatives (limited to where the consent of a legal representative is required under Article 25 (1)) and methods of exercising such rights;

    3. Details of the location-based services to be provided by the location-based service provider;

    4. Grounds and period for retaining data verifying the collection of location information;

    5. Other matters prescribed by Presidential Decree as necessary for protecting personal location information.

    (2) Where any location-based service provider intends to provide personal location information to a third party designated by a subject of personal location information, such service provider shall specify details referred to in the subparagraphs of paragraph (1) in his/her terms and conditions; shall inform the subject of personal location information, of the designated recipient of the personal location information and the purpose of provision; and shall obtain his/her consent.

    (3) Where any location-based service provider provides personal location information to a third party designated by a subject of personal location information under paragraph (2), such service provider shall immediately notify, on each occasion, the subject of personal location information, of the designated recipient of such information; and of the date, time, and purpose of such provision.

    (4) Notwithstanding paragraph (3), a location-based service provider may give notice of the occasions altogether to a subject of personal location information at a maximum interval of 30 days in accordance with the guidelines prescribed by Presidential Decree for frequency, period, etc., if such service provider has obtained consent thereto from the subject, as prescribed by Presidential Decree. (Inserted by Act nº 13203, Feb. 3, 2015)

    (5) When a subject of personal location information gives consent under paragraph (1), (2), or (4), he/she may defer his/her consent as to the purposes of using and providing personal location information; the scope of the persons eligible to receive the information; some of the location-based services; and the methods of notifying the subject of personal location information. (Amended by Act nº 13203, Feb. 3, 2015)

    Article 20 (Provision of Personal Location Information by Location Information Providers)

    (1) In order to attain the purposes of using or providing personal location information under Article 19 (1) or (2), any location-based service provider that has obtained consent from the subjects of personal location information pursuant to Article 19 (1) or (2) may request the location information provider that has collected the relevant personal location information to provide such information. In such cases, no location information provider shall refuse to provide such information without good cause.

    (2) Procedures for, and method of location information providers’ providing personal location information to location-based service providers pursuant to paragraph (1) shall be prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008)

    Article 21 (Restriction on Use and Provision of Personal Location Information)

    Unless a location information provider, etc. have obtained consent from a subject of personal location information or except in the following cases, they shall neither use personal location information or data verifying the collection, use, or provision of location information beyond the scope specified in their terms and conditions or notified to the subject in accordance with Articles 18 (1) and 19 (1) and (2) nor provide such information to any third party: (Amended by Act nº 13203, Feb. 3, 2015)

    1. Where data verifying the collection, use, and provision of location information are required to calculate fees related to the provision of location information and location-based services;

    2. Where data is processed in such a way that any specific person cannot be identified, and provided for the purpose of statistics, academic research, or market research.

    Article 22 (Notification of Transfer of Business)

    Any person who has succeeded to the rights and obligations of a location information provider, etc. as a result of the full or partial transfer, merger, inheritance, etc. of their business (hereinafter referred to as “transfer, etc.”), shall notify the following to the subjects of personal location information within 30 days, as prescribed by Presidential Decree:

    1. Full or partial transfer, etc. of the business;

    2. Name, address, phone number and other contact information of the person who has succeeded to the rights and obligations of the location information provider, etc.;

    3. Other matters prescribed by Presidential Decree as necessary for the protection of personal location information protection.

    Article 23 (Destruction of Personal Location Information)

    When any location information provider, etc. attain the purpose of collecting, using or providing personal location information, they shall immediately destroy personal location information other than data verifying the collection, use, and provision of location information that should be recorded and preserved in accordance with Article 16 (2).

    SECTION 3.- Rights Held by Subjects of Personal Location Information

    Article 24 (Rights Held by Subjects of Personal Location information)

    (1) Any subject of personal location information may, at any time, fully or partially withdraw consent given to a location information provider, etc. under Article 18 (1) or 19 (1), (2), or (4). (Amended by Act nº 13203, Feb. 3, 2015)

    (2) Any subject of personal location information may request, at any time, a location information provider, etc. to temporarily suspend collecting, using, or providing location information. In such cases, the location information provider, etc. shall not refuse such request and shall take technical measures accordingly.

    (3) Any subject of personal location information may request a location information provider, etc. to permit him/her to inspect any of the following data or records; or to give notice of any of the following data or records; and may request a location information provider, etc. to correct any error found in relevant data or records. In such cases, no location information provider, etc. shall refuse such request without good cause: (Amended by Act nº 13203, Feb. 3, 2015)

    1. Data verifying the collection, use, and provision of personal location information which relates to the principal;

    2. The ground on which his/her personal location information was provided to a third party pursuant to the provisions of this Act or other statutes, and the relevant details.

    (4) Where any subject of personal location information fully or partially withdraws consent pursuant to paragraph (1), the location information provider, etc. shall, without delay, destroy the personal location information collected so far, as well as the data verifying the collection, use, and provision of location information (limited to personal location information and data verifying the use and provision of location information for the part of which consent is withdrawn, if consent is partially withdrawn). (Amended by Act nº 15608, Apr. 17, 2018)

    Article 25 (Rights Held by Legal Representatives)

    (1) Where any location information provider, etc. intend to collect, use, or provide personal location information from children under 14 years of age pursuant to Article 18 (1), 19 (1) or (2), or 21, they shall obtain the consent of their legal representatives and confirm whether such legal representatives give the consent as prescribed by Presidential Decree. (Amended by Act nº 16087, Dec. 24, 2018)

    (2) Articles 18 (2), 19 (5), and 24 shall apply mutatis mutandis where a legal representative gives consent under paragraph (1). In such cases, “subject of personal location information” shall be construed as “legal representative“. (Amended by Act nº 13203, Feb. 3, 2015)

    Article 26 (Use of Location Information for Protecting Children Eight Years or Younger)

    (1) Where the legal guardian of any of the following persons (hereinafter referred to as “child eight years or younger, etc.”) gives consent to collecting, using, or providing personal location information regarding the child eight years or younger, etc., for the protection of the latter’s health or safety, it shall be deemed that the child, etc. personally consent thereto: (Amended by Act nº 8367, Apr. 11, 2007; Act nº 12840, Oct. 15, 2014; Act nº 13203, Feb. 3, 2015)

    1. A child eight years or younger;

    2. A person under adult guardianship;

    3. A person with a mental disorder defined in Article 2 (2) 2 of the Act on Welfare of Persons with Disabilities, classified as a person with a severe disability defined in subparagraph 2 of Article 2 of the Act on the Employment Promotion and Vocational Rehabilitation of Persons with Disabilities (limited to those registered as disabled persons under Article 32 of the Act on Welfare of Persons with Disabilities).

    (2) The legal guardian of a child eight years or younger, etc. referred to in paragraph (1), means any of the following persons who provides de facto protection for the child, etc.: (Amended by Act nº 8367, Apr. 11, 2007; Amended by Act nº 10517, Mar. 30, 2011; Act nº 12840, Oct. 15, 2014; Act nº 13203, Feb. 3, 2015; Act nº 14224, May 29, 2016; Act nº 15608, Apr. 17, 2018)

    1. The legal representative of a child of eight years old or younger or a guardian under Article 3 of the Act on the Guardianship of Minors in Protective Facilities;

    2. The legal representative of a person under adult guardianship;

    3. The legal representative of a person prescribed in paragraph (1) 3, the head of a residential facility for persons with disabilities under Article 58 (1) 1 of the Act on Welfare of Persons with Disabilities (limited to any facility established and operated by the State or a local government), the head of a mental health sanatorium defined in Article 22 of the Act on the Improvement of Mental Health and the Support for Welfare Services for Mental Patients (limited to any facility established and operated by the State or a local government), or the head of a mental health rehabilitation facility defined in Article 26 of the same Act.

    (3) Requirements for giving consent under paragraph (1) shall be prescribed by Presidential Decree.

    (4) Articles 18 through 22 and 24 shall apply mutatis mutandis where legal guardians give their consent pursuant to paragraph (2). In such cases, “subjects of personal location information” shall be construed as “legal guardians“.

    Article 27 (Compensation for Damage)

    Where a subject of personal location information suffers damage because a location information provider, etc. have violated Articles 15 through 26, he/she may claim damages against the location information provider, etc. In such cases, the location information provider, etc. shall not be exempt from liabilities unless they prove that there was no intention or negligence on their part.

    Article 28 (Mediation in Disputes)

    (1) Where the parties to a dispute related to location information fail to reach an agreement or it is impossible to reach an agreement, the relevant location information provider, etc. may file a petition for adjudication with the Korea Communications Commission. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 13203, Feb. 3, 2015)

    (2) Where the parties to a dispute related to location information fail to reach an agreement or it is impossible to reach an agreement, the relevant location information provider, etc. or the user may file a petition for mediation with the Personal Information Dispute Mediation Committee established under Article 40 of the Personal Information Protection Act. (Amended by Act nº 11690, Mar. 23, 2013)

    CHAPTER IV.- USE OF PERSONAL LOCATION INFORMATION FOR EMERGENCY RESCUE

    Article 29 (Use of Personal Location Information for Emergency Rescue)

    (1) Where any subject of personal location information, his/her spouse or blood-relative within the second degree, or a guardian of a minor under Article 928 of the Civil Act (hereinafter referred to as “spouse, etc.”) requests emergency rescue to protect health or safety from imminent danger, an emergency rescue agency referred to in subparagraph 7 of Article 3 of the Framework Act on the Management of Disasters and Safety (hereinafter referred to as “emergency rescue agency“) may determine whether it is an emergency; and may request a location information provider to provide personal location information. In such cases, no spouse, etc. shall request emergency rescue for any purpose other than emergency rescue.

    (2) The National Police Agency, regional police agencies, and police stations under Article 2 of the Police Act (hereinafter referred to as “police agency“) may request a location information provider to provide any of the following personal location information: Provided, That if a police agency intends to obtain personal location information regarding a person who has requested rescue to protect another person’s health or safety (hereinafter referred to as “witness”) under subparagraph 1, it shall obtain consent from such witness:

    1. Where rescue has been requested for protecting any person, including the witness or person requiring rescue from imminent health- or life-threatening danger (hereinafter referred to as “rescuee“), personal location information regarding the witness;

    2. Where a rescuee has requested rescue from any third person, the personal location information regarding such rescuee;

    3. Where a custodian defined in subparagraph 3 of Article 2 of the Act on the Protection and Support of Missing Children (hereinafter referred to as “custodian“) has requested emergency rescue of a missing child, etc. defined in subparagraph 2 of Article 2 of the same Act (hereinafter referred to as “missing child, etc.”) for protecting the latter’s health or safety, the personal location of such missing child, etc.

    (3) Where any third person has requested rescue from a police agency pursuant to paragraph (2) 2, the police agency shall confirm the intention of the rescuee.

    (4) Requests for emergency rescue under paragraphs (1) and (2) shall be made only by calling special phone numbers prescribed by Presidential Decree and assigned for the sake of maintaining public order and promoting public interest. (Amended by Act nº. 15608, Apr. 17, 2018)

    (5) Any location information provider in receiving a request under paragraph (1) or (2) may collect personal location information without the consent of the relevant subject of personal location information; and shall not refuse such request by an emergency rescue agency or a police agency on the ground that consent is withheld by the subject of personal location information.

    (6) Where any emergency rescue agency, location information provider, or police agency requests or provides personal location information pursuant to paragraph (1) or (2), it shall immediately notify the relevant subject of personal location information, of such fact: Provided, That where such immediate notification appears likely to threaten the health or safety of the subject of personal location information, the notification shall be made without delay after the relevant grounds have ceased.

    (7) In order to warn subjects of personal location information located in disaster areas or potential disaster areas, such as typhoon, heavy rain, fire and chemical, biological, and radiological (CBR) accidents, of the dangers to their lives or bodies, any emergency rescue agency may request a location information provider to issue a warning, as prescribed by Presidential Decree; and no location information provider so requested shall refuse such request to issue a warning on the ground that consent is withheld by the subjects of personal location information in the disaster areas. (Amended by Act nº 8867, Feb. 29, 2008)

    (8) No emergency rescue agency or police agency, nor any current or former emergency rescue worker, shall use personal location information provided for emergency rescue, for any purpose other than for emergency rescue.

    (9) Where a police agency has requested to provide personal location information under paragraph (2), it shall keep the following matters, as prescribed by Presidential Decree, and where a subject of personal location information requests the police agency to confirm, inspect or copy the collected personal location information, it shall comply with such request without delay: (Amended by Act nº 15608, Apr. 17, 2018)

    1. Person who made the request;

    2. Date, time, and purpose of the request;

    3. Details of information provided by the location information provider;

    4. Consent to collecting personal location information (limited to the cases falling under the proviso to paragraph (2)).

    (10) Matters necessary for requests for emergency rescue under paragraphs (1) and (2); confirmation of an intention under paragraph (3); and the method of, and procedures for, the issuing of warnings under paragraph (7), shall be prescribed by Presidential Decree.

    (11) No emergency rescue agency or police agency shall inform any third party of the personal location information provided under paragraph (1) or (2): Provided, That the foregoing shall not apply to the following cases: (Inserted by Act nº 13203, Feb. 3, 2015)

    1. Where the subject of personal location information has consented thereto;

    2. Where the personal location information is provided to another emergency rescue agency or another police agency where emergency rescue activities are inevitable.

    (Article Amended by Act nº 11423, May 14, 2012)

    Article 30 (Requests for Personal Location Information, and Method Thereof)

    (1) Where any emergency rescue agency or police agency requests a location information provider to provide personal location information pursuant to Article 29 (1) and (2), it shall do so using a location information system; and where any location information provider receives a request from an emergency rescue agency or a police agency to provide personal location information, it shall do so using a location information system. (Amended by Act nº 11423, May 14, 2012)

    (2) Emergency rescue agencies and police agencies shall report data about the requests for, and providing, personal location information under paragraph (1) and Article 29 (11), to the Public Administration and Security Committee of the National Assembly semi-annually; while location information providers shall report such data to the Science, ICT, Broadcasting, and Communications Committee of the National Assembly semi-annually: Provided, That data about the requests for, and the provision of, such information under paragraph (1) shall be reported separately from data about requests for, and providing, such information under Article 29 (11). (Inserted by Act nº 11423, May 14, 2012; Act nº 11717, Mar. 23, 2013; Act nº 13203, Feb. 3, 2015; Act nº 14840, Jul. 26, 2017)

    (3) Matters necessary for requests by emergency rescue agencies and police agencies under paragraph (1) and for reporting under paragraph (2), shall be prescribed by Presidential Decree. (Amended by Act nº 11423, May 14, 2012)

    Article 30-2 (Use of Computerized Information about Registration of Family Relationships)

    Upon receiving a request for emergency rescue under Article 29 (1), an emergency rescue agency may request the Minister of the National Court Administration to provide it with computerized data about registration under Article 11 (6) of the Act on the Registration, etc. of Family Relationships, so as to verify the relationship between the person requesting emergency rescue and the subject of personal location information.

    (Article Inserted by Act nº 13203, Feb. 3, 2015)

    Article 31 (Reduction of, and Exemption from, Costs)

    Where any location information provider issues a warning pursuant to Article 29 (7) or provides personal location information to an emergency rescue agency or a police agency pursuant to Article 30 (1), costs incurred therein may be reduced or exempt. (Amended by Act nº 11423, May 14, 2012)

    Article 32 (Submission of Statistical Data)

    (1) Each location information provider shall submit statistical data regarding the issuance of warnings under Article 29 (7) and providing personal location information under Article 30 (1) to the Science, ICT, Broadcasting, and Communications Committee of the National Assembly and the Korea Communications Commission respectively semi-annually. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 11423, May 14, 2012; Act nº 15608, Apr. 17, 2018)

    (2) Such matters as methods for submitting statistical data under paragraph (1) shall be prescribed by Presidential Decree. (Inserted by Act nº 15608, Apr. 17, 2018)

    CHAPTER V.- CREATION OF INFRASTRUCTURE FOR USE OF LOCATION INFORMATION

    Article 33 (Promotion of Technological Development)

    (1) In order to efficiently promote the development of technologies and devices related to collecting, using, or providing location information, the Minister of Science and ICT or the Korea Communications Commission may authorize relevant research institutes prescribed by Presidential Decree to perform projects for research and development, technical cooperation, technology transfer, technical guidance, etc. (hereafter in this Article, referred to as “research and development, etc.”). In such cases, the Minister of Science and ICT or the Korea Communications Commission shall consult with the heads of related central administrative agencies thereon. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013; Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT or the Korea Communications Commission may fully or partially subsidize research institutes for expenses they incur in performing research and development, etc. projects pursuant to paragraph (1). (Amended by Act nº 8867, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013; Act nº 14839, Jul. 26, 2017)

    Article 34 (Promotion of Standardization)

    (1) The Minister of Science and ICT and the Korea Communications Commission may establish standards for collecting, using, or providing location information for the protection and use thereof and publicly announce them, in consultation with the heads of related central administrative agencies: Provided, That the Korean Industrial Standards under Article 12 of the Industrial Standardization Act shall apply to the matters for which relevant Korean Industrial Standards are established. (Amended by Act nº 8486, May 25, 2007; Act nº 8867, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013; Act nº 14839, Jul. 26, 2017)

    (2) The Minister of Science and ICT and Future Planning and the Korea Communications Commission may recommend a location information provider, etc. or a manufacturer or supplier of products related to location information to comply with the standards under paragraph (1). (Amended by Act nº 8867, Feb. 29, 2008; Act nº 14839, Jul. 26, 2017)

    (3) Matters to be standardized under paragraph (1) shall be as follows: (Amended by Act nº 9483, Mar. 13, 2009)

    1. Technologies related to protecting and certifying location information;

    2. Technologies related to collecting, storing, managing, and providing location information;

    3. Technologies related to emergency rescue and other public services;

    4. Other base technologies related to protecting and using location information.

    (4) Matters necessary for the method, and procedures for standardization under paragraph (1) shall be prescribed by Presidential Decree. (Inserted by Act nº 9483, Mar. 13, 2009)

    (5) The Minister of Science and ICT and the Korea Communications Commission may render assistance in activities for the standardization of collecting, using, and providing location information. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 9483, Mar. 13, 2009; Act nº 11690, Mar. 23, 2013; Act nº 14839, Jul. 26, 2017)

    Article 35 (Promotion of Use of Location Information)

    (1) The Korea Communications Commission, following consultation with the heads of related central administrative agencies, may implement projects for the efficient utilization and promotion of related technologies and application services in various fields, such as the public sector, industry, living, and welfare, for the purpose of protecting and using location information, as prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008)

    (2) The Korea Communications Commission may provide persons participating in any of the projects under paragraph (1) with technical and financial assistance as necessary. (Amended by Act nº 8867, Feb. 29, 2008)

    CHAPTER V-2.- SUPPLEMENTARY PROVISIONS

    Article 36 (Requests for Submission of Materials and Inspections)

    (1) In any of the following cases, the Korea Communications Commission may request a location information provider, etc. to submit necessary materials, including relevant articles and documents:

    1. Where the Korea Communications Commission discovers a violation of this Act or is informed of a suspected violation of this Act;

    2. Where the Korea Communications Commission receives a report or complaint about a violation of this Act;

    3. Where it is necessary to protect location information on any other ground prescribed by Presidential Decree.

    (2) If a location information provider, etc. fail to submit the materials under paragraph (1) or are found to have violated this Act, the Korea Communications Commission may authorize its public officials to enter the place of business of the location information provider, etc. and inspect the status of operation of business, relevant articles and documents, facilities, equipment, etc. In such cases, Article 16 (4) shall apply mutatis mutandis.

    (Article Amended by Act nº 13203, Feb. 3, 2015)

    Article 37 (Hearings)

    Where the Korea Communications Commission intends to revoke permission or authorization or order to discontinue business operations in accordance with Article 13, it shall hold a hearing. (Amended by Act nº 8867, Feb. 29, 2008)

    Article 38 (Delegation or Entrustment of Authority)

    (1) Part of the authority of the Korea Communications Commission vested under this Act, may be delegated to the heads of its affiliated agencies, as prescribed by Presidential Decree.

    (2) Some of the following affairs assigned to the Korea Communications Commission under this Act, may be entrusted to the Korea Internet and Security Agency established under Article 52 of the Act on Promotion of Information and Communications Network Utilization and Information Protection or the Telecommunications Technology Association founded under Article 34 of the Framework Act on Broadcasting Communications Development, as prescribed by Presidential Decree:

    1. Inspection, conducted pursuant to Article 16 (3), of technical and managerial measures and the preservation status of records thereof (limited to affairs related to technical support);

    2. Promoting standardization under Article 34;

    3. Requesting the submission of materials and conducting inspections under Article 36 (1) and (2) (limited to affairs related to technical support).

    (Article Amended by Act nº 13203, Feb. 3, 2015)

    Article 38-2 (Legal Fiction as Public Officials in Applying Penalty Provisions)

    The executive officers and employees of the Korea Internet and Security Agency or the Telecommunications Technology Association engaging in the affairs entrusted by the Korea Communications Commission pursuant to Article 38 (2), shall be deemed as public officials in applying penalty provisions under Articles 129 through 132 of the Criminal Act to them.

    (Article Inserted by Act nº 13203, Feb. 3, 2015)

    Article 38-3 (Provisions Applicable Mutatis Mutandis)

    Articles 16 (1) and (3), 17, 28 (1), 34, 35, and 36 shall apply mutatis mutandis to persons who engage in location-based service business not handling personal location information.

    (Article Inserted by Act nº 13203, Feb. 3, 2015)

    CHAPTER VI.- PENALTY PROVISIONS

    Article 39 (Penalty Provisions)

    Any of the following persons shall be punished by imprisonment with labor for not more than five years; or by a fine not exceeding 50 million won: (Amended by Act nº 11423, May 14, 2012; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Any person who engages in location information business without obtaining permission, in violation of Article 5 (1); or who obtains permission by fraud or other improper means;

    2. Any person who divulges, alters, impairs, or discloses personal location information, in violation of Article 17;

    3. Any person who collects, uses, or provides personal location information to another person, without consent thereto from the subject of the personal location information; or beyond the scope of consent, in violation of Article 18 (1) or (2) or 19 (1), (2), or (5); or who receives personal location information for profit or for any unlawful purpose, although he/she is aware of such circumstance;

    4. Any person who uses or provides to a third party, personal location information beyond the scope specified in the terms and conditions or notified to the relevant subjects, in violation of Article 21;

    5. Any person who uses personal location information for any purpose other than emergency rescue, in violation of Article 29 (8);

    6. Any person who provides or receives personal location information, without consent thereto from the subject of the personal location information; or for any purpose other than emergency rescue, in violation of Article 29 (11).

    Article 40 (Penalty Provisions)

    Any of the following persons shall be punished by imprisonment with labor for not more than three years or by a fine not exceeding 30 million won: (Amended by Act nº 8775, Dec. 21, 2007; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Any person who engages in location information business without obtaining permission to make a change; or who obtains permission to make a change by fraud or other improper means, in violation of Article 5 (7);

    1-2. Any person who engages in location information business not handling personal location information, without reporting in violation of Article 5-2 (1); or who reports such business by fraud or other improper means;

    2. Any person who engages in location-based service business, without reporting in violation of Article 9 (1), the proviso to Article 9-2 (1) or Article 9-2 (4); or who reports by fraud or other improper means;

    3. Any person who violates an order issued to discontinue business operations under Article 13 (1);

    4. Any person who collects, uses, or provides personal location information regarding an individual without the individual’s consent, in violation of Article 15 (1);

    5. Any person who obtains personal location information regarding another person by deceiving a personal location information provider or location-based service provider by copying the person’s telecommunications device or misappropriating such information, in violation of Article 15 (2).

    Article 41 (Penalty Provisions)

    Any of the following persons shall be punished by imprisonment with labor for not more than one year or by a fine not exceeding 20 million won: (Amended by Act nº 11423, May 14, 2012; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Any person who changes a location information system, without reporting the change, in violation of Article 5-2 (3) 3 or 9 (3) 3, or who reports a change in a location information system by fraud or other improper means;

    2. Any person who fails to destroy location information, in violation of Article 8 (4) or 11 (1) or (2);

    3. Any person who violates an order to suspend business issued under Article 13 (1);

    4. Any person who fails to take technical and managerial measures in violation of Article 16 (1) (including persons to whom said provisions shall apply mutatis mutandis pursuant to Article 38-3);

    4-2. Any person who fails to ensure that data verifying the collection, use, and provision of location information are to be automatically recorded and preserved in a location information system, in violation of Article 16 (2);

    5. Any person who refuses a request by an emergency rescue agency or a police agency, in violation of Article 29 (5); or who refuses to issue a warning, in violation of Article 29 (7).

    Article 42 (Joint Penalty Provisions)

    If the representative of a corporation or an agent or employee of, or any other person employed by, the corporation or an individual commits any violation described in Articles 39 through 41 in conducting the business affairs of the corporation or individual, the corporation or individual shall, in addition to punishing the violator accordingly, be subject to a fine prescribed in the relevant Article: Provided, That this shall not apply where such corporation or individual has not been negligent in giving due attention and supervision concerning the relevant business affairs to prevent such violation. (Article Amended by Act nº 10137, Mar. 17, 2010)

    Article 43 (Administrative Fines)

    (1) Any of the following persons shall be subject to an administrative fine not exceeding 20 million won: (Amended by Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Any person who violates a condition for granting permission under Article 5 (4);

    2. Any person who acquires a business or merges or splits off a business, without authorization, in violation of Article 7 (1);

    3. Any person who fully or partially suspends or discontinues business operations, without obtaining approval, in violation of Article 8 (1) or (2);

    4. Any person who refuses to provide personal location information, in violation of Article 20 (1);

    5. Any person who refuses a request for temporary suspension or fails to take a technical measure, in violation of Article 24 (2).

    (2) Any of the following persons shall be subject to an administrative fine not exceeding ten million won: (Amended by Act nº 11423, May 14, 2012; Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018; Act nº 16087, Dec. 24, 2018)

    1. Any person who fails to report the acquisition, inheritance, merger, or split-off of a business or who reports the acquisition, inheritance, merger, or split-off of a business by fraud or other improper means, in violation of Article 7 (4) or 10 (1);

    2. Any person who fails to report the whole or partial suspension or discontinuation of business operations, in violation of Article 8 (1) or (2) or 11 (1) or (2);

    3. Any person who fails to disclose terms and conditions or grounds for and details of an amendment to the terms and conditions, in violation of Article 12 (1);

    3-2. Any person who violates an order to amend terms and conditions under Article 12 (2);

    4. Any person who fails to notify that an object has a built-in device capable of collecting location information, in violation of Article 15 (3);

    5. Any person who fails to perform a duty to specify terms and conditions in violation of Article 18 (1) or 19 (1);

    6. Any person who collects personal location information, in violation of Article 18 (3);

    7. Any person who fails to give information or notice, in violation of Article 19 (2) through (4);

    8. Any person who fails to notify transfer, etc. of business, in violation of Article 22;

    9. Any person who refuses a request for inspection, notification, or correction, in violation of Article 24 (3);

    10. Any person who collects, uses, or provides personal location information without obtaining the consent of the relevant legal representative or without confirming that such legal representative gives the consent, in violation of Article 25 (1);

    11. Any person who requests emergency rescue under Article 29 (1) or (2), by fraud;

    12. Any person who fails to notify providing personal location information, in violation of Article 29 (6);

    13. Any person who fails to submit relevant articles, documents, etc. under Article 36 (1); or who submits any false article or document (including persons to whom said provisions shall apply mutatis mutandis pursuant to Article 38-3);

    14. Any person who, without good cause, refuses, interferes with, or evades an inspection under Article 36 (2) (including persons to whom said provisions shall apply mutatis mutandis pursuant to Article 38-3).

    (3) Any of the following persons shall be subject to an administrative fine not exceeding five million won: (Amended by Act nº 13203, Feb. 3, 2015; Act nº 15608, Apr. 17, 2018)

    1. Any person who changes the trade name or principal place of business, without reporting such change; or who reports a changed trade name or principal place business by fraud or other improper means, in violation of Article 5 (7), 5-2 (3), 9 (3) 1 or 2, or 9-2 (3);

    2. Any person who fails to submit statistical data, in violation of Article 32.

    (4) Administrative fines under paragraphs (1), (2) (excluding subparagraph 11), and (3) shall be imposed and collected by the Korea Communications Commission, as prescribed by Presidential Decree. (Amended by Act nº 8867, Feb. 29, 2008; Act nº 13203, Feb. 3, 2015)

    (5) through (7) Deleted. (by Act nº 13203, Feb. 3, 2015)

    (8) Administrative fines under paragraph (2) 11 shall be imposed and collected by the heads of emergency rescue agencies or the heads of police agencies, as prescribed by Presidential Decree. (Amended by Act nº 11423, May 14, 2012)

    (9) Deleted. (by Act nº 13203, Feb. 3, 2015)

    ADDENDA

    (1) (Enforcement Date) This Act shall enter into force six months after the date of its promulgation: Provided, That Articles 29 through 32, subparagraph 5 of Article 41, Article 43 (2) 11 and 12, and Article 43 (8) shall enter into force on the date of its promulgation.

    (2) (Transitional Measures concerning Permission for Location Information Business) Each person who engages in local information business as at the time this Act enters into force shall obtain permission from the Minister of Information and Communications in accordance with Article 5 (1), within three months from the date this Act enters into force.

    (3) (Transitional Measures concerning Reporting on Location-Based Service Business) Each person who engages in location-based service business as at the time this Act enters into force shall report his/her business to the Minister of Information and Communications in accordance with Article 9 (1), within three months from the date this Act enters into force.

    (4) (Transitional Measures concerning Terms and Conditions) Each person who engages in location information business or location-based service business as at the time this Act enters into force shall prepare terms and conditions under Article 12 (1) within three months from the date this Act enters into force and shall report them to the Minister of Information and Communications.

    ADDENDUM (Act nº 8002, Sep. 27, 2006)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 8367, Apr. 11, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 6 Omitted.

    ADDENDA (Act nº 8486, May 25, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year after the date of its promulgation.

    Articles 2 through 10 Omitted.

    ADDENDUM (Act nº 8775, Dec. 21, 2007)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDA (Act nº 8867, Feb. 29, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 12 Omitted.

    ADDENDA (Act nº 9481, Mar. 13, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 Omitted.

    ADDENDUM (Act nº 9483, Mar. 13, 2009)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDUM (Act nº 10137, Mar. 17, 2010)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 10166, Mar. 22, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 9 Omitted.

    ADDENDA (Act nº 10517, Mar. 30, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into one year after the date of its promulgation.

    Articles 2 through 4 Omitted.

    ADDENDUM (Act nº 11423, May 14, 2012)

    This Act shall enter into force six months after the date of its promulgation.

    ADDENDA (Act nº 11690, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    (1)       This Act shall enter into force on the date of its promulgation.

    (2)       Omitted.

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 11717, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Articles 2 through 4 Omitted.

    ADDENDA (Act nº 12840, Oct. 15, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Article 2 (Transitional Measure concerning Disqualifications of Incompetent Persons)

    Notwithstanding the amended provisions of Articles 6 (1) 1 and 26 (1) 2 and (2) 2, the previous provisions shall apply to the persons, for whom the declaration of incompetence or quasi-incompetence pronounced as at the time the amended provisions enter into force, remains effective under Article 2 of the Addenda to the Civil Act (Act nº 10429).

    ADDENDA (Act nº 12844, Nov. 19, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That the amendments to the statutes to be amended pursuant to Article 6 of the Addenda, which were promulgated before this Act enters into force but the enforcement dates of which have yet to arrive, shall enter into force on the enforcement date of the relevant statute.

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 13203, Feb. 3, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Permission for Location Information Business)

    The amended provisions of Articles 5 (8) 4 and 7 (3) 4 shall apply, beginning with where an application is filed for permission for location information business or authorization for the acquisition, etc. of location information business, after this Act enters into force.

    ADDENDA (Act nº 13540, Dec. 1, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Transitional Measures to Grounds for Disqualification)

    Notwithstanding the amended provisions of Article 6, an employee of a location information provider as at the time this Act enters into force shall be governed by the previous provisions.

    ADDENDA (Act nº 14224, May 29, 2016)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year after the date of its promulgation.

    Articles 2 through 21 Omitted.

    ADDENDA (Act nº 14839, Jul. 26, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided, That, the amendments to the statutes to be amended pursuant to Article 5 of the Addenda, which were promulgated before this Act enters into force but the enforcement dates of which have yet to arrive, shall enter into force on the enforcement date of the relevant statute.

    Articles 2 through 6 Omitted.

    ADDENDA (Act nº 14840, Jul. 26, 2017)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Articles 2 through 4 Omitted.

    ADDENDA (Act nº 15608, Apr. 17, 2018)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability to Reporting by Micro Enterprises on Location-Based Service Business)

    The amended provisions of Articles 9 (4) and 9-2 shall apply to micro enterprises, etc. that commence location-based service business after this Act enters into force.

    Article 3 (Applicability to Disclosure of Terms and Conditions)

    The amended provisions of Article 12 (1) shall also apply where a person intends to amend the terms and conditions reported before this Act enters into force.

    Article 4 (Transitional Measures concerning Permission for Location Information Business)

    (1) If a person who holds permission granted under previous Article 5 (1) as at the time this Act enters into force engages in location information business handling personal location information, such person shall be deemed to have obtained permission from the Korea Communications Commission under the amended provisions of Article 5 (1).

    (2) If a person who holds permission granted under previous Article 5 (1) as at the time this Act enters into force engages in location information business, without handling personal location information, such person shall be deemed to have filed a report in accordance with the amended provisions of Article 5-2 (1), and such report shall be deemed to have been accepted by the Korea Communications Commission under the amended provisions of Article 5-2 (4).

    (3) If a person who has an application pending for permission under Article 5 (1) as at the time this Act enters into force engages in location information business, without handling personal location information, such person shall be deemed to have filed a report in accordance with the amended provisions of Article 5-2 (1).

    Article 5 (Transitional Measures concerning Acquisition of Location Information Business or Merger of Corporations)

    (1) If the transferee of all or part of the business of a person who holds authorization granted under previous Article 7 (1) as at the time this Act enters into force reports and has engaged in location information business, without handling personal location information, or a corporation incorporated by a merger or split-off or a corporation surviving a merger or split-off reports such acquisition, merger, or split-off in accordance with the amended provisions of Article 7 (4), such report shall be deemed to have been accepted by the Korea Communications Commission under the amended provisions of Article 7 (5).

    (2) If a person who filed an application for authorization under previous Article 7 (1) before this Act enters into force is the transferee of all or part of the business of a person who has engaged in location information business, without handling personal location information, or a corporation incorporated by a merger or split-off or a corporation surviving a merger or split-off, such person shall be deemed to have reported the acquisition, merger, or split-off in accordance with the amended provisions of Article 7 (4).

    Article 6 (Transitional Measures concerning Suspension or Discontinuation of Operations of Location Information Business)

    (1) If a person who engages in location information business as at the time this Act enters into force, without handling personal location information, with approval granted under previous Article 8 (1) or (2) files a report in accordance with the amended provisions of Article 8 (1) 2 or (2) 2, such report shall be deemed to have been accepted by the Korea Communications Commission under the amended provisions of Article 8 (6).

    (2) If a person who filed an application for approval under previous Article 8 (1) or (2) before this Act enters into force engages in location information business, without handling personal location information, such person shall be deemed to have filed a report in accordance with the amended provisions of Article 8 (1) 2 or (2) 2.

    Article 7 Omitted.

    ADDENDUM (Act nº 16087, Dec. 24, 2018)

    This Act shall enter into force six months after the date of its promulgation.

    02Nov/21

    Act nº 6383, Jan. 26, 2001, Act on the Protection of Information and Communications Infrastructure

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)
    The purpose of this Act is to operate cirtical information and communications infrastructure in a stable manner by formulating and implementing measures concerning the protection of such infrastructure, in preparation for intrusion by electronic means, thereby contributing to the safety of the nation and the stability of the life of people.

    Article 2 (Definitions)
    The terms used in this Act shall be defined as follows: (Amended by Act nº 8777, Dec. 21, 2007)

    1. The term “information and communications infrastructure” means electronic control and management system related to the national security, administration, defense, public security, finance, communications, transportation, energy, etc. and information and communications network under Article 2 (1) 1 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.;

    2. The term “electronic intrusions” means acts of attacking information and communications infrastructure by hacking, computer viruses, logic or email bombs, denial of service, or high power electromagnetic waves, etc.;

    3. The term “intrusion incident” means a situation where any incidents takes place by electronic intrusions.

    CHAPTER II.- SYSTEM FOR PROTECTING CRITICAL INFORMATION AND COMMUNICATIONS INFRASTRUCTURE

    Article 3 (Committee for Protection of Information and Communications Infrastructure)

    (1) The Committee for Protection of Information and Communications Infrastructure (hereinafter referred to as the “Committee“) shall be established under the control of the Prime Minister, so as to deliberate on matters concerning the protection of critical information and communications infrastructure (hereinafter referred to as “critical information and communications infrastructure”) designated under Article 8.

    (2) The Committee shall be comprised of 25 or fewer members, including a Chairperson.

    (3) The Chairperson of the Committee shall be the Minister of the Office for Government Policy Coordination, and members shall be public officials holding a rank equivalent to that of a Vice Minister of a central administrative agency prescribed by Presidential Decree, and persons commissioned by the Chairperson. (Amended by Act nº 8777, Dec. 21, 2007; Act nº. 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) Working committees in charge of the public and private sectors shall be established under the control of the Committee for the efficient operation of the Committee. (Amended by Act nº 8777, Dec. 21, 2007)

    (5) Necessary matters concerning the composition, operation, etc. of the Committee and working committees shall be prescribed by Presidential Decree.

    Article 4 (Functions of Committee)
    The Committee shall deliberate on the following matters: (Amended by Act nº 8777, Dec. 21, 2007)

    1. Matters concerning the coordination of policies for protecting critical information and communications infrastructure;

    2. Matters concerning the integration and coordination of protection plans on critical information and communications infrastructure under Article 6 (1);

    3. Matters concerning the outcomes of implementing protection plans on critical information and communications infrastructure under Article 6 (1);

    4. Matters concerning the improvement of systems related to the protection of critical information and communications infrastructure;

    5.Other major policies concerning the protection of critical information and communications infrastructure that are submitted by the Chairperson for consideration.

    Article 5 (Establishment of Measures to Protect Critical Information and Communications Infrastructure)

    (1) The head of an organization which manages critical information and communications infrastructure (hereinafter referred to as a “management organization“) shall formulate and implement management measures (hereinafter referred to as “measures to protect critical information and communications infrastructure“), including physical and technological measures to protect critical information and communications infrastructure under its his/her jurisdiction in a safe manner, depending on the results outcomes of the analysis and evaluation of vulnerabilities under Article 9 (1).

    (2) The head of a management organization shall, when he/she establishes formulates measures to protect critical information and communications infrastructure under paragraph (1), submit details of such measures to the head of a central administrative agency in charge of critical information and communications infrastructure (hereinafter referred to as “relevant central administrative agency“): However this shall not apply to cases where the head of a management organization is the head of the relevant central administrative agency.

    (3) Details of measures to protect critical information and communications infrastructure of a management organization controlled and supervised by the head of a local government, shall be submitted to the Minister of Security and Public Administration by the head of the local government. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) The head of a management organization shall designate a person in general charge of affairs concerning the protection of critical information and communications infrastructure under its jurisdiction (hereinafter referred to as “chief information security officer“): Provided, That this shall not apply to cases where the head of a management organization is the head of the relevant central administrative agency.

    (5) Necessary matters concerning the designation, affairs, etc. of a chief information security officer shall be prescribed by Presidential Decree.

    Article 5-2 (Ascertaining Implementation of Measures to Protect Critical Information and Communications Infrastructure)

    (1) The Minister of Science, Information and Communications Technology (ICT) and Future Planning and the heads of national organizations prescribed by Presidential Decree, such as the Director of the National Intelligence Service (hereinafter referred to as the “Director of the National Intelligence Service and head of an equivalent agency“) may ascertain whether a management organization implements measures to protect critical information and communications infrastructure. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) The Minister of Science, Information and Communications Technology (ICT) and Future Planning, Director of the National Intelligence Service, and head of an equivalent agency may request the head of the relevant central administrative agency to submit data, including details of measures to protect critical information and communications infrastructure submitted to him/her under Article 5 (2), when necessary for ascertainment under paragraph (1). (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) The Minister of Science, Information and Communications Technology (ICT) and Future Planning, Director of the National Intelligence Service, and head of an equivalent agency may notify the head of the relevant central administrative agency of whether measures to protect critical information and communications infrastructure confirmed under paragraph (1) are implemented. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) Necessary measures concerning procedures for ascertaining the implementation of measures to protect critical information and communications infrastructure under paragraph (1) shall be prescribed by Presidential Decree.
    (Article Inserted by Act nº 8777, Dec. 21, 2007)

    Article 6 (Establishment, etc. of Plans for Protecting Critical Information and Communications Infrastructure)

    (1) The heads of relevant central administrative agencies shall establish and implement plans for protecting critical information and communications infrastructure in areas under their jurisdiction (hereinafter referred to as “plans for protecting critical information and communications infrastructure“), by integrating and coordinating measures to protect critical information and communications infrastructure submitted under Article 5 (2).

    (2) The heads of relevant central administrative agencies shall submit details on outcomes of implementing plans for protecting critical information and communications infrastructure of the previous year and plans for protecting critical information and communications infrastructure for the following year to the Committee for deliberation: However, this shall not apply to matters that are deemed confidential by the Chairperson of the Committee.

    (3) Plans for protecting critical information and communications infrastructure shall include the following matters:

    1. Matters concerning the analysis and evaluation of vulnerabilities of critical information and communications infrastructure;

    2. Matters concerning prevention against intrusion incidents against critical information and communications infrastructure and measures for the restoration thereof;

    3. Other necessary matters concerning the protection of critical information and communications infrastructure.

    (4) The Minister of Science, Information and Communications Technology (ICT) and Future Planning and the Director of the National Intelligence Service may establish guidelines for formulating measures to protect critical information and communications infrastructure and plans for protecting critical information and communications infrastructure, following consultation with each other, and notify the heads of relevant cental administrative agencies of such guidelines. (Amended by Act nº 8777, Dec. 21, 2007; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (5) The heads of relevant central administrative agencies shall designate a person in general charge of affairs related to the protection of critical information and communications infrastructure in areas under their jurisdiction (hereinafter referred to as “officer in charge of information protection“).

    (6) Necessary matters concerning the establishment and implementation of plans for protecting critical information and communications infrastructure and the designation, affairs, etc. of an officer in charge of information protection shall be prescribed by Presidential Decree.

    Article 7 (Support for Protection of Critical Information and Communications Infrastructure)

    (1) The heads of management organizations may request the Minister of Science, Information and Communications Technology (ICT) and Future Planning, the Director of the National Intelligence Service, and head of an equivalent agency or, if deemed necessary, the heads of specialized institutions prescribed by Presidential Decree to provide technological support to the following duties, where the heads of the relevant management organizations deem it necessary to do so, or where the Chairperson of the Committee believes that inadequate measures to protect critical information and communications infrastructure of a specific management organization are likely to cause harm to national security and the economy and society as a whole and therefore issues an order to supplement such measures. (Amended by Act nº 8777, Dec. 21, 2007; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)


    1. Formulation of measures to protect critical information and communications infrastructure;

    2. Prevention of intrusion incidents against critical information and communications infrastructure and the restoration thereof;

    3. Compliance with an order or recommendation for protection measures under Article 11.

    (2) When the head of a management organization, in charge of the following critical information and communications infrastructure which has significant influence on national security, requests for technological support under paragraph (1), he/she shall preferentially make such request to the Director of the National Intelligence Service: However, the Director of the National Intelligence Service may provide such support, in consultation with the heads of the relevant central administrative agencies, in cases where a substantial and imminent threat to national security exists and it is impossible to recover from damage if he/she waits for the head of a management organization to make such request: (Amended by Act nº 8777, Dec. 21, 2007)

    1. Critical transportation facilities, such as roads, railroads, subways, airports and harbors;

    2. Facilities for water resources and energy, including electricity, gas and oil;

    3. Relay broadcast facilities and the national command control communication network;

    4. Research facilities of government-funded research institutes related to nuclear energy, the national defense and science, or advanced defense industry.

    (3) The Director of the National Intelligent Service shall not provide technological support to any information and communications infrastructure which stores personal information, such as financial information and communications infrastructure, notwithstanding paragraphs (1) and (2). (Amended by Act nº 8777, Dec. 21, 2007)

    CHAPTER III.- DESIGNATION AND ANALYSIS OF VULNERABILITIES OF MAJOR INFORMATION AND COMMUNICATIONS INFRASTRUCTURE

    Article 8 (Designation, etc. of Critical Information and Communications Infrastructure)

    (1) The heads of central administrative agencies may designate information and communications infrastructure under their jurisdiction, which are deemed to require protection from electronic intrusions, as critical information and communications infrastructure, by taking into account the following matters:

    1. The national and social importance of duties performed by an organization which manages the relevant information and communications infrastructure;

    2. The dependence of affairs conducted by an organization under subparagraph 1 on information and communications infrastructure;

    3. The inter-connection with other information and communications infrastructure;

    4. The areas and extent of damage caused by intrusion incidents to the national security, economy and society, if any;

    5. The probability of intrusion incidents and the easiness of restoration thereof.

    (2) The heads of central administrative agencies may request the relevant management organization to submit data necessary for making a decision on designation under paragraph (1).

    (3) The head of the relevant central administrative agency may revoke the designation of critical information and communications infrastructure either ex officio or upon request of the relevant management organization when a management organization abolishes, suspends or changes the relevant affairs.

    (4) The Minister of Security and Public Administration may designate information and communications infrastructure of an organization managed and supervised by the head of a local government as critical information and communications infrastructure, in consultation with the head of the local government, or revoke such designation. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (5) The head of a central administrative agency shall, when he/she intends to make a designation or revoke such designation under paragraphs (1) and (3), submit it for deliberation by the Committee. In such cases, the Committee may order the head of a management organization subject to designation or the revocation thereof under paragraphs (1) and (3) to appear before the Committee and listen to his/her opinions.

    (6) The head of a central administrative agency shall, when he/she designates critical information and communications infrastructure or revokes such designation under paragraphs (1) and (3), publicly announce such fact: However, he/she may not publicly announce such fact, after deliberation by the Committee, when necessary for guaranteeing national security.

    (7) Necessary matters concerning the designation of critical information and communications infrastructure and the revocation of such designation shall be prescribed by Presidential Decree.

    Article 8-2 (Recommendation for Designation of Critical Information and Communications Infrastructure)

    (1) The Minister of Science, Information and Communications Technology (ICT) and Future Planning, Director of the National Intelligence Service, and head of an equivalent agency may recommend the head of a central administrative agency to designate specific information and communications infrastructure as critical information and communications infrastructure, when they reach a conclusion that such information and communications infrastructure needs to be designated as critical information and communications infrastructure. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) The Minister of Science, Information and Communications Technology (ICT) and Future Planning, Director of the National Intelligence Service, and head of an equivalent agency may request the head of a central administrative agency to submit data on the relevant information and communications infrastructure, when necessary for making a recommendation under paragraph (1). (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) Procedures for recommending the designation of critical information and communications infrastructure under paragraph (1) and other necessary matters shall be prescribed by Presidential Decree.
    (Article Inserted by Act nº 8777, Dec. 21, 2007)

    Article 9 (Analysis and Evaluation of Vulnerabilities)

    (1) The head of a management organization shall analyze and evaluate the vulnerabilities of critical information and communications infrastructure under its jurisdiction on a regular basis as prescribed by Presidential Decree.

    (2) The head of a management organization shall, when he/she intends to analyze and evaluate vulnerabilities under paragraph (1), form a task force team to analyze and evaluate the vulnerabilities as prescribed by Presidential Decree.

    (3) The head of a management organization may, when he/she intends to analyze and evaluate vulnerabilities under paragraph (1), require the following institutions to analyze and evaluate vulnerabilities of critical information and communications infrastructure under its jurisdiction: However, in such case, he/she may choose not to form a task force team under paragraph (2): (Amended by Act nº 6796, Dec. 18, 2002; Act nº 8777, Dec. 21, 2007; Act nº 9708, May 22, 2009; Act nº 11690, Mar. 23, 2013)

    1. The Korea Internet and Security Agency (hereinafter referred to as the “KISA“) under Article 52 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc.;

    2. Information sharing and analysis centers under Article 16 (limited to information sharing and analysis centers which meet the standards prescribed by Presidential Decree);

    3. Consulting companies specializing in knowledge and information security, designated under Article 33 of the Information and Communications Technology Industry Promotion Act;

    4. The Electronics and Telecommunications Research Institute under Article 8 of the Act on the Establishment, Operation, and Fostering of Government-Funded Research Institutes.

    (4) The Minister of Science, Information and Communications Technology (ICT) and Future Planning shall determine standards concerning the analysis and evaluation of vulnerabilities under paragraph (1), in consultation with the heads of relevant central administrative agencies and the Director of the National Intelligence Service, and notify the heads of the relevant central administrative agencies of such standards. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (5) Necessary matters concerning methods of and procedures for analyzing and evaluating the vulnerabilities of critical information and communications infrastructure shall be prescribed by Presidential Decree.

    CHAPTER IV.- PROTECTION OF CRITICAL INFORMATION AND COMMUNICATIONS INFRASTRUCTURE AND RESPONSE TO INTRUSION INCIDENTS

    Article 10 (Protection Guidelines)

    (1) The heads of relevant central administrative agencies may establish protection guidelines on critical information and communications infrastructure under their jurisdiction and recommend the head of a management organization in the relevant area to follow such guidelines.

    (2) The heads of the relevant central administrative agencies shall revise and supplement protection guidelines under paragraph (1) on a regular basis, taking into account technological advancements, etc.

    Article 11 (Orders etc. for Protection Measures)
    The heads of relevant central administrative agencies may order or recommend the head of the relevant management organization to take measures to protect critical information and communications infrastructure, in any of the following cases:

    1. When it is deemed that special protection measures need to be taken after details of measures to protect critical information and communications infrastructure submitted under Article 5 (2) are analyzed;

    2. When it is deemed that special protection measures need to be taken after the implementation of measures to protect critical information and communications infrastructure notified under Article 5-2 (3) are analyzed.
    (Article Amended by Act nº 8777, Dec. 21, 2007)

    Article 12 (Prohibition against Intrusion, etc. of Critical Information and Communications Infrastructure)
    No one shall commit any act falling under any of the following subparagraphs:

    1. Accessing critical information and communications infrastructure by any person who has no access authority, or manipulating, destroying, concealing or leaking stored data by any person who exceeds his/her access authority;

    2. Destroying the data of critical information and communications infrastructure, or using programs, such as computer viruses and logic bombs, with the intention of obstructing the operation of critical information and communications infrastructure;

    3. Abruptly sending large amounts of signals with the intention of obstructing the operation of critical information and communications infrastructure, or causing a fallacy in information processing by means, such as inducing the processing of a wrong order.

    Article 13 (Notification of Intrusion Incidents)

    (1) The head of a management organization shall, when he/she recognizes that the occurrence of intrusion incidents has led to the disturbance, paralysis or destruction of critical information and communications infrastructure under its jurisdiction, notify a relevant administrative agency, an investigation agency, or the Internet and Security Agency (hereinafter referred to as the “relevant organization, etc.”) of such fact. In such cases, the relevant organizations, etc. shall take necessary measures to prevent the spread of damage caused by intrusion incidents and swiftly respond to such incidents. (Amended by Act nº 11690, Mar. 23, 2013)

    (2) The Government may provide financial support, including expenses incurred in restoring damage, to a management organization that has contributed to preventing the spread of damage by notifying intrusion incidents under paragraph (1), within the budgetary limits

     Article 14 (Restoration Measures)

    (1) The head of a management organization shall take necessary measures to restore and protect relevant information and communications infrastructure in a swift manner when intrusion incidents against critical information and communications infrastructure under its jurisdiction occur.

    (2) The head of a management organization may request the head of a relevant central administrative agency or the head of the Internet and Security Agency to provide support when necessary for taking measures for restoration and protection under paragraph (1): Provided, That this shall not apply to cases falling under Article 7 (2). (Amended by Act nº 11690, Mar. 23, 2013)

    (3) The head of the relevant central administrative agency or the head of the Internet and Security Agency shall, when they receive requests for support under paragraph (2), provide necessary support for the fast restoration of damage, such as technological support, and take appropriate measures to prevent the spread of damage, in cooperation with the head of a management organization. (Amended by Act nº 11690, Mar. 23, 2013)

    Article 15 (Organization, etc. of Headquarters for Countermeasures, etc.)

    (1) When intrusion incidents against critical information and communications infrastructure occur in a wide range, the Chairperson of the Committee may establish the Headquarters for Countermeasures against Intrusion Incidents in Information and Communications Infrastructure (hereinafter referred to as the “Countermeasure Headquarters“) under the control of the Committee, fixing a period for taking emergency measures, providing technological support and restoring damage, etc.

    (2) The Chairperson of the Committee may request the dispatch of public officials related to the affairs of the Countermeasure Headquarters to the head of a relevant administrative agency.

    (3) The Chairperson of the Committee shall appoint the head of the Countermeasure Headquarters, in consultation with the head of a central administrative agency in charge of information and communications infrastructure, against which intrusion incidents occurred.

    (4) The head of the Headquarters for Countermeasures may request the head of the relevant administrative agency, the head of a management organization and the head of the Internet and Security Agency to provide cooperation and support to respond to intrusion incidents against critical information and communications infrastructure. (Amended by Act nº 11690, Mar. 23, 2013)

    (5) The head of the relevant administrative agency, etc. shall, upon a request for cooperation and support under paragraph (4), comply with such request, unless any extraordinary ground exists to the contrary.

    (6) Necessary matters concerning the organization and operation of the Countermeasure Headquarters shall be prescribed by Presidential Decree.

    Article 16 (Information Sharing and Analysis Center)

    (1) Any person who intends to perform the following affairs to protect information and communications infrastructure by area, such as finance and communications, may establish and operate an information sharing and analysis center:

    1. Provision of information concerning vulnerabilities, intrusion factors, and countermeasures;

    2. Operation of the real-time alarm and analysis system, if intrusion incidents occur.

    (2) The head of an information sharing and analysis center under paragraph (1) shall notify the heads of the relevant central administrative agencies of matters prescribed by Presidential Decree, such as information of persons engaged in duties. The same shall apply to revisions to the notified matters.

    (3) The heads of the relevant central administrative agencies shall notify the Minister of Science, Information and Communications Technology (ICT) and Future Planning of matters notified under paragraph (2). (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) The Government may encourage the establishment of an information sharing and analysis center, which performs duties falling under each subparagraph of paragraph (1), and provide technological support thereto.

    (5) Necessary matters concerning methods of and procedures for notification under paragraph (2) shall be prescribed by Presidential Decree.

    CHAPTER V.- Deleted.

    Articles 17 through 23 Deleted. (by Act nº 9708, May 22, 2009)

    CHAPTER VI.- TECHNOLOGICAL SUPPORT AND PRIVATE COOPERATION

    Article 24 (Technological Development, etc.)

    (1) The Government may formulate implementation policies for the development of technology necessary for protecting information and communications infrastructure and the fostering of specialized human resources.

    (2) The Government may require research institutes and private organizations related to the development of information protection technology to develop technology on its behalf, when necessary for efficiently advancing development of technology necessary for the protection of information and communications infrastructure. In such cases, the Government may wholly or partially subsidize expenses incurred in such development.

    Article 25 (Support for Management Organization)
    The Government may, with respect to a management organization, transfer technology necessary for protecting critical information and communications infrastructure, and provide equipment and other necessary support.

    Article 26 (International Cooperation)

    (1) The Government shall ascertain international trends concerning the protection of information and communications infrastructure and promote international cooperation.

    (2) The Government may provide support for international exchanges of related technologies and human resources and projects for international standardization and international joint research and development, so as to promote international cooperation for the protection of information and communications infrastructure.

    Article 27 (Duty of Confidentiality)
    No one who is or has been employed in any of the following organizations shall divulge any confidential information obtained in the course of his/her performance of duties: However, this shall not apply to cases where special provisions exist in other Acts: (Amended by Act nº 8777, Dec. 21, 2007)

    1. The Committee and the working committees under Article 3;

    2. Any organization in charge of the analysis and evaluation of the vulnerabilities of critical information and communications infrastructure under Article 9 (3);

    3. Any relevant organization which performs duties related to the acceptance of notification of intrusion incidents and restoration measures under Article 13;

    4. Any information sharing and analysis center which performs duties falling under any subparagraph of Article 16 (1).

    CHAPTER VII.- PENALTY PROVISIONS

    Article 28 (Penalty Provisions)

    (1) Any person who disturbs, paralyzes or destroys critical information and communications infrastructure, in violation of Article 12, shall be punished by imprisonment with labor for not more than 10 years or by a fine not exceeding 100 million won.

    (2) Any person who has attempted a crime under referred to in paragraph (1) shall be subject to punishment.

    Article 29 (Penalty Provisions)
    Any person who divulges any confidential information secret, in violation of Article 27, shall be punished by imprisonment with labor for not more than five years, by suspension of qualifications for not more than ten years or by a fine not exceeding 50 million won.

    Article 30 (Administrative Fines)

    (1) Any person falling under any of the following subparagraphs shall be punished by an administrative fine not exceeding 10 million won: (Amended by Act nº 8777, Dec. 21, 2007)

    1. Any person who violates an order to take protection measures under Article 11;

    2. Any person who fails to issue a notice under Article 16 (2);

    3. through 5. Deleted (by Act nº 9708, May 22, 2009)

    (2) An administrative fine under paragraph (1) shall be imposed and collected by the heads of the relevant central administrative agencies or the Minister of Science, Information and Communications Technology (ICT) and Future Planning (hereinafter referred to as the “levying authority”) as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 9708, May 22, 2009; Amended by Act nº 11690, Mar. 23, 2013)

    (3) Any person who is dissatisfied with an administrative fine imposed under paragraph (2), may raise an objection to the levying authority within 30 days after being informed of such imposition.

    (4) If a person subject to the imposition of an administrative fine under paragraph (2) raises an objection under paragraph (3), the levying authority shall, without delay, notify the competent court, which, in turn, shall proceed to trial on the administrative fine pursuant to the Non-Contentious Case Procedure Act. (Amended by Act nº 8777, Dec. 21, 2007)

    (5) If neither an objection is raised nor an administrative fine is paid within a period prescribed in paragraph (3), the administrative fine shall be collected in the same manner as delinquent national taxes are collected.

    ADDENDUM
    This Act shall enter into force on July 1, 2001.

    ADDENDA (Act nº 6796, Dec. 18, 2002)

    (1) (Enforcement Date) This Act shall enter into force on the date of its promulgation.

    (2) (Transitional Measures concerning the Change of Names of Companies Specializing in Information Protection) Companies specializing in information protection designated under the previous provisions at the time this Act enters into force shall be deemed consulting companies specializing in information protection designated under this Act.

    ADDENDA (Act nº 7428, Mar. 31, 2005)

    Article 1 (Enforcement Date)
    This Act shall enter into force one year after the date of its promulgation.

    Articles 2 through 6 Omitted.

    ADDENDA (Act nº 8777, Dec. 21, 2007)

    (1) (Enforcement Date) This Act shall enter into force six months after the date of its promulgation.

    (2) (Applicability) The amended provisions of Article 5-2 shall apply to measures to protect critical information and communications infrastructure which were formulated in 2007 and thereafter.

    ADDENDA (Act nº 8852, Feb. 29, 2008)

    Article 1 (Enforcement Date)
    This Act shall enter into force on the date of its promulgation (Proviso Omitted.).

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 9708, May 22, 2009)

    Article 1 (Enforcement Date)
    This Act shall enter into force three months after the date of its promulgation (Proviso Omitted.).

    Articles 2 through 12 Omitted.

    ADDENDA (Act nº 11690, Mar. 23, 2013)

    Article 1 (Enforcement Date)
    This Act shall enter into force on the date of its promulgation.

    Articles 2 through 7 Omitted.

    01Nov/21

    Act nº 13234, Mar. 27, 2015. Act on the Development of Cloud Computing and Protection of its Users.

    Act nº 13234, Mar. 27, 2015, On the development of Cloud Computing and Protection of its users

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to contribute to improvement of citizens’ live and the development of the national economy by promoting the development and use of cloud computing and by creating an environment for safe use of cloud computing services.

    Article 2 (Definitions)

    The terms used in this Act shall be defined as follows:

    1. The term “cloud computing” means an information processing system that makes it possible to flexibly use integrated and shared resources for information and communications (hereinafter referred to as “resources for information and communications”), such as devices for information and communications, information and communications systems, and software, through information and communications networks in accordance with changes in users’ requirements or demands;

    2. The term “cloud computing technologies” means information and communications technologies specified by Presidential Decree as those for the establishment and use of cloud computing, including technologies for virtualization and distributed processing;

    3. The term “cloud computing services” means the services specified by Presidential Decree as commercial services of providing resources for information and communications to others by utilizing cloud computing;

    4. The term “user information” means the information (referring to the information prescribed in subparagraph 1 of Article 3 of the Framework Act on National Informatization) stored by a user of cloud computing services (hereinafter referred to as “user”) in the resources for information and communications of the person who provides the cloud computing services through a cloud computing system (hereinafter referred to as “cloud computing service provider“) and owned or managed by the user.

    Article 3 (Responsibilities of State, etc.)

    (1) The State and local governments shall formulate policies necessary for promoting the development and use of cloud computing and for creating an environment for safe use of cloud computing services.

    (2) Cloud computing service providers shall endeavor to protect user information and provide reliable cloud computing services.

    (3) Users shall not engage in any activity compromising the safety of cloud computing services.

    Article 4 (Relationship to Other Acts)

    This Act shall take precedence over other Acts with regard to promoting development and use of cloud computing and the protection of users: Provided, That, with regard to the protection of personal information, the provisions of the Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., and other relevant Acts shall apply.

    CHAPTER II.- CREATION OF BASIS FOR DEVELOPMENT OF CLOUD COMPUTING

    Article 5 (Formulation of Master Plans and Implementation Plans)

    (1) The Minister of Science, ICT and Future Planning shall collect plans, policies, etc. formulated by central administrative agencies related to the promotion of development and use of cloud computing and the protection of users (hereinafter referred to “relevant central administrative agencies”), formulate a master plan every three years (hereinafter referred to as “master plan”), and finalize the plan after deliberation by the Information Communications Strategy Committee under Article 7 of the Special Act on the Promotion of Information and Communications, the Invigoration of Convergence, etc.

    (2) Each master plan shall contain the following matters:

    1. The basic direction-setting for policies for the promotion of development and use of cloud computing and the protection of users;

    2. Matters concerning the creation of a basis for promoting the cloud computing industry and the use of cloud computing;

    3. Matters concerning the introduction of cloud computing and the promotion of use;

    4. Matters concerning the facilitation of research and development of cloud computing technologies;

    5. Matters concerning the training of human resources specializing in cloud computing;

    6. Matters concerning promoting the international cooperation and the development of overseas markets for cloud computing;

    7. Matters concerning protecting information of users of cloud computing services;

    8. Matters concerning improving the statutes and systems related to cloud computing;

    9. Matters concerning the facilitation of convergence of technologies and industries related to cloud computing;

    10. Other necessary matters concerning the development of cloud computing technologies and cloud computing services.

    (3) The head of the relevant central administrative agency shall formulate and execute an implementation plan for the affairs under his/her jurisdiction (hereinafter referred to as “implementation plan“) in accordance with the master plan.

    (4) The head of the relevant central administrative agency shall submit an implementation plan for next year and a report on the results of execution of the implementation plan for the preceding year to the Minister of Science, ICT and Future Planning, as prescribed by Presidential Decree, and the Minister of Science, ICT and Future Planning shall evaluate the results of execution of the implementation plan for each year.

    (5) Except as otherwise expressly provided for in paragraphs (1) through (4), matters necessary for the formulation and execution of master plans and implementation plans and the submission and evaluation of reports on the results of execution shall be prescribed by Presidential Decree.

    Article 6 (Cooperation from Relevant Agencies)

    (1) The Minister of Science, ICT and Future Planning or the head of the relevant central administrative agency may request the head of a State agency, local government, or public agency defined by subparagraph 3 of Article 2 of the Electronic Government Act (hereinafter referred to as “State agency or other public authority“) to cooperate with him/her as necessary for the formulation and implementation of master plans or implementation plans.

    (2) Each person in receipt of the request under paragraph (1) shall comply with the request, in the absence of good cause to the contrary.

    Article 7 (Fact-Finding Survey)

    (1) The Minister of Science, ICT and Future Planning may conduct fact-finding surveys in order to secure information and statistics about the current situation of industries as necessary for the effective formulation and implementation of policies on cloud computing.

    (2) Where the Minister of Science, ICT and Future Planning deems it necessary for the fact-finding surveys under paragraph (1), he/she may request a cloud computing service provider or any other related institution or organization to submit data or express opinions.

    (3) Upon receipt of a request from the head of the relevant central administrative agency, the Minister of Science, ICT and Future Planning shall notify him/her of the results of fact-finding surveys.

    (4) Necessary matters concerning the fact-finding surveys under paragraphs (1) through (3) shall be prescribed by Presidential Decree.

    Article 8 (Research and Development)

    (1) The head of the relevant central administrative agency may implement a research and development project for cloud computing technologies and cloud computing services.

    (2) The head of the relevant central administrative agency may outsource an enterprise or research institute to perform a research and development project under paragraph (1) and may fully or partially subsidize it for expenses incurred in the performance of the project.

    Article 9 (Pilot Projects)

    (1) The head of the relevant central administrative agency may implement a pilot project to promote the use and diffusion of cloud computing technologies and cloud computing services and may request local governments to cooperate with him/her in implementing the pilot project.

    (2) The head of the relevant central administrative agency may provide financial assistance to the persons who participate in a pilot project under paragraph (1).

    Article 10 (Assistance by Taxation)

    The State and local governments may take necessary measures, such as full or partial exemption of taxes, as provided for in the Restriction of Special Taxation Act, the Restriction of Special Local Taxation Act, and other Tax-related Acts, in order to promote the development and use of cloud computing technologies and cloud computing services.

    Article 11 (Assistance to Small and Medium Enterprises)

    (1) The Government may provide assistance to small and medium enterprises (referring to the small and medium enterprises defined in Article 2 of the Framework Act on Small and Medium Enterprises; hereinafter the same shall apply) engaging in cloud computing as follows in order to promote the development and use of cloud computing and to protect users:

    1. Provision of information about cloud computing services and consulting thereon;

    2. Provision of technologies and subsidization of expenses as necessary for protecting user information;

    3. Training of human resources specializing in cloud computing;

    4. Assistance in other matters necessary for fostering small and medium enterprises engaging in cloud computing.

    (2) Where the head of a relevant central administrative agency implements a research and development project under Article 8, he/she shall prepare measures to promote participation by small and medium enterprises engaging in cloud computing.

    (3) Necessary matters concerning the entities eligible for assistance, the method for providing assistance, etc. under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    Article 12 (Facilitation of Introduction of Cloud Computing to State Agencies and Other Public Authorities)

    (1) The State agencies and other public authorities shall endeavor to introduce cloud computing.

    (2) Where the Government formulates a budget necessary for the implementation of a policy or project for national informatization under the Framework Act on National Informatization, it shall give preference to the introduction of cloud computing.

    Article 13 (Forecast on Demand for Cloud Computing Projects)

    (1) The head of each State agency or other public authority shall submit a forecast on the demand for cloud computing projects from affiliated agencies to the Minister of Science, ICT and Future Planning, at least annually.

    (2) The Minister of Science, ICT and Future Planning shall disclose the forecasts received on the demand for cloud computing under paragraph (1) to cloud computing service providers, at least annually.

    (3) Necessary matters concerning the frequency, timing, method, procedure, etc. for the submission and disclosure of forecasts under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    Article 14 (Training of Specialized Human Resources)

    (1) The Minister of Science, ICT and Future Planning may formulate and implement policies necessary for training human resources specializing in cloud computing.

    (2) The Minister of Science, ICT and Future Planning may designate the institutions that meet the requirements prescribed by Presidential Decree, from among educational institutions that conduct educational and training courses related to cloud computing, and may fully or partially subsidize such institutions for expenses incurred in engaging in such courses.

    (3) In any of the following cases, the Minister of Science, ICT and Future Planning may revoke the designation of an educational institution designated under paragraph (2): Provided, That the designation shall be revoked in cases of subparagraph 1:

    1. Where an educational institution has obtained the designation by fraud or other wrongful means;

    2. Where an educational institution ceases to meet any of the requirements for designation under paragraph (2);

    3. Where an educational institution has no record of providing education for at least one year from the date of designation of the educational institution.

    (4) Necessary matters concerning the formulation of policies, the requirements for designating educational institutions, the procedure for designation and revocation of designation, the scope of assistance, etc. shall be prescribed by Presidential Decree.

    Article 15 (Facilitation of International Cooperation and Development of Overseas Markets)

    In order to facilitate international cooperation in cloud computing and the development of overseas markets for cloud computing technologies and cloud computing services, the Government may conduct the following activities:

    1. International exchange of information, technologies, and human resources in relation to cloud computing;

    2. Advertising and overseas marketing, including exhibitions related to cloud computing;

    3. Joint research and development of cloud computing with other countries;

    4. Collection, analysis, and provision of information for the development of overseas markets for cloud computing;

    5. Mutual assistance with other countries to ensure effective international cooperation in cloud computing;

    6. Other activities necessary to facilitate international cooperation in cloud computing and the development of overseas markets.

    Article 16 (Assistance in Establishment of Integrated Information and Communications Facilities Based on Cloud Computing Technologies)

    (1) In order to promote the development and use of cloud computing, the State and local governments may provide administrative, financial, technical assistance to persons who intend to establish information and communications facilities integrated by using cloud computing technologies.

    (2) Necessary matters concerning the persons eligible for the assistance under paragraph (1), the method and procedure for such assistance, etc. shall be prescribed by Presidential Decree.

    Article 17 (Creation of Industrial Complexes)

    (1) The State and local governments may create industrial complexes to promote the cloud computing industry and facilitate the utilization of cloud computing through research and development of technologies for the cloud computing industry and training of specialized human resources.

    (2) The industrial complexes shall be created in accordance with the procedure for the designation and development of national industrial complexes, general industrial complexes, and urban hi-tech industrial complexes under the Industrial Sites and Development Act.

    (3) Where the Minister of Science, ICT and Future Planning deems it necessary for facilitating the creation of industrial complexes, he/she may request the Minister of Land, Infrastructure and Transport to designate them as industrial complexes.

    Article 18 (Creation of Environment for Fair Competition, etc.)

    (1) The Government shall create an environment for fair competition between large enterprises (referring to enterprises that do not fall into the category of either small and medium enterprises under Article 2 of the Framework Act on Small and Medium Enterprises or middle-standing enterprises under subparagraph 1 of Article 2 of the Special Act on the Promotion of Growth and the Strengthening of Competitiveness of Middle-Standing Enterprises) that provide cloud computing services and small and medium enterprises that also provide cloud computing services.

    (2) No large enterprise that provides cloud computing services shall compel a small or medium enterprise that also provides cloud computing services to sign an unfair contract nor shall obtain unjust benefits, without any reasonable cause, taking advantage of its position.

    (3) In order to create an environment for fair competition in the cloud computing industry, the Government may analyze and evaluate the current conditions of the environment for competitions in the cloud computing industry and may implement other programs necessary for creating an environment for fair distribution.

    Article 19 (Designation of Exclusively Responsible Institution, etc.)

    (1) Where the Minister of Science, ICT and Future Planning deems it necessary for promoting the cloud computing industry and facilitating the use of cloud computing, he/she may designate an exclusively responsible institution.

    (2) The Minister of Science, ICT and Future Planning may fully or partially subsidize an exclusively responsible institution for expenses incurred in performing its business activities.

    (3) Necessary matters concerning the designation, operation, etc, of an exclusively responsible institution shall be prescribed by Presidential Decree.

    CHAPTER III.- FACILITATING USE OF CLOUD COMPUTING SERVICES

    Article 20 (Facilitating Public Institutions’ Use of Cloud Computing Services)

    The Government shall endeavor to encourage public institutions to use cloud computing services provided by cloud computing service providers for their work process.

    Article 21 (Required Electronic Computer Systems, etc.)

    Where electronic computer systems, equipment, facilities, etc. (hereinafter referred to as “electronic computer systems“) are expressly provided for in any other statute as requirements for authorization, permission, registration, designation, or any similar action, relevant electronic computer systems shall be deemed to include cloud computing services: Provided, That the foregoing shall not apply to any of the following cases:

    1. Where the relevant statute expressly prohibits the use of cloud computing services;

    2. Where the relevant statute requires the building of physical partitions between lines or facilities and actually restrict the use of cloud computing services;

    3. Where cloud computing services are used but do not meet the requirements for electronic computer systems required by the relevant statute.

    Article 22 (Securing of Interoperability)

    Where the Minister of Science, ICT and Future Planning deems it necessary for securing the interoperability of cloud computing services, he/she may recommend cloud computing service providers to establish a cooperation system.

    CHAPTER IV.- ENHANCEMENT OF RELIABILITY OF CLOUD COMPUTING SERVICES AND PROTECTION OF USERS

    Article 23 (Enhancement of Reliability)

    (1) Cloud computing service providers shall endeavor to enhance the quality and performance of cloud computing services and the level of protection of information.

    (2) The Minister of Science, ICT and Future Planning shall determine and publicly notify the standards for the quality and performance of cloud computing services and the standards for the protection of information (including managerial, physical, technical measures for protection) and may recommend cloud computing service providers to observe the standards.

    (3) Where the Minister of Science, ICT and Future Planning intends to publicly notify the standards for the quality and performance of cloud computing services under paragraph (2), he/she shall seek opinions from the Korea Communications Commission thereon.

    Article 24 (Standard Agreement Forms)

    (1) In order to protect users and establish public order for fair transactions, the Minister of Science, ICT and Future Planning may formulate or amend standard agreement forms related to cloud computing services, subject to consultation with the Fair Trade Commission, and may recommend that cloud computing service providers use such forms. In such cases, the Minister of Science, ICT and Future Planning may seek opinions of cloud computing service providers, users, and others.

    (2) Where the Minister of Science, ICT and Future Planning intends to formulate or amend standard agreement forms pursuant to paragraph (1), he/she shall seek the opinion of the Korea Communications Commission thereon.

    Article 25 (Notification, etc. of Intrusions, etc.)

    (1) In any of the following cases, the cloud computing service provider shall notify the relevant user of the fact promptly:

    1.  Where an intrusion defined by subparagraph 7 of Article 2 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. (hereinafter referred to as “intrusion”) occurs;

    2. Where the relevant user information is leaked;

    3. Where services are interrupted for a period at least the period specified by Presidential Decree (referring to the period stipulated by an agreement between the parties, if such agreement has been made) without prior notice.

    (2) In case falling under paragraph (1) 2, the cloud computing service provider shall notify the Minister of Science, ICT and Future Planning of the fact immediately.

    (3) Where the Minister of Science, ICT and Future Planning receives the notice under paragraph (2) or becomes aware of such fact, he/she may take measures necessary for preventing worsening of damage, preventing reoccurrence, and restoring damaged systems,

    (4) Necessary matters concerning the notification and measures under paragraphs (1) through (3) shall be prescribed by Presidential Decree.

    Article 26 (Disclosure of Information for Protection of Users, etc.)

    (1) Any user may request a cloud computing service provider to inform him/her of the name of the country where the relevant user information is stored.

    (2) Any person who uses information and communications services (referring to the information and communications services defined by subparagraph 2 of Article 2 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.; hereinafter the same shall apply in paragraph (3)) may request an information and communications service provider (referring to the information and communications service provider defined by subparagraph 3 of Article 2 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.; hereinafter the same shall apply in paragraph (3)) to inform him/her as to whether it uses cloud computing services and the name of the country where the relevant user information is stored.

    (3) Where the Minister of Science, ICT and Future Planning deems it necessary for protecting users or the users of information and communications services, he/she may recommend that cloud computing service providers or information and communications service providers disclose the information referred to in paragraph (1) or (2).

    (4) Where the Minister of Science, ICT and Future Planning intends to recommend the disclosure of information pursuant to paragraph (3), he/she shall seek opinions from the Korea Communications Commission thereon.

    Article 27 (Protection of User Information)

    (1) No cloud computing service provider shall provide user any information to a third party or use user information for any purpose other than for the purpose of providing services, without the relevant user’s consent, unless it is required by a court order to submit or a warrant issued by a judge. The foregoing shall also apply to a third party to whom a cloud computing service provider has provided user information.

    (2) Where a cloud computing service provider intends to provide any user information to a third party or to use the user information for any purpose other than for the purpose of providing services, it shall notify the user of the following matters and shall obtain consent thereto. The same shall apply where a change occurs to any of the following matters:

    1. The person to whom the user information is to be provided;

    2. The purpose of use of the user information (referring to the purpose of use of the person to whom the information is provided, if it is provided);

    3. A list of user information used or provided;

    4. The period of holding and use of user information (referring to the period of possession and user information by the person to whom user information is provided, where such information is provided);

    5. A statement that the user has a right to refuse to give consent and the details of disadvantages in such cases, if disadvantages are given against refusal to give consent.

    (3) Where the contract made with a user terminates, the cloud computing service provider shall return the user information to the user and destroy the user information possessed by the cloud computing service provider: Provided, That the user information shall be destroyed, if it is actually impossible to return the user information, because the user does not accept the return of the user information or does not want to have the user information returned.

    (4) Where a cloud computing service provider intends to close its business, it shall notify each user of the closure of business, return the user information before the date of closure of business, and destroy the user information possessed by the cloud computing service provider: Provided, That the user information shall be destroyed, if it is actually impossible to return the user information, because the user does not accept the return of the user information or does not wish to have the user information returned.

    (5) Notwithstanding paragraphs (3) and (4), if a cloud computing service provider has expressly agreed on different conditions with users, such conditions shall apply.

    (6) Matters concerning the methods and timing for the return and destruction of user information and the methods of notifying the termination of a contract or the closure of business shall be prescribed by Presidential Decree.

    Article 28 (Deposit of User Information)

    (1) A cloud computing service provider and users may deposit user information in an institution equipped with professional personnel and facilities (hereinafter referred to as “depository“) under an agreement entered into with the depository.

    (2) Where an event specified in the agreement made under paragraph (1) occurs, a user may request the depository to provide user information.

    Article 29 (Liability for Damages)

    Where a user sustains an injury or loss caused by a cloud computing service provider’s violation of any provision of this Act, he/she may claim damages for such injury or loss against the cloud computing service provider. In such cases, the cloud computing service provider shall not be exempted from liability, unless it proves that such injury or loss has not been caused by its intentional conduct or negligence.

    CHAPTER V.- SUPPLEMENTARY PROVISIONS

    Article 30 (Fact-Finding Investigation and Corrective Measures)

    (1) Where the Minister of Science, ICT and Future Planning has a reasonable ground to suspect that a cloud computing service provider has violated any provision of this Act, he/she may instruct public officials of the Ministry to conduct investigations as necessary to ascertain the violation.

    (2) Where the Minister of Science, ICT and Future Planning deems it necessary for the investigation under paragraph (1), he/she may authorize public officials of the Ministry to enter the office or place of business of a cloud computing service provider to inspect books of accounts, documents, and other materials or articles.

    (3) Where the Minister of Science, ICT and Future Planning intends to conduct an investigation under paragraph (1), he/she shall notify the relevant cloud computing service provider of the plan for investigation, including the period and scope of investigation, the grounds for the investigation, etc., by not later than seven days before the scheduled date of investigation: Provided, That the foregoing shall not apply to an emergency case or where it is deemed impossible to achieve the objectives of investigation if prior notice is given, because of destruction of evidence, etc.

    (4) Any person who enters the office or place of business of a cloud computing service provider to conduct an investigation shall show a certificate of authority to persons involved and shall have the persons in the office or place of business attend at the scene of the investigation.

    (5) The Minister of Science, ICT and Future Planning may order a cloud computing service provider who violates Article 25 (1) or 27 to cease the violation or to take corrective measures.

    Article 31 (Delegation and Entrustment)

    (1) The authority of the Minister of Science, ICT and Future Planning or the head of the relevant central administrative agency under this Act may be partially delegated to the heads of affiliated agencies, as prescribed by Presidential Decree.

    (2) The affairs assigned to the Minister of Science, ICT and Future Planning or the head of the relevant central administrative agency under this Act may be partially entrusted to a specialized institution, as prescribed by Presidential Decree.

    Article 32 (Duty of Confidentiality)

    Any person who currently or formerly engaged in an affair entrusted under this Act shall not divulge a cloud computing service provider’s confidential information on business which becomes known to him/her in the course of executing the affair.

    Article 33 (Legal Fiction of Deeming Public Officials for Application of Penalty Provisions)

    Executive officers and employees of a specialized institution engaging in the affairs entrusted pursuant to Article 31 (2) shall be deemed public officials for the purpose of applying penalty provisions of Articles 129 through 132 of the Criminal Act to them.

    CHAPTER VI.- PENALTY PROVISIONS

    Article 34 (Penalty Provisions)

    Any person who uses user information or provides user information to a third party, without the relevant user’s consent, or any person who obtains user information for profit or for any wrongful purpose, knowing that the relevant user has not consented thereto, in violation of Article 27 (1), shall be punished by imprisonment for not more than five years or by a fine not exceeding 50 million won.

    Article 35 (Penalty Provisions)

    Any person who divulges confidential information which becomes known to him/her in the course of executing an affair entrusted, in violation of Article 32, shall be punished by imprisonment for not more than three years or by a fine not exceeding 30 million won.

    Article 36 (Joint Penalty Provisions)

    Where the representative of a corporation or an agent, employee, or servant who works for a corporation or for an individual commits an offense in violation of Article 34 or 35 in connection with the business of the corporation or individual, not only shall such offender be punished accordingly, but the corporation or individual also shall be punished by the fine prescribed in the relevant Article: Provided, That the foregoing shall not apply where the corporation or individual has not neglected due care and supervision over the relevant business to prevent such offense.

    Article 37 (Administrative Fines)

    Any of the following persons shall be punished by an administrative fine not exceeding ten million won:

    1. A person who fails to notify users of an intrusion, the leakage of user information, or the interruption of service, in violation of Article 25 (1);

    2. A person who fails to notify the Minister of Science, ICT and Future Planning of the leakage of user information, in violation of Article 25 (2);

    3. A person who fails to return or destroy user information, in violation of Article 27 (3) or (4);

    4. A person who fails to comply with an order issued under Article 30 (5) to cease a violation or to take corrective measures.

    (2) The administrative fines under paragraph (1) shall be imposed and collected by the Minister of Science, ICT and Future Planning, as prescribed by Presidential Decree.

    ADDENDUM

    This Act shall enter into force six months after the date of its promulgation.

    01Nov/21

    Act nº 14577, Digital Signature Act, Mar. 14, 2017

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)          

    The purpose of this Act is to establish the basic framework for the system of digital signatures in order to secure the safety and reliability of electronic messages and to promote their use, thereby stimulating the use of electronic records and communications on a national level and advancing social benefit and convenience.

    Article 2 (Definitions)     

    The terms used in this Act shall be defined as follows:

    1. The term “electronic message” means a piece of information generated and sent, received, or stored in digital form through an information processing system;

    2. The term “digital signature” means a piece of information in digital form affixed on, or logically combined to, an electronic message in order to identify the signer and verify that the electronic message has been signed by that signer;

    3. The term “certified digital signature” means a digital signature that satisfies the following requirements and is grounded upon an authorized certificate:

    (a) That the digital signature creating key shall be only held by and known only to the subscriber;

    (b) That the subscriber shall be controlling and managing the digital signature creating key at the time of signing;

    (c) That it shall be ascertained whether there has been any alteration in the digital signature concerned since it was affixed;

    (d) That it shall be ascertained whether there has been any alteration in the electronic message concerned since digital signature was affixed;

    4. The term “digital signature creating key” means a sequence of bits used to affix a digital signature to an electronic message;

    5. The term “digital signature verifying key” means a sequence of bits used to verify a digital signature;

    6. The term “certification” means the act of ascertaining and verifying that the digital signature creating key is held and known only by the subscriber;

    7. The “certificate” means a computer-based record ascertaining and verifying that the digital signature creating key is only held by and known only to the subscriber;

    8. The term “authorized certificate” means a certificate that a licensed certification authority issues in accordance with Article 15;

    9. The term “authorized certification work” means the affairs of offering authorized certification services, such as the issuance of authorized certificates, the maintenance of certification-related records, etc.;

    10. The term “licensed certification authority” means an entity that is, in accordance with Article 4, designated as such in order to offer authorized certification services;

    11. The term “subscriber” means a person whose digital signature creating key has been certified by a licensed certification authority;

    12. The term “signer” means a person who holds his own digital signature creating key and signs in his or her own name or on behalf of another person;

    13. The term “information on individual” means a piece of information that pertains to a living individual, such as information regarding marks, letters, voice, sound, image, and biometric characteristics which may help establish the identity of the person concerned based on his or her name, resident registration number, etc. (including cases where such information, even if this information is not enough to identify a specific person, can be combined easily with other information to establish his or her identity).

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 3 (Effect, etc. of Digital Signature)

    (1) In cases where a signature, signature and seal, or name and seal is, under other Acts and subordinate statutes, required to be affixed on a paper-based document or letter, it shall be deemed that such requirements are satisfied if there is a certified digital signature affixed on an electronic message. (Amended by Act nº 6585, Dec. 31, 2001)

    (2) In cases where a certified digital signature is affixed on an electronic message, it shall be presumed that such a digital signature is the signature, signature and seal, or name and seal of the signer of the electronic message concerned and that there has been no alteration in the contents of such message since it was signed digitally. (Amended by Act nº 6585, Dec. 31, 2001)

    (3) A digital signature other than a certified digital signature shall have such an effect of a signature, signature and seal, or name and seal, as is agreed between the parties concerned.    (Inserted by Act nºº 6585, Dec. 31, 2001)

    CHAPTER II.- LICENSED CERTIFICATION AUTHORITY

    Article 4 (Designation of Licensed Certification Authority)

    (1) The Minister of Science, ICT and Future Planning may designate as a licensed certification authority an entity that is deemed to be capable of performing authorized certification work (hereinafter referred to as “certification work“) in a secure and reliable manner. (Amended by Act º 6585, Dec. 31, 2001; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) The entity that can be designated as a licensed certification authority shall be limited to State agencies, local governments and corporations.

    (3) The entity that desires to be designated as a licensed certification authority shall meet such requirements as technical and financial capabilities, facilities and equipment, and other required matters as provided by Presidential Decree.

    (4) Where the Minister of Science, ICT and Future Planning designates a licensed certification authority under paragraph (1), he or she may designate it, for a sound development, etc. of the authorized certification market, by dividing the domain of certification work under the establishment purpose in cases of State agencies, local governments, non-profit corporations or corporations established by special Acts. (Inserted by Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (5) Procedures for designation of a licensed certification authority and other necessary matters shall be determined by Presidential Decree.

    Article 5 (Grounds for Disqualification)   

    No person who falls under any of the following subparagraphs shall be designated as a licensed certification authority: (Amended by Act nº 7428, Mar. 31, 2005; Act nº 12762, Oct. 15, 2014)

    1. A corporation of which any executive officer falls under any of the following:

    (a) A person under adult guardianship or limited guardianship, or a person who has been declared by a court as bankrupt and has not been reinstated;

    (b) A person in whose case two years have not elapsed since his or her imprisonment without labor or heavier punishment declared by a court was completely executed (including cases where the execution of the sentence is deemed completed) or exempted;

    (c) A person who is under suspension of the execution of imprisonment without labor or heavier punishment as declared by a court;

    (d) A person who has been disqualified or whose qualification has been suspended by the court decision or under other Acts;

    (e) A person who was in the position of an executive officer of a corporation at the time when its designation as a licensed certification authority was revoked pursuant to Article 12 (limited to cases where two years have not yet passed since its revocation);

    2. A corporation in whose case two years have not yet passed since its designation as a licensed certification authority was revoked pursuant to Article 12.

     Article 6 (Rules, etc. of Authorized Certification Work)   

    (1) A licensed certification authority shall prepare its rules of authorized certification work (hereinafter referred to as “rules of certification work“) that contains matters set forth in each of the following subparagraphs and report them to the Minister of Science, ICT and Future Planning before starting to perform certification work: (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Types of certification work;

    2. Method and procedures for performing certification work;

    3. Terms and conditions of use for authorized certification services (hereinafter referred to as “certification services“);

    4. Such other matters as may be necessary to carry out certification work.

    (2) A licensed certification authority shall prepare the rules of certification work under the standards for the rules of authorized certification work and the digital signature certification work guidelines under the provisions of Article 8 that are provided and notified by the Minister of Science, ICT and Future Planning. (Inserted by Act nº 7813, Dec. 20, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) In cases of the modification of the matters already reported under paragraph (1), a licensed certification authority shall report such fact to the Minister of Science, ICT and Future Planning within a period of time prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Inserted by Act nº 6585, Dec. 31, 2001; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) Where the contents of rules of certification work reported under the provisions of paragraph (1) to ensure the safety and reliability of certification work and to protect subscribers’ interests violate the standards for preparing the rules of authorized certification work provided and notified by the Minister of Science, ICT and Future Planning and the digital signature certification work guidelines under the provisions of Article 8 (1), the Minister of Science, ICT and Future Planning may order the licensed certification authority concerned to modify the same rules of certification work within a reasonable and fixed period of time. (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (5) A licensed certification authority shall faithfully observe all the matters prescribed by the rules of certification work. (Inserted by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005)

    Article 7 (Provision, etc. of Certification Services)              

    (1) No licensed certification authority shall refuse to provide certification services without any justifiable reason.

    (2) No licensed certification authority shall unjustly discriminate against a subscriber or a certification service user.

    Article 8 (Performance of Certification Work by Licensed Certification Authority)              

    (1) In order to ensure the safety and reliability of certification work, the Minister of Science, ICT and Future Planning may draw up and notify digital signature certification work guidelines on specific matters that shall be observed by a licensed certification authority in performing certification work. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) The digital signature certification work guidelines under paragraph (1) shall contain the following: (Inserted by Act nº 7813, Dec. 30, 2005)

    1. Matters concerning the management of authorized certificates;

    2. Matters concerning the management of digital signature creating keys;

    3. Matters concerning the protection of the facilities of licensed certification authorities;

    4. Other matters concerning the certification work and operational management.

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 9 (Acquisition of Certification Work by Transfer, etc.)        

    (1) A licensed certification authority, which desires to acquire the certification work of another licensed certification authority or to merge with another licensed certification authority that is a corporation, shall report it to the Minister of Science, ICT and Future Planning as prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº. 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) A licensed certification authority that has acquired the certification work as referred to in paragraph (1), or in the case of merger, the corporation that has survived or newly been established after the merger thereunder shall succeed to the status of the former licensed certification authority.

    Article 10 (Cessation, Closure, etc. of Certification Work)               

    (1) When a licensed certification authority desires to cease all or part of its certification work, it shall fix the period of cessation and notify its subscribers thereof not later than 30 days before the scheduled date of cessation, and also report it to the Minister of Science, ICT and Future Planning. In such cases, this period of cessation shall not exceed six months. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) When a licensed certification authority desires to close its certification work, it shall notify its subscribers thereof not later than 60 days before the scheduled date of closure, and also report it to the Minister of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) The licensed certification authority that has reported under paragraph (2) shall transfer to another licensed certification authority its subscriber’s authorized certificates as well as the records of the authorized certificates the validity of which was suspended and which was revoked (hereinafter referred to as the “subscriber’s certificates, etc.”): Provided, That if the subscriber’s certificates, etc. may not be transferred to another licensed certification authority due to unavoidable circumstances, the licensed certification authority shall, without delay, report such fact to the Minister of Science, ICT and Future Planning. (Amended by Act nº 6585, Dec. 31, 2001; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) Upon receipt of the report under the proviso to paragraph (3), the Minister of Science, ICT and Future Planning may order the Korea Internet Security Agency under Article 52 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. (hereinafter referred to as the “Internet Security Agency“) to take over the subscriber’s certificates, etc. from the licensed certification authority concerned. (Amended by Act nº 6360, Jan. 16, 2001; Act nº 6585, Dec. 31, 2001; Actnº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (5) Such matters as may be necessary for the report of the cessation or closure of certification work as well as the transfer and takeover of the subscriber’s certificates, etc. as referred to in paragraphs (1) through (4) shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    Article 11 (Corrective Order)       

    The Minister of Science, ICT and Future Planning may order a licensed certification authority to take corrective measures within a fixed period of time if it falls under any of the following subparagraphs: (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Deleted; (by Act nº 7813, Dec. 30, 2005)

    2. Where a licensed certification authority fails to satisfy the requirements it should meet under Article 4 (3) after it was designated as a licensed certification authority;

    3. Where an executive officer of a licensed certification authority falls under any of the items of subparagraph 1 of Article 5;

    4. Where a licensed certification authority fails to make a report or a report on alterations under Article 6 or where it fails to observe its rules of certification work that have been reported thereunder;

    5. Where a licensed certification authority refuses to provide certification services, or unjustly discriminates against subscribers or certification service users, in violation of Article 7;

    5-2. Where a licensed certification authority fails to observe specific matters set forth in the digital signature certification work guidelines, in violation of Article 8;

    6. Where no report is made on the acquisition of a certification work by transfer, or on a merger between the licensed certification authorities, in violation of Article 9 (1);

    7. Where a licensed certification authority fails to give notice of, or to make report on, the cessation or closure of its certification work, or where it fails to transfer its subscriber’s certificates, etc. to another certification authority at the time of the closure of its certification work, in violation of Article 10;

    8. Where a licensed certification authority, the designation of which is revoked, fails to transfer its subscriber’s certificates, etc. to another certification authority, or fails to make a report it is required to do in cases of no transfer, in violation of Article 12 (2);

    9. Where documents and materials as referred to in Article 14 (1) are not submitted;

    9-2. Where a licensed certification authority fails to confirm the identity under the latter part of Article 15 (1);

    10. Where a licensed certification authority fails to suspend or restore the validity of an authorized certificate, or where it fails to take such measures as may be necessary to confirm such fact, in violation of Article 17;

    11. Where a licensed certification authority fails to revoke an authorized certificate, or where it fails to take such measures as may be necessary to confirm such fact, in violation of Article 18;

    11-2. Where a licensed certification authority fails to take protective measures to ensure safety of facilities related to certification work in violation of Article 18-3;

    12. Where a licensed certification authority fails to report on a failure that occurred in the information processing systems providing a certification work under the provisions of Article 22-3 (1);

    13. Where a licensed certification authority fails to buy the insurance under the provisions of Article 26 (2).

    Article 12 (Suspension of Certification Work or Revocation of Designation, etc.)  

    (1) Where a licensed certification authority falls under any of the following subparagraphs, the Minister of Science, ICT and Future Planning may suspend all or part of its certification work for a fixed period not exceeding 6 months, or revoke its designation as a licensed certification authority: Provided, That in such cases as set forth in subparagraphs 1 and 2, its designation shall be revoked: (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Where a designation provided in Article 4 was made by fraud or other improper means;

    2. Where a licensed certification authority which has been ordered to suspend its certification work fails to suspend the certification work in violation of such order;

    3. Where certification work is not commenced within 6 months after designation provided in Article 4 or where certification work has been discontinued for 6 consecutive months or longer;

    4. Where an order to alter the rules of certification work as provided in Article 6 (4) is violated;

    5. Where a corrective order as provided in Article 11 is not implemented without good cause.

    (2) A licensed certification authority the designation of which is revoked pursuant to paragraph (1) shall transfer its subscriber’s certificates, etc. to another licensed certification authority: Provided, That if the subscriber’s certificates, etc. may not be transferred due to any unavoidable cause, the licensed certification authority shall, without delay, report such fact to the Minister of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) The provisions of Article 10 (4) shall apply mutatis mutandis to a licensed certification authority the designation of which is revoked.

    (4) Necessary matters pertaining to standards and procedures for dispositions referred to in paragraph (1) as well as transfer and takeover, etc. under paragraphs (2) and (3) shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    Article 13 (Imposition of Penalty Surcharge)        

    (1) Where a suspension of certification work as a sanction against an offence falling under any of subparagraphs of Article 12 (1) may cause subscribers, etc. serious inconvenience or may be harmful to other public interests, the Minister of Science, ICT and Future Planning may impose a penalty surcharge not exceeding 20 million won, in lieu of that suspension of certification work. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) The amount of a penalty surcharge according to the types and nature of the offences subject to penalty surcharge under paragraph (1) and other necessary matters shall be determined by Presidential Decree. (Amended by Act nº 7813, Dec. 30, 2005)

    (3) When a person who is obligated to pay a penalty surcharge under paragraph (1) fails to do so by due date, the Minister of Science, ICT and Future Planning shall collect it by referring to the practices of dispositions on default of national taxes. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    Article 14 (Inspection, etc.)          

    (1) In order to confirm the following matters intended to ensure the safety and reliability of certification work, to protect subscribers, etc., the Minister of Science, ICT and Future Planning may order a licensed certification authority to submit the relevant documents and materials, and cause the relevant public official to enter its office, work site, or any other necessary premises to inspect facilities, equipment, books, records and other items concerning certification work: (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Whether or not the procedures and methods for an identity confirmation by a licensed certification authority under the provisions of Article 15 are appropriate;

    2. Whether or not the safety and reliability of confirmation work provided in the provisions of Articles 18-3, 19 through 22, 22-2, 23 and 24 are ensured.

    (2) Where the Minister of Science, ICT and Future Planning has the relevant public official inspect under the provisions of paragraph (1), he or she shall notify the relevant licensed certification authority of the inspection plans such as the inspection date, details and reasons for inspection, not later than 7 days before the beginning of inspection. (Inserted by Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) The public official who enters the premises to conduct an inspection pursuant to paragraph (1) shall show a certificate verifying his or her authority to interested persons, and deliver to the interested persons at the time of entry the document containing his or her name, time of entry and purpose of entry, etc. (Amended by Act nº 7813, Dec. 30, 2005)

    CHAPTER III.-  AUTHORIZED CERTIFICATE

    Article 15 (Issuance of Authorized Certificate)    

    (1) A licensed certification authority shall issue an authorized certificate to the person who applies for the issuance of an authorized certificate. In such cases, the licensed certification authority shall verify the identity of the applicant. (Amended by Act nº 6585, Dec. 31, 2001)

    (2) An authorized certificate issued by a licensed certification authority shall contain such particulars as set forth in the following subparagraphs: (Amended by Act nº 6585, Dec. 31, 2001)

    1. Subscriber’s name (in cases of a corporation, its name or trade name);

    2. Subscriber’s digital signature verifying key;

    3. Description of algorithm used by the subscriber and the licensed certification authority to sign the authorized certificate;

    4. Serial number of the authorized certificate;

    5. Effective period of the authorized certificate;

    6. Name of the licensed certification authority and other information that can be used to verify the identity of the licensed certification authority;

    7. If there is any limit imposed on the scope or purposes of the use of the authorized certificate, matters pertaining thereto;

    8. If the subscriber has the proxy, etc. to act for another or if he or she asks his or her professional title, etc. to be entered, matters pertaining thereto;

    9. A mark verifying the authorized certificate.

    (3) Deleted. (by Act nº 6585, Dec. 31, 2001)

    (4) If a person applies for the issuance of an authorized certificate, a licensed certification authority may issue an authorized certificate having limits on the scope or purposes of its use. (Amended by Act nº 6585, Dec. 31, 2001)

    (5) A licensed certification authority shall give an appropriate period of validity to an authorized certificate, taking into account the scope or purposes of its use as well as the safety and reliability of the computing techniques used for its issuance. (Amended by Act nº 6585, Dec. 31, 2001)

    (6) Necessary matters concerning the procedures and methods of verifying the identity of an applicant for the issuance of an authorized certificate shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Inserted by Act nº 6585, Dec. 31, 2001; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    Article 16 (Termination, etc. of Validity of Authorized Certificate)             

    (1) Where any of the following circumstances arises, with respect to an authorized certificate issued by a licensed certification authority, the validity of that authorized certificate shall terminate at the time of the occurrence of such circumstances: (Amended by Act nº 6360, Jan. 16, 2001; Act nº 6585, Dec. 31, 2001)

    1. Where the period of validity of an authorized certificate expires;

    2. Where the designation of a licensed certification authority is revoked pursuant to Article 12 (1);

    3. Where the validity of an authorized certificate is suspended pursuant to Article 17;

    4. Where an authorized certificate is revoked pursuant to Article 18;

    5. Deleted. (by Act nº 6585, Dec. 31, 2001)

    (2) Where the digital signature creating key of a licensed certification authority, whose certification work was discontinued or closed under the provisions of Article 10 or suspended under the provisions of Article 12, has been lost, damaged, or stolen and outflowed, etc., the Minister of Science, ICT and Future Planning may, for ensuring the safety and reliability of certification work, suspend the validity of all authorized certificates issued by the relevant licensed certification authority. (Amended by Act nº 7813, Dec. 30, 2005; Act nº. 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (3) When the Minister of Science, ICT and Future Planning has suspended the validity of authorized certificates pursuant to paragraph (2), he or she shall instruct the Internet Security Agency to take, without delay, such measures as may be necessary for this information to be at all times accessible to the public. The same shall also apply where the validity of authorized certificates terminates pursuant to paragraph (1) 2. (Amended by Act nº 6585, Dec. 31, 2001; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    Article 17 (Suspension, etc. of Validity of Authorized Certificate)               

    (1) If there is a request on the part of a subscriber or his or her agent, a licensed certification authority shall suspend the validity of an authorized certificate or restore it by terminating the suspension. In such cases, the request for the restoration of its validity shall be made within 6 months from the date on which the validity of the authorized certificate was suspended. (Amended by Act nº 6585, Dec. 31, 2001)

    (2) In cases where a licensed certification authority has suspended or restored the validity of an authorized certificate under paragraph (1), it shall, without delay, adopt such measures as may be necessary for this information to be at all times accessible to the public. (Amended by Act nº 6585, Dec. 31, 2001)

    Article 18 (Revocation of Authorized Certificate)               

    (1) In any of the following circumstances with respect to an authorized certificate, the licensed certification authority shall revoke this certificate: (Amended by Act nº 6585, Dec. 31, 2001)

    1. Where a subscriber or his or her agent requests the revocation of an authorized certificate;

    2. Where the licensed certification authority becomes aware that a subscriber has been issued an authorized certificate by fraud or other improper means;

    3. Where the licensed certification authority becomes aware that a subscriber has been declared dead or missing by a court, or that a subscriber as a corporation has been dissolved;

    4. Where the licensed certification authority becomes aware that a subscriber’s digital signature creating key has been lost, damaged, stolen or disclosed to a third party.

    (2) Where a licensed certification authority has revoked an authorized certificate pursuant to paragraph (1), it shall, without delay, take such measures as may be necessary to confirm such fact. (Amended by Act nº 6585, Dec. 31, 2001)

    Article 18-2 (Personal Identification by Authorized Certificate)   

    A person may identify himself or herself by means of an authorized certificate issued by a licensed certification authority under this Act unless the act of identifying a person himself or herself by such means is restricted or precluded by any other Act.

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    CHAPTER IV.- ENSURING SAFETY AND RELIABILITY OF CERTIFICATION WORK

    Article 18-3 (Ensuring Safety of Licensed Certification Authority)               

    A licensed certification authority shall take protective measures prescribed by Ordinance of the Ministry of Science, ICT and Future Planning to ensure safety of facilities related to certification work. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 19 (Operation of Certification Work System)         

    (1) A licensed certification authority shall securely operate its facilities and equipment for performing certification work, including a certification work system that serves to enable the public to ascertain at all times whether the authorized certificates it issues remain valid.

    (2) A licensed certification authority shall be subject to a regular inspection by the Internet Security Agency to ascertain whether its facilities and equipment as provided in paragraph (1) are securely operated. (Amended by Act nº 11690, Mar. 23, 2013)

    (3) Where a licensed certification authority replaces the facilities and equipment as provided in paragraph (1) after it was designated as such, it shall, without delay, report it to the Minister of Science, ICT and Future Planning. In such cases, the Minister of Science, ICT and Future Planning may direct the Internet Security Agency to inspect the new facilities and equipment in question for any problems in their safety. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 20 (Time-Stamp of Electronic Messages)  

    A licensed certification authority may stamp by an authorized digital signature the time at which an electronic message is presented for its certification, if there is any request therefor on the part of a subscriber or an authorized certificate user (hereinafter referred to as the “user“). (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005)

    Article 21 (Control of Digital Signature Creating Key)       

    (1) A subscriber shall hold and keep control of his or her digital signature creating key in a secure and confidential manner, and, when he or she becomes aware that it has been lost, hacked, stolen, or disclosed to a third person or that it is in danger of being likely to be hacked, he or she shall notify the licensed certification authority thereof. In such cases, the subscriber shall, without delay, inform the users of the contents of the said notification he or she has sent to the licensed certification authority.

    (2) A licensed certification authority shall provide its subscribers with the computational device by which they can inform or notify such facts as referred to in paragraph (1).

    (3) A licensed certification authority shall not hold a subscriber’s digital signature creating key unless the subscriber so requests; notwithstanding, if by the request of a subscriber it holds his or her digital signature creating key, it shall not use or disclose the said key without the consent of the subscriber.

    (4) A licensed certification authority shall hold and keep control of the digital signature creating key that it is using, in a secure and confidential manner. When it becomes aware that such a digital signature creating key has been lost, hacked, stolen or disclosed outside or that the digital signature creating key is in danger of being likely to be hacked, it shall, without delay, notify the Internet Security Agency thereof and take such measures as to secure the safety and reliability of certification work. (Amended by Act nº 11690, Mar. 23, 2013)

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 22 (Keeping Records of Certification Work)            

    (1) A licensed certification authority shall keep and control records of the issuance of authorized certificates for its subscribers and the performance of its certification work in a secure manner. (Amended by Act nº 6585, Dec. 31, 2001)

    (2) A licensed certification authority shall retain its subscriber’s certificates, etc. for a period of 10 years after the termination of the validity of the certificates concerned. (Amended by Act nº 6585, Dec. 31, 2001)

    Article 22-2 (Control, etc. of Authorized Certificates)       

    (1) A licensed certification authority and its subscriber shall exercise due care to maintain the accuracy and integrity of the contents of the authorized certificate concerned or the information associated with the authorized certificate while it remains valid.

    (2) A licensed certification authority shall provide users with an easy way to ascertain the matters set forth in the following subparagraphs by using the authorized certificate:

    1. Name of the licensed certification authority and other information that can help verify the identity of the licensed certification authority;

    2. The fact that the subscriber is controlling and managing the digital signature creating key at the time of the issuance of the authorized certificate concerned;

    3. The fact that the digital signature creating key remained valid prior to the issuance of the authorized certificate.

    (3) A licensed certification authority shall provide the users with an easy way to ascertain the matters set forth in the following subparagraphs:

    1. Methods by which the identity of the signer can be verified;

    2. Limits on the purpose of use of, or the amount permissible for, the digital signature creating key or the authorized certificate;

    3. The scope or limits of liability incurred by the licensed certification authority.

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 22-3 (Report on Occurrence of Obstacles to Certification Work)   

    (1) Where any obstacles have occurred to the information processing systems that provide the certification work, a licensed certification authority shall report such facts without delay to the Minister of Science, ICT and Future Planning or the president of the Internet Security Agency, and shall prepare the countermeasures capable of rapidly overcoming the obstacles. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) When the Minister of Science, ICT and Future Planning or the president of the Internet Security Agency has received a report on obstacles to the certification work under the provisions of paragraph (1), he or she shall take the measures of the following subparagraphs: (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Collection and dissemination of the information on obstacles;

    2. Technological support and cooperation concerning overcoming the obstacles.

    (Article Inserted by Act nº 7813, Dec. 30, 2005)

    Article 23 (Security of Digital Signature Creating Key, etc.)            

    (1) No person shall use by stealth or disclose another person’s digital signature creating key. (Amended by Act nº 6585, Dec. 31, 2001)

    (2) No person shall have an authorized certificate issued in the name of another person, or aid such issuance. (Amended by Act nº 6585, Dec. 31, 2001)

    (3) No person shall use a similar mark that leads or may lead others to confuse an unauthorized certificate, etc. with an authorized certificate or shall falsely indicate the use of an authorized certificate. (Inserted by Act nº 6585, Dec. 31, 2001)

    (4) No person shall unlawfully use an authorized certificate by ridding oneself of the utilization scope or usage. (Inserted by Act nº 7813, Dec. 30, 2005)

    (5) No person shall transfer or rent an authorized certificate to other persons for the purpose of being exercised, or receive any transfer or rent of other persons’ authorized certificate for the purpose of exercising. (Inserted by Act nº 7813, Dec. 30, 2005)

    Article 24 (Protection of Information on Individual)          

    (1) A licensed certification authority shall protect information on individual regarding its performance of certification work.

    (2) Deleted. (by Act nº 10465, Mar. 29, 2011)

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 25 (Digital Signature Certification Control Service)              

    (1) In order to create an environment in which the public may safely and reliably use digital signatures and to exercise efficient control over licensed certification authorities, the Internet Security Agency shall perform the functions set forth in the following subparagraphs: (Amended by Act nº 11690, Mar. 23, 2013)

    1. In cases of designating a licensed certification authority under Article 4, assistance with the examination of such facilities and equipment as the applicant for the designation shall prepare to meet requirements for the said designation;

    2. Assistance with the inspection of a licensed certification authority as provided in Article 14 (1);

    3. Examination of and technical assistance for protective measures as provided in Article 18-3;

    4. Regular inspection as provided in Article 19 (2) as to whether facilities and equipment are securely operated;

    5. Certification work, such as the issuance, control, etc. of authorized certificates for the licensed certification authorities;

    6. Development of technology relating to digital signature certification, dissemination thereof, and research on standardization thereof;

    7. Assistance with the promotion of international cooperation, including research on systems relating to digital signature certification and the reciprocal recognition thereof;

    8. Other necessary matters concerning digital signature certification control service.

    (2) Articles 6, 7, 15 through 18, 18-2, 18-3, 19 (1), and 22 shall apply mutatis mutandis to the digital signature certification control service of the Internet Security Agency. In such cases, the “licensed certification authority” shall be deemed the “Internet Security Agency” and the “subscriber” the “licensed certification authority”. (Amended by Act nº 7813, Dec. 30, 2005; Act nº 11690, Mar. 23, 2013)

    (3) The Internet Security Agency may levy charges, etc. for its performance of digital signature certification control service as referred to in paragraph (1), such as examination, technical assistance, inspection, issuance of authorized certificates. (Amended by Act nº 11690, Mar. 23, 2013)

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 25-2 (Obligation of Users)              

    The users shall take the following measures in order to verify whether or not a certified digital signature is true by referring to the particulars, etc. of the authorized certificate as set forth in Article 15 (2) 1 through 6:

    1. A measure to ascertain whether the authorized certificate remains valid;

    2. A measure to ascertain whether the authorized certificate has been suspended or revoked;

    3. A measure to ascertain such matters as set forth in Article 15 (2) 7 and 8.

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 25-3 (Prohibition from Demand for Specific Authorized Certificate)            

    In verifying a digital signature by means of an authorized certificate, no person shall demand an authorized certificate issued only by a specific licensed certification authority without any justifiable reason therefor.

    (ArticleInserted by Act nº 6585, Dec. 31, 2001)

    Article 26 (Compensation Responsibility)              

    (1) Where a licensed certification authority has caused damages to the subscribers or the users who have trusted its authorized certificates in connection with the performance of the certification work, it shall compensate such damages: Provided, That if the licensed certification authority proves that it has no fault, such compensation responsibility shall be exempted.

    (2) A licensed certification authority shall subscribe for an insurance for compensating the damages under the provisions of paragraph (1).

    (Article Amended by Act nº 7813, Dec. 30, 2005)

    CHAPTER V.- ADOPTION, ETC. OF DIGITAL SIGNATURE CERTIFICATION POLICY

    Article 26-2 (Formulation, etc. of Policies for Development of Digital Signature Certification System)       

    The Government shall formulate and carry out policies on matters set forth in the following subparagraphs in order to promote the development of digital signature and certification work, including ensuring the safety and reliability of digital signatures, promoting the widespread use thereof, etc.:

    1. Matters concerning a basic policy for ensuring the safety and reliability of digital signature and promoting the widespread use thereof;

    2. Matters concerning smooth cooperation among certification authorities in achieving the mutual recognition and common use of different certificates of digital signature and matters concerning technical standardization for such certificates;

    3. Matters concerning development of digital signature-related technique;

    4. Matters concerning education and publicity designed for the promotion of widespread use of digital signature;

    5. Matters concerning improvement in systems and readjustment of the relevant Acts and subordinate statutes to promote widespread use of digital signatures;

    6. Matters concerning the provision of assistance and relevant information to organizations related to digital signatures;

    7. Matters concerning the protection of rights and interests of subscribers and users that are related to certification work;

    8. Matters concerning the reciprocal recognition of foreign digital signature and certificates as well as the promotion of international cooperation;

    9. Matters concerning the promotion of digital signature-related industry and the training of manpower available for this industry;

    10. Matters concerning protective measures to ensure the safety of a licensed certification authority;

    11. Matters concerning the adoption of pilot projects designed for the promotion of widespread use of digital signatures as well as matters concerning the survey of statistics and actual conditions in relation to the use of digital signature;

    12. Matters concerning the use of encryption designed to ensure the safety and reliability of electronic messages;

    13. Such other matters as may be necessary for ensuring the safety and reliability of digital signatures and for promoting the widespread use of digital signatures.

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 26-3 (Cooperation among Certification Authorities in Achieving Mutual Recognition and Common Use of Different Certificates of Digital Signature)             

    (1) The Minister of Science, ICT and Future Planning shall carry out the following matters in order to promote smooth cooperation among certification authorities in achieving the mutual recognition and common use of different certificates of digital signature: (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Survey, research, and development on domestic and foreign standards for the mutual recognition and common use of different certificates of digital signature;

    2. Establishment of standards related to the mutual recognition and common use of different certificates of digital signature and promotion of widespread use thereof;

    3. Adjustment of digital signatures and certification policy for the mutual recognition and common use of different certificates of digital signature;

    4. Other matters concerning the mutual recognition and common use of different certificates of digital signature.

    (2) The Minister of Science, ICT and Future Planning may, where necessary to carry out matters set forth in the subparagraphs of paragraph (1), cause the relevant agency or organization to act for him or her. In such cases, he or she may subsidize the expenses incurred therein as prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 26-4 (Development of Digital Signature-Related Techniques and Manpower Training)       

    The Minister of Science, ICT and Future Planning shall carry out the following matters for the purposes of technical development and specialized manpower training that are necessary to promote the widespread use of digital signatures: (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1. Matters concerning research on digital signature-related technical level, technical study and development, and application thereof;

    2. Matters concerning cooperation in and transfer of digital signature-related techniques;

    3. Matters concerning the provision of information on digital signature-related techniques and the promotion of cooperation with agencies and organizations related thereto;

    4. Matters concerning research on the supply of and demand for manpower specializing in digital signatures and assistance for specialized manpower training;

    5. Such other matters as may be necessary for the development of digital signature-related techniques and manpower training.

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 26-5 (Implementation of Digital Signature-Related Pilot Projects)               

    (1) The Minister of Science, ICT and Future Planning may carry out pilot projects to promote the wide use of digital signatures as prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (2) The Government may provide administrative, financial, and technical assistance in carrying out pilot projects as provided in paragraph (1).

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 26-6 (Assistance to Promote Use of Digital Signatures)     

    (1) The State or the local governments may provide financial assistance in promoting the wide use of digital signatures.

    (2) In order to secure the safety and reliability of electronic commerce, the Government may formulate and carry out policies to reduce, or to give exemption from, fees, etc. payable for electronic commerce if authorized digital signatures are used in electronic transactions.

    (3) Where a corporation or organization related to digital signatures carries out a project to encourage the use of digital signatures, the Government may subsidize wholly or partially the expenses required for the execution of the project concerned within the limits of budget.

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 26-7 Deleted. (by Act nº 10008, Feb. 4, 2010)         

    CHAPTER VI.- SUPPLEMENTARY PROVISIONS

    Article 27 (Protection of Subscribers and Users)  

    (1) The Government shall adopt such necessary measures as to deal with the complaints filled or damages suffered by subscribers and users in a prompt and fair manner.

    (2) Detailed matters filled concerning measures as provided in paragraph (1) shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (Article Inserted by Act nº 6585, Dec. 31, 2001)

    Article 27-2 (Reciprocal Recognition)       

    (1) The Government may enter into an agreement with a foreign government on the reciprocal recognition of digital signatures.

    (2) In cases of the conclusion of an agreement under paragraph (1), it may form the basic contents of the agreement to grant a foreign certification authority or a certificate issued thereby the same legal status or effect as the licensed certification authority or the authorized certificate as provided in this Act. (Amended by Act nº 6585, Dec. 31, 2001)

    (3) When an agreement on the reciprocal recognition of digital signatures has been concluded with a foreign government under paragraph (1), the Minister of Science, ICT and Future Planning shall give publicity to the contents of the agreement. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    (4) If an agreement has been concluded with a foreign government under paragraph (1), a foreign digital signature or certificate shall be deemed to have the same legal effect as an authorized digital signature or an authorized certificate. (Inserted by Act nº 6585, Dec. 31, 2001)

    Article 28 (Imposition of Fees)   

    A licensed certification authority may impose necessary fees, such as service charges, on those who apply for the issuance of an authorized certificate or receive certification services. (Amended by Act nº 6585, Dec. 31, 2001)

    Article 29 (Hearings)       

    The Minister of Science, ICT and Future Planning shall hold a hearing if he or she intends to revoke a designation in accordance with Article 12 (1). (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    Article 30 (Delegation of Authority)         

    Part of the authority held by the Minister of Science, ICT and Future Planning under this Act may be delegated to the head of a subordinate agency or entrusted to the President of the Korea Post, as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    CHAPTER VII.- PENALTY PROVISIONS

    Article 31 (Penalty Provisions)    

    Any of the following persons shall be punished by imprisonment with labor for not more than three years or by a fine not exceeding 30 million won: (Amended by Act nº 6585, Dec. 31, 2001)

    1. A person who holds a subscriber’s digital signature creating key without receiving any request from the latter or who uses or discloses a subscriber’s digital signature creating key without the consent of the latter, who has asked the former to hold the said key, in violation of Article 21 (3);

    2. A person who steals or discloses another person’s digital signature creating key in violation of Article 23 (1);

    3. A person who has an authorized certificate issued in the name of another person or supports such issuance, in violation of Article 23 (2).

    Article 32 (Penalty Provisions)    

    Any of the following persons shall be punished by imprisonment with labor for not more than one year or by a fine not exceeding 10 million won: (Amended by Act nº 7813, Dec. 30, 2005)

    1. A person who fails to retain the subscriber’s certificates, etc. in violation of Article 22 (2);

    2. Deleted; (by Act nº 7813, Dec. 30, 2005)

    3. A person who uses an authorized certificate beyond the scope of its intended use or for a purpose other than its original purpose, in violation of Article 23 (4);

    4. A person who transfers or rents an authorized certificate to other persons for the purpose of making them exercise authority related thereto, or who receives a transfer or rent of the other persons’ said certificate for the purpose of exercising authority related thereto, in violation of Article 23 (5).

    (Article Amended by Act nº 6585, Dec. 31, 2001)

    Article 33 (Joint Penalty Provisions)         

    If the representative of a juristic person, or an agent or employee of, or any other person employed, by a juristic person or an individual commits a violation under Article 31 or 32 with respect to the business affairs of the juristic person or individual, not only shall such offender be punished, but also the juristic person or individual shall be punished by a fine under the relevant Article: Provided, That this shall not apply where such juristic person or individual has not been negligent in giving due attention and supervision concerning the relevant business affairs to prevent such violation.

    (Article Amended by Act nº 9208, Dec. 26, 2008)

    Article 34 (Administrative Fines)               

    (1) Any of the following persons shall be subject to an administrative fine not exceeding five million won: (Amended by Act nº 6585, Dec. 31, 2001; Act nº 7813, Dec. 30, 2005; Act nº 8852, Feb. 29, 2008; Act nº 11690, Mar. 23, 2013)

    1.  A person who fails to report, or report the modification of, the rules of certification work in violation of Article 6 (1) or (3) (including cases of application mutatis mutandis as referred to in Article 25 (2)) or who fails to implement an order to modify the rules of certification work as provided in paragraph (4) of the same Article (including cases of application mutatis mutandis as referred to in Article 25 (2));

    2. A person who refuses to provide certification services without good cause, or unjustly discriminates against subscribers or users, in violation of Article 7 (including cases of application mutatis mutandis as referred to in Article 25 (2));

    3. A person who fails to file a report under Article 9 (1);

    4. A person who fails to notify his or her subscribers of, or to report thereon to the Minister of Science, ICT and Future Planning, the cessation of certification work as provided in Article 10 (1) or the closure thereof as provided in paragraph (2) of the same Article;

    5. A person who fails to transfer the subscriber’s certificates, etc. to another licensed certification authority, or to report the impossibility of such a transfer, without good cause, in violation of Article 10 (3) or 12 (2);

    6. A person who fails to submit the relevant documents and materials as referred to in Article 14 (1) or submits false records, or who refuses, obstructs, or evades an entrance and inspection by the relevant public officials;

    7. A person who fails to give a notification as provided in Article 21 (4);

    7-2. A person who fails to report on a failure that occurred in the information processing systems providing the certification work under the provisions of Article 22-3 (1);

    8. A person who uses a similar mark that leads or may lead others to mistake an unauthorized certificate, etc. for an authorized certificate, or who falsely indicates the use of an authorized certificate, in violation of Article 23 (3);

    9. A person who demands only the authorized certificate of a specific licensed certification authority in violation of Article 25-3;

    10. A person who fails to buy an insurance in violation of Article 26 (2).

    (2) The administrative fine as referred to in paragraph (1) shall be imposed and collected by the Minister of Science, ICT and Future Planning as prescribed by Presidential Decree. (Amended by Act nº 8852, Feb. 29, 2008; Actnº 11690, Mar. 23, 2013)

    (3) through (5) Deleted. (by Act nº 14577, Mar. 14, 2017)

    ADDENDUM

    This Act shall enter into force on July 1, 1999.

    ADDENDA (Act nº 6360, Jan. 16, 2001)

    Article 1 (Enforcement Date)

    This Act shall enter into force on July 1, 2001.

    Articles 2 through 6 Omitted.

    ADDENDA (Act nº 6585, Dec. 31, 2001)

    Article 1 (Enforcement Date)

    This Act shall enter into force on April 1, 2002.

    Article 2 (Transitional Measures concerning Liability)

    The previous provisions shall apply to liability for any damage incurred by a licensed certification authority in the process of performing its certification work before this Act enters into force.

    Article 3 (Transitional Measures concerning Application of Penalty Provisions)

    The previous provisions shall prevail in the application of penalty provisions to an offence committed before this Act enters into force.

    Article 4 Omitted.

    ADDENDA (Act nº 7428, Mar. 31, 2005)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year after the date of its promulgation.

    Articles 2 through 6 Omitted.

    ADDENDA (Act nº 7813, Dec. 30, 2005)

    (1) (Enforcement Date) This Act shall enter into force six months after the date of its promulgation: Provided, That the amended provisions of Article 4 (4) of the Act shall enter into force on the date of its promulgation.

    (2) (Transitional Measures concerning Application of Penalty Provisions) The previous provisions shall govern any application of penalty provisions for the acts committed before this Act enters into force.

    ADDENDA (Act nº 8852, Feb. 29, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDUM (Act nº 9208, Dec. 26, 2008)

    This Act shall enter into force on the date of its promulgation.

    ADDENDUM (Act nº 10008, Feb. 4, 2010)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act nº 10465, Mar. 29, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 11690, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    (1) This Act shall enter into force on the date of its promulgation.

    (2) Omitted.

    Articles 2 through 7 Omitted.

    ADDENDA (Act nº 12762, Oct. 15, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Articles 2 (Transitional Measures concerning Ground for Disqualification of Incompetent Persons, etc.)

    Notwithstanding the amended provisions of subparagraph 1 (a) of Article 5, the previous provisions shall apply to persons who have already been adjudged incompetent or quasi-incompetent and for whom the effect of adjudication of incompetence or quasi-incompetence is maintained under Article 2 of the Addenda to the Civil Act (Act nº 10429) at the time the same amended provisions enter into force.

    ADDENDUM (Act nº 14577, Mar. 14, 2017)

    This Act shall enter into force on the date of its promulgation.

    31Oct/21

    Act on Promotion of Information and Communications Network Utilization and Data Protection of 2001, established by Act nº 6360, Jan. 16, 2001

    Act on Promotion of Information and Communications Network Utilization and Data Protection of 2001, established by Act nº 6360, Jan. 16, 2001, amended by Act nº 10138, Mar. 17, 2010, amended by Act nº 10560, Apr. 5, 2011, amended by Act nº 11322, Feb. 17, 2012, amended by Act nº 12681, May 28, 2014, amended by Act nº 13014, Jan. 20, 2015, amended by Act nº 13280, Mar. 27, 2015, amended by Act nº 13344, June 22, 2015, amended by Act nº 13520, Dec. 1, 2015.

    ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND DATA PROTECTION, ETC.

    Established by Act nº 6360, Jan. 16, 2001

    Amended by Act nº 10138, Mar. 17, 2010

    Amended by Act nº 10560, Apr. 5, 2011

    Amended by Act nº 11322, Feb. 17, 2012

    Amended by Act nº 12681, May 28, 2014

    Amended by Act nº 13014, Jan. 20, 2015

    Amended by Act nº 13280, Mar. 27, 2015

    Amended by Act nº 13344, June 22, 2015

    Amended by Act nº 13520, Dec. 1, 2015

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to promote the utilization of information and communications networks, to protect the personal information of users utilizing information and communications services, and to build a safe and sound environment for the information and communications networks in order to improve the citizen’s lives and enhance the public welfare.

    Article 2 (Definitions)

    (1) The terms used in this Act shall be defined as follows:

    1. “Information and communications networks” mean the information and communications system under which telecommunications facilities and equipment as prescribed in subparagraph 2 of Article 2 of the Telecommunications Business Act are utilized, or the telecommunications facilities and equipment, computers and the technology of using computers are utilized together to collect, process, store, search, transmit and receive information;

    2. “Information and communications services” mean the telecommunications services as prescribed in subparagraph 6 of Article 2 of the Telecommunications Business Act, and the provision of information or the intermediation of information services utilizing the telecommunications services;

    3. “Information and communications service provider” means the operator of telecommunications as prescribed in subparagraph 8 of Article 2 of the Telecommunications Business Act and other person who provides information or intermediate information services for profit utilizing the services rendered by the telecommunications service providers;

    4. “Users” mean the persons who utilize the information and communications services rendered by the information and communications service provider;

    5. “Electronic message” means the standardized data in the form of document in which information is electronically compiled, sent or received, or stored by equipment, including computers, etc., that are capable of doing information processing;

    6. “Personal information” means the information pertaining to any living person, which contains the code, letter, voice, sound and image, etc. that make it possible to identify such individual by his/her name and resident registration number, etc. (including the information that does not, on its own, permit direct identification of a specific individual, but that does identify specific individual when it is easily combined with other information.);

    7. “Incidents” mean accidents caused by such attack on the information and communications networks or related information systems as hacking, computer viruses, logical bomb, mail bomb, denial of service, high-powered electromagnetic wave, etc.;

    8. Deleted (Jun. 22, 2015);

    9. “Bulletin boards” mean the computer programs or technological devices, regardless of their names, to which the users may post the code, letter, voice, sound, image, video clips and other information for the purpose of making public by using the information and communications networks;

    10. “Communications billing services” mean the information and communications services carrying out the business as defined in the following items:

    a. The business which claims and collects the prices of goods or services sold or provided by others together with the charges for the telecommunications services provided by itself; or

    b. The business which transmits or receives the transaction data electronically, or conducts the settlement of charges as a proxy or intermediary so that the prices of the goods or services sold or provided by others may be claimed and collected together with the telecommunications service charges stated in Item a.

    11. “Communications billing service provider” means the operator who provides the communications billing services subject to the registration pursuant to Article 53;

    12. “Communications billing service users” mean the persons who purchase and use the goods or services by means of the communications billing services provided by the communications billing service provider; and

    13. “Electronic transmission media” mean the media by which code, letter, voice, sound, image, video clips and other information are transmitted to the receiver in such an electronic form as electronic messages, etc. via the information and communications networks. (Amended May 28, 2014)

    (2) The definitions stated herein, except otherwise provided for in paragraph (1), shall be subject to the National Informatization Framework Act.

    Article 3 (Duties of Information and Communications Service Provider and Users)

    (1) Any information and communications service provider shall protect the personal information of users, and contribute to the protection of the rights and interests of such users and to the enhancement of its information utilization capability by rendering the information and communications services in a safe and sound manner.

    (2) Every user shall endeavor to help a sound information society take hold.

    (3) The government may assist the organizations of information and communications service providers and the organizations of users in carrying out their activities designed to protect the personal information and the youth in the information and communications networks.

    Article 4 (Policy for Promotion of Information and Communications Network Utilization and Data Protection, etc.)

    (1) The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall formulate a policy to lay the foundation for building an information society through the promotion of utilization and the secure management and operation of information and communications networks, and the protection of personal information of users (hereinafter referred to as the “promotion of the utilization of information and communications networks and data protection, etc.”).

    (2) The policy referred to in paragraph (1) shall contain the matters stated in the following subparagraphs:

    1. Development and distribution of technologies related to the information and communications networks;

    2. Standardization of the information and communications networks;

    3. Activation of utilization of the information and communications networks such as the development of information contents and applied services of the information and communications networks subject to Article 11;

    4. Facilitation of joint utilization of information via information and communications networks;

    5. Activation of utilization of the Internet;

    6. Protection of personal information collected, processed, stored and utilized via information and communications networks, and development and distribution of related technologies;

    7. Protection of the youth in the information and communications networks;

    8. Enhancement of safety and reliability of the information and communications networks; and

    9. Other matters necessary to promote the utilization of the information and communications networks and data protection, etc.                                                         (3) In formulating the policy referred to in paragraph (1), the Minister of Science, ICT and Future Planning or the Korea Communications Commission shall endeavor to coordinate such policy with the basic plan for promoting informatization as prescribed in Article 6 of the National Informatization Framework Act.

    Article 5 (Relation with Other Acts)

    The promotion of utilization of information and communications networks and data protection, etc. shall be governed by this Act except specially provided for in other acts; provided, however, that, in case this Act and the Electronic Financial Transactions Act compete to apply with respect to the communications billing services stated in Chapter VII, this Act shall prevail.

    CHAPTER Ⅱ.- PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION

    Articles 6 – 17 Omitted1)

    CHAPTER Ⅲ Deleted

    Articles 18 – 21 Deleted (Jun. 22, 2015)

    CHAPTER Ⅳ PROTECTION OF PERSONAL INFORMATION

    Section 1. Collection of Personal Information

    Article 22 (Consent to the Collection and Utilization of Personal Information, etc.)

    (1) Any information and communications service provider shall, when it intends to gather user’s personal information, notify the user of the whole matters stated in the following subparagraphs, and obtain his/her consent thereof. The same shall apply to any change of the following subparagraphs:

    1. The purpose of collection and utilization of personal information;

    2. The items of personal information collected hereunder; and

    3. The period of retention and utilization of personal information.

    (2) The information and communications service provider may collect and utilize the user’s personal information without consent subject to paragraph (1) in case any of the following subparagraphs applies:

    1. Where, as for the personal information, which is necessary to perform the contract for the provision of information and communications services, it is evidently difficult to obtain ordinary consent on account of economical and technological reasons;

    2. Where it is necessary to calculate the fees for the provision of information and communications services; or

    3. Where special provisions exist in this Act or other acts.

    Article 22-2 (Consent to the Authorized Access)

    (1) The information and communications service provider shall notify the user of the following subparagraphs so that he/she may understand them explicitly, and obtain his/her consent thereof when the information and communications service provider needs the authorized access to the data stored in the mobile communication device of the user and the functions of such device (hereinafter referred to as the “authorized access”) for its service for the user:

    1. In case where the authorized access is inevitable for the relevant service

    a. The items of data and functions in need of the authorized access; and

    b. The reason why the authorized access is necessary.

    2. In case where the authorized access is not inevitable for the relevant service

    a. The items of data and functions in need of the authorized access;

    b. The reason why the authorized access is necessary; and

    c. The fact that user may abstain from consent to the authorized consent.

    (2) The information and communications service provider shall not refuse the relevant services on the grounds that the user does not consent to the authorized access which is not necessarily required for the relevant service.

    (3) The maker of basic operating systems of mobile communication devices (that means the infrastructure environment to run softwares of such devices) and the manufacturers of such devices and the supplier of softwares of such devices shall take such measures as consent to, and withdrawal from, the authorized access which are necessary for the protection of user’s data when the information and communications service provider intends to access the data stored in the mobile communication devices and the functions of such devices.

    (4) The scope of the authorized access subject to paragraph (1), method of consent, necessary measures for the protection of user’s data and other necessary matters shall be prescribed by the Presidential Decree.

    (Article Inserted Mar. 22, 2016)

    Article 23 (Restrictions on Collecting Personal Information, etc.)

    (1) No information and communications service provider shall collect the personal information, including ideology, belief, family and relative relations, academic record, medical record and other social career, etc., which is likely to excessively infringe upon the right, interest and privacy of the relevant user; provided, however, that the same shall not apply to the necessary mínimum extent where the consent of the user is obtained pursuant to Article 22(1) or the subject of collecting personal information is specified in other acts.

    (Amended May 28, 2014)

    (2) Any information and communications service provider shall, when it collects the personal information of users, collect only the minimum personal information to the extent necessary to provide the information and communications services. (Amended May 28, 2014)

    (3) The information and communications service provider shall not refuse the relevant services on the grounds that the user does not provide any other personal information than the necessary minimum personal information. In this case, the necessary minimum personal information shall mean the inevitable information necessary to perform the fundamental function of the relevant service. (Inserted May 28, 2014)

    Article 23-2 (Restriction of Use of Resident Registration Numbers)

    (1) The information and communications service provider shall not collect and use the resident registration numbers of users except otherwise applicable to any of the following subparagraphs:

    1. Where it has been designated as an identification agency pursuant to Article 23-3;

    2. Where the collection and use of resident registration numbers of users are permitted by statutes; or

    3. Where the information and communications service provider regards it as inevitable to collect and use the resident registration numbers of users for the conduct of business, as notified by the Korea Communications Commission.

    (2) Although the collection and use of resident registration numbers are permitted pursuant to subparagraphs 2 or 3 of paragraph (1), alternative means to identify the user other than his/her resident registration number (hereinafter referred to as the “alternative means”) shall be provided to the users.

    (Article Amended Feb. 17, 2012)

    Article 23-3 (Designation, etc. of Identification Agency)

    (1) The Korea Communications Commission may, upon assessing the following matters, designate the person, who is determined capable of safe and trustful conduct of developing, providing and managing the alternative means (hereinafter referred to as the “identification operations“) as the identification agency:

    1. Physical, technical and managerial measures and planning to ensure the safe and secure identification operations;

    2. Technological and financial capability to conduct the identification operations; and

    3. Appropriateness of facilities to conduct the identification operations.

    (2) When the identification agency wants to have recess of the whole or part of identification operations, it shall notify the recess plan and period to users 30 days prior to the start day and report it to the Korea Communications Commission. In this case, the recess period shall not exceed six months.

    (3) When the identification agency wants to repeal its identification operations, it shall notify the repeal plan to users 60 days in advance, and report it to the Korea Communications Commission.

    (4) Necessary matters for the detailed assessment criteria pursuant to paragraphs (1) through (3), designation procedure and the recess, repeal, etc. Of identification operations shall be prescribed by the Presidential Decree.

    (Article Inserted Apr. 5, 2011)

    Article 23-4 (Suspension of Identification Operations and Withdrawal of Designation)

    (1) When any of the following subparagraphs is applicable to the identification agency, the Korea Communications Commission may order the suspension of the whole or part of identification operations for a period of not more than six months or withdraw the designation of identification agency; provided, however, that the withdrawal of designation shall be mandatory in case of subparagraph 1or 2:

    1. Where it has been designated as an identification agency by fraud or other unjust means;

    2. Where it has failed to stop its operations in violation of the order to suspend the identification operations;

    3. Where it has failed to start the identification operations within six months from the designation day, or has recess of the identification operations continuously for more than six months; or

    4. Where it does not satisfy the criteria pursuant to Article 23-3(4).

    (2) The criteria for administrative disposition pursuant to paragraph (1), its procedure and other necessary matters shall be prescribed by the Presidential Decree.

    (Article Inserted Apr. 5, 2011)

    Article 24 (Restrictions on Utilizing Personal Information)

    No information and communications service provider shall utilize the personal information collected pursuant to Article 22 and the proviso of Article 23(1) for other purpose than the purpose consented by the relevant user or referred to in each subparagraph of Article 22(2).

    Article 24-2 (Consent to the Provision of Personal Information, etc.)

    (1) Any information and communications service provider shall, when it intends to provide user’s personal information to a third party, notify the user of the whole matters stated in the following subparagraphs except the cases falling under subparagraphs 2 and 3 of Article 22(2), and obtain his/her consent thereof. The same shall apply to any change of the following subparagraphs:

    1. The receiver of personal information;

    2. The purpose of utilizing personal information of such receiver;

    3. The items of personal information provided hereunder; and

    4. The period of retention and utilization of personal information by the receiver.

    (2) The receiver of the personal information of users provided by the information and communications service provider pursuant to paragraph (1) shall not provide such personal information to a third party, nor utilize such personal information for other use than the purpose of being provided except the cases specified in other acts.

    (3) The information and communications service provider, etc. as stated in Article 25(1) shall, upon obtaining the consent to the provision pursuant to paragraph (1) and the consent to entrusting handling of personal information pursuant to Article 25(1), separate such consent from the consent to the collection and use of personal information pursuant to Article 22, and shall not refuse to provide its service on ground that the user would not give consent to it. (Amended Mar. 22, 2016)

    Article 25 (Entrusting Processing of Personal Information)

    (1) The information and communications service provider and the receiver of the personal information of users provided by such provider pursuant to Article 24-2(1) (hereinafter referred to as the “information and communications service provider, etc.”) shall, if they entrust the work (hereinafter collectively referred to as “entrusting processing” of personal information) of collecting, creating, connecting, interlocking, recording, retaining, processing, editing, retrieving, printing out, modifying, restoring, utilizing, providing, disclosing, destroying and similarly doing (hereinafter collectively referred to as “processing“) the personal information of users to a third party, notify the user of the whole matters stated in the following subparagraphs, and obtain his/her consent thereof. The same shall apply to any change of the following subparagraphs: (Amended Mar. 22, 2016)

    1. The person entrusted processing of personal information (hereinafter referred to as the “trustee“); and

    2. Particulars of entrusted work of processing of personal information.

    (2) The information and communications service provider, etc. may skip the notice and consent procedure as prescribed in paragraph (1) in case the whole matters of each subparagraph of paragraph (1) are made public pursuant to Article 27-2(1) or notified to users in such a manner like sending e-mails as stated in the Presidential Decree, which is necessary to perform the contract for the provision of information and communications services and to augment the users’ convenience, etc. The same shall apply to any change of the subparagraphs of paragraph (1). (Amended May 28, 2014; Mar. 22, 2016)

    (3) The information and communications service provider, etc. shall, when it intends to entrust processing of personal information, define the purpose in advance for which the trustee shall process the personal information of users.

    The trustee shall not process the personal information of users beyond such purpose. (Amended Mar. 22, 2016)

    (4) The information and communications service provider, etc. shall manage, supervise and educate the trustee lest it should violate the provisions in this Chapter. (Amended Mar. 22, 2016)

    (5) The trustee, who caused damage to the users regarding the work processing entrusted hereunder in violation of the provisions in this Chapter, shall be deemed as an employee of the information and communications service provider, etc. only with respect to compensation for such damage. (Amended Mar. 22, 2016)

    (6) What the information and communications service provider, etc. Has entrusted processing of personal information to a trustee shall be in writing. (Inserted Mar. 22, 2016)

    (7) The trustee may re-entrust the work entrusted pursuant to paragraph (1) only when he/she has obtained the consent of the information and communications service provider, etc. who has entrusted processing of personal information. (Inserted Mar. 22, 2016)(Amended Mar. 22, 2016)

    Article 26 (Transfer of Personal Information following the Business Transfer, etc.)

    (1) In the event that the information and communications service provider, etc. transfers the personal information of users to others owing to the transfer of business in whole or in part, or merger, etc., it shall notify the users of the whole matters prescribed in the following subparagraphs in such a manner like sending e-mails, posting at the Website and so forth as stated in the Presidential Decree:

    1. The fact that the personal information is to be transferred;

    2. The name (referring to the company name in case of a juridical person; hereafter the same shall apply in this Article), address, telephone number and other contact points of a person who has received the personal information (hereinafter referred to as the “business transferee, etc.”);

    3. The method and procedure to withdraw the consent in case the user would not want the transfer of personal information.

    (2) The business transferee, etc. shall, without delay upon the transfer of personal information, notify the users of such fact and the name, address, telephone number and other contact points in such a manner like posting at the Website, sending e-mails and so forth as stated in the Presidential Decree.

    (Amended May 28, 2014)

    (3) The business transferee, etc. may utilize or provide the personal information of users within the scope of the initial purpose for which the information and communications service provider, etc. is allowed to utilize or provide such personal information; provided, however, that the same shall not apply where the users have consented specifically.

    Article 26-2 (Method to Obtain Consent)

    The method how to obtain the consent pursuant to Article 22(1), the proviso of Article 23(1), Article24-2(1) and (2), Article 25(1), the proviso of Article 26(3) or Article 63(2) (hereinafter collectively referred to as the “consent to the collection, utilization, provision, etc. of personal information”) shall be stated by the Presidential Decree in view of the media for collecting personal information, the nature of business operations, the number of users, and so forth.

    Section 2. The Management and Destruction of Personal Information

    Article 27 (Designation of Person in Charge of Data Protection)

    (1) The information and communications service provider, etc. shall designate the person in charge of data protection to protect the personal information of users and deal with complaints of users related with the personal information; provided, however, that the same may not apply to the information and communications service provider, etc. who satisfies the number of employees and users, and other criteria specified by the Presidential Decree. (Amended Mar. 22, 2016)

    (2) In case the information and communications service provider, etc. Subject to the proviso of paragraph (1) do not designate the person in charge of data protection, its owner or representative shall become the person in charge of data protection. (Amended Mar. 22, 2016)

    (3) Qualification requirements for the person in charge of data protection and other matters necessary to designate the person shall be prescribed by the Presidential Decree. (Amended Mar. 22, 2016)

    (4) When the person in charge of data protection finds out any fact in violation of this Act and other relevant laws and regulations, he/she shall immediately take measures to correct such violations, and, if necessary, report such measures to the business owner or representative of the information and communications service provider, etc.; provided, however, that, if the business owner or representative shall become the person in charge of data protection, the provision regarding report of corrective measures shall not apply. (Amended Mar. 22, 2016)

    Article 27-2 (Disclosure of Personal Information Policy Statement)

    (1) In case of processing the personal information of users, the information and communications service provider, etc. shall establish and disclose the personal information policy statement in such a manner as stated in the Presidential Decree so that users may identify the policy with ease at any time.

    (Amended Mar. 22, 2016)

    (2) The personal information policy statement subject to paragraph (1) shall contain each and all following subparagraphs: (Amended Feb. 17, 2012; Mar. 22, 2016)

    1. The purpose of collection and utilization of the personal information, particulars of personal information collected hereunder and the method of collection thereof;

    2. The name (referring to the company name in case of a juridical person) of a person who has received the personal information, the purpose of utilization, and particulars, of the personal information in case the personal information is provided to a third party;

    3. The period of retention and utilization of personal information, the procedure and method of destruction of personal information (including the ground of preservation and the particulars of personal information to be preserved in case of preserving such information subject to the proviso except each subparagraph of Article 29)

    4. The content of business for which processing of personal information is entrusted and the trustee (including the processing policy statement, if applicable);

    5. The rights of users and legal representatives, and how to excise the rights;

    6. The installation and operation of the device collecting automatically the personal information like the Internet logon files, etc. and how to deny such device;

    7. The name or a person in charge of data protection, or the department to protect the personal information of users and deal with complaints of users related with the personal information, and the contact points like telephone numbers.

    (3) In case of change of the personal information policy statement pursuant to paragraph (1), the information and communications service provider, etc. Shall make public without delay the reason and changes thereof in such a manner as stated in the Presidential Decree so that users may identify the change of policy statement with ease at any time. (Amended Mar. 22, 2016)

    Article 27-3 (Notification and Report of Personal Information Leakage, etc.)

    (1) Upon knowing the loss, theft and leakage of personal information (hereinafter referred to as “leakage, etc.”), the information and communications service provider, etc. shall, without delay, inform each of the following subparagraphs of the relevant users, and report it to the Korea Communications Commission or the Korea Internet and Security Agency, and shall not delay, without justifiable reasons, such notification and report exceeding 24 hours from the time when it got to know the fact; provided, however, that it may take other measures, if there is such a justifiable reason as whereabouts of users are still unknown, as replaceable with the notification as prescribed by the Presidential Decree: (Amended May 28, 2014; Mar. 22, 2016)

    1. Personal information items affected by leakage, etc.;

    2. Time when leakage, etc. took place;

    3. Measures that users may take;       

    4. Countermeasures that the information and communications service provider, etc. may take; and                                                                                                                             

    5. Department where users may place inquiries, etc. and other contact points.       

    2) Upon receiving the report pursuant to paragraph (1), the Korea Internet and Security Agency shall, without delay, inform the fact of the Korea Communications Commission. (Inserted May 28, 2014)                                                                            

    (3) The information and communications service provider, etc. shall explain the justifiable reasons pursuant to the main sentence and proviso of paragraph (1) to the Korea Communications Commission. (Inserted May 28, 2014)                                    

    (4) The method, procedure, etc. of notification and report pursuant to paragraph (1) and other necessary matters shall be prescribed by the Presidential Decree. (Amended May 28, 2014) 

    (5) The information and communications service provider, etc. shall prepare for the leakage, etc. of personal information, and explore ways to establish measures to minimize the damage to victims. (Amended May 28, 2014; Mar. 22, 2016)

    Article 28 (Data Protection Measures)

    (1) In case of processing the personal information of users, the information and communications service provider, etc. shall take such technological and managerial measures as mentioned in the following subparagraphs to prevent the loss, theft, leakage, forgery, alteration of, or damage to, the personal information and to ensure the safety of personal information by the standard as specified by the Presidential Decree. (Amended Mar. 22, 2016)

    1. To establish and implement the in-house management plan to process the personal information more safely;

    2. To install and operate the access control system like firewall to block illegal access to the personal information;

    3. To take measures to prevent the forgery or falsification of logon files;

    4. To take security measures using encryption technologies in order to store and transmit the personal information more safely;

    5. To take such preventive measures as download and operation of the vaccination softwares to protect from computer viruses; and                                                               6. To take other protective measures necessary to secure the safety of the personal information.

    (2) The information and communications service provider, etc. shall limit the persons to process the personal information of users to the minimum.

    (Amended Mar. 22, 2016)

    Article 28-2 (Prohibition of Leakage of Personal Information)

    (1) Any person who is processing, or once processed, the personal information of users shall not damage, infringe upon or leak out the information acquired in the course of business. (Amended Mar. 22, 2016)

    (2) No one shall be provided with the personal information for profit or unjust purposes while knowing such information has been leaked out.

    Article 29 (Destruction of Personal Information)

    (1) The information and communication service provider, etc. shall, without  delay, destroy the relevant personal information lest it should be restored or recovered in case any of the following cases applies; provided, however, that the same shall not apply where other acts require the preservation of such information: (Amended Feb. 17, 2012; May 28, 2014)

    1. When the purpose of collecting or utilizing the personal information consented pursuant to Article 22(1), the proviso of Article 23(1) or Articles 24-2(1) and (2), or the relevant purpose as specified by any of the subparagraphs of Article 22(2) has been attained;

    2. When the period of retention and utilization of personal information consented pursuant to Article 22(1), the proviso of Article 23(1) or Articles 24-2(1) and (2) has expired;

    3. When the period of retention and utilization of personal information subject to Article 27-2(2) iii in case of collecting or utilizing the personal information without the consent of users pursuant to Article 22(2) has expired; or

    4. When its business has been closed.

    (2) The information and communication service provider, etc. shall take necessary measures, including the destruction of personal information and others as prescribed by the Presidential Decree, to protect the personal information of users who would not use the information and communications services for one year; provided, however, that it does not apply when the said period is otherwise fixed by other laws and regulations, or user’s request. (Inserted Feb. 17, 2012; Dec. 1, 2015)

    (3) The information and communication service provider, etc. shall inform the users of the fact that their personal information will be destroyed, the expiry date, the particulars of the said personal information, etc. as prescribed by the Presidential Decree by means of email, etc. as prescribed by the Presidential Decree. (Inserted Dec. 1, 2015)

    Section 3.- User’s Right

    Article 30 (User’s Right, etc.)

    (1) Every user may at any time withdraw his/her consent given to the information and communications service provider, etc. for the collection, utilization or provision of the personal information.

    (2) Every user may request the access to, or provision of, any of the following items related with him/her, and if his/her personal information is found to be erroneous, he/she may request the correction thereof:

    1. The personal information of users retained by the information and communications service provider, etc.;

    2. The content of how the information and communications service provider, etc. has utilized, or provided to a third party, the personal information of users; or

    3. The status at which the information and communications service provider, etc. has obtained consent for the collection, utilization or provision of the personal information.

    (3) In case that a user withdraws his/her consent pursuant to paragraph (1), the information and communications service provider, etc. shall, without delay, take necessary measures, i.e., destroying his/her personal information collected lest it should be restored or recovered. (Amended May 28, 2014)

    (4) The information and communications service provider, etc. shall, upon receiving a request for the access to, provision of, personal information pursuant to paragraph (2), take necessary measures without delay.

    (5) The information and communications service provider, etc. shall, immediately upon receiving a request for the correction of erroneous personal information pursuant to paragraph (2), correct the erroneous information or take necessary measures, i.e., explaining why it failed to correct such information, and shall not utilize or provide the relevant personal information until the correction thereof; provided, however, that the same shall not apply where other acts require the provision of such information.

    (6) The information and communications service provider, etc. shall make the withdrawal of consent pursuant to paragraph (1), or how to request access to, provision of, or correction of errors in, the personal information much easier than the method how to collect the personal information.

    (7) The provisions of paragraphs (1) through (6) shall apply mutatis mutandis to the business transferee, etc. In this case, the information and communications service provider, etc. shall be deemed the business transferee, etc.

    Article 30-2 (Notification of Personal Information Use Statement)

    (1) The information and communications service provider, etc., which satisfies the criteria as prescribed by the Presidential Decree, shall notify periodically the use statement (including the provision pursuant to Article 24-2 and entrusting processing of personal information pursuant to Article 25) of personal information collected pursuant to Articles 22 and 23(1) proviso; provided, however, that the same shall not apply where such personal information as contact points to be notified was not collected. (Amended Mar. 22, 2016)

    (2) The type of information to be notified to the users pursuant to paragraph (1), notification interval and method and other matters necessary to notify the use statement shall be prescribed by the Presidential Decree.

    Article 31 (Legal Representative’s Right)

    (1) The information and communications service provider, etc. shall, when it intends to obtain consent for the collection, utilization or provision of the personal information from a minor of age below 14, obtain the consent therefor from his/her legal representative. In this case, the information and communications service provider may demand from the child the necessary minimum information, including the name, etc. of the legal representative, so as to obtain the consent.

    (2) The legal representative may exercise user’s right as for the personal information of the relevant child pursuant to Articles 30 (1) and (2).

    (3) The provisions of Article 30 (3) through (5) shall apply mutatis mutandis to the withdrawal of consent, and the request for the access to, or the correction of, the personal information by the legal representative pursuant to paragraph (2).

    Article 32 (Damages)

    If a user suffers any damage caused by the violation of the provisions in this Chapter on part of the information and communications service provider, etc., such user may claim for the damages against the information and communications service provider, etc. In this case, the information and communications service provider, etc. may not be released from the damages if it fails to prove non-existence of its intention or negligence.

    Article 32-2 (Claim for Statutory Damage)

    (1) The user may, when all of the following subparagraphs are satisfied, claim for compensation of considerable amount up to three million won in place of damages pursuant to Article 32 against the information and communications service provider, etc. within the period as prescribed by the Presidential Decree.

    In this case, the accused information and communications service provider, etc. cannot evade the responsibility unless it proves non-existence of intention or negligence: (Amended Mar. 22, 2016)

    1. Where the information and communications service provider, etc. Violates provisions in this Chapter intentionally or negligently; and

    2. Where the personal information was lost, stolen, leaked, forged, altered or damaged.

    (2) The court may, upon the claim pursuant to paragraph (1), acknowledge a reasonable amount of damages within the scope of paragraph (1) based upon the examination of evidence and review of all the arguments during the proceedings.

    (3) The user who has filed a lawsuit for damages pursuant to Article 32 may change it to the claim for damages subject to paragraph (1) until the closing of oral proceedings at the trial court. (Inserted Mar. 22, 2016)

    Article 32-3 (Deletion and Blocking of Exposed Personal Information)                       

    (1) The information and communications service provider, etc. shall exert itself lest users’ personal information including resident registration numbers, bank account numbers, credit card numbers, etc. should be exposed to public via information and communications network. (Amended Mar. 22, 2016)                                                      

    (2) Upon the request of the Korea Communications Commission or the Korea Internet and Security Agency, the information and communications service provider, etc. shall take necessary measures including deletion, blocking, etc. Of personal information exposed under paragraph (1). (Inserted Mar. 22, 2016)

    Section 4.- Deleted

    Articles 33 through 40 Deleted 2)

    CHAPTER Ⅴ.- PROTECTION OF THE YOUTH IN INFORMATION AND COMMUNICATIONS NETWORKS

    Articles 41 through 44-10 Omitted

    CHAPTER Ⅵ.- SECURING STABILITY OF INFORMATION AND COMMUNICATIONS NETWORKS, ETC.

    Articles 45 through 46-2 Omitted

    Article 46-3 Deleted

    Article 47 (Certification of Data Protection Management System)

    (1) The Minister of Science, ICT and Future Planning may certify for the purpose of securing the stability and reliability of the communications network whether the person who has established and operated a consolidated management system including the managerial, technical and physical safeguards (hereinafter referred to as the “Data Protection Management System” or DPMS) could satisfy the criteria subject to paragraph (4). (Amended Feb. 17, 2012; Mar. 23, 2013; Dec. 1, 2015)

    (2) Any person who falls on any of the following paragraphs as a telecommunications business operator subject to Article 2 viii of the Telecommunications Business Act and an information provider/intermediary taking advantage of the telecommunications services of the said telecommunications business operator shall obtain the certification pursuant to paragraph (1). (Inserted Feb. 17, 2012; Dec. 1, 2015)

    1. Any person who has obtained the permission subject to Article 6(1) of the Telecommunications Business Act and provides information and communications service as prescribed by the Presidential Decree;

    2. An integrated information and communications facility operator; or

    3. Any person with the annual sales, revenue, etc. of more than 150 billion won or the number of users daily average of one million people for the previous three months, who satisfies the criteria as prescribed by the Presidential Decree.

    (3) The Minister of Science, ICT and Future Planning may omit parts of certification examination subject to paragraph (1) in case that the person in need of certification has obtained the international standard certification of data protection or taken other measures for data protection as prescribed by the Ordinance of the Ministry of Science, ICT and Future Planning. In this case, the scope of omission in detail of the said certification examination shall be decided and notified by the Minister of Science, ICT and Future Planning. (Inserted Dec. 1, 2015)

    (4) The Minister of Science, ICT and Future Planning may prescribe and notify the certification criteria including the managerial, technical and physical safeguards and other necessary matters for the DPMS certification subject to paragraph (1). (Amended Feb. 17, 2012; Mar. 23, 2013; Dec. 1, 2015)

    (5) The duration of the DPMS certification subject to paragraph (1) shall be three years; provided, however, that the person who has obtained the data protection degree pursuant to Article 47-5(1) is deemed to have been certified subject to paragraph (1) for the duration of such data protection degree.

    (Inserted Feb. 17, 2012; Dec. 1, 2015)

    (6) The Minister of Science, ICT and Future Planning may delegate the certification matters subject to paragraphs (1) and (2) of the following subparagraphs to the Korea Information and Security Agency or other institution designated by the Minister of Science, ICT and Future Planning (hereinafter referred to as the “DPMS Certification Agency”): (Inserted Feb. 17, 2012; Mar. 23, 2013; Dec. 1, 2015)

    1. The certification examination to clarify the DPMS of a certification applicant being in conformity with certification criteria subject to paragraph (4) (hereinafter referred to as the “DPMS Certification Examination”);

    2. Deliberation of the DPMS Certification Examination results;

    3. Issuance and management of the DPMS Certificate;                                                   

    4. Ex post facto management of the DPMS Certification;                                               

    5. Fostering and qualification management of the DPMS Certification examiners; and 

    6. Other matters in relation to the DPMS Certification.                                                 

    (7) The Minister of Science, ICT and Future Planning may designate the institution to conduct the said certification examination (hereinafter referred to as the “DPMS Examination Agency”) if necessary to conduct the said certification task efficiently. (Inserted Dec. 1, 2015)                                                                                                    

    (8) The Korea Information and Security Agency, the DPMS Certification Agency and the DPMS Examination Agency shall conduct ex post facto management at least once a year to enhance the effectiveness of the DPMS, and notify its result to the Minister of Science, ICT and Future Planning. (Inserted Feb. 17, 2012; Mar. 23, 2013; Dec. 1, 2015)                                                                                                                               

    (9) The person who has obtained the DPMS certification pursuant to paragraphs (1) and (2) may represent or promote the DPMS Certification as prescribed by the Presidential Decree. (Amended Feb. 17, 2012; Dec. 1, 2015)                                                          

    (10) The Minister of Science, ICT and Future Planning may withdraw the PIMS certification when finding out any reason which falls on any of the following subparagraph; provided, however, that the Minister shall cancel the said certification in case of subparagraph 1: (Inserted Feb. 17, 2012; Mar. 23, 2013; Dec. 1, 2015)            

    1. Where the DPMS Certification has been obtained by fraud or other unjust means;    

    2. Where the certification criteria subject to paragraph (4) fail to be satified; Or            

    3. Where the ex post facto management subject paragraph (8) has been denied or obstructed.                                                                                                                     

    (11) The method, procedure, scope and tariffs of certification subject to paragraphs (1) and (2), the method and procedure of ex post facto management subject to paragraph (8), the method and procedure of withdrawal of certification subject to paragraph (10), other necessary matters shall be prescribed by the Presidential Decree. (Amended Feb. 17, 2012; Dec. 1, 2015)                                                                                                

    (12) Necessary matters for the designation criteria, procedure, duration, etc. Of the DPMS Certification Agency and the DPMS Examination Agency shall be prescribed by the Presidential Decree. (Amended Feb. 17, 2012; Dec. 1, 2015)                            (Article Amended Jun. 13, 2008.)

    Article 47-2 (Withdrawal, etc. of Designation of DPMS Certification Agency and DPMS Examination Agency)

    (1) The Minister of Science, ICT and Future Planning may withdrawal the designation of the DPMS Certification Agency and the DPMS Examination Agency, or suspend a whole or part of the DPMS operations for the period not exceeding one year when the juridical person or association designated as such pursuant to Article 47 falls on any of the following subparagraphs; provided, however, that the Minister shall withdraw the said designation in case of subparagraphs 1 and 2: (Inserted Feb. 17, 2012; Mar. 23, 2013; Dec. 1,2015)

    1. Where the designation of the DPMS Certification Agency or DPMS Examination Agency has been obtained by fraud or other unjust means;

    2. Where the certification or certification examination has been conducted  during the period of suspension of the said operation;

    3. Where the certification or certification examination has not been conducted with justifiable reasons;

    4. Where the certification or certification examination has been conducted in violation of Article 47(11); or

    5. Where the designation criteria Article 47(12) fail to be satified.

    (2) Necessary matters for the designation withdrawal and suspension of operation, etc. subject to paragraph (1) shall be prescribed by the Presidential Decree.

    (Article Amended Jun. 13, 2008; Amended Dec. 1, 2015)

    Article 47-3 (Certification of Personal Information Management System)

    (1) The Korea Communications Commission may certify for the purpose of carrying out systemic and sustainable personal information protection activities in the communications network whether the person who has established and operated a consolidated management system including the managerial, technical and physical safeguards (hereinafter referred to as the “Personal Information Management System” or PIMS) could satisfy the criteria subject to paragraph (2).

    (2) The Korea Communications Commission may prescribe and notify the certification criteria including the managerial, technical and physical safeguards and other necessary matters for the PIMS certification subject to paragraph (1).

    (3) Articles 47(6) through (12) shall apply mutatis mutandis to the PIMS agencies, ex post facto management, etc. In this case, paragraphs (1) and (2) shall read paragraph (1). (Amended Dec. 1, 2015)

    (4) Articles 47-2 shall apply mutatis mutandis to the designation withdrawal, etc. of the PIMS Certification Agency.

    (Article Inserted Feb. 17, 2012)

    (The previous Article 47-3 moved to Article 47-4 Feb. 17, 2012)

    Article 47-4 (Data Protection of Users)

    (1) The government may advise to the users to observe by establishing necessary standards for the data protection of users, and take necessary measures, i.e., checking the weak points and providing technological assistance, so as to prevent the incidents and block the dissemination thereof.

    (2) through (4) Omitted

    Article 47-5 (Grant of Data Protection Management Degree)

    (1) The person who has obtained the DPMS certification pursuant to Article 47 may be granted the data protection management degree by the Minister of Science, ICT and Future Planning to enhance the consolidated corporate data protection management level and secure the reliability of data protection services from users. (Amended Mar. 23, 2013)

    (2) The Minister of Science, ICT and Future Planning may delegate the grant of degree matters subject to paragraph (1) to the Korea Information and Security Agency. (Amended Mar. 23, 2013)

    (3) The person who has been granted the data protection management degree pursuant to paragraph (1) may represent or promote the said data protection management degree.

    (4) The Minister of Science, ICT and Future Planning may withdraw the degree granted as such when finding out any reason which falls on any of the following subparagraph; provided, however, that the Minister shall cancel the said degree in case of subparagraph 1: (Amended Mar. 23, 2013; Dec. 1, 2015)

    1. Where the data protection management degree has been granted by fraud or other unjust means; or

    2. Where the degree criteria subject to paragraph (5) fail to be satisfied.

    (5) The criteria for grant of degree, the method, procedure and tariffs of grant of degree subject to paragraph (1), the duration of degree, the method and procedure of withdrawal of degree subject to paragraph (4), and other necessary matters shall be prescribed by the Presidential Decree.

    (Article Newly Inserted Feb. 17, 2012)

    Articles 48 through 48-4 Omitted

    Article 49 (Protection of Secrets, etc.)

    No one is allowed to damage the information of other persons or infringe upon, steal or leak the secrets of other persons, which are processed, stored or transmitted via the information and communications networks.

    Article 49-2 (Prohibition of Collection of Personal Information by Means of Deceptive Activities)

    (1) No one shall collect, or entice other person to provide with, the personal information of other person by means of deceptive activities in the information and communications networks.

    (2) Any information and communications service provider shall report to the Minister of Science, ICT and Future Planning, the Korea Communications Commission or the Korea Information and Security Agency immediately upon finding out the violation of paragraph (1). (Amended Apr. 22, 2009; Mar. 22, 2016)

    (3) The Minister of Science, ICT and Future Planning, the Korea Communications Commission or the Korea Information and Security Agency shall, upon receiving the report pursuant to paragraph (2) or finding out the violation of paragraph (1), take necessary measures prescribed in the following subparagraphs: (Amended Apr. 22, 2009; Mar. 22, 2016)

    1. Collecting and disseminating the violation of paragraph (1);

    2. Forecasting or warning of similar violations; and

    3. Emergency measures to prevent present and further violations including request for blocking the access paths or request for notification of users’information exposed to the violations under paragraph (1) to the information and communications service provider.

    (4) The Minister of Science, ICT and Future Planning or the Korea Communications Commission may order the information and communications service provider, prior to taking measures subject to paragraph (3) iii, to take necessary measures including sharing information in relation to deceptive activities via information and communications networks among service providers.

    (Inserted Mar. 22, 2016)

    Article 50 (Restrictions on Transmitting Advertisement Information Made for Profit) (1) Anybody, who intends to transmit via electronic transmission media any advertisement information made for profit, shall obtain the prior explicit consent of the relevant addressee; provided, however, that the same shall not apply to any of the following subparagraphs: (Amended Mar. 22, 2016)

    1. Where somebody, who collects directly from the addressees the contact points through transactions of goods and services, intends to transmit the advertisement information made for profit within the period as prescribed by the Presidential Decree regarding the same kind of goods, etc. processed by himself and traded with the receiver; and

    2. Where a call center operator subject to the Act Regarding Visiting Sales, etc. solicits over the telephone with his/her voice after informing the addressee of the sources of personal information.

    (2) Notwithstanding paragraph (1), anybody, who intends to transmit via electronic transmission media any advertisement information made for profit, shall not transmit advertisement information made for profit if the addressee expresses refusal of such information or withdraw prior consent.

    (3) Anybody, who intends to transmit any advertisement information made for profit via electronic transmission media to the addressee during the hours from 9:00 p.m. to 8:00 a.m. the next day, shall obtain the separate prior consent of the relevant addressee in spite of paragraph (1); provided, however, that the same shall not apply to the media as prescribed by the Presidential Decree.

    (4) Anybody, who transmits advertisement information made for profit via electronic transmission media, shall indicate concretely the matters stated in the following subparagraphs in such a manner as prescribed by the Presidential Decree:                      1. The name and contact points of the sender; and

    2. Other matters regarding the measure and methods to easily indicate the refusal of, or withdrawal of consent to, such information.

    (5) Anybody, who transmits advertisement information made for profit via electronic transmission media, shall not take any measure specified in the following subparagraphs:

    1. Measures to avoid and hinder the refusal or withdrawal of consent of the addressee of advertisement information;

    2. Measures to automatically generate the contact points of addressee i.e., by combining numbers, codes or letters into new telephone numbers or e-mail addresses;

    3. Measures to automatically register telephone numbers or e-mail addresses in order to transmit advertisement information made for profit;

    4. Measures to conceal the identity of the sender of advertisement information or the source of advertisement transmission; or

    5. Various measures to induce reply by deceiving the addressee for the purpose to transmit advertisement information made for profit.

    (6) Anybody, who transmits advertisement information for profit via electronic transmission media, shall take necessary measures in such a manner as prescribed by the Presidential Decree lest the addressee should be charged the monetary cost incurred when telephoning a message to refuse, or withdraw the consent of, such information.

    (7) Anybody, who transmits advertisement information for profit via electronic transmission media, shall, when the addressee expresses prior consent pursuant to paragraph (1), or refusal to receive or withdrawal of consent to receive pursuant to paragraph (2), inform to the addressee the result after processing prior consent, refusal to receive or withdrawal of consent as prescribed by the Presidential Decree.

    (8) Anybody, who has obtained the consent pursuant to paragraphs (1) or (3), shall confirm periodically whether the addressee really consented to receive such advertisement information as prescribed by the Presidential Decree.

    (Article Amended May 28, 2014)

    Article 50-2 Deleted (May 28, 2014)

    Article 50-3 (Entrusting Transmission of Advertisement Information Made for Profit)

    (1) Anybody, who entrusts other person with a task to transmit advertisement information made for profit, shall control and supervise him/her lest the trustee should violate Article 50. (Amended May 28, 2014)

    (2) Anybody, who is entrusted by a person with a task to transmit advertisement information made for profit pursuant to paragraph (1), shall be deemed an employee of such person in compensating the damage caused by violating the relevant acts related with such task.

    Article 50-4 (Restrictions on Information Transmission Services, etc.)

    (1) The information and communications service provider may take measures to refuse to provide the relevant services in any of the following subparagraphs:

    1. Where obstacles occur or are expected to occur in providing services owing to transmitting or receiving advertisement information;                                                  

    2. Where users would not want to receive advertisement information; or                        

    3. Deleted (Amended May 28, 2014)                                                                                         

    (2) The information and communications service provider, which intends to take measures to refuse pursuant to paragraph (1) or (4), shall include such provisions as how to refuse the relevant services in an end-user agreement with the user of such services. (Amended May 28, 2014)                                                                                  

    (3) The information and communications service provider, which intends to take measures to refuse pursuant to paragraph (1) or

    Article 50-5 (Installation of Advertisement Programs for Profit, etc.)

    The information and communications service provider, which intends to show up advertisement information made for profit or install the programs to collect personal information in the users’ computer or other data processing devices as prescribed by the Presidential Decree, shall obtain the consent of users. In this case, it shall notify the usage of such programs and the method how to delete.

    Article 50-6 (Distribution of Softwares to Block the Transmission of Advertisement Programs Made for Profit)

    (1) The Korea Communications Commission may develop and distribute softwares and computer programs by which the addressee can conveniently block or report the advertisement information made for profit transmitted in violation of Article 50.

    (2) The Korea Communications Commission may provide necessary support to the relevant public institutions, corporations, associations, etc. in order to promote the development and distribution of softwares and computer programs to block and report pursuant to paragraph (1).

    (3) The Korea Communications Commission may advise the information and communications service provider to take such necessary measures as development of technologies, education, public relations, etc. for the protection of addressees when the services of the information and communications service provider are used to transmit the advertisement information made for profit in violation of Article 50.

    (4) Necessary matters for the development and distribution pursuant to paragraph (1) and the support pursuant to paragraph (2) shall be prescribed by the Presidential Decree.

    Article 50-7 (Restrictions on Posting Advertisement Information Made for Profit)

    (1) Anybody, who intends to post any advertisement information made for profit on the Internet homepage, shall obtain prior consent of the webmaster or homepage manager; provided, however, that the same does not apply to a bulletin board which anybody has an easy access and may post messages without authorization.

    (2) Notwithstanding paragraph (1), anybody, who intends to post any advertisement information made for profit on the Internet homepage, shall not post advertisement information made for profit if the webmaster or homepage manager expresses explicit refusal of posting such information or withdraw prior consent.

    (3) A system operator or administrator of the Internet homepage may take such measures as deleting the advertisement information made for profit which is posted in violation of paragraph (1) or (2).

    (ArticleAmended May 28, 2014)

    Article 50-8 (Prohibition of Transmission of Advertisement Information for Illegal Act)

    Nobody shall transmit advertisement information regarding goods or services prohibited by this Act or other acts via the information and communications networks.

    Article 51 (Restrictions on Outflow of Material Information into Foreign Countries)

    (1) The government may have each information and communications service provider or the relevant user of information and communications services take measures necessary to prevent material information regarding the domestic industry, economy, science and technology, etc. from being flowed out of Korea into foreign countries via the information and communications networks.

    (2) The scope of material information referred to in paragraph (1) shall be as follows:

    1. Security information related with the national security and major policy information; or

    2. Information regarding state-of-the-art technologies or equipment developed domestically.

    (3) The government may have each information and communications service provider processing the information referred to any of the subparagraphs of paragraph (2) take the following measures: (Amended Mar. 22, 2016)

    1. Establishing systemic and technological devices to prevent improper utilization of the information and communications networks;

    2. Taking systemic and technological measures to block the illegal destruction or manipulation of information; or

    3. Taking measures to prevent the leakage of material information acquired in the course of processing information by the information and communications service provider.

    Article 52 (Korea Information and Security Agency)

    (1) The government shall establish the Korea Information and Security Agency (hereinafter referred to as “KISA“) to implement efficiently such policies as to enhance the information and communications networks (excluding the establishing, improving and managing such networks), as to promote the safe usage, and as to support the international cooperation and going abroad related with broadcasting and communications.

    (2) KISA shall be a juridical person.

    (3) KISA shall conduct the business referred to in the following subparagraphs: (Amended Mar. 23, 2013; Nov. 19, 2014; Jun. 22, 2015)                                                 

    1. To survey and research into legal regimes, policies and systems for the utilization and protection of the information and communications networks, and the international cooperation and going abroad related with broadcasting and communications;              

    2. To do research and analysis of statistics related with the utilization and protection of the information and communications networks;                                                              

    3. To analyze negative effects of informatization and to research into countermeasures;

    4. To conduct public relations, education and training for the utilization and protection of the information and communications networks;                                                           

    5. To secure data protection in the information and communications networks, and to achieve technological development and standardization related with the Internet address resources;                                                                                                                          

    6. To help establish the policy for the data protection industries, and to conduct related technological development and training of human resources;                                         

    7. To implement and support the assessment, certification, etc. of data protection including the DPMS certification and the assessment and certification of data protection system;                                                                                                                                

    8. To do research into effective measures for data protection, and to support the development and distribution of data protection technologies;                                        

    9. To support the operation of the Dispute Mediation Committee and to opérate the Reporting Center for Personal Information Infringement;                                             

    10. To do counseling and process claims regarding the transmission of advertisement information and the Internet advertisement;                                                                   

    11. To deal with and analyze causes of the incidents infringing upon the information and communications networks, and to operate the incident response system;                

    12. To manage the authentication of electronic signature pursuant to Article 25(1) of the Electronic Signature Act;                                                                                                

    13. To support the efficient operation of the Internet and the promotion of utilization thereof;                                                                                                                            

    14. To help protect the stored information of the Internet users;                                      

    15. To support the service policy related with the Internet;                                           

    16. To protect users in the Internet, and to help flow and disseminate sound information;

    17. To conduct business regarding the Internet addresses under the Act on the Internet Resources;                                                                                                                       

    18. To support operation of the Internet Address Dispute Mediation Committee pursuant to Article 16 of the Act on the Internet Resources;                                         

    19. To support operation of the Mediation Committee pursuant to Article 25(7) of the Act on the Promotion of Data Protection Industry;                                                           

    20. To assist the international cooperation, going abroad and overseas public relations related with broadcasting and communications;                                                            

    21. Other activities incidental to the business of subparagraphs 1 through 20; and

    22. Other tasks prescribed by this Act, and other acts and regulations to be conducted by KISA, or entrusted by the Minister of Science, ICT and Future Planning and the Minister of Interior, the Korea Communications Commission, or the head of other administrative agencies;                                                                                                  

    (4) The government may make contributions to cover expenses necessary for the operation of KISA.

    (5) The provisions regulating the incorporated foundation in the Civil Act shall apply mutatis mutandis to the matters not prescribed by this Act with respect to KISA.

    (6) Other person than KISA shall not use the name of the Korea Information and Security Agency.

    (7) Other matters necessary to operate, and conduct business of, KISA shall be prescribed by the Presidential Decree.

    CHAPTER VII.- COMMUNICATIONS BILLING SERVICES

    Articles 53 – 61 Omitted

    CHAPTER VIII.- INTERNATIONAL COOPERATION

    Article 62 (International Cooperation)

    In performing the function stated in the following subparagraphs, the government shall cooperate with other states or international organizations:

    1. Cross-border transfer of personal information and data protection;

    2. Protection of the youth in the information and communications network;

    3. Prevention of the incidents threatening the safety of information and communications network; and

    4. Other activities to ensure safe and sound utilization of information and communications services.

    Article 63 (Protection of Cross-Border Transfer of Personal Information)

    (1) The information and communications service provider, etc. shall not enter into any international contract of which contents violate the provisions of this Act with respect to the personal information of users.

    (2) The information and communications service provider, etc. shall obtain the consent of users when they intend to provide (including being subject to inquiry), entrust processing, store (hereinafter referred to as “transfer” in this Article) the personal information of such users to abroad; provided, however, that, if it is necessary to perform the contract for providing information and communications services and to enhance users convenience, etc., the provisions regarding the consent of users subject to entrusting processing and storing personal information abroad may not apply in case of disclosing under Article 27-2(1), or notifying to users by means as prescribed by Presidential Decree like email, all items of subparagraphs of paragraph (3). (Amended Mar. 22, 2016)

    (3) The information and communications service provider, etc. shall, when they intend to obtain the consent pursuant to paragraph (2), notify the user in advance of the whole matters stated in the following subparagraphs:

    1. The items of personal information to be transferred;

    2. The state to which personal information will be transferred, the date and time of transfer and the method thereof;

    3. The name (referring to the company name and the contact points of the officer in charge of data protection in case of a juridical person) of a person who will be provided with the personal information; and

    4. The purpose of utilization, and the period of retention and utilization, of personal information on the part of a person who will be provided with the personal information.

    (4) The information and communications service provider, etc. shall take the protective measures as prescribed by the Presidential Decree when they transfer the personal information to abroad with the consent pursuant to paragraph (2).

    CHAPTER IX.- SUPPLEMENTARY PROVISIONS

    Article 64 (Submission of Materials, etc.)

    (1) The Minister of Science, ICT and Future Planning or the Korea Communications Commission may request the information and communications service provider, etc. (in this Article, including any person to whom Article 67 applies mutatis mutandis) to submit relevant goods, documents, etc. in case any of the following subparagraphs shall apply:

    1. Where the violation of this Act is detected or knowingly suspected;

    2. Where the violation of this Act is reported or any claim thereon is received; or

    3. Where such other cases as prescribed by the Presidential Decree are necessary to protect the users.

    (2) The Korea Communications Commission may request the information and communications service provider, etc. to have access to, or submit, data with respect to the name, address, resident registration number, period of utilization, etc. of the person who transmitted advertisement information made for profit in violation of this Act in order to take the measures stated in the following subparagraphs against such transmitter:                                                                                                                         1. Corrective measures pursuant to paragraph (4);

    2. Imposition of fine for negligence pursuant to Article 76; and

    3. Other measures amounting to the above-mentioned subparagraphs.

    (3) When the information and communications service provider, etc. fails to submit materials pursuant to paragraphs (1) and (2), or it is deemed to have violated this Act, the Minister of Science, ICT and Future Planning or the Korea Communications Commission may have its officials enter the business place of the information and communications service provider, etc. and other concerned persons related with breach of the relevant laws to inspect its current business operations and examine ledger and books, or other documents, etc. (Amended Mar. 29, 2011; Mar. 23, 2013; Mar. 22, 2016)

    (4) The Minister of Science, ICT and Future Planning or the Korea Communications Commission may order that the information and communications service provider, etc. in violation of this Act should take necessary corrective measures, and demand such information and communications service provider, etc., who has been ordered to do so, to make such fact public. In this case, such necessary matters as the method how to make it public, the criteria and procedure thereof, etc. shall be prescribed by the Presidential Decree.

    (5) The Minister of Science, ICT and Future Planning or the Korea Communications Commission may, when it ordered necessary corrective measures pursuant to paragraph (4), make the fact public. In this case, such necessary matters as the method how to make it public, the criteria and procedure thereof, etc. shall be prescribed by the Presidential Decree.

    (6) The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, when it requests the relevant information and communications service provider, etc. to submit or have access to data, etc. pursuant to paragraphs (2) and (3), notify in writing (including the electronic message) of the reason for request, legal grounds, time limit of submission thereof or the date and time to have access thereto, the content of data to be submitted or accessed in detail.

    (7) In case of inspection pursuant to paragraphs (3), the inspection plan including the inspection date and time, reasons for inspection, particulars to be inspected shall be notified to the relevant information and communications service provider, etc. at least seven days before the scheduled inspection date; provided, however, that the same does not apply in case of emergency or when it deems such prior notification inappropriate to attain the inspection purpose because of probable destruction of evidences.

    (8) The officials, who conduct the inspection pursuant to paragraph (3), shall carry certificates showing their authority, produce them to persons concerned, and deliver them the document containing officials’ names, inspection hours, purposes thereof, etc.

    (9) The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, when it received, had access to, or inspected the data, etc. pursuant to paragraphs (1) and (3), notify in writing the relevant information and communications service provider, etc. of the inspection result (in case of making an order to take corrective measures subsequent to the inspection, including such order).

    (10) The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, for the purpose of request of submission or inspection of data, etc. pursuant to paragraphs (1) and (4), may ask the head of KISA for technical advices and other necessary support.

    (11) Any request of submission of, access to, or inspection of, data, etc. pursuant to paragraphs (1) and (4) shall be made within the minimum scope necessary to implement this Act, and shall not be misused for other purposes.

    Article 64-2 (Preservation and Destruction of Materials, etc.)

    (1) The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall not provide to a third party the documents, materials, etc. submitted or collected pursuant to Article 64 nor make them public, if and when it is requested by the relevant information and communications service provider, etc. to preserve such materials.

    (2) In case the Minister of Science, ICT and Future Planning or the Korea Communications Commission received the materials submitted via the information and communications networks, or made them digitalized, it shall take systemic and technological security measures lest the personal information, trade secrets etc. should be leaked out.

    (3) The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall destroy immediately the documents, materials, etc. submitted or collected pursuant to Article 64, if there occurs a case applicable to any of the following subparagraphs except otherwise specifically provided in other acts. The same shall apply to the person to whom the Minister of Science, ICT and Future Planning or the Korea Communications Commission delegates or entrusts the whole or part of its authority pursuant to Article 65:                                                                                        1. Where the purpose for which the request for submission of materials, visit and inspection, order to take corrective measures, etc. take place pursuant to Article 64 has been attained;

    2. Where an administrative judgment is filed in disobedience of the order to take corrective measures pursuant to Article 64(4), or, in case of the administrative lawsuit, the relevant administrative dispute settlement proceedings have been closed;

    3. Where the fine for negligence is levied pursuant to Article 76(4) and there is no objection thereto until the period of objection is over pursuant to Article 76(5); or

    4. Where any objection is raised against the imposition of fine for negligence pursuant to Article 76(4) and the non-litigation proceedings of the competent court with jurisdiction are over.

    Article 64-3 (Imposition, etc. of Penalty Surcharge)

    (1) In case an action is in violation of any of the following subparagraphs, the Korea Communications Commission may impose the penalty surcharge3) amounting to not more than three percent (3/100) of total sales related with such violation on the wrong-doing information and communications service provider, etc.. the penalty surcharge of not more than 100 million won may be imposed to the violator of subparagraph 6: (Amended Feb. 17, 2012; May 28, 2014; Mar. 22, 2016)

    1. To collect personal information without obtaining the consent of a user in violation of Article 22(1) including the case of application mutatis mutandis pursuant to Article 67;

    2. To collect personal information which is most likely to infringe upon the right and interest, or the privacy, of an individual without obtaining the consent of the subject in violation of Article 23(1) including the case of application mutatis mutandis pursuant to Article 67;

    3. To utilize personal information in violation of Article 24 including the case of application mutatis mutandis pursuant to Article 67;

    4. To provide personal information to a third party in violation of Article 24-2 including the case of application mutatis mutandis pursuant to Article 67;

    5. To entrust handling of personal information without obtaining the consent of a user in violation of Article 25(1) including the case of application mutatis mutandis pursuant to Article 67;

    5-2. To allow negligent management, supervision or education under Article 25(4), including the case of application mutatis mutandis pursuant to Article 67, to cause the trustee in violation of Chapter IV;

    6. To leave the personal information of a user lost, stolen, leaked, forged, altered or damaged, and fail to take measures required by Articles 28(1) ii through v including the case of application mutatis mutandis pursuant to Article 67;

    7. To collect the personal information of a minor of age below 14 without obtaining the consent of his/her legal representative in violation of Article 31(1) including the case of application mutatis mutandis pursuant to Article 67; or 8. To provide the personal information of users abroad without obtaining their consent thereto in violation of the main sentence of Article 63(2).

    (2) In case the penalty surcharge is imposed pursuant to paragraph (1), if such information and communications service provider, etc. denies to submit data for the calculation of sales or submits false data, its sales amount may be estimated on the basis of financial statements and other accounting information of the information and communications service provider, etc. with a similar size, and the business data including the number of subscribers, tariff table of users, etc. provided, however, that, in such a case of no sales report at all or the difficulty to calculate the amount of sales as prescribed by the Presidential Decree, the penalty surcharge of not more than 400 million won may be imposed to such operator.

    (3) When imposing the penalty surcharge pursuant to paragraph (10, the Korea Communications Commission shall take the particulars stated in the following subparagraphs into consideration:

    1. The substance and status of violations;

    2. The duration and times of violations; and

    3. The size of profit acquired out of violations.

    (4) The penalty surcharge pursuant to paragraph (1) shall be assessed with the provision of paragraph (3) taken into consideration, but the detailed criteria and procedure for the assessment of penalty surcharge shall be prescribed by the Presidential Decree.

    (5) When the person, who is required to pay the penalty surcharge pursuant to paragraph (1), fails to pay the penalty surcharge until the due date, the Korea Communications Commission shall collect the additional charge amounting to six percent per annum (6% p.a.) of such penalty surcharge for the period from the following day of the due date.

    (6) When the person, who is required to pay the penalty surcharge pursuant to  paragraph (1), fails to pay the penalty surcharge until the due date, the Korea Communications Commission shall press for the payment by designating the extended period. If and when the person fails to pay the penalty surcharge and the additional charge for the extended period pursuant to paragraph (5), the Korea Communications Commission finally shall collect the penalty surcharge and the additional charge likewise by the disposition for recovery of the National Tax arrears.

    (7) In case the penalty surcharge imposed pursuant to paragraph (1) is refunded owing to the court judgment, etc., the additional fee in the amount of six percent per annum (6% p.a.) of such penalty surcharge to be refunded shall be paid for the period from the payment date of penalty surcharge to the refund date.

    Article 64-4 (Hearings)

    The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall hold hearings in case any of the following subparagraphs shall apply:

    1. Where it intends to withdraw the designation of the certification agency pursuant to Article 9(2);

    2. Where it intends to withdraw the designation of the identification agency pursuant to Article 23-4(1);

    3. Where it intends to cancel the DPMS certification pursuant to Article 47(10) including the case of application mutatis mutandis pursuant to Article 47-3(3);

    4. Where it intends to withdraw the designation of the DPMS Certification Agency pursuant to Article 47-2(1) including the case of application mutatis mutandis pursuant to Article 47-3(4);

    5. Where it intends to cancel the data protection management degree pursuant to Article 47-5(4); or

    6. Where it intends to cancel the registration pursuant to Article 55(1).

    (Article Inserted Dec. 1, 2015)

    Article 65 (Delegation and Entrustment of Authority)

    (1) The authority of the Minister of Science, ICT and Future Planning or the Korea Communications Commission under this Act may be delegated or entrusted in part to the head of its administrative agency under the control of the Ministry of Science, ICT and Future Planning or the head of the Regional Post Agency in such a manner as prescribed by the Presidential Decree.

    (2) The Minister of Science, ICT and Future Planning may entrust the Project to promote the utilization of the information and communications networks, etc. pursuant to Article 13 to the National Information Society Agency (NIA) established pursuant to Article 14 of the Nation’s Informatiztion Framework Act in such a manner as prescribed by the Presidential Decree.

    (3) The Minister of Science, ICT and Future Planning or the Korea Communications Commission may entrust doing job to request the submission of, and inspect, the materials pursuant to Articles 64(1) and (2) to KISA in such a manner as prescribed by the Presidential Decree.

    (4) The provision of Article 64(8) shall apply mutatis mutandis to the employees of KISA who are subject to paragraph (3).

    Article 65-2 Deleted

    Article 66 (Confidentiality, etc.)

    Any person who is or was engaged in the business stated in the following subparagraphs shall not leak secrets acquired while performing his/her duties to any other person, or use such secrets for other purposes than the initial duties; provided, however, that the same shall not apply where other acts specifically prescribe otherwise:

    1. Deleted

    2. Certification of DPMS under Article 47;

    2-2. Certification of PIMS under Article 47-3;

    3. Assessment of the data protection system under Article 52(3) iv;

    4. Deleted

    5. Mediation of any dispute conducted by the defamation dispute mediation panel under Article 44-10.

    Article 67 (Application mutatis mutandis to Broadcasting Service provider)

    (1) The provisions of Chapter IV shall apply mutatis mutandis to the person who falls under Article 2 iii Items a through e and Article 2 vi, ix, xii and xiv of the Broadcasting Act, and would collect, use and provide to a third party personal information of audience and viewers. In this case, the “information and communications service provider” and the “information and communications service provider, etc.” shall be deemed the “person who falls under Article 2 iii Items Ga through Ma and Article vi, ix, xii and xiv of the Broadcasting Act,” and the “user” shall be deemed the “audience and viewers,” respectively.

    (2) The provisions of Articles 22, 23, 23-2 through 23-4, 24, 24-2, 26, 26-2, 27, 27-2, 27-3, 28, 28-2, 29, 30, 30-2 and 31 shall apply mutatis mutandis to the trustee as prescribed in Article 25(1).

    (Article Inserted Feb. 17, 2012)

    Article 68 Deleted (Mar. 22, 2010)

    Article 68-2 Deleted (Jun. 22, 2015)

    Article 69 (Legal Fiction of Officials in Applying Penal Provisions)

    The officers and employees of NIA and KISA, who are conducting the job entrusted by the Minister of Science, ICT and Future Planning or the Korea Communications Commission pursuant to Articles 65(2) and (3), shall be deemed government officials in the application of Articles 129 through 132 of the Criminal Act.

    Article 69-2 (Accusation)

    (1) When the Korea Communications Commission deems any of the subparagraphs of Article 64-3(1) to be applicable, the Commission may accuse the breaching information and communications service provider, etc. to the investigation authorities including the prosecution office.

    (2) The Korea Communications Commission may recommend the information and communications service provider, etc. in violation of this Act in relation to personal information protection to take a disciplinary measure of the person responsible therefor (including a representative and/or director and officer responsible in charge). In this case, the person who has received such recommendation shall be respectful of it and notify the Korea Communications Commission of the result. (Inserted Mar. 22, 2016)

    CHAPTER X.- PENAL PROVISIONS

    Article 70 (Penal Provisions)

    (1) Any person who has defamed other person by alleging openly facts via the information and communications networks with the purpose of slandering him/her shall be subject to imprisonment with prison labor for not more than 3 years or by a fine not exceeding 30 million won. (Amended May 28, 2014)

    (2) Any person who has defamed other person by alleging openly false facts via the information and communications networks with the purpose of slandering him/her shall be subject to imprisonment with prison labor for not more than 7 years or the suspension of qualification for not more than 10 years, or by a fine not exceeding 50 million won.

    (3) The offense stated in paragraphs (1) and (2) shall not be indicted against the will expressed by the victim.

    Article 70-2 (Penal Provisions)

    Any person who has relayed or distribute malicious programs in violation of Article 48(2) shall be subject to imprisonment with prison labor for not more than 7 years or by a fine not exceeding 70 million won.

    Article 71 (Penal Provisions)

    (1) Any person referred to in the following subparagraphs shall be subject to imprisonment with prison labor for not more than 5 years or by a fine not exceeding 50 million won:

    1. A person who has collected the personal information of users without the consent of users in violation of Article 22(1) including the case of application mutatis mutandis under Article 67;

    2. A person who has collected the personal information likely to excessively infringe upon the right, interest and privacy of the individual without the consent of users in violation of Article 23(1) including the case of application mutatis mutandis under Article 67;

    3. A person who has utilized the personal information of users, provided such personal information to a third party, or received such personal information knowingly for profit or unjust purposes in violation of Articles 24, 24-2(1) and (2) or 26(3) including the case of application mutatis mutandis under Article 67;

    4. A person who has entrusted handling of the personal information without the consent of users in violation of Article 25(1) including the case of application mutatis mutandis under Article 67;

    5. A person who has damaged, infringed upon or leaked the personal information of users in violation of Article 28-2(1) including the case of application mutatis mutandis under Article 67;

    6. A person who has received the personal information for profit or unjust purposes knowing such information leaked out in violation of Article 28-2(2);

    7. A person who has provided or utilized the personal information without taking necessary measures in violation of Article 30(5) including the case of application mutatis mutandis under Articles 30(7), 31(3) and 67;

    8. A person who has collected the personal information of a minor below 14 without the consent of his/her legal representative in violation of Article 31(1) including the case of application mutatis mutandis under Article 67;

    9. A person who has conveyed or distributed malicious programs in violation of Article 48(2);

    10. A person who has caused troubles in the information and communications networks in violation of Article 48(3); and

    11. A person who has damaged the information of other person, or infringed upon, stolen or leaked the secrets of other person in violation of Article 49.

    (2) An attempted crime of paragraph (1) ix shall be punished. (Inserted Mar. 22, 2016)

    Article 72 (Penal Provisions)

    (1) Any person referred to in the following subparagraphs shall be subject to imprisonment with prison labor for not more than 3 years or by a fine not exceeding 30 million won: (Amended Jan. 20, 2015; Mar. 27, 2015)

    1. A person who has infiltrated the information and communications networks in violation of Article 48(1);

    2. A person who has collected the personal information of other person in violation of Article 49-2(1);

    2-2. A person who has transmitted the advertisement information in violation of Article 50-8 taking advantage of large-scale catastrophic situation subject to 14(1) of the Framework Act on the Management of Disasters and Safety;

    3. A person who has done business without registration required by Article 53(1);

    4. A person who has lent money, or has arranged, intermediated, solicited and promoted such transaction by conducting action applicable to any of the following Items:

    a. To do transactions of communications billing services by pretending to sell or provide the goods or services, or exceeding the real sales, or to let others do so on his/her behalf; or

    b. To purchase the goods or services at a discount which were bought or used by the user of communications billing services just after such user was induced to buy or use such goods or services by means of the communications billing services.

    5. A person who has leaked the secrets to other person acquired while performing his/her duties, or utilized such secrets for other purpose than the initial duties in violation of Article 66.

    (2) Deleted (Mar. 22, 2016)

    Article 73 (Penal Provisions)

    Any person referred to in the following subparagraphs shall be subject to imprisonment with prison labor for not more than 2 years or by a fine not exceeding 20 million won: (Amended May 28, 2014; Mar. 22, 2016)

    1. A person who has lost, stolen, leaked, forged, altered or damaged the personal information of users by failing to take such technological and managerial measures as prescribed in Articles 28(1) ii through v including the case of application mutatis mutandis under Article 67;

    1-2. A person who fails to destroy personal information in violation of Article 29(1) including the case of application mutatis mutandis under Article 67;

    2. A person who has provided media materials harmful to the youth for profit without indicating the harmful nature in violation of Article 42;

    3. A person who has transmitted to the youth, or exhibit publicly without taking any measure off-limits to the youth the information to advertize the media materials harmful to the youth in violation of Article 42-2;

    4. A person who has used the information of users for other purposes tan filing civil or criminal lawsuits;

    5. A person who has not observed the order of the Korea Communications Commission pursuant to Articles 44-7(2) and (3);

    6. A person who has not preserved the relevant materials in violation of the order pursuant to Article 48-4(3);

    7. A person who has enticed other person to provide with personal information in violation of Article 49-2 (1); or

    8. A person who has not observed the order pursuant to Article 61.

    Article 74 (Penal Provisions)

    (1) Any person referred to in the following subparagraphs shall be subject to imprisonment with prison labor for not more than 1 year or by a fine not exceeding 10 million won: (Amended Feb. 17, 2012; May 28, 2014)

    1. A person who has put any label on goods, or sold such goods bearing such label or displayed such goods for the purpose of selling them in violation of  Article 8 (4);

    2. A person who has distributed, sold, rented, or openly displayed lascivious codes, letters, sounds, images or video clips in violation of Article 44-7(1) i;

    3. A person who has repeatedly sent codes, letters, sounds, images or video clips inciting fears and uneasiness to other person in violation of Article 44-7(1) iii;

    4. A person who has taken measures in violation of Article 50(5);

    5. Deleted (May 28, 2014)

    6. A person who has transmitted advertisement information in violation of Article 50-8; or

    7. A person who has not registered the change of the registry nor reported business transfer, or the merger and succession of business in violation of Article 53(4).

    (2) The offense stated in paragraph (1) iii shall not be indicted against the Will expressed by the victim.

    Article 75 (Joint Penal Provisions)

    If a representative of a corporation, or the agent, manager or other employee of a corporation or an individual violated the provisions of Articles 71 through 73 or 74 (1) with respect to the business of such corporation or individual, the actor shall be punished, but also the corporation or individual shall be subject to a fine prescribed in the relevant Article; provided, however, that the same shall not apply where such corporation or individual was not negligent in taking due care and supervisory duty to do the relevant business.

    Article 75-2 (Confiscation and Additional Imposition of Fine)

    The monies or other profits acquired by a person who committed any of the crimes set forth in Article 71(1) i through viii, Article 72(1) ii and Article 73 i, i-2, vii in relation to the relevant violations may be confiscated, and, if such confiscation is impossible, its equivalent amount may be imposed additionally. In this case, such confiscation or additional imposition my be levied in addition to other punishment. (Inserted Mar. 22, 2016)

    Article 76 (Fine for Negligence)

    (1) A person who is referred to in the following subparagraphs and abets other person to do the action applicable to Items 7 through 11 shall be subject to a fine for negligence not exceeding 30 million won: (Amended Mar. 29, 2011; Feb. 17, 2012; Mar. 23, 2013; May 28, 2014; Jun. 22, 2015; Dec. 1, 2015; Mar. 22, 2016)

    1. A person who has denied services in violation of Articles 22-2(2) or 23(3) including the case of application mutatis mutandis under Article 67;

    1-2. A person who has failed to take measures necessary for the protection of personal information of users including methods of consent to, and withdrawal from, the authorized access in violation of Article 22-2(3) including the case of application mutatis mutandis under Article 67;

    2. A person who collects and uses resident registration numbers in violation of Article 23-2(1) or fails to take necessary measures in violation of Article 23-2(2) including the case of application mutatis mutandis under Article 67;

    2-2. A person who has failed to notify or report to users, the Korea Communications Commission and KISA in violation of Article 27-3(1) including the case of application mutatis mutandis under Article 67, or delays exceeding 24 hours to notify or report with no justifiable reasons;

    2-3. A person who has failed to explain or deceptively explained subject to Article 27-3(3);

    3. A person who has failed to take technological and managerial measures as prescribed in Articles 28(1) i and vi including the case of application mutatis mutandis under Article 67);

    4. A person who has failed to destroy personal information in violation of Article 29(2) including the case of application mutatis mutandis under Article 67;

    5. A person who has failed to take necessary measures in violation of Articles 30(3), (4) and (6) including the case of application mutatis mutandis under Articles 30(7), 31(3) and 67);

    5-2. A person who has failed to notify the detailed statement on the use of the personal information in violation of the main sentence of Articles 30-2(1) including the case of application mutatis mutandis under Article 67;

    6. Deleted (May 28, 2014)

    6-2. A person who has failed to report the designation of the chief privacy officer in violation of Articles 45-3 (1);

    6-3. A person who has failed to obtain the DPMS certification in violation of Articles 47 (2);

    7. A person who has transmitted advertisement information made for profit in violation of Articles 50 (1) through (3);

    8. A person who has failed to indicate advertisement information or indicated fraudulently in violation of Articles 50 (4) or (5);                                                            

    9. A person who has got the addressee charged the cost in violation of Article 50 (6);

    9-2. A person who has failed to confirm the consent to receive in violation of Articles 50(8);

    10. A person who has installed the programs without obtaining the consent of users in violation of Article 50-5;

    11. A person who has posted advertisement information made for profit on the Internet homepage in violation of Article 50-7 (1) or (2); or

    12. A person who has not observed the order to take corrective measures delivered by the Minister of Science, ICT and Future Planning or the Korea Communications Commission pursuant to Article 64(4) in violation of this Act.

    (2) A person referred to in the following subparagraphs shall be subject to a fine for negligence not exceeding 20 million won: (Amended Mar. 22, 2016)

    1. A person who has failed to make public or notify the users of entrusting the handling of personal information in violation of Article 25(2) including the case of application mutatis mutandis under Article 67;

    1-2. A person who has re-entrusted to a third person without obtaining the consent of the initial information and communications service provider, etc. In violation of Article 25(7) including the case of application mutatis mutandis under Article 67;

    2. A person who has failed to notify the users of transferring the personal information in violation of Articles 26(1) and (2) including the case of application mutatis mutandis under Article 67;

    3. A person who has failed to designate the officer in charge of data protection in violation of Article 27(1) including the case of application mutatis mutandis under Article 67;

    4. A person who has failed to make public the personal information policy statement in violation of Article 27-2(1) including the case of application mutatis mutandis under Article 67; or

    5. A person who has provided the personal information of users abroad without disclosing all the items of subparagraphs of Article 63(3) or informing users of such fact in violation of the proviso of Article 63(2).

    (3) A person referred to in the following subparagraphs shall be subject to a fine for negligence not exceeding 10 million won: (Amended Apr. 5, 2011; Feb. 17, 2012; Jun. 22, 2015; Dec. 1, 2015; Mar. 22, 2016)

    1. Deleted (Jun. 22, 2015)

    2. Deleted (Jun. 22, 2015)

    2-2. A person who has conducted the identification operations without appropriate designation of the identification agency in violation of Article 23-3(1);

    2-3. A person who has failed to notify to users, or report to the Korea Communications Commission, the recess of the identification operations pursuant to Article 23-3(2) or the repeal of the identification operations pursuant to Article 23-3(3);

    2-4. A person who continues to conduct identification operations in spite of the suspension of identification operations or withdrawal of designation of the identification agency pursuant to Article 23-4(1);

    2-5. A person who fails to entrust processing personal information to a trustee in writing in violation of Article 25(6) including the case of application mutatis mutandis under Article 67;                                                                                                                         

    3. A person who has failed to designate the officer in charge of youth protection in violation of Article 42-3(1);

    4. A person who has failed to keep information in custody in violation of Article 43;

    5. A person who has failed to insure the information and communications facilities in violation of Article 46 (2);

    6. Deleted (Dec. 1, 2015);

    7. A person who has made fraudulent promotion on the result of authentication of the data protection management system in violation of Articles 47(9) and 47-3(3);

    8. Deleted

    9. Deleted

    10. A person who has failed to inform the user of software in violation of Article 47-4(3);

    11. A person who has not observed the order of correction pursuant to Article 48-2(4);

    12. A person who has obstructed, rejected or dodged the entry and inspection of business pursuant to Article 48-4 (4);

    12-2. A person who has failed to observe the order of the Minister of Science, ICT and Future Planning or the Korea Communications Commission in violation of Article 49-2(4).

    12-3. A person who has failed to inform to the addressee the result after processing prior consent, refusal to receive or withdrawal of consent in violation of Article 50(7).

    12-4. A person who fails to take necessary measure in violation of Article 50-4(4).

    13. A person who has used the name of KISA in violation of Article 52(6);

    14. A person who has failed to report the recess, closure or dissolution of business in violation of Article 53(4);

    15. A person who has failed to report the general terms and conditions of business in violation of Article 56(1);

    16. A person who has failed to take managerial and technological measures in violation of Article 57(2);

    17 through 21. Omitted 4)

    22. A person who has failed to submit related goods and documents, etc. pursuant to Article 64(1) or submitted false goods and documents, etc.;

    23. A person who has denied the access to data and request of data production pursuant to Article 64(2); or

    24. A person who has rejected, obstructed or dodged the entry and inspection of business pursuant to Article 64(3).

    (4) The fine for negligence stated in paragraphs (1) through (3) shall be imposed and collected by the Minister of Science, ICT and Future Planning or the Korea Communications Commission as prescribed by the Presidential Decree.

    (5) Any person who is dissatisfied with a fine for negligence imposed pursuant to paragraph (4) may file an objection with the Minister of Science, ICT and Future Planning or the Korea Communications Commission within 30 days from the day of notification of such disposition.

    (6) If any person who has been subject to a fine for negligence pursuant to paragraph (4) filed an objection pursuant to paragraph (5), the Minister of Science, ICT and Future Planning or the Korea Communications Commission shall promptly notify the competent court of the fact, and the competent court shall, upon receiving the notification thereof, put the case on trial in accordance with the Non-Contentious Litigation Procedure Act.

    (7) If any person fails to file an objection within the period under paragraph (5) and would not pay the fine for negligence, the fine for negligence in question shall be collected likewise by the disposition for recovery of the national taxes in arrears.

    ADDENDA

    (Act nº 6360, January 1, 2001)

    Article 1 (Enforcement Date)

    This Act shall enter into force on July 1, 2001.

    Articles 2 and 3. Omitted

    Article 4 (Transitional Measures Regarding Application of Penal Provisions)

    The application of the penal provisions to any act committed prior to the enforcement of this Act shall be governed by the previous provisions.

    Article 5. Omitted

    Article 6 (Relations to Other Acts and Regulations)

    If other acts and regulations cite the former “Act on the Promotion, etc. Of  Utilization of Information System” or its provisions at the time of enforcement of this Act and if there exist corresponding provisions thereto in this Act, this Act or the corresponding provisions in this Act shall be regarded as being cited.

    ADDENDA

    Omitted for the period from December 2001 to December 2008.

    ADDENDA

    (Act nº 9637, July 23, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 3 months elapse after its promulgation for the establishment of the Korea Internet and Security Agency.

    Articles 2 and 3 Omitted

    Article 4 (Amendment to Other Acts) Omitted

    Article 5 (Relations to Other Acts and Regulations)

    If other acts and regulations cite the former “Act on Promotion of Information and Communications Network Utilization and Data Protection, etc.” or its provisions at the time of enforcement of this Act and if there exist corresponding provisions thereto in this Act, this Act or the corresponding provisions in this Act shall be regarded as being cited.

    ADDENDUM

    (Act nº 10138, March 17, 2010)

    This Act shall enter into force on the day of promulgation.

    ADDENDA

    (Act nº 10165, September 23, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 6 months elapse after its promulgation.

    Articles 2 through 5 Omitted

    Article 6 (Amendment to Other Acts)

    (9) The part of the Act on Promotion of Information and Communications Network Utilization and Data Protection, etc. shall be amended as follows:

    Article 68 shall be deleted.

    Article 7 Omitted

    ADDENDA

    (Act nº 10465, September 30, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 6 months elapse after its promulgation (in line with the enforcement the Personal Information Protection Act).

    Articles 2 through 5 Omitted

    Article 6 (Amendment to Other Acts)

    (11) The part of the Act on Promotion of Information and Communications Network Utilization and Data Protection, etc. shall be amended as follows: (. . .) the Minister of Public Administration and Security, the Minister of Knowledge and Economy or the Korea Communications Commission shall read the Minister of Knowledge and Economy or the Korea Communications Commission; and the Minister of Public Administration and Security or the Korea Communications Commission shall read the Korea Communications Commission, respectively.

    Article 7 Omitted

    ADDENDA

    Omitted for the period from April 2011 to September 2011.

    ADDENDA

    (Act nº 11322, August 18, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 6 months elapse after its promulgation; provided, however, that the revised provisions of Articles 45, 45-2, 45-3, 46-3, 47, 47-2, 47-3, 47-5, 52(3) vii, 66 and 76(3) vi through ix shall enter into force one year after its promulgation.

    Article 2 (Transitional Measures Regarding the Restriction of Collection and Use of Resident Registration Number)

    (1) The information and communications service provider, who has provided membership application method by means of resident registration number at the time of enforcement of this Act, shall destroy its resident registration number data within two years therefrom; provided, however, that the same shall not apply to any of the subparagraphs of Article 23-2(1).

    (2) The failure to destroy the resident registration number data within the period prescribed in paragraph (1) shall be deemed in violation of the revised provision of Article 23-2(1).

    Article 3 (Transitional Measures Regarding the Repeal of Data Protection Safety Diagnosis)

    Omitted

    Article 4 (Transitional Measures Regarding the Authentication of Personal Information Protection Management System)

    Omitted

    Article 5 (Transitional Measures Regarding Fine for Negligence)

    The application of the fine for negligence to any act committed prior to the enforcement of this Act shall be governed by the previous provisions.

    ADDENDA

    (Act nº 11690, March 23, 2013)

    Article 1 (Enforcement Date)

    (1) This Act shall enter into force on the day of promulgation.5)

    (2) Omitted

    Articles 2 through 5 Omitted

    Article 6 (Amendment to Other Acts)

    (687) The part of the Act on Promotion of Information and Communications Network Utilization and Data Protection, etc. shall be amended as follows: (. . .) the Minister of Knowledge and Economy shall read the Minister of Science, ICT and Future Planning.

    ADDENDA

    (Act nº 12681, May 28, 2014)

    Article 1 (Enforcement Date)

    (1) This Act shall enter into force on the day when 6 months elapse after its promulgation; provided, however, that the revised provisions of Articles 44(3), 44-5 and 76(1) vi shall enter into force on the day of promulgation.

    Article 2 (Transitional Measures Regarding Penalty Surcharge and Penal Provisions)

    The application of the penalty surcharge and penal provisions to any act committed prior to the enforcement of this Act shall be governed by the previous provisions.

    ADDENDA

    (Act nº 13344, July 22, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 6 months elapse after its promulgation.

    Article 2 (Exemplary Application of Administrative Disposition)

    The amendments of Article 55(1) shall apply to the administrative disposition on the violations prior to the enforcement of this Act.

    ADDENDA

    (Act nº 13520, December 1, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 6 months elapse after its promulgation; provided, however, that the amendments of Articles 29(2) and (3) shall enter into force on the day of promulgation.

    Article 2 (Exemplary Application of Destruction, etc. of Personal Information)

    The amendments of Article 29(2) and (3) shall apply to the personal  information collected and transferred prior to the entry into force of the said amendments.

    Article 3 (Exemplary Application of Omission of DPMS Certification Examination)

    The amendments of Article 47(3) shall apply to the person who applied for the DPMS certification prior to the enforcement of this Act, and has undergone the said procedure.

    Article 4 (Transitional Measures Regarding DPMS Certification)

    The imposition of the fine for negligence on the violations prior to the enforcement of this Act shall be subject to the previous penal provisions.

    ADDENDA

    (Act nº 14080, March 22, 2016)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the day when 6 months elapse after its promulgation; provided, however, that the amendments of Articles 22(2), 76(1) i and 76(1) i-2 shall enter into force when one year elapses after promulgation; the amendments of Articles 32(2) and (3), 32-2(3) on July 25, 2016; the amendment of Article 52(4) on the day of promulgation, respectively.

    Article 2 (Exemplary Application of Damages)

    The amendments of Articles 32(2), 32(3) and 32-2(3) shall apply to the claim for damages arising out of the loss, theft, leakage, forgery, alteration of, or damage to, personal information after the entry into force of the same amendments.

    Article 3 (Transitional Measures Regarding Guide of Data Exposed to Violations)

    The information and communications service provider shall establish the facilities to send guide message to users pursuant to the amendment of Article 49-2(3) within six months after the promulgation of this Act.

    Article 4 (Transitional Measures Regarding Penal Provisions)

    In case of application of penal provisions against violations prior to the entry into force of this Act, the previous provisions shall apply.

    Article 5 (Amendment to Other Act)

    The part of the Internet Address Resources Act shall be amended as follows:

    Of the first sentence of Article 15(2), “Article 71 i” shall be “Article 71(1) i”, and “Article 76(1) i through v” shall be “Article 76(1) i through v (excluding Article 76(1) i-2)”

    ——————————————————–

    1) Translation of the provisions of Articles unrelated with data protection is Omitted

    2) The provisions regarding the Personal Information Dispute Mediation Committee were deleted on March 29, 2011 when the Personal Information Protection Act was promulgated.

    3) In this Act, the penalty surcharge means the administrative penalty.

    4) These are violators in relation to communications billing services.

    5) This amendment was in line with the enforcement of the newly amended Government Organization Act.

    29Oct/21

    Act nº 14080, Mar. 22, 2016. Internet Address Resources Act

    Internet Address Resources Act

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)      

    The purpose of this Act is to contribute to improving citizens’ lives and enhancing public welfare by facilitating utilization of information and communications networks, protecting personal information of people using information and communications services, and developing an environment in which people can utilize information and communications networks in a healthier and safer way.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 2 (Definitions)             

    (1)       The definitions of terms used in this Act shall be as follows: (Amended by Act nº 7139, Jan. 29, 2004; Act nº 8289, Jan. 26, 2007; Act nº 8778, Dec. 21, 2007; Act nº 9119, Jun. 13, 2008; Act nº 10166, Mar. 22, 2010; Act nº 12681, May 28, 2014; Act nº 13343 Jun. 22, 2015)

    1.         The term “information and communications network” means an information and communications system for collecting, processing, storing, searching, transmitting or receiving information by using telecommunications facilities and equipment prescribed in subparagraph 2 of Article 2 of the Telecommunications Business Act or computers and applied computer technology;

    2.         The term “information and communications services” means the telecommunications services prescribed in subparagraph 6 of Article 2 of the Telecommunications Business Act and services of providing information or intermediating the provision of information by using such telecommunications services;

    3.         The term “providers of information and communications services” means the telecommunications business operators prescribed in subparagraph 8 of Article 2 of the Telecommunications Business Act and other persons who provide information or intermediate to provide information commercially by utilizing services provided by a telecommunications business operator;

    4.         The term “users” means persons who use information and communications services rendered by providers of information and communications services;

    5.         The term “electronic document” means data prepared and transmitted, received, or stored electronically in a standardized document by a device capable of processing information, such as a computer;

    6.         The term “personal information” means the information pertaining to an individual alive, which contains information identifying a specific person with a name, a national identification number, or similar in the form of a code, letters, voice, sound, motion picture, or any other form (including information that makes it impracticable to identify a specific person by itself, but that enables to identify such person easily if combined with another information);

    7.         The term “intrusion” means an event resulting from an attack on an information and communications network or an information system related to such network by means of hacking, computer virus, logic bomb, mail bomb, denial of service, high-power electromagnetic wave, etc.;

    8.         Deleted.; (by Act Nº13343 Jun. 22, 2015)

    9.         The term “message board” means, regardless of its name, a computer program or a technical device with which users can publish information in the form of a code, letters, voice, sound, image, motion picture, or any other form purposely to disclose the information to the public by using an information and communications network;

    10.       The term “telecommunications billing services” means information and communications services to perform the following business activities:

    (a)        Business activities of charging and collecting prices for goods or services sold or provided by a third person (hereinafter referred to as “goods or services”) together with charges for the telecommunications services provided;

    (b)       Business activities of transmitting and receiving information of transactions electronically so that prices for goods or services sold or provided by a third person can be billed or collected together with charges for the telecommunications services provided by oneself, or settling, on behalf of another person, or intermediating payments for such prices;

    11.       The term “provider of telecommunications billing services” means a person who provides telecommunications billing services after being registered under Article 53;

    12.       The term “user of telecommunications billing services” means a person who purchases or uses goods or services by using telecommunications billing services rendered by a provider of telecommunications billing services;

    13.       The term “electronic transmission medium” means a medium transmitting codes, letters, voices, images or motion pictures to addressees in an electronic form, such as an electronic document, via information and communications networks.

    (2)       Except as otherwise provided for in paragraph (1), definitions of terms used in this Act shall be governed by the Framework Act on National Informatization. (Amended by Act nº 9119, Jun. 13, 2008; Act nº 11690, Mar. 23, 2013)

    Article 3 (Responsibilities of Providers and Users of Information and Communications Services)            

    (1)       Every provider of information and communications services shall contribute to protection of rights and interests of users and enhancement of users’ abilities to use information by protecting personal information of users and providing information and communications services in a sounder and safer way.

    (2)       Every user shall make efforts to help to establish a healthier information society.

    (3)       The Government may provide support to organizations composed of providers or users of information and communications services for their activities for protecting personal information and protecting juvenile in information and communications networks.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 4 (Preparation of Policy on Promotion of Utilization of Information and Communications Networks and Protection of Information)           

    (1)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall prepare policies to lay a foundation for an information society through the promotion of utilization of information and communications networks, the stable management and operation of such networks, the protection of personal information of users, and other related activities (hereinafter referred to as “promotion of utilization of information and communication networks, the protection of information, or other related matters”). (Amended by Act nº 10465, Mar. 29, 2011; Act nº 11690, Mar. 23, 2013)

    (2)       The policies under paragraph (1) shall contain descriptions of the following:

    1.         Development and dissemination of technology related to the information and communications networks;

    2.         Standardization of information and communications networks;

    3.         Promotion of the use of information and communications networks, including the development of content of information and applied service for information and communications networks under Article 11;

    4.         Facilitation of sharing information through information and communications networks;

    5.         Promotion of use of internet;

    6.         Protection of personal information collected, processed, stored and used via information and communications networks, and development and dissemination of technology related thereto;

    7.         Protection of juvenile in information and communications networks;

    8.         Enhancement of safety and reliability of information and communications networks;

    9.         Other matters necessary for the promotion of utilization of information and communications networks, the protection of information, or other related matters.

    (3)       When the Minister of Science, ICT and Future Planning or the Korea Communications Commission prepares the policy under paragraph (1), he or she shall ensure that the policy conforms to the basic plan for national informatization under Article 6 of the Framework Act on National Informatization. (Amended by Act nº 10465, Mar. 29, 2011; Act nº 11690, Mar. 23, 2013) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 5 (Relationship to Other Acts)           

    Except as otherwise provided for in any other Act, the promotion of use of information and communications networks, the protection of information, or other related matters shall be governed by the provisions of this Act: Provided, That this Act shall take precedence over the Electronic Financial Transaction Act, in cases where a plicable f this Act and a plicable f the Electronic Financial Transaction Act are plicable to the telecommunications billing service under Chapter VII.

    (Amended by Act nº 9119, Jun. 13, 2008)

    CHAPTER II.- PROMOTION OF UTILIZATION OF INFORMATION AND COMMUNICATIONS NETWORK

    Article 6 (Development of Technology)        

    (1)       The Minister of Science, ICT and Future Planning may engage the relevant research institute, as prescribed by Presidential Decree, to implement a project for research and development, technical cooperation, transfer of technology, technical guidance, or similar, in order to promote the development of technology and equipment related to information and communications networks. (Amended by Act nº 11690, Mar. 23, 2013)

    (2)       The Government may provide financial support to a research institute that implement a project for research and development or similar in accordance with paragraph (1) for all or part of the cost and expenses incurred in such project.

    (3)       Necessary matters concerning the disbursement and management of cost and expenses under paragraph (2) shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 7 (Management and Dissemination of Technology-Related Information)   

    (1)       The Minister of Science, ICT and Future Planning shall manage, systematically and comprehensively, the information pertaining to technology and equipment related to information and communications networks (hereafter referred to as “technology-related information” in this Article). (Amended by Act nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning may, if necessary for managing technology-related information systematically and comprehensively, request data relevant to technology-related information from the relevant administrative agency and a national or public research institute. In such cases, the head of such agency or institute shall, upon such request, comply with the request, unless any particular reason exists. (Amended by Act nº 11690, Mar. 23, 2013)

    (3)       The Minister of Science, ICT and Future Planning shall perform projects for dissemination of technology-related information, so that technology-related information can be used promptly and easily. (Amended by Act nº 11690, Mar. 23, 2013)

    (4)       Necessary matters concerning the scope of technology and equipment related to information and communications networks, which shall be disseminated pursuant to paragraph (3), shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 8 (Standardization and Certification of Information and Communications Networks)       

    (1)       The Minister of Science, ICT and Future Planning shall establish and provide a public notice the standards for information and communications networks in order to promote the use of information and communications networks, and may recommend providers of information and communication services or the persons who manufacture or supply products related to information and communications networks to comply with the standards: Provided, That the matters for which the Korean Industrial Standards under Article 12 of the Industrial Standardization Act have already been established shall comply with such standards. (Amended by Act nº 11690, Mar. 23, 2013)

    (2)       A person who manufactures or supplies a product related to information communications in conformity with the standards publicly notified pursuant to paragraph (1) may put on the product a mark stating that the product conforms to the standards, subject to the prior certification of the certifying institution under Article 9 (1).

    (3)       In cases where a product falls under the proviso to paragraph (1) and the certification under Article 15 of the Industrial Standardization Act has been already given to the product, the product shall be deemed to have been certified pursuant to paragraph (2).

    (4)       No person but those who hold the certification under paragraph (2) may put a mark verifying that his or her product conforms to the standards or put any similar mark, nor may sell a product with any similar mark or display such a product for the purpose of sale.

    (5)       The Minister of Science, ICT and Future Planning may order a person, who sells a product in violation of paragraph (4) or displays such a product for the purpose of sale to collect and recall the product or to obtain certification to put such a mark, or may take any other corrective measure as may be necessary. (Amended by Act nº 11690, Mar. 23, 2013)

    (6)       Necessary matters concerning the subject matters of the standardization, the method and procedure for such standardization, and a mark of certification under paragraphs (1) through (3), and the collection, recall, corrective measures, etc. under paragraph (5) shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 11690, Mar. 23, 2013) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 9 (Designation of Certifying Institutions)      

    (1)       The Minister of Science, ICT and Future Planning may designate an institution to certify products related to information and communications networks (hereinafter referred to as a “certifying institution”), which are manufactured or supplied by a person, and conforming to the standards publicly notified pursuant to the main sentence of Article 8 (1). (Amended by Act nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning may, if a certifying institution falls under any of the following subparagraphs, revoke the designation or give an order of business suspension for a prescribed period of time not exceeding six months: Provided, That the Minister of Science, ICT and Future Planning shall revoke the designation of a certifying institution without an exception, if it falls under subparagraph 1: (Amended by Act nº 11690, Mar. 23, 2013)

    1.         If the institution is designated by fraud or other improper means;

    2.         If the institution has not continued its certification service for one year or longer without a justifiable reason; and

    3.         If the institution fails to meet the standards for designation under paragraph (3).

    (3)       Necessary matters concerning the standards and procedures for designation under paragraph (1) and, the criteria for revocation of designation and for business suspension of a certifying institution under paragraph (2), and other related matters shall be prescribed by Ordinance of the Ministry of Science, ICT and Future Planning. (Amended by Act nº 11690, Mar. 23, 2013) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 10 (Support for Development of Content of Information)    

    With an aim of securing national competitiveness and enhancing the public interest, the Government may provide financial and technical support, or otherwise, to the persons who develop ontento f information distributed through information and communications networks.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 11 (Acceleration of Development of Applied Services for Information and Communications Networks)        

    (1)       The Government may provide financial and technical support, or otherwise as may be necessary, to any State agency, local government, public institution that develops and operates applied services for improving efficiency in processing its business affairs or automatizing or upgrading process of its business affairs by utilizing information and communications network (hereinafter referred to as “applied services for information and communications networks”).

    (2)       The Government may provide financial and technical support, or otherwise as may be necessary, to private sector with an aim of facilitating the development of applied services for information and communications networks by private sector and shall take the following measures for nurturing technical human resources necessary to develop applied services for information and communications networks:

    1.         Support for internet education conducted by schools in various levels and other educational institutions;

    2.         Extension of internet education for citizens;

    3.         Support for projects to cultivate technical human resources specializing in information and communications networks;

    4.         Establishment of and support for institutions to cultivate technical human resources specializing in information and communications networks;

    5.         Support for development and dissemination of educational programs for utilizing information and communications networks;

    6.         Support for establishment of the technical qualification system related to information and communications networks and support for supply of technical human resources specializing in information and communications networks on demand;

    7.         Other matters necessary for cultivate technical human resources related to information and communications networks.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 12 (Establishment of System for Sharing Information)        

    (1)       The Government may encourage to build up a system for sharing information through linked operation and standardization of information and communications networks or in any other way so that the networks can be made efficient use of.

    (2)       The Government may provide financial and technical support, or otherwise as may be necessary, to any person who builds up a system for sharing information under paragraph (1).

    (3)       Necessary matters concerning the encouragement and support under paragraphs (1) and (2) shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 13 (Projects for Promoting Use of Information and Communications Networks)   

    (1)       The Minister of Science, ICT and Future Planning may implement projects designed to promote efficient use and dissemination of technology, equipment, and applied services related to information and communications networks, as prescribed by Presidential Decree, in order to promote the use of information and communications networks in various areas of public service, local communities, industry, life, and social welfare and eliminate gaps in accessibility to information. (Amended by Act nº 11690, Mar. 23, 2013)

    (2)       The Government may provide financial and technical support, or otherwise as may be necessary, to the persons who participate in the projects under paragraph (1).

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 14 (Proliferation of Internet)  

    The Government shall induce public and private sectors to use internet facilities available in public and private sectors so that internet can be proliferated, expand the user base for internet through education and public relations activities on internet, and prepare and enforce a policy to eliminate gaps in accessibility to internet between localities, genders, and ages.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 15 (Improvement of Quality of Internet Service)      

    (1)       The Minister of Science, ICT and Future Planning shall prepare and enforce a policy to protect rights and interests of users of internet service and to ensure improvement of quality of internet service and stable availability of internet service. (Amended by Act nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning may, if deemed necessary for enforcing the policy under paragraph (1), prescribe and give a public notice of the standards for measuring and assessing the quality of internet service, hearing opinions of organizations of providers and users of information and communications services and others. (Amended by Act nº 11690, Mar. 23, 2013)

    (3)       Every provider of information and communications services may voluntarily assess the current status of quality of his or her own internet service in accordance with the standards under paragraph (2) and notify the results thereof to users.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Articles 16 and 17 Deleted. (by Act nº 7142, Jan. 29, 2004)             

    CHAPTER III.- DELETED

    Articles 18 through 21 Deleted. (by Act nº13343 Jun. 22, 2015)      

    CHAPTER IV.- PROTECTION OF PERSONAL INFORMATION

    SECTION 1.- Collection, Use, and Provision of Personal Information

    Article 22 (Consent to Collection and Use of Personal Information)           

    (1)       A provider of information and communications services shall, whenever he or she intends to collect personal information of a user purposely to use it, notify the user of the following matters and obtain consent from the user. The same shall apply in cases where he or she intends to change any of the following matters:

    1.         Purposes of collection and use of the personal information;

    2.         Items of personal information that he or she intends to collect;

    3.         Period of time during which he or she intends to possess and use the personal information.

    (2)       A provider of information and communications services may collect and use personal information of a user without the consent under paragraph (1) in any of the following cases:

    1.         If the personal information is necessary in fulfilling the contract for provision of information and communications services, but it is obviously difficult to get consent in an ordinary way due to any economic or technical reason;

    2.         If it is necessary in paying charges on the information and communication services rendered;

    3.         If a specific provision exists in this Act or any other Act otherwise.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 22-2 (Consent to Access Authority)   

    (1)       Where a provider of information and communications services needs authority to access (hereinafter referred to as “access authority”) information stored and functions installed in mobile devices of users in order to provide the relevant services, the provider shall inform users of the following matters so that users may clearly recognize such matters, and shall obtain consent of users:

    1.         In the case of access authority certainly necessary to provide the relevant services:

    (a)        Items of the information and functions for which access authority is necessary;

    (b)       Ground that access authority is necessary.

    2.         In the case of access authority not certainly necessary to provide the relevant services:

    (a)        Items of the information and functions for which access authority is necessary;

    (b)       Ground that access authority is necessary;

    (c)        Fact that users may give no consent to the permission on access authority.

    (2)       No provider of information and communications services shall refuse to provide the relevant services to users on the ground that the users give no consent to the establishment of access authority not certainly necessary to provide the relevant services.

    (3)       The persons manufacturing and providing a basic operating system (referring to an operating environment in which softwares installed in mobile devices can be run) of mobile devices, the manufacturers of mobile devices, and the persons manufacturing and providing a software for mobile devices shall take measures necessary for protecting users’ information, such as devising methods for users to give or revoke consent to access authority where the provider of information and communications services intends to access the information stored and functions installed in mobile devices.

    (4)       The Scope of, and methods for consenting to, access authority referred to in paragraph (1), measures necessary for protecting users’ information referred to in paragraph (3), and other necessary matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 14080, Mar. 22, 2016)

    Article 23 (Restrictions on Collection of Personal Information)      

    (1)       No provider of information and communications services may collect personal information regarding any person, such as his or her ideology, beliefs, family relationship status, kinship and matrimonial relationship, educational background, and medical history, which is anticipated to otherwise infringe seriously upon any right, interest, or privacy of the person: Provided, That he or she may collect such personal information within the minimum scope necessary where he or she obtains consent of the user under Article 22 (1) or such personal information is specially permitted as personal information that may be collected pursuant to any other Act. (Amended by Act nº 12681, May 28, 2014)

    (2)       Where a provider of information and communications services collects personal information of a user, he or she shall only collect personal information within the minimum scope necessary to provide information and communications services. (Amended by Act nº 12681, May 28, 2014)

    (3)       No provider of information and communications services shall refuse to provide such services on the ground that a user does not provide personal information other than the minimum personal information required. In such cases, the minimum personal information required means information that is specifically required to perform essential functions of the relevant services. (Inserted by Act nº 12681, May 28, 2014) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 23-2 (Restriction on Use of Resident Registration Numbers)           

    (1)       Other than the cases falling under any of the following subparagraphs, a provider of information and communications services may not collect/use users’ resident registration numbers: (Amended by Act nº 10560, Apr. 5, 2011)

    1.         Where the provider is designated as the identification service agency pursuant to Article 23-3;

    2.         Where collection/use of users’ resident registration numbers is authorized by statutes;

    3.         Where the Korea Communications Commission makes a public announcement for the provider of information and communications services who inevitably collects/uses users’ resident registration numbers for his or her business purposes.

    (2)       Even where the collection/use of users’ resident registration numbers is authorized pursuant to paragraph (1) 2 or 3, an identification method without using the users’ resident registration numbers (hereinafter referred to as “alternative means”) shall be provided.

    (Amended by Act nº 11322, Feb. 17, 2012)

    Article 23-3 (Designation of Identification Service Agency, etc.)    

    (1)       The Korea Communications Commission may, after reviewing each item of the following subparagraphs, designate a person as an identification service agency who is deemed competent to safely and reliably perform the affairs of development, provision and administration of the alternative means (hereinafter referred to as “identification service”):

    1.         A plan for physical/technological/administrative measures in order to secure safety of the identification service;

    2.         Technological/financial capability necessary for performing the identification service;

    3.         Appropriateness of the scale of facilities relevant to the identification service.

    (2)       When the identification service agency intends to suspend all or part of identification service, it shall determine and notify a suspension period to the users no later than 30 days prior to the intended date of suspension and shall report the same to the Korea Communications Commission. In this case, the suspension period shall not exceed six months.

    (3)       When the identification service agency intends to discontinue the identification affairs, it shall notify the intention to the users no later than 60 days prior to the intended date of discontinuation and shall report the same to the Korea Communications Commission.

    (4)       Necessary matters concerning the criteria for each standard subject to the review and the designation procedure of identification service agency under paragraph (1), suspension or discontinuation of the identification affairs under paragraphs (2) and (3) and other matters shall be determined by Presidential Decree.

    (Article Inserted by Act nº 10560, Apr. 5, 2011)

    Article 23-4 (Suspension of Identification Service and Cancelation of Designation of Identification Service Agency)           

    (1)       When the identification service agency falls under any of the following subparagraphs, the Korea Communications Commission may determine the period of suspension within six months and order suspension of all or part of the identification service, or cancel designation of identification service agency: Provided, That in cases where falling under subparagraph 1 or 2, the Korea Communications Commission shall cancel designation of identification service agency:

    1.         Where an identification service agency is designated by falsity or other fraudulent methods;

    2.         Where a person who has received the order for suspension of identification service fails to suspend the affairs in violation of the order;

    3.         Where a person fails to start the identification service within six months from the date of being designated, or suspend the service continuously for six months or more;

    4.         Where it becomes not suitable for the standard of designation pursuant to Article 23-3 (4).

    (2)       Standards and procedures for any dispositions pursuant to paragraph (1) and other necessary matters shall be determined by Presidential Decree.

    (Article Inserted by Act nº 10560, Apr. 5, 2011)

    Article 24 (Restriction on Use of Personal Information)       

    No provider of information and communications services may use personal information collected in accordance with Article 22 and the proviso to Article 23 (1) for any purpose other than the purpose consented by the relevant user or the purpose specified in any subparagraph of Article 22 (2).

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 24-2 (Consent to Provision of Personal Information)           

    (1)       Every provider of information and communications services shall, whenever he or she intends to furnish a third party with personal information of a user, notify the user of all the following matters and obtain consent from the user, except as provided for in Article 22 (2) 2 and 3. The same shall apply in cases where there is a change in any of the following matters:

    1.         The person to whom the personal information is furnished;

    2.         Purposes of use of the personal information of the person to whom the personal information is furnished;

    3.         Items of the personal information furnished;

    4.         Period of time during which the person to whom the personal information is furnished will possess and use the personal information.

    (2)       A person who received any personal information of a user from a provider of information and communications services in accordance with paragraph (1) shall not furnish the personal information to a third party or use it for any purpose other than the purpose originally agreed upon at the time when the information was furnished without consent of the user or a specific provision otherwise specified in any other Act.

    (3)       When the provider, etc. of information and communications services under Article 25 (1) is given the consent to furnishing user’s information under paragraph (1) and to the entrustment of management of personal information under Article 25 (1), he or she shall obtain such consent apart from the consent to collection/use of personal information pursuant to Article 22, and shall not refuse to provide its service on the ground of a user’s refusal of aforementioned consent. (Inserted by Act nº 10560, Apr. 5, 2011; Act nº 14080, Mar. 22, 2016)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 25 (Entrustment of Management of Personal Information)  

    (1)       A provider of information and communications services or a person who received personal information of users from the provider of information and communications services in accordance with Article 24-2 (1) (hereinafter referred to as a “provider of information and communications services or similar”) shall, if he or she intends to entrust a third party with handling of business affairs related to personal information (hereinafter referred to as “entrustment of management of personal information”) so as to collect, create, connect, link, record, save, hold, process, edit, search, print, correct, recover, use, provide, disclose, destruct or treat similarly users’ personal information (hereinafter referred to as “management”), notify the users of all the following matters and shall obtain consent of the users. The same shall apply in cases where there exists a change in any of the following matters: (Amended by Act Nº 14080, Mar. 22, 2016)

    1.         Any person to whom the management of personal information is entrusted (hereinafter referred to as a “trustee”);

    2.         Details of the business affairs subject to the entrustment of management of personal information.

    (2)       A provider of information and communications services or similar may omit the procedures for notification and consent under paragraph (1) for entrusting the management of personal information, where the personal information is required to comply with the contract on the provision of the information and communications services and enhance convenience of users and where all the matters prescribed in subparagraphs of paragraph (1) have been disclosed to the public under Article 27-2 (1) or notified to users in a manner prescribed by Presidential Decree, such as by electronic mails. The same shall apply where there exists a change in a matter prescribed in any subparagraph of paragraph (1). (Amended by Act nº 12681, May 28, 2014; Act nº 14080, Mar. 22, 2016)

    (3)       A provider of information and communications services or similar shall, when he or she entrusts the management of personal information to a third party, define the scope of purposes, in advance, within which the trustee is allowed to manage personal information of users, and the trustee shall not manage the personal information of users beyond the scope of purposes. (Amended by Act nº 14080, Mar. 22, 2016)

    (4)       A provider of information and communications services or similar shall control, supervise and educate the trustee to ensure that the trustee does not violate any provision of this Chapter. (Amended by Act nº 14080, Mar. 22, 2016)

    (5)       If the trustee violates any provision of this Chapter in connection with the business affairs related to the entrustment of management of personal information and inflicts damages upon a user, the trustee shall be deemed an employee of the provider of information and communications services or similar in determining liability for such damages. (Amended by Act nº 14080, Mar. 22, 2016)

    (6)       A provider, etc. of information and communications shall, when entrusting a trustee with management of personal information, do so in writing. (Inserted by Act nº 14080, Mar. 22, 2016)

    (7)       A trustee may re-entrust a third party with affairs entrusted pursuant to paragraph (1) only where the trustee obtains consent from the provider, etc. of information and communications services. (Inserted by Act nº 14080, Mar. 22, 2016)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 26 (Transfer of Personal Information Following Transfer of Business)       

    (1)       Where a provider of information and communications services or similar transfers personal information of users to a third party due to transfer of business, in whole or in part, merger, or any similar cause, he or she shall notify the users of all the following matters by publishing them on its internet homepage or by electronic mail or any other means specified by Presidential Decree:

    1.         The fact that the personal information is to be transferred;

    2.         The name (referring to the name of a legal corporation, if the person is a legal corporation; hereafter the same shall apply in this Article), address, and telephone number of a person to whom the personal information is to be transferred (hereinafter referred to as a “transferee of business or similar”), and other contact information of the person;

    3.         The methods and procedures available for revocation of consent, where a user does not want his or her personal information transferred to a third party.

    (2)       If any personal information is transferred to a transferee of business, etc., he or she shall immediately notify the users of such fact and his or her name, domicile, telephone number and other contact details according to methods prescribed by Presidential Decree, such as the posting of such information on the Internet homepage or email. (Amended by Act nº 12681, May 28, 2014)

    (3)       A transferee of business or similar may use or furnish personal information only within the scope of purposes originally defined for which any provider of information and communications services or similar uses or furnishes the personal information of users: Provided, That the same shall not apply where he or she separately obtains consent from users.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 26-2 (Method Applicable in Obtaining Consent)      

    The method plicable in obtaining the consent under Article 22 (1), the proviso to Article 23 (1), Article 24-2 (1) or (2), Article 25 (1), the proviso to Article 26 (3), or Article 63 (2) (hereinafter referred to as “consent to collection, use, provision, and similar disposition of personal information”) shall be prescribed by Presidential Decree, considering media for collection of personal information, peculiarities of each type of business, number of users, and other related factors.

    (Amended by Act nº 9119, Jun. 13, 2008)

    SECTION 2.- MANAGEMENT, DESTRUCTION, ETC. OF PERSONAL INFORMATION

    Article 27 (Designation of Person Responsible for Management of Personal Information)            

    (1)       Every provider of information and communications services or similar shall designate a person responsible for protection of personal information so that he or she protects the personal information of users and process complaints from users in connection with the personal information: Provided, That a provider of information and communications services or similar may, if he or she falls under the criteria prescribed by Presidential Decree for the number of employees, number of users, and other related matters, omit such designation. (Amended by Act nº 14080, Mar. 22, 2016)

    (2)       If a provider of information and communications services or similar does not designate a person responsible for protection of personal information under the proviso to paragraph (1), the business owner or representative of the provider or similar shall be the person responsible for protection of personal information. (Amended by Act nº 14080, Mar. 22, 2016)

    (3)       The qualification requirements for a person responsible for protection of personal information and other matters necessary for designation of such person shall be prescribed by Presidential Decree. (Amended by Act nº 14080, Mar. 22, 2016)

    (4)       Where a person responsible for protection of personal information becomes aware of a fact of violation of this Act or other relevant statute, he or she shall take measures for improvement immediately, and if necessary, report the measures for improvement to the business owner or representative of the provider, etc. of information and communications services: Provided, That the provisions concerning reporting of measures for improvement shall not apply where the business owner or representative is the person responsible for protection of personal information pursuant to paragraph (2). (Inserted by Act nº 14080, Mar. 22, 2016) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 27-2 (Public Disclosure of Policy on Managing Personal Information)       

    (1)       Every provider of information and communications services or similar shall, when he or she manages personal information of users, establish and disclose its policy on managing personal information to the public in a manner specified by Presidential Decree so that users become aware of the policy easily at any time. (Amended by Act nº 14080, Mar. 22, 2016)

    (2)       The policy on managing personal information under paragraph (1) shall include descriptions of all the following matters: (Amended by Act nº 11322, Feb. 17, 2012; Act nº 14080, Mar. 22, 2016)

    1.         Purposes of collection and use of personal information, items of personal information collected, and methods of collection;

    2.         The name of the person (referring to the name of a legal entity, if the person is a legal entity) to whom personal information is furnished, if the personal information is furnished to a third party, purposes of use of the person to whom the personal information is furnished, and items of the personal information furnished;

    3.         The period of time during which the personal information is possessed and used, and the procedure and method for destruction of the personal information (including the ground for preservation and items of preserved personal information, if it is required to preserve the personal information in accordance with the proviso to the part above subparagraphs of Article 29 (1));

    4.         Details of business affairs subject to the entrustment of management of personal information and the trustee (they shall be included in the policy on management, only where this subparagraph is applicable);

    5.         Rights of users and their legal representatives and methods for the exercise of such rights;

    6.         Matters concerning installation, operation, and denial of a device that collect personal information automatically, such as an information file for access to internet;

    7.         The name and address of the person responsible for protection of personal information or the department responsible for business affairs related to the protection of personal information and processing related complaints and other contact information of such person or department.

    (3)       Every provider of information and communications services or similar shall, when he or she revises the policy on managing personal information under paragraph (1), give public notice of the reasons for and details of such revision without delay in a manner specified by Presidential Decree, and take measures to make users aware of the details of the revision easily at any time. (Amended by Act nº 14080, Mar. 22, 2016) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 27-3 (Notification/Reports on Leakage of Personal Information)    

    (1)       When a provider of information and communications services or similar becomes aware of the loss, theft, or leakage of personal information (hereinafter referred to as “leakages, etc.”), he or she shall immediately inform the relevant users of all the following matters and report to the Korea Communications Commission or the Korea Internet Security Agency, and shall not notify or report them after 24 hours have elapsed since he or she became aware of such fact without any justifiable cause: Provided, That other measures in lieu of the aforementioned notification may be taken as prescribed by Presidential Decree where users’ contact information is unknown or other good cause exists: (Amended by Act nº 12681, May 28, 2014; Act nº 14080, Mar. 22, 2016)

    1.         Each item of the personal information leaked;

    2.         Point of time the personal information is leaked;

    3.         Measures available for users to take;

    4.         Countermeasures to be taken by a provider of information and communications services or similar;

    5.         Responsible departments and contact information to be used for the users who seek consultations, etc., to submit their application for such consultations.

    (2)       The Korea Internet Security Agency in receipt of a report under paragraph (1) shall immediately inform the Korea Communications Commission of such fact. (Inserted by Act nº 12681, May 28, 2014)

    (3)       A provider of information and communications services, etc. shall explain just cause under the main sentence of and proviso to paragraph (1) to the Korea Communications Commission. (Inserted by Act nº 12681, May 28, 2014)

    (4)       Matters necessary for methods and procedures, etc., for the notification and report pursuant to paragraph (1) shall be prescribed by Presidential Decree.

    (5)       A provider of information and communications services, etc. shall prepare countermeasures against the leakages, etc. of personal information, and shall seek measures to minimize any damage thereof. (Amended by Act nº 14080, Mar. 22, 2016) (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 28 (Protective Measures for Personal Information)   

    (1)       Every provider of information and communications services or similar shall, when he or she manages personal information of users, take the following technical and administrative measures in accordance with the guidelines prescribed by Presidential Decree to prevent loss, theft, leakage, forgery or alteration of or damage to personal information and secure the safety of personal information: (Amended by Act nº 14080, Mar. 22, 2016)

    1.         Establishment and implementation of an internal control plan for managing personal information in a safe way;

    2.         Installation and operation of an access control device, such as a system for blocking intrusion to cut off illegal access to personal information;

    3.         Measures for preventing fabrication and alteration of access records;

    4.         Measures for security by using encryption technology and other methods for safe storage and transmission of personal information;

    5.         Measures for preventing intrusion of computer viruses, including installation and operation of vaccine software;

    6.         Other protective measures necessary for securing safety of personal information.

    (2)       Every provider of information and communications services or similar shall restrict the persons who may manage users’ personal information to the minimum extent. (Amended by Act nº 14080, Mar. 22, 2016) (Amended by Act nº 9119, Jun. 13, 2008)

    Article 28-2 (Prohibition on Disclosure of Personal Information)    

    (1)       A person who manages or has ever manages personal information of users shall not damage, intrude on, or disclosed personal information that he or she learned in the course of performing his or her duty. (Amended by Act nº 14080, Mar. 22, 2016)

    (2)       No one shall be knowingly provided with any disclosed personal information for profit or any unlawful purpose.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 29 (Destruction of Personal Information)      

    (1)       A provider of information and communications services or similar shall, if any of the followings occurs, destroy the relevant personal information without delay so that such personal information cannot be recovered or reproduced: Provided, That the same shall not apply where it is required to preserve the personal information in accordance with any other Act: (Amended by Act nº 11322, Feb. 17, 2012; Act nº 12681, May 28, 2014)

    1.         When the purpose of collection and use of personal information with consent obtained in accordance with Article 22 (1), the proviso to Article 23 (1), or Article 24-2 (1) or (2) or the purpose under any subparagraph of Article 22 (2) has been achieved;

    2.         When a period during which it is allowed to possess and use personal information with consent obtained in accordance with Article 22 (1), the proviso to Article 23 (1), or Article 24-2 (1) or (2) ends;

    3.         When a period during which it is allowed to possess and use personal information in accordance with Article 27-2 (2) 3 ends, if the personal information has been collected and used without consent of users under Article 22 (2);

    4.         When the business is permanently closed down.

    (2)       The provider of information and communications services or similar shall, in an effort to protect personal information of the users who do not use information and communications services for a period of one year, take necessary measures, such as destruction of personal information, as prescribed by Presidential Decree: Provided, That the period is otherwise provided either in accordance with other statue or at the request of the users, such provisions shall apply.(Inserted by Act nº 11322, Feb. 17, 2012; Act nº 13520, Dec. 1, 2015)

    (3)       The provider, etc. of information and communications services shall notify , until 30 days before expiration of the period under paragraph (2), the users of the matters prescribed by Presidential Decree such as the fact that the personal information will be destroyed, the expiration date of the period and items of personal information subject to destruction, in a manner prescribed by Presidential Decree such as by email. (Inserted by Act nº 13520, Dec. 1, 2015)

    (Amended by Act nº 9119, Jun. 13, 2008)

    SECTION 3.- RIGHTS OF USERS

    Article 30 (Rights of Users)    

    (1)       Every user may, at any time, revoke his or her consent given to a provider of information and communications services or similar to allow the provider to collect, use, or furnish his or her personal information.

    (2)       Every user may request a provider of information and communications services or similar to allow him or her to peruse, or to furnish with any of the following subparagraphs, and may also require the provider to correct an error, if there is any error:

    1.         Personal information of the user, which the provider of information and communications services or similar possesses;

    2.         Details of which the provider of information and communications services or similar has used personal information of the user or furnished it to a third party;

    3.         Details of which the user has given a consent to he provider of information and communications services or similar to collect, use, or furnish his or her personal information.

    (3)       If a user withdraws his or her consent pursuant to paragraph (1), a provider of information and communications services, etc. shall immediately take necessary measures, such as the destruction of collected personal information in an irrecoverable or in unreproducible way. (Amended by Act nº 12681, May 28, 2014)

    (4)       A provider of information and communications services or similar shall, in receipt of a request to peruse or furnish matters in accordance with paragraph (2), take necessary measures without delay.

    (5)       A provider of information and communications services or similar shall, in receipt of a request for correction of an error in accordance with paragraph (2), correct the error, notify the user of the reasons why it is unable to correct the error, if it is the case, or take any other necessary measures, and may not use the relevant personal information or furnish it to a third party until he or she completes taking such measures: Provided, That he or she may furnish the personal information to a third party or use the information, if requested to furnish the personal information pursuant to any other Act.

    (6)       A provider of information and communications services or similar shall make how to revoke consent under paragraph (1), how to request to peruse personal information or furnish such information under paragraph (2), and how to request correction of an error, easier than how to collect personal information.

    (7)       Paragraphs (1) through (6) shall apply mutatis mutandis to a transferee of business or similar. In such cases, “provider of information and communications services or similar” shall be deemed “transferee of business or similar.”

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 30-2 (Notification of Details of Use of Personal Information)        

    (1)       A provider of information and communications services or similar falling under the standards determined by Presidential Decree shall periodically notify the users of the details of using personal information of such users (including details of the provision under Article 24-2 and of the entrustment of management of personal information under Article 25) in accordance with Article 22 and the proviso to Article 23 (1): Provided, That this shall not apply in cases where the provider of information and communications services or similar does not collect any contact information or other personal information that can be notified to users. (Amended by Act nº 14080, Mar. 22, 2016)

    (2)       Types of personal information to be notified to users, frequency and method of notifying the information pursuant to paragraph (1) and other matters necessary for notification of details of using such personal information shall be determined Presidential Decree.

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 31 (Rights of Legal Representative)  

    (1)       A provider of information and communications services or similar shall, if he or she desires to obtain consent of a child of less than 14 years on collection, use, furnishing, and other disposition of personal information, obtain consent from his or her legal representative. In such cases, the provider of information and communications services may demand the child to furnish minimum information, such as the legal representative’s name, necessary to obtain consent from the legal representative.

    (2)       A legal representative may exercise rights of a user under Article 30 (1) and (2) with respect to personal information of the relevant child.

    (3)       Article 30 (3) through (5) shall apply to a legal representative’s revocation of consent under paragraph (2) and his or her demand for perusal or correction of an error.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 32 (Compensation)      

    (1)       Where a user suffers any damage caused by a violation of any provision of this Chapter by a provider, etc. of information and communications services, he or she may claim compensation for damage against the said provider, etc. of information and communications services. In this case, that provider of information and communications services or similar shall not be exonerated from liability if failing to prove that there is neither intention nor gross negligence on the part of the said provider. (Amended by Act nº 14080, Mar. 22, 2016)

    (2)       Where any damage occurs to a user because personal information has been lost, stolen, leaked, forged, altered, or damaged due to intention or gross negligence on the part of the provider, etc. of information and communications services or similar, a court may determine the amount of compensation to the extent not exceeding three times the said damage: Provided, That this shall not apply where the provider, etc. of information and communications services proves that there is neither intention nor gross negligence on the part of the said provider. (Inserted by Act nº 14080, Mar. 22, 2016)

    (3)       Where a court determines the amount of compensation referred to in paragraph (2), it shall take the following matters into account: (Inserted by Act nº 14080, Mar. 22, 2016)

    1.         Degree of acknowledging the intention or the likeliness of the occurrence of damage;

    2.         Scale of damage sustained due to the relevant violation;

    3.         Economic benefits acquired by the provider, etc. of information and communications services by committing the relevant violation;

    4.         Fines and penalty surcharges due to violations;

    5.         Period, number, etc. of violations;

    6.         Status of assets of the provider, etc. of information and communications services;

    7.         Degree of efforts of the provider, etc. of information and communications services to withdraw the relevant personal information after the user’s personal information has been lost, stolen or leaked;

    8.         Degree of efforts of the provider, etc. of information and communications services to remedy damage to the user.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 32-2 (Claim for Statutory Damages)  

    (1)       Where a user falls under each of the following subparagraphs, he or she may claim resonable compensation not exceeding three million won as damages, in lieu of claiming damages under Article 32 from a provider of information and communications services, etc. within a period prescribed by Presidential Decree. In such cases, the relevant provider of information and communications services, etc. cannot be exempt from responsibility unless he or she proves that there is no intention or negligence: (Amended by Act nº 14080, Mar. 22, 2016)

    1.         Where the provider of information and communications services, etc. violates any of the provisions of this Chapter by intention or negligence;

    2.         Where personal information is lost, stolen, leaked, forged, altered or damaged.

    (2)       Where a claim for compensation under paragraph (1) is filed, a court may acknowledge a reasonable amount of loss within the limits prescribed in paragraph (1), taking into account the relevance of all pleadings and the outcomes of examination of evidence.

    (3)       A user claiming compensation for damage pursuant to Article 32 may change such claim to the claim referred to in paragraph (1) before the argument of the inquisition is closed. (Inserted by Act nº 14080, Mar. 22, 2016)

    (Article Inserted by Act nº 12681, May 28, 2014)

    Article 32-3 (Deletion and Blocking of Exposed Personal Information)      

    (1)       A provider, etc. of information and communications services shall ensure that users’ personal information such as resident registration numbers, account numbers and credit cards information is not exposed to the public through information and communications networks.

    (2)       Upon the request of the Korea Communications Commission or the Korea Internet and Security Agency, a provider, etc. of information and communications services shall take necessary measures such as deleting and blocking exposed personal information referred to in paragraph (1).

    (Article Inserted by Act nº 14080, Mar. 22, 2016)

    SECTION 4 Deleted.

    Articles 32-3 through 40 Deleted (by Act nº 10465, Mar. 29, 2011)            

    CHAPTER V.- PROTECTION OF USERS IN INFORMATION AND COMMUNICATIONS NETWORKS

    Article 41 (Preparation of Policy on Protection of Juvenile)             

    (1)       The Korea Communications Commission shall prepare a policy on the following measures to protect juvenile from unwholesome information for juvenile (hereinafter referred to as “unwholesome information for juvenile”), such as information of obscenities and violence, circulated through information and communications networks:

    1.         Development and dissemination of content-screening software;

    2.         Development and dissemination of technology for protection of juvenile;

    3.         Education and public relations activities for protection of juvenile;

    4.         Other matters specified by Presidential Decree for protection of juvenile.

    (2)       The Korea Communications Commission may, in an effort to implement the policy under paragraph (1), support activities conducted by the Korea Communications Standards Commission under Article 18 of the Establishment and Operation of the Korea Communications Commission Act (hereinafter referred to as the “Communications Standards Commission”), organizations of providers or users of information and communications services, and other relevant specialized institutions for protection of juvenile.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 42 (Labeling of Media Unwholesome for Juvenile)  

    A person who provides information to the general public purposely to make it public through telecommunications services rendered by a telecommunications business operator (hereinafter referred to as “information provider”) and who intends to provide any unwholesome medium for juvenile as defined in subparagraph 3 of Article 2 of the Juvenile Protection Act among the media under subparagraph 2 (e) of Article 2 of the aforesaid Act shall put a label indicating that the information is an unwholesome medium for juvenile by the labeling method specified by Presidential Decree. (Amended by Act nº 11048, Sep. 15, 2011)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 42-2 (Prohibition on Advertisement of Unwholesome Media for Juvenile)             

    No one may transmit, to a juvenile under subparagraph 1 of Article 2 of the Juvenile Protection Act, any information containing an advertisement of an unwholesome medium for juvenile as defined in subparagraph 3 of Article 2 of the aforesaid Act among the media under subparagraph 2 (e) of Article 2 of the aforesaid Act in the form of code, letter, voice, sound, image, or motion picture through an information and communications network or display such medium to the general public without taking any measure to restrict access by a juvenile. (Amended by Act nº 11048, Sep. 15, 2011)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 42-3 (Designation of Person Responsible for Protection of Juvenile)          

    (1)       A provider of information and communications services whose the average number of users per day, sales, and other related factors fall under the criteria prescribed by Presidential Decree shall designate a person responsible for protection of juvenile to keep juvenile from unwholesome information to juvenile in the information and communication network.

    (2)       The person responsible for protection of juvenile shall be chosen from among executive officers of the relevant business operator or the persons in a position equivalent to the head of a department responsible for business affairs related to protection of juvenile.

    (3)       The person responsible for protection of juvenile shall block and control unwholesome information for juvenile in the information and communications network, and shall perform business affairs for protection of juvenile, including establishment of a plan for protection of juvenile from unwholesome information for juvenile.

    (4)       Necessary matters concerning the designation of a person responsible for protection of juvenile under paragraph (1) shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 43 (Duty of Provider of Visual or Sound Information to Keep Information)          

    (1)       An information provider specified by Presidential Decree among those who engage in a business of providing unwholesome media for juvenile as defined in subparagraph 3 of Article 2 of the Juvenile Protection Act among the media under subparagraph 2 (e) of Article 2 of the aforesaid Act in a way to make it impossible to store or record the unwholesome media in a user’s computer shall keep relevant information. (Amended by Act nº 11048, Sep. 15, 2011)

    (2)       The period of time during which an information provider under paragraph (1) is obligated to keep relevant information shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44 (Protection of Rights in Information and Communications Network)    

    (1)       No user may circulate any information violative of other person’s rights, including invasion of privacy and defamation, through an information and communications network.

    (2)       Every provider of information and communications services shall make efforts to prevent any information under paragraph (1) from being circulated through the information and communications network operated and managed by it.

    (3)       The Korea Communications Commission may prepare a policy on technological development, education, public relations activities, and other activities to prevent violation of other persons’ rights by information circulated through information and communications networks, including invasion of privacy and defamation, and may recommend providers of information and communications services to adopt the policy. (Amended by Act nº 11690, Mar. 23, 2013; Act nº 12681, May 28, 2014)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44-2 (Request for Deletion of Information)   

    (1)       Where information provided through an information and communications network purposely to be made public intrudes on other persons’ privacy, defames other persons, or violates other persons’ right otherwise, the victim of such violation may request the provider of information and communications services who managed the information to delete the information or publish a rebuttable statement (hereinafter referred to as “deletion or rebuttal”), presenting explanatory materials supporting the alleged violation. (Amended by Act nº 14080, Mar. 22, 2016)

    (2)       A provider of information and communications services shall, upon receiving a request for deletion or rebuttal of the information under paragraph (1), delete the information, take a temporary measure, or any other necessary measure, and shall notify the applicant and the publisher of the information immediately. In such cases, the provider of information and communications services shall make it known to users that he or she has taken necessary measures by posting a public notification on the relevant message board or in any other way.

    (3)       A provider of information and communications services shall, if there is any unwholesome medium for juvenile published in violation of the labeling method under Article 42 in the information and communications network operated and managed by him or her or if a content advertising any unwholesome medium for juvenile is displayed in such network without any measures to restrict access by juvenile under Article 42-2, delete such content without delay.

    (4)       A provider of information and communications services may, if it is difficult to judge whether information violates any right or it is anticipated that there will probably be a dispute between interested parties, take a measure to block access to the information temporarily (hereinafter referred to as “temporary measures”), irrespective of a request for deletion of the information under paragraph (1). In such cases, the period of time for the temporary measure shall not exceed 30 days.

    (5)       Every provider of information and communications services shall clearly state the details, procedure, and other matters concerning necessary measures in its standardized agreement in advance.

    (6)       A provider of information and communications services may, if he or she takes necessary measures under paragraph (2) for the informations circulated through the information and communications network operated and managed by it, have its liability for damages caused by such informations mitigated or discharged.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44-3 (Discretionary Temporary Measures)    

    (1)       A provider of information and communications services may, if it finds that information circulated through the information and communications network operated and managed by him or her intrudes on someone’s privacy, defames someone, or violates someone’s rights, take temporary measures at its discretion.

    (2)       The latter part of Article 44-2 (2), the latter part of Article 44-2 (4), and Article 44-2 (5) shall apply mutatis mutandis to the temporary measures under paragraph (1).

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44-4 (Self Regulation)            

    An organization of providers of information and communications services may establish and implement a code of conduct applicable to providers of information and communications services with an objective to protect users and render information and communications services in a safer and more reliable way.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44-5 (Identity Verification of Users of Message Boards)     

    (1)       Any of the following persons shall, if he or she intends to install and operate a message board, take necessary measures, as prescribed by Presidential Decree (hereinafter referred to as “measures for identity verification”), including preparation of methods and procedures for verifying identity of users of the message board:

    1.         A State agency, local government, public enterprise, quasi-government agency under Article 5 (3) of the Act on the Management of Public Institutions, or a local government-invested public corporation or a local government public corporation under the Local Public Enterprises Act (hereinafter referred to as “public institution”);

    2.         Deleted. (by Act nº 12681, May 28, 2014)

    (2)       Deleted. (by Act nº 12681, May 28, 2014)

    (3)       The Government shall prepare a policy to develop a safer and more reliable system to verify identity of users under paragraph (1).

    (4)       A public institution, etc. may have its liability for damages caused by fraudulent use of a user’s identity by a third party mitigated or discharged, if it has taken the measures for identity verification under paragraph (1) with care as a good manager. (Amended by Act nº 12681, May 28, 2014)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44-6 (Claim to Furnish User’s Information)  

    (1)       A person who alleges that information published or circulated by a specific user has intruded on his or her privacy, defamed him or her, or violated his or her rights may file a claim with the defamation dispute conciliation division under Article 44-10 to demand the relevant provider of information and communications services to furnish the information he or she possesses about the alleged offender (referring to the minimum information specified by Presidential Decree, including the name and address, necessary for filing a civil or criminal complaint), along with materials supporting his or her allegation of the violation, in order to file a civil or criminal complaint against the alleged offender.

    (2)       The defamation dispute conciliation division shall, upon receiving a claim under paragraph (1), make a decision on whether to furnish information, hearing the opinion of the relevant user, unless it is impossible to contact the relevant user or there is any particular reason otherwise.

    (3)       A person who receives information about the relevant user under paragraph (1) may not use the information for any purpose other than the purpose of filing a civil or criminal complaint.

    (4)       Other matters necessary for the contents of a claim to furnish information of a user and the procedure therefor shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 44-7 (Prohibition on Circulation of Unlawful Information)  

    (1)       No one may circulate information falling under any of the following subparagraphs through an information and communications network: (Amended by Act nº 11048, Sep. 15, 2011; Act nº 14080, Mar. 22, 2016)

    1.         Information with an obscene content distributed, sold, rented, or displayed openly in the form of code, words, sound, image, or motion picture;

    2.         Information with a content that defames other persons by divulging a fact, false fact, openly and purposely to disparage the person’s reputation;

    3.         Information with a content that arouses fear or apprehension by reaching other persons repeatedly in the form of code, words, sound, image, or motion picture;

    4.         Information with a content that mutilates, destroys, alters, or forges an information and communications system, data, a program, or similar or that interferes with the operation of such system, data, program, or similar without a justifiable ground;

    5.         Information with a content that falls within an unwholesome medium for juvenile under the Juvenile Protection Act and that is provided for profit without fulfilling the duties and obligations under relevant statutes, including the duty to verify the opposite party’s age and the duty of labeling;

    6.         Information with a content that falls within speculative activities prohibited by statutes;

    6-2.      Information regarding content of transactions of personal information in violation of this Act or other statutes concerning the protection of personal information;

    7.         Information with a content that divulges a secret classified by statutes or any other State secret;

    8.         Information with a content that commits an activity prohibited by the National Security Act;

    9.         Other information with a content that attempts, aids, or abets to commit a crime.

    (2)       The Korea Communications Commission may order a provider of information and communications services or a manager or an operator of a message board to reject, suspend, or restrict management of information under paragraph (1) 1 through 6 and 6-2, subject to deliberation by the Communications Standards Commission: Provided, That if the information falls under paragraph (1) 2 or 3, the Commission shall not issue an order to reject, suspend, or restrict such management against the intention specifically manifested by the victim of the relevant information. (Amended by Act nº 14080, Mar. 22, 2016)

    (3)       The Korea Communications Commission shall order a provider of information and communications services or a manager or an operator of a message board to reject, suspend, or restrict management of information under paragraph (1) 7 through 9, if the information falls under all the following subparagraphs: (Amended by Act nº 14080, Mar. 22, 2016)

    1.         There was a request from the head of a related central administrative agency;

    2.         A demand for correction was made pursuant to subparagraph 4 of Article 21 of the Act on the Establishment and Operation of Korea Communications Commission after deliberation by the Communications Standards Commission within seven days from the date on which the request under subparagraph 1 had been received;

    3.         The provider of information and communications services or the manager or operator of the message board has not complied with the demand for correction.

    (4)       The Korea Communications Commission shall give an opportunity to the provider of information and communications services or the manager, operator, or relevant user of the message board to whom an order is to be issued pursuant to paragraph (2) or (3) to present his or her opinion in advance: Provided, That the Commission may not give an opportunity to present an opinion, if a case falls under any of the following subparagraphs:

    1.         If it is necessary to make an urgent disposition for public safety and welfare;

    2.         If there is a ground specified by Presidential Decree to believe that it is obviously impracticable or evidently unnecessary to hear an opinion;

    3.         If a person concerned clearly manifests his or her intent to give up the opportunity to present his or her opinion.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Articles 44-8 and 44-9 Deleted. (by Act Nº 8867, Feb. 29, 2008)     

    Article 44-10 (Defamation Dispute Conciliation Division)   

    (1)       The Communications Standards Commission shall have the defamation dispute conciliation division comprised of five members or less for efficient conciliation of disputes arising in connection with information that intrudes other persons’ privacy, defames other persons, or violates other persons’ rights including a member or more holding qualification of attorney-at-law.

    (2)       The members of the defamation dispute conciliation division shall be commissioned by the chairperson of the Communications Standards Commission with consent of the Communications Standards Commission.

    (3)       Articles 33-2 (2) and 35 through 39 shall apply mutatis mutandis to the procedure for conciliation of disputes by the defamation dispute conciliation division. In such cases, “Dispute Mediation Committee” shall be construed as “Communications Standards Commission,” and “disputes over personal information” as “disputes arising in connection with information that intrudes privacy, defames other persons, or violates other persons’ rights among information circulated through information and communications networks.”

    (4)       Necessary matters concerning the installation and operation of the defamation dispute conciliation division and the conciliation of disputes, and other related matters shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    CHAPTER VI.- SECURING OF STABILITY OF INFORMATION AND COMMUNICATIONS NETWORK

    Article 45 (Securing of Stability of Information and Communications Network)   

    (1)       Every provider of information and communications services shall take protective measures to secure the reliability of the information and security of the information and communications networks.

    (2)       The Minister of Science, ICT and Future Planning may prescribe and provide a public notice of guidelines for protective measures for information (hereinafter referred to as “information protection guidelines”), specifying details of the protective measures under paragraph (1), and may recommend providers of information and communications services to observe the guidelines. (Amended by Act nº 11322, Feb. 17, 2012; Act nº 11690, Mar. 23, 2013)

    (3)       The information protection guidelines shall contain descriptions of the following matters: (Amended by Act nº 14080, Mar. 22, 2016)

    1.         Technical and physical protective measures, including installation and operation of an information protection system, for a person with no due authorization to prevent or counteract access to invasion upon an information and communications network;

    2.         Technical protective measures for preventing unlawful leakage, forgery. alteration, or deletion of information;

    3.         Technical and physical protective measures for securing the state of enabling continuous use of information and communications networks;

    4.         Administrative protective measures for stabilization of information and communications networks and protection of information, including securing human resources, organization, and expenses and establishing related plans.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 45-2 (Preliminary Examination on Information Protection)  

    (1)       A provider of information and communications services shall, if he or she intends to newly establish an information and communications network or to provide information and communications services, take the matters regarding information protection into account in planning or designing thereof.

    (2)       The Minister of Science, ICT and Future Planning may recommend a person who intends to implement the information and communications services or the telecommunications businesses falling under any of the following subparagraphs to take protective measures in accordance with the preliminary examination standards as determined by Presidential Decree: (Amended by Act nº 11690, Mar. 23, 2013)

    1.         The information and communications services or telecommunications businesses as determined by Presidential Decree, for which authorization or permission by the Minister of Science, ICT and Future Planning should be obtained or registration with or report to the Korea Communications Commission should be made pursuant to this Act or other Acts and subordinate statutes;

    2.         The information and communications services or the telecommunications businesses as determined by Presidential Decree and financed by the Minister of Science, ICT and Future Planning for all or part of the business expenses thereof.

    (3)       Standards, methods, procedures, fees for the preliminary examination on protection of information pursuant to paragraph (2) and other necessary matters shall be determined by Presidential Decree.

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 45-3 (Designation, etc. of Chief Information Protection Officers)   

    (1)       A provider of information and communications services may designate a chief information protection officer at a level of an executive officer for security of information and communications system, etc. and for safe administration of information: Provided, That in cases of any provider of information and communications services whose number of employees, number of users, etc. meet standards prescribed by Presidential Decree, he or she shall report its designation of the chief information protection officer to the Minister of Science, ICT and Future Planning. (Amended by Act nº 12681, May 28, 2014)

    (2)       Methods and procedures for reporting under paragraph (1) shall be prescribed by Presidential Decree. (Inserted by Act nº 12681, May 28, 2014)

    (3)       A chief information protection officer shall be responsible for the following matters:

    1.         Establishment and administration/operation of an administrative system for information protection;

    2.         Analysis/evaluation and improvement of the weakness of information protection;

    3.         Prevention of and response to an intrusion;

    4.         Preparation of preliminary measures for information protection and designing/realization, etc. of security measures;

    5.         Review of a preliminary security for information protection;

    6.         Review of the encryption of an important information and the suitability of a security server;

    7.         Other matters, such as taking necessary measures for protection of information pursuant to this Act or other relevant statutes.

    (4)       A provider of information and communications services may establish and operate an association of chief information protection officers comprised of chief information protection officers prescribed in paragraph (1) in order to jointly perform prevention/response in cases of intrusion, sharing necessary information and other joint programs prescribed by Presidential Decree.

    (5)       The Government may provide financial support to the association of chief information protection officers under paragraph (4) for expenses, in whole or in part, incurred in conducting its activities. (Amended by Act nº 12681, May 28, 2014; Act nº 13343, Jun. 22, 2015)

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 46 (Protection of Clustered Information and Communications Facilities)   

    (1)       Every business operator who operates and manages clustered information and communications facilities to render information and communications services on behalf of another person (hereinafter referred to as “business operator of clustered information and communications facilities”) shall take protective measures as prescribed by Presidential Decree to pérate the information and communications facilities stably.

    (2)       Every business operator of clustered information and communications facilities shall purchase insurance policies as prescribed by Presidential Decree to cover damages that may be caused by destruction or damage of the clustered information and communications facilities or any other trouble in operation.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 46-2 (Emergency Countermeasures of Business Operators of Clustered Information and Communications Facilities)     

    (1)       A business operator of clustered information and communications facilities may, if any of the following events occurs, suspend rendering relevant services, in whole or in part, as stipulated in the standardized user agreement: (Amended by Act nº 9637, Apr. 22, 2009; Act nº 11690, Mar. 23, 2013)

    1.         If it is anticipated that an abnormality found in the information system of a person who uses clustered information and communications facilities (hereinafter referred to as “user of facilities”) will probably cause a serious trouble to the information system of other users of facilities or clustered information and communications facilities;

    2.         If it is anticipated that an intrusion from outside will probably cause a serious trouble to the clustered information and communications facilities;

    3.         If there occurs a serious intrusion and the Minister of Science, ICT and Future Planning or the Korea Internet and Security Agency requests to suspend the services.

    (2)       A business operator of clustered information and communications facilities shall, when it suspends its services in accordance with paragraph (1), immediately notify users of facilities of the suspension of services, specifically stating the reasons for the suspension, the date, time, period, and details of the suspension, and other related matters.

    (3)       A business operator of clustered information and communications facilities shall, once the event that caused suspension of services terminates, resume its services immediately.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 46-3 Deleted. (by Act nº 11322, Feb. 17, 2012)         

    Article 47 (Certification of Information Security Management System)      

    (1)       With respect to the person who has established and operates a comprehensive management system, including administrative and technical protective measures, for securing stability and reliability of an information and communications network (hereinafter referred to as “information security management system”), the Minister of Science, ICT and Future Planning may certify as to whether he or she meets the standards under paragraph (4). (Amended by Act nº 11322, Feb. 17, 2012; Act nº 11690, Mar. 23, 2013; Act nº 13520, Dec. 1, 2015)

    (2)       A telecommunication business operator under subparagraph 8 of Article 2 of the Telecommunications Business Act, or any of the following persons, who provides or intermediates the provision of information by using telecommunications services of any telecommunication business operator, shall receive the certification under paragraph (1): (Inserted by Act nº 11322, Feb. 17, 2012; Act nº 13520, Dec. 1, 2015)

    1.         A person who renders information and communications services as prescribed by Presidential Decree as a person who has obtained the permission pursuant to Article 6 (1) of the Telecommunications Business Act;

    2.         A business operator of clustered information and communications facilities;

    3.         A person falling under the standards determined by Presidential Decree, whose annual sales or tax revenue, etc. is not less than 150 billion won, whose sales of the sector of information and communications services of the previous year is not less than 10 billion won, or whose average number of daily users over the past three months is not less than one million.

    (3)       Where a person required to be certified in accordance with paragraph (2) is certified for conformity with international standards for information protection or takes measures for information protection, as prescribed by Ordinance of the Ministry of Science, ICT and Future Planning, the Minister of Science, ICT and Future Planning may omit part of certification examination under paragraph (1). In this case, the detailed scope of omitted certification examination shall be determined and publicly notified by the Minister of Science, ICT and Future Planning. (Inserted by Act nº 13520, Dec. 1, 2015)

    (4)       The Minister of Science, ICT and Future Planning may, for the purpose of certification for information security management system under paragraph (1), determine and give a public notice of other necessary matters such as certification criteria, including countermeasures for managerial, technical and physical protection. (Amended by Act nº 11322, Feb. 17, 2012; Act nº 11690, Mar.23. 2013; Act nº 13520, Dec. 1, 2015)

    (5)       The period of validity of the certification for an information security management system under paragraph (1) shall be three years: Provided, That upon the receipt of any rating for information protection and management in accordance with Article 47-5 (1), the certification under paragraph (1) shall be deemed effective during the period of validity of such rating. Act Nº (Inserted by Act nº 11322, Feb. 17, 2012; Act nº 13520, Dec. 1, 2015)

    (6)       The Minister of Science, ICT and Future Planning may have the Korea Internet Security Agency or any institution (hereinafter referred to as a “certification body of information security management systems”) designated by the Minister of Science, ICT and Future Planning perform the following affairs related to the certification under paragraphs (1) and (2): (Inserted by Act nº 11322, Feb. 17, 2012; Act nº 11690, Mar.23. 2013; Act Nº Act nº 13520, Dec. 1, 2015)

    1.         Examination (hereinafter referred to as an “examination of certification” of verifying whether the information security management systems by established by an applicant for certification meets the standards for certification under paragraph (4);

    2.         Review on the results of examination of certification;

    3.         Issuance and management of written certifications;

    4.         Ex post facto management of granted certifications;

    5.         Fosterage and qualification management of the certification examiners of information security management systems;

    6.         Other affairs concerning the certification for information security management systems.

    (7)       The Minister of Science, ICT and Future Planning may, if necessary for the efficient conduct of affairs related to certification, designate an institution for performing affairs related to examination of certification (hereinafter referred to as an “examination institution for information security management systems”). (Inserted by Act nº 13520, Dec. 1, 2015)

    (8)       The Korea Internet Security Agency, a certification body for information security management systems, and an examination institution for information security management systems shall, in order to enhance the efficiency of information security management systems, perform ex post facto management at least once a year and notify the Minister of Science, ICT and Future Planning of the results thereof. (Inserted by Act nº 11322, Feb. 17, 2012; Act nº 11690, Mar.23. 2013; Act nº 13520, Dec. 1, 2015)

    (9)       A person who has received certification of an information security management systems in accordance with paragraphs (1) and (2) may indicate or publicize the content of the certification, as prescribed by Presidential Decree. (Amended by Act nº 11322, Feb. 17, 2012; Act nº 13520, Dec. 1, 2015)

    (10)     The Minister of Science, ICT and Future Planning may revoke the certification where any of the following grounds are found: Provided, That for the cases falling under subparagraph 1, the Minister of Science, ICT and Future Planning shall revoke the certification: (Inserted by Act nº 11322, Feb. 17, 2012; Act nº 11690, Mar.23. 2013; Act nº 13520, Dec. 1, 2015)

    1.         Having received the certification of an information security management systems in a false or otherwise unjustifiable manner;

    2.         Falling short of the standards for certification under paragraph (4);

    3.         Refusing or obstructing the ex post facto management under paragraph (8).

    (11)     Methods and procedures for, and scope and fees of, certification under paragraphs (1) and (2), methods and procedures for ex post facto management under paragraph (8), methods and procedures for revoking certification under paragraph (10), and other necessary mattes shall be prescribed by Presidential Decree. (Amended by Act Nº 11322, Feb. 17, 2012; Nº 13520, Dec. 1, 2015)

    (12)     Standards and procedures for, and period of validity, the designation of a certification body for information security management systems and an examination institution for information security management systems shall be prescribed by Presidential Decree. (Amended by Act Nº 11322, Feb. 17, 2012; ct Nº 13520, Dec. 1, 2015)

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 47-2 (Revocation of Designation of Certification Body of and Examination Institution for Information Security Management Systems)         

    (1)       If a legal entity or organization designated as a certification body for information security management system or an examination institution for information security management systems pursuant to Article 47 falls under any of the following subparagraphs, the Minister of Science, ICT and Future Planning may revoke the designation or order it to suspend the relevant business, entirely or partially, for a prescribed period of time not exceeding one year: Provided, That the designation shall be revoked without an exception, if the legal entity or organization falls under subparagraph 1 or 2: (Amended by Act Nº 11322, Feb. 17, 2012; Act Nº 11690, Mar. 23, 2013; Act Nº 13520, Dec. 1, 2015)

    1.         If it has obtained the designation of a certification body or an examination institution for information security management systems by deceit or in any other fraudulent mean;

    2.         If it has granted or examined certification during a business suspension period;

    3.         If it has not performed certification or examination of certification without justifiable grounds;

    4.         If it has performed certification or examination of certification, in violation of Article 47 (11);

    5.         If it no longer meets the criteria for designation under Article 47 (12).

    (2)       Matters necessary for the revocation of designation and suspension of business under paragraph (1) and other related matters shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 47-3 (Certification of Personal Information Management System)             

    (1)       With respect to a person who established and is operating a comprehensive management system including administrative, technical and physical protective measures in order to systematically and continuously perform the activities for protection of personal information in the information and communications network (hereinafter referred to as “personal information management system”), the Korea Communications Commission may certify as to whether the management system meets the standards pursuant to paragraph (2).

    (2)       The Korea Communications Commission may, for the certification of personal information management system pursuant to paragraph (1), determine and give a public notice of standards for the certification including administrative, technical and physical protective measures and other necessary matters.

    (3)       Concerning the institutions which implement the personal information management system and the follow-up management, etc., Article 47 (6) through (12) shall apply mutatis mutandis thereto. In this case, the term “paragraphs (1) and (2)” shall be deemed “paragraph (1)”. (Amended by Act Nº 13520, Dec. 1, 2015)

    (4)       Concerning the revocation of designation, etc. of a certifying institution of the personal information management system, Article 47-2 shall apply mutatis mutandis thereto.

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 47-4 (Protection of User Information)           

    (1)       The Government may prescribe guidelines necessary for protection of information of users to recommend users to observe the guidelines, and may take necessary measures for preventing intrusions and precluding spread of intrusions, such as inspection of weaknesses and technical support.

    (2)       A major provider of information and communications services may, if it is foreseen that a serious problem is likely to occur in the information system of a user who uses the services, the information and communications network, or similar provided by it because of an occurrence of a serious intrusion on its information and communications network, request the user to take necessary protective measures as stipulated by the standard user agreement, and may place a temporary restriction on access to the relevant information and communications network if the user does not perform as requested.

    (3)       A software business operator under Article 2 of the Software Industry Promotion Act shall, when he or she produced a program that improves weaknesses in security, notify the Korea Internet and Security Agency of its production, and shall notify users of the software of the production at least twice within one month from the date of production. (Amended by Act Nº 9637, Apr. 22, 2009)

    (4)       Specific details that shall be stipulated by the standard user agreement with respect to the request for protective measures under paragraph (2) and other related matters shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 47-5 (Management Rating for Information Protection)       

    (1)       A person who has obtained the certification for information security management system pursuant to Article 47 is entitled to receive the management rating for information protection from the Minister of Science, ICT and Future Planning in order to enhance level of a corporate’s management of its comprehensive information protection and to secure users’ reliability on information protection services. (Amended by Act Nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning may authorize the Korea Internet and Security Agency to perform the affairs of rating under paragraph (1). (Amended by Act Nº 11690, Mar. 23, 2013)

    (3)       A person who has obtained the management rating for information protection pursuant to paragraph (1) may indicate the obtained rating or advertise details of such rating as determined by Presidential Decree.

    (4)       In cases where the Minister of Science, ICT and Future Planning finds causes falling under any of the following subparagraphs, the Minister may revoke the aforementioned rating: Provided, That for the cases falling under subparagraph 1, the Minister shall revoke the granted rating: (Amended by Act Nº 11690, Mar. 23, 2013; Act Nº 13520, Dec. 1, 2015)

    1.         Where a person obtained the management rating for information protection, by fraud or other improper means;

    2.         Where falling short of the standards of rating pursuant to paragraph (5).

    (5)       Standards of review in assigning the rating pursuant to paragraph (1), the method, procedure and fee of assigning the rating, the effective term of rating, the method/procedure of revocation of rating pursuant to paragraph (4) and other necessary matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 48 (Prohibition on Intrusive Acts, etc. on Information and Communications Network)     

    (1)       No one shall intrude on an information and communications network without a rightful authority for access or beyond a permitted authority for access.

    (2)       No one shall mutilate, destroy, alter, or forge an information and communications system, data, program, or similar without a justifiable grounds, nor shall convey or spread a program that is likely to interrupt operation of such system, data, program, or similar (hereinafter referred to as “malicious program”).

    (3)       No one shall cause a trouble to an information and communications network to interfere with stable operation of the information and communications network in purpose by sending a large amount of signals or data, letting the network process an illegitimate order or doing the similar actions.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 48-2 (Countermeasures, etc. against Intrusion Cases)          

    (1)       The Minister of Science, ICT and Future Planning shall perform the following business affairs to take proper countermeasures against intrusion, and may have the Korea Internet and Security Agency perform all or part of the business affairs, if necessary to do so: (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    1.         Collection and spread of information about intrusion;

    2.         Precaution and warning of intrusion;

    3.         Emergency measures against intrusion;

    4.         Other countermeasures against intrusion prescribed by Presidential Decree.

    (2)       A person falling under any of the following subparagraphs shall furnish the Minister of Science, ICT and Future Planning or the Korea Internet and Security Agency with the information related to intrusion cases, including statistics by type of intrusion cases, statistics of traffic of the relevant information and communications network, and statistics of use by access channel, as prescribed by Presidential Decree: (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    1.         A major provider of information and communications services;

    2.         A business operator of clustered information and communications facilities;

    3.         Other persons specified by Presidential Decree among those who operate an information and communications network.

    (3)       The Korea Internet and Security Agency shall analyze the information under paragraph (2) and report it to the Minister of Science, ICT and Future Planning. (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    (4)       If a business operator who is obligated to furnish the information in accordance with paragraph (2) refuses to do without a justifiable ground or furnishes false information, the Minister of Science, ICT and Future Planning may order the business operator to make a correction within a reasonable period of time prescribed by the Commission. (Amended by Act Nº 11690, Mar. 23, 2013)

    (5)       The Minister of Science, ICT and Future Planning or the Korea Internet and Security Agency shall use the information furnished in accordance with paragraph (2) properly within the extent necessary for taking countermeasures against intrusion. (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    (6)       The Minister of Science, ICT and Future Planning or the Korea Internet and Security Agency may, if necessary to take countermeasures against intrusion, request a person falling under any subparagraph of paragraph (2) to provide human resources for assistance. (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 48-3 (Report, etc. on Intrusion Cases)          

    (1)       A person falling under any of the following subparagraphs shall, where he or she discovers an intrusion, immediately report it to the Minister of Science, ICT and Future Planning or the Korea Internet and Security Agency. In such cases, a notice given in accordance with Article 13 (1) of the Act on the Protection of Information and Communications Infrastructure shall be deemed a report under the foregoing sentence: (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    1.         A provider of information and communications services;

    2.         A business operator of clustered information and communications facilities.

    (2)       The Minister of Science, ICT and Future Planning or the Korea Internet and Security Agency shall, upon receiving a report of intrusion under paragraph (1) or being aware of an intrusion, take necessary measures under subparagraphs of Article 48-2 (1). (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11690, Mar. 23, 2013)

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 48-4 (Analysis, etc. of Cause of Intrusion Cases)     

    (1)       A person who operates an information and communications network, including a provider of information and communications services, shall analyze causes of intrusion and keep damage from intrusion at bay, whenever an intrusion occurs.

    (2)       The Minister of Science, ICT and Future Planning may, when a serious intrusion occurs in an information and communications network operated by a provider of information and communications services, organize a private-public joint investigation team having expertise in protection of information to conduct an analysis on causes of such intrusion in order to preclude spread of damage, take countermeasures against the intrusion, recover from damage and prevent recurrence of such intrusion. (Amended by Act Nº 11690, Mar. 23, 2013)

    (3)       The Minister of Science, ICT and Future Planning may, if deemed necessary for analyzing causes of an intrusion pursuant to paragraph (2), order a provider of information and communications services and a business operator of clustered information and communications facilities to preserve relevant data, such as access records of the relevant information and communications network. (Amended by Act Nº 11690, Mar. 23, 2013)

    (4)       The Minister of Science, ICT and Future Planning may, if deemed necessary for analyzing causes of an intrusion, demand a provider of information and communications services and a business operator of clustered information and communications facilities to submit data related to the intrusion, and also may order the private-public joint investigation team under paragraph (2) to enter into a place of business of a person involved to conduct investigation into the causes of the intrusion: Provided, That submission of data corresponding to access log data under subparagraph 11 of Article 2 of the Protection of Communications Secrets Act shall be governed by the provisions of the aforesaid Act. (Amended by Act Nº 11690, Mar. 23, 2013)

    (5)       The Minister of Science, ICT and Future Planning or the private-public joint investigation team shall not use the information learned through the data submitted and the investigation conducted in accordance with paragraph (4) for any purpose other than analysis of causes of the intrusion and preparation of countermeasures, and shall destroy it immediately after the analysis of causes is completed. (Amended by Act Nº 11690, Mar. 23, 2013)

    (6)       Necessary matters concerning the organization of the private-public joint investigation team under paragraph (2) and the protection of data submitted in relation to an intrusion in accordance with paragraph (4), and other related matters shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 49 (Protection of Secrets, etc.)          

    No one shall mutilate another person’s information processed, stored, or transmitted through an information and communications network, nor shall infringe, misappropriate, or divulge another person’s secret.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 49-2 (Prohibition on Collection, etc. of Personal Information by Acts of Deceit)  

    (1)       No one shall collect another person’s information through an information and communications network by an act of deceit, nor shall entice another person by an act of deceit to furnish information.

    (2)       A provider of information and communications services shall, whenever it discovers a violation of paragraph (1), immediately report it to the Minister of Science, Information and Communications Technology (ICT) and Future Planning, the Korea Communications Commission, or the Korea Internet and Security Agency. (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 14080, Mar. 22, 2016)

    (3)       The Minister of Science, Information and Communications Technology (ICT) and Future Planning, the Korea Communications Commission, or the Korea Internet and Security Agency shall, upon receiving a report under paragraph (2) or becoming aware of a violation of paragraph (1), take the following measures as may be necessary: (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 14080, Mar. 22, 2016)

    1.         Collection and diffusion of the information related to the violation;

    2.         Precaution and warning of similar damage;

    3.         Emergency Measures to prevent damage and spread thereof, including requesting the relevant provider of information and communications services to block access paths or to inform the users of the fact that they are exposed to an act of violating paragraph (1).

    (4)       The Minister of Science, Information and Communications Technology (ICT) and Future Planning, or the Korea Communications Commission may, for taking measures referred to in paragraph (3) 3, order providers of information and communications services to take necessary measures, such as sharing among themselves information regarding acts of deceit through information and communications networks. (Inserted by Act nº 14080, Mar. 22, 2016)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 50 (Restrictions on Transmission of Advertising Information for Profit)    

    (1)       If any person intends to transmit advertising information for profit by using an electronic transmission medium, he or she shall obtain explicit prior consent from an addressee to whom such information is addressed: Provided, That where he or she falls under any of the following, he or she need not obtain prior consent: (Amended by Act Nº 14080, Mar. 22, 2016)

    1.         Where a person who has directly collected contact details from the addressee in his or her dealings of goods, etc. intends to transmit advertising information for profit on the same kinds of goods, etc. as those he or she manages and has dealt with the addressee within a period prescribed by Presidential Decree;

    2.         Where a telemarketer under the Act on Door-to-Door Sales, Etc. informs prospective customers of the collection source of their personal information by voice, and solicits them to buy products or services by means of telephone call.

    (2)       Notwithstanding paragraph (1), where an addressee expresses his or her intention to refuse to receive information or revokes his or her prior consent, no person who intends to transmit advertising information for profit by using an electronic transmission medium shall transmit advertising information for profit.

    (3)       Notwithstanding paragraph (1), a person who intends to transmit advertising information for profit by using an electronic transmission medium during the time between 9:00 pm and 8:00 am of the following day shall obtain express prior consent from the addressee of such information: Provided, That in cases of media prescribed by Presidential Decree, the forgoing shall not apply thereto.

    (4)       A person who transmits advertising information for profit by using an electronic transmission medium shall specify the following matters in advertising information, as prescribed by Presidential Decree:

    1.         The name and contact details of a sender;

    2.         Matters concerning measures and methods by which an addressee can easily express his or her intention to refuse to receive information or to revoke his or her consent to receive information.

    (5)       No person who transmits advertising information for profit by using an electronic transmission medium shall take any of the following measures:

    1.         Measures to avoid or interfere with an addressee’s refusal to receive or revocation of his or her consent to receive advertising information;

    2.         Measures to automatically generate an addressee’s contact information, such as telephone numbers and email addresses, by combining figures, codes, or letters;

    3.         Measures to automatically register telephone numbers or email addresses for the purpose of transmitting advertising information for profit;

    4.         Various measures to hide the identity of the sender of advertising information or the source from which advertising is transmitted;

    5.         Various measures to induce an addressee to reply by deceiving him or her for the purpose of transmitting advertising information for profit.

    (6)       A person who transmits advertising information for profit by using an electronic transmission medium shall take necessary measures so that an addressee does not incur any cost, such as telephone charges, when the addressee refuses to receive or revokes his or her consent to receive such information, as prescribed by Presidential Decree.

    (7)       Where an addressee gives prior consent under paragraph (1) or expresses his or her intention to refuse to receive or revoke his or her consent to receive advertising information under paragraph (2), a person who intends to transmit advertising information for profit by using an electronic transmission medium shall inform the relevant addressee of the outcomes of measures taken in relation to consent to receive, refusal to receive, or revocation of consent to receive advertising information, as prescribed by Presidential Decree.

    (8)       A person who obtains consent to receive advertising information pursuant to paragraph (1) or (3) shall regularly verify whether an addressee of advertising information consents to receive such information, as prescribed by Presidential Decree.

    (This Article Wholly Amended by Act Nº 12681, May 28, 2014)

     Article 50-2 Deleted. (by Act Nº 12681, May 28, 2014)      

     Article 50-3 (Commissioned Transmission of Advertising Information for Profit)            

    (1)       A person who has commissioned a third party to transmit advertising information for profit on his or her behalf shall control and oversee the person to whom the transmission was commissioned to ensure that the person does not violate Article 50. (Amended by Act Nº 12681, May 28, 2014)

    (2)       A person to whom transmission of advertising information for profit has been commissioned under paragraph (1) shall be deemed an employee of the person who has commissioned the transmission of information in determining liability for damages caused by a violation of an Act related to such business affair.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 50-4 (Restrictions on Rendering Information Transmission Services)        

    (1)       A provider of information and communications services may take measures to refuse rendering corresponding services in any of the following cases:

    1.         If transmission or reception of advertising information hinders or is likely to hinder rendering the services;

    2.         If a user does not want to receive advertising information;

    3.         Deleted. (by Act Nº 12681, May 28, 2014)

    (2)       If a provider of information and communications services intends to take any measure for refusal under paragraph (1) or (4), he or she shall include matters concerning the refusal of the relevant services in the terms and conditions of a contract for use of information and communications services which he or she concludes with the user of such services. (Amended by Act Nº 12681, May 28, 2014)

    (3)       A provider of information and communications services shall inform interested persons, such as users to whom such services are provided, of the fact that he or she has taken measures for refusal under paragraph (1) or (4): Provided, That where it is impracticable to inform them of the fact in advance, he or she shall inform them of the fact immediately after it has taken measures for refusal. (Amended by Act Nº 12681, May 28, 2014)

    (4)       Where services which a provider of information and communications services provides to users under a contract for use are used for transmitting advertising information for profits, in violation of Article 50 or 50-8, the relevant provider of information and communications services shall formulate necessary measures, such as refusal to provide the relevant services or fix of problmes of information and communications networks or services. (Inserted by Act nº 12681, May 28, 2014)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 50-5 (Installation of Advertising Program for Profit)           

    A provider of information and communications services shall, when it intends to install a program designed to display advertising information or collect personal information in a user’s computer or any other information processing device specified by Presidential Decree, obtain consent from the user. In such cases, it shall notify the purpose of use of the program and the method of deletion.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 50-6 (Distribution of Software Designed to Block Transmission of Advertising Information for Profit)  

    (1)       The Korea Communications Commission may develop and distribute software or computer programs designed for addressees to conveniently block or report any advertising information for profit when it is transmitted in violation of Article 50.

    (2)       The Korea Communications Commission may provide necessary support to related public agencies, legal entities, organizations, or similar for facilitating the development and distribution of software or computer programs for cutting off or reporting transmission under paragraph (1).

    (3)       If telecommunications services rendered by a provider of information and communications services are used in transmitting advertising information for profit in violation of Article 50, the Korea Communications Commission may recommend the provider of information and communications services to take necessary measures, such as development of technology, education, and public relations activities to protect addressees.

    (4)       The method of the development and distribution under paragraph (1) and the matters necessary for the support under paragraph (2) shall be prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 50-7 (Restrictions on Posting of Advertising Information for Profit)         

    (1)       Where any person intends to post advertising information for profit on an Internet website, he or she shall obtain prior consent from the operator or the manager of an Internet website: Provided, That in cases of a message board to which any person can have easy access without special authority and on which any person can post his or her message, he or she need not obtain prior consent.

    (2)       Notwithstanding paragraph (1), where the operator or the manager of an Internet website explicitly expresses his or her intention to refuse to post a notice or to revoke his or her prior consent, no person who intends to post advertising information for profit shall post advertising information for profit.

    (3)       The operator or the manager of the Internet website may take measures, such as deletion of advertising information for profit posted, in violation of paragraph (1) or (2).

    (This Article Wholly Amended by Act Nº 12681, May 28, 2014)

     Article 50-8 (Prohibition on Transmission of Advertising Information for Unlawful Act)            

    No one shall transmit any advertising information for goods or services prohibited by this Act or any other Act through an information and communications network.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 51 (Restriction, etc. on Outflow of Important Information to Abroad)       

    (1)       The Government may have providers or users of information and communications services to take necessary measures to prevent outflow abroad of any important information about industry, economy, science, technology, etc. of this county through information and communications networks.

    (2)       The scope of the important information under paragraph (1) shall be as follows:

    1.         Information related to the national security and major policies;

    2.         Information about details of cutting-edge science and technology or equipment developed within this country.

    (3)       The Government may have the providers of information and communications services that manage the information under subparagraphs of paragraph (2) take the following measures: (Amended by Act Nº 14080, Mar. 22, 2016)

    1.         Installation of a systematic or technical device for preventing unlawful use of information and communications networks;

    2.         Systematic and technical measures for preventing unlawful destruction or manipulation of information;

    3.         Measures for preventing leakage of important information that providers of information and communications services have learned while managing the information.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 52 (Korea Internet and Security Agency)     

    (1)       The Government shall establish the Korea Internet and Security Agency (hereinafter referred to as the “Internet and Security Agency”) to upgrade the information and communications network (excluding matters concerning establishment, improvement and management of information and telecommunications network), encourage the safe use thereof, and promote the international cooperation and advancement into the overseas market in relation to broadcasting and communications. (Amended by Act Nº 9637, Apr. 22, 2009)

    (2)       The Internet and Security Agency shall be a legal entity. (Amended by Act Nº 9637, Apr. 22, 2009)

    (3)       The Internet and Security Agency shall perform the following business affairs: (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 11322, Feb. 17, 2012; Act Nº 11690, Mar. 23, 2013; Act Nº 12844, Nov. 19, 2014; Act Nº13343 Jun. 22, 2015)

    1.         Survey and research of laws, policies and systems for the use and protection of the information and telecommunications network, promotion of the international cooperation and advancement into the overseas market in relation to broadcasting and communications, etc.;

    2.         Survey and research of statistics concerning the use and protection of the information and telecommunications network;

    3.         Analysis of negative effects arising from the use of the information and telecommunications network and research on countermeasures;

    4.         Public relations activities, education, and training for using and protecting the information and telecommunications network;

    5.         Information protection for the information and telecommunications network, development of technologies concerning the Internet address resources and standardization thereof;

    6.         Support for policies for the information security industry, development of relevant technology and fostering of human resources;

    7.         Certification of the information security management system, implementation of and support for certification, evaluation, etc. of the information protection, such as evaluation or certification of the information security system;

    8.         Research of measures to protect personal information and support for development and proliferation of protection technology;

    9.         Support for the operation of the Dispute Mediation Committee and operation of the privacy call center;

    10.       Transmission of promotional information and consultation on and processing of complaints related to Internet advertisements;

    11.       Operation of a system to deal with intrusion cases of information and telecommunications network, analyze the causes thereof, and respond thereto;

    12.       Management of certification of digital signatures under Article 25 (1) of the Digital Signature Act;

    13.       Support for an efficient operation of the Internet and encouragement of wider use thereof;

    14.       Support for the protection of stored information of the Internet users;

    15.       Support for service policies pertaining to the Internet;

    16.       Protection of users and support for the proliferation of sound information on the Internet;

    17.       Affairs related to the management of Internet address resources under the Internet Address Resources Act;

    18.       Support for the operation of the Internet Address Dispute Resolution Committee under Article 16 of the Internet Address Resources Act;

    19.       Support for operation of the conciliation committee under Article 25 (7) of the Act on the Promotion of Information Security Industry;

    20.       Support for such international cooperation, overseas expansion and overseas publicity activities as are concerning broadcasting and communications;

    21.       Businesses incidental to those referred to in subparagraphs 1 through 20;

    22.       Other businesses determined to fall under the affairs of, or entrusted to, the Internet and Security Agency in accordance with this Act, or any other statute, or other businesses entrusted by the Minister of Science, ICT and Future Planning, the Minister of Interior, the Korea Communications Commission, or the head of any other administrative agency.

    (4)       Expenses necessary for the business affairs of the Internet and Security Agency shall be funded by the following financial resources: (Amended by Act Nº 14080, Mar. 22, 2016)

    1.         Government’s contributions;

    2.         Revenues accrued from businesses referred to in each subparagraph of paragraph (3);

    3.         Other revenues accrued from operating the Internet and Security Agency.

    (5)       The provisions governing incorporated foundations under the Civil Act shall apply mutatis mutandis to any matter not provided for in this Act with respect to the Internet and Security Agency. (Amended by Act Nº 9637, Apr. 22, 2009)

    (6)       Any person, other than the Internet and Security Agency, shall not use the name called “Korea Internet and Security Agency.” (Amended by Act Nº 9637, Apr. 22, 2009)

    (7)       Matters necessary for the operation of the Internet and Security Agency and performance of its business affairs shall be prescribed by Presidential Decree. (Amended by Act Nº 9637, Apr. 22, 2009) (Amended by Act nº 9119, Jun. 13, 2008)

    CHAPTER VII.- TELECOMMUNICATIONS BILLING SERVICES

    Article 53 (Registration, etc. of Provider of Telecommunications Billing Services)           

    (1)       A person who intends to render telecommunications billing services shall meet the following requirements and complete registration with the Minister of Science, ICT and Future Planning as prescribed by Presidential Decree: (Amended by Act Nº 8867, Feb. 29, 2008; Act Nº 11690, Mar. 23, 2013)

    1.         Financial soundness;

    2.         A plan for protection of users of telecommunications billing services;

    3.         Human resources and physical facilities required for carrying on the business;

    4.         A business plan.

    (2)       A person eligible for the registration under paragraph (1) shall be either a company under Article 170 of the Commercial Act or a legal entity under Article 32 of the Civil Act and the total amount of its capital, contributions, or fundamental property shall not be less than the amount specified by Presidential Decree and more than 500 million won.

    (3)       Notwithstanding Article 22 of the Telecommunications Business Act, a provider of telecommunications billing services may omit reporting as a value-added telecommunications business operator. (Amended by Act Nº 10166, Mar. 22, 2010)

    (4)       Articles 23 through 26 of the Telecommunications Business Act shall apply mutatis mutandis to a revision to registration of a provider of telecommunications billing services, the transfer or acquisition of business, or the merger or inheritance of business, the succession to business, the cessation, discontinuance, dissolution, or similar of business of a provider of telecommunications billing services. In such cases, “special telecommunications business operator” shall be construed as “provider of telecommunications billing services,” and “special telecommunications business” as “telecommunications billing services.” (Amended by Act Nº 10166, Mar. 22, 2010)

    (5)       Detailed requirements and procedure for the registration under paragraph (1) and other necessary matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act Nº 8778, Dec. 21, 2007)

    Article 54 (Disqualification from Registration)         

    A person falling under any of the following subparagraphs shall be disqualified for the registration under Article 53: (Amended by Act Nº 8867, Feb. 29, 2008; Act Nº 11690, Mar. 23, 2013)

    1.         A legal entity in which case one year has not elapsed since its business was discontinued pursuant to Article 53 (4) or a person who was a major shareholder of such legal entity at the time when its business was discontinued (referring to an investor specified by Presidential Decree; hereinafter the same shall apply), if one year has not elapsed since the date of discontinuance;

    2.         A legal entity in which case three years have not elapsed since its registration was revoked pursuant to Article 55 (1) or a person who was a major shareholder of such legal entity at the time when its registration was revoked, if three years have not elapsed since the date of revocation;

    3.         A legal entity that are still under rehabilitation proceedings under the Debtor Rehabilitation and Bankruptcy Act or a major shareholder of such legal entity;

    4.         A person who did not perform his or her obligations within an agreed time limit in a banking transaction or any other commercial transaction and who is specified by the Minister of Science, ICT and Future Planning;

    5.         A legal entity any of whose major shareholders falls under any provision of subparagraphs 1 through 4.

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 55 (Order to Revoke Registration)     

    (1)       Where a provider of telecommunications billing services makes a registration by fraud or other improper means, the Minister of Science, ICT and Future Planning shall revoke the registration. (Amended by Act nº13343 Jun.22, 2015)

    (2)       The procedure for the disposition under paragraph (1) and other necessary matters shall be prescribed by Presidential Decree.

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 56 (Reporting on Standard Contract Form)   

    (1)       Every provider of telecommunications billing services shall prepare a standard contract form on telecommunications billing services and report it to the Minister of Science, ICT and Future Planning (including reporting on a revision thereto). (Amended by Act Nº 8867, Feb. 29, 2008; Act Nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning may, if it is found that a standard contract form under paragraph (1) is likely to undermine users’ interest of telecommunications billing services, recommend the relevant provider of telecommunications billing services to revise the standard contract form. (Amended by Act Nº 8867, Feb. 29, 2008; Act Nº 11690, Mar. 23, 2013)

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 57 (Securing Safety in Telecommunications Billing Services)         

    (1)       Every provider of telecommunications billing services shall perform his or her duty to pay attention as a good manager so that telecommunications billing services may be provided in a safe manner. (Amended by Act Nº 12681, May 28, 2014)

    (2)       Every provider of telecommunications billing services shall take administrative measures, including formulation of guidelines for work process and classification of accounts, and technical measures, including establishment of an information protection system, to secure safety and reliability of transactions through telecommunications billing services as prescribed by Presidential Decree.

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 58 (Rights of Providers of Telecommunications Billing Services)   

    (1)       When the price for goods, etc. sold or provided must be paid, or a provider of telecommunications billing services charges the price therefor, it shall notify the users of telecommunications billing services of the following matters: (Amended by Act nº 10560, Apr. 5, 2011; Act nº 12681, May 28, 2014)

    1.         Date and time telecommunications billing services are used;

    2.         Trade name and contact information of the other party (referring to a person who sells and/or provides goods/services in a transaction through telecommunications billing services; hereinafter referred to as “other party to a transaction”);

    3.         Amount purchased/used through telecommunications billing services and details thereof;

    4.         Methods of raising an objection and contact information.

    (2)       A provider of telecommunications billing services shall provide users of telecommunications billing services with a method by which users can verify the details of purchase and use, and shall also furnish a user, upon request, with a written statement on the details of purchase and use (including an electronic document; hereinafter the same shall apply) within two weeks from the date requested.

    (3)       A user of telecommunications billing services discovers that the telecommunications billing services have been rendered against his or her will, he or she may request the provider of telecommunications billing services to make corrections (excluding cases where there is an intentional act or negligence on the part of the user of the telecommunications billing services), and where the provider of telecommunications billing services finds that the user’s request for making corrections is reasonable, he or she shall withhold the payment of the price for use to a seller and notify the user of the results thereof within two weeks from the date such correction was requested. (Amended by Act Nº 12681, May 28, 2014)

    (4)       Every provider of telecommunications billing services shall preserve records of telecommunications billing services during the period, within the limit of five years, prescribed by Presidential Decree.

    (5)       Where a provider of telecommunications billing services (a person who provides services under Article 2 (1) 10 (a)) provides telecommunications billing services or increases the upper limits of use, it shall obtain consent from a user of the relevant telecommunications billing services in advance. (Inserted by Act nº 12681, May 28, 2014)

    (6)       When a provider of telecommunications billing services (a person who provides services under Article 2 (1) 10 (a)) amends any of the contractual terms and conditions, he or she shall notify users of the amendment thereof one month prior to the effective date of the amended contractual terms and conditions. In such cases, a user who has an objection to the amended contractual terms and conditions may terminate the contract for telecommunications billing services. (Inserted by Act nº 12681, May 28, 2014)

    (7)       The period, types, and scope of the details of purchase and use which a provider of telecommunications billing services should provide pursuant to paragraph (2), types and methods of preservation of the records which a provider of telecommunications billing services should preserve pursuant to paragraph (4), and matters necessary for the termination of the contract, such as methods of notifying amendment to the contractual terms and conditions, the period and procedures for raising an objection, shall be prescribed by Presidential Decree. (Amended by Act Nº 12681, May 28, 2014)

    (8)       The Minister of Science, ICT, and Future Planning shall prescribe and provide a public notice of matters necessary for methods for giving consent, etc. under paragraph (5). (Inserted by Act nº 12681, May 28, 2014)

    (9)       The Minister of Science, ICT, and Future Planning may prescribe and give a public notice of detailed matters concerning methods for settling accounts, etc. so that telecommunications billing services are not provided against the will of users of telecommunications billing services. (Inserted by Act nº 12681, May 28, 2014)

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 59 (Dispute Resolution)          

    (1)       Every provider of telecommunications billing services may install and operate an institution or organization that voluntary resolves disputes to protect rights and interests of users.

    (2)       Every provider of telecommunications billing services shall prepare a procedure for raising an objection by users of telecommunications billing services in connection with the services and redressing damages to their rights, as prescribed by Presidential Decree, and where he or she enters into a contract for telecommunications billing services, he or she shall stipulate such procedure in the terms and conditions of the contract. (Amended by Act Nº 12681, May 28, 2014)

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 60 (Liability for Damages)     

    (1)       A provider of telecommunications billing services shall be liable for damages caused to a user of the telecommunications billing services while rendering the services: Provided, That the same shall not apply in cases where the damages were caused by an intentional act or gross negligence on the part of the user of the telecommunications billing services.

    (2)       A provider of telecommunications billing services shall negotiate with the claimant to damages for agreement on compensation for the damages under paragraph (1).

    (3)       If parties fail to or are unable to reach an agreement on compensation for damages under paragraph (2), either party may file an application for decision with the Korea Communications Commission. (Amended by Act Nº 8867, Feb. 29, 2008)

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    Article 61 (Restriction on Use of Telecommunications Billing Services)    

    The Minister of Science, ICT and Future Planning may order a provider of telecommunications billing services to deny, suspend, or place a restriction on the services against a person falling under any of the following subparagraphs: (Amended by Act Nº 8867, Feb. 29, 2008; Act Nº 11048, Sep. 15, 2011; Act Nº 11690, Mar. 23, 2013)

    1.         A person who sells, lends, provides any unwholesome medium for juvenile to juvenile in violation of Article 16 of the Juvenile Protection Act;

    2.         A person who undermines interests of users of telecommunications billing services seriously by enticing the users to purchase or use goods or services in any of the following means:

    (a)        Transmitting any advertising information for profit in violation of Article 50;

    (b)       Deceiving or enticing users of telecommunications billing services wrongfully;

    3.         A person who sells or renders goods or services prohibited by this Act or any other Act.

    (Article Inserted by Act nº 8778, Dec. 21, 2007)

    CHAPTER VIII INTERNATIONAL COOPERATION

     Article 62 (International Cooperation)          

    The Government shall maintain cooperate reciprocally with other nations or international organizations in carrying out the following affairs:

    1.         Affairs related to the transfer of personal information between nations and the protection of personal information;

    2.         Affairs for the protection of juvenile in information and communications networks;

    3.         Affairs for the prevention of acts that undermine safety of information and communications networks;

    4.         Other affairs for the facilitation of sounder and safer use of information and communications services.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 63 (Protection of Personal Information Transferred Abroad)          

    (1)       Any provider of information and communications services or similar shall not conclude an international contract with any term or condition in violation of this Act with respect to personal information of users.

    (2)       A provider, etc. of information and communications services shall obtain consent of the users in the case of intending to provide (including being inquired of), entrust management of, or deposit, such users’ personal information, to overseas (hereafter referred to as “transfer” in this Article): Provided, That the said provider, etc. of information and communications services may not go through a procedure for consent to either entrustment of management, or deposit, of the relevant personal information where such transfer is necessary for implementing a contract on the provision of information and communications services and promoting the users’ convenience, and such provider, etc. discloses all the matters referred to in each subparagraph of paragraph (3) pursuant to Article 27-2 (1) or informs such matters to the users in a manner prescribed by Presidential Decree, including by means of email. (Amended by Act Nº 14080, Mar. 22, 2016)

    (3)       A provider of information and communications services or similar who desires to obtain the consent under paragraph (2) shall notify the relevant user of all the following matters in advance:

    1.         Items of the personal information transferred;

    2.         A nation to which the personal information is to be transferred, the date and time, and methods of transfer;

    3.         The name of the person to whom the personal information is to be transferred (referring to the name of a legal entity and the contact information of the person responsible for management of information, if the person is a legal entity);

    4.         The purposes of use of the person to whom the personal information is to be transferred, and the period of time for possession and use of the personal information.

    (4)       A provider of information and communications services or similar shall, when it transfers personal information to abroad with consent under paragraph (2), take protective measures, as prescribed by Presidential Decree.

    (Amended by Act nº 9119, Jun. 13, 2008)

    CHAPTER IX SUPPLEMENTARY PROVISIONS

     Article 64 (Submission of Data)        

    (1)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission may require a provider of information and communications services or similar (including a person to whom this Article shall apply mutatis mutandis pursuant to Article 67; hereafter the same shall apply in this Article) to submit related articles, documents, and others in any of the following cases: (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11322, Feb. 17, 2012; Act Nº 11690, Mar. 23, 2013)

    1.         If he or she becomes aware of a violation or suspected violation of this Act;

    2.         If he or she receives a report or petition on a violation of this Act;

    2-2.      If it occurs, or is likely to occur, an event/accident or others which noticeably damages safety and reliability of users’ information;

    3.         If there is any other ground specified by Presidential Decree to believe that it is necessary for the protection of users.

    (2)       The Korea Communications Commission may, when it intends to take the following measures against a person who transmitted any advertising information for profit in violation of this Act, request a provider of information and communications services or similar to let it peruse or to submit data of the person who transmitted the advertising information, such as the name, address and national identification number of the person and the period of time of access:

    1.         Corrective measures under paragraph (4);

    2.         Imposition of administrative fines under Article 76;

    3.         Any similar measures.

    (3)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission may, if a provider, etc. of information and communications services fails to submit data under paragraph (1) or (2) or if it is found that a provider of information and communications services or similar has violated this Act, assign public officials under his or her control to enter the place of business of the person concerned related to the such violation of this Act, including the provider, etc. of information and communications services, to inspect the current status of business, account books, documents, and others. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013; Act Nº 14080, Mar. 22, 2016)

    (4)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission may order a provider of information and communications services or similar who violated this Act to take corrective measures as may be necessary to stop or correct the violation, and may also require a provider of information and communications services or similar to whom it was ordered to take corrective measures to announce to the public the fact that it received the order to take such corrective measures. In such cases, the matters necessary for the method, guidelines, and procedure for the public announcement and other related matters shall be prescribed by Presidential Decree. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (5)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission may, when he or she issued an order to take corrective measures as may be necessary pursuant to paragraph (4), disclose to the public the fact that he or she issued the order to take corrective measures. In such cases, the matters necessary for the method, guidelines, and procedure for the public disclosure and other related matters shall be prescribed by Presidential Decree. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (6)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, when he or she demands submission or inspection of data or other materials pursuant to paragraph (1) or (2), give a written notice (including an electronic document), specifically stating the reasons and legal authority for such demand, the time limit for submission or the date and time for inspection, the details of data subject to the submission or inspection, and other related matters. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (7)       When a inspection under paragraph (3) is to be conducted, the plan for the inspection, including the date and time of, and the reasons for and details of the inspection, shall be notified to the relevant provider of information and communications services or similar no later than seven days before the commencement of the inspection: Provided, That the plan for such inspection shall not be notified in an emergency case or if it is deemed impossible to accomplish the purposes of the inspection because of anticipated destruction of evidence or any other factor if a prior notice is given.

    (8)       The public officials who inspect pursuant to paragraph (3) shall carry an identification indicating their authority with them to present it to people concerned, and shall deliver to the people concerned a document stating their names, the time and purposes of access, and other related matters, whenever they access to a place of business.

    (9)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, where he or she receives, peruses, or inspects data or any other material submitted pursuant to any provision of paragraphs (1) through (3), notify the relevant provider of information and communications services or similar of the results thereof (including the details of disposition, in cases where he or she intends to make a disposition, such as an order to take corrective measures, as a result of the inspection) in writing. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (10)     The Minister of Science, ICT and Future Planning or the Korea Communications Commission may ask technical advice or any other support of the head of the Internet and Security Agency as may be necessary in demanding submission of data or conducting an inspection pursuant to paragraphs (1) through (4). (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (11)     The demand for submission of data or any other materials and the inspections under paragraphs (1) through (3) shall be limited to the least extent necessary for the enforcement of this Act, and shall be not abused for any other purpose.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 64-2 (Protection and Destruction of Data, etc.)        

    (1)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall not, if asked by a provider of information and communications services or similar to protect documents, data, or any other materials submitted or collected pursuant to Article 64, furnish them to a third party or disclose them to the general public. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, when having received data submitted through an information and communications network or converted collected data or any other materials into an electronic format, take systematic and technical measures for security to protect personal information, trade secret, or similar from being leaked. (Amended by Act Nº 10465, Mar 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (3)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall, if any of the following events occurs, immediately destroy documents, data, or any other materials submitted or collected pursuant to Article 64, except as specifically provided for otherwise by any other Act. The same shall apply to a person to whom the authority of the Minister of Science, ICT and Future Planning or the Korea Communications Commission has been delegated or entrusted in whole or in part under Article 65: (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    1.         If the objectives of demanding submission of data, conducting a field inspection, or issuing an order to take corrective measures pursuant to Article 64 have been achieved;

    2.         If an administrative trial or administrative litigation is filed against an order issued to take corrective measures pursuant to Article 64 (4), when proceedings of such administrative trial are completed;

    3.         If a disposition is made to impose an administrative fine under Article 76 (4) and there is no objection to it, when the time period to raise an objection under paragraph (5) ends;

    4.         If there is an objection filed against disposition of an administrative fine under Article 76 (4), when the proceedings for the non-contentious case procedure are closed at the competent court.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 64-3 (Imposition, etc. of Penalty Surcharges)           

    (1)       The Korea Communications Commission may impose, on a provider of information and communications services or similar, an amount equivalent to 3/100 or less of its sales related to a violation as a penalty surcharge, where he or she performs any of the following acts: (Amended by Act Nº 11322, Feb. 17, 2012; Act Nº 12681, May 28, 2014; Act Nº 14080, Mar. 22, 2016)

    1.         Where he or she collects personal information without consent of the relevant user in violation of Article 22 (1) (including cases where Article 22 (1) shall apply mutatis mutandis pursuant to Article 67);

    2.         Where he or she collects personal information that is likely to seriously undermine rights, interests, or privacy of a person without consent of the relevant user in violation of Article 23 (1) (including cases where Article 23 (1) shall apply mutatis mutandis pursuant to Article 67);

    3.         Where he or she uses personal information in violation of Article 24 (including cases where Article 24 shall apply mutatis mutandis pursuant to Article 67);

    4.         Where he or she furnishes a third party with personal information in violation of Article 24-2 (including cases where Article 24-2 shall apply mutatis mutandis pursuant to Article 67);

    5.         Where he or she entrusts a third party with the management of personal information without consent of the relevant user in violation of Article 25 (1) (including cases where Article 25 (1) shall apply mutatis mutandis pursuant to Article 67);

    5-2.      Where a trustee violates the provisions of Chapter IV because it has neglected its control, supervision or education under Article 25 (4) (including cases where Article 25 (4) shall apply mutatis mutandis pursuant to Article 67);

    6.         Where he or she has lost, stolen, divulged, forged, altered, or mutilated a user’s personal information, and not taken measures under Article 28 (1) 2 through 5 (including cases where Article 28 (1) 2 through 5 shall apply mutatis mutandis pursuant to Article 67);

    7.         Where he or she collects personal information of a child under 14 years old without consent of his or her legal representative in violation of Article 31 (1) (including cases where Article 31 (1) shall apply mutatis mutandis pursuant to Article 67);

    8.         Where he or she provides any user’s personal information to overseas without obtaining consent from the user in violation of the main sentence of Article 63 (2).

    (2)       Where a provider of information and communications services or similar on whom penalty surcharge under paragraph (1) has been imposed refuses to submit data for computation of its sales or submits any false data, the sales may be estimated on the basis of accounting records such as financial statements, and the current status of business, such as the number of subscribers and the service charges of other providers of information and communications services which is similar in size: Provided, That penalty surcharge not exceeding 400 million won may be imposed where there was no sales or it is impracticable to compute the sales and where there is a ground specified by Presidential Decree. (Amended by Act Nº 11322, Feb. 17, 2012)

    (3)       The Korea Communications Commission shall, when it intends to impose penalty surcharge under paragraph (1), take the following factors into consideration:

    1.         The substance and degree of the violation;

    2.         The duration and frequency of the violation;

    3.         The amount of profits acquired by the violation.

    (4)       The penalty surcharge under paragraph (1) shall be computed by taking the factors under paragraph (3) into consideration, but the specific guidelines and procedures for the computation shall be prescribed by Presidential Decree.

    (5)       The Korea Communications Commission shall, if a person who is obligated to pay penalty surcharges under paragraph (1) fails to pay them by a deadline, collect an additional charge equivalent to 6/100 of the unpaid penalty surcharge per annum beginning on the day immediately following the deadline.

    (6)       The Korea Communications Commission shall, if a person who is obligated to pay penalty surcharges under paragraph (1) fails to pay them by a deadline, remind the person to pay them within a period of time prescribed by the Commission, and shall collect them in accordance with the precedents for disposition against default on national taxes, if the person fails to pay the penalty surcharges and the additional charges under paragraph (5) within the prescribed period of time.

    (7)       Where penalty surcharges imposed pursuant to paragraph (1) shall be refunded due to a judgment of a court or any other reason, an additional amount equivalent to 6/100 of the penalty surcharge per annum shall be paid from the date the penalty surcharges are paid and until the date they are refunded.

    (Article Inserted by Act nº 9119, Jun. 13, 2008)

    Article 64-4 (Hearing)             

    The Minister of Science, ICT and Future Planning or the Korea Communications Commission shall hold a hearing in cases falling under any of the following subparagraphs:

    1.         in the case of intending to revoke the designation of a certification body in accordance with Article 9 (2);

    2.         in the case of intending to revoke the designation of an identification service agency in accordance with Article 23-4 (1);

    3.         in the case of intending to revoke certification of an information security management system in accordance with Article 47 (10) (including cases where Article 47 (10) applies mutatis mutandis in accordance with Article 47-3 (3));

    4.         in the case of intending to revoke the designation of a certification body for information security management system in accordance with Article 47-2 (1) (including cases where Article 47-2 (1) applies mutatis mutandis in accordance with Article 47-3 (4));

    5.         in the case of intending to revoke any rate of information security management system in accordance with Article 47-5 (4);

    6.         in the case of intending to revoke the registration in accordance with Article 55 (1).

    (Article Inserted by Act nº 13520, Dec. 1, 2015)

    Article 65 (Delegation and Entrustment of Authority)          

    (1)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission may delegate or entrust part of his or her authority under this Act to the heads of agencies under the control of the Ministry of Science, ICT and Future Planning or the presidents of the regional Korea posts, as prescribed by Presidential Decree. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (2)       The Minister of Science, ICT and Future Planning may entrust projects under Article 13 for facilitating the use of information and communications networks to the National Information Society Agency under Article 14 of the Framework Act on National Informatization, as prescribed by Presidential Decree. (Amended by Act Nº 11690, Mar. 23, 2013)

    (3)       The Minister of Science, ICT and Future Planning or the Korea Communications Commission may entrust the Internet and Security Agency with business affairs related to demanding submission of data and conducting inspections pursuant to Article 64 (1) and (2), as prescribed by Presidential Decree. (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (4)       Article 64 (8) shall apply mutatis mutandis to employees of the Internet and Security Agency under paragraph (3). (Amended by Act Nº 9637, Apr. 22, 2009)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 65-2 Deleted. (by Act nº 7812, Dec. 30, 2005)          

    Article 66 (Confidentiality. etc.)        

    A person who engages or engaged in a job related to any of the following business affairs shall not divulge to another person any secret that he or she has learned while performing his or her duties, nor use it for any purpose other than performance of his or her duties: Provided, That the same shall not apply if any other Act specifically provides otherwise: (Amended by Act Nº 11322, Feb. 17, 2012)

    1.         Deleted; (by Act nº 10465, Mar. 29, 2011);

    2.         Certification of information security management system under Article 47;

    2-2.      Affairs of the certification of personal information management system pursuant to Article 47-3;

    3.         Assessment of information protection systems under Article 52 (3) 4;

    4.         Deleted; (by Act nº 11322, Feb. 17, 2012) ;

    5.         Conciliation of disputes by the defamation dispute conciliation division under Article 44-10.

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 67 (Application Mutatis Mutandis to Broadcasting Business Operator)      

    (1)       Chapter 4 shall apply mutatis mutandis to the cases where a person falling under subparagraph 3 (a) through (e) of Article 2, subparagraph 6, 9, 12 and 14 of the Broadcasting Act collects/uses or provides personal information of viewers. In this case, the term “provider of information and communications services” or “provider of information and communications services or similar” shall be construed as “person falling under subparagraph 3 (a) through (e) of Article 2, subparagraph 6, 9, 12 and 14 of the Broadcasting Act” and the term “users” shall be construed as “viewers”.

    (2)       Articles 22, 23, 23-2 through 23-4, 24, 24-2, 26, 26-2, 27, 27-2, 27-3, 28, 28-2, 29, 30, 30-2 and 31 shall apply mutatis mutandis to the trustees under Article 25 (1).

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    Article 68 Deleted. (by Act nº 10165, Mar. 22, 2010)           

    Article 68-2 Deleted (by Act nº 13343, Jun. 22, 2015)          

    Article 69 (Legal Fiction as Public Official in Application of Penalty Provisions)  

    Executives and employees of the National Information Society Agency and the Internet and Security Agency who engage in the business affairs entrusted by the Minister of Science, ICT and Future Planning or the Korea Communications Commission pursuant to Article 65 (2) or (3) shall be deemed public officials in applying Articles 129 through 132 of the Criminal Act. (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 69-2 (Accusation)      

    (1)       In cases where an act falling under any subparagraph of Article 64-3 (1) is deemed existing, the Korea Communications Commission may accuse the responsible provider of information and communications services or similar to the local prosecutor’s office or other investigative agencies.

    (2)       The Korea Communications Commission may recommend a provider, etc. of information and communications services violating this Act with respect to the protection of personal information to take disciplinary action against the responsible person (including its representative and responsible executive officers). In this case, the person in receipt of such recommendation shall have regard thereto and notify the Korea Communications Commission of the result thereof. (Inserted by Act nº 14080, Mar. 22, 2016)

    (Article Inserted by Act nº 11322, Feb. 17, 2012)

    CHAPTER X.- PENALTY PROVISIONS

    Article 70 (Penalty Provisions)           

    (1)       A person who commits defamation of another person by disclosing a fact to the public through an information and communications network purposely to disparage his or her reputation shall be punished by imprisonment with labor for up to three years, or by fine not exceeding 30 million won. (Amended by Act Nº 12681, May 28, 2014)

    (2)       A person who commits defamation of another person by disclosing a false fact to the public through an information and communications network purposely to disparage his or her reputation shall be punished by imprisonment with labor for up to seven years, by suspension of qualification for up to ten years, or by fine not exceeding 50 million won.

    (3)       The public prosection may not prosecute a person who committed a crime under paragraph (1) or (2) against the victim’s will explicitly manifested.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 70-2 (Penalty Provisions)       

    A person who conveys or spread a malicious program in violation of Article 48 (2) shall be punished by imprisonment with labor of up to seven years or by fine not exceeding 70 million won.

    (Article Inserted by Act nº 14080, Mar. 22, 2016)

    Article 71 (Penalty Provisions)           

    Any of the following persons shall be punished by imprisonment with labor for up to five years or by fine not exceeding 50 million won: (Amended by Act Nº 14080, Mar. 22, 2016)

    1.         A person who collects personal information without consent of the relevant user in violation of Article 22 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    2.         A person who collects personal information that is likely to seriously undermine rights, interests, or privacy of an individual without consent of the relevant user in violation of Article 23 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    3.         A person who uses or furnishes a third party with personal information, or who knowingly received such personal information for profit or for any other wrongful purpose, in violation of Article 24, 24-2 (1) or (2), or 26 (3) (including cases to which any of the aforesaid provisions shall apply mutatis mutandis pursuant to Article 67);

    4.         A person who entrusts someone with management of personal information without consent of the relevant user in violation of Article 25 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    5.         A person who mutilates, infringes, or divulges personal information in violation of Article 28-2 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    6.         A person who knowingly receives any divulged personal information for profit or for any other wrongful purpose in violation of Article 28-2 (2);

    7.         A person who furnishes someone with personal information or uses thereof without taking necessary measures in violation of Article 30 (5) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Articles 30 (7), 31 (3), or 67);

    8.         A person who collects personal information of a child under 14 years old without consent of his or her legal representative in violation of Article 31 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    9.         A person who intrudes on an information and communications network in violation of Article 48 (1);

    10.       A person who causes a trouble to an information and communications network in violation of Article 48 (3);

    11.       A person who mutilates another person’s information or who infringes, misappropriates, or divulges another person’s secret in violation of Article 49.

    (2)       An attempt to commit a crime referred to in paragraph (1) 9 shall be punished. (Inserted by Act nº 14080, Mar. 22, 2016)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 72 (Penalty Provisions)           

    (1)       A person falling under any of the following subparagraphs shall be punished by imprisonment with labor for up to three years or by a fine not exceeding 30 million won: (Amended by Act Nº 12014, Jan. 20, 2015; Act No .13343 Jun. 22, 2015)

    1.         Deleted; (by Act nº 14080, Mar. 22, 2016)

    2.         A person who collects another person’s personal information in violation of Article 49-2 (1);

    2-2.      A person who transmits any advertising information in violation of Article 50-8 by using the situation of any large-scale disaster under Article 14 (1) of the Framework Act on the Management of Disasters and Safety;

    3.         A person who carries on a business without the registration under Article 53 (1);

    4.         A person who lends a loan to someone or intermediates such loan by committing any of the following acts:

    (a)        Conducting, or engaging someone to conduct vicariously, a transaction through telecommunications billing services by pretending sale or supply of goods or services or billing more than an actual selling price;

    (b)       Engaging a user of telecommunications billing services to purchase or use certain goods or services through telecommunications billing services and then purchasing, at a discount, the goods or services purchased or used by the user of telecommunications billing services;

    5.         A person who divulges to another person any secret known to him or her while performing his or her duties or uses such secret for any purpose other than his or her duties in violation of Article 66.

    (2)       Deleted. (by Act nº 14080, Mar. 22, 2016)

    (Amended by Act nº 9119, Jun. 13, 2008)

    Article 73 (Penalty Provisions)           

    Any of the following persons shall be punished by imprisonment with labor for not more than two years or by a fine not exceeding 20 million won: (Amended by Act Nº 12681, May 28, 2014; Act Nº 14080, Mar. 22, 2016)

    1.         A person who has a user’s personal information lost, stolen, leaked, forged, altered, or damaged because he or she has not taken technical and administrative measures under any provision of Article 28 (1) 2 through 5 (including cases where the aforesaid provision is applied mutatis mutandis pursuant to Article 67);

    1-2.      A person who fails to destroy personal information, in violation of Article 29 (1) (including cases where the aforesaid provision is applied mutatis mutandis pursuant to Article 67);

    2.         A person who provides an unwholesome medium for juveniles for profit without labeling it as an unwholesome medium in violation of Article 42;

    3.         A person who transmits to a juvenile any information containing advertisement of an unwholesome medium for juveniles or displays such information openly without taking any measures to restrict access by juveniles in violation of Article 42-2;

    4.         A person who uses a user’s information for any purpose other than filing a civil or criminal lawsuit in violation of Article 44-6 (3);

    5.         A person who fails to perform an order of the Korea Communications Commission under Article 44-7 (2) or (3);

    6.         A person who fails to preserve relevant data in violation of an order issued pursuant to Article 48-4 (3);

    7.         A person who entices another person to furnish him or her with personal information in violation of Article 49-2 (1);

    8.         A person who fails to perform an order issued pursuant to Article 61.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 74 (Penalty Provisions)          

    (1)       Any of the following persons shall be punished by imprisonment with labor for up to one year or by a fine not exceeding 10 million won: (Amended by Act Nº 11322, Feb. 17, 2012; Act Nº 12681, May 28, 2014)

    1.         A person who puts any similar label on a product or sells a product bearing any similar label, or who displays such product with intent to sell it, in violation of Article 8 (4);

    2.         A person who distributes, sells, lends, or openly displays any obscene codes, letters, sound, images, or motion pictures in violation of Article 44-7 (1) 1;

    3.         A person who makes any codes, letters, sound, images, or motion pictures arousing fear or apprehension reach another person repeatedly in violation of Article 44-7 (1) 3;

    4.         A person who takes measures, in violation of Article 50 (5);

    5.         Deleted. (by Act nº 12681, May 28, 2014)

    6.         A person who transmits any advertising information, in violation of Article 50-8;

    7.         A person who fails to file for any revision to registration, or who fails to file a report on transfer, acquisition, merger, or inheritance of business, in violation of Article 53 (4).

    (2)       The public prosecution may not prosecute a person who committed a crime under paragraph (1) 3 against the victim’s will explicitly manifested.

    (Amended by Act nº 9119, Jun. 13, 2008)

     Article 75 (Joint Penalty Provisions)             

    If a representative of a corporation, or an agent, an employee, or other servant of the corporation commits a violation under Articles 71 through 73 or 74 (1) in connection with the business of the corporation or the individual, not only shall such violator be punished accordingly, but the corporation or the individual shall be punished by a fine under the relevant Article: Provided, That this shall not apply where the corporation or individual has not been negligent in giving the due attention and supervision concerning the relevant duties to prevent such violation.

    (This Article Amended by Act Nº 10138, Mar. 17, 2010)

     Article 75-2 (Confiscation and Additional Collection)         

    Money and goods, or other profits received by a person committing any offence referred to in Article 71 (1) 1 through 8, Article 72 (1) 2, and subparagraphs 1, 1-2 and 7 of Article 73 with respect to the relevant violation may be confiscated, and if impossible to confiscate such money and goods or other profits, the value thereof may be additionally collected. In this case, the penalty of confiscation or additional collection may be imposed in addition to any other penalty.

    (Article Inserted by Act nº 14080, Mar. 22, 2016)

    Article 76 (Administrative Fines)       

    (1)       Any of the following persons and a person who made a third party commit an act falling under subparagraphs 7 through 11, shall be punished by an administrative fine not exceeding 30 million won: (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11322, Feb. 17, 2012; Act Nº 11690, Mar. 23, 2013; Act Nº 12681, May 28, 2014; Act Nº 13520, Dec. 1, 2015; Act Nº 14080, Mar. 22, 2016)

    1.         A person who refuses to provide services, in violation of Article 22-2 (2), or Article 23 (3) (including where the aforesaid provisions shall apply mutatis mutandis pursuant to Article 67);

    1-2.      A person who fails to take measures necessary to protect users’information such as devising methods for users to give or revoke consent to access authority, in violation of Article 22-2 (3) (including where the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    2.         A person who collects or uses resident registration numbers in violation of Article 23-2 (1) or fails to take necessary measures in violation of Article 23-2 (2) (including cases where the aforesaid provision applies mutatis mutandis pursuant to Article 67);

    2-2.      A person who either fails, in obtaining consent to provision of personal information or entrustment of management thereof, to obtain it separately from consent to collection and use of personal information, or refuses to provide services on the ground that there exists no consent to such provision or entrustment, in violation of Article 24-2 (3) (including cases where Article 24-2 (3) shall apply mutatis mutandis in accordance with Article 67);

    2-3.      A person who fails to give notice or report to users, the Korea Communications Commission, and the Korea Internet Security Agency, in violation of Article 27-3 (1) (including where the aforesaid provision shall apply mutatis mutandis pursuant to Article 67), or gives notice or reports thereto after 24 hours have elapsed without just cause;

    2-4.      A person who fails to provide an explanation under Article 27-3 (3) or makes a false explanation;

    3.         A person who fails to take technical and administrative measures under Article 28 (1) (including cases to which the aforesaid provisions shall apply mutatis mutandis pursuant to Article 67);

    4.         A person who fails to take measures, such as the destruction of personal information, in violation of Article 29 (2) (including cases where the aforesaid provision apply mutatis mutandis pursuant to Article 67);

    5.         A person who fails to take necessary measures, in violation of Article 30 (3), (4), or (6) (including cases to which the aforesaid provisions shall apply mutatis mutandis pursuant to Article 30 (7), 31 (3), or 67);

    5-2.      A person who fails to notify details of personal information used, in violation of the main sentence of Article 30-2 (1) (including cases to which the aforesaid provisions shall apply mutatis mutandis pursuant to Article 67);

    6.         Deleted. (by Act Nº 12681, May 28, 2014)

    6-2.      A person who fails to report the designation of the chief information protection officer, in violation of Article 45-3 (1);

    6-3.      A person who fails to receive certification of an information security management system in violation of Article 47 (2);

    7.         A person who transmits any advertising information for profit, in violation of Article 50 (1) through (3);

    8.         A person who fails to state the matters required to be stated, or who states false information on such matters, when he or she transmitted any advertising information, in violation of Article 50 (4);

    9.         A person who makes an addressee bear the burden of any expense, in violation of Article 50 (6);

    9-2.      A person who fails to verify whether an addressee gives consent to receive advertising information, in violation of Article 50 (8);

    10.       A person who installs a program without consent of the relevant user, in violation of Article 50-5;

    11.       A person who posts any advertising information for profit on an Internet webpage, in violation of Article 50-7 (1) or (2);

    12.       A person who fails to observe an order issued by the Minister of Science, ICT and Future Planning or the Korea Communications Commission pursuant to Article 64 (4) in violation of this Act.

    (2)       Any of the following persons shall be punished by an administrative fine not exceeding 20 million won: (Amended by Act Nº 14080, Mar. 22, 2016)

    1.         A person who fails to disclose or notify the matters concerning the entrustment of management of personal information to users, in violation of Article 25 (2) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    1-2.      A person who re-entrusts a third party with the management of personal information without obtaining a consent from a provider, etc. of information and communications, in violation of Article 25 (7) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    2.         A person who fails to notify a user of transfer of personal information in violation of Article 26 (1) or (2) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    3.         A person who fails to designate a person responsible for protection of personal information, in violation of Article 27 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    4.         A person who fails to disclose the policy on managing personal information, in violation of Article 27-2 (1) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    5.         A person who discloses all the matters referred to in each subparagraph of Article 63 (3) in violation of the proviso to Article 63 (2) or entrusts the management of, or deposits, user’s personal information, to overseas without informing the user.

    (3)       Any of the following persons shall be punished by an administrative fine not exceeding 10 million won: (Amended by Act Nº 9637, Apr. 22, 2009; Act Nº 10560, Apr. 5, 2011; Act Nº 11322, Feb. 17, 2012; Act Nº 12681, May 28, 2014; Act Nº 13520, Dec. 1, 2015; Act Nº 14080, Mar. 22, 2016)

    1.         and 2. Deleted; (by Act Nº Act Nº13343 Jun. 22, 2015)

    2-2.      A person who engages in the identification service without being designated as the identification service agency, in violation of Article 23-3 (1);

    2-3.      A person who fails to notify the suspension of identification service under Article 23-3 (2) or the discontinuation of identification service under Article 23-3 (3) to users or report the same to the Korea Communications Commission;

    2-4.      A person who continuously engages in identification service notwithstanding disposition for suspension of identification service and cancelation of the identification service agency under Article 23-4 (1);

    2-5.      A person who fails to entrust in writing the management of personal information in violation of Article 25 (6) (including cases to which the aforesaid provision shall apply mutatis mutandis pursuant to Article 67);

    3.         A person who fails to designate a person responsible for protection of juveniles in violation of Article 42-3 (1);

    4.         A person who fails to preserve information, in violation of Article 43;

    5.         A person who fails to be subscribed insurance, in violation of Article 46 (2);

    6.         Deleted; (by Act Nº 13520, Dec. 1, 2015);

    7.         A person who falsely advertises details of the certification he or she has obtained, in violation of Article 47 (9);

    8.         and 9. Deleted; (by Act Nº 11322, Feb. 17, 2012)

    10.       A person who fails to give notice to users of software, in violation of Article 47-4 (3);

    11.       A person who fails to comply with an order issued pursuant to Article 48-2 (4) to take corrective measures;

    11-2.    A person who fails to report any intrusion, in violation of Article 48-3 (1);

    12.       A person who interferes with, refuses, or evades access to the place of business to conduct an inspection under Article 48-4 (4);

    12-2.    A person who fails to comply with an order issued by the Minister of Science, Information and Communications Technology (ICT) and Future Planning, or the Korea Communications Commission, in violation of Article 49-2 (4);

    12-3.    A person who fails to inform the results of handling the consent to receive, refusal to receive, or revocation of consent to receive, advertising information, in violation of Article 50 (7);

    12-4.    A person who fails to take necessary measures, in violation of Article 50-4 (4);

    13.       A person who uses the name of the Korea Internet and Security Agency, in violation of Article 52 (6);

    14.       A person who fails to file a report on cessation, discontinuance, or dissolution of business, in violation of Article 53 (4);

    15.       A person who fails to report a standard contract form, in violation of Article 56 (1);

    16.       A person who fails to take administrative or technical measures, in violation of Article 57 (2);

    17.       A person who fails to notify a user of telecommunications billing services of the date and time, etc. when the aforementioned services are used, in violation of Article 58 (1);

    18.       A person who fails to provide a user of telecommunications billing services with the method by which the user can verify the details of purchase or use, or who fails to comply with a request by a user of telecommunications billing services to provide such method, in violation of Article 58 (2);

    19.       A person who fails to withhold the payment of the price though a request for making a correction on a telecommunications bill which he or she has received from a user of telecommunications billing services is reasonable or to notify the user of telecommunications billing services of the results of the measures taken in response to a request of the user, in violation of Article 58 (3);

    20.       A person who fails to preserve records of telecommunications billing services, in violation of Article 58 (4);

    20-2.    A person who provides telecommunications billing services or increases the amount of the upper limits of use without obtaining consent from a user of telecommunications billing services, in violation of Article 58 (5);

    20-3.    A person who fails to give notice concerning amendment to the contractual terms and conditions of telecommunications billing services, in violation of Article 58 (6);

    21.       A person who fails to prepare the procedure for raising an objection by users of telecommunications billing services and redressing their infringed rights, or to stipulate such procedure when he or she enters into a contract for telecommunications billing services, in violation of Article 59 (2);

    22.       A person who fails to submit, or who falsely submitted, goods, documents, or any other material under Article 64 (1);

    23.       A person who fails to comply with a request for inspection or submission of data under Article 64 (2);

    24.       A person who refuses, interferes with, or evades the access and inspection under Article 64 (3).

    (4)       The administrative fines prescribed in paragraphs (1) through (3) shall be imposed and collected by the Minister of Science, ICT and Future Planning or the Korea Communications Commission, as prescribed by Presidential Decree. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (5)       A person who is dissatisfied with disposition to impose a fine for negligence under paragraph (4) may file an objection with the Minister of Science, ICT and Future Planning or the Korea Communications Commission within 30 days from the date which he or she is notified of such disposition. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (6)       The Minister of Science, ICT, and Future Planning, or the Korea Communications Commission shall, upon receiving an objection filed in accordance with paragraph (5) by a person dissatisfied with the disposition for an administrative fine under paragraph (4), notify the competent court of the objection without delay, and the competent court shall, upon receiving such notice, put the case to trial on fines for negligence pursuant to the Non-Contentious Case Procedure Act. (Amended by Act Nº 10465, Mar. 29, 2011; Act Nº 11690, Mar. 23, 2013)

    (7)       Where neither objection is raised nor an administrative fine paid within a period prescribed in paragraph (5), the administrative fine shall be collected in the same manner as delinquent national taxes are collected.

    (Amended by Act nº 9119, Jun. 13, 2008)

    ADDENDA

    Article 1 (Enforcement Date)

    This Act shall enter into force on July 1, 2001.

    Article 2 (Transitional Measures following Change of Basis for Establishing Korea Information Security Center and of Its Name)

    (1)       The Korea Information Security Center established pursuant to Article 14-2 of the Framework Act on National Informatization at the time that this Act enters into force shall be deemed the Korea Information Security Agency established pursuant to Article 52 of this Act.

    (2)       Any act performed by and any legal relations maintained by the Korea Information Security Center at the time when this Act enters into force shall be deemed performed and maintained by the Korea Information Security Agency.

    (3)       The name of the Korea Information Security Center on the register book and other public registers at the time when this Act enters into force shall be deemed the name of the Korea Information Security Agency.

    Article 3 (Transitional Measures Following Change of Name of Korea Information and Communications Promotion Association)

    (1)       The Korea Information and Communications Promotion Association as at the time when this Act enters into force shall be deemed the Korea Association of Information and Telecommunication.

    (2)       Any act performed and any legal relations maintained by the Korea Information and Communications Promotion Association at the time when this Act enters into force shall be deemed performed and maintained by the Association.

    (3)       The name of the Korea Information and Communications Promotion Association on the register book and other public registers at the time that this Act enters into force shall be deemed the name of the Korea Association of Information and Telecommunication.

    Article 4 (Transitional Measures concerning Application of Penalty Provisions)

    The application of the penal provisions to any act committed prior to the enforcement of this Act shall be governed by the previous provisions.

    Article 5 Omitted.

    Article 6 (Relations to Other Statutes)

    If other Acts and subordinate statutes cite the former Act on Promotion, etc. of Utilization of Information System or the provisions thereof at the time this Act enters into force and if there exist corresponding provisions thereto in this Act, this Act or the corresponding provisions in this Act shall be regarded as being cited.

    ADDENDA (Act Nº 6585, Dec. 31, 2001)

    Article 1 (Enforcement Date)

    This Act shall enter into force on April 1, 2002.

    Articles 2 through 4 Omitted.

    ADDENDA (Act Nº 6797, Dec. 18, 2002)

    (1)       (Enforcement Date) This Act shall enter into force after the lapse of one month from the date of its promulgation: Provided, That the amended provisions of Articles 50 (2) and (5), 56 (3) and (4), 60 and 67 (1) (limited to the provisions of subparagraphs 15-2 and 15-4) shall enter into force after the lapse of six months from the date of its promulgation.

    (2)       (Transitional Measures concerning Application of Administrative Fine) The application of the administrative fine to the act of violation committed prior to the enforcement of this Act shall be governed by the previous provisions.

    ADDENDA (Act Nº 7139, Jan. 29, 2004)

    (1)       (Enforcement Date) This Act shall enter into force on the date of its promulgation: Provided, That the amended provisions of Articles 28, 45 (4), 46-3, 47-2 (4) and 48-4 (6) shall enter into force on the date on which six months lapse from the date of promulgation of this Act.

    (2)       (Transitional Measures concerning Application of Administrative Fines) The application of the administrative fine to the act of violation committed prior to the enforcement of this Act shall be governed by the previous provisions.

    ADDENDA (Act Nº 7142, Jan. 29, 2004)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 4 Omitted.

    ADDENDUM (Act Nº 7262, Dec. 30, 2004)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act Nº 7796, Dec. 29, 2005)

    Article 1 (Enforcement Date)

    This Act shall enter into force on July 1,2006.

    Articles 2 through 6 Omitted.

    ADDENDUM (Act Nº 7812, Dec. 30, 2005)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act Nº 7917, Mar. 24, 2006)

    (1)       (Enforcement Date) This Act shall enter into force three months after the date of its promulgation.

    (2)       (Transitional Measures concerning Safety Check of Information Protection) Where a company specializing in information protection consulting under Article 17 of the Act on the Protection of Information and Communications Infrastructure has commenced the works of safety check of information protection before the enforcement of this Act, it may continue to perform the works of safety check of information protection pursuant to the previous provisions, notwithstanding the amended provisions of Article 46-3 (1).

    ADDENDUM (Act Nº 8030, Oct. 4, 2006)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act Nº 8031, Oct. 4, 2006)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 6 Omitted.

    ADDENDA (Act Nº 8289, Jan. 26, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Transitional Measures for Prohibition on Illegal Communications)

    The orders issued by the Minister of Information and Communication to reject, suspend or restrict handling of telecommunications services pursuant to Article 53 of the Telecommunications Business Act before this Act enters into force shall be deemed to have been issued pursuant to the amended provisions of Article 44-7 of this Act.

    Article 3 (Transitional Measures for Change in Authority for Establishment of Information and Communications Ethics Committee)

    (1)       The Information and Communications Ethics Committee established pursuant to Article 53-2 of the former Telecommunications Business Act as of the enforcement date of this Act shall be deemed the Information and Communications Ethics Committee established pursuant to the amended provisions of Article 44-8 of this Act.

    (2)       The acts done by or against the Information and Communications Ethics Committee and other legal relationships with the Information and Communications Ethics Committee under the former provisions before this Act enters into force shall be deemed the acts done by or against the Information and Communications Ethics Committee and other legal relationships with the Information and Communications Ethics Committee under the amended provisions of Article 44-8 of this Act.

    Article 4 (Transitional Measures for Collection, Use, and Provision of Personal Information)

    (1)       Consent obtained from a user in relation to collection, use, provision, or similar of personal information in accordance with the former provisions of Article 22, 23, 24, or 54 as of the enforcement date of this Act shall be deemed consent obtained lawfully in accordance with the amended provisions of Article 22, 23, 24, 24-2, or 54.

    (2)       Handling of personal information, which has been entrusted lawfully in accordance with the former provisions of Article 25 as of the enforcement date of this Act shall be deemed to have been entrusted with consent obtained lawfully in accordance with the amended provision of Article 25 (1).

    (3)       An act performed by a person who succeeded rights and obligations of a provider of information and communications services or similar in accordance with the former provisions of Article 26 as of the enforcement of this Act to use or provide personal information shall be deemed to have been performed with consent obtained lawfully in accordance with the amended provision of Article 26 (3).

    Article 5 (Transitional Measures for Application of Penalty Provisions)

    Acts committed before this Act enters into force shall be governed by the former penal provisions.

    Article 6 Omitted.

    ADDENDA (Act Nº 8486, May 25, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year after the date of its promulgation.

    Articles 2 through 10 Omitted.

    ADDENDA (Act Nº 8778, Dec. 21, 2007)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Article 2 (Transitional Measures for Registration of Providers of Telecommunications Billing Services)

    (1)       A person who renders telecommunications billing services at the time when this Act enters into force shall complete the registration with the Minister of Information and Communication in accordance with the amended provision of Article 53 (1) within three months from the date this Act enters into force.

    (2)       A provider of telecommunications billing services who is registered in accordance with Article 28 (2) of the Electronic Financial Transaction Act at the time when this Act enters into force shall submit a written statement certifying the registration with the Minister of Information and Communication within three months from the date this Act enters into force.

    (3)       A person who submits a written statement in accordance with paragraph (2) shall be deemed to have been registered in accordance with the amended provision of Article 53 (1).

    ADDENDA (Act Nº 8852, Feb. 29, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act Nº 8867, Feb. 29, 2008)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 12 Omitted.

    ADDENDA (Act Nº 9119, Jun. 13, 2008)

    (1)       (Enforcement Date) This Act shall enter into force six months after the date of its promulgation.

    (2)       (Transitional Measures for Application of Penalty Provisions and Administrative Fines) An act committed before this Act enters into force shall be governed by the former penal provisions and the former provisions concerning administrative fines.

    ADDENDA (Act Nº 9637, Apr. 22, 2009)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Article 2 (Preparation for Establishment of Korea Internet and Security Agency)

    (1)       The Korea Communications Commission may perform preparatory activities to establish the Korea Internet and Security Agency by commissioning not less than five incorporators before this Act enters into force.

    (2)       The incorporators shall prepare the articles of incorporation of the Korea Internet and Security Agency and obtain approval from the Korea Communications Commission.

    (3)       The incorporators, upon obtaining approval under paragraph (2), shall register the incorporation of the Korea Internet and Security Agency by joint signature and turn over the administrative responsibility to the President of Korea Internet and Security Agency.

    (4)       The incorporators shall be deemed decommissioned at the time the take-over of the administrative responsibility is complete pursuant to paragraph (3).

    Article 3 (Transitional Measures concerning Succession of Korea Information Security Agency, Korea Internet and Security Agency and Korea IT International Cooperation Agency)

    (1)       The administrative responsibilities of the Korea Information Security Agency under Article 52 of the Act on Promotion of Information and Communications Infrastructure (hereinafter referred to as the “Korea Information Security Agency”), the Korea Internet and Security Agency under Article 9 of the Internet Address Resources Act (hereinafter referred to as the “Korea Internet and Security Agency”), and the Korea IT International Cooperation Agency under Article 24-2 of the Framework Act on Informatization Promotion (hereinafter referred to as the “Korea IT International Cooperation Agency”), which are governed by the previous provisions at the time this Act enters into force, shall be comprehensively succeeded to the Korea Internet and Security Agency under this Act.

    (2)       The previous rights, obligations, properties of the Korea Information Security Agency, the Korea Internet and Security Agency and the Korea IT International Cooperation Agency as at the time this Act enters into force shall be comprehensively succeeded to the Korea Internet and Security Agency under this Act.

    (3)       The previous employment relationship covering the employees of the Korea Information Security Agency, the Korea Internet and Security Agency and the Korea IT International Cooperation Agency as at the time this Act enters into force shall be comprehensively succeeded to the Korea Internet and Security Agency under this Act.

    (4)       The previous activities performed by or in relation to the Korea Information Security Agency, the Korea Internet and Security Agency and the Korea IT International Cooperation Agency as at the time this Act enters into force shall be deemed to have been performed by or in relation to the Korea Internet and Security Agency under this Act.

    (5)       The titles of the Korea Information Security Agency, the Korea Internet and Security Agency and the Korea IT International Cooperation Agency indicated on the register as at the time this Act enters into force or other public books shall be deemed to be those of the Korea Internet and Security Agency under this Act.

    Article 4 Omitted.

    Article 5 (Relations with Other Statutes)

    Where the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. or the provisions thereof are cited in other statutes as at the time this Act enters into force, and any provision corresponding thereto exists in this Act, this Act or the corresponding provision of this Act shall be deemed to have been cited in lieu of the previous provision.

    ADDENDUM (Act Nº 10138, Mar. 17, 2010)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDA (Act Nº 10165, Mar. 22, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation. (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act Nº 10166, Mar. 22, 2010)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 9 Omitted.

    ADDENDA (Act Nº 10465, Mar. 29, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    (Proviso Omitted.)

    Articles 2 through 7 Omitted.

    ADDENDA (Act Nº 10560, Apr. 5, 2011)

    Article 1 (Enforcement Date)

    This Act shall enter into force three months after the date of its promulgation.

    Article 2 (General Transitional Measures)

    Previous acts of the identification service agency which developed and provided the previous identification affairs as at the time of enforcement of this Act shall be deemed to have been legitimately developed and provided if the agency obtains the designation of identification service agency pursuant to this Act.

    Article 3 (Transitional Measures concerning Designation of Identification Service Agency)

    A person who was conducting the identification service as at the time of enforcement of this Act shall be designated, within three months after enforcement date of this Act, as an identification service agency by the Korea Communications Commission pursuant to the amended provision of Article 23-3 (1).

    ADDENDA (Act Nº 11048, Sep. 15, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force one year after the date of its promulgation.

    (Proviso Omitted.)

    Articles 2 through 5 Omitted.

    ADDENDA (Act nº 11322, Feb. 17, 2012)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation: Provided, That the amended provisions of Articles 45, 45-2, 45-3, 46-3, 47, 47-2, 47-3, 47-5, 52 (3) 7, 66 and 76 (3) 6 through 9 shall enter into force after the lapse of one year from the date of its promulgation.

    Article 2 (Transitional Measures concerning Restriction on Collection/Use of Resident Registration Number)

    (1)       A provider of information and communications services who provides methods of subscription for membership by using the subscriber’s resident registration number as at the time of enforcement of this Act shall destroy all the resident registration numbers possessed by the provider within two years after enforcement date of this Act: Provided, That this shall not apply in cases where falling under any of the subparagraphs under Article 23-2 (1).

    (2)       In cases where a provider of information and communications services fails to destroy the resident registration numbers possessed by him or her within the period under paragraph (1), the amended provisions of Article 23-2 (1) shall be deemed violated.

    Articles 3 (Transitional Measures concerning Abolition of the Safety Inspection on Protection of Information)

    A business operator who received a safety inspection on the protection of information pursuant to previous provisions as at the time of enforcement of this Act shall be deemed, during the concerning year in which he or she received the safety inspection on the protection of information, as the business operator who received the certification of an information security management system pursuant to the amended provisions of Article 47 (2).

    Articles 4 (Transitional Measures concerning Certification of Personal Information Management System)

    A person who received the certification personal information management system from the Korea Internet and Security Agency as at the time of enforcement of this Act shall be deemed to have received the certification of personal information management system pursuant to the amended provisions of Article 47-3.

    Articles 5 (Transitional Measures concerning Administrative Fine)

    Upon imposing administrative fine with respect to any violative acts committed before enforcement of this Act, the previous provisions shall apply thereto.

    ADDENDA (Act Nº 11690, Mar. 23, 2013)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation.

    Articles 2 through 7 Omitted.

    ADDENDA (Act Nº 12681, May 28, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation:

    Provided, That the amended provisions of Articles 44 (3), 44-5 and 76 (1) 6 shall enter into force on the date of their promulgation.

    Article 2 (Transitional Measures concerning Penalty Surcharges and Penalty Provisions)

    When penalty surcharges and penalty provisions apply to offenses committed before this Act enters into force, the former provisions shall apply thereto.

    ADDENDA (Act Nº 12844, Nov. 19, 2014)

    Article 1 (Enforcement Date)

    This Act shall enter into force on the date of its promulgation: Provided That, among the Acts amended pursuant to Article 6 of Addenda, the amended parts of the Acts that were promulgated before this Act enters into force but their enforcement dates have yet to arrive shall enter into force on their respective dates of enforcement.

    Articles 2 through 7 Omitted.

    ADDENDUM (Act Nº 13014, Jan. 20, 2015)

    This Act shall enter into force three months after the date of its promulgation.

    ADDENDUM (Act Nº 13280, Mar. 27, 2015)

    This Act shall enter into force on the date of its promulgation.

    ADDENDA (Act Nº 13343, Jun. 22, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Articles 2 through 3 Omitted.

    ADDENDA (Act Nº 13344, Jun. 22, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation.

    Article 2 (Applicability concerning Administrative Dispositions)

    The amended provisions of Article 55 (1) shall apply even to administrative dispositions against violations committed before this Act enters intro force.

    ADDENDA (Act nº 13520, Dec. 1, 2015)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation:

    Provided, That the amended provisions of Articles 29 (2) and (3) shall enter into force on the date of its promulgation.

    Article 2 (Applicability concerning Destruction, etc. of Personal Information)

    The amended provisions of Article 29 (2) and (3) shall apply even to the personal information collected or provided before such amended provisions enter into force.

    Article 3 (Applicability concerning Omission of Examination of Certification for Information Security Management System)

    The amended provisions of Article 47 (3) shall apply even to persons who have made an application for the certification for an information security management system, procedures for which are underway.

    Article 4 (Transitional Measures concerning Certification of Information Security Management System)

    A person who has not received the certification for an information security management system shall receive the certification within six months after this Act enters into force, in accordance with the amended provisions of Article 47 (2).

    Article 5 (Transitional Measures concerning Administrative Fines)

    When applying administrative fines to the violations committed before this Act enters into force, the previous provisions of this Act shall apply.

    ADDENDA (Act Nº 14080, Mar. 22, 2016)

    Article 1 (Enforcement Date)

    This Act shall enter into force six months after the date of its promulgation:

    Provided, That the amended provisions of Articles 22-2 and 76 (1) 1 and 1-2 shall enter into force one year after the date of its promulgation, the amended provisions of Article 32 (2) and (3) and 32-2 (3) shall enter into force on July 25, 2016, and the amended provision of Article 52 (4) shall enter into force on the date of its promulgation.

    Article 2 (Applicability concerning Compensation for Damage)

    The amended provisions of Articles 32 (2) and (3), and 32-2 (3) shall apply beginning from the first claim for compensation for damage against any information lost, stolen, leaked, forged, altered or damaged after the said amended provisions enter into force.

    Article 3 (Transitional Measures concerning Informing Fact of Exposure to Act of Violation)

    A provider of information and communications services shall, no later than six months after this Act enters into force, establish equipment, by means of which informing messages can be sent to users pursuant to the amended provisions of Article 49-2 (3).

    Article 4 (Transitional Measures concerning Penalty Provision)

    The former provisions shall govern when applying penalty provisions to the act committed before this Act enters into force.

    Article 5 Omitted.

    28Oct/21

    Criminal Code, Oct. 3, 1953

    Criminal Code, Oct. 3, 1953. Amended by Act nº 5057, Dec. 29, 1995; Act nº 6543, Dec. 29, 2001; Act nº 7623, Jul. 29, 2005; Act nº 11731, Apr. 5, 2013. 

    CHAPTER VIII.- CRIMES CONCERNING OBSTRUCTION OF THE PERFORMANCE OF OFFICIAL DUTIES

    Article 141 (Invalidity of Public Documents, etc. and Destruction of Public Goods)

    (1) A person who damages or conceals documents or other goods, or special media records, such as electromagnetic records, etc., used by public offices, or spoils its utility by other methods, shall be punished by imprisonment with prison labor for not more than 7 years or by a fine not exceeding 10 million won. (Amended by Act nº 5057, Dec. 29, 1995)

    CHAPTER XX.- CRIMES CONCERNING DOCUMENTS

    Article 227-2 (False Preparation or Alteration of Public Electromagnetic Records)

    A person with the intention of disrupting business falsely or alters electromagnetic documents of public official or public office shall be punished by imprisonment with prison labor not more than 10 years. (Amended by Act nº 5057. Dec. 29,1995)

    Article 232-2 (Falsification or Alteration of Private Electromagnetic Records)

    A person who falsifies or alters, with the intention of making any error in the management of affairs, any special media records, such as another person’s electromagnetic records concerning any years, shall be punished by imprisonment with prison labor for not more than 5 years, or a fine not exceeding 10 million won. (Amended by Act nº 5057. Dec. 29,1995)

    CHAPTER XXXV.- CRIMES OF VIOLATION OF SECRECY

    Article 316 (Violation of Secrecy)

    (1) A person who opens a sealed or other secretly composed letter, document, or drawing shall be punished by imprisonment with or without labor for not more than 3 years or by a fine not exceeding 5 million won. (Amended by Act nº 5057. Dec. 29,1995)

    (2) Any person who detects the contents of another person’s sealed or secretly designed letter, document, drawing, picture, or special media records, such as electromagnetic records, using any technical means, shall be subject to the same punishment referred to in paragraph (1). (Inserted by Act nº 5057. Dec. 29,1995)

    CHAPTER XXXIX.- CRIMES OF FRAUD AND EXTORTION

    Article 347-2 (Fraud by The Use of Computer, etc.)

    Any person who acquires any benefits to property or has a third person acquire them, by making any data processed after inputting a false information or improper order, or inputting or altering the data without any authority into the data processor, such as computer, etc., shall be punished by imprisonment with prison labor for not more than 10 years, or a fine not exceeding 20 million won. (Amended by Act nº 6543, Dec. 29, 2001)

    CHAPTER XLII.- CRIMES OF DESTRUCTION AND DAMAGE

    Article 366 (Destruction and Damage, etc. of Property)

    A person who, by destroying, damaging, or concealing another’s property document or special media records, such as electromagnetic records, etc., or by any other means, reduces their utility, shall be punished by imprisonment with prison labor for not more than 3 years or a fine not exceeding 7 million won. (Amended by Act nº 5057. Dec. 29,1995)

    27Oct/21

    Telecommunications Business Act, December 30, 1983

    Telecommunications Business Act, December 30, 1983 (Amended December 26, 2002, Amended by Act nº 5385, Act nº 6230, Jan 28, 2000, Act nº 8867, Feb 29, 2008, Act nº 9481, March 15, 2009, Act nº 10656, May 19, 2011, effective Nov. 20, 2011).

    CHAPTER I.- GENERAL PROVISIONS

    Article 1 (Purpose)

    The purpose of this Act is to contribute to the promotion of public welfare by encouraging sound development of telecommunications business and ensuring convenience to the users of telecommunications service through proper management of such business.

    Article 2 (Definitions)

    The definitions of the terms as used in this Act shall be as follows: (Amended by Act nº 10656, May 19, 2011)

    1. the term “telecommunication” means sending and receiving of sign, wording, sound or image through wired, wireless, optic or other electronic means;

    2. the term “telecommunication facilities” means equipments, devices, lines and other facilities necessary for telecommunication;

    3. the term “telecommunication line facilities” means telecommunication line portion of the telecommunication facilities which is necessary for sending, receiving and routing telecommunication and include exchange equipments and other annexed facilities;

    4. the term “commercial telecommunication facilities” means telecommunication facilities for providing telecommunication business;

    5. the term “proprietary telecommunication facilities” means telecommunication facilities other than commercial telecommunication facilities that a person installs for his own telecommunication use;

    6. the term “telecommunication service” means connecting of customer’s communication through the use of telecommunication facilities or providing telecommunication facilities for customer’s communication;

    7. the term “telecommunication business” means the business of providing telecommunication service;

    8. the term “telecommunications business operator” means a person who provides telecommunications service with holding a license or making a registration or report under this Act;

    9. the term “user” means a person who has made a contract for the use of any telecommunications service with the telecommunications business operator in order to receive a provision of telecommunications service;

    10. the term “universal service” means the basic telecommunications service which any user may receive at reasonable fees anytime and anywhere;

    11. the term “key communication service” means the telecommunication service such as telephone and internet services which transmit or receive voice, data, image, etc. without changing their content and the telecommunication service where telecommunication line facilities is lent for transmission and receipt of voice, data, image, etc., provided, however that individual telecommunication services determined and announced by the Korea Communications Commission (individual telecommunication service under Article 6) are excluded;

    12. the term “value-added telecommunication service” means telecommunication services other than key communication services;

    13. the term “special type of value-added communications services” means each of the following services:

    A. value-added communications services provided by “special type of online service providers” as the term, “special type of online service providers,” is defined in Article 104 of the Copyright Act;

    B. any value-added communications services provided by and among individuals which, by using computers, store or send, or aim at sending, any information defined in Article 3(1) of the Framework Act on National Informatization.

    Article 3 (Duty of Providing Services, etc.)

    (1) A telecommunications business operator shall not refuse to provide any telecommunications service, without justifiable reasons.

    (2) A telecommunications business operator shall guarantee the fairness, speediness and accuracy in performing his business.

    (3) A fee for telecommunications service shall be reasonably fixed so as to ensure a smooth development of telecommunications business and to provide the users with convenient and diverse telecommunications services in the fair and inexpensive manner.

    Article 4 (Universal Service)

    (1) All telecommunications business operators shall have the obligation to provide universal service or to replenish the losses incurred by such provisions.

    (2) The Communications Commission may, notwithstanding the provisions of paragraph (1), exempt the telecommunications business operator in each of the following subparagraphs from the obligation specified paragraph (1) above:

    1. the telecommunications business operator determined by the Enforcement Decree as a telecommunications business operator for whom an imposition of obligation under paragraph (1) is deemed inadequate in view of the peculiarity of telecommunications service

    2. the telecommunications business operator whose turnover of telecommunications service is less than the amount as determined by the Enforcement Decree within the limit of 1/100 of total turnover of the telecommunications services, from the relevant obligations.

    (3) The details of universal service shall be determined by the Enforcement Decree in consideration of the following matters:

    1. Level of the development of information and communications technology;

    2. Level of the dissemination of telecommunications service;

    3. Public interest and safety;

    4. Promotion of social welfare; and

    5. Acceleration of informatization.

    (4) In order to provide effective, stable universal service, the Korea Communications Commission may, in consideration of size and quality of universal service, level of price and the technical capability of a telecommunications business operator, designate a telecommunications business operator through the method and procedure prescribed by the Enforcement Decree.

    (5) Under the method and procedure prescribed by the Enforcement Decree, the Korea Communications Commission may have a telecommunications business operator bear compensation for losses incurred in the course of providing universal service based on the total sales.

    CHAPTER II.- TELECOMMUNICATIONS BUSINESS

    SECTION 1.- General Provisions

    Article 5 (Classification, etc. of Telecommunications Business)

    (1) The telecommunications businesses shall be classified into a key communications business, a specific communications business and a value-added communications business.

    (2) The key communications business shall be the business to install telecommunication line facilities, and thereby provide the key telecommunication service by making use of telecommunication line facilities.

    (3) The specific communications business shall correspond to one of the following subparagraphs:

    1. Business which provides a key communications service by making use of telecommunication line facilities, etc. of a person who has obtained a license for key communications business under Article 6 (hereinafter referred to as a “key communications business operator”); and

    2. Business which installs the telecommunications facilities in the premises as determined by the Enforcement Decree, and provides a telecommunications service therein by making use of the said facilities.

    (4) The value-added communications business shall be the business providing value-added communication services.

    SECTION 2.- Key Communications Business

    Article 6 (License etc. of Key Communications Business Operator)

    (1) A person who intends to run a key communications business shall obtain a license from the Korea Communications Commission.

    (2) The Korea Communications Commission shall, in granting a license under paragraph (1), comprehensively examine the matters falling under each of the following subparagraphs:

    1. financial capability necessary for implementing the key communication service plan;

    2. technical capability necessary for implementing the key communication service plan,

    3. adequacy of plans for a user protection;

    4. other matters relevant to capacity for providing stable key communication services as determined under the Enforcement Decree of the Act.

    (3) The Communications Commission shall set forth the detailed examination criteria by examining item under paragraph (2), period for license and outline of application for license, and make a public announcement thereof

    (4) The Korea Communications Commission may, in case where it grants a license for key communications business under paragraph (1), attach the conditions necessary for the promotion of fair competition, protection of users, improvement of service quality and efficient employment of resources for information and communication, in this case such conditions shall be published on its official publication and official webpage.

    (5) A person subject to a license under paragraph (1) shall be limited to a juristic person.

    (6) Procedures for a license under paragraph (1) and other necessary matters shall be determined by the Enforcement Decree.

    Article 7 (Reasons for Disqualification for License)

    Persons falling under each of the following subparagraphs shall not be entitled to obtain the license for a key communications business as referred to in Article 6:

    1. The State or local governments;

    2. Foreign governments or foreign corporations; and

    3. Corporations whose stocks are owned by foreign governments or foreigners in excess of the restrictions on stock possessions as referred to in Article 8 (1).

    Article 8 (Restrictions on Stock Possessions of Foreign Governments or Foreigners)

    (1) The stocks of a key communications business operator (excluding non-voting stocks under Article 370 of the Commercial Act, and including the stock equivalents with voting rights, such as stock depositary receipts, etc. and investment equities; hereinafter the same shall apply) shall not be owned in excess of 49/100 of the gross number of issued stocks, when adding up all of those owned by the foreign governments or foreigners.

    (2) A corporation whose largest stockholder(hereinafter referred to as the “largest stockholder “) under Article 9(1)1 of the Financial Investment Services and Capital Markets Act is a foreign government or a foreigner (including, throughout this Act, a specially-related person under Article 9(1)1 of the Financial Investment Services and Capital Markets Act) and not less than 15/100 of the gross number of its issued stocks is owned by said foreign government or foreigner (hereinafter referred to as the “fictitious corporation of foreigners”) shall be regarded as a foreigner.

    (3) A corporation that owns less than 1/100 of the gross number of stocks issued by a key communications business operator shall not be regarded as a foreigner, even if it is equipped with the requirements as referred to in paragraph (2).

    Article 9 (Grounds for Disqualifying Officers)

    (1) Any person falling under each of the following subparagraphs shall be disqualified to serve as an officer of any key communications business operator:

    1. A minor, an incompetent or a quasi-incompetent;

    2. A person who has yet to be reinstated after having been declared bankrupt;

    3. A person who has been sentenced to imprisonment without prison labor or a heavier punishment on charges of violating this Act, the Framework Act on Telecommunications, the Radio Waves Act or the Act on Promotion of Information and Communications Network Utilization and Information Protection (excluding matters not directly related to telecommunication business, hereinafter “this Act, etc.”), and for whom three years have yet to pass from the date on which the execution of the sentence is terminated (including a case where the execution of the sentence is deemed to be terminated) or the execution of the sentence is exempted;

    4. A person who is in a stay period after having been sentenced to a stay of the execution of the imprisonment without prison labor or a heavier punishment on charges of violating this Act, etc.;

    5. A person who has been sentenced to a fine on charges of violating this Act, etc. and for whom one years have yet to pass from the date of such sentence; and

    6. A person who has been subject to a disposition taken to revoke all or part of his permission in accordance with Article 20 (1), a disposition taken to revoke all or part of his registration in accordance with Article 27 (1), or an order given in accordance with paragraph (2) of the same Article to discontinue all or part of his business and for whom three years have yet to pass from the date of such disposition or order. In the case of a corporation, the person refers to the person who commits the act of causing the disposition to revoke permission, the disposition to revoke registration or the order to discontinue business, and its representative.

    (2) In the event that any officer is found to fall under each subparagraph of paragraph (1) or is found to fall under each subparagraph of paragraph (1) at the time that he is selected and appointed as an officer, he shall rightly resign from the office.

    (3) Any act in which any officer has been involved prior to his resignation under paragraph (2) shall not lose its legal efficacy.

    Article 10 (Examination of Public Interest Nature of Stock Acquisition, etc. by Key Communications Business Operator)

    (1) The Public Interest Nature Examination Committee (hereinafter referred to as the “Committee”) shall be established in the Korea Communications Commission in order to make an examination regarding whether or not  what falls under each of the following subparagraphs impedes the public interests as prescribed by the Enforcement Decree (hereinafter referred to as the “examination of public interest nature”), such as the national safety guarantee and maintenance of public peace and order, etc:

    1. Where the principal comes to own not less than 15/100 of the gross number of stocks issued by a key communications business operator, when adding up those owned by the specially-related person as referred to in Article 9 paragraph (1) subparagraph 1 of the Capital Market Integration Act(hereinafter referred to as the “specially-related person”);

    2. Where the largest stockholder of a key communications business operator is altered;

    3. Where a key communications business operator or any stockholder of a key communications business operator concludes a agreement for important management matters as prescribed by the Enforcement Decree, such as the appointment and dismissal of executives and the transfer or takeover, etc. of business of the relevant key communications business operator, with a foreign government or a foreigner; and

    4. Other cases as prescribed by the Enforcement Decree, where there exists a change in the stockholders who have de facto management rights of a key communications business operator.

    (2) Where a key communications business operator or any stockholder of a key communications business operator comes to fall under each of subparagraphs of paragraph (1), he shall file a report thereon with the Korea Communications Commission within thirty days from the time when such a fact took place.

    (3) Where a key communications business operator or any stockholder of a key communications business operator is to come to fall under each of subparagraphs of paragraph (1), he may, prior to the said situation, request the Korea Communications Commission to make an examination as referred to in paragraph (1).

    (4) Where the Korea Communications Commission has received a report as referred to in paragraph (2) or a request for examination as referred to in paragraph (3), it shall refer it to the Committee.

    (5) Where the Korea Communications Commission judges that there exists a danger of impeding the public interests by the cases falling under each of subparagraphs of paragraph (1) in view of the result of examination as referred to in paragraph (1), it may order the alteration of agreement detail and suspension of its implementation, the suspension of exercise of voting rights, or the sale of relevant stocks.

    (6) The report as referred to in paragraph (2) or (3), or the scope of key communications business operators to be examined of public interest nature, the procedures for reports and examinations of public interest nature and other necessary matters shall be stipulated by the Enforcement Decree.

    Article 11 (Composition and Operation, etc. of Public Interest Nature Examination Committee)

    (1) The Committee shall consist of not less than five but not more than ten members including one Chairman.

    (2) The Chairman of the Committee shall be the Vice Chairman of the Korea Communications Commission, and the members shall be the persons commissioned by the Chairman from among the public officials ranking Grade III or higher grade of related central administrative agencies or public officials who belong to senior executive service as specified by the Enforcement Decree of the Act, and falling under each of the following subparagraphs:

    1. Persons having profound knowledge and experiences in the information and communications;

    2. Persons recommended by the Government-contributed research institutes relating to the national safety guarantee and maintenance of public peace and order;

    3. Persons recommended by the nonprofit non-governmental organizations as referred to in Article 2 of the Assistance for Nonprofit Non-Governmental Organizations Act; and

    4. Other persons deemed necessary by the Chairman.

    (3) The Committee may conduct necessary investigations for the examination of public interest nature, or request the interested parties or the reference witnesses to provide the data. In such case, the relevant interested parties or the reference witnesses shall comply with it unless they have any justifiable reasons.

    (4) Where the Committee deems it necessary, it may have the interested parties or the reference witnesses attend the Committee, and hear their opinions. In such case, the relevant interested parties or the reference witnesses shall comply with it unless they have any justifiable reasons.

    (5) Matters necessary for the organization or operation, etc. of the Committee shall be prescribed by the Enforcement Decree.

    Article 12 (Restrictions, etc. on Stockholders of Excessive Possession)

    (1) Where a foreign government or a foreigner has acquired the stocks in contravention of the provisions of Article 8 (1), no voting rights shall be exercised for the stocks under the said excessive possession.

    (2) The Korea Communications Commission may order the stockholder who has acquired stocks in contravention of the provisions of Article 8 (1), a key communications business operator wherein exists the said stockholder, or the stock-holder of the fictitious corporation of foreigners, to make corrections in the relevant matters, with specifying the period within the limit of six months

    (3) Persons subjected to the order for corrections as referred to in paragraph (2) shall make corrections in the relevant matters within the specified period.

    (4) With regard to the stockholder in contravention of the provisions of Article 8 (1), a key communications business operator may refuse any renewals for the excessive portion in the register of stockholders or of members.

    Article 13 (Charge for Compelling Execution)

    (1) Against the persons who were subjected to the orders as referred to in Articles 10 (5) or 12 (2) or 18 (8)(hereinafter referred to as the “corrective orders”) and has failed to comply with them within the specified period, the Communications Commission may levy the charge for compelling the execution. In such case, the charge for compelling the execution leviable per day shall be not more than 3/1,000 of purchase prices of relevant possessed stocks, but in the case not related with the stock possession, it shall be the amount not exceeding 100 million won.

    (2) The period subject to a levy of the charge for compelling the execution as referred to in paragraph (1) shall be from the day next to the date of expiration of the period set in the corrective orders to the date of implementing the corrective orders. In such case, a levy of the charge for compelling the execution shall be made within 30 days from the day next to the expiration date of the period set in the corrective orders, except for the case where there exists a special reason.

    (3) Provisions of Article 53 (5) shall apply mutatis mutandis to the collection of the charge for compelling the execution.

    (4) Matters necessary for the levy, payment, refund, etc. of the charge for compelling the execution shall be prescribed by the Enforcement Decree.

    Article 14 (Issuance of Stocks)

    A key communications business operator shall, in a case of an issuance of stocks, issue the registered ones

    Article 15 (Obligation of Commencing Business)

    (1) A key communications business operator shall install telecommunications facilities and commence business within the period as fixed by the Korea Communications Commission.

    (2) The Korea Communications Commission may, in case where the said business operator is unable to commence business within the period under paragraph (1) due to force majeure and other unavoidable reasons, extend the relevant period only once, upon an application of the key communications business operator.

    Article 16 (Modification of License)

    (1) Where a key communications business operator intends to modify the important matters prescribed by the Enforcement Decree from among the matters licensed under Article 6, he shall obtain a modified license from the Korea Communications Commission, under the conditions as prescribed by the Enforcement Decree.

    (2) The provisions of Articles 6 (4) and Article 15 shall be applicable mutatis mutandis to a modified license for change under paragraph (1).

    Article 17 (Concurrent Operation of Business)

    (1) A key communications business operator shall, in case where he intends to run any of the businesses set forth in the following subparagraphs, obtain approval from the Korea Communications Commission: Provided that, this provision shall not apply to any key communications business operator with less than 30,000,000,000 Korean Won in turnover of services.

    1. manufacturing of telecommunications tools

    2. information and communications work pursuant to paragraph 3 of Article 2 of the Information and Communications Work Business Act (excluding renovation and consolidation work for electronic telecommunications network)

    3. services pursuant to subparagraph 6 of Article 2 of the Information and Communications Work Business Act (excluding renovation and consolidation of electronic telecommunications network).

    (2) The Korea Communications Commission shall grant approval under paragraph (1), in case where deemed that a key communications business operator is not likely to cause any impediments to the operation of telecommunications service by running a business under paragraph (1), and that it is required for the development of telecommunications.

    Article 18 (Takeover of Business and Merger of Juristic Persons etc.)

    (1) A person who belongs to any one of the categories set forth in the following paragraphs shall obtain an authorization from the Korea Communications Commission under the conditions as prescribed by the Enforcement Decree: Provided, notwithstanding subparagraph 3 below, that in case that person sells telecommunications circuit installations except the ones prescribed by the Enforcement Decree, he shall report it to the Korea Communications Commission under the conditions as determined by the Enforcement Decree

    1. a person who takes or intends to take over the whole or part of a key communications business

    2. a person who intends to merge with a juristic person which is a key communications business operator

    3. a key communications business operator intending to sell the telecommunications circuit installations necessary for provision of key communications service

    4. a person who, along with a certain related person intends to become the largest shareholder of a key communications business operator or own 15% of more of the issued shares of the key communications business operator.

    5. a person seeking to acquire control over a key communication business operator by acquiring shares or entering into an agreement, as specified by the Enforcement Decree of the Act

    6. a key communication business operator seeking to establish a company to provide part of the key communication services provided under authorization through such company.

    (2) The Korea Communications Commission shall, in case where it intends to grant authorization under paragraph (1), comprehensively examine the matters falling under each of the following subparagraphs:

    1. Appropriateness of financial and technical capability and business operational capability;

    2. Appropriateness of management of resources for information and communications, such as frequencies and telecommunications numbers, etc.;

    3. Impact on the competition of key communications business; and

    4. Impact on the protection of users and the public interests.

    5. Impact on public interests, such as the use of telecommunications facilities and communication networks, efficiency of research and development and international competitive power of the communications industry, etc.

    (3) Matters necessary for the detailed examination standards by examination items and the examination procedures, etc. under paragraph (2) shall be fixed and publicly announced by the Korea Communications Commission

    (4) A person falling under any of the following shall succeed to the telecommunication licensee status of the key communication business operator:

    1. A person who has taken over the business of a key communications business operator by obtaining an authorization under paragraph (1)

    2. a juristic person surviving a merger or that established by a merger, or that established by obtaining an authorization under paragraph (2)

    3. a company incorporated to provide part of key communication services with the approval under paragraph (1)6

    (5) The Korea Communications Commission may, in case where it grants authorization or authorization under paragraph (1), attach conditions under Article 6(4).

    (6) The Korea Communications Commission shall, in case where it intends to grant an authorization under paragraph (1), go through a consultation with the Fair Trade Commission. (Amended by Act nº 6230, Jan. 28, 2000; Act nº 8867, Feb. 29, 2008; Act nº 9481, March 13, 2009)

    (7) In regard to the criteria for rejection of authorization in paragraph (1), Article 7 shall be applicable mutatis mutandis.

    (8) In the event any person/entity subject to Article 1(4) or (5) fails to acquire the permit pursuant thereto, the Korea Communications Commission may order suspension of its voting right or sale of the applicable shares, and if the conditions attached under paragraph (5) are not carried out, may order such performance within a specific time frame.

    (9) A person seeking authorization under paragraph (1) shall not do each of the following prior to obtaining such authorization:

    1. unify communications networks,

    2. appoint officers,

    3. transferring, consolidating, entering into contract concerning disposing of facilities or

    4. take follow-up measures regarding establishment of a company.

    (10) Where a person falling under each of subparagraphs of paragraph (1) is subject to the examination of public interest nature, the person may submit the documents required for the examination of public interest nature at the same time when the person applies for the authorization under paragraph (1).

    Article 19 (Suspension, Closedown of Business or Dissolution of Juristic Persons, etc.)

    (1) A key communications business operator shall, in case where he intends to suspend or discontinue the whole or part of a key communications business run by him, as specified by the Enforcement Decree of the Act notify the users at least 60 days prior to the date of termination and obtain approval of such suspension or discontinuation from the Korea Communications Commission.

    (2) In the event separate measures of protection is deemed to be necessary for the protection of users upon suspension or discontinuance of the relevant key communications business, the Korea Communications Commission may order such measures (including assistance for membership change, bearing expenses, termination of membership) to be taken.

    (3) The Korea Communications Commission shall, in case where an application for approval or authorization under paragraph (1) is made, and where deemed that suspension, discontinuance of relevant business or a dissolution of a juristic person is likely to hamper the public interests, not grant the relevant approval or authorization.

    Article 20 (Cancellation of License, etc.)

    (1) The Korea Communications Commission may, in case where a key communications business operator falls under any one of the following subparagraphs, cancel whole or part of the relevant license or give an order to suspend the whole or part of business with fixing a period of no more than one year, provided that the license shall be cancelled entirely or partially if paragraph 1 is applicable:

    1. Where he has obtained a license by deceit and other illegal means;

    2. Where he has failed to implement the conditions under Articles 6 (4) and 18 (5);

    3. Where he has failed to observe the orders under Article 12 (2);

    4. Where he has failed to commence business within the period under Article 15 (1) (in case of obtaining an extension of the period under Article 15 (2), the extended period);

    5. Where he has failed to comply with the standardized terms and conditions, that is authorized or reported under Article 28 (1) and (2); and

    6. Where he fails to comply with an order for correction under Article 52 (1) or Article 92 (1) without any justifiable reasons.

    (2) Criteria and procedures for the dispositions under paragraph (1) and other necessary matters shall be determined by the Enforcement Decree.

    SECTION 3.- Specific Communications Business and Value-Added Communications Business

    Article 21 (Registration of Specific Communications Business Operator)

    (1) A person who intends to operate a specific communications service shall register the following matters with the Korea Communications Commission (including registration through information network) under the conditions as determined by the Enforcement Decree:

    1. Financial and technical capability;

    2. Plans for a user protection; and

    3. Business plans, etc. and other matters as determined by the Enforcement Decree.

    (2) The Korea Communications Commission may, upon receipt of the registration of a specific communications business under paragraph (1), attach the conditions necessary for the promotion of fair competition, protection of users, improvement of service quality and efficient employment of resources for information and communication.

    (3) A person subject to the registration of specific communications business under paragraph (1) shall be limited to a juristic person.

    (4) A person who registered his specific communications business under paragraph (1) (hereinafter referred to as a “specific communications business operator”) shall commence operation within 1 year from the registration date.

    (5) Procedures and requirements for the registration under paragraph (1) and other necessary matters shall be determined by the Enforcement Decree.

    Article 22 (Report, etc. of Value-Added Communications Business Operator)

    (1) A person who intends to run a value-added communications business shall report to the Korea Communications Commission (including reports via information network), according to the requirements and procedures as prescribed by the Enforcement Decree: Provided, That this shall not apply to a case where the size of capital, etc. is a small value-added communication business matching the criteria prescribed by the Enforcement Decree.

    (2) Notwithstanding the provisions of paragraph (1), a person who intends to operate a special type of value-added communications business shall register such business with the Korea Communications Commission (including registration through information network) after satisfying the following requirements: (Newly Inserted by Act No. 10656, May 19, 2011)

    1. a plan for implementing technical measures in order to perform the provisions of Articles 42, 42-2, 42-3, 45 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. and Article 104 of the Copyright Act;

    2. personnel and physical facilities necessary for providing services;

    3. financial soundness; and

    4. any other matters as prescribed by the Enforcement Decree such as a business plan.

    (3) Upon receipt of the registration of a value-added communications business pursuant to paragraph (2), the Korea Communications Commission may set conditions necessary to implement the plan referred to in subparagraph 1 of paragraph (2). (Newly Inserted by Act No. 10656, May 19, 2011)

    (4) When a key communications business operator seeks to operate value-added communication services, such value-added communication services are deemed to have been reported. (Amended by Act nº 10656, May 19, 2011)

    (5) A person who reported a value-added communications business under the first part of paragraph (1) or a person who registered such business under paragraph (2) shall commence operation within 1 year from the reporting date or registration date respectively. (Amended by Act nº 10656, May 19, 2011)

    (6) Procedures and requirements for the report under the first part of paragraph (1) and the registration under paragraph (2), and other necessary matters shall be determined by the Enforcement Decree. (Newly Inserted by Act No. 10656, May 19, 2011)

    Article 22-2 (Reasons for Disqualification for Registration)

    An individual, a juristic person for whom three years have yet to pass from the date on which the registration of his/its business is canceled pursuant to Article 27(2), or the major shareholder of such juristic person at the time of such cancellation (an investor as prescribed by the Enforcement Decree) may not make a registration under Article 22(2).

    [This Article Newly Inserted by Act No. 10656, May 19, 2011]

    Article 23 (Modification of Registered or Reported Matters)

    Specific communications business operator, a person who has made a report of a value-added communications business operator under the earlier part of Article 22(1), or a person who has made a registration of a value-added communications business under Article 22(2) shall, when he intends to modify the matters as determined by the Enforcement Decree from among the relevant registered or reported matters, make in advance a modified registration or modified report (including modified registration or modified report through information network) to the Korea Communications Commission under the conditions as prescribed by the Enforcement Decree.

    (Amended by Act nº 10656, May 19, 2011)

    Article 24 (Transfer or Takeover, etc. of Business)

    In case where there exists a transfer or takeover of the whole or part of a specific communications business or a value-added communications business, or a merger or succession of a juristic person which is a specific communications business operator or a value-added communications business operator (a person who has reported value-added communications services pursuant to the first part of Article 22(1), a person who has made a registration of a value-added communications business under Article 22(2) or is deemed to have made such reporting under the latter part of paragraph (1) of the same Article or paragraph (4) of the same Article, hereinafter refer to the same), each of the following persons shall make the report thereon (including reports through information network) to the Korea Communications Commission, according to the requirements and procedures as prescribed by the Enforcement Decree: (Amended by Act nº 10656, May 19, 2011)

    1. a person who has taken over the relevant business,

    2. the juristic person surviving the merger, the juristic person founded by the merger, or

    3. the successor to the business in question

    Article 25 (Succession of Business)

    In case where there have existed a transfer or takeover of a specific communications business or a value-added communications business, a merger of a juristic person which is a specific communications business or a value-added communications business operator, or a succession of a value-added communications business, under Article 24, each of the following persons shall succeed to the status of a former specific communications business operator or a value-added communications business operator.

    1. a person who has taken over the business,

    2. a juristic person surviving a merger, or a juristic person founded by a merger or

    3. a successor to the business

    Article 26 (Suspension or Closedown, etc. of Business)

    (1) A specific communications business operator or a value-added communications business operator shall, in case where he intends to suspend or close down the whole or part of his business, in a manner determined in the Enforcement Decree of the Act, notify the relevant contents to the users of relevant services, and report thereon to the Korea Communications Commission (including reports through information network) not later than thirty days prior to the slated date of the relevant suspension or closedown. In this case, the business shall not be continually suspended for more than 1 year.

    (2) Where a juristic person which is a specific communications business operator or a value-added communications business operator is dissolved for reasons other than a merger, a relevant liquidator (referred to a trustee in a bankruptcy, when it is dissolved by bankruptcy) shall report thereon without delay to the Korea Communications Commission (including reports through information network).

    Article 27 (Cancellation of Registration and Order for Closedown of Business)

    (1) The Korea Communications Commission may, when a specific communications business operator falls under any of the following subparagraphs, cancel his registration wholly or partially, or suspend his business wholly or partially by specifying the period of not more than one year: Provided, That when he falls under subparagraph 1, the Korea Communications Commission shall cancel whole or part of his registration: (Newly Inserted by Act nº 5385, Aug. 28, 1997; Act nº 5564, Sep. 17, 1998; Act nº 5835, Feb. 8, 1999; Act nº 5986, May 24, 1999; Act nº 6230, Jan. 28, 2000; Act nº 6360, Jan. 16, 2001, Act nº 7916, Mar. 24, 2006; Act nº 8198, Jan. 3, 2007; Act nº. 8425, May 11, 2007; Act nº 8867, Feb. 29, 2008)

    1. Where he makes a registration by deceit and other illegal means;

    2. Where he fails to implement the conditions under Article 21 (2);

    3. Where he fails to commence business within one year from the date on which a registration was made under Article 21 (4), or in violation of the latter part of Article 26(1) continually suspends business operation for not less than one year;

    4. Where he fails to comply with an order under Article 52 (1) or an order for correction Article 92 (1) without any justifiable reasons;

    (2) The Minister of Information and Communication may, when a value added communications business operator falls under any of the following subparagraphs, issue an order to him for a closedown of the whole or part of business (in case of a special type of value-added communications business operator, for a cancellation of the whole or part of business) or for a suspension of the whole or part of business by specifying a period of not more than one year: Provided, That when he falls under subparagraph 1,, the said Minister shall issue an order to him for a closedown of whole or part of business: (Amended by Act nº 10656, May 19, 2011)

    1. Where he makes a report or registration by deceit and other illegal means;

    2. Where he fails to implement the conditions under Article 22(3);

    3. Where he fails to commence the business within one year from the reporting date or registration date under Article 22(5), or in violation of the latter part of Article 26(1) suspend the business operation for not less than one year;

    4. Where he fails to comply with an order under Article 52 (1) or a correction order under Article 92 (1) without any justifiable reasons;

    5. Where he fails to comply with an order to take corrective measures under Article 64(4) of the Act on Promotion of Information and Communications Network Utilization and Information Protection, Etc. without any justifiable reasons;

    6. Where he who has been punished by a fine for negligence pursuant to Article 142(1) and Article 142(2)3 of the Copyright Act more than 3 times is subject to a fine for negligence again and such an order is requested by the Minister of Culture, Sports and Tourism after the Korea Copyright Commission’s deliberation pursuant to Article 112 of the same Act.

    (3) Criteria and procedures for dispositions taken under paragraph (1) or (2) and other necessary matters shall be determined by the Enforcement Decree of the Act.

    CHAPTER III.- TELECOMMUNICATIONS SERVICE

    Article 28 (Report, etc. of Standardized Terms and Conditions)

    (1) A key communications business operator shall set forth the fees and other terms for use by service with respect to the telecommunications service which he intends to provide (hereinafter referred to as the “standardized terms and conditions”), and report thereon (including a modified report, hereinafter refer to the same) to the Korea Communications Commission.

    (2) Notwithstanding paragraph (1), in a case of a key communications service of key communications business operator whose size of business and market share correspond to the standards as determined by the Enforcement Decree, it shall obtain an authorization of the Korea Communications Commission (including a modified authorization, hereinafter refer to the same), provided that, any decrease in the service-specific charges included the approved standard terms and conditions of usage shall be reported to the Korea Communications Commission.

    (3) In regard to the main body of paragraph (2), the Korea Communications Commission shall authorize the standardized terms and conditions, if it falls under the criteria of every following subparagraph:

    1. Fees for telecommunications service shall be reasonably calculated considering but not limited to costs of supply, profits, classification of costs/ profits by labor, cost savings achieved by methods of provision of labor, and effects on fair competitive environments;

    2. Matters concerning the responsibility of key communications business operators and relevant users, cost-sharing methods concerning the installation work of telecommunications facilities and other works shall not be unreasonably disadvantageous to users.

    3. Forms of use of telecommunication line facilities by other telecommunications business operators or users shall not be unduly restricted;

    4. Undue discriminatory treatments shall not be made to specific persons; and

    5. Matters on securing the important communications under Article 85 shall take into consideration matters such as achieving efficient performance of State’s function.

    (4) A person intending to acquire the approval under paragraph (1) and (2) or file a report with respect to the telecommunications services shall submit the supporting data for calculation of fee (including subscription fee, basic fee, usage fee, value-added service fee, and actual expense). In case of business change, a table comparing the old (before change) and new (after change) supporting data should be submitted to the Korea Communications Commission for comparison.

    (5) Details necessary and not otherwise specified in paragraphs (1) through (4) in regard to the scope of and procedures of reporting and authorization shall be specified under the Enforcement Decree of the Act.

    Article 29 (Reduction or Exemption of Fees)

    A key communications business operator may reduce or exempt the fees for telecommunications service under the conditions prescribed by the Enforcement Decree, such as national security guarantee, disaster relief, social welfare and public interest.

    Article 30 (Restriction on Use by Others)

    No person shall intermediate other’s communications or provide for other’s communications by making use of telecommunications services provided by a telecommunications business operator: Provided, That the same shall not apply to the case falling under any of the following subparagraphs:

    1. Where it is needed to ensure the prevention and rescue from disaster, traffic and communication, and the supply of electricity, and to maintain order in a national emergency situation;

    2. Where telecommunications services are incidentally rendered to clients while running a business other than the telecommunications business;

    3. Where it is allowed to use on a trial basis for the purpose of developing and marketing telecommunications facilities, such as terminal devices, etc. which enable to use the telecommunications services;

    4. Where any user permits any third party to use to the extent that the latter does not use repeatedly; and

    5. Where it is necessary for the public interests or where the business run by any telecommunications business operator is not impeded, which is prescribed by the Enforcement Decree.

    Article 31 (Use of Transmission or Line Equipment, etc.)

    (1) The composite cable TV business operator, transmission network business operator, or relay cable broadcasting business operator under the Broadcasting Act may provide the transmission or line equipment or the cable broadcasting equipment possessed under the methods prescribed by the Enforcement Decree to the key communications business operators.

    (2) The composite cable TV business operator, transmission network business operator, or relay cable broadcasting business operator under the Broadcasting Act shall, when he intends to provide value-added communications services by making use of the transmission or line equipments or cable broadcasting equipments, make a report thereon to the Korea Communications Commission pursuant to Article 22 (1).

    (3) The provisions of Articles 35 through 37 and 37 through 55 shall be applicable mutatis mutandis to the transmission or line equipment or cable broadcasting facilities under paragraph (1).

    (4) The provisions of Article 28 (2) through (7) of the Framework Act on Telecommunications shall be applicable mutatis mutandis to the offer of services under paragraph (2).

    Article 32 (Protection of Users)

    (1) A telecommunications business operator shall take a prompt measure on the reasonable opinions or dissatisfactions raised by the users with respect to the telecommunications service. In this case, if it is difficult to take a prompt measure, he shall notify the users of the reasons thereof and the schedule for measures.

    (2) Compensations for the damages incurred by the occurrence of reasons causing the opinions or dissatisfactions under paragraph (1) and by the delay of relevant measures shall be made pursuant to Article 33.

    (3) A telecommunications business operator providing key communications services shall subscribe a guarantee insurance with the person designated by the Korea Communications Commission as beneficiary in an amount determined in accordance with the criteria specified under the Enforcement Decree of the Act and not exceeding the aggregate prepaid phone service charges to be received prior to providing prepaid phone services to be able to compensate losses to users arising from not being able to provide services after receiving service charges in advance. Provided, that the foregoing requirement may be waived in the case specified under the Enforcement Decree of the Act where such telecommunications business operator’s financial capacity and services charges are taken in consideration

    (4) The person designated as beneficiary under paragraph (3) shall distribute insurance proceeds received under the guarantee insurance under paragraph (3) to users who have not received services after paying services charges in advance.

    (5) Details necessary in regard to the subscription, renewal and distribution of insurance proceeds under paragraph (3) and (4) shall be specified in the Enforcement Decree of the Act.

    Article 32-2 (Notice of Excess of Maximum Limit of Fees)

    (1) A telecommunications business operator utilizing frequencies assigned under the Radio Waves Act shall notify the users of any of the following facts when it occurs:

    1. When a user exceeds the maximum limit of telecommunications service fees initially committed by the user;

    2. When any fees incurred from using international telecommunications services such as international call are charged to a user.

    (2) Any matters necessary for users subject to notice or method of notice under paragraph (1) shall be determined and publicly announced by the Korea Communications Commission.

    (Article amended by Act nº 10656, May 19, 2011)

    Article 33 (Compensation for Damages)

    A telecommunications business operator shall make compensations when he inflicts any damages on the users in the course of providing telecommunications services: Provided, That if such damages are the results of force majeure, or of intent or negligence of the users, the relevant liability for compensations shall be reduced or exempted.

    CHAPTER IV.- PROMOTION OF COMPETITION AMONG THE TELECOMMUNICATIONS BUSINESS

    Article 34 (Promotion of Competition)

    (1) The Korea Communications Commission shall exert efforts to construct an efficient competition system and to promote fair competitive environments, in the telecommunications services.

    (2) The Korea Communications Commission shall conduct annual evaluation of competition system with respect to key communications business in order to construct an efficient competition system and to promote fair competition in the telecommunication services industry pursuant to paragraph (1)above.

    (3) The specific evaluation standards, procedure and method for evaluating competition system under paragraph (2) above shall be prescribed by the Enforcement Decree.

    Article 35 (Provision of Facilities, etc.)

    (1) A key communications business operator or an institution constructing, operating and managing road, railroad, subway, water supply/sewage, electric poles, cables, telecommunications line facilities (“facility management institution”) may, upon receipt of a request for the provision of conduit line, common duct, electric poles, cables, operation sites and other facilities (including telecommunication facilities, hereinafter the same) or facilities (“facilities, etc.”) from other key communications business operator, provide the facilities, etc. by concluding an agreement with him.

    (2) A key communications business operator falling under any of the following subparagraphs shall, upon receipt of a request under paragraph (1), provide the facilities, etc. by concluding an agreement, notwithstanding the provisions of paragraph (1), provided that the foregoing is not applicable in case there is a usage plan, etc. of the facility management institution:

    1. A key communications business operator who possesses the equipments which are indispensable for other telecommunications business operators in providing the telecommunications services; and

    2. Each of the following facility management institutions owning conduit line, common duct, electric pole, cable and other facilities, etc.

    A. the Korea Expressway Corporation organized under the Korea Highway Corporation Act

    B. the Korea Water Resources Corporation organized under the Korea Water Resources Corporation Act

    C. the Korea Electric Power Corporation organized under the Korea Electric Power Corporation Act

    D. the Korea Rail Network Authority organized under the Korea Rail Network Authority Act

    E. local public enterprises under Local Public Enterprise Act

    F. municipalities under Local Autonomy Act

    G. the Regional Construction Management Administration under the Road Act

    3. A key communications business operator whose business scale and market shares, etc. of key communications services are equivalent to the criteria as determined by the Enforcement Decree.

    (3) The Korean Communications Commission shall set forth and publicly notify the scope of facilities, etc., the conditions, procedures and methods for the provision of facilities, and the standards for calculation of prices under paragraphs (1) and (2). In this case, the scope of facilities, etc. to be provided under paragraph (2) shall be determined in view of the demand for facilities, etc. by the key communications business operators and facility management institution falling under each subparagraph of the same paragraph.

    (4) A telecommunications business operator in receipt of provisions of the facilities, etc. may install the apparatus enhancing the efficiency of the relevant facilities, within the limit necessary for the provision of the licensed telecommunications services.

    (5) For efficient use and management of facilities, etc., the Korea Communications Commission may request data on facilities, etc., from telecommunications business operators and facility management institutions in a manner specified under the Enforcement Decree of the Act. In this case, the pertinent telecommunications business operator or facility management institution shall honor such demand unless there are reasonable grounds for not doing so.

    (6) For provision of facilities, etc. under paragraphs (1) and (2), the Korea Communications Commission may appoint an expert institution.

    (7) Details necessary for appointment and operation guidelines for expert institutions under paragraph (6) shall be determined and announced by the Korea Communications Commission.

    Article 36 (Joint Utilization of Subscriber’s Lines)

    (1) A key communications business operator shall, in case where other telecommunications business operators as determined and publicly noticed by the Korea Communications Commission have made a request for a joint utilization with respect to the lines installed in the section from the exchange facilities directly connected with the users to the users (hereafter in this Article, referred to as the “subscriber’s lines”), allow it.

    (2) The Korea Communications Commission shall set forth and publicly notify the scope of joint utilization of the subscriber’s lines under paragraph (1), its conditions, procedures and methods, and the standards for calculation of prices.

    Article 37 (Joint Utilization of Radio Communications Facilities)

    (1) A key communications business operator may, upon receipt of a request for the joint utilization of radio communications facilities (hereinafter referred to as the “joint utilization”) from other key communications business operators, allow it by concluding an agreement. In this case, the prices for the joint utilization among the key communications business operators as set forth and publicly notified by Korea Communications Commission shall be computed and settled accounts by a fair and reasonable means.

    (2) The key communications business operators as determined and publicly notified by the Korea Communications Commission shall, upon receipt of a request for the joint utilization from other key communications business operators as determined and publicly notified by the Korea Communications Commission, allow it by concluding an agreement, notwithstanding the provisions of paragraph (1), in order to enhance the efficiency of the telecommunications business and to protect the users.

    (3) The Korea Communications Commission shall set forth and publicly notify the standard for computing the prices for joint utilization under the latter part of paragraph (1) and its procedures and payment methods, etc., and the scope of joint utilization under paragraph (2), its conditions, procedures and methods, and the computation of prices, etc.

    Article 38 (Wholesale Provision of Telecommunication Services)

    (1) Upon request from other telecommunication business operator, a key communications business operator may enter into an agreement to allow such telecommunication business operator to resell the telecommunication services it provides to users (“resale”) by providing such services to such other telecommunication business operator or permitting part or all of the telecommunication facilities necessary for such provision of telecommunication services (“wholesale provision”).

    (2) To encourage competition in the telecommunication industry, the Korea Communications Commission may, upon request from a telecommunication business operator, designate and announce telecommunication s services (“designated wholesale services”) of a key communications business provider which would need to enter into an agreement for wholesale provision (“designated wholesale provider”). In this case, designated wholesale services of the designated wholesale provider shall be selected from telecommunication services of key communications business providers satisfying the criteria specified in the Enforcement Decree of the Act which would take into consideration business size and market share.

    (3) After evaluating the competition status of the communications market each year, if the Korea Communications Commission determines that the competition in the telecommunications industry has increased to the degree where the sufficient wholesale of telecommunications services have been provided or the set criteria are not met, it may withdraw its designation of designated wholesale services of the designated wholesale provider.

    (4) The Korea Communications Commission shall determine and announce the terms and conditions of the wholesale provision when the designated wholesale provider enters into an agreement about the designated wholesale services. In this case, the consideration shall be calculated on the basis of subtracting avoidable costs (costs that the key communications business operator can avoid when not providing services directly to users) from retail prices of the designated wholesale services.

    (5) Upon request for wholesale provision from other telecommunications business operator, a key communications business operator shall enter into an agreement within 90 days unless there are special reasons and shall report such agreement to the Korea Communications Commission in a manner specified in the Enforcement Decree of the Act within 30 days from the execution of such agreement. The same applies in the case of a change or abolition of the agreement.

    (6) An agreement under paragraph (5) shall satisfy the criteria announced by the Korea Communications Commission under paragraph (4).

    Article 39 (Interconnection)

    (1) A telecommunications business operator may allow the interconnection by concluding an agreement, upon a request from other telecommunications business operators for an interconnection of telecommunications facilities.

    (2) The Korea Communications Commission shall set forth and publicly notify the scope of interconnections of telecommunications facilities, the conditions, procedures and methods, and the standards for calculation of prices under paragraph (1).

    (3) Notwithstanding the provisions of paragraphs (1) and (2), the key communication business operators falling under any of the following subparagraphs shall allow the interconnection by concluding an agreement, upon receipt of a request under paragraph (1):

    1. A key communications business operator who possesses such facilities as are indispensable for a provision of telecommunications services by other telecommunications business operators; and

    2. A key communications business operator whose business size of key communications services and the ratio of market shares are compatible with the standards as determined by the Enforcement Decree.

    Article 40 (Prices of Interconnection)

    (1) Prices for using the interconnection shall be calculated by a fair and proper means and deducted from each other’s accounts. The detailed standards for such calculation, their procedures and methods shall be governed by the standards of Article 39 (2).

    (2) A telecommunications business operator may deduct the prices for interconnection from each other’s accounts under the conditions as prescribed by the standards under Article 39 (2), if he suffers any disadvantages due to the causes of no liability on his part, in the method of interconnection, the quality of connected conversations, or the provision of information required for interconnection, etc.

    Article 41 (Joint Use, etc. of Telecommunications Facilities)

    (1) A key communications business operator may allow an access to or a joint use of the telecommunications equipment or facilities by concluding an agreement, upon receipt of a request from other telecommunications business operators for an access to or a joint use of the telecommunications equipment or facilities such as pipes, cables, poles, or stations of the relevant key communications business operator, for the establishment or operation of facilities required for interconnection of telecommunications facilities.

    (2) The Korean Communications Commission shall set forth, and make a public notice of, the scope, conditions, procedures and methods for an access to or a joint use of telecommunications equipment or facilities, and the standards for computation of prices under paragraph (1).

    (3) Notwithstanding the provisions of paragraph (1), a key communications business operator falling under any of the following subparagraphs shall allow an access to or a joint use of the telecommunications equipment or facilities under paragraph (1) by concluding an agreement, upon a receipt of request under paragraph (1):

    1. A key communications business operator who possesses such facilities as are indispensable for a provision of telecommunications services by other telecommunications business operators; and

    2. A key communications business operator whose business size of key communications services and the ratio of market shares are compatible with the standards as determined by the Enforcement Decree.

    Article 42 (Provision of Information)

    (1) A key communications business operator may provide requested information by concluding an agreement, upon a receipt of request from other telecommunications business operators for a provision of information related to technological information or the user’s personal matters which are required for a provision or wholesale provision of facilities, etc., interconnection, or joint use, etc. and imposition and collection of fees and a guide to the telecommunications number.

    (2) The Korean Communications Commission shall set forth, and make a public notice of, the scope, conditions, procedures and methods for a provision of information, and the standards for computation of prices under paragraph (1).

    (3) Notwithstanding the provisions of paragraph (1), a key communications business operator falling under any of the following subparagraphs shall provide the requested information by concluding an agreement, upon a receipt of request under paragraph (1):

    1. A key communications business operator who possesses such facilities as are indispensable for a provision of telecommunications services by other telecommunications business operators; and

    2. A key communications business operator whose business size of key communications services and the ratio of market shares are compatible with the standards as determined by the Enforcement Decree.

    (4) A key communications business operator under paragraph (3) shall set forth the technical standards required for a use by other telecommunications business operators or users by means of a connection of a monitor and other telecommunications equipment on the relevant telecommunications facilities, the standards for use and provision, and other standards required for a creation of fair competitive environments, and make a public notice thereof by obtaining approval from the Korea Communications Commission.

    Article 43 (Prohibition of Information Diversion)

    (1) A telecommunications business operator shall not divulge any information concerning an individual user which has been obtained due to a provision of his own service, a provision of facilities, etc., wholesale provision, an interconnection or joint use, etc. Provided, That the same shall not apply, when there exists the consent of the principal or the case under a lawful procedure pursuant to the provisions of the Acts.

    (2) A telecommunications business operator shall use the technological information or personal data of users obtained under Article 42(1) and (3) within the context of purposes thereof, and may not use it unjustly, or provide it to the third parties.

    Article 44 (Report, etc. of Agreement on Interconnection, etc.)

    (1) A key communications business operator and facility management institution shall conclude an agreement under Article 35 (1) and (2), the earlier part of 37 (1), 39 (1), 41 (1) or 42 (1) within ninety days unless there exist any special reasons and report it to the Korea Communications Commission in a manner specified in the Enforcement Decree of the Act within 30 days from the execution of such agreement, upon receipt of a request from other telecommunications business operators for a provision, a joint utilization, an interconnection or a joint use, etc. of telecommunications facilities, or a provision of information. The same applies in the case of a change or abolition of the agreement.

    (2) Notwithstanding the provision of paragraph (1), in case of an agreement in which a key communications business operator under the latter part of Article 37 (1) and (2), Articles 39 (3), 41 (3), and 42 (3) is a party concerned, shall enter into an agreement within 90 days upon receipt of the request, unless there is a special reason, and the key communications business operator receiving the request shall apply for authorization to the Korea Communications Commission in a manner specified in the Enforcement Decree of the Act within 30 days from the execution of the Agreement and reveal the contents of the agreement within 30 days from the authorization date. The same applies in the case of a change or abolition of the agreement

    (3) The agreement under paragraphs (1) and (2) shall meet the standards which are publicly notified by the Korea Communications Commission under Articles 35 (3), 37 (3), 39 (2), 41 (2)or 42 (2).

    (4) The Korea Communications Commission may, if any application for authorization referred to in paragraph (2) needs supplemented, order such application for authorization supplemented for a fixed period.

    (5) The agreement under Articles 41 (1) and 42 (1) may be concluded by an inclusion in the agreement under Article 39 (1).

    Article 45 (Ruling of the Korea Communications Commission)

    (1) A telecommunications business operator or user may request to the Korea Communications Commission for an arbitration if they fail to agree on are not able to agree on any of the following:

    1. indemnification under Article 33

    2. execution of an agreement within a 90-day period regarding provision of facilities, etc. interconnection, joint use or provision of information, etc.

    3. performance or indemnification under an agreement regarding provision of facilities, etc. interconnection, joint use or provision of information, etc

    4. other disputes concerning telecommunications business or matters specified as subject to the Korea Communications Commission’s ruling under other bodies of law

    (2) Upon receipt of the request for an arbitration under paragraph (1), the Korea Communications Commission shall notify the parties of that fact and set a timeline for providing them with a chance to make their cases, provided that the foregoing is not applicable if a relevant party does not submit to the procedures without any justifiable reason.

    (3) The Korea Communications Commission shall make a ruling within 90 days from the request for arbitration provided that such period may be extended by one additional 90-days upon the resolution of the Korea Communications Commission if it is not possible to make a ruling within the original 90-day period for any unavoidable reason.

    (4) If any part to the arbitration files a suit during the arbitration proceeding, the Korea Communications Commission shall suspend the arbitration proceeding and notify the other party of that fact. The same applies if it is found out that a lawsuit was filed prior to the receipt of request for arbitration.

    (5) When it has made a ruling for the request made under paragraph (1), the Korea Communications Commission shall provide such written ruling to the parties without delay.

    (6) Within 60 days from the date on which the originals of written ruling of the Korea Communications Commission were sent to the parties, if no lawsuit regarding the dispute between the parties to the arbitration has been filed or such lawsuit has been withdrawn or the parties clearly indicate their acceptance of the ruling to the Korea Communications Commission, an agreement equivalent to the contents of the ruling shall be deemed to have been made.

    Article 46 (Solicitation for Outside Arbitration)

    If the Korea Communications Commission, upon receiving request for arbitration under Article 45(1), deems that it is inappropriate to conduct arbitration or is necessary for other reasons, it may form a separate commission for each dispute and solicit for outside arbitration.

    Article 47 (Demand for Attendance, Hearing, etc.)

    When necessary for proceeding with the arbitration case, the Korea Communications Commission may on its own motion or upon request from a party take any of the following actions:

    1. demand for attendance of a party or witness and hold a hearing

    2. demand for appraisal to an appraiser

    3. demand for submission of documents or objects relevant for the dispute and provisional seizure of the documents or objects so submitted.

    Article 48 (Management Plan for Telecommunications Number)

    (1) The Korea Communications Commission shall formulate and enforce the management plan for telecommunications number, in order to make an efficient provision of telecommunications service, and the promotion of user’s convenience and of the environments of fair competition among telecommunications business operators.

    (2) The Korea Communications Commission shall, when he has formulated the plans under paragraph (1), make a public notice thereof. This shall also apply to any alterations in the established plan.

    (3) A telecommunications business operator shall observe the matters publicly noticed under paragraph (2).

    Article 49 (Accounting Adjustment)

    (1) A key communications business operator shall adjust the accounting, prepare a business report for the preceding year by the end of within 3 months after the end of each fiscal year, and submit it to the Korea Communications Commission, under the conditions as determined by the Enforcement Decree, and keep the related books and authoritative documents.

    (2) The Korea Communications Commission shall, when it intends to determine the matters of accounting adjustments under paragraph (1), go in advance through a consultation with the Minister of Strategy and Finance.

    (3) The Korea Communications Commission may verify contents of any business report submitted by any key communications business operator in accordance with paragraph (1).

    (4) The Korea Communications Commission may, if it is necessary to conduct the verification referred to in paragraph (3), order the relevant key communications business operator to submit related material or launch inspection necessary to ascertain the facts.

    (5) The Korea Communications Commission shall, when it intends to launch inspection in accordance with paragraph (4), notify the relevant key communications business operator of the plans of such inspection including inspection period, reasons, and contents of the inspection within seven (7) days prior to the scheduled date of inspection.

    (6) A person verifying the contents pursuant to paragraph (4) shall present the proof of the authorization therefor and give documents indicating his name, stay period and purpose of entrance to related party at the time of his first entrance.

    Article 50 (Prohibited Act)

    (1) A telecommunications business operator shall not commit any of the following acts (hereinafter referred to as “prohibited act”) which undermines or is feared to undermine fair competition or users’ interests, or have other telecommunications business operators or the third parties commit such act:

    1. Act of imposing unfair or unreasonable condition or restriction in a provision, a joint utilization, a joint using, an interconnection, a joint use or a wholesale provision of facilities, etc. or a provision of information, etc.;

    2. Act of unfairly refusing a conclusion of agreement, or act of non-performance of the concluded agreement without any justifiable reasons in a provision, a joint utilization, a joint using, an interconnection, a joint use or a wholesale provision of facilities, etc. or a provision of information, etc.;

    3. Act of unfairly diverting the information of other telecommunications business operators to his own business activities, which have been known to him in the course of a provision, a joint utilization, a joint using, an interconnection, a joint use or a wholesale provision of facilities, etc., or a provision of information, etc.;

    4. Act of computing the fees, etc. for a use of telecommunications services, or the prices for a provision, a joint utilization, a joint using, an interconnection, a joint use or a wholesale provision of facilities, etc. or a provision of information, by unfairly itemizing the expenses or revenues;

    5. Act of rendering the telecommunications services in a manner different from the standardized terms and conditions (the standardized terms and conditions refers to only those of which was reported or approved as pursuant to the Article 28 (1) and (2)) or act of rendering the telecommunications services in a manner which significantly undermines the profits of users;

    6. Act of setting and maintaining the compensation for a provision, a joint utilization, a joint using, an interconnection, a joint use or a wholesale provision of facilities, etc. or a provision of information, unreasonably high compared to its supply costs

    7. Act of refusing or restricting fair allocation of income in a transaction where telecommunications services using the radio waves assigned under the Act on Radio Waves are to be used to provide digital contents

    (2) When any person acting on behalf of any telecommunications business operator under a contract therewith in executing contracts between such telecommunications business operator and its users (including making any amendment to such contracts) commits any act falling under paragraph (1)5, his act shall be deemed the act committed by such telecommunications business operator and only the provisions of Articles 52 and 53 shall apply to such act: Provided, That the same shall not apply to a case where the relevant telecommunications business operator has paid reasonable attention to the prevention of such act.

    (3) Necessary matters concerning categories of and standards for the prohibited act referred to in paragraph (1) shall be prescribed by the Enforcement Decree.

    Article 51 (Investigation of Fact)

    (1) In the event the Korea Communications Commission believes that activities in violation of Article 50(1) have been committed, it may order the relevant public official belonging to the Korea Communications Commission to conduct investigation thereof.

    (2) The Korea Communications Commission may order public officials belonging to the Korea Communications Commission to enter into the offices or workplaces of the telecommunications business operators or the workplaces of the persons entrusted with handling of the business of telecommunications business operators (limited, throughout this Article, to telecommunications business operators entrusted with work related to Article 50) and inspect books, documents and other data and objects.

    (3) In the event any investigation is to be conducted pursuant to paragraph (1), the Korea Communications Commission shall notify the relevant telecommunications business operator at least seven (7) days prior to the expected date of investigation with information on the duration, purpose and content of the investigation. Provided, this provision may not apply in the event of emergency or if there is risk that the evidence will be destroyed.

    (4) A person who investigates by visiting the offices or workplaces of the telecommunications business operators, or the workplaces of the persons handling, under an entrustment, the business of telecommunications business operators, under paragraph (2) shall carry a certificate indicating the authority, and present it to the persons concerned. He also should be accompanied by the person of the corresponding offices or workplaces.

    (5) A public official who investigates pursuant to paragraph (2) may order telecommunications business operators or persons entrusted with handling of the business of telecommunications business operators to submit any necessary information or object. In the event there is a possibility of abandonment, concealment, or replacement of the information or object so submitted, the public official may temporarily take them into custody.

    (6) The Korea Communications Commission shall immediately return the information or object under its custody if it falls under any one of the following:

    1. It is deemed, after an examination of the information or object under the custody, that it has no relevance to the current investigation.

    2. The purpose of investigation is fully accomplished so that keeping the information or object under its custody is no longer necessary.

    Article 52 (Measures on Prohibited Acts)

    (1) The Korea Communications Commission may order any telecommunication business operator to take the measures falling under each of the following subparagraphs when it is recognized that any act in violation of paragraph 1 of Article 50 has been committed:

    1. Separation of the supply system of telecommunications service;

    2. Change of internal accounting regulations, etc. concerning telecommunications service;

    3. Disclosure of information concerning telecommunications service;

    4. Conclusion, performance or change of contents of the agreement between the telecommunications business operators;

    5. Change of the standardized terms and conditions and the articles of incorporation of the telecommunications business operators;

    6. Suspension of prohibited acts;

    7. Public announcement of a fact of receiving a correction order due to committing the prohibited acts;

    8. Measures necessary for restoring the violated matters due to the prohibited acts to their original status, such as the removal of telecommunications facilities which have caused the prohibited acts;

    9. Improvement of business conduct procedures regarding telecommunications service;

    10 Prohibition of soliciting new users (for a period not exceeding 3 months and limited to cases where the same violation has occurred for 3 times or more despite sanctions under subparagraphs 1 through 9 or where such sanctions are deemed insufficient to prevent harm to users); and

    11. Such other matters prescribed by the Enforcement Decree as may be necessary for the measures referred to in subparagraphs 1 through 10.

    (2) The telecommunications business operators shall execute any order issued by the Korea Communications Commission under paragraph (1) within the period specified by the Enforcement Decree: Provided, That the Korea Communications Commission may extend the relevant period only once, if it is deemed that the telecommunications business operators are unable to carry out the order within the specified period due to natural disasters and other unavoidable causes.

    (3) The Korea Communications Commission shall, before ordering the measures under paragraph (1), notify the parties concerned of the content of relevant measures, and provide them with an opportunity to make a statement within a specified period, and may hear, where deemed necessary, demand for attendance of an interest party or witness, hearing or appraiser by an appraiser.: Provided, That this shall not apply when the parties concerned fail to respond without any justifiable reasons.

    (4) In the event five (5) years have passed from the date on which any acts committed in violation of paragraph 1 of Article 50 have been terminated, the Korea Communications Commission shall not order any measures pursuant to paragraph 1 or impose a penalty surcharge pursuant to Article 53. Provided, this provision shall not apply if any measure or imposition of penalty surcharge is cancelled by court order and a new measure is to be taken pursuant to that court order.

    Article 53 (Imposition, etc. of Penalty Surcharge on Prohibited Acts)

    (1) The Korea Communications Commission may, in case where there exists any act in violation of paragraph 1 of Article 50, impose a penalty surcharge not exceeding 3/100 of the turnover as prescribed by the Enforcement Decree on the relevant telecommunications business operator. If the telecommunications business operator refuses to submit the data used for calculation of the amount of turnover or submits erroneous data, an estimate of the amount can be assessed based on the financial statement of those who provide similar services in the same industry (accounting documents, number of subscribers, usage fee and business operation status): Provided, That where there is no turnover or it is difficult to calculate the turnover as prescribed by the Enforcement Decree, it may impose the penalty surcharge not exceeding one billion won.

    (2) The Korea Communications Commission may impose on a key communications business operator that submits a business report under Article 49 a find up to 3% of its revenue as determined in a manner specified under the Enforcement Decree of the Act if it commits any of the following:

    1. failure to submit a business report under Article 49 or to abide by an order to submit relevant information

    2. omission of a material item or inclusion of a false statement in a business report under Article 49

    3. failure to adjust the accounting or keep the related books and authoritative documents in violation of Article 49(1)

    (3) The Korea Communications Commission shall, in the event of imposing a penalty surcharge under paragraph (1) or (2), take each of the following into consideration.

    1. details of violation and the extent thereof

    2. duration and frequency of violation

    3. amount of profit obtained in connection with the violation

    4. the amount of turnover obtained as a result of the prohibited activities or adjustment of the accounting of the telecommunications business operator.

    (4) A penalty surcharge under paragraph (1) or (2) shall be calculated taking paragraph (3) into consideration, provided specific calculation standard and procedure shall be set forth by the Enforcement Decree.

    (5) The Korea Communications Commission shall, where a person liable to pay a penalty surcharge under paragraph (1) or (2) fails to do so by the payment deadline, collect an additional due equivalent to 6/100 per year, with respect to the penalty surcharge in arrears, from the day following the expiry of such payment deadline.

    (6) The Korea Communications Commission shall, where a person liable to pay a penalty surcharge under paragraph (1) or (2) fails to do so by the payment deadline, demand him to pay it with fixing a period, and if he fails to pay the penalty surcharge and an additional due under paragraph (5) within the fixed period, collect them according to the example of a disposition taken to collect the national taxes in arrears.

    (7) In the event the penalty surcharge imposed under paragraph (1) or (2) is to be returned pursuant to the court order, an additional due equivalent to 6/100 per year with respect to the penalty surcharge in arrears(accrued from the day of payment to the day of payment) shall be paid.

    Article 54 (Relations with Other Acts)

    In case where a measure is taken under Article 52 or a penalty surcharge is imposed under Article 53 against the acts in violation of paragraph (1) of Article 50, a corrective measure or an imposition of penalty surcharge under the Monopoly Regulation and Fair Trade Act shall not be made under the same grounds against the same acts of the relevant business operator.

    Article 55 (Compensation for Damages)

    In case where a correction measure has been taken under Article 52 (1), a person who is damaged by the prohibited act may claim for compensation against the telecommunications business operator who conducted the prohibited act, and the relevant telecommunications business operator may not shirk liability unless he can prove that there was no malicious intention or negligence.

    Article 56 (Quality Improvement of Telecommunications Services)

    (1) A telecommunications business operator shall endeavor to make a quality improvement of the telecommunications services he provides.

    (2) The Korea Communications Commission shall devise the required policy measures, such as an evaluation of quality of the telecommunications services, in order to improve a quality of telecommunications services and to enhance the conveniences of users.

    (3) The Korea Communications Commission may order the telecommunications business operator to furnish data necessary for an evaluation of quality of the telecommunications services, etc. under paragraph (2).

    Article 57 (Prior Selection Systems)

    (1) The Korea Communications Commission shall perform the systems in which the users may select in advance the telecommunications business operator from whom they desire to receive the telecommunications service (hereinafter referred to as the “prior selection systems”). In this case, the telecommunications service shall refer to the telecommunications service as determined by the Enforcement Decree from among the same telecommunications service provided by the plural number of telecommunications business operators.

    (2) The telecommunications business operator shall not force the users to select in advance a specified telecommunications business operator, or commit the acts to recommend or induce by unlawful means.

    (3) The Korea Communications Commission may, for the purpose of performing the prior selection systems efficiently and neutrally, designate the specialized institutes performing the registration or alteration affairs of the prior selection (hereinafter referred to as the “prior selection registration center”).

    (4) The Korea Communications Commission shall determine and publicly notify the matters necessary for performing the prior selection systems and for the designation of the prior selection registration center and the method of dealing with its affairs, etc.

    Article 58 (Mobility of Telecommunication Numbers)

    (1) The Korea Communications Commission may, in order that the users are able to maintain their previous telecommunications numbers despite of the changes of the telecommunications business operators, etc., devise and perform the plans for mobility of telecommunications numbers (hereafter in this Article, referred to as the “plans for mobility of numbers”).

    (2) The plans for mobility of numbers shall contain the contents falling under any of the following subparagraphs:

    1. Kinds of services subject to the mobility of telecommunications numbers;

    2. Time for introduction by service subject to the mobility of telecommunications numbers; and

    3. Matters on sharing the expenses required for the performance of mobility of telecommunications numbers by telecommunications business operator.

    (3) The Korea Communications Commission may, in order to perform the plans for mobility of numbers, order the relevant telecommunications business operators to take the necessary measures.

    (4) The Korea Communication Commission may designate an institution specializing in the work of registration and alteration of the mobility of numbers (hereinafter referred to as the “mobility of numbers management institution”) to efficiently and neutrally implement the mobility of numbers of the telecommunications.

    (5) The Korea Communication Commission shall prescribe and publish necessary matters concerning the implementation of the mobility of numbers of the telecommunications, the designation of any mobility of numbers management institution and its work, etc.

    Article 59 (Restrictions, etc. on Mutual Possession of Stocks)

    (1) Where a key communications business operator falling under Article 39 (3) 1 or 2 (including the specially-related persons) possesses in excess of 5/100 of the gross number of voting stocks issued by the mutually different key communications business operators, shall not be allowed to exercise any voting rights with regard to the stocks in excess of the relevant ceiling.

    (2) Provisions of paragraph (1) shall not apply to the relation of possessions between a key communications business operator falling under Article 39 (3) 1 or 2 and the key communications business operator established by the said key communications business operator by becoming the largest stockholder.

    Article 60 (Provision of Directory Assistance Service)

    (1) The telecommunications business operator shall provide an information service of guiding the general public to the telecommunications numbers of the users by means of voice, booklets or Internet, etc. (hereinafter referred to as the “directory assistance service”) by obtaining a consent of the users: Provided, That the same shall not apply to the minor business determined and publicly announced by the Korea Communications Commission by taking account of the numbers of the users and the turnovers, etc.

    (2) If necessary for the protection of private personal information, the Korea Communications Commission may limit the provision of the directory assistance service.

    (3) Matters necessary for a provision of the directory assistance service may be stipulated by the Enforcement Decree.

    CHAPTER V.- TELECOMUNICATIONS FACILITIES

    Section 1.- Commercial Telecommunication Facilities

    Article 61 (Maintenance and Repair of Telecommunications Facilities)

    For stable provision of its telecommunications services, a telecommunications business operator shall maintain and repair the telecommunications facilities it provides up to technical specifications specified under the Enforcement Decree of the Act for stable supply of telecommunications.

    Article 62 (Report and Authorization of Telecommunications Facilities Installation)

    (1) When a key communications business operator seeks to install or modify a significant telecommunications facilities, it shall report it to the Korea Communications Commission in a manner specified under the Enforcement Decree of the Act. Provided, that for the telecommunications facilities installed for the first time for new telecommunication technology, an authorization from the Korea Communications Commission shall be obtained in a manner specified in the Enforcement Decree of the Act.

    (2) The scope of significant telecommunications facilities under paragraph (1) shall be determined and announced by the Korea Communications Commission.

    Article 63 (Joint Installation of Telecommunications Facilities)

    (1) A key communications business operator may agree with another key communications business operator to jointly install and use telecommunications facilities.

    (2) When key communications business operators negotiate with each other under paragraph (1), the Korea Communications Commission may conduct a research on necessary information and provide it to them in a manner specified under the Enforcement Decree of the Act.

    (3) For efficient research under paragraph (2), the Korea Communications Commission may engage an expert institution in the telecommunications area to conduct such research in a manner specified under the Enforcement Decree of the Act.

    (4) The Korea Communications Commission may recommend joint installation of telecommunications facilities under paragraph (1) to key communications business operators in a manner specified under the Enforcement Decree in any of the following cases:

    1. where no agreement is reached under paragraph (1) and request is made by one of the key communications business operators

    2. where it is deemed necessary for the public good

    (5) If a key communications business operator fails to reach an agreement on the use of land or buildings owned by the government, public agencies under the Act on the Management of Public Agencies (“public agencies” in this Article) or another key communications business operator when such use is necessary for joint installation of telecommunications facilities, it may request for help from the Korea Communications Commission on use of such land or building.

    (6) Upon receiving the request for help under paragraph (5), the Korea Communications Commission may make a demand to the head of the government entities, municipalities, public agencies or the other key communications business operator for reaching an agreement with the use of relevant land or building with the key communications business operator making the request for help. in this case, the head of the government entities, municipalities, public agencies or the other key communications business operator shall make such agreement unless there is a justifiable reason.

    Section 2.- PROPRIETARY TELECOMMUNICATIONS FACILITIES

    Article 64 (Installation of Proprietary Telecommunications Facilities)

    (1) A person seeking to install proprietary telecommunications facilities shall make a report to the Korea Communications Commission in a manner specified under the Enforcement Decree of the Act. The same applies when an important aspect of reporting items as specified under the Enforcement Decree is sought to be modified.

    (2) Notwithstanding paragraph (1), in case of wireless proprietary telecommunications facilities and military telecommunications facilities and others where other bodies of law are applicable, such bodies of law shall be applicable.

    (3) A person who has made a report on installation or modification of proprietary telecommunications facilities under paragraph (1) shall receive confirmation from the Korea Communications Commission in a manner specified under the Enforcement Decree of the Act when such installation or modification construction is complete and before commencement of its use.

    (4) Notwithstanding paragraph (1), certain proprietary telecommunications facilities specified under the Enforcement Decree of the Act may be installed without filing a report.

    Article 65 (Restriction on Non-Proprietary Use)

    (1) A person who has installed proprietary telecommunications facilities may not use such facilities to interconnect other’s communication or operate it outside its installation purposes, provided that the foregoing is not applicable in cases where other bodies of law have special provisions of any of the following is applicable:

    1. use by a person in law enforcement of disaster rescue industries for law enforcement or emergency rescue operation

    2. use by a specially related person of the installer of proprietary telecommunications facilities as announced by the Korea Communications Commission

    (2) A person who has installed proprietary telecommunications facilities may provide telecommunications facilities such as conduit line to a key communications business operator In a manner specified under the Enforcement Decree of the Act.

    (3) Articles 35, 44 (excluding paragraph (5)) and 45 through 47 shall be applicable in case of provision of facilities under paragraph (2).

    Article 66 (Securing Communication Lines in Case of Emergency)

    (1) When a war, accident or natural disaster or other national emergency has happened or is likely to happen, the Korea Communications Commission may order a person who has installed proprietary telecommunications facilities to engage in telecommunications services or other important communications services or connect the telecommunications facilities to other telecommunications facilities. In this case, Articles 28 through 55 shall be applicable.

    (2) When the Korea Communications Commission deems necessary for the purposes of paragraph (1), may order a key communications business operator to handle such task.

    (3) The costs of performing the task or interconnecting facilities under paragraph (1) shall be borne by the government, provided that when proprietary telecommunications facilities are used for telecommunications services, the key communications business operator receiving such service shall bear its costs.

    Article 67 (Order on the Person Installing Proprietary Telecommunications Facilities, Etc.)

    (1) When a person who has installed proprietary telecommunications facilities fails to abide by the Act or order under this Act, the Korea Communications Commission may order a corrective measure to be carried out within a specific time frame.

    (2) If a person who has installed proprietary telecommunications facilities falls under any of the following, the Korea Communications Commission may order a cessation of use for a period not exceeding one year:

    1. failure to carry out the corrective order under paragraph (1)

    2. use of proprietary telecommunications facilities without receiving confirmation in violation of Article 64(3)

    3. interconnection of other’s communication or use of proprietary telecommunications facilities outside its installation purposes in violation of Article 65(1)

    (3) When the Korea Communications Commission deems that proprietary telecommunications facilities are interfering with other’s telecommunications or likely to harm other’s telecommunications facilities, it may order the person who installed such facilities to stop using, modify, repair or take other corrective measures.

    Section 3.- INTEGRATED MANAGEMENT OF TELECOMMUNICATIONS FACILITIES, ETC.

    Article 68 (Installation of Common Duct or Conduit Line, etc.)

    (1) A person installing or arranging any of the following (hereinafter referred to as the “facility installer”) shall solicit and reflect an opinion from a key communications business operator about installing a common duct or conduit line for telecommunications facilities, provided that the forgoing obligation does not apply when there is a special reason for not being able to honor the key communications business operator’s opinion.

    1. road under Article 2(1)1 of the Road Act

    2. railroad under Article 2(1) of the Railroad Enterprise Act

    3. urban railroad under Article 3(1) of the Urban Railroad Act

    4. industrial complex under Article 2(5) of the Industrial Sites and Development Act

    5. free trade zone under Article 2(1) of the Act on Designation and Management of Free Trade Zone

    6. airport area under Article 2(9) of the Aviation Act

    7. port area under the Harbor Act

    8. other facilities or land as specified under the Enforcement Decree of the Act

    (2) An opinion set forth by key communications business operator about installation of common duct or conduit line under paragraph (1) shall satisfy the installation requirements for common duct specified under the Enforcement Decree of the Act.

    (3) Articles 35, 44 (excluding paragraph (5)) and 45 through 47 shall be applicable in case of provision of common duct or conduit line installed under paragraph (1).

    (4) When a facility installer is unable to reflect the opinion of key communications business operator under paragraph (1), it shall notify the key communications business operator of the reason for such inability within 30 days from the receipt of such opinion.

    (5) When a facility installer does not reflect the opinion of key communications business under paragraph (1), the key communications business operator may ask for reconciliation from the Korea Communications Commission.

    (6) When attempting reconciliation upon receipt of the reconciliation request under paragraph (5), the Korea Communications Commission shall consult with the head of relevant administrative organization in advance.

    (7) Details necessary for reconciliation under paragraphs (5) and (6) shall be specified under the Enforcement Decree of the Act.

    Article 69 (Installation of Telecommunication: Line Facilities for Internal Routing, etc.)

    (1) A building under Article 2(1)2 of the Building Act shall install telecommunication line facilities for internal routing and set aside a certain area for connection with telecommunication grid facilities.

    (2) Details on the scope of building, standards for installing telecommunication line facilities and the setting aside of a certain area for connection with telecommunication grid facilities shall be specified under the Enforcement Decree of the Act.

    Article 70 (Integrated Management of Telecommunications Facilities, Etc.)

    (1) For efficient management and operation of telecommunications facilities, the Korea Communications Commission may allow a key communications business operator designated in accordance with the criteria and procedures specified under the Enforcement Decree of the Act (hereinafter referred to as the “integrated telecommunications operator”) to manage telecommunications facilities installed under this Act or other bodies of law and the relevant land, building or fixtures (hereinafter referred to as the “telecommunications facilities, etc.”) on an integrated basis.

    (2) When the Korea Communications Commission seeks to allow for integrated management of telecommunications facilities, etc. under paragraph (1), it shall establish a telecommunications facilities integrated management plan (hereinafter referred to as the “integrated management plan”), consult with the head of relevant administrative agencies, have it approved by the President after passing the cabinet review.

    (3) An integrated management plan shall have the following:

    1. subject, method and procedures of integration

    2. management of telecommunications facilities, etc. for the post-integration period

    3. other matters specified under the Enforcement Decree of the Act

    (4) When it the Korea Communications Commission seeks to establish an integrated management plan, it shall consult with the installers of the telecommunications facilities, etc. to be integrated in advance.

    Article 71 (Purchase of Telecommunications Facilities, Etc.)

    (1) An integrated telecommunications operator may, when necessary for integrated management of telecommunications facilities, etc., request purchase of the relevant telecommunications, etc. In this case, the owners of the telecommunications facilities may not refuse such request without any justifiable reason.

    (2) When purchase request is made by an integrated telecommunications operator under paragraph (1), telecommunications facilities, etc. directly or publicly owned by the government may be sold to the integrated telecommunications operator notwithstanding Article 27 of the State Properties Act or Article 19 of the Public Property and Commodity Management Act integrated telecommunications operator. In this case, details necessary for the calculation of sales price, sales procedures, payment of sales price, etc. shall be specified under the Enforcement Decree of the Act.

    (3) Articles 67(1), 70, 71, 74, 75, 75-2, 76, 77 and 78(5) through (7) of the Act on the Acquisition of Land, etc. for Public works and the Compensation Therefor shall be applicable for the calculation of sales price, sales procedures, payment of sales price, etc. of the telecommunications facilities, other than those directly or publicly owned by the government, purchased by an integrated telecommunications operator.

    Section 4.- Installation and Preservation of Telecommunications Facilities

    Article 72 (Use of Land, etc.)

    (1) A key communications business operator may, when necessary for the installation of line tracks, aerial lines and the appurtenant facilities to be available for telecommunications service (hereinafter referred to as the “line tracks, etc.”), make use of others’ land, or buildings and structures appurtenant thereto, and surface and bottom of the water (hereinafter referred to as the “land, etc.”). In this case, a key communications business operator shall make a consultation with owners or possessors of the relevant land, etc. in advance.

    (2) Where a consultation under paragraph (1) is not or cannot be made, a key communications business operator may use the land, etc. owned by others, pursuant to the Act on the Acquisition of Land, etc. for Public Works and the Compensation therefor.

    Article 73 (Temporary Use of Land, etc.)

    (1) A key communications business operator may, when necessary for the measurement of line tracks, etc. and the installation or preservation works of the telecommunications facilities, temporarily use the private, national or public telecommunications facilities, and the land, etc., within the limit of not substantially impeding a current use.

    (2) No one may, without any justifiable reason, interfere with the temporary use of telecommunications facilities, and land, etc., for the purposes of the measurement of line tracks, etc. and the installation or preservation works of the telecommunications facilities under paragraph (1).

    (3) A key communications business operator shall, when intending to temporarily use the private, national or public property under paragraph (1), notify the possessors, in advance, of the purposes and period of such use: provided, that in case where it is difficult to make a prior notification, a prompt notification shall be made during or after its use, and in case where such notification of the purposes and period of such use may not be made due to an obscurity of address and whereabouts of possessors, a public notice thereof shall be made.

    (4) The temporary period of use of the land, etc. under paragraph (1) shall not exceed six months.

    (5) A person who temporarily uses the private, national or public telecommunication facilities or the land, etc. under paragraph (1) shall carry the certificate indicating the authority, and present it to the persons related.

    Article 74 (Entry to Land, etc.)

    (1) A key communications business operator may enter others’ land, etc., when necessary for a measurement, examination, etc., for the installation and preservation of his telecommunications facilities: Provided, That in case where the place intended for such entry is a residential building, a consent from residents shall be obtained.

    (2) No one may, without any justifiable reason, interfere with the temporary entry of telecommunications facilities, and land, etc., for the purposes of the measurement, examination, etc., for the installation and preservation of telecommunications facilities under paragraph (1).

    (3) Article 73(3) and (5) shall be applicable in regard to providing notice and showing an identification when a person doing measurement or examination under paragraph (1) enters private or public land, etc.

    Article 75 (Request for Elimination of Obstacles, etc.)

    (1) A key communications business operator may request the owners or possessors of gas pipes, water pipes, drain pipes, electric lamp lines, electricity lines or private telecommunications facilities, which impede or are likely to impede the installation of line tracks, etc. or telecommunications facilities themselves (hereinafter referred to as the “obstacles, etc.”), for the removal, remodeling, repair and other measures with respect to the relevant obstacles, etc.

    (2) A key communications business operator may request the owners or possessors to remove the plants, when they may impede or are likely to impede the installation or maintenance of line tracks, etc. or telecommunications themselves.

    (3) A key communications business operator may, when the owners or possessors of the plants do not comply with the request under paragraph (2) or there exist any other unavoidable reasons, fell or transplant the relevant plants by obtaining permission from the Korea Communications Commission. In this case, a prompt notification shall be made to the owners or possessors of the relevant plants.

    (4) The owners or possessors of the obstacles, etc., which impede or are likely to impede the telecommunications facilities of a key communications business operator, shall make a consultation in advance with the key communications business operator, when they are in need of a new construction, enlargement, improvement, removal or alteration of the relevant obstacles, etc.

    Article 76 (Obligation for Restoration to Original State)

    A key communications business operator shall restore the relevant land, etc. to its original state, when a use of the land, etc. under Articles 72 and 73 is finished or a need of providing the land, etc. for telecommunications service is gone, and in case where a restoration to the original state becomes impossible, make a proper compensation for damages suffered by the owners or possessors.

    Article 77 (Compensation for Damages)

    A key communications business operator shall, in case of incurring damages on others in case of Article 73 (1), 74 (1) or 75, make a proper compensation to the suffered person.

    Article 78 (Procedures for Compensation for Damages on Land, etc.)

    (1) When a key communications business operator compensates under Article 76 or 77 for any of the following reasons, it shall consult with the person has incurred losses.

    1. temporary use of land under Article 73(1)

    2. entry in land, etc. under Article 74(1)

    3. moving, modifying, repairing obstacles or removal of plants under Article 75

    4. inability to restore to the original state under Article 76

    (2) When a consultation under paragraph (1) is not or cannot be made, an application for adjudications shall be filed with the competent Land Expropriation Commission under the Act on the Acquisition of Land, etc. for Public Works and the Compensation therefor.

    (3) Except for those as otherwise prescribed by this Act, the provisions of the Act on the Acquisition of Land, etc. for Public Works and the Compensation therefor shall be applied mutatis mutandis to the criteria, methods and procedures regarding a compensation for damages, etc. to the land, etc. under paragraph (1), and an application for adjudications under paragraph (2).

    Article 79 (Protection of Telecommunications Facilities)

    (1) No person shall destruct the telecommunications facilities, and obstruct the flow of telecommunications by impeding the function of telecommunications facilities by means of having other objects contact them or by any other devices.

    (2) No person shall stain the telecommunications facilities or damage the measurement marks of the telecommunications facilities by means of throwing objects to the telecommunications facilities or fastening an animal, vessel or a log raft thereto.

    (3) A key communications business operator may, if necessary for the protection of submarine communications cable and their peripheral equipment (hereinafter referred to as the “Submarine Cable”), file an application to the Korea Communications Commission for the designation of alert areas for the Submarine Cable.

    (4) Upon receiving an application pursuant to paragraph (3), the Korea Communications Commission may consider the necessity of such designation and may designate and publicly notify the alert areas for the Submarine Cable through consultation with the relevant state administrative agency.

    (5) Designation applications, methods and procedures of such designation and its public notification, and methods of alert area indication shall be determined by the Enforcement Decree.

    Article 80 (Moving of Facilities, etc.)

    (1) The owners or possessors of the land, etc. may, in case where the telecommunications facilities of a key communications business operator have become an obstacle to a use of the land, etc. due to changes in the purpose of use or in the methods of using the land, etc. where such facilities are located, or the land adjacent to it, request a key communications business operator to move the telecommunications facilities, and take other measures necessary for removing the obstacles.

    (2) A key communications business operator shall, upon receipt of a request under paragraph (1), take necessary measures, except for the cases where such measures are difficult to be taken for a business performance or technologies.

    (3) Expenses necessary for taking the measures under paragraph (2) shall be borne by the person who provided the cause for the move or taking other measures necessary for removing the obstacles after the installation of the subject telecommunication facilities: Provided, That in the event the person who bears the expenses is the owner or possessor of the land and falls under any one of the following subparagraphs, the key communication business operator may reduce or exempt the person’s expenses, considering the indemnification amount paid at the time of installation of the telecommunication facilities and the amount of time it took to build the telecommunication facilities:

    1. where the key communication business operator establishes and implements a plan to move the telecommunication facilities or remove other obstacles;

    2. where the moving the telecommunication facilities or removal of other obstacles is beneficial to other telecommunication facilities;

    3. where the state or a local autonomous entity demands such moving of telecommunication facilities or removal of other obstacles; or

    4. where the telecommunication facilities within private land are being removed because they greatly obstruct the use of such land.

    Article 81 (Cooperation of Other Organizations, etc.)

    A key communications business operator may ask the related public agencies for a cooperation, in case where the operation of vehicles, vessels, airplanes and other carriers for the installation and preservation of his telecommunications facilities is necessary. In this case, the public agency in receipt of a request for cooperation shall comply with it, unless there exist any justifiable reasons.

    Article 82 (Inspection — Report, Etc.)

    (1) When necessary for establishing telecommunication policies and other cases specified under the Enforcement Decree of the Act, the Korea Communications Commission may inspect the facility status, accounting books and documents of installers of telecommunications facilities or demand them to make a report on the facilities.

    (2) When there is an installer telecommunications facilities in violation of this Act, the Korea Communications Commission may order the removal of the relevant facilities or other necessary actions.

    CHAPTER VI.- SUPPLEMENTARY PROVISIONS

    Article 83 (Protection of Communication Secrecy)

    (1) No person shall infringe on or divulge the secrecy of communication dealt with by telecommunications business operator.

    (2) A person who is or has been engaged in the telecommunications service shall not divulge others’ secrecy obtained with respect to communication while in office.

    (3) A telecommunications business operator may comply with a request for the perusal or the provision of the data falling under each of the following subparagraphs (hereinafter referred to as the “supply of communication data”) from a court, a prosecutor, the head of an investigation agency (including the head of any military investigation agency, the commissioner of the National Tax Service and the commissioners of regional Tax Offices; hereinafter the same shall apply) and the head of an intelligence and investigation agency, who intends to collect information or intelligence for the purpose of the prevention of any threat to a trial, an investigation (including an investigation of any transgression taken place during commission of any crime falling under Article 10(1), (3) or (4) of the Punishment of Tax Evaders Act), the execution of a sentence or the guarantee of the national security:

    1. Names of users;

    2. Resident registration numbers of users;

    3. Addresses of users;

    4. Phone numbers of users;

    5. IDs of users (referring to the identification codes of users that are used to identify the rightful users of computer systems or communications networks); and

    6. Dates on which users subscribe or terminate their subscriptions.

    (4) The request for supply of communication data under paragraph (3) shall be made in writing (hereinafter referred to as a “written request for data supply”), which states a reason for such request, relation with the relevant user and the scope of necessary data: Provided, That where an urgent reason exists that makes a request in writing impossible, such request may be made without resorting to writing, and when such reason disappears, a written request for data supply shall be promptly filed with the telecommunications business operator.

    (5) A telecommunications business operator shall, where he has supplied the communication data pursuant to the procedures of paragraphs (3) and (4), keep the ledgers as prescribed by the Enforcement Decree, which contain necessary matters such as the facts of supplies of communication data, and the related data such as the written requests for data supply, etc.

    (6) A telecommunications business operator shall report, to the Korea Communications Commission, twice a year the current status, etc. of supplying the communication data, by the methods prescribed by the Enforcement Decree, and the Korea Communications Commission may check whether the content of a report made by a telecommunications business operator is authentic and the management status of related data according to paragraph (5).

    (7) A telecommunications business operator shall, by the methods prescribed by the Enforcement Decree, notify the contents entered in the ledgers according to paragraph (5) to the head of a central administrative agency whereto a person requesting supply of communications data according to paragraph (3) belongs: Provided, That in the event that a person who asks for providing the communications data is a court, the relevant telecommunications business operator shall notify the Minister of the Court Administration thereof.

    (8) A telecommunications business operator shall establish and operate a setup in full charge of the affairs related to the users’ communication secrets; and the matters concerning the function and composition, etc. of the relevant setup shall be prescribed by the Enforcement Decree.

    (9) Matters necessary for the scope of persons holding the decisive power on written request for data supply shall be prescribed by the Enforcement Decree.

    Article 84 (Notice of Transmitter’s Telephone Number)

    (1) The telecommunications business operator may, upon request from the recipient, notify him of the transmitter’s telephone number, etc.: Provided, That this shall not apply to the case where the transmitter expresses his content to refuse the transmission of his telephone number.

    (2) Notwithstanding the proviso of paragraph (1), the telecommunications business operator may, in any of the following cases notify the recipient of the transmitter’s telephone number, etc.

    1. in case where the recipient requests according to the requisites and procedures set by the Enforcement Decree in order to protect the recipients from the violent language, intimidations, harassments, etc.

    2. Of the special telephone number services, those necessary for national security, crime prevention, disaster response, etc. as specified under the Enforcement Decree of the Act.

    (3) No person shall alter the caller’s telephone number or display an erroneous telephone number for profit or for the purpose of inflicting harm on others violent language, intimidations, harassments, etc.

    (4) No person shall provide services that enable another to alter the caller’s telephone number or display an erroneous telephone number for profit. Provided, this provision under paragraph (4) shall not apply in the event any justifiable grounds for exception exist (e.g., for public interest or recipient’s convenience).

    Article 85 (Restriction and Suspension of Business)

    The Korea Communications Commission may order the telecommunications business operators to restrict or suspend the whole or part of telecommunications service under the conditions as prescribed by the Enforcement Decree, when there occurs or is likely to occur a national emergency of war, incident, natural calamity, or that corresponding to them, or when other unavoidable causes exist, and when necessary for securing important communications.

    Article 86 (Approval for International Telecommunications Services)

    (1) When there exist special provisions in the treaties or agreements on international telecommunications business joined by the Government, those provisions shall govern.

    (2) A telecommunications business operator shall, where he intends to conclude international telecommunications business as prescribed by the Enforcement Decree, obtain approval from the Korea Communications Commission fulfilling the requisites prescribed by the Enforcement Decree. The same shall apply to the case where he intends to alter or abolish such agreement or contract.

    (3) A telecommunications business operator providing key communications services shall, where he concludes an agreement or a contract with a foreign government or a foreigner with respect to the adjustments of fees following the handling of international telecommunications services, report such to the Korea Communications Commission, provided that the foregoing is not applicable in case the size of telecommunications facilities, paid-in capital, number assignment, etc. satisfy the standards specified under the Enforcement Decree of the Act.

    (4) Notwithstanding paragraph (3), when an agreement is to be entered into for the adjustments of fees for international telecommunications through the joint use of radio telecommunications facilities, approval from the Korea Communications Commission shall be necessary.

    (5) Details on the report under paragraph (3) or authorization under paragraph (4) shall be determined and publicly announced by the Korea Communications Commission.

    Article 87 (Transboundary Provision of Key Communications Services)

    (1) A person, who intends to provide key communications service from abroad into the homeland without establishing a domestic business place (hereinafter referred to as the “transboundary provision of key communications services”), shall conclude a contract on transboundary provision of key communications services with a domestic key communications business operator or a specific communications business operator who provides the same key communications service.

    (2) The provisions of Articles 28, 32, 33, 45 through 47, 50 through 55, 83 through 85, 88 and 92 and Article 44-7 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc. shall apply mutatis mutandis to the provision of services as determined in a contract by a key communications business operator or a specific communications business operator who has concluded the contract under paragraph (1).

    (3) Where a person, who intends to provide a transboundary key communications service under paragraph (1), or a key communications business operator or a specific communications business operator, who has concluded a contract with him, violates the relevant provisions which applies mutatis mutandis under paragraph (2), the Korea Communications Commission may cancel approval under Article 86 (2), or issue an order to suspend a transboundary provision of the whole or part of key communications services as determined in the relevant contract, with fixing a period of not more than one year.

    (4) Criteria and procedures, etc. for dispositions under paragraph (3) and other necessary matters shall be determined by the Enforcement Decree.

    Article 88 (Report, etc. on Statistics)

    (1) A telecommunications business operator shall report the statistics on a provision of telecommunications service as prescribed by the Enforcement Decree, such as a current status of facilities by telecommunications service, subscription record, current status of users, and the data related to telephone traffic required for the imposition and collection of fees, to the Korea Communications Commission under the conditions as determined by the Enforcement Decree, and keep the related data available.

    (2) A key communications business operator and stockholders thereof, or the specific communications business operator and stockholders thereof shall submit the related data necessary for a verification of the facts of Article 8, pursuant to the provisions of the Enforcement Decree.

    (3) The Korea Communications Commission may, in order to verify the facts under paragraph (2), or to examine the genuineness of the data submitted, request the administrative agencies and other related agencies to examine the data submitted or to submit the related data. In this case, the agencies in receipt of such request shall accede thereto unless there exist any justifiable reasons.

    Article 89 (Hearing)

    The Korea Communications Commission shall, in case where he intends to make a disposition falling under any of the following subparagraphs, hold a hearing:

    1. Cancellation, in whole or part, of license for a key communications business operator under Article 20 (1);

    2. Cancellation, in whole or part, of registration of a specific communications business under Article 27 (1);

    3. Closedown, in whole or part, of a value-added communications business under Article 27 (2); and

    3. Cancellation of approval under Article 87 (3).

    Article 90 (Imposition of Penalty Surcharge, etc.)

    (1) The Korea Communications Commission may impose a penalty surcharge equivalent to the amount of not more than 3/100 of the sales amount that is calculated under the conditions as prescribed by the Enforcement Decree in lieu of the relevant business suspension, in case where he has to order a business suspension to a telecommunications business operator who falls under subparagraphs of Article 20 (1) or subparagraphs of Article 27 (1) and (2), or a suspension of relevant business is likely to cause substantial inconveniences to the users, etc. of relevant business or to harm other public interests. If the telecommunications business operator refuses to submit the data used for calculation of turnover or submits erroneous data, an estimate of the turnover can be assessed based on the financial statement of those who provide similar services in the same industry (accounting documents, number of subscribers, usage fee and business operation status): Provided, That in the event that the sales amount is nonexistent or difficult to calculate the sales amount, as prescribed by the Enforcement Decree, the Minister of Information and Communication may impose a penalty surcharge not exceeding 1 billion won.

    (2) When the Korea Communications Commission orders cessation of use in regard to proprietary telecommunications facilities under Article 67(2), it may replace such order with a penalty surcharge not exceeding 1 billion won if such order causes significant inconvenience to users of telecommunication services provided with the use of the relevant proprietary telecommunications facilities or other public harm is expected.

    (3) Specific standards for the imposition of penalty surcharge under paragraph (1) and (2) shall be determined by the Enforcement Decree.

    (4) Article 53(5) through (7) shall apply in regard to additional dues of penalty surcharge, demand for payment and return-additional dues of penalty surcharge under paragraph (1) and (2).

    Article 91 (Extension of Time Limit of Payment of Penalty Surcharge and Payment in Installments)

    (1) Where a penalty surcharge to be paid by a telecommunications business operator under Articles 53 and Article 90 exceeds the amount as prescribed by the Enforcement Decree, and where deemed that a person liable for a payment of penalty surcharge finds it difficult to pay it in a lump sum due to the reasons falling under any one of the following subparagraphs, the Korea Communications Commission may either extend the time limit of payment, or have him pay it in installments. In this case, the Korea Communications Commission may, if deemed necessary, have him put up a security therefor:

    1. Where he suffers a severe loss of property due to natural disasters or fire;

    2. Where his business faces a serious crisis due to an aggravation of his business environments; and

    3. Where it is expected that he will be in great financial difficulty if he pays the penalty surcharge in a lump sum.

    (2) Matters necessary for an extension of the deadline for payment of a penalty surcharge, the payment in installments and the laying of a security shall be prescribed by the Enforcement Decree.

    Article 92 (Correction Orders, etc.)

    (1) The Korea Communications Commission shall issue correction orders in case where a telecommunications business operator falls under any of the following subparagraphs:

    1. Where it violates Articles 3, 4, 6, 9 through 11, 14 through 24, 26 through 28, 30 through 44, 47 through 49, 51, 56 through 62, 64 through 67, 69, 73 through 75, 79 or 82 through 88 or any order thereunder;

    2. Where the procedures for business performances of telecommunications business operator are deemed to inflict significant harms on the users’ interests; and

    3. Where he fails to take swift measures necessary for removing obstructions such as repairs, etc. when impediments have occurred to the supply of telecommunications services.

    (2) The Korea Communications Commission may order a telecommunications business operator to conduct the matters of the following subparagraphs, when necessary for development of telecommunications:

    1. Integrated operation and management of telecommunications facilities, etc.;

    2. Expansion of communications facilities for the enhancement of social welfare;

    3. Construction and management of communications networks for important communications to achieve efficient performance of State’s functions; and

    4. Other matters as prescribed by the Enforcement Decree.

    (3) The Korea Communications Commission may order the persons falling under any of the following subparagraphs to take measures, such as the suspension of acts to provide telecommunications service or the removal of telecommunications facilities, etc.:

    1. Persons who operate a key communications business without obtaining a permit under Article 6 (1);

    2. Persons who operate a specific communications business without making a registration under Article 21 (1); and

    3. Persons who operate a value-added communications business without making a report under Article 22 (1).

    Article 93 (Delegation and Entrustment of Authority)

    The authority of the Korea Communications Commission under this Act may be delegated and entrusted in part to the head of the affiliated agencies under the conditions as prescribed by the Enforcement Decree.

    CHAPTER VII.- PENAL PROVISIONS

    Article 94 (Penal Provisions)

    A person falling under any of the following subparagraphs shall be punished by imprisonment for not more than five years or by a fine not exceeding 200 million won:

    1. A person who runs a key communications business without obtaining a license under Article 6 (1);

    2. A person who has operated key communications services in violation of partial cancellation of license under Article 20(1);

    3. A person who obstructs the flow of telecommunications by impeding a function of telecommunications facilities by means of damaging telecommunications facilities, or having the objects contacted thereon and other methods, in violation of Article 79 (1);

    4. A person who divulges other’s secrets with respect to communications which have been known to him while in office, in violation of Article 83 (2); and

    5. A person who supplies communication data, and person who receives such supply, in violation of Article 83 (3).

    Article 95 (Penal Provisions)

    A person falling under any of the following subparagraphs shall be punished by imprisonment for not more than three years or by a fine not exceeding 150 million won: (Amended by Act nº 10656, May 19, 2011)

    1. A person who refuses a provision of telecommunications service without any justifiable reasons, in violation of Article 3 (1);

    2. A person who violates a disposition taken to suspend his business under Article 20 (1);

    3. A person who operates a specific communications business without making a registration under Article 21 (1) or a person who operates a value-added communications business without making a registration under 3-2, Article 22(2);

    4. A person who has operated specific communications services in violation of partial cancellation of license under Article 27(1);

    5. A person who fails to implement an order under Article 52 (1);

    6. A person who obstructs the measurement of line tracks, etc. and the installation and preservation activities of telecommunications facilities under Article 73 (2); and

    7. A person who encroaches upon or divulges a secret of communications handled by telecommunications business operator, in violation of Article 83 (1).

    Article 96 (Penal Provisions)

    A person falling under any of the following subparagraphs shall be punished by imprisonment for not more than two years or by a fine not exceeding 100 million won:

    1. A person who fails to obtain a modified license under Article 16;

    2. A person who fails to obtain approval under Articles 17 (1) and 42 (4);

    3. A person who fails to obtain an authorization under the text of Article 18 (1) other than sub-paragraphs or approval according to Article 19 (1);

    4. A person who violates Article 18 (9) by unifying communication networks, appointing officers, executing any other activities such as transferring, consolidating, enforcing a facilities sales contract or taking follow-up measures relating to establishment of a company before receiving a license ;

    5. A person who violates user protection measures ordered under Article 19(2);

    6. A person who runs the value-added communications business without making a report under Article 22(1);

    7. A person who violates a disposition taken to suspend his business under Article 27(1);

    8. A person who fails to execute the order given to discontinue his business under Article 27 (2);

    9. A person who fails to subscribe for a guarantee insurance in violation of Article 32(3);

    10. A person who discloses, uses or provides the information, in violation of the main body of Article 43 (1) or paragraph (2) of the same Article;

    11. A person who fails to implement the partial restriction or cessation measure ordered pursuant to Article 85; and

    12. A person who fails to obtain approval, approval for alteration, or approval for abolition, under Article 86 (2) or (4).

    Article 97 (Penal Provisions)

    A person falling under any of the following subparagraphs shall be punished by imprisonment for not more than one year or by a fine not exceeding 50 million won:

    1. A person who fails to execute the order given under Articles 10(5), 18 (8) or 12 (2) (including a case where the provisions are applied mutatis mutandis under Article 4 (4) of the Addenda of the Telecommunications Business Act (Amended by Act nº 5385);

    2. A person who fails to make a report under provisos of Article 18 (1) other than sub-paragraphs;

    3. A person who fails to make a modified registration or a modified report under Article 23;

    4. A person who fails to make a report under Article 24;

    5. A person who violates a disposition taken to suspend his business under Article 27 (2);

    6. A person who provides telecommunications service without making a report or modification report under Article 28(1) and the proviso of (2) or receiving an authorization or modification approval under paragraph (2) of the same Article; and

    7. A person who intermediates other person’s communication or furnishes for use by other person, by making use of telecommunications services rendered by the telecommunications business operator, in contravention of the provisions of the text of Article 30 other than subparagraphs.

    Article 98 (Penal Provisions)

    A person falling under any of the following subparagraphs shall be punished by imprisonment for not more than one year or by a fine not exceeding 10 million won:

    1. A person who installs or modifies significant telecommunications facilities without making a report under the main text of Article 62(1) or has installed telecommunications facilities without obtaining approval under the proviso of the same Article

    2. A person who installs proprietary telecommunications facilities without making a report or modification report under Article 64(1)

    3. A person who interconnects other’s communication through proprietary telecommunication facilities or uses it outside its purpose in violation of Article 65(1)

    4. A person who violates an order under Article 66(1) to handle telecommunication services or other communication services or connect the pertinent facilities to other telecommunications facilities

    5. A person violates a usage cessation order under Article 67(2) or an order under paragraph (3) of the same article

    6. A person violates an order for removal of telecommunications facilities or other corrective measures under Article 82(2)

    Article 99 (Penal Provisions)

    A person who commits any of the prohibited acts under Article 50(1) (excluding providing telecommunications services not in accordance with the standard usage terms and conditions under Article 50(1)5) shall be punished by a fine not exceeding 300 million won.

    Article 100 (Penal Provisions)

    A person falling under any one of the following subparagraphs shall be punished by a fine not exceeding 50 million won:

    1. A person who deceives another for profit or alters his telephone number or displays a fraudulent telephone number for the purpose of inflicting harm through violent language, intimidations, harassment, etc. in contravention of Article 84 (3); and

    2. A person who provides services that enable another to alter the caller’s telephone number or display an erroneous telephone number for profit in violation of Article 84 (4).

    Article 101 (Penal Provisions)

    A person who stains the telecommunications facilities or damages the measurement marks of the telecommunications facilities, in violation of Article 79 (2) shall be punished by a fine or penalty not exceeding one million won.

    Article 102 (Attempted Criminal)

    An attempted criminal under subparagraphs 3 and 4 of Article 94 and subparagraph 7 of Article 95 shall be punished.

    Article 103 (Joint Penal Provisions)

    When a representative of a juristic person or an agent, an employee or any other employed person of the juristic person or individual commits violation under Articles 94 through 100 in connection with the business of such juristic person or individual, then a fine under the related Article shall be imposed on the juristic person or individual, in addition to the punishment of the violator except in cases where such juristic person or individual has not been lax in exercising due care and supervision in regard to the relevant business to prevent such violation.

    Article 104 (Fine for Negligence)

    (1) A person who falls under any one of the following subparagraphs shall be punished by a fine for negligence not exceeding 30 million won:

    1. A person who refuses or impedes a temporary use of private telecommunications facilities or lands under Article 73 (2), without justifiable reasons;

    2. A person who refuses or impedes an entry to the land, etc. under Article 74 (2), without justifiable reasons;

    3. A person who refuses the moving, alteration, repair and other measures on the obstacles, etc. under Article 75 (1), or the request for removal of the plants under Article 75 (2), without justifiable reasons;

    (2) A person who fails to apply for approval in regard to execution of an agreement in violation of Article 44(2) shall be punished by a fine not exceeding 20 million won.

    (3) A person falling under any of the following shall be punished by a fine not exceeding 15 million won:

    1. A person who fails to report in regard to execution of an agreement in violation of Article 44(1)

    2. A person who fails to make a report under the main text of Article 86(3)

    (4) A person who falls under any one of the following subparagraphs shall be punished by a fine for negligence not exceeding ten million won:

    1. A person who fails to make a report as referred to in Article 10 (2) or to comply with a request for providing the data or an order to attend as referred to in Article 11 (3) or (4);

    2. A person who, in violation of Article 19 (1), fails to notify the user 60 days prior to the expected date of termination;

    3. A person who fails to make a report under Article 26;

    4. A person who violates the obligation concerning the protection of users under Article 32 (1);

    5. A person who fails to carry out request for information under Article 35(5) or submits false information

    6. A person who fails to make a public announcement of the technical standards, and the standards for use and provision, or the standards for a creation of fair competitive environments, in violation of Article 42 (4);

    7. A person who fails to observe the publicly announced matters under Article 48(2), in violation of Article 48 (3);

    8. A person who refuses, avoids or hampers an order for submission, or an investigation, of the data or articles according to Article 51 (2);

    9. A person who refuses, avoids, or intervenes with the order to submit information or object under Article 51 (5), or the temporary custody of the information or object submitted under the same Article;

    10. A person who fails to execute orders given to furnish related data under the provisions of Article 56 (3);

    11. A person who has used proprietary telecommunications facilities without receiving confirmation under Article 64(3)

    12. A person who refuses or interferes with inspection under Article 82(1)

    13. A person who fails to report under Article 82(2) or makes a false report

    14. A person who fails to keep related data or makes false entries in such data, in contravention of the provisions of Article 83 (5);

    15. A person who does not report the contents in the ledgers, including provision of telecommunications data, to the head of central administrative agency in violation Article 83(7)

    16. A person who fails to make reports or submit the data under Article 88, or falsely do such acts; and

    17. A person who fails to follow correction orders, etc., under Article 92.

    (5) The fine for negligence under paragraph (1) through (4) shall be imposed and collected by the Korea Communications Commission, under the conditions as prescribed by the Enforcement Decree.

    ADDENDA (Act nº 10656, May 19, 2011)

    (1) (Enforcement Date) This Act shall be effective 6 months after the date of its announcement.

    (2) (Grandfathering Clause for Registration of Value-added Communications Business)

    A person who operates a value-added communications business at the time this Act comes into effect under the previous provisions, and is required to be registered under the amended Article 22(2) shall make a registration within 6 months after the enforcement date.

    23Sep/21

    Personal Information Protection Law of the People’s Republic of China

    Personal Information Protection Law of the People’s Republic of China was adopted by the 30th meeting of the Standing Committee of the 13th National People’s Congress of the People’s Republic of China on August 20, 2021

    Personal Information Protection Law of the People’s Republic of China (Adopted at the 30th meeting of the Standing Committee of the 13th National People’s Congress on August 20, 2021)

    Chapter I.- General Provisions

    Article 1

    This Law is enacted in accordance with the Constitution to protect personal information rights and interests, regulate the processing of personal information, and promote the reasonable use of personal information.

    Article 2

    The personal information of any natural person shall be protected by law, and no organization or individual may infringe upon the personal information rights and interests of any natural person.

    Article 3

     This Law shall apply to the processing of the personal information of natural persons within the territory of the People’s Republic of China.

    This Law shall also apply to the activities carried out outside the territory of the People’s Republic of China to process the personal information of natural persons within the territory of the People’s Republic of China under any of the following circumstances:

    (I) where the purpose is to provide products or services to domestic natural persons;

    (II) where the purpose is to analyze and evaluate the activities of domestic natural persons; and

    (III) other circumstances provided by laws and administrative regulations.

    Article 4

    Personal information refers to various kinds of information related to identified or identifiable natural persons recorded by electronic or other means, excluding the information processed anonymously.

    Processing of personal information includes the collection, storage, use, processing, transmission, provision, publication, and erasure of personal information.

    Article 5

    Personal information shall be processed in accordance with the principles of legality, legitimacy, necessity, and good faith, and shall not be processed by misleading, fraud, coercion, or other means.

    Article 6

    Processing of personal information shall be for a definite and reasonable purpose, shall be directly related to the purpose of processing, and shall be processed in a manner that has the least impact on individual rights and interests.

    Collection of personal information shall be limited to the minimum scope for the purpose of processing and shall not be excessively collected.

    Article 7

    Processing of personal information shall follow the principles of openness and transparency, disclose the rules for processing personal information, and expressly indicate the purpose, manner, and scope of processing.

    Article 8

    When processing personal information, the quality of personal information shall be ensured to avoid adverse effects on personal rights and interests caused by inaccurate and incomplete personal information.

    Article 9

    Personal information processors shall be responsible for their processing of personal information and take necessary measures to ensure the security of the personal information processed.

    Article 10

    No organization or individual may illegally collect, use, process, or transmit other people’s personal information, or illegally trade, provide, or disclose other people’s personal information, or engage in the processing of personal information that endangers the national security or public interests.

    Article 11

    The State establishes a sound personal information protection system, prevent and punish the infringement of personal information rights and interests, strengthen the publicity and education on personal information protection, and promote the formation of a good environment for the government, enterprises, relevant social organizations and the public to jointly participate in personal information protection.

    Article 12

    The State actively participates in the formulation of international rules for personal information protection, promotes the international exchange and cooperation in personal information protection, and drives the mutual recognition of the rules and standards for personal information protection with other countries, regions, and international organizations.

    Chapter II.- Rules for Processing Personal Information

    Section 1.- General Provisions

    Article 13

    Only under any of the following circumstances may a personal information processor process personal information:

    (I) where the consent of the individual concerned is obtained;

    (II) where it is necessary for the conclusion or performance of a contract to which the individual concerned is a party, or to implement human resources management in accordance with labor rules and regulations formulated according to law and collective contracts concluded according to law;

    (III) where it is necessary for the performance of statutory duties or statutory obligations;

    (IV) where it is necessary for coping with public health emergencies or for the protection of the life, health, and property safety of a natural person;

    (V) where such acts as news reporting and supervision by public opinions are carried out for the public interest, and the processing of personal information is within a reasonable scope;

    (VI)where the personal information disclosed by individuals themselves or other legally disclosed personal information is processed within a reasonable scope in accordance with the provisions of this Law; and

    (VII)other circumstances provided by laws and administrative regulations.

    Individual consent shall be obtained for the processing of personal information stipulated in the other clauses of this Law, but in the circumstances specified in the preceding paragraph from (II) to (VII), the individual’s consent is not required.

    Article 14

    Where the processing of personal information is based on the consent of the individual concerned, such consent shall be given by the individual concerned in a voluntary and explicit manner in the condition of full knowledge. If laws and administrative regulations provide that the processing of personal information shall be subject to the individual’s separate consent or written consent, such provisions shall prevail.

    If the purpose or method of processing personal information or the type of personal information to be processed changes, the individual’s consent shall be obtained again.

    Article 31 If a personal information processor knows or should know that the personal information it processes is the personal information of a minor below the age of 14, it shall obtain the consent of the minor’s parent or other guardians.

    Personal information processors shall formulate special personal information processing rules for handling the personal information of minors under the age of 14.

    Article 15

    Where the processing of personal information is based on the consent of the individual concerned, the individual is entitled to withdraw his/her consent. The personal information processor shall provide convenient means to withdraw consent.

    The individual’s withdrawal of consent does not affect the validity of the personal information processing activities conducted prior to the withdrawal based on the individual’s consent.

    Article 16

    A personal information processor shall not refuse to provide products or services on the grounds that the individual does not agree to process his/her personal information or withdraws his/her consent, unless the processing of personal information is necessary for providing products or services.

    Article 17

    Prior to processing personal information, a personal information processor shall truthfully, accurately, and completely inform the individual of the following matters in an eye-catching manner and with clear and understandable language:

    (I) the name and contact information of the personal information processor;

    (II) the purpose and method of processing personal information, and the type and retention period of the processed personal information;

    (III) the method and procedure for the individual to exercise the rights provided herein; and

    (IV) other matters to be notified in accordance with the provisions of laws and administrative regulations.

    If any of the matters provided in the preceding paragraph is changed, the individual shall be notified of such change.

    Article 18

    When processing personal information, a personal information processor may not notify the individual of the matters provided for in laws and administrative regulations where confidentiality shall be kept, or it is not necessary to notify the individual of the matters provided for in Paragraph 1 of the preceding Article.

    In case of emergency, it is unable to timely inform the individual to protect the life, health and property safety of natural persons, the personal information processor shall inform the individual in time after elimination of emergency.

    Article 19

    The retention period of personal information shall be the minimum period necessary for achieving the purpose of processing, except for where the retention period of personal information is otherwise provided for in laws and administrative regulations.

    Article 20

    Where more than two personal information processors jointly determine the purpose and method of processing personal information, their respective rights and obligations shall be agreed upon. However, such agreement shall not affect an individual’s right to exercise the rights provided for in this Law against any of the personal information processors.

    Where personal information processors jointly processing personal information infringes upon personal information rights and interests and cause damages, they shall bear joint and several liabilities in accordance with the law.

    Article 21

    Where a personal information processor entrusts others to process personal information, it shall agree with the entrusted party on the purpose, duration, and method of entrusted processing, type and protection measures of personal information as well as the rights and obligations of both parties, and supervise the personal information processing activities of the entrusted party.

    The entrusted party shall process personal information as agreed and shall not process personal information beyond the agreed purpose and method of processing. If the contract is invalidated, invalid, revoked or terminated, the entrusted party shall return the personal information to the personal information processor or delete the personal information, and shall not retain the personal information.

    Without the consent of the personal information processor, the entrusted party shall not re-entrust others to process personal information.

    Article 22

    Where a personal information processor needs to transfer personal information due to reasons such as merger, division, dissolution, or being declared bankrupt, it shall inform the individual of the name and contact information of the recipient. The recipient shall continue to perform its obligations as a personal information processor. Where the recipient changes the original purpose and method of processing, it shall obtain the individual’s consent anew in accordance with this Law.

    Article 23

    Where a personal information processor provides other personal information processors with the personal information it processes, it shall inform the individual of the name and contact information of the third party, purpose and method of processing and type of personal information, and shall obtain his/her separate consent. The party receiving personal information shall process personal information within the scope of the above purpose and method of processing and type of personal information. Where the party receiving personal information changes the original purpose and method of processing, it shall inform the individual and obtain his/her consent again in accordance with this Law.

    Article 24

    Where personal information processors use personal information to make automatic decision, the transparency of decision-making and the fairness and justice of the results shall be ensured, and shall not impose unreasonable differential treatment on individuals in terms of transaction price and other transaction conditions.

    Where business marketing and information push are carried out through automatic decision-making, options not based on his/her personal characteristics shall be provided at the same time, or a convenient way for individuals to reject shall be provided.

    Where automatic decision-making has a significant impact on individual’s rights and interests, he/she has the right to require the personal information processor to give an explanation, and to reject the decision made by the personal information processor only through automatic decision-making.

    Article 25

    A personal information processor shall not disclose the personal information it processes, unless the individual’s consent is obtained, or it is otherwise required by laws and administrative regulations.

    Article 26

    Image capturing and personal identification equipment installed in public places shall be necessary for maintaining public security, comply with relevant provisions of the State, and conspicuous prompting signs shall be installed. Personal images and personal identifiable information collected may only be used for the purpose of maintaining public security and shall not be used for other purposes, unless the individual’s consent is obtained.

    Article 27

    Personal information processors may, within a reasonable range, process personal information that has been disclosed by individuals themselves or other lawfully disclosed personal information, except where the individual explicitly refuses. Personal information processors shall obtain the consent of individuals in accordance with the provisions of this Law if the processing of disclosed personal information has a major impact on the rights and interests of individuals.

    Section 2.- Rules for Processing Sensitive Personal Information

    Article 28

    Sensitive personal information refers to the personal information that can easily lead to the infringement of the personal dignity or natural persons or the harm of personal or property safety once leaked or illegally used, including such information as biometrics, religious belief, specific identities, medical health, financial accounts, and whereabouts, and the personal information of minors under the age of 14.

    Personal information processors can process sensitive personal information only when they have a specific purpose and sufficient necessity, and take strict protective measures.

    Article 29

    Individual consent should be obtained for processing sensitive personal information. Where laws and administrative regulations provide that the processing of sensitive personal information shall be subject to written consent, such provisions shall prevail.

    Article 30

    For the processing of sensitive personal information of an individual, the personal information processor shall inform the individual of the necessity of processing sensitive personal information and the impacts on the individual’s right and interest, in addition to the matters prescribed in Paragraph 1 of Article 17 thereof, except those that may not be notified to individuals in accordance with the provisions of this Law.

    Article 31

    If a personal information processor knows or should know that the personal information it processes is the personal information of a minor below the age of 14, it shall obtain the consent of the minor’s parent or other guardians.

    Personal information processors shall formulate special personal information processing rules for handling the personal information of minors under the age of 14.

    Article 32

    Where laws and administrative regulations provide that the processing of sensitive personal information shall be subject to relevant administrative permission or other restriction, such provisions shall prevail.

    Section 3.- Special Provisions on Processing Personal Information by State Organs

    Article 33

    This Law shall apply to the activities of a State organ to process personal information; where there are special provisions in this Section, the provisions of this Section shall apply.

    Article 34

    The processing of personal information by a State organ for the purpose of performing its statutory duties shall be under the authority and procedures prescribed by laws and administrative regulations and shall not exceed the scope and limit necessary for performing its statutory duties.

    Article 35

    A State organ processing personal information for the purpose of performing its statutory duties shall perform the obligation of notification in accordance with this Law, except for circumstances prescribed in Paragraph 1 of Article 18, or the notification will hinder the State organ from performing its statutory duties.

    Article 36

    The personal information processed by a State organ shall be stored within the territory of the People’s Republic of China; where it is necessary to provide such information to an overseas party, a security assessment shall be conducted. Relevant departments may be required to provide support and assistance for security assessment.

    Article 37

    The provisions of this law on personal information processed by State organs shall apply for personal information processing by organizations authorized by laws and regulations with the function of managing public affairs to perform statutory duties.

    Chapter III.- Rules for Cross-border Provision of Personal Information

    Article 38

    Where a personal information processor needs to provide personal information outside the territory of the People’s Republic of China due to business or other needs, it shall meet any of the following conditions:

    (I) where it has passed the security assessment organized by the State cyberspace administration in accordance with Article 40 hereof;

    (II) where it has been certified by a specialized in accordance with the provisions of the State cyberspace administration in respect of the protection of personal information;

    (III) where it has concluded a contract with an overseas recipient according to the standard contract formulated by the state cyberspace administration, specifying the rights and obligations of both parties; or

    (IV) where it has satisfied other conditions prescribed by laws, administrative regulations, or the State cyberspace administration.

    Where the international treaties and agreements that the People’s Republic of China has concluded or participated in have provisions on the conditions for providing personal information outside the territory of the People’s Republic of China, such provisions may be complied with.

    Personal information processors shall take necessary measures to ensure that the processing of personal information by overseas recipients meets the personal information protection standards stipulated in this law.

    Article 39

    Where a personal information processor provides personal information of an individual to a party outside the territory of the People’s Republic of China, it shall inform the individual of such matters as the name of the overseas recipient, contact information, purpose, and method of processing, type of personal information and the way and procedure for the individual to exercise the rights prescribed herein against the overseas recipient, and shall obtain the individual’s separate consent.

    Article 40

    Critical information infrastructure operators and personal information processors whose processing of personal information reaches the number prescribed by the State cyberspace administration shall store the personal information collected and generated within the territory of the People’s Republic of China within the territory of China. If it is indeed necessary to provide such information and data to overseas parties, it shall be subject to the security assessment organized by the State cyberspace administration; if laws, administrative regulations, or the provisions of the State cyberspace administration provide that the security assessment is not required, such provisions shall prevail.

    Article 41

    The competent authorities of the People’s Republic of China shall, in accordance with relevant laws and international treaties and agreements concluded or participated in by the People’s Republic of China, or in accordance with the principle of equality and reciprocity, handle requests from foreign judicial or law enforcement agencies for the provision of personal information stored in China. Without the approval of the competent authority of the People’s Republic of China, personal information processor shall not provide the personal information stored within the territory of the People’s Republic of China to judicial or law enforcement agencies outside of the territory of the People’s Republic of China.

    Article 42

    For any overseas organization or individual whose personal information processing activities damage the personal information rights and interests of citizens of the People’s Republic of China, or endanger the national security or public interests of the People’s Republic of China, the State cyberspace administration may include such overseas organization or individual in the list of restricted or prohibited provision of personal information, announce the same, and take measures such as restricting or prohibiting the provision of personal information to such overseas organization or individual.

    Article 43

    Where any country or region takes discriminatory prohibitive, restrictive or other similar measures against the People’s Republic of China in respect of the protection of personal information, the People’s Republic of China may, as the case may be, take reciprocal measures against such country or region.

    Chapter IV.- Rights of Individuals in Activities of Processing Personal Information

    Article 44

    An individual has the right to know and make decisions on the processing of his/her personal information, and the right to restrict or refuse others to process his/her personal information, unless otherwise provided for by laws and administrative regulations.

    Article 45

    An individual is entitled to consult or copy his/her personal information from a personal information processor, except for the circumstances as prescribed in Paragraph 1 of Article 18 and Article 35 herein.

    Where an individual requests to consult or copy his/her personal information, the personal information processor shall provide such information in a timely manner.

    Where an individual requests to transfer his/her personal information to a personal information processor designated by him/her, the personal information processor shall provide the means for such transfer if the conditions prescribed by the State cyberspace administration are met.

    Article 46

    Where an individual finds that his/her personal information is inaccurate or incomplete, he/she is entitled to request the personal information processor to make corrections or supplements.

    Where an individual requests for corrections or supplements to his/her personal information, the personal information processor shall make verification and make corrections or supplements to such information in a timely manner.

    Article 47

    Under any of the following circumstances, a personal information processor shall delete personal information on its own initiative; if the personal information processor has not deleted it, the individual concerned shall have the right to request deletion:

    (I) where the purpose of processing has been achieved, unable to achieve, or is no longer necessary to achieve;

    (II) where the personal information processor stops providing products or services, or the agreed storage period has expired;

    (III) where the individual withdraws his/her consent;

    (IV) where the personal information processor processes personal information in violation of laws, administrative regulations, or the agreement; or

    (V) any other circumstance as prescribed by laws and administrative regulations.

    Where the storage period as prescribed by laws and administrative regulations does not expire, or the deletion of personal information is difficult to be realized technically, the personal information processor shall stop processing personal information other than storage and taking necessary security measures.

    Article 48

    An individual is entitled to request the personal information processor to explain the rules on the processing of personal information.

    Article 49

    In the event of the death of a natural person, his/her near relatives may, for their own lawful and legitimate interests, exercise the rights of consulting, copying, correcting, and deleting the relevant personal information of the deceased as prescribed in this Chapter, unless the deceased had otherwise arranged before his/her death.

    Article 50

    A personal information processor shall establish a convenient mechanism for accepting and processing applications for exercising personal rights by individuals. Where an individual’s request for exercising personal rights is rejected, the reasons shall be stated.

    Where the personal information processor refuses an individual’s request to exercise his rights, the individual may bring a lawsuit in a people’s court according to law.

    Chapter V.- Obligations of Personal Information Processors

    Article 51

    A personal information processor shall, according to the purpose and method of processing personal information, type of personal information, impact on individual’s right and interest, and possible security risk, etc., take the following measures to ensure the compliance of personal information processing activities with provisions of laws and administrative regulations, and prevent unauthorized visit, or leakage, falsification, and loss of personal information:

    (I) formulating internal management system and operational procedures;

    (II) managing personal information by classification;

    (III) taking corresponding technical security measures such as encryption and de-identification;

    (IV) reasonably determining the authority to process personal information and conduct security education and training for employees on a regular basis;

    (V) formulating and organizing the implementation of emergency plans for personal information security incidents; and

    (VI) other measures as prescribed by laws and administrative regulations.

    Article 52

    Where the quantity of personal information processed by a processor reaches that specified by the state cyberspace administration, the processor shall designate a person in charge of personal information protection to be responsible for supervising the processing of personal information and the adopted protection measures.

    A personal information processor shall make public the contact information of the person in charge of personal information protection and submit the name and contact information of the person in charge of personal information protection to the department performing duties of personal information protection.

    Article 53

    Any personal information processor outside the territory of the People’s Republic of China as prescribed in Paragraph 2, Article 3 hereof shall establish a special agency or designate a representative within the territory of the People’s Republic of China to be responsible for relevant matters of personal information protection, and submit the name and contact information of relevant agency or the representative to the department performing duties of personal information protection.

    Article 54

    A personal information processor shall regularly audit whether its processing of personal information is in compliance with provisions of laws and administrative regulations.

    Article 55

    A personal information processor shall conduct personal information protection impact assessment of the following circumstances in advance and keep a record of the processing:

    (I) processing sensitive personal information;

    (II) making use of personal information to make automatic decisions;

    (III) entrusting others to process personal information, providing other personal information processors with personal information, and disclosing personal information;

    (IV) providing personal information to overseas parties; and

    (V) other personal information processing activities that have a significant impact on individuals’ rights and interests.

    Article 56

    The personal information protection impact assessment shall include the following:

    (I) whether the purpose and method of processing personal information are legitimate, justifiable, and necessary;

    (II) impact on individuals’ rights and interests and the security risks; and

    (III) whether the security protection measures taken are legitimate, effective, and appropriate to the degree of risks.

    The personal information protection assessment report and processing record shall be kept for at least three years.

    Article 57

    Where personal information has been or may be leaked, falsified, or lost, the personal information processor shall immediately take remedial measures and inform the department performing duties of personal information protection and the individuals concerned. The notice shall include the following particulars:

    (I) types and causes of personal information leakage, falsification, and loss that have occurred or may occur and the possible harm caused;

    (II) remedial measures taken by personal information processors and measures taken by individuals to mitigate harm;

    (III) contact information of the personal information processor.

    If the personal information processor has taken measures to effectively avoid harm caused by information leakage, falsification, or loss, it may opt not to notify the individuals; however, if the department performing duties of personal information protection believes harm shall be caused, it may require the personal information processor to notify the individuals thereof.

    Article 58

    Personal information processors that provide important Internet platform services with a large number of users and complex business types shall perform the following obligations:

    (I) Establish and improve the compliance system for personal information protection in accordance with state regulations, and establish an independent organization composed mainly of external members to protect personal information;

    (II) Formulate the rules of the platform in accordance with the principles of openness, fairness, and justice, to clarify the norms for the processing of personal information and the obligations of the product or service providers within the platform to protect personal information;

    (III)Stop providing services to the product or service providers on the platform that seriously violate laws and administrative regulations in processing personal information;

    (IV) Regular release of social responsibility report regarding personal information protection and subject to public supervision.

    Article 59

    The party entrusted to process personal information shall fulfill the relevant obligations prescribed by this Law and other relevant laws and administrative regulations, take necessary measures to ensure the security of the personal information processed, and assist personal information processors to fulfill their obligations under this Law.

    Chapter VI.- Departments Performing Duties of personal information protection

    Article 60

    The state cyberspace administration is responsible for coordinating the protection of personal information and relevant supervision and administration work; and relevant departments under the State Council are responsible for protecting, supervising, and administering personal information within the scope of their respective duties in accordance with the provisions of this Law and relevant laws and administrative regulations.

    The duties of relevant departments of local people’s governments at or above the county level in protecting, supervising, and administering personal information shall be determined in accordance with relevant provisions of the State.

    The departments mentioned in the preceding two paragraphs are collectively referred to as the departments performing duties of personal information protection.

    Article 61

    Departments performing duties of personal information protection shall perform the following duties of personal information protection:

    (I) carrying out publicity and education on personal information protection, and guiding and supervising personal information processors to protect personal information;

    (II) accepting and processing complaints and reports relating to personal information protection;

    (III) organizing the evaluation of the protection of personal information such as applications and publish the evaluation results;

    (IV) investigating and processing illegal personal information processing activities; and

    (V) other duties stipulated by laws and administrative regulations.

    Article 62

    The state cyberspace administration shall coordinate with the relevant departments in promoting the protection of personal information in accordance with this Law as follows:

    (I) formulate specific rules and standards for the protection of personal information;

    (II) formulate special personal information protection rules and standards for small personal information processors, sensitive personal information processing, and new technologies and applications such as face recognition and artificial intelligence;

    (III) support research, development, and promotion of secure and convenient electronic identity authentication technology, and promote the construction of public services for online identity authentication;

    (IV) promote the development of a socialized service system for protecting personal information and support relevant organizations in carrying out assessment and certification services in respect of personal information protection.

    (V) improve the mechanism for complaints and whistleblowing reports on personal information protection.

    Article 63

    Departments performing duties of personal information protection may take the following measures when performing the duties of personal information protection:

    (I) inquiry of the parties concerned, and investigation of the circumstances relating to personal information processing activities;

    (II) consulting and copying contracts, records, account books, and other relevant materials relating to personal information processing activities of the parties concerned;

    (III) carrying out on-site inspection and investigation activities relating to processing personal information suspected of violating laws; and

    (IV) checking the equipment and Articles relating to personal information processing activities and may sealing up or seizing the equipment and Articles that are proved to be illegal personal information processing activities upon reporting in writing to the principal of the department and getting approval.

    When departments performing duties of personal information protection perform duties in accordance with the law, the parties concerned shall provide assistance and cooperation, and shall not refuse or obstruct such performance.

    Article 64

    Where departments performing duties of personal information protection find in performing their duties of personal information protection that there are relatively high risks in personal information processing activities or personal information security incidents have occurred, they may interview the legal representative or person chiefly in charge of the personal information processor according to prescribed authority and procedures, or require the personal information processor to entrust professional institutions to conduct compliance audits of their personal information processing activities. The personal information processor shall take measures to make rectification and eliminate hidden dangers as required.

    The department that performs the duty of personal information protection and discovers that the illegal processing of personal information is suspected of a crime in the course of performing its duty, shall promptly transfer the case to the public security organ for handling according to law.

    Article 65

    Any organization or individual has the right to complain or report illegal personal information processing activities to the departments performing duties of personal information protection. The departments receiving such complaints or reports shall promptly process them according to the law and notify the complainants or reporters of the results. The departments performing duties of personal information protection shall make public the contact information for accepting complaints or reports.

    Chapter VII.- Legal Liability

    Article 66

    Where personal information is processed in violation of the provisions hereof, or personal information is processed without fulfilling the personal information protection obligations stipulated in this Law, the departments performing duties of personal information protection shall order the processor to make rectification, give a warning and confiscate its illegal gains, or order the application that illegally processing personal information to suspend or terminate the provision of services; if rectification is refused, a fine of not more than RMB 1 million shall be imposed concurrently on the processor; and a fine of not less than RMB 10,000 but not more than RMB 100,000 shall be imposed on the person directly in charge of the processor and other directly liable persons. Where an illegal act specified in the preceding paragraph is committed and the circumstances are serious, the departments performing duties of personal information protection at or above the provincial level shall order the processor to make rectification, confiscate its illegal gains and impose a fine of not more than RMB 50 million or not more than 5% of its turnover of the previous year on the processor, and may also order the processor to suspend relevant business or to suspend business for rectification, and notify the relevant competent departments to revoke the relevant business permit or business license; and a fine of not less than RMB 100,000 but not more than RMB 1 million shall be imposed on the persons directly in charge and other directly liable persons, and such persons may also be prohibited from serving as directors, supervisors, senior managers, and persons in charge of personal information protection of relevant enterprises for a certain period of time.

    Article 67

    Any illegal act specified in this Law shall be recorded in the credit archives in accordance with the provisions of the relevant laws and administrative regulations and shall be disclosed to the public.

    Article 68

    Where a state organ fails to perform its obligations of protecting personal information as specified in this Law, its superior organ or the department performing the duties of personal information protection shall order it to make rectification, and impose sanctions on the person directly in charge and other directly liable persons according to law.

    Where the staff of departments responsible for personal information protection guilty of dereliction of duties, abusing official powers, or malpractice for personal gain but yet to constitute a crime, they shall be punished pursuant to the law.

    Article 69

    Where the right and interests of personal information are infringed upon due to personal information processing and cause damages, and the personal information processor cannot prove that it is not at fault, it shall bear the tort liability for damages.

    Liability for damages prescribed in the preceding paragraph shall be borne in light of the losses thus caused to the individuals concerned or the benefits thus obtained by the personal information processor; if the losses thus caused to the individuals concerned or the benefits thus obtained by the personal information processor are difficult to be determined, the people’s court shall determine the amount of compensation according to the actual circumstances.

    Article 70

    Where a personal information processor processes personal information in violation of the provisions of this Law, which infringes upon the rights and interests of a large number of individuals, the people’s procuratorate, the consumer organizations specified by law and the organization determined by the state cyberspace administration may file a lawsuit with the people’s court in accordance with the law.

    Article 71

    Where a violation of the provisions of this Law constitutes a violation of public security administration, a public security administration punishment shall be imposed in accordance with the law; if a crime is constituted, criminal liability shall be investigated in accordance with the law.

    Chapter VIII.- Supplementary Provisions

    Article 72

    This Law shall not be applicable to the processing of personal information by a natural person by virtue of his/her personal or family affairs. Where there are legal provisions on the processing of personal information in the statistical and archive administration organized and implemented by the people’s governments at all levels and the relevant departments thereof, such provisions shall apply.

    Article 73

    For the purposes of this Law, the following terms are defined as follows:

    (I) A personal information processor refers to any organization or individual that independently determines the purpose and method of processing in personal information processing activities.

    (II) An automatic decision-making refers to an activity to automatically analyze and evaluate a person’s behavior habits, hobbies or economic, health or credit status through computer programs and make decisions.

    (III) De-identification refers to the process in which personal information is processed so that it is impossible to identify certain natural persons without the use of additional information.

    (IV) Anonymization refers to the process in which the personal information is processed so that it is impossible to identify a certain natural person and unable to be recovered.

    Article 74

    This Law shall come into force as of November 1, 2021.

    23Sep/21

    Data Security Law of the People’s Republic of China. (DSL)

    Data Security Law of the People’s Republic of China. (DSL). China´s National People´s Congress Standing Committee, June 10, 2021 

    Chapter I.- General Provisions

    Article 1

    This Law is formulated in order to standardize data handling activities, ensure data security, promote data development and use, protect the lawful rights and interests of individuals and organizations, and safeguard national sovereignty, security, and development interests.

    Article 2

    This Law applies to data handling activities and their security regulation within the mainland territory of the People’s Republic of China (PRC).

    When data handling activities outside the mainland territory of the PRC harm the national security, the public interest, or the lawful rights and interests of citizens or organizations of the PRC, legal liability is to be pursued according to the law.

    Article 3

    As used in this Law, “data” refers to any information record in electronic or other form.

    “Data handling” includes the collection, storage, use, processing, transmission, provision, disclosure, etc., of data.

    “Data security” refers to ensuring data is in a state of effective protection and lawful use through adopting necessary measures, and to possessing the capacity to ensure a persistent state of security.

    Article 4

    In safeguarding data security, the overall national security concept shall be upheld, data security governance systems established and completed, and data security protection capacities increased.

    Article 5

    The central leading institution for national security is responsible for: policy-making, deliberation, and coordination in national data security work; researching, formulating, and guiding the implementation of national data security strategy and related major directives and policies; comprehensively coordinating major matters and important work in national data security; and establishing a national data security work coordination mechanism.

    Article 6

    Each locality and department is responsible for data collected and created, as well as data security, in the respective locality or department’s work.

    Departments in charge of such sectors as industry, telecommunications, transportation, finance, natural resources, hygiene and health, education, and technology are to undertake data security regulatory duties in their respective field.

    Public security authorities and national security authorities, etc., are to undertake data security regulatory duties within the scope of their respective duties, in accordance with the provisions of this Law and relevant laws and administrative regulations.

    The national cybersecurity and informatization department is responsible for the comprehensive coordination of network data security and related regulatory work, in accordance with the provisions of this Law and relevant laws and administrative regulations.

    Article 7

    The State is to protect the data-related rights and interests of individuals and organizations; encourage lawful, reasonable, and effective data use; ensure the lawful and orderly free flow of data; and promote the development of the digital economy with data as a key factor.

    Article 8

    In the conduct of data handling activities, laws and regulations shall be followed, social public morals and ethics respected, business ethics and professional ethics observed, honesty and trustworthiness [practiced], data security protection obligations fulfilled, and social responsibility assumed; national security and the public interest must not be endangered; and the lawful rights and interests of individuals and organizations must not be harmed.

    Article 9

    The State is to support the launch of data security knowledge propagation and popularization; raising the entire society’s consciousness and level of data security protection; pushing relevant departments, industry organizations, scientific research institutions, enterprises, individuals, etc., to jointly participate in data security protection work; and forming a positive environment for the entire society to jointly safeguard data security and promote development.

    Article 10

    Relevant industry organizations, in accordance with their charters, are to formulate data security standards of conduct and group standards, strengthen industry self-discipline, guide members to strengthen data security protection, raise data security protection levels, and promote the healthy development of the industry.

    Article 11

    The State is to actively engage in international exchanges and cooperation in fields such as data security governance and data development and use, participating in the formulation of international rules and standards related to data security, and promoting the secure and free flow of data across borders.

    Article 12

    Any organization or individual has the right to file a complaint about or report acts violating the provisions of this Law to the relevant department in charge. Departments receiving complaints or reports shall handle them promptly and in accordance with law.

    Relevant departments shall preserve the confidentiality of information related to persons filing complaints or reports and protect the lawful rights and interests of persons filing complaints or reports.

    Chapter II.- Data Security and Development

    Article 13

    The State is to coordinate overall development and security, persist in the promotion of data security through data development and use and industrial development, and ensure the development and use of data and industrial development through data security.

    Article 14

    The State is to implement a big data strategy, advancing data infrastructure construction, and encouraging and supporting the innovative application of data in all industries and all fields.

    Provincial-level and higher people’s governments shall include digital economy development in their respective level’s people’s economic and social development plans, and formulate digital economy development plans as needed.

    Article 15

    The State is to support the development and use of data to increase the intelligentization level of public services. When providing intelligentized public services, the needs of elderly people and people with disabilities shall be fully considered, to avoid creating obstacles in the daily lives of elderly people and people with disabilities.

    Article 16

    The State is to support research into data development and use and data security technology, encourage dissemination and commercial innovation of technology in fields such as data development and use and data security, and foster and develop products and industrial systems for data development and use and data security.

    Article 17

    The State shall promote the construction of technical and data security standards systems for data development and use. The administrative department for standardization under the State Council and the relevant departments of the State Council shall, in accordance with their respective duties, organize the formulation and timely revision of standards relating to data development and use technologies, products, and data security. The State is to support the participation of enterprises, social organizations, and educational or scientific research institutions in the formulation of standards.

    Article 18

    The State is to promote the development of services such as data security testing and assessment, certification, etc., and to support specialized institutions for data security testing and assessment, certification, etc., to carry out service activities in accordance with law.

    The State is to support relevant departments, industry organizations, enterprises, educational or scientific research institutions, relevant professional bodies, etc., in carrying out collaboration in areas such as assessment, prevention, and handling of data security risks.

    Article 19

    The State is to establish and complete data transaction management systems, standardize data transaction behavior, and cultivate a data transaction market.

    Article 20

    The State is to support education and scientific research institutions, enterprises, etc., to carry out education and training in data development and use technologies and data security, adopting diverse methods to cultivate professional talent in data development and use technology and data security, and promoting talent exchanges.

    Chapter III.- Data Security Systems

    Article 21

    The State is to establish a categorized and graded protection system for data, implementing categorized and graded protection according to the data’s degree of importance in economic and social development, as well as the degree of danger to national security, public interests, or the lawful rights and interests of individuals or organizations brought about if it is altered, destroyed, leaked, or illegally obtained or used. The national data security work coordination mechanism is to comprehensively coordinate relevant departments in formulating catalogs of important data and strengthen the protection of important data.

    Data related to national security, the lifelines of the national economy, important aspects of people’s livelihoods, major public interests, etc., constitute core national data, for which a stricter management system is to be implemented.

    Each region and department, in accordance with the categorical and graded protection system for data, shall determine a specific catalog of important data for the respective region, department, or relevant industry, and engage in special protection of data listed in the catalog.

    Article 22

    The State is to establish a centralized and integrated, highly effective, and authoritative mechanism for data security risk assessment, reporting, information sharing, monitoring, and early warning. The national data security work coordinating mechanism is to comprehensively coordinate relevant departments to strengthen data security risk information acquisition, analysis, determination, and early warning work.

    Article 23

    The State is to establish data security emergency response mechanism. When data security incidents occur, relevant departments in charge shall activate emergency response plans in accordance with law, taking corresponding emergency response and handling measures to prevent further harm and eliminate security gaps, and promptly release warning information relevant to the public.

    Article 24

    The State is to establish a data security review system and conduct national security reviews for data handling activities that affect or may affect national security.

    Security review decisions made according to law are final decisions.

    Article 25

    The State is to implement export controls in accordance with law for data belonging to controlled categories in order to safeguard national security and interests and fulfill international obligations.

    Article 26

    When any country or region adopts discriminatory prohibitions, restrictions, or other similar measures against the PRC relevant to investment, trade, etc., in data, data development and use technology, etc., the PRC may take reciprocal measures against that country or region based on the actual circumstances.

    Chapter IV.- Data Security Protection Obligations

    Article 27

    The conduct of data handling activities shall be in compliance with the provisions of laws and administrative regulations, establishing and completing a data security management system for the entire workflow, organizing and conducting data security education and training, and adopting corresponding technical measures and other necessary measures to ensure data security. The conduct of data handling activities using the Internet or other such information networks shall perform the data security protection obligations described above on the basis of the cybersecurity Multi-Level Protection System.

    Important data handlers shall clearly designate persons responsible for data security, and management bodies to implement data security protection responsibilities.

    Article 28

    The conduct of data handling activities and research and development of new data technologies shall be beneficial to promoting economic and social development, enhance the people’s well-being, and conform to social morals and ethics.

    Article 29

    The conduct of data handling activities shall strengthen risk monitoring, and when data security shortcomings, leaks, or other such risks are discovered, remedial measures shall be taken immediately; when data security incidents occur, methods to address them shall be taken immediately, promptly notifying users and reporting to relevant departments in charge as provided.

    Article 30

    Those handling important data shall periodically conduct risk assessments of such data handling activities as provided and submit risk assessment reports to the relevant departments in charge.

    Risk assessment reports shall include the type and amount of important data being handled, the circumstances of the data handling activities, the data security risks faced and measures to address them, etc.

    Article 31

    The provisions of the Cybersecurity Law of the PRC apply to the outbound security management of important data collected or produced by critical information infrastructure operators operating within the mainland territory of the PRC; outbound security management measures for other data handlers collecting or producing important data within the mainland territory of the PRC are to be jointly formulated by the national cybersecurity and informatization department and relevant departments of the State Council.

    Article 32

    Any organization or individual collecting data shall adopt lawful and proper methods and must not steal or otherwise obtain data through illegal methods.

    Where laws or administrative regulations have provisions on the purpose or scope of data collection and use, data shall be collected and used for the purpose and within the scope provided for by those laws and administrative regulations.

    Article 33

    When institutions engaged in data transaction intermediary services provide services, they shall require the party providing the data to explain the source of the data, examine and verify the identities of both parties to the transactions, and retain verification and transaction records.

    Article 34

    Where laws and administrative regulations provide that administrative permits shall be acquired for the provision of services related to data handling, service providers shall obtain permits in accordance with law.

    Article 35

    Where public security authorities and national security authorities obtain data as necessary to safeguard national security or investigate crimes in accordance with law, they shall undergo strict approval procedures according to relevant State provisions and proceed in accordance with law, and relevant organizations and individuals shall cooperate.

    Article 36

    The competent authorities of the PRC are to handle foreign justice or law enforcement institution requests for the provision of data, according to relevant laws and treaties or agreements concluded or participated in by the PRC, or in accordance with the principle of equality and reciprocity. Domestic organizations and individuals must not provide data stored within the mainland territory of the PRC to the justice or law enforcement institutions of foreign countries without the approval of the competent authorities of the PRC.

    Chapter V.- Security and Openness of Government Data

    Article 37

    The State is to forcefully advance the construction of e-government; increase the scientific nature, accuracy, and efficacy of government data; and enhance capabilities to use data in service of economic and social development.

    Article 38

    State authorities that need to collect or use data to perform their legally-prescribed duties shall do so within the scope of their legally-prescribed duties and in accordance with the conditions and procedures provided by law and administrative regulations; they shall preserve the confidentiality, in accordance with law, of data such as personal private [data], personal information, commercial secrets, and confidential commercial information; and they must not divulge or illegally provide it to others.

    Article 39

    State authorities shall, in accordance with the provisions of laws and administrative regulations, establish and complete data security management systems, implement data security protection responsibilities, and ensure government data security.

    Article 40

    State authorities entrusting others to construct or maintain e-government systems, or to store or process government data, shall undergo strict approval procedures, and shall supervise entrusted parties’ performance of data security protection obligations. Entrusted parties shall perform data security protection obligations according to the provisions of laws, administrative regulations, and contractual agreements, and must not retain, use, divulge, or provide others with government data without authorization.

    Article 41

    State authorities shall abide by the principles of fairness, impartiality, and convenience for the people and promptly and accurately disclose government data according to provisions, except that which according to law is not to be disclosed.

    Article 42

    The State is to: formulate government data openness catalogs; build a uniform and standard, interconnected and interactive, secure and controllable government data openness platform; and promote the use of open government data.

    Article 43

    The provisions of this Chapter apply to the conduct of data handling activities in the performance of legally prescribed duties by organizations authorized by laws and administrative regulations to have public affairs management duties.

    Chapter VI.- Legal Liability

    Article 44

    Where relevant departments in charge, in the course of performing data security supervision and management duties, discover the existence of relatively major risks in data handling activities, they may arrange talks with relevant organizations and individuals in accordance with the limits of authority and procedures provided, and require relevant organizations and individuals to adopt measures to carry out reforms or eliminate risks.

    Article 45

    Where organizations or individuals conducting data handling activities do not perform the data security protection obligations provided for in Articles 27, 29, and 30 of this Law, the relevant departments in charge are to order corrections and give warnings, and may also impose a fine of between 50,000 and 500,000 yuan, and a fine of between 10,000 and 100,000 yuan on directly responsible management personnel and other directly responsible personnel. Those who refuse to make corrections or caused serious consequences such as a large-scale data leak are to be fined between 500,000 and 2,000,000 yuan and may be ordered to suspend relevant operations, suspend operations for rectification, or have relevant business permits or licenses revoked; directly responsible management personnel and other directly responsible personnel are to be fined between 50,000 and 200,000 yuan.

    Where core national data management systems are violated, endangering national sovereignty, security, or development interests, relevant departments in charge are to impose a fine of between 2,000,000 and 10,000,000 yuan and, according to the circumstances, order a suspension of relevant operations, suspension of operations for rectification, or the revocation of relevant business permits or licenses; where a crime is constituted, criminal liability is to be pursued in accordance with law.

    Article 46

    Where important data is provided abroad in violation of the provisions of Article 31 of this Law: relevant departments in charge are to order corrections and give warning; a a fine of between 100,000 and 1,000,000 yuan may be imposed; a suspension of relevant operations, suspension of operations for rectification, or revocation of relevant business permits or licenses may be ordered; and directly responsible management personnel and other directly responsible personnel are to be fined between 100,000 and 1,000,000 yuan.

    Article 47

    Where institutions engaged in data transaction intermediary services fail to perform obligations provided by Article 33 of this Law: relevant departments in charge are to order corrections, confiscate unlawful gains, and impose a fine of between the amount of the unlawful gains and 10 times the amount of the unlawful gains; where there are no unlawful gains or the unlawful gains are less than 100,000 yuan, a fine of between 100,000 and 1,000,000 yuan is to be imposed; a suspension of relevant operations, a suspension of business for rectification, or the revocation of relevant business permits or licenses may be ordered; and directly responsible management personnel and other directly responsible personnel are to be fined between 10,000 and 100,000 yuan.

    Article 48

    Where the provisions of Article 35 of this Law are violated through refusal to cooperate with the obtaining of data, the relevant departments in charge are to order correction, give warnings, impose a fine of between 50,000 and 500,000 yuan, and fine directly responsible management personnel and other directly responsible personnel between 10,000 and 100,000 yuan.

    Where the provisions of Article 36 of this Law are violated through the provision of data to foreign justice or law enforcement institutions without the approval of managing authorities, relevant departments in charge are to order corrections, may impose a fine of between 100,000 and 1,000,000 yuan, and may impose a fine of between 10,000 and 100,000 yuan on directly responsible management personnel and other directly responsible personnel; where serious consequences result, a fine of between 1,000,000 and 5,000,000 yuan is to be imposed, and a suspension of relevant operations, a suspension of business for rectification, or the revocation of relevant business permits or licenses may be ordered, and directly responsible management personnel and other directly responsible personnel are to be fined between 50,000 and 500,000 yuan.

    Article 49

    Where State authorities do not perform data security protection obligations provided by this Law, the directly responsible management personnel and other directly responsible personnel are to be sanctioned according to law.

    Article 50

    Where State personnel with data security regulatory duties are derelict, abuse their authority, or abuse their position for private gain, they are to be sanctioned according to law.

    Article 51

    Where data is obtained through theft or other illegal means, or the conduct of data handling activities eliminates or restricts competition or harms the lawful rights and interests of individuals or organizations, punishment is to be given in accordance with the provisions of relevant laws and administrative regulations.

    Article 52

    Where violations of the provisions of this Law harm others, civil liability is to be borne in accordance with law.

    Where violations of the provisions of this Law constitute a violation of public security management, public security administrative sanctions are to be given in accordance with law; where a crime is constituted, criminal liability is to be pursued in accordance with law.

    Chapter VII.- Supplementary Provisions

    Article 53

    The provisions of the Law of the PRC on the Protection of State Secrets and other laws and administrative regulations apply when conducting data handling activities involving state secrets.

    The conduct of data handling activities in statistical or archival work, and the conduct of data handling activities that involve personal information, shall also comply with the provisions of relevant laws and administrative regulations.

    Article 54

    Measures for military data security protection are to be formulated by the Central Military Commission according to provisions separate from this Law.

    Article 55

    This Law is to be implemented beginning Sept. 1, 2021.

    23Sep/21
    Proyecto de Ley

    Anteproyecto de Ley Protección de Datos Personales, mayo 2019

    ANTEPROYECTO DE LEY PROTECCIÓN DE DATOS PERSONALES

    Mayo 2019

    TÍTULO I. DISPOSICIONES GENERALES

    CAPÍTULO I. GENERALIDADES

    Artículo 1. (Objeto)

    La presente ley tiene por objeto normar el tratamiento de datos personales tratados por en el Estado Plurinacional de Bolivia, así como regular los métodos de seguridad, las responsabilidades y sanciones aplicables a cada caso.

    Artículo 2. (Ámbito de Aplicación)

    La presente Ley será aplicable a las personas naturales y/o jurídicas de carácter privado, público o mixto, nacionales o internacionales que traten datos personales de bolivianas y bolivianos, así como los habitantes de nuestro país, con independencia de si el tratamiento tuvo lugar en el territorio nacional o no, así como independientemente de la forma de su tratamiento, modalidad de creación, tipo de soporte, procesamiento, almacenamiento y organización.

    Las disposiciones de la presente ley también serán aplicables, en cuanto resulten pertinentes, a los datos relativos a personas jurídicas.

    Artículo 3. (Definiciones)

    A efecto de la aplicación de la presente Ley, se entiende por:

    a) Bases de datos: Conjunto organizado de datos personales, cualquiera que sea su forma o modalidad de creación, almacenamiento, organización, acceso, tratamiento y difusión.

    Se dividen en:

    – Bases de Datos Automatizadas: Es el conjunto organizado de datos de carácter personal que son creados, tratados y/o almacenados a través de programas de ordenador o software.

    – Bases de Datos no Automatizadas: Es el conjunto organizado de datos de carácter personal que son creados, tratados y/o almacenados de forma manual, con ausencia de programas de ordenador o software.

    b) Consentimiento: Manifestación de la voluntad, libre, expresa, específica, inequívoca e informada, del titular a través de la cual acepta y autoriza con un determinado fin y tiempo específico, el tratamiento de los datos personales que le pertenecen.

    c) Datos Personales: Información (datos y metadatos) de cualquier tipo, que permitan identificar, localizar o contactar a personas naturales o jurídicas. Se divide en:

    – Datos Personales Generales: Información (datos y metadatos) de cualquier tipo empleada para identificar, localizar o contactar de forma directa o indirecta a personas naturales o jurídicas, expresada en forma numérica, alfabética, gráfica, fotográfica, alfanumérica, acústica o de cualquier otro tipo.

    – Datos Personales Sensibles: Aquellos que se refieran a la esfera íntima de una persona natural. De manera enunciativa, se consideran sensibles los datos personales que puedan revelar aspectos como origen racial o étnico; creencias o convicciones religiosas, filosóficas y morales; afiliación sindical; opiniones políticas; datos relativos a la salud, a la vida, preferencia u orientación sexual, datos genéticos o datos biométricos dirigidos a identificar de manera unívoca a una persona física.

    En la presente ley, cuando se contemple “Datos Personales”, se entenderá que abarca los datos personales y sensibles, a menos de que se especifique lo contrario.

    d) Metadato: Aquellos datos que hablan de los datos; es decir, “datos acerca de los datos” y sirven para suministrar información sobre los datos producidos. Los metadatos consisten en información que caracteriza datos, describen el contenido, calidad, condiciones, historia, disponibilidad y otras características de los datos.

    – Ser datos altamente estructurados que describen características de los datos, como el contenido, calidad, información y otras circunstancias o atributos.

    – Presentan diferenciaciones que dependerán, en última instancia, de las reglas incluidas en las aplicaciones para determinar la estructura interna de los esquemas de datos.

    – Pueden clasificarse en función de distintos criterios, como su contenido, variabilidad o función.

    e) Derechos ARCO: Derechos personalísimos y fundamentales de acceso, rectificación, cancelación y oposición al tratamiento de datos personales. En todo momento el titular o su representante podrán solicitar al responsable, el acceso, rectificación, cancelación u oposición al tratamiento de los datos personales que le conciernen. El ejercicio de cualquiera de los derechos ARCO no es requisito previo, ni impide el ejercicio de otro.

    f) Disociación de Datos: Todo tratamiento de datos personales y/ o sensibles de manera que la información obtenida no pueda asociarse a persona determinada o determinable. Se divide en:

    – Anonimización: Proceso irreversible mediante el cual los datos identificativos se disocian de los datos personales y/o sensibles. Existen tres tipos: Generalización, aleatorización y eliminación. Tiene la finalidad de minimizar la posibilidad directa o indirecta de identificación del titular.

    – Seudonimización: Proceso reversible de desasociación de datos personales del titular, sustituyéndolos por códigos, palabras u otros similares, con la finalidad de resguardar los datos personales y/o sensibles.

    g) Encargado: Prestador de servicios, que con el carácter de persona natural o jurídica o autoridad pública, ajena a la organización del responsable, trata datos personales sensibles a nombre y por cuenta de un tercero éste.

    h) Exportador: Persona natural o jurídica privada, o pública o mixta que efectúe transferencias internacionales de datos personales.

    i) Responsables del Tratamiento de Datos Personales: Son las personas naturales o jurídicas encargadas de obtener el consentimiento de los titulares de forma directa o indirecta y están a cargo de la recopilación, aplicación de medios de seguridad y tratamiento de Datos Personales, según corresponda. Se dividen en:

    – Responsable: Persona natural o jurídica privada, pública o mixta, que sólo o en conjunto con otros, define los fines y medios y realiza el tratamiento de datos personales a nombre propio, de forma directa o por intermedio de terceros encargados.

    – Encargado: Es la persona natural o jurídica privada, pública o mixta a la cual se delega el tratamiento de datos personales a nombre del Responsable.

    – Exportador: Persona natural o jurídica privada, pública o mixta, que efectúa transferencias de datos personales a nivel nacional y/o internacional. Una persona natural o jurídica podrá tener, al mismo tiempo, la condición de exportador y de responsable o encargado.

    Cuando en la presente ley se estipule una obligación aplicable al “Responsable” del tratamiento de datos personales, tendrá alcance a todas las divisiones contempladas en el presente literal.

    j) Titular: Persona natural o jurídica sobre quien recae el derecho propietario (la titularidad y pertinencia) de los datos personales.

    k) Tratamiento: Cualquier operación o conjunto de operaciones efectuadas mediante procedimientos físicos o automatizados realizadas sobre datos personales, relacionados, de manera enunciativa más no limitativa, con la obtención, acceso, registro, organización, estructuración, adaptación, indexación, modificación, extracción, consulta, almacenamiento, conservación, elaboración, transferencia, difusión, posesión, aprovechamiento y en general cualquier uso o disposición de datos personales.

    CAPÍTULO II. GARANTÍAS Y PRINCIPIOS

    Artículo 4. (Principios y Garantías Constitucionales)

    El Estado, en el marco de lo dispuesto por nuestro bloque constitucional, garantizará a los titulares de los datos personales, el ejercicio de todos los derechos reconocidos en los tratados internacionales de derechos fundamentales; así como el cumplimiento por parte de personas naturales, jurídicas privadas, públicas o mixtas, nacionales e internacionales, de la presente ley, con el propósito de impedir efectivamente el tráfico ilícito de datos personales, lesivo a la dignidad y derecho del/la afectado(a).

    Artículo 5. (Principios Comerciales)

    Las relaciones jurídicas de naturaleza comercial se regirán por las normas corporativas vinculantes (Binding Corporate Rules BCR) y los principios de buena fe, transparencia, equidad, minimización de datos, democratización, autonomía de voluntad, independencia, sostenibilidad, seguridad jurídica, simplicidad y celeridad, así como aquellos principios contemplados en la presente norma y aquellas de carácter supranacional de derechos humanos, ha momento de procesar el tratamiento de datos de manera nacional e internacional, debiendo prevalecer los derechos de los titulares en todo momento y contexto.

    Artículo 6. (Principio de Licitud)

    El tratamiento de datos personales debe cumplir con elementos de: veracidad de los datos, legitimidad de los fines del tratamiento, adopción de las medidas de seguridad, cumplimiento de los deberes de conservación, información, consentimientos, concretados en la calidad y legitimación de los datos a través del estricto apego y cumplimiento de lo dispuesto en las leyes bolivianas y los tratados internacionales de derechos humanos aplicables a la materia.

    Artículo 7. (Principio de Lealtad)

    I. El principio de tratamiento leal y transparente exigen que se informe el tipo de tratamiento y manejo de sus datos personales y/o sensibles, incluyendo los medios de seguridad aplicables.

    Notificando al titular del derecho cada vez que un servidor público y/o persona natural de derecho privado ingrese a consultar o tratar sus datos, haciéndole conocer el fin o los fines de dicho tratamiento, obteniendo un consentimiento del titular de manera previa, privilegiando la protección de los intereses del titular y absteniéndose de tratar éstos a través del consentimiento obtenido a través medios engañosos o fraudulentos.

    II. Es desleal aquellos tratamientos de datos personales y/o sensibles que den lugar a actos, hechos de cualquier naturaleza, contrarios a los intereses del titular de los datos, ya sea una discriminación injusta o arbitraria, u otras. Quedando prohibido cualquier tratamiento desleal.

    Artículo 8. (Principio de Transparencia)

    I. El Responsable informará al titular sobre la existencia misma y características principales del tratamiento al que serán sometidos sus datos personales y/o sensibles, a fin de que pueda tomar decisiones informadas al respecto.

    II. El Responsable proporcionará al titular, al menos, la siguiente información:

    1) Su identidad y datos de contacto.

    2) Las finalidades del tratamiento a que serán sometidos sus datos personales y/o sensibles.

    3) Las comunicaciones nacionales o internacionales, de datos personales y/o sensibles que pretenda realizar, incluyendo los destinatarios y las finalidades que motivan la realización de las mismas.

    4) La existencia, forma y mecanismos o procedimientos a través de los cuales podrá ejercer los derechos de acceso, rectificación, cancelación, oposición y portabilidad.

    5) En su caso, el origen de los datos personales y/o sensibles cuando el responsable no los hubiere obtenido directamente del titular.

    6) Las personas dependientes o no del responsable, que tendrán acceso a los datos personales y/o sensibles del titular.

    7) El plazo determinado para el tratamiento de los datos personales y/o sensibles.

    8) Información expresa y explícita de los derechos ARCO y el bloque constitucional que resguarda a los titulares de los datos personales y/o sensibles, así como las posibilidades legales e instancias de reclamo existentes en el Estado Plurinacional de Bolivia.

    III. La información proporcionada al titular tendrá que ser suficiente y fácilmente accesible, así como redactarse y estructurarse en un lenguaje claro, sencillo y de fácil comprensión para los titulares a quienes va dirigida, especialmente si se trata de niñas, niños y adolescentes. El titular de los datos personales y/o sensibles podrá solicitar que tanto el consentimiento expreso, como la información relativa al tratamiento de sus datos, se realice en su idioma nativo.

    Artículo 9. (Principio de Finalidad)

    I. Todo tratamiento de datos personales se limitará al cumplimiento de finalidades determinadas, explícitas y legítimas.

    II. El responsable, sus dependientes o terceras personas relacionadas al responsable, no podrán tratar los datos personales y/o sensibles, en su posesión, para finalidades distintas a aquéllas que motivaron el consentimiento expreso del titular y por ende el tratamiento original de éstos.

    Artículo 10. (Principio de proporcionalidad)

    El responsable tratará únicamente los datos personales y/o sensibles que resulten adecuados, pertinentes y limitados al mínimo necesario con relación a la(s) finalidad(es) que justifican su tratamiento y que se invocan en el consentimiento expreso del titular. Para ello, el registro informático de datos personales y/o sensibles deberá realizarse de la manera más granular posible, asegurando que cualquier consulta realizada a la base de datos que lo almacena acceda a la información directamente relacionada a la finalidad de la consulta y emerja de la notificación del titular, del acceso a los datos personales y/o sensibles de su pertenencia.

    Artículo 11. (Principio de Calidad)

    I. El responsable adoptará las medidas necesarias para mantener exactos, completos y actualizados los datos personales en su posesión, de tal manera que no se altere la veracidad de éstos. Esto conforme se requiera para el cumplimiento de las finalidades que motivaron su tratamiento.

    II. Cuando los datos personales hubieren dejado de ser necesarios para el cumplimiento de las finalidades que motivaron su tratamiento, el responsable los suprimirá o eliminará de sus archivos, registros, bases de datos, expedientes o sistemas de información, o en su caso, los someterá a un procedimiento de anonimización.

    III. En la supresión de los datos personales, el responsable implementará métodos y técnicas orientadas a la eliminación definitiva y segura de éstos.

    IV. Los datos personales únicamente serán conservados durante el plazo necesario para el cumplimiento de las finalidades que justifiquen su tratamiento o aquéllas relacionadas con exigencias legales aplicables al responsable.

    Artículo 12. (Principio de Responsabilidad)

    I. El responsable implementará los mecanismos necesarios para acreditar el cumplimiento de los principios y obligaciones establecidas en los presentes Ley, así como rendirá cuentas sobre el tratamiento de datos personales al titular y a la Agencia de Protección de Datos Personales – APP, para lo cual podrá valerse de estándares, mejores prácticas nacionales o internacionales, esquemas de autorregulación, sistemas de certificación o cualquier otro mecanismo que determine adecuado para tales fines. Esta obligación, aplicará también cuando los datos personales sean tratados por parte de un encargado a nombre y por cuenta del responsable, así como al momento de realizar transferencias de datos personales.

    II. Entre los mecanismos que el responsable podrá adoptar para cumplir con el principio de responsabilidad se encuentran, de manera enunciativa más no limitativa, los siguientes:

    1. Destinar recursos para la instrumentación de programas y políticas de protección de datos personales.

    2. Implementar sistemas de administración de riesgos asociados al tratamiento de datos personales.

    3. Elaborar políticas y programas de protección de datos personales obligatorios y exigibles al interior de la organización del responsable.

    4. Poner en práctica un programa de capacitación y actualización del personal sobre las obligaciones en materia de protección de datos personales.

    5. Revisar periódicamente las políticas y programas de seguridad de datos personales para determinar las modificaciones que se requieran.

    6. Establecer un sistema de supervisión y vigilancia interna y/o externa, incluyendo auditorías, para comprobar el cumplimiento de las políticas de protección de datos personales.

    7. Establecer procedimientos para recibir y responder dudas y quejas de los titulares.

    III. El responsable revisará y evaluará permanentemente los mecanismos que para tal efecto adopte voluntariamente para cumplir con el principio de responsabilidad, con el objeto de medir su nivel de eficacia en cuanto al cumplimiento de la legislación nacional aplicable.

    Artículo 13. (Principio de Seguridad)

    I. El responsable establecerá y mantendrá medidas de carácter administrativo, físico y técnico suficientes para garantizar la confidencialidad, integridad y disponibilidad de los datos personales.

    II. Para la determinación de las medidas referidas en el numeral anterior, el responsable considerará los siguientes factores:

    1. El riesgo para los derechos y libertades de los titulares, en particular, por el valor potencial cuantitativo y cualitativo que pudieran tener los datos personales tratados para una tercera persona no autorizada para su posesión.

    2. El estado de la técnica.

    3. Los costos de aplicación.

    4. La naturaleza de los datos personales tratados, en especial si se trata de datos personales sensibles.

    5. El alcance, contexto y las finalidades del tratamiento.

    6. Las transferencias internacionales de datos personales que se realicen o pretendan realizar.

    7. El número de titulares.

    8. Las posibles consecuencias que se derivarían de una vulneración para los titulares.

    9. Las vulneraciones previas ocurridas en el tratamiento de datos personales.

    III. El responsable llevará a cabo una serie de acciones que garanticen el establecimiento, implementación, operación, monitoreo, revisión, mantenimiento y mejora continua de las medidas de seguridad aplicables al tratamiento de los datos personales, de manera periódica.

    Artículo 14. (Principio de Confidencialidad)

    El responsable establecerá controles o mecanismos para que quienes intervengan en cualquier fase del tratamiento de los datos personales mantengan y respeten la confidencialidad de los mismos, obligación que subsistirá aun después de finalizar sus relaciones con el titular.

    Artículo 15. (Principio Pro Homine)

    Criterio interpretativo que establece que se debe aplicar la norma o la interpretación más favorable a la persona o titular de los datos personales, considerándose la protección y la prohibición de la limitación de Derechos Humanos, aplicando la norma, interpretación o situación menos restrictiva y más favorable al titular.

    TÍTULO II. CONSENTIMIENTO

    CAPÍTULO I. CONDICIONES Y TRATAMIENTO DE SECTORES VULNERABLES

    Artículo 16. (Condiciones para el Consentimiento)

    I. El consentimiento debe ser expreso, previo e informado; por tanto, el Responsable deberá contar de manera inobjetable, de manera previa al tratamiento de los datos personales, con el consentimiento expreso del titular. El mismo para no contar con vicios, deberá ser informado, especificar la finalidad, los mecanismos de seguridad que empleará en el tratamiento de los datos personales y el tiempo de vigencia de dicho consentimiento y por tanto de posibilidad de tratamiento de los datos.

    II. El titular podrá revocar, en cualquier momento, el consentimiento otorgado. El responsable establecerá mecanismos sencillos, ágiles, eficaces y gratuitos para este fin.

    III. El consentimiento otorgado por el titular de datos personales, no otorga el derecho a terceros de hacer uso del tratamiento consentido, a menos de que el consentimiento incluya esta posibilidad.

    IV. La información previa al consentimiento deberá ser otorgada en el idioma nativo del titular de los datos personales, pudiendo solicitar un traductor para el efecto. Asimismo, para las personas con capacidades diferentes no interdictas se les otorgará la información en los medios idóneos para su comprensión, asegurando dicho extremo de manera documental.

    Artículo 17. (Tratamiento de Datos Personales de Sectores Vulnerables)

    El consentimiento para el tratamiento de datos personales de menores de edad y personas con capacidades diferentes interdictas, será obtenido a través del consentimiento de los tutores, titulares de la patria potestad o guarda, cumpliendo rigurosamente las condiciones del consentimiento y principios consagrados por la presente ley.

    CAPÍTULO II. EXCEPCIONES

    Artículo 18. (Excepciones)

    Los datos personales podrán ser objeto de tratamiento por una persona natural o jurídica privada, pública o mixta, cuando el titular otorgue el consentimiento expreso e informado, para una o varias finalidades específicas.

    Excepcionalmente, el tratamiento de datos personales podrá realizarse sin el consentimiento del titular pero con su conocimiento informado, en los siguientes casos.

    1. El tratamiento sea necesario para el cumplimiento de una orden judicial, requerimiento fiscal fundado y motivado, en atención a un proceso abierto y en curso, de autoridad pública competente.

    2. El tratamiento sea necesario para el reconocimiento o defensa de los derechos del titular ante una autoridad pública.

    3. El tratamiento sea necesario para proteger la vida del titular.

    4. El tratamiento sea necesario por razones de interés público establecidas o previstas en ley.

    TÍTULO III. DERECHOS Y OBLIGACIONES

    CAPÍTULO I. DERECHOS DEL TITULAR DE DATOS PERSONALES

    Artículo 19. (Derechos del Titular de los Datos Personales)

    En todo momento el titular o su representante podrán solicitar al responsable, el acceso, rectificación, cancelación, oposición y portabilidad de los datos personales que le conciernen. El ejercicio de cualquiera de los derechos referidos anteriormente no es requisito previo, ni impide el ejercicio de otro.

    Artículo 20. (Derecho de Acceso)

    El titular tendrá el derecho de solicitar el acceso a sus datos personales que estuviesen en posesión del responsable, así como a conocer cualquier información relacionada con las condiciones generales y específicas de su tratamiento. Los responsables deberán comunicar mediante mecanismos digitales a la Agencia de Protección de Datos Personales – APP de todo tratamiento y acceso que se realice sobre datos personales. La Agencia de Protección de Datos Personales – APP deberá poner a disposición del titular de los datos personales la información de los tratamientos y accesos realizados sobre datos personales de cualquier institución (pública, privada y/o mixta), así como de aquellas personas naturales.

    Artículo 21. (Derecho de Rectificación)

    El titular tendrá el derecho a obtener del responsable, la rectificación o corrección de sus datos personales, cuando éstos resulten ser inexactos, incompletos o no se encuentren actualizados.

    Artículo 22. (Derecho de Cancelación)

    El titular tendrá derecho a solicitar la cancelación o supresión de sus datos personales de los archivos, registros, expedientes y sistemas del responsable, a fin de que los mismos ya no estén en su posesión y dejen de ser tratados por este último.

    Artículo 23. (Derecho de Oposición

    El titular podrá oponerse al tratamiento de sus datos personales cuando:

    1. Tenga una razón legítima derivada de su situación particular.

    2. El tratamiento de sus datos personales tenga por objeto la mercadotecnia directa, incluida la elaboración de perfiles, en la medida que esté relacionada con dicha actividad.

    Artículo 24. (Derecho a no ser Objeto de Decisiones Individuales Automatizadas)

    I. El titular tendrá derecho a no ser objeto de decisiones que le produzcan efectos jurídicos o le afecten de manera significativa que se basen únicamente en tratamientos automatizados destinados a evaluar, sin intervención humana, determinados aspectos personales del mismo o analizar o predecir, en particular, su rendimiento profesional, situación económica, estado de salud, preferencias sexuales, fiabilidad o comportamiento.

    II. Lo dispuesto en el parágrafo anterior no resultará aplicable cuando el tratamiento automatizado de datos personales sea necesario para la celebración o la ejecución de un contrato entre el titular y el responsable; esté autorizado por normativa legal vigente, o bien, se base en el consentimiento demostrable del titular.

    III. No obstante, cuando sea necesario para la relación contractual o el titular hubiere manifestado su consentimiento tendrá derecho a obtener la intervención humana; recibir una explicación sobre la decisión tomada; expresar su punto de vista e impugnar la decisión.

    IV. El responsable no podrá llevar a cabo tratamientos automatizados de datos personales que tengan como efecto la discriminación de los titulares por su origen racial o étnico; creencias o convicciones religiosas, filosóficas y morales; afiliación sindical; opiniones políticas; datos relativos a la salud, a la vida, preferencia u orientación sexual, así como datos genéticos o datos biométricos.

    Artículo 25. (Derecho a la Portabilidad de los Datos Personales)

    I. Cuando se traten datos personales por vía electrónica o medios automatizados, el titular tendrá derecho a obtener una copia de los datos personales que hubiere proporcionado al responsable o que sean objeto de tratamiento, en un formato electrónico estructurado, de uso común y lectura mecánica, que le permita seguir utilizándolos y transferirlos a otro responsable, en caso de que lo requiera.

    II. El titular podrá solicitar que sus datos personales se transfieran directamente de responsable a responsable cuando sea técnicamente posible.

    III. El derecho a la portabilidad de los datos personales no afectará negativamente a los derechos y libertades de otros.

    IV. Sin perjuicio de otros derechos del titular, el derecho a la portabilidad de los datos personales no resultará procedente cuando se trate de información inferida, derivada, creada, generada u obtenida a partir del análisis o tratamiento efectuado por el responsable con base en los datos personales proporcionados por el titular, como es el caso de los datos personales que hubieren sido sometidos a un proceso de personalización, recomendación, categorización o creación de perfiles.

    Artículo 26. (Derecho a la Limitación del Tratamiento de los Datos Personales)

    El titular tendrá derecho a que el tratamiento de datos personales se limite al plazo y finalidad otorgado en el consentimiento para ello. Asimismo, su almacenamiento durante el periodo que medie, entre una solicitud de rectificación u oposición hasta su resolución por el responsable. El titular tendrá derecho a la limitación del tratamiento de sus datos personales cuando éstos sean innecesarios para el responsable, pero los necesite para formular una reclamación.

    Artículo 27. (Derecho de Indemnización)

    El titular tiene derecho a ser indemnizado cuando hubiere sufrido daños y perjuicios, como consecuencia de una violación a cualquiera de los derechos establecidos en la presente ley, normas conexas y aquellas que otorguen mayor protección a los derechos humanos.

    CAPÍTULO II. EJERCICIO DE DERECHOS

    Artículo 28. (Ejercicio de los Derechos ARCO)

    I. El responsable establecerá medios y procedimientos sencillos, expeditos, accesibles, gratuitos e informales que permitan al titular ejercer sus derechos de acceso, rectificación, cancelación, oposición y portabilidad. Estos mecanismos y procedimientos no podrán exceder los plazos establecidos en el presente artículo.

    Siendo los mismos en todo caso supletorios ante la ausencia de medios y procedimientos dictados por el titular.

    II. Para el ejercicio de los derechos establecidos en el parágrafo anterior, no se requerirá otro requisito que la identificación del solicitante y se tramitará conforme el siguiente procedimiento:

    1. El titular deberá exponer de manera verbal o escrita el derecho que desea hacer valer y las razones que justifican tal solicitud.

    2. El responsable deberá registrar la solicitud del titular y entregar una constancia de la recepción de la solicitud realizada.

    3. En el plazo máximo de 7 días hábiles el responsable deberá resolver la solicitud realizada por el titular.

    4. En caso que el titular no estuviere conforme con la decisión tomada por el responsable, o en el mismo no hubiere emitido una respuesta en el plazo establecido en el numeral anterior, el titular podrá acudir a la Agencia de Protección de Datos Personales – APP y/o ante la jurisdicción constitucional.

    5. El responsable únicamente podrá determinar la no procedencia de la solicitud en los casos de rectificación, cancelación, oposición y portabilidad al amparo de las siguientes causales:

    – El responsable acredite tener motivos legítimos para que el tratamiento prevalezca sobre los intereses, los derechos y las libertades del titular.

    – El tratamiento sea necesario para el cumplimiento de una disposición legal.

    TITULO IV. BASE DE DATOS

    CAPÍTULO I. BASES DE DATOS PÚBLICAS Y PRIVADAS

    Artículo 29. (Creación y Tratamiento de Bases de Datos Públicas)

    La creación y tratamiento de bases de datos por parte de las administraciones públicas, sólo podrán realizarse en razón a las materias de su competencia y en estricto cumplimiento a lo descrito en la presente ley. No se generarán bases de datos o su tratamiento, que vulneren los principios y derechos consagrados en la presente norma.

    Artículo 30. (Interoperatividad de Datos entre Administraciones Públicas)

    Las entidades públicas dentro del desempeño de sus funciones, únicamente podrán realizar la comunicación de datos de carácter personal a terceras entidades públicas de forma justificada y previo consentimiento informado y expreso del titular.

    Artículo 31. (Creación y Tratamiento de Bases de Datos Privadas)

    Las personas naturales y jurídicas podrán crear y tratar bases de datos que contengan datos de carácter personal cuando sea congruente con la finalidad del servicio que brinda, con estricto cumplimiento a las disposiciones contenidas en la presente ley.

    Artículo 32. (Datos de Acceso Público)

    1. Los datos personales almacenados en listas de cámaras, entes colegiados o agrupaciones profesionales deberán limitarse a los usos para los cuales fueron recogidos y tratados, en el marco de los principios y derechos enunciados.

    2. Toda ampliación o solicitud de datos adicionales deberá recabar el consentimiento previo, informado y expreso del titular, pudiendo éste último oponerse y en cualquier momento ejercer el derecho de cancelación sobre dicho tratamiento, así como todos los derechos reconocidos por la presente ley.

    3. Los datos personales comunicados a través de medios de comunicación convencionales y difusión masiva como la televisiva, radial, escrita y plataformas web, no podrán ser considerados como una aceptación tácita para la creación de ficheros, ni para el tratamiento de datos personales. Dichas comunicaciones deberán enmarcarse en todo momento a los principios y derechos consagrados en la Constitución Política del Estado Plurinacional de Bolivia, la presente ley y normas conexas.

    Artículo 33. (Tratamiento de Datos Personales con Fines Publicitarios)

    1. Las entidades que se dediquen a la recopilación de direcciones, reparto de documentos, publicidad, venta a distancia, gestión comercial y otras actividades análogas, utilizarán nombres y direcciones u otros datos de carácter personal cuando los mismos hayan sido facilitados por los titulares y hayan sido otorgados a través de un consentimiento previo, informado y expreso.

    2. Los mensajes publicitarios y comerciales deberán ser claramente identificados con esa naturaleza.

    3. Los titulares tendrán derecho a conocer el origen de sus datos personales cuando hayan recibido comunicaciones comerciales o mensajes publicitarios.

    4. Los titulares tendrán derecho a oponerse, previa petición y sin gastos, al tratamiento de los datos que les conciernan, en cuyo caso serán dados de baja del tratamiento de forma inmediata, cancelándose las informaciones que sobre ellos figuren, a simple solicitud.

    CAPÍTULO II. TRANSFERENCIA DE RESPONSABILIDADES DE TRATAMIENTO DE DATOS PERSONALES

    Artículo 34. (Delegación del Tratamiento de Datos Personales por el Responsable)

    I. La delegación del tratamiento de datos personales del responsable en favor de un tercero por fuera de su estructura organizacional, deberá formalizarse mediante la suscripción de un contrato o instrumento jurídico suscrito por las partes, bajo los lineamientos dictados por la autoridad.

    II. El contrato o instrumento jurídico establecerá, al menos, el objeto, alcance, contenido, duración, naturaleza y finalidad del tratamiento; el tipo de datos personales; las categorías de titulares, así como las obligaciones y responsabilidades del responsable y encargado.

    III. El contrato o instrumento jurídico establecerá, al menos, las siguientes cláusulas generales relacionadas con los servicios:

    1. Realizar el tratamiento de los datos personales conforme a las instrucciones del responsable.

    2. Abstenerse de tratar los datos personales para finalidades distintas a las instruidas por el responsable.

    3. Implementar las medidas de seguridad conforme a los instrumentos jurídicos aplicables.

    4. Informar al responsable cuando ocurra una vulneración a los datos personales que trata por sus instrucciones.

    5. Guardar confidencialidad respecto de los datos personales tratados.

    6. Suprimir, devolver o comunicar a un nuevo encargado designado por el responsable los datos personales objeto de tratamiento, una vez cumplida la relación jurídica con el responsable, excepto que una disposición legal exija la conservación de los datos personales, o bien, que el responsable autorice la comunicación de éstos a otro encargado o exportador, de forma expresa y especifique las condiciones para dicho efecto.

    7. Abstenerse de transferir los datos personales, sin autorización expresa del responsable, salvo por mandato expreso de la Agencia de Protección de Datos Personales –APP.

    8. Permitir al responsable o Agencia de Protección de Datos Personales – APP, realizar inspecciones y verificaciones in situ.

    9. Generar, actualizar y conservar la documentación que sea necesaria y que le remita acreditar sus obligaciones, siempre y cuando no esté relacionada con la información de la Base de Datos Personales.

    10. Colaborar con el responsable en todo lo relativo al cumplimiento de la legislación del Estado Plurinacional de Bolivia que resulte aplicable a la materia.

    IV. El Encargado o Exportador están obligados a verificar la existencia del consentimiento de los titulares de las bases de datos que tratará por encargo del responsable.

    V. Una vez concluida la relación con el responsable, el encargado o exportador deberá destruir la información, sin importar el medio de soporte que la contenga, referente a los Datos Personales y la Base de Datos delegada por el responsable.

    VI. La delegación del tratamiento, no exonera de responsabilidad al responsable, contando todas las partes intervinientes en la obtención y tratamiento de los Datos Personales, responsabilidades frente al titular.

    Artículo 35. (Subcontratación de Servicios)

    El Encargado podrá, a su vez, subcontratar servicios que impliquen el tratamiento de datos personales, siempre y cuando exista una autorización previa por escrito y específica del responsable, a través del contrato o instrumento jurídico suscrito entre este último y el encargado.

    Instrumento legal que deberá enmarcarse a los lineamientos dictados por la Agencia de Protección de Datos Personales – APP.

    Artículo 36. (Reglas Generales para las Transferencias de Datos Personales)

    I. El Responsable o Exportador podrán realizar transferencias internacionales de datos personales cuando se cumplan los siguientes supuestos:

    1. En el país donde se hará el tratamiento de los datos personales hubiere reconocido un nivel adecuado de protección de datos personales por parte de la autoridad.

    2. El exportador ofrezca garantías suficientes del tratamiento de los datos personales en el país destinatario, y éste, a su vez, acredite el cumplimiento de las condiciones mínimas y suficientes establecidas en la legislación aplicable.

    3. El exportador y destinatario suscriban cláusulas contractuales o cualquier otro instrumento jurídico que ofrezca garantías suficientes y que permita demostrar el alcance del tratamiento de los datos personales, las obligaciones y responsabilidades asumidas por las partes y los derechos de los titulares. La Agencia de Protección de Datos Personales – APP validará cláusulas contractuales e instrumentos jurídicos donde se reconocerá la nacionalidad y jurisdicción de los datos personales.

    4. Cuando sea requerido, la Agencia de Protección de Datos Personales – APP, autorizará la transferencia.

    Artículo 37. (Oficial de Protección de Datos Personales)

    I. El Responsable, Encargado y/o el Exportador, deberán designar a un oficial de protección de datos personales cuando:

    1. Sea una entidad pública.

    2. Lleve a cabo tratamientos de datos personales que tengan habitualidad y aplicación sistemática.

    3. Realice tratamientos de datos personales donde sea probable que entrañe un alto riesgo de afectación del derecho a la protección de datos personales de los titulares, considerando, entre otros factores y de manera únicamente enunciativa más no limitativa, el tratamiento de datos personales sensibles; debiendo registrar y estar al alcance del titular a simple petición, las transferencias que se efectúen; el alcance del tratamiento; las tecnologías de información utilizadas o las finalidades de éstos y los servidores públicos que hayan accedido a dichos datos personales.

    II. El responsable que no se encuentre en alguna de las causales previstas en el parágrafo anterior, podrá designar a un oficial de protección de datos personales si así lo estima conveniente.

    III. El responsable estará obligado a otorgar al oficial de protección de datos personales en el desempeño de sus funciones, los recursos necesarios para su desempeño y para el mantenimiento de sus conocimientos especializados y la actualización de éstos.

    IV. El oficial de protección de datos personales tendrá, al menos, las siguientes funciones:

    1. Asesorar al responsable respecto a los temas que sean sometidos a su consideración en materia de protección de datos personales.

    2. Coordinar, al interior de la organización del responsable, las políticas, programas, acciones y demás actividades que correspondan para el cumplimiento de la normativa relativa a la protección de datos.

    3. Supervisar al interior de la organización del responsable el cumplimiento de la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    Artículo 38. (Privacidad en el Tratamiento de Datos Personales)

    El responsable aplicará, desde el diseño, en la determinación de los medios del tratamiento de los datos personales, durante el mismo y antes de recabar los datos personales, medidas preventivas de diversa naturaleza que permitan aplicar de forma efectiva los principios, derechos y demás obligaciones previstas en la presente Ley.

    El responsable garantizará que sus programas, servicios, sistemas, plataformas informáticas, aplicaciones electrónicas o cualquier otra tecnología que implique un tratamiento de datos personales, cumpla por defecto o se ajusten a los principios, derechos y demás obligaciones previstas en la presente Ley.

    Artículo 39. (Mecanismos de Autorregulación)

    El responsable podrá adherirse, de manera voluntaria, a esquemas de autorregulación vinculante.

    Artículo 40. (Evaluación de Impacto a la Protección de Datos Personales)

    Cuando el responsable pretenda tratar datos personales sensibles o que por su naturaleza, alcance, contexto o finalidades, sea probable que entrañe un alto riesgo de afectación del derecho a la protección de datos personales de los titulares, realizará, de manera previa, a la implementación del recojo y tratamiento, una evaluación del impacto a la protección de los datos personales, aplicable al caso en concreto, estipulando medidas específicas de seguridad que permitan l mayor protección para los titulares. Informe que será presentado ante la Agencia de Protección de Datos Personales – APP para su correspondiente aprobación.

    TÍTULO V. REGULACIÓN DEL TRATAMIENTO DE DATOS PERSONALES

    CAPÍTULO I. AGENCIA DE PROTECCIÓN DE DATOS PERSONALES – APP

    Artículo 41. (Naturaleza)

    Se crea la Agencia de Protección de Datos Personales – APP como entidad pública autárquica, con personalidad jurídica de derecho público, con jurisdicción nacional, autonomía de gestión técnica, administrativa y presupuestaria.

    Artículo 42. (Objeto)

    II. La Agencia de Protección de Datos Personales – APP tiene como objeto ejecutar la regulación y supervisión del recojo y tratamiento de los Datos Personales, con la finalidad de velar por el sano funcionamiento y desarrollo de las Bases de Datos con dichas características, bajo los postulados y derechos expuestos en la presente ley.

    III. La Agencia de Protección de Datos Personales – APP, es la institución encargada de ejercer las funciones de regulación, supervisión y control de las personas naturales y jurídicas de derecho privado, público y mixto, en base a las disposiciones de la presente Ley.

    Artículo 43. (Directorio)

    El Directorio de la Agencia de Protección de Datos Personales – APP estará conformado por los siguientes representantes:

    1. Un representante del Ministerio de Obras Públicas, Servicios y Vivienda.

    2. Tres representantes de los Gobiernos Autónomos Departamentales.

    3. Un representante de la Confederación de Empresarios Privados de Bolivia (CEPB).

    4. Dos representantes de la sociedad civil.

    Artículo 44. (Atribuciones)

    La Agencia de Protección de Datos Personales – APP tiene las siguientes atribuciones, además de aquellas que sean inherentes al ejercicio de sus funciones:

    1. Registrar, regular, supervisar y sancionar a las personas naturales y jurídicas de cualquier naturaleza, que tengan bases de datos públicas y privadas en las que se almacenen y traten datos personales.

    2. La Agencia de Protección de Datos Personales – APP, emitirá reglamentación específica y supervisará su cumplimiento en el marco de la normativa aplicable.

    3. conocerá y resolverá los recursos de alzada y jerárquico que se interpongan contra los actos definitivos de las instancias que recojan y traten Datos Personales.

    4. Garantizar y defender los derechos e intereses del consumidor financiero.

    5. Vigilar el cumplimiento de las normas que regulan la actividad de recolección y tratamiento de Datos Personales.

    6. Normar y vigilar la correcta aplicación de las normas aplicables a la materia, así como la presente ley.

    7. Establecer sistemas preventivos de control y vigilancia.

    8. Ejercer supervisión consolidada de grupos comerciales.

    9. Imponer sanciones por infracción de las disposiciones legales y reglamentarias. Disponer la regularización obligatoria y la intervención de las personas naturales y/o jurídicas que incumplan el marco normativo aplicable en concordancia con la presente ley.

    10. Celebrar acuerdos o convenios con otros organismos extranjeros de regulación y supervisión del tratamiento de datos personales, para la cooperación, capacitación y el intercambio de información.

    11. Instruir mejoras y ajustes en los sistemas de seguridad aplicados por los Responsables, Encargados y/o Exportadores.

    12. Suspender determinadas operaciones en el tratamiento de datos personales de manera fundamentada.

    13. Supervisar el control de riesgos y el cumplimiento a las disposiciones legales específicas aplicables al tratamiento de datos personales.

    14. Instruir acciones a los Responsables, Encargados y/o Exportadores, para resolver reclamaciones y denuncias que presenten los titulares.

    15. Autorizar la incorporación al ámbito de la regulación a otro tipo de servicios y empresas que tengan relación con el tratamiento de datos personales.

    16. Emitir normativa prudencial de carácter general y específico, extendiéndose a la regulación de normativa para aplicación de los Responsables, Encargados y/o Exportadores.

    17. Hacer cumplir la presente Ley y otras disposiciones legales y reglamentarias conexas.

    18. Emitir normativa para regular la información, publicidad o propaganda relacionada con datos personales, y prohibir o suspender la publicidad o propaganda cuando vulneren derechos fundamentales y ARCO de los titulares, con mayor énfasis cuando se trate de menores de edad.

    19. Emitir reglamentos de cumplimiento obligatorio respecto al tratamiento de datos personales.

    20. Pronunciarse e imponer sanciones ante el rechazo inadecuado u omisión en el pronunciamiento en plazo respecto al reclamo de un derecho ARCO por parte del titular ante el responsable del tratamiento de datos personales.

    21. Imponer sanciones ante el incumplimiento de sus resoluciones, la presente Ley y normativa conexa, por parte de los Responsables, Encargados o Exportadores de tratamiento de datos personales.

    22. Realizar actividades de fiscalización sobre los Responsables, Encargados y Exportadores del tratamiento de datos personales. Estas tareas entre otras incluirá la realización de auditorías y pericias técnicas.

    23. Aprobar y registrar los contratos y documentos legales de transferencia de datos personales entre Responsables, Encargados y/o Exportadores.

    24. Establecer un canon de montos a ser cobrados por los diferentes registros, servicios prestados e infracciones a ser cobradas. Misma que deberán ser aprobadas por el Directorio de la Agencia de Protección de Datos Personales – APP.

    25. Diseñar e implementar ofertas de formación y capacitación en temas de datos personales dirigidas a funcionarios, ciudadanía, empresarios, académicos y otros públicos interesados.

    Artículo 45. (Auditoría de Protección de Datos)

    La Agencia de Protección de Datos –APP, realizará auditorías periódicas de oficio, con la finalidad de detectar el incumplimiento al marco legislativo aplicable a la materia y la vulneración a derechos de los titulares. Así también, estará facultada para realizar auditorías de protección de datos tanto a empresas privadas, instituciones y empresas públicos y/o mixtas, ante reclamaciones fundamentadas de los titulares de datos personales como posibles afectados, a fin de evaluar que las bases de datos y los respectivos datos personales que alberguen se estén tratando en apego a los derechos y principios insertos en la presente ley, en la Constitución Política del Estado Plurinacional y normas conexas.

    Artículo 46. (Estructura)

    La Agencia de Protección de Datos Personales – APP está compuesta por: Una Directora o Director Ejecutivo con sede en la ciudad de La Paz y cuatro (4) Directores Regionales con sede en las capitales de los Departamentos de Chuquisaca, La Paz, Santa Cruz y Cochabamba. También formarán parte de la Agencia de Protección de Datos Personales – APP, intendentes que, previa aprobación del Directorio, serán designados por la Directora o el Director Regional en las capitales de departamento donde no existan Direcciones Regionales, los mismos que sólo ejercerán funciones técnicas y administrativas que garanticen el uso inmediato de los recursos previstos por esta norma, sin tener facultad para resolverlos. La estructura administrativa y el alcance de la competencia territorial de las Direcciones Regionales se establecerán por reglamento.

    Artículo 47. (Directora o Director Ejecutivo)

    I. Será designada(o) por dos tercios de votos de los miembros del Directorio. En caso de no contar con el quorum necesario en la reunión convocada para éste fin, se convocará a una segunda reunión donde se designará por simple mayoría a la Directora o al Director Ejecutivo de la Agencia de Protección de Datos Personales – APP. Si aun así no es factible, se nombrará por simple mayoría de los asistentes a la tercera reunión de directorio, dejando constar este extremo en acta.

    II. En caso de renuncia, fallecimiento o término del mandato, se nombrará nuevo Director o Directora Ejecutiva a través de la correspondiente reunión de Directorio, siguiendo el quorum definido previamente.

    III. Será suspendida(o) temporalmente de sus funciones si se hubiera dictado acusación formal en su contra que disponga su procesamiento penal, o resolución por la que se le atribuya responsabilidad administrativa que implique la destitución del cargo conforme a ley. Será restituida en sus funciones si descarga su responsabilidad.

    Artículo 48. (Requisitos para ser Designada(o) Directora(o) Ejecutiva(o)

    Para ser designada(o) como Directora(o) Ejecutiva(o) General o Regional se requiere cumplir los siguientes requisitos:

    1. Ser de nacionalidad boliviana.

    2. Tener reconocida idoneidad en materia.

    3. Tener como mínimo título universitario a nivel de licenciatura y diez (10) años de experiencia profesional.

    4. No tener sentencia ejecutoriada penal en su contra.

    A estos efectos se tomará en cuenta el ejercicio de la cátedra, la investigación científica, títulos y grados académicos.

    Artículo 49. (Incompatibilidades)

    Las funciones de las o los Directores Ejecutivos, tanto General como Regionales, son incompatibles con el ejercicio de todo otro cargo público remunerado, con excepción de las funciones docentes universitarias y de las comisiones codificadoras. Son igualmente incompatibles con las funciones directivas de instituciones privadas, mercantiles, políticas y sindicales. La aceptación de cualquiera de estas funciones implica renuncia tácita a la función como Directora o Director, quedando nulos sus actos a partir de dicha aceptación.

    Artículo 50. (Periodo de Funciones y Destitución de la Directora o Director).- La Directora o Director Ejecutivo General, desempeñará sus funciones por un período de seis (6) años y los Directores Regionales por un período de cinco (5) años, no pudiendo ser reelegidos sino pasado un tiempo igual al que hubiese ejercido su mandato.

    TÍTULO VI. RECURSOS ADMINISTRATIVOS

    CAPÍTULO I. GENERALIDADES

    Artículo 51. (Características)

    Los recursos contemplados en el presente capítulo, gozarán de las siguientes propiedades:

    1. Primará el principio de informalidad;

    2. Serán gratuitos;

    3. Con procedimientos abreviados;

    4. Accesibles y con medios idóneos para permitir a los titulares procesar los mismos en cumplimiento a todos los principios y derechos otorgados a los titulares de datos personales;

    5. Serán sustentados fundamentadamente por las Autoridades;

    6. Se regirán por el debido proceso y derechos constitucionales;

    7. El titular tendrá acceso a todos los documentos necesarios que requiera para hacer prevalecer sus derechos;

    8. Será sustentado bajo el principio pro homine.

    Asimismo, cualquier duda será interpretada a favor del ejercicio de los derechos del titular afectado o que se considere afectado.

    Artículo 52. (Recursos)

    Los titulares de datos personales que consideren que sus derechos están siendo amedrentados o vulnerados, podrán interponerse Recurso de Alzada en los casos, forma y plazo que se establecerá en la reglamentación específica.

    Contra la resolución que resuelve el Recurso de Alzada solamente cabe el Recurso Jerárquico, que se tramitará ante el Directorio de la Agencia de Protección de Datos –APP conforme al procedimiento que establecerá reglamentariamente para este efecto.

    La interposición del Recurso de Alzada así como el del Jerárquico tienen efecto devolutivo. La vía administrativa se agotará con la resolución que resuelva el Recurso Jerárquico, pudiendo las Partes acudir a la impugnación judicial por la vía del proceso contencioso administrativo ante la Sala competente del Tribunal Supremo de Justicia.

    Artículo 53. (Procedimiento de Oposición, Acceso, Rectificación o Cancelación)

    I. Los procedimientos para ejercitar el derecho de oposición, acceso, así como los de rectificación y cancelación serán establecidos mediante Resolución de la Autoridad de Control de Datos Personales en base a lo establecido en la presente Ley.

    II. No se exigirá contraprestación alguna por el ejercicio de los derechos de oposición, acceso, rectificación o cancelación

    CAPÍTULO II. PROCEDIMIENTO

    Artículo 54. (Recurso de Alzada)

    El Recurso de Alzada será presentado ante las Direcciones Regionales. Será admisible contra todo acto que vulnere o amenace vulnerar los derechos de los titulares de datos personales. Este Recurso deberá interponerse dentro del plazo perentorio de veinte (20) días improrrogables, computables a partir de la notificación con el acto o el conocimiento del acto que se considera vulneratorio.

    Artículo 55. (Recurso Jerárquico)

    Quién considere que la resolución que resuelve el Recurso de Alzada lesione sus derechos, podrá interponer de manera fundamentada, Recurso Jerárquico ante la Dirección Regional que resolvió el Recurso de Alzada, dentro del plazo de veinte (20) días improrrogables, computables a partir de la notificación con la respectiva Resolución. El Recurso Jerárquico será sustanciado por el Directorio de la Agencia de Protección de Datos Personales – APP

    Artículo 56. (Revisión Extraordinaria)

    Únicamente por medio del Directorio de la APP, se podrán revisar, de oficio o a instancia de parte, dentro del plazo de dos (2) años, los actos administrativos firmes, en los siguientes supuestos:

    1. Cuando exista error de identidad en las personas.

    2. Cuando después de dictado el acto se recobren o descubran documentos decisivos detenidos por fuerza mayor o por obra de la parte a favor de la cual se hubiera dictado el acto.

    3. Cuando dichos actos tengan como base documentos declarados falsos por sentencia judicial ejecutoriada o bien cuando su falsedad se desconocía al momento de su dictado.

    4. Cuando dichos actos se hubieran dictado como consecuencia de prevaricato, cohecho, violencia u otra acción delictiva y se haya declarado así en sentencia judicial ejecutoriada.

    La resolución que se emita declarará la nulidad del acto revisado o su anulabilidad total o parcial. La declaratoria de nulidad o anulabilidad total o parcial del acto o resolución, cuando corresponda, deberá emitirse en un plazo máximo de sesenta (60) días a contar desde la presentación de la solicitud del interesado cuando sea a instancia de parte, en mérito a pruebas que la acrediten.

    Ante la declaración de nulidad o anulabilidad total o parcial del acto o resolución, se emitirá un nuevo acto o resolución que corrija al anterior, procediendo contra este nuevo, los Recursos Administrativos previstos en este Título.

    Artículo 57. (Reglamentación)

    Los procedimientos de los Recursos de Alzada y Jerárquico se sujetarán a los plazos, términos, condiciones, requisitos y forma dispuestos por disposiciones reglamentarias.

    Artículo 58. (Proceso Contencioso Administrativo)

    Conforme a la atribución Séptima del parágrafo I del artículo 118° de la Constitución Política del Estado, el proceso contencioso administrativo contra la resolución que resuelva el Recurso Jerárquico será conocido por el Tribunal Supremo de Justicia, sujetándose al trámite contenido en el Código de Procedimiento Civil.

    Las cantidades reembolsadas, bajo el derecho a indemnización, serán actualizadas, aplicando la tasa de interés activa promedio para Unidades de Fomento de la Vivienda, desde la fecha en que se vulneró el derecho al titular, hasta la fecha en que se notificó al mismo con el fallo administrativo o judicial en firme. En caso de incumplirse el plazo para efectuar el reembolso, la tasa de interés se aplicará hasta el día en que efectivamente se realice el mismo.

    TÍTULO VII. SEGURIDAD EN EL TRATAMIENTO DE DATOS PERSONALES

    CAPÍTULO ÚNICO. INCUMPLIMIENTO

    Artículo 59. (Notificación de Incumplimiento al Titular de los Datos Personales)

    Cuando el Responsable tenga conocimiento de una vulneración de seguridad de datos personales ocurrida en cualquier fase del tratamiento, entendida como cualquier daño, pérdida, alteración, destrucción, acceso, y en general, cualquier uso ilícito o no autorizado de los datos personales aun cuando ocurra de manera accidental, notificará a la Agencia de Protección de Datos Personales – APP y a los titulares afectados, dicho acontecimiento, sin dilación alguna. Lo anterior no resultará aplicable cuando el responsable pueda demostrar, atendiendo al principio de responsabilidad proactiva, la improbabilidad de la vulneración de seguridad ocurrida, o bien, que ésta no represente un riesgo para los derechos y las libertades de los titulares involucrados.

    I. La notificación que realice el Responsable a él o los titulares afectados, estará redactada en un lenguaje claro y sencillo. El titular podrá pedir ampliación a la información proporcionada que debe ser otorgada por el Responsable, sin dilaciones.

    II. La notificación a que se refieren los numerales anteriores contendrá, al menos, la siguiente información:

    1. La naturaleza del incidente.

    2. Los datos personales comprometidos.

    3. Las acciones correctivas realizadas de forma inmediata.

    4. Las recomendaciones al titular sobre las medidas que éste pueda adoptar para proteger sus intereses.

    5. Los medios disponibles al titular para obtener mayor información al respecto.

    III. El Responsable documentará toda vulneración de seguridad de los datos personales ocurrida en cualquier fase del tratamiento, identificando, de manera enunciativa más no limitativa, la fecha en que ocurrió; el motivo de la vulneración; los hechos relacionados con ella y sus efectos y las medidas correctivas implementadas de forma inmediata y definitiva, la cual estará a disposición de la autoridad de control.

    TÍTULO VIII. INFRACCIONES Y SANCIONES

    CAPÍTULO ÚNICO. GRADOS

    Artículo 60. (Infracciones)

    Las infracciones se calificarán como leves, graves o muy graves. Serán normadas por disposiciones reglamentarias, que mínimamente contemplarán, lo siguiente:

    I. Son infracciones leves:

    a. No dar contestación a las solicitudes ejercicio de los derechos de acceso, rectificación, cancelación y oposición de los datos personales.

    b. No proporcionar o colaborar con las solicitudes de información que solicite la autoridad competente en el ejercicio de sus facultades.

    II. Son infracciones graves:

    c. La creación de bases de datos o tratar datos personales sin haber obtenido el consentimiento previo, expreso e informado del titular.

    d. La creación de bases de datos de titularidad privada o el tratamiento de datos de carácter personal con finalidades distintas a las que fueron comunicadas y que derivaron en el consentimiento obtenido del titular.

    e. El impedimento o la obstaculización por parte de los Responsables del tratamiento para el ejercicio de los derechos reconocidos en la presente ley y normas conexas.

    f. No rectificar o eliminar los datos de carácter personal cuando éstos se hubieran informado como inexactos o el titular se hubiera opuesto al tratamiento.

    g. No implementar las debidas condiciones de seguridad previstas en las disposiciones reglamentarias.

    h. Incumplir los deberes y responsabilidades reflejados en la presente Ley.

    III. Son infracciones gravísimas:

    i. El tratamiento de datos de mala fe, por medio del error y engaño al titular de los datos personales.

    j. La comunicación, transferencia o cesión de los datos de carácter personal, fuera de los casos en que estén permitidas.

    k. Desobedecer los requerimientos de cese de tratamiento de datos cuando estos hubieran sido dictados por la Agencia de Protección de Datos o por una orden judicial o resolución fundada.

    Artículo 61. (Sanciones)

    Las sanciones serán definidas por la Agencia de Protección de Datos – APP a través de disposiciones reglamentarias.

    DISPOSICIÓN TRANSITORIA ÚNICA

    Todos los plazos y procedimientos necesarios para ejecutar la presente ley, serán dispuestos por normas reglamentarias específicas emitidas por la Agencia De Protección De Datos Personales – APP.

    DISPOSICIÓN FINAL PRIMERA

    Se derogan y abrogan todas las normas contrarias a la presente ley.

    DISPOSICIÓN FINAL SEGUNDA

    El presente Código entrará en vigencia noventa (90) días después de su publicación en la Gaceta Oficial de Bolivia, con excepción de las Disposiciones Transitorias que entrarán en vigencia a la publicación de su Reglamento.

    29Ago/21

    Ley Orgánica de Protección de Datos Ecuador, de 21 de mayo de 2021

    LEY ORGÁNICA DE PROTECCIÓNDE DATOS PERSONALES

    Quito, miércoles 26 de mayo de 2021

    Miércoles 26 de mayo de 2021 Quinto Suplemento nº 459 – Registro Oficial

     PRESIDENCIA DE LA REPÚBLICA DEL ECUADOR

    Oficio nº T. 680-SGJ-21-0263

    Quito, 21 de mayo de 2021

    Señor Ingeniero Hugo Del Pozo Barrezueta. DIRECTOR DEL REGISTRO OFICIAL. En su despacho

    De mi consideración:

    Con oficio número PAN-CLC-2021-0384 de 11 de mayo de 2021, el señor Ingeniero César Litardo Caicedo, Presidente de la Asamblea Nacional, remitió el proyecto de LEY ORGANICA DE PROTECCION DE DATOS PERSONALES.

    Dicho proyecto de ley ha sido sancionado por el señor Presidente de la República, el día de hoy, por lo que, conforme a lo dispuesto en los artículos 137 de la Constitución de la República y 63 de la Ley Orgánica de la Función Legislativa, se la remito a usted en original y en copia certificada, junto con el certificado de discusión, para su correspondiente publicación en el Registro Oficial.

    Adicionalmente, agradeceré a usted que, una vez realizada la respectiva publicación, se sirva remitir el ejemplar original a la Asamblea Nacional para los fines pertinentes.

    Atentamente, Dra. Johana Pesántez Benitez. SECRETARIA GENERAL JURÍDICA

    C.C.: Señora Abogada Guadalupe Llori Abarca, PRESIDENTA DE LA ASAMBLEA NACIONAL

    Adjunto lo indicado

    CERTIFICACIÓN

    En mi calidad de Secretario General de la Asamblea Nacional, me permito CERTIFICAR que los días 09 y 11 de febrero 2021, la Asamblea Nacional discutió en primer debate el “PROYECTO LEY ORGÁNICA DE PROTECCIÓN DE DATOS PERSONALES y, en segundo debate el día 10 de mayo de 2021, siendo en esta última fecha finalmente aprobado.

    Quito, 11 de mayo de 2021.

    DR. JAVIER RUBIO DUQUE. Secretario General

    EL  PLENO, CONSIDERANDO

    Que, el artículo 1 de la Constitución de la República dispone que el “Estado ecuatoriano es un Estado constitucional de derechos y justicia, social, democrático (…)”;

    Que, el artículo 3 en sus numerales 1, 5 y 8 de la Carta Magna determinan que son deberes primordiales del Estado

    “1. Garantizar sin discriminación alguna el efectivo goce de los derechos establecidos en la Constitución y en los instrumentos internacionales, en particular la educación, la salud, la alimentación, la seguridad social y el agua para sus habitantes.

    5. Planificar el desarrollo nacional, erradicar la pobreza, promover el desarrollo sustentable y la redistribución equitativa de los recursos y la riqueza, para acceder al buen vivir.

     8. Garantizar a sus habitantes el derecho a una cultura de paz, a la seguridad integral y a vivir en una sociedad democrática y libre de corrupción.”;

    Que, el numeral 1 del artículo 11 de la Norma Suprema establece que “Los derechos se podrán ejercer, promover y exigir de forma individual o colectiva ante las autoridades competentes; estas autoridades garantizarán su cumplimiento. ”;

    Que, el numeral 2 del artículo 11 de la Norma Suprema prescribe que “Todas las personas son iguales y gozarán de los mismos derechos y oportunidades”,

    Que, el numeral 3 del artículo 11 de la Constitución de la República preceptúa que “Los derechos y garantías establecidas en la Constitución y en los instrumentos internacionales de derechos humanos serán de directa e inmediata aplicación por y ante cualquier servidora o servidor público, administrativo o judicial, de oficio o a petición de parte”;

    Que, el numeral 8 del artículo 11 de la Norma Suprema dispone que: “El contenido de los derechos y garantías establecidos en la Constitución y en los instrumentos internacionales de derechos humanos, no excluirá los demás derechos derivados de la dignidad de las personas, comunidades, pueblos y nacionalidades, que sean necesarios para su pleno desenvolvimiento. Será inconstitucional cualquier acción u comisión de carácter regresivo que disminuya, menoscabe o anule injustificadamente el ejercicio de los derechos”;

    Que, el artículo 16 numerales 1 y 2 de la Carta Magna determina que “Todas las personas, en forma individual o colectiva, tienen derecho a:

    1. Una comunicación libre, intercultural, incluyente, diversa y participativa, en todos los ámbitos de la interacción social, por cualquier medio y forma, en su propia lengua y con sus propios símbolos;

    2. El acceso universal a las tecnologías de información y comunicación”;

    Que, el artículo 17 numeral 2 de la Norma Suprema preceptúa que “El Estado fomentará pluralidad y la diversidad en la comunicación, y al efecto:

    2. Facilitará la creación y el fortalecimiento de medios de comunicación públicos, privados y comunitarios, así como el acceso universal a las tecnologías de la información y comunicación en especial para las personas y colectividades que carezcan de dicho acceso o lo tengan de forma limitada”,

    Que, el artículo 26 de la Constitución de la República reconoce que “La educación es un derecho de las personas a lo largo de su vida y un deber inexcusable el Estado. Constituye un área prioritaria de la política pública y de la inversión estatal, garantía de la igualdad e inclusión social v condición indispensable para el buen vivir. Las personas, las familias y la sociedad tienen el derecho y la responsabilidad de participar en el proceso educativo”;

    Que, el artículo 35 de la Carta Magna establece que “Las personas adultas mayores, niñas, niños y adolescentes, mujeres embarazadas, personas con discapacidad, personas privadas de libertad y quienes. adolezcan de enfermedades catastróficas o de alta complejidad, recibirán atención prioritaria y especializada en los ámbitos públicos y privado. La misma atención prioritaria recibirán las personas en situación de riesgo, las víctimas de violencia doméstica y sexual, maltrato infantil, desastres naturales y antropogénicos. El Estado prestará especial protección a las personas en condición de doble vulnerabilidad ”,

    Que, el artículo 44 de la Norma Suprema dispone que “El Estado, la sociedad, y la familia promoverán de forma prioritaria el desarrollo integral de los niñas, niños y adolescentes, y asegurarán el ejercicio pleno de sus derechos, se atenderá al principio de su interés superior y sus derechos prevalecerán

    Que, sobre los de las demás personas. Las niñas, niños y adolescentes tendrán derecho a. su desarrollo integral, entendido como proceso de crecimiento, maduración y despliegue de su intelecto y de sus capacidades, potencialidades y aspiraciones, en un entorno familiar, escolar, social y comunitario de efectividad v seguridad. Este entorno permitirá la satisfacción de sus necesidades sociales, afectivo-emocionales y culturales, con el apoyo de políticas intersectoriales nacionales y locales.”,

    Que, el artículo 66 numeral 19 de la Constitución de la República reconoce y garantiza a las personas: “19. El derecho a la protección de datos carácter personal, que incluye el acceso y la decisión sobre información y datos de este carácter, así como su correspondiente protección. La recolección, archivo, procesamiento, distribución o difusión de estos datos personales requerirán la autorización del titular o el mandato de ley”;

    Que, el numeral 6 del artículo 76 de la Carta Magna determina que “En todo proceso que se determinen derechos y obligaciones de cualquier orden, se asegurará el derecho al debido proceso que incluirá las siguientes garantías básicas: 6. La ley establecerá la debida proporcionalidad entre las infracciones y las sanciones penales, administrativas o de otra naturaleza. ”;

    Que, el artículo 92 de la Norma Suprema prescribe que: “Toda persona, por sus propios derechos v como representante legitimado para el efecto, tendrá derecho a conocer de la existencia y acceder a los documentos, datos genéticos, bancos o archivos de datos personales e informes que sobre sí misma, o sobre sus bienes, consten en entidades públicas o privadas, en soporte material o electrónico Asimismo tendrá derecho a conocer el uso que se haga de ellos, su finalidad, el origen y destino de información personal y el tiempo de vigencia del archivo o banco de datos. Las personas responsables de los bancos o archivos de datos personales podrán difundir la información archivada con autorización de su titular o de la ley. La persona titular de los datos podrá solicitar al responsable el acceso sin costo al archivo, así como la actualización de los datos, su rectificación, eliminación v anulación. En el caso de datos sensibles, cuyo archivo deberá estar autorizado por la ley o por la persona titular, se exigirá la adopción de las medidas de seguridad necesarias. Si no se atendiera su solicitud, ésta podrá acudir a la jueza o juez. La persona afectada podrá demandar por los perjuicios ocasionados”;

    Que, el artículo 227 de la Constitución de la República establece que: “La administración pública constituye un servicio a la colectividad que se rige por los principios de eficacia, eficiencia, calidad, jerarquía, desconcentración, descentralización, coordinación, participación, planificación, transparencia y evaluación.”;

    Que, el artículo 277 de la Constitución de la República determina que: “Para la consecución del buen vivir, serán deberes generales del Estado:

    1. Garantizar los derechos de las personas, las colectividades y la naturaleza;

    2. Dirigir, planificar y regular el proceso de desarrollo;

    3. Generar y ejecutar las políticas públicas y controlar y sancionar su incumplimiento; 4. Producir bienes, crear y mantener infraestructura y proveer servicios públicos;

    5. Impulsar el desarrollo de las actividades económicas mediante un orden jurídico e instituciones políticas que las promuevan, fomenten y defiendan mediante el cumplimiento de la Constitución y la ley;

    6. Promover e impulsar la ciencia, la tecnología, las artes, los saberes ancestrales y en general las actividades de la iniciativa creativa, comunitaria, asociativa, cooperativa y privada.”;

    Que, el articulo 417 de la Norma Suprema dispone que “Los tratados internacionales ratificados por el Ecuador se sujetarán a lo establecido en la Constitución. En el caso de los tratados y otros instrumentos internacionales de derechos humanos se aplicarán los principios pro ser humano, de no restricción de derechos, de aplicabilidad directa y de cláusula abierta establecida en la Constitución”;

    Que, el numeral 3 del artículo 423 de la Constitución de la República prevé que “La integración en especial con los países de Latinoamérica y el Caribe será un objetivo estratégico del Estado. En todas las instancias y procesos de integración, el Estado ecuatoriano se comprometerá «u 3 Fortalecer la armonización de las legislaciones nacionales con énfasis en los derechos (…), de acuerdo con los principios de progresividad y no regresividad. ”;

    Que, el artículo 424 de la Carta Magna prescribe que “La Constitución es la norma suprema y prevalece sobre cualquier otra del ordenamiento jurídico. Las normas y los actos del poder público deberán mantener conformidad con las disposiciones constitucionales, en caso contrario carecerán de eficacia jurídica. La Constitución y los tratados internacionales de derechos humanos ratificados por el Estado que reconozcan derechos más favorables a los contenidos en la Constitución, prevalecerán sobre cualquier otra norma jurídica o acto del poder público.”;

    Que, la Resolución 45/95 de 14 de diciembre de 1990 de la Organización de las Naciones Unidas adopta principios rectores para la reglamentación de los ficheros computarizados de datos personales, garantías mínimas que deberán preverse en legislaciones nacionales para efectivizar este derecho;

    Que, uno de los ejes de la Estrategia acordada en el año 2016 de la red Iberoamericana de Datos Personales 2020 consiste en “Impulsar y contribuir al fortalecimiento y adecuación de los procesos regulatorios en la región, mediante la elaboración de directrices que sirvan de parámetros para futuras regulaciones o para revisión de las existentes en materia de   protección de datos personales”,

    Que, el 20 de junio de 2017 se aprobaron los Estándares de Protección de Datos Personales para los Estados Iberoamericanos;

    Que, el Comité Jurídico Interamericano de la Organización de Estados Americanos adoptó la propuesta de declaración de principios de privacidad y protección de datos personales en las Américas;

    Que, la Organización de Estados Americanos el 27 de marzo de 2015 desarrolló el Proyecto de Ley Modelo sobre Protección de datos Personales;

    Que, la protección de datos personales forma parte de los ejes estratégicos para la construcción de la sociedad de la información y el conocimiento en el Ecuador conforme el Libro Blanco de la Sociedad de la Información y del Conocimiento 2018;

    Que, la Acción Estratégica clave del enfoque para Gobierno de protección de datos personales del Eje 6 del Plan Nacional de la Sociedad de la Información y del Conocimiento 2018-2021, es “Promulgar una ley orgánica de protección de datos personales para garantizar el derecho          constitucional. ”;

    Que, el principio de Legalidad de la Carta Iberoamericana de Gobierno Electrónico del año 2007 establece que “(…) el uso de comunicaciones electrónicas promovidas por la Administración Pública deberá tener observancia de las normas en materia de protección de datos personales”, con el objetivo de precautelar el derecho que tienen los ciudadanos a relacionarse electrónicamente con el Estado;

    Que, la Estrategia 3 del Programa de Gobierno Abierto del Plan Nacional de Gobierno Electrónico apunta a “Impulsar la protección de la información y datos personales”; y,

    En uso de la atribución que le confiere el número 6 del artículo 120 de la Constitución de la República, expide la siguiente:

    LEY ORGÁNICA DE PROTECCIÓN DE DATOS PERSONALES

    CAPÍTULO 1. ÁMBITO DE APLICACIÓN INTEGRAL

    Artículo 1.- Objeto y finalidad

    El objeto y finalidad de la presente ley es garantizar el ejercicio del derecho a la protección de datos personales, que incluye el acceso y decisión sobre información y datos de este carácter, así como su correspondiente protección. Para dicho efecto regula, prevé y desarrolla principios, derechos, obligaciones y mecanismos de tutela.

    Artículo 2.- Ámbito de aplicación material

    La presente ley se aplicará al tratamiento de datos personales contenidos en cualquier tipo de soporte, automatizados o no, así como a toda modalidad de uso posterior. La ley no será aplicable a:

    a) Personas naturales que utilicen estos datos en la realización de actividades familiares o domésticas;

    b) Personas fallecidas, sin perjuicio de lo establecido en el artículo 28 de la presente Ley;

    c) Datos anonimizados, en tanto no sea posible identificar a su titular. Tan pronto los datos dejen de estar disociados o de ser anónimos, su tratamiento estará sujeto al cumplimiento de las obligaciones de esta ley, especialmente la de contar con una base de licitud para continuar tratando los datos de manera no anonimizada o disociada;

    d) Actividades periodísticas y otros contenidos editoriales;

    e) Datos personales cuyo tratamiento se encuentre regulado en normativa especializada de igual o mayor jerarquía en materia de gestión de riesgos por desastres naturales; y, seguridad y defensa del Estado, en cualquiera de estos casos deberá darse cumplimiento a los estándares internacionales en la materia de derechos humanos y a los principios de esta ley, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad;

    f) Datos o bases de datos establecidos para la prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, llevado a cabo por los organismos estatales competentes en cumplimiento de sus funciones legales. En cualquiera de estos casos deberá darse cumplimiento a los estándares internacionales en la materia de derechos humanos y a los principios de esta ley, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad; y

    g) Datos que identifican o hacen identificable a personas jurídicas.

    Son accesibles al público y susceptibles de tratamiento los datos personales referentes al contacto de profesionales y los datos de comerciantes, representantes y socios y accionistas de personas jurídicas y servidores públicos, siempre y cuando se refieran al ejercicio de su profesión, oficio, giro de negocio, competencias, facultades, atribuciones o cargo y se trate de nombres y apellidos, funciones o puestos desempeñados, dirección postal o electrónica, y, número de teléfono profesional. En el caso de los servidores públicos, además serán de acceso público y susceptibles de tratamiento de datos, el histórico y vigente de la declaración patrimonial y de su remuneración.

    Artículo 3.- Ámbito de aplicación territorial

    Sin perjuicio de la normativa establecida en los instrumentos internacionales ratificados por el Estado ecuatoriano que versen sobre esta materia, se aplicará la presente Ley cuando:

    1. El tratamiento de datos personales se realice en cualquier parte del territorio nacional;

    2. El responsable o encargado del tratamiento de datos personales se encuentre domiciliado en cualquier parte del territorio nacional;

    3. Se realice tratamiento de datos personales de titulares que residan en el Ecuador por parte de un responsable o encargado no establecido en el Ecuador, cuando las actividades del tratamiento estén relacionadas con:

    1) La oferta de bienes o servicios a dichos titulares, independientemente de si a estos se les requiere su pago, o,

    2) del control de su comportamiento, en la medida en que este tenga lugar en el Ecuador; y,

    4. Al responsable o encargado del tratamiento de datos personales, no domiciliado en el territorio nacional, le resulte aplicable la legislación nacional en virtud de un contrato o de las regulaciones vigentes del derecho internacional público.

    Artículo 4.- Términos y definiciones

    Para los efectos de la aplicación de la presente Ley se establecen las siguientes definiciones:

    Autoridad de Protección de Datos Personales: Autoridad pública independiente encargada de supervisar la aplicación de la presente ley, reglamento y resoluciones que ella dicte, con el fin de proteger los derechos y libertades fundamentales de las personas naturales, en cuanto al tratamiento de sus datos personales.

    Anonimización: La aplicación de medidas dirigidas a impedir la identificación o                              reidentificación de una persona natural, sin esfuerzos desproporcionados.

    Base de datos o fichero: Conjunto estructurado de datos cualquiera que fuera la forma, modalidad de creación, almacenamiento, organización, tipo de soporte, tratamiento, procesamiento, localización o acceso, centralizado, descentralizado o repartido de forma funcional o geográfica.

    Consentimiento: Manifestación de la voluntad libre, especifica, informada e inequívoca, por el que el titular de los datos personales autoriza al responsable del tratamiento de los datos personales a tratar los mismos.

    Dato biométrico: Dato personal único, relativo a las características físicas o fisiológicas, o conductas de una persona natural que permita o confirme la identificación única de dicha persona, como imágenes faciales o datos dactiloscópicos, entre otros.

    Dato genético: Dato personal único relacionado a características genéticas heredadas o adquiridas de una persona natural que proporcionan información única sobre la fisiología o salud de un individuo.

    Dato personal: Dato que identifica o hace identificable a una persona natural, directa o indirectamente.

    Datos personales crediticios: Datos que integran el comportamiento económico de personas naturales, para analizar su capacidad financiera.

    Datos relativos a: etnia, identidad de género, identidad cultural, religión, ideología, filiación política, pasado judicial, condición migratoria, orientación sexual, salud, datos biométricos, datos genéticos, datos relativos a las personas apátridas y refugiados que requieren protección internacional, y aquellos cuyo tratamiento indebido pueda dar origen a discriminación, atenten o puedan atentar contra los derechos y libertades fundamentales.

    Datos relativos a la salud: datos personales relativos a la salud física o mental de una persona, incluida la prestación de servicios de atención sanitaria, que revelen información sobre su estado de salud.

    Datos sensibles: Datos relativos a: etnia, identidad de género, identidad cultural, religión, ideología, filiación política, pasado judicial, condición migratoria, orientación sexual, salud, datos biométricos, datos genéticos y aquellos cuyo tratamiento indebido pueda dar origen a discriminación, atenten o puedan atentar contra los derechos y libertades fundamentales.

    Delegado de protección de datos: Persona natural encargada de informar al responsable o al encargado del tratamiento sobre sus obligaciones legales en materia de protección de datos, así como de velar o supervisar el cumplimiento normativo al respecto, y de cooperar con la Autoridad de Protección de Datos Personales, sirviendo como punto de contacto entre esta y la entidad responsable del tratamiento de datos.

    Destinatario: Persona natural o jurídica que ha sido comunicada con datos personales.

    Elaboración de perfiles: Todo tratamiento de datos personales que permite evaluar, analizar o predecir aspectos de una persona natural para determinar comportamientos o estándares relativos a: rendimiento profesional, situación económica, salud, preferencias personales, intereses, fiabilidad, ubicación, movimiento físico de una persona, entre otros.

    Encargado del tratamiento de datos personales: Persona natural o jurídica, pública o privada, autoridad pública, u otro organismo que solo o conjuntamente con otros trate datos personales a nombre y por cuenta de un responsable de tratamiento de datos personales.

    Entidad Certificadora: Entidad reconocida por la Autoridad de Protección de Datos Personales, que podrá, de manera no exclusiva, proporcionar certificaciones en materia de protección de datos personales.

    Fuente accesible al público: Bases de datos que pueden ser consultadas por cualquier persona, cuyo acceso es público, incondicional y generalizado.

    Responsable de tratamiento de datos personales: persona natural o jurídica, pública o privada, autoridad pública, u otro organismo, que solo o conjuntamente con otros decide sobre la finalidad y el tratamiento de datos personales.

    Sellos de protección de datos personales: Acreditación que otorga la entidad certificadora al responsable o al encargado del tratamiento de datos personales, de haber implementado mejores prácticas en sus procesos, con el objetivo de promover la confianza del titular, de conformidad con la normativa técnica emitida por la Autoridad de Protección de Datos Personales.

    Seudonimización: Tratamiento de datos personales de manera tal que ya no puedan atribuirse a un titular sin utilizar información adicional, siempre que dicha información adicional, figure por separado y esté sujeta a medidas técnicas y organizativas destinadas a garantizar que los datos personales no se atribuyan a una persona física identificada o identificable.

    Titular: Persona natural cuyos datos son objeto de tratamiento.

    Transferencia o comunicación: Manifestación, declaración, entrega, consulta, interconexión, cesión, transmisión, difusión, divulgación o cualquier forma de revelación de datos personales realizada a una persona distinta al titular, responsable £ encargado del tratamiento de datos personales. Los datos personales que comuniquen deben ser exactos, completos y actualizados.

    Tratamiento: Cualquier operación o conjunto de operaciones realizadas sobre datos personales, ya sea por procedimientos técnicos de carácter automatizado, parcialmente automatizado o no automatizado, tales como: la recogida, recopilación, obtención, registro, organización, estructuración, conservación, custodia, adaptación, modificación, eliminación, indexación, extracción, consulta, elaboración, utilización, posesión, aprovechamiento, distribución, cesión, comunicación o transferencia, o cualquier otra forma de habilitación de acceso, cotejo, interconexión, limitación, supresión, destrucción y, en general, cualquier uso de datos personales.

    Vulneración de la seguridad de los datos personales: Incidente de seguridad que afecta la confidencialidad, disponibilidad o integridad de los datos personales.

    Articulo 5.- Integrantes del sistema de protección de datos personales

    Son parte del sistema de protección de datos personales, los siguientes:

    1) Titular;

    2) Responsable del tratamiento;

    3) Encargado del tratamiento;

    4) Destinatario;

    5) Autoridad de Protección de Datos Personales; y,

    6) Delegado de protección de datos personales.

    Artículo 6.- Normas aplicables al ejercicio de derechos

    El ejercicio de los derechos previstos en esta Ley se canalizará a través del responsable del tratamiento, Autoridad de Protección de Datos Personales o jueces competentes, de conformidad con el procedimiento establecido en la presente Ley y su respectivo Reglamento de aplicación. El Reglamento a esta Ley u otra norma secundaria no podrán limitar al ejercicio de los derechos.

    Artículo 7.- Tratamiento legítimo de datos personas

    El tratamiento será legítimo y lícito si se cumple con alguna de las siguientes condiciones:

    1) Por consentimiento del titular para el tratamiento de sus datos personales, para una o varias finalidades especificas;

    2) Que sea realizado por el responsable del tratamiento en cumplimiento de una obligación legal;

    3) Que sea realizado por el responsable del tratamiento, por orden judicial, debiendo observarse los principios de la presente ley;

    4) Que el tratamiento de datos personales se sustente en el cumplimiento de una misión realizada en interés público o en el ejercicio de poderes públicos conferidos al responsable, derivados de una competencia atribuida por una norma con rango de ley, sujeto al cumplimiento de los estándares internacionales de derechos humanos aplicables a la materia, al cumplimiento de los principios de esta ley y a los criterios de legalidad, proporcionalidad y necesidad;

    5) Para la ejecución de medidas precontractuales a petición del titular o para el cumplimiento de obligaciones contractuales perseguidas por el responsable del tratamiento de datos personales, encargado del tratamiento de datos personales o por un tercero legalmente habilitado;

    6) Para proteger intereses vitales, del interesado o de otra persona natural, como su vida, salud o integridad,

    7) Para tratamiento de datos personales que consten en bases de datos de acceso público; u.

    8) Para satisfacer un interés legítimo del responsable de tratamiento o de tercero, siempre que no prevalezca el interés o derechos fundamentales de los titulares al amparo de lo dispuesto en esta norma.

    Artículo 8.- Consentimiento

    Se podrán tratar y comunicar datos personales cuando se cuente con la manifestación de la voluntad del titular para hacerlo. El consentimiento será válido, cuando la manifestación de la voluntad sea:

    1) Libre, es decir, cuando se encuentre exenta de vicios del consentimiento;

    2) Específica, en cuanto a la determinación concreta de los medios y fines del tratamiento;

    3) Informada, de modo que cumpla con el principio de transparencia y efectivice el derecho a la transparencia,

    4) Inequívoca, de manera que no presente dudas sobre el alcance de la autorización otorgada por el titular.

    El consentimiento podrá revocarse en cualquier momento sin que sea necesaria una justificación, para lo cual el responsable del tratamiento de datos personales establecerá mecanismos que garanticen celeridad, eficiencia, eficacia y gratuidad, así como un procedimiento sencillo, similar al proceder con el cual recabó el consentimiento.

    El tratamiento realizado antes de revocar el consentimiento es lícito, en virtud de que este no tiene efectos retroactivos.

    Cuando se pretenda fundar el tratamiento de los datos en el consentimiento del afectado para une pluralidad de finalidades será preciso que conste que dicho consentimiento se otorga para todas ellas.

    Artículo 9.- interés legítimo

    Cuando el tratamiento de datos personales tiene como fundamento el interés legítimo:

    a) Únicamente podrán ser tratados los datos que sean estrictamente necesarios para la realización de la finalidad.

    b) El responsable debe garantizar que el tratamiento sea transparente para el titular.

    c) La Autoridad de Protección de Datos puede requerir al responsable un informe con de riesgo para la protección de datos en el cual se verificará si no hay amenazas concretas a las expectativas legitimas de los titulares y a sus derechos fundamentales.

    CAPÍTULO II. PRINCIPIOS

    Artículo 10.- Principios

    Sin perjuicio de otros principios establecidos en la Constitución de la República, los instrumentos internacionales ratificados por el Estado u otras normas jurídicas, la presente Ley se regirá por los principios de:

    a) Juridicidad.- Los datos personales deben tratarse con estricto apego y cumplimiento e los principios, derechos y obligaciones establecidas en la Constitución. los instrumentos internacionales, la presente Lev, su Reglamento y la demás normativa y jurisprudencia aplicable.

    b) Lealtad. – El (tratamiento de datos personales deberá ser lees, por lo que para los titulares debe quedar clero que se están recogiendo, utilizando, consultando o tratando de otra manera, datos personales que les conciernen, así como las formas en que dichos datos son o serán tratados.

    En ningún caso los datos personales podrán ser tratados a través de medios o para fines, ilícitos o desleales.

    c) Transparencia.- El tratamiento de datos personales deberá ser transparente, por lo que toda información o comunicación relativa a este tratamiento deberá ser fácilmente accesible y fácil de entender y se deberá utilizar un lenguaje sencillo y claro.

    Las relaciones derivadas del tratamiento de datos personales deben ser transparentes y se rigen en función de las disposiciones contenidas en la presente Ley, su reglamento y demás normativa atinente a la materia.

    d) Finalidad.- Las finalidades del tratamiento deberán ser determinadas, explícitas, legítimas y comunicadas al titular; no podrán tratarse datos personales con fines distintos para los cuales fueron recopilados, a menos que concurra una de las causales que habiliten un nuevo tratamiento conforme los supuestos de tratamiento legitimo señalados en esta ley.

    El tratamiento de datos personales con fines distintos de aquellos para los que hayan sido recogidos inicialmente solo debe permitirse cuando sea compatible con los fines de su recogida inicial. Para ello, habrá de considerarse el contexto en el que se recogieron los datos, la información facilitada al titular en ese proceso y, en particular, las expectativas razonables del titular basadas en su relación con el responsable en cuanto a su uso posterior, la naturaleza de los datos personales, las consecuencias para los titulares del tratamiento ulterior previsto y la existencia de garantías adecuadas tanto en la operación de tratamiento original como en la operación de tratamiento ulterior prevista.

    e) Pertinencia y minimización de datos personales.- Los datos personales deben ser pertinentes y estar limitados a lo estrictamente necesario para el cumplimiento de la finalidad del tratamiento.

    f) Proporcionalidad del tratamiento.- El tratamiento debe ser adecuado, necesario, oportuno, relevante y no excesivo con relación a las finalidades para las cuales hayan sido recogidos o a la naturaleza misma de las categorías especiales de datos.

    g) Confidencialidad.- El tratamiento de datos personales debe concebirse sobre la base del debido sigilo y secreto, es decir, no debe tratarse o comunicarse para un fin distinto para el cual fueron recogidos, a menos que concurra una de las causales que habiliten un nuevo tratamiento conforme los supuestos de tratamiento legitimo señalados en esta ley.

    Para tal efecto, el responsable del tratamiento deberá adecuar las medidas técnicas organizativas para cumplir con este principio.

    h) Calidad y exactitud.- Los datos personales que sean objeto de tratamiento deben ser exactos, íntegros, precisos, completos, comprobables, claros; y, de ser el caso, debidamente actualizados; de tal forma que no se altere su veracidad. Se adoptarán todas las medidas razonables para que se supriman o rectifiquen sin dilación los datos personales que sean inexactos con respecto a los fines para los que se tratan.

    En caso de tratamiento por parte de un encargado, la calidad y exactitud será obligación del responsable del tratamiento de datos personales.

    Siempre que el responsable del tratamiento haya adoptado todas las medidas razonables para que se supriman o rectifiquen sin dilación, no le será imputable la inexactitud de los datos personales, con respecto a los fines para los que se tratan, cuando los datos inexactos:

    a) Hubiesen sido obtenidos por el responsable directamente del titular.

    b) Hubiesen sido obtenidos por el responsable de un intermediario en caso de que las normas aplicables al sector de actividad al que pertenezca el responsable del tratamiento establecieran la posibilidad de intervención de un intermediario que recoja en nombre propio los datos de los afectados para su transmisión al responsable.

    c) Fuesen obtenidos de un registro público por el responsable.

    i) Conservación.- Los datos personales serán conservados durante un tiempo no mayor al necesario para cumplir con la finalidad de su tratamiento.

    Para garantizar que los datos personales no se conserven más tiempo del necesario, el responsable del tratamiento establecerá plazos para su supresión o revisión periódica.

    La conservación ampliada de tratamiento de datos personales únicamente se realizará con fines de archivo en interés público, fines de investigación científica, histórica o estadística, siempre y cuando se establezcan las garantías de seguridad y protección de datos personales oportunas y necesarias, para salvaguardar los derechos previstos en esta norma.

    j) Seguridad de datos personales.- Los responsables y encargados de tratamiento de los datos personales deberán implementar todas las medidas de seguridad adecuadas y necesarias, entendiéndose por tales las aceptadas por el estado de la técnica, sean estas organizativas, técnicas o de cualquier otra índole, para proteger los datos personales frente a cualquier riesgo, amenaza, vulnerabilidad, atendiendo a la naturaleza de los datos de carácter personal, al ámbito y el contexto.

    k) Responsabilidad proactiva y demostrada.- El responsable del tratamiento de datos personales deberá acreditar el haber implementado mecanismos para la protección de datos personales; es decir, el cumplimiento de los principios, derechos y obligaciones establecidos en la presente Ley, para lo cual, además de lo establecido en la normativa aplicable, podrá valerse de estándares, mejores prácticas, esquemas de auto y coregulación, códigos de protección, sistemas de certificación, sellos de protección de datos personales o cualquier otro mecanismo que se determine adecuado a los fines, la naturaleza del dato personal o el riesgo del tratamiento.

    El responsable del tratamiento de datos personales está obligado a rendir cuentas sobre el tratamiento al titular y a la Autoridad de Protección de Datos Personales.

    El responsable del tratamiento de datos personales deberá evaluar y revisar los mecanismos que adopte para cumplir con el principio de responsabilidad de forma continua y permanente, con el objeto de mejorar su nivel de eficacia en cuanto a la aplicación de la presente Ley.

    l) Aplicación favorable al titular.- En caso de duda sobre el alcance de las disposiciones del ordenamiento jurídico o contractuales, aplicables a la protección de datos personales, los funcionarios judiciales y administrativos las interpretarán. y aplicarán en el sentido más favorable al titular de dichos datos.

    m) Independencia del control.- Para el efectivo ejercicio del derecho a la protección de datos personales, y en cumplimiento de las obligaciones de protección de los derechos que tiene el Estado, la Autoridad de Protección de Datos deberá ejercer un control independiente, imparcial y autónomo, así como llevar a cabo las respectivas acciones de prevención, investigación y sanción.

    CAPÍTULO III. DERECHOS

    Artículo 11.- Normativa especializada

    Los datos personales cuyo tratamiento se encuentre regulado en normativa especializada en materia de ejercicio de la libertad de expresión, sectores regulados por normativa específica, gestión de riesgos, desastres naturales, seguridad nacional y defensa del Estado; y, los datos personales que deban proporcionarse a autoridades administrativas o judiciales en virtud de solicitudes y órdenes amparadas en competencias atribuidas en la normativa vigente, estarán sujetos a los principios establecidos en sus propias normas y los principios establecidos en esta Ley, en los casos que corresponda y sea de aplicación favorable. En todo caso deberá darse cumplimiento a los estándares internacionales en la materia de derechos humanos y a los principios de esta ley, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad.

    Artículo 12.- Derecho a la información

    El titular de datos personales tiene derecho a ser informado conforme los principios de lealtad y transparente por cualquier medio sobre:

    1) Los fines del tratamiento;

    2) La base legal para el tratamiento;

    3) Tipos de tratamiento;

    4) Tiempo de conservación;

    5) La existencia de una base de datos en la que constan sus datos personales;

    6) El origen de los datos personales cuando no se hayan obtenido directamente del titular;

    7) Otras finalidades y tratamientos ulteriores;

    8) Identidad y datos de contacto del responsable del tratamiento de datos personales, que incluirá: dirección del domicilio legal, número de teléfono y correo electrónico;

    9) Cuando sea del caso, identidad y datos de contacto del delegado de protección de datos personales, que incluirá: dirección domiciliaria, número de teléfono y correo electrónico;

    10) Las transferencias o comunicaciones, nacionales o internacionales, de datos personales que pretenda realizar, incluyendo los destinatarios y sus clases, así como las finalidades que motivan la realización de estas y las garantías de protección establecidas;

    11) Las consecuencias para el titular de los datos personales de su entrega o negativa a ello;

    12) El efecto de suministrar datos personales erróneos o inexactos;

    13) La posibilidad de revocar el consentimiento;

    14) La existencia v forma en que pueden hacerse efectivos sus derechos de acceso, eliminación, rectificación y actualización, oposición, anulación, limitación del tratamiento y a no ser objeto de una decisión basada únicamente en valoraciones automatizadas.

    15) Los mecanismos para hacer efectivo su derecho a la portabilidad, cuando el titular lo solicite;

    16) Dónde y cómo realizar sus reclamos ante el responsable del tratamiento de datos personales y la Autoridad de Protección de Datos Personales, y;

    17) La existencia de valoraciones y decisiones automatizadas, incluida la elaboración de perfiles.

    En el caso que los datos se obtengan directamente del titular, la información deberá ser comunicada de forma previa a este, es decir, en el momento mismo de la recogida del dato personal.

    Cuando los datos personales no se obtuvieren de forma directa del titular o fueren obtenidos de una fuente accesible al público, el titular deberá ser informado dentro de los siguientes treinta (30) días o al momento de la primera comunicación con el titular, cualquiera de las dos circunstancias que ocurra primero. Se le deberá proporcionar información expresa, inequívoca, transparente, inteligible, concisa, precisa y sin barreras técnicas.

    La información proporcionada al titular podrá transmitirse de cualquier modo comprobable en un lenguaje claro, sencillo y de fácil comprensión, de preferencia propendiendo a que pueda ser accesible en la lengua de su elección.

    En el caso de productos o servicios dirigidos, utilizados o que pudieran ser utilizados por niñas, niños y adolescentes, la información a la que hace referencia el presente artículo será proporcionada a su representante legal conforme a lo dispuesto en la presente Ley.

    Artículo 13.- Derecho de acceso

    El titular tiene derecho a conocer y a obtener, gratuitamente, del responsable de tratamiento acceso a todos sus datos personales y a la información detallada en el artículo precedente, sin necesidad de presentar justificación alguna. El responsable del tratamiento de datos personales deberá establecer métodos razonables que permitan el ejercicio de este derecho, el cual deberá ser atendido dentro del plazo de quince (15) días

    El derecho de acceso no podrá ejercerse de forma tal que constituya abuso del derecho.

    Artículo 14.- Derecho de rectificación y actualización

    El titular tiene el derecho a obtener del responsable del tratamiento la rectificación y actualización de sus datos personales inexactos o incompletos.

    Para tal efecto, el titular deberá presentar los justificativos del caso, cuando sea pertinente. El responsable de tratamiento deberá atender el requerimiento en un plazo de quince (15) días y en este mismo plazo, deberá informar al destinatario de los datos, de ser el caso, sobre la rectificación, a fin de que lo actualice.

    Artículo 15.- Derecho de eliminación

    El titular tiene derecho a que el responsable del tratamiento suprima sus datos personales, cuando:

    1) El tratamiento no cumpla con los principios establecidos en la presente ley;

    2) El tratamiento no sea necesario o pertinente pare el cumplimiento de la finalidad;

    3) Los datos personales hayan cumplido con la finalidad para la cual fueron recogidos o tratados;

    4) Haya vencido el plazo de conservación de los datos personales;

    5) El tratamiento afecte derechos fundamentales o libertades individuales;

    6) Revoque el consentimiento prestado o señale no haberlo otorgado para uno o varios fines específicos, sin necesidad de que medie justificación alguna; o,

    7) Exista obligación legal.

    El responsable del tratamiento de datos personales implementará métodos y técnicas orientadas a eliminar, hacer ilegible, o dejar irreconocibles de forma definitiva y segura los datos personales. Esta obligación la deberá cumplir en el plazo de quince (15) días de recibida la solicitud por parte del titular y será gratuito.

    Artículo 16.- Derecho de oposición

    El titular tiene el derecho a oponerse o negarse al tratamiento de sus datos personales, en los siguientes casos:

    1) No se afecten derechos y libertades fundamentales de terceros, la ley se lo permita y no se trate de información pública, de interés público o cuyo tratamiento está ordenado por la ley,

    2) El tratamiento de datos personales tenga por objeto la mercadotecnia directa; el interesado tendrá derecho a oponerse en todo momento al tratamiento de los datos personales que le conciernan, incluida la elaboración de perfiles; en cuyo caso los datos personales dejarán de ser tratados para dichos fines.

    3) Cuando no sea necesario su consentimiento para el tratamiento como consecuencia de la concurrencia de un interés legítimo, previsto en el artículo 7, y se justifique en una situación concreta personal del titular, siempre que una ley no disponga lo contrario.

    El responsable de tratamiento dejará de tratar los datos personales en estos casos, salvo que acredite motivos legítimos e imperiosos para el tratamiento que prevalezcan sobre los intereses, los derechos y las libertades del titular, o para la formulación, el ejercicio o la defensa de reclamaciones.

    Esta solicitud deberá ser atendida dentro del plazo de quince (15) días

    Artículo 17.- Derecho a la portabilidad

    El titular tiene el derecho a recibir del responsable del tratamiento, sus datos personales en un formato compatible, actualizado, estructurado, común, inter-operable y de lectura mecánica, preservando sus características; o a transmitirlos a otros responsables. La Autoridad de Protección de Datos Personales deberá dictar la normativa para el ejercicio del derecho a la portabilidad.

    El titular podré solicitar que el responsable del tratamiento realice la transferencia o comunicación de sus datos personales a otro responsable del tratamiento en cuanto fuera técnicamente posible y sin que el responsable pueda aducir impedimento de cualquier orden con el fin de ralentizar el acceso, la transmisión o reutilización de datos por parte del titular o de otro responsable del tratamiento. Luego de completada la transferencia de datos, el responsable que lo haga procederá a su eliminación, salvo que el titular disponga su conservación.

    El responsable que ha recibido la información asumirá las responsabilidades contempladas en esta Ley.

    Para que proceda el derecho a la portabilidad de datos es necesario que se produzca al menos una de las siguientes condiciones:

    1) Que el titular haya otorgado su consentimiento para el tratamiento de sus datos personales para uno o varios fines específicos. La transferencia o comunicación se hará entre responsables del tratamiento de datos personales cuando la operación sea técnicamente posible; en caso contrario los datos deberán ser transmitidos directamente al titular.

    2) Que el tratamiento se efectúe por medios automatizados;

    3) Que se trate de un volumen relevante de datos personales, según los parámetros definidos en el reglamento de la presente ley; o,

    4) Que el tratamiento sea necesario para el cumplimiento de obligaciones y el ejercicio de derechos del responsable o encargado del tratamiento de datos personales, o del titular en el ámbito del derecho laboral y seguridad social.

    Esta transferencia o comunicación debe ser económica y financieramente eficiente, expedita y sin trabas.

    No procederá este derecho cuando se trate de información inferida, derivada, creada, generada u obtenida a partir del análisis o tratamiento efectuado por el responsable del tratamiento de datos personales con base en los datos personales proporcionados por el titular, como es el caso de los datos personales que hubieren sido sometidos a un proceso de personalización, recomendación, categorización o creación de perfiles.

    Artículo 18.- Excepciones a los derechos de rectificación, actualización, eliminación, oposición, anulación y portabilidad

    Excepciones a los derechos de rectificación, actualización, eliminación, oposición, anulación y portabilidad.

    No proceden los derechos de rectificación, actualización, eliminación, oposición, anulación y portabilidad, en los siguientes casos:

    1) Si el solicitante no es el titular de los datos personales o su representante legal no se encuentre debidamente acreditado;

    2) Cuando los datos son necesarios para el cumplimiento de una obligación legal o contractual;

    3) Cuando los datos son necesarios para el cumplimiento de una orden judicial, resolución o mandato motivado de autoridad pública competente;

    4) Cuando los datos son necesarios para la formulación, ejercicio o defensa de reclamos o recursos;

    5) Cuando se pueda causar perjuicios a derechos o afectación a intereses legítimos de terceros y ello sea acreditado por el responsable de la base de datos al momento de dar respuesta al titular a su solicitud de ejercicio del derecho respectivo;

    6) Cuando se pueda obstaculizar actuaciones judiciales o administrativas en curso, debidamente notificadas;

    7) Cuando los datos son necesarios para ejercer el derecho a la libertad de expresión y opinión;

    8) Cuando los datos son necesarios para proteger el interés vital del interesado o de otra persona natural;

    9) En los casos en los que medie el interés público, sujeto al cumplimiento de los estándares internacionales de derechos humanos aplicables a la materia, al cumplimiento de los principios de esta ley y a los criterios de legalidad, proporcionalidad y necesidad;

    10) En el tratamiento de datos personales que sean necesarios para el archivo de información que constituya patrimonio del Estado, investigación científica, histórica o estadística.

    Artículo 19.- Derecho a la suspensión del tratamiento

    El titular tendrá derecho a obtener del responsable del tratamiento la suspensión del tratamiento de los datos, cuando se cumpla alguna de las condiciones siguientes:

    1) Cuando el titular impugne la exactitud de los datos personales, mientras el responsable de tratamiento verifica le exactitud de los mismos:

    2) El tratamiento sea ilícito y el interesado se oponga a le supresión de los datos personales y solicite en su lugar la limitación de su uso;

    3) El responsable ya no necesite los datos personales para los fines del tratamiento, pero el interesado los necesite para la formulación, el ejercicio n la defensa de reclamaciones; y.

    4) Cuando el interesado se haya opuesto al tratamiento en virtud del artículo 31 de la presente ley mientras se verifica si los motivos legítimos del responsable prevalecen sobre los del interesado.

    De existir negativa por parte del responsable o encargado del tratamiento de datos personales, y el titular recurra por dicha decisión ante la Autoridad de Protección de Datos Personales, esta suspensión se extenderá hasta la resolución del procedimiento administrativo,

    Cuando el titular impugne la exactitud de los datos personales, mientras el responsable de tratamiento verifica la exactitud de los mismos, deberá colocarse en la base de datos, en donde conste la información impugnada, que ésta ha sido objeto de inconformidad por parte del titular.

    El responsable de tratamiento podrá tratar los datos personales, que han sido objeto del ejercicio del presente derecho por parte del titular, únicamente, en los siguientes supuestos: para la formulación, el ejercicio o la defensa de reclamaciones; con el objeto de proteger los derechos de otra persona natural o jurídica o por razones de interés público importante.

    Artículo 20.- Derecho a no ser objeto de una decisión basada única o parcialmente en valoraciones automatizadas

    El titular tiene derecho a no ser sometido a una decisión basada única o parcialmente en valoraciones que sean producto de procesos automatizados, incluida la elaboración de perfiles, que produzcan efectos jurídicos en él o que atenten contra sus derechos y libertades fundamentales, para lo cual podrá:

    a. Solicitar al responsable del tratamiento una explicación motivada sobre la decisión tomada por el responsable o encargado del tratamiento de datos personales:

    b. Presentar observaciones;

    c. Solicitar los criterios de valoración sobre el programa automatizado; o

    d. Solicitar al responsable información sobre los tipos de datos utilizados y la fuente de la cual han sido obtenidos los mismos;

    e. Impugnar le decisión ante el responsable o encargado del tratamiento

    No se aplicará este derecho cuando:

    1. La decisión es necesaria para la celebración o ejecución de un contrato entre el titular y el responsable o encargado del tratamiento de datos personales;

    2. Está autorizada por la normativa aplicable, orden judicial, resolución o mandato motivado de autoridad técnica competente, para lo cual se deberá establecer medidas adecuadas para salvaguardar los derechos fundamentales y libertades del titular; o,

    3. Se base en el consentimiento explícito del titular.

    4. La decisión no conlleve impactos graves o riesgos verificables para el titular.

    No se podrá exigir la renuncia a este derecho en forma adelantada a través de   contratos de adhesión masivos. A más tardar en el momento de la primera comunicación con el titular de los datos personales, para informar una decisión basada únicamente en valoraciones automatizadas, este derecho le será informado explícitamente por cualquier medio idóneo.

    Artículo 21.- Derecho de niñas, niños y adolescentes a no ser objeto de una decisión basada única o parcialmente en valoraciones automatizadas

    Además de los presupuestos establecidos en el derecho a no ser objeto de una decisión basada única o parcialmente en valoraciones automatizadas, no se podrán tratar datos sensibles o datos de niñas, niños y adolescentes a menos que se cuente con le autorización expresa del titular o de su representante legal; o, cuando, dicho tratamiento esté destinado a salvaguardar un interés público esencial, el cual se evalúe en atención a los estándares internacionales de derechos humanos, y como mínimo satisfaga los criterios de legalidad, proporcionalidad y necesidad, y además incluya salvaguardas específicas para proteger los derechos fundamentales de los interesados.

    Los adolescentes, en ejercicio progresivo de sus derechos, a partir de los 15 años, podrán otorgar, en calidad de titulares, su consentimiento explícito para el tratamiento de sus datos personales, siempre que se les especifique con claridad sus fines.

    Artículo 22.- Derecho de consulta

    Las personas tienen derecho a la consulta pública y gratuita ante el Registro Nacional de Protección de Datos Personales, de conformidad con la presente Ley.

    Artículo 23.- Derecho a la educación digital

    Las personas tienen derecho al acceso y disponibilidad del conocimiento, aprendizaje, preparación, estudio, formación, capacitación, enseñanza e instrucción relacionados con el uso y maneje adecuado. sano, constructivo, seguro y responsable de las tecnologías de la información y comunicación, en estricto apego a la dignidad e integridad humana, los derechos fundamentales y libertades individuales con especial énfasis en la intimidad, la vida privada, autodeterminación informativa, identidad y reputación en línea, ciudadanía digital y el derecho a la protección de datos personales, así como promover una cultura sensibilizada en el derecho de protección de datos personales.

    El derecho a la educación digital tendrá un carácter inclusivo sobre todo en lo que respecta a las personas con necesidades educativas especiales.

    El sistema educativo nacional, incluyendo el sistema de educación superior, garantizará la educación digital no solo a favor de los estudiantes de todos los niveles sino también de los docentes, debiendo incluir dicha temática en su proceso de formación.

    Artículo 24.- Ejercicio de derechos

    El Estado, entidades educativas, organizaciones de la sociedad civil, proveedores de servicios de la sociedad de la información y el conocimiento, y otros entes relacionados, dentro del ámbito de sus relaciones, están obligados a proveer información y capacitación relacionadas con el uso y tratamiento responsable, adecuado y seguro de datos personales de niñas, niños y adolescentes, tanto a sus titulares como a sus representantes legales, de conformidad con la normativa técnica emitida por la Autoridad de Protección de Datos Personales.

    Los adolescentes mayores de doce (12) años y menores de quince (15) años, así como las niñas y niños, para el ejercicio de sus derechos necesitarán de su representante legal. Los adolescentes mayores de quince (15) años y menores de dieciocho (18) años, podrán ejercitarlos de forma directa ante la Autoridad de Protección de Datos Personales o ante el responsable de la base de datos personales del tratamiento.

    Los derechos del titular son irrenunciables. Será nula toda estipulación en contrario.

    CAPÍTULO IV. CATEGORÍAS ESPECIALES DE DATOS

    Artículo 25.- Categorías especiales de datos personales

    Se considerarán categorías especiales de datos personales, los siguientes:

    a) Datos sensibles;

    b) Datos de niñas, niños y adolescentes;

    c) Datos de salud, y,

    d) Datos de personas con discapacidad y de sus sustitutos, relativos a la discapacidad.

    Artículo 26.- Tratamiento de datos sensibles

    Queda prohibido el tratamiento de datos personales sensibles salvo que concurra alguna de las siguientes circunstancias:

    a) El titular haya dado su consentimiento explícito para el tratamiento de sus datos personales, especificándose claramente sus fines.

    b) El tratamiento es necesario para el cumplimiento de obligaciones y el ejercicio de derechos específicos del responsable del tratamiento o del titular en el ámbito del Derecho laboral y de la seguridad y protección social.

    c) El tratamiento es necesario para proteger intereses vitales del titular o de otra persona natural, en el supuesto de que el titular no esté capacitado, física o jurídicamente, para dar su consentimiento.

    d) El tratamiento se refiere a datos personales que el titular ha hecho manifiestamente públicos.

    e) El tratamiento se lo realiza por orden de autoridad judicial.

    f) El tratamiento es necesario con fines de archivo en interés público, fines de investigación científica o histórica o fines estadísticos, que debe ser proporcional al objetivo perseguido, respetar en lo esencial el derecho a la protección de datos y establecer medidas adecuadas y específicas para proteger los intereses y derechos fundamentales del titular.

    g) Cuando el tratamiento de los datos de salud se sujete a las disposiciones contenidas en la presente ley.

    Artículo 27.- Datos personales de personas fallecidas

    Los titulares de derechos sucesorios de las personas fallecidas, podrán dirigirse al responsable del tratamiento de datos personales con el objeto de solicitar el acceso, rectificación y actualización o eliminación de los datos personales del causante, siempre que el titular de los datos no haya, en vida, indicado otra utilización o destino para sus datos.

    Las personas o instituciones que la o el fallecido haya designado expresamente para ello. podrán también solicitar con arreglo a las instrucciones recibidas, el acceso a los datos personales de éste; y, en su caso, su rectificación, actualización o eliminación.

    En caso de fallecimiento de niñas, niños, adolescentes o personas que la ley reconozca como incapaces, las facultades de acceso, rectificación, actualización o eliminación, podrán ser ejercidas por quien hubiese sido su último representante legal, El Reglamento a la presente ley establecerá los mecanismos para el ejercicio de las facultades enunciadas en el presente artículo.

    Artículo 28.- Datos crediticios

    Salvo prueba en contrario será legítimo y lícito el tratamiento de datos destinados a informar sobre la solvencia patrimonial o crediticia, incluyendo aquellos relativos al cumplimiento o incumplimiento de obligaciones de carácter comercial o crediticia que permitan evaluar la concertación de negocios en general, la conducta comercial o la capacidad de pago del titular de los datos, en aquellos casos en que los mismos sean obtenidos de fuentes de acceso público o procedentes de informaciones facilitadas por el acreedor. Tales datos pueden ser utilizados solamente para esa finalidad de análisis y no serán comunicados o difundidos, ni podrán tener cualquier finalidad secundaria.

    La protección de datos personales crediticios se sujetará a lo previsto en la presente ley, en la legislación especializada sobre la materia y demás normativa dictada por la Autoridad de Protección de Datos Personales.

    Sin perjuicio de lo anterior, en ningún caso podrán comunicarse los datos crediticios relativos a obligaciones de carácter económico, financiero, bancario o comercial una vez transcurridos cinco años desde que la obligación a la que se refieran se haya hecho exigible.

    Artículo 29- Derechos de los Titulares de Datos Crediticios

    1. Sin perjuicio de los derechos reconocidos en esta Ley, los Titulares de Datos Crediticios tienen los siguientes derechos:

    a) Acceder de forma personal a la información de la cual son titulares;

    b) Que el reporte de crédito perrita conocer de manera clara y precisa la condición en que se encuentra su historial crediticio; y,

    c) Que las fuentes de información actualicen, rectifiquen c eliminen, según el caso, la información que fuese ilícita, falsa, inexacta, errónea, incompleta o caduca

    2. Sobre el derecho de acceso por el Titular del Dato Crediticio, éste será gratuito, cuantas veces lo requiera, respecto de la información que sobre si mismos esté registrada ante los prestadores de servicios de referencia crediticia y a través de los siguientes mecanismos:

    a) Observación directa a través de pantallas que los prestadores del servicio de referencia crediticia pondrán a disposición de dichos titulares; y,

    b) Entrega de impresiones de los reportes que a fin de que el Titular del Dato Crediticio compruebe la veracidad y exactitud de su contenido, sin que pueda ser utilizado con fines crediticios o comerciales.

    3. Sobre los derechos de actualización, rectificación o eliminación, el Titular del Dato Crediticio podrá exigir estos derechos frente a las fuentes de información mediante solicitud escrita. Las fuentes de información, dentro del plazo de quince días de presentada la solicitud, deberán resolverla admitiéndola o rechazándola motivadamente. El Titular del Dato Crediticio tiene derecho a solicitar a los prestadores del servicio de referencias crediticias que, en tanto se sigue el proceso de revisión, señalen en los reportes de crédito que emitan, que la información materia de la solicitud está siendo revisada a pedido del titular.

    Artículo 30.- Datos relativos a la salud

    Las instituciones que conforman el Sistema Nacional de Salud y los profesionales de la salud pueden recolectar y tratar los datos relativos a la salud de sus pacientes que estén o hubiesen estado bajo tratamiento de aquellos, de acuerde a lo previsto en la presente ley, en la legislación especializada sobre la materia y demás normativa dictada por la Autoridad de Protección de Datos Personales en coordinación con la autoridad sanitaria nacional.

    Los responsables y encargados del tratamiento de datos así como todas las personas que intervengan en cualquier fase de este, estarán sujetas al deber de confidencialidad, de tal manera que se garantice una seguridad adecuada de los datos personales, incluida la protección contra el tratamiento no autorizado o ilícito y contra su pérdida, destrucción o daño accidental, mediante la aplicación de medidas técnicas organizativas apropiadas. Esta obligación será complementaria del secreto profesional de conformidad con cada caso.

    Las obligaciones establecidas en los apartados anteriores se mantendrán aun cuando hubiese finalizado la relación del obligado con el responsable o encargado del tratamiento.

    No se requerirá el consentimiento del titular para el tratamiento de datos de salud cuando ello sea necesario por razones de interés público esencial en el ámbito de la salud, el que en todo caso deberá ser proporcional al objetivo perseguido, respetar en lo esencial el derecho a la protección de datos y establecer medidas adecuadas y específicas para proteger los intereses y derechos fundamentales del titular;

    Asimismo, tampoco se requerirá el consentimiento del titular cuando el tratamiento sea necesario por razones de interés público en el ámbito de la salud pública, como en el caso de amenazas transfronterizas graves para la salud, o para garantizar elevados niveles de calidad y de seguridad de la asistencia sanitaria y de los medicamentos o productos sanitarios, siempre y cuando se establezcan medidas adecuadas y específicas para proteger los derechos y libertades del titular y, en particular, el secreto profesional.

    Artículo 31.- Tratamiento de datos relativos a la salud

    Todo tratamiento de datos relativos a la salud deberá cumplir con los siguientes parámetros mínimos y aquellos que determine la Autoridad de Protección de Datos Personales en la normativa emitida para el efecto:

    1. Los datos relativos a la salud generados en establecimientos de salud públicos o privados, serán tratados cumpliendo los principios de confidencialidad y secreto profesional. El titular de la información deberá brindar su consentimiento previo conforme lo determina esta Ley, salvo en los casos en que el tratamiento sea necesario para proteger intereses vitales del interesado, en el supuesto de que el interesado no esté capacitado, física o jurídicamente, para dar su consentimiento; o sea necesario para fines de medicina preventiva o laboral, evaluación de la capacidad laboral del trabajador, diagnóstico médico, prestación de asistencia o tratamiento de tipo sanitario o social, o gestión de los sistemas y servicios de asistencia sanitaria y social, sobre la base de la legislación especializada sobre la materia o en virtud de un contrato con un profesional sanitario. En este último caso el tratamiento sólo podré ser realizado por un profesional sujeto a la obligación de secreto profesional, o bajo su responsabilidad, de acuerdo con la legislación especializada sobre la materia o con las demás normas que al respecto pueda establecer la Autoridad.

    2. Los datos relativos a la salud que se traten, siempre que sea posible, deberán ser previamente anonimizados o seudonimizados, evitando la posibilidad de identificar a los titulares de los mismos.

    3. Todo tratamiento de datos de salud anonimizados deberá ser autorizado previamente por la Autoridad de Protección de Datos Personales. Para obtener la autorización mencionada, el interesado deberá presentar un protocolo técnico que contenga los parámetros necesarios que garanticen la protección de dichos datos y el informe previo favorable emitido por le Autoridad Sanitaria.

    Artículo 32.- Tratamiento de datos de salud por entes privados y públicos con fines de investigación

    Los datos relativos a salud que consten en las instituciones que conforman el Sistema Nacional de Salud, podrán ser tratados por personas naturales y jurídicas privadas y públicas con fines de investigación científica, siempre que según el caso encuentren anonimizados, o dicho tratamiento sea autorizado por la Autoridad de Protección de Datos Personales, previo informe de la Autoridad Sanitaria Nacional.

    CAPÍTULO V. TRANSFERENCIA O COMUNICACIÓN Y ACCESO A DATOS PERSONALES POR TERCEROS

    Artículo 33.- Transferencia o comunicación de datos personales

    Los datos personales podrán transferirse o comunicarse a terceros cuando se realice para el cumplimiento de fines directamente relacionados con las funciones legítimas del responsable y del destinatario, cuando la transferencia se encuentre configurada dentro de una de las causales de legitimidad establecidas en esta Ley, y se cuente, además, con el consentimiento del titular.

    Se entenderá que el consentimiento es informado cuando para la transferencia o comunicación de datos personales el Responsable del tratamiento haya entregado información suficiente al titular que le permita conocer la finalidad a que se destinarán sus datos y el tipo de actividad del tercero a quien se pretende transferir o comunicar dichos datos.

    Artículo 34.- Acceso a datos personales por parte del encargado

    No se considerará transferencia o comunicación en el caso de que el encargado acceda a datos personales para la prestación de un servicio al responsable del tratamiento de datos personales. El tercero que ha accedido legítimamente a datos personales en estas consideraciones, será considerado encargado del tratamiento.

    El tratamiento de datos personales realizado por el encargado deberá estar regulado por un contrato, en el que se establezca de manera clara y precisa que el encargado del tratamiento de datos personales tratará únicamente los mismos conforme las instrucciones del responsable y que no los utilizará para finalidades diferentes a las señaladas en el contrato, ni que los transferirá o comunicará ni siquiera para su conservación a otras personas.

    Una vez que se haya cumplido la prestación contractual, los datos personales deberán ser destruidos o devueltos al responsable del tratamiento de datos personales bajo la supervisión de la Autoridad de Protección de Datos Personales.

    El encargado será responsable de las infracciones derivadas del incumplimiento de las condiciones de tratamiento de datos personales establecidas en la presente ley.

    Artículo 35.- Acceso a datos personales por parte de terceros

    No se considerará transferencia o comunicación cuando el acceso a datos personales por un tercero sea necesario para la prestación de un servicio al responsable del tratamiento de datos personales. El tercero que ha accedido a datos personales en estas condiciones debió hacerlo legítimamente.

    El tratamiento de datos personales realizado por terceros deberá estar regulado por un contrato, en el que se establezca de manera clara y precisa que el encargado del tratamiento de datos personales tratará únicamente los mismos conforme las instrucciones del responsable y que no los utilizará para finalidades diferentes a las señaladas en el contrato, ni que los transferirá o comunicará ni siquiera para su conservación a otras personas.

    Una vez que se haya cumplido la prestación contractual, los datos personales deberán ser destruidos o devueltos al responsable del tratamiento de datos personales bajo la supervisión de la autoridad de protección de datos personales.

    El tercero será responsable de las infracciones derivadas del incumplimiento de las condiciones «de tratamiento de datos personales establecidas en la presente ley.

    Artículo 36.- Excepciones de consentimiento para la transferencia o comunicación de datos personales

    No es necesario contar con el consentimiento del titular para la transferencia o comunicación de datos personales, en los siguientes supuestos

    1) Cuando los datos han sido recogidos de fuentes accesibles al público;

    2) Cuando el tratamiento responda a la libre y legítima aceptación de una relación jurídica entre el responsable de tratamiento y el titular, cuyo desarrollo, cumplimiento y control implique necesariamente la conexión de dicho tratamiento con base de datos. En este caso la transferencia o comunicación sólo será legítima en cuanto se limite a la finalidad que la justifique;

    3) Cuando los datos personales deban proporcionarse a autoridades administrativas o judiciales en virtud de solicitudes y órdenes amparadas en competencias atribuidas en la norma vigente;

    4) Cuando la comunicación se produzca entre Administraciones Públicas y tenga por objeto el tratamiento posterior de datos con fines históricos, estadísticos o científicos, siempre y cuando dichos datos se encuentren debidamente disociados o a lo menos anonimizados, y,

    5) Cuando la comunicación de datos de carácter personal relativos a la salud sea necesaria para solucionar una urgencia que implique intereses vitales de su titular y este se encontrare impedido de otorgar su consentimiento.

    6) Cuando la comunicación de datos de carácter personal relativos a la salud sea necesaria para realizar los estudios epidemiológicos de interés público, dando cumplimiento a los estándares internacionales en la materia de derechos humanos, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad. El tratamiento deberá ser de preferencia anonimizado, y en todo caso agregado, una vez pasada la urgencia de interés público.

    Cuando sea requerido el consentimiento del titular para que sus datos personales sean comunicados a un tercero, este puede revocarlo en cualquier momento, sin necesidad de que medie justificación alguna.

    La presente ley obligatoriamente debe ser aplicada por el destinatario, por el solo hecho de la comunicación de los datos; a menos que estos hayan sido anonimizados o sometidos a un proceso de

    CAPÍTULO VI. SEGURIDAD DE DATOS PERSONALES

    Artículo 37.- Seguridad de datos personales

    El responsable o encargado del tratamiento de datos personales según sea el caso, deberá sujetarse al principio de seguridad de datos personales, para lo cual deberá tomar en cuenta las categorías y volumen de datos personales, el estado de la técnica, mejores prácticas de seguridad integral y los costos de aplicación de acuerdo a la naturaleza, alcance, contexto y los fines del tratamiento, así como identificar la probabilidad de riesgos.

    El responsable o encargado del tratamiento de datos personales, deberá implementar un proceso de verificación, evaluación y valoración continua y permanente de la eficiencia, eficacia y efectividad de las medidas de carácter técnico, organizativo y de cualquier otra índole, implementadas con el objeto de garantizar y mejorar la seguridad del tratamiento de datos personales.

    El responsable o encargado del tratamiento de datos personales deberá evidenciar que las medidas adoptadas e implementadas mitiguen de forma adecuada los riesgos identificados

    Entre otras medidas, se podrán incluir las siguientes:

    1) Medidas de anonimización, seudonomización o cifrado de datos personales;

    2) Medidas dirigidas a mantener la confidencialidad, integridad y disponibilidad permanentes de los sistemas y servicios del tratamiento de datos personales y el acceso a los datos personales, de forma rápida en caso de incidentes; y

    3) Medidas dirigidas a mejorar la resistencia técnica, física, administrativa, y jurídica.

    4] Los responsables y encargados del tratamiento de datos personales, podrán acogerse a estándares internacionales para una adecuada gestión de riesgos enfocada a Ja protección de derechos y libertades, así como para la implementación y manejo de sistemas de seguridad de le información o a códigos de conducta reconocidos y autorizados por la Autoridad de Protección de Datos Personales.

    Artículo 38.- Medidas de seguridad en el ámbito del sector público

    El mecanismo gubernamental de seguridad de la información deberá incluir las medidas que deban implementarse en el caso de tratamiento de datos personales para hacer frente a cualquier riesgo, amenaza, vulnerabilidad, accesos no autorizados, pérdidas, alteraciones. destrucción o comunicación accidental o ilícita en el tratamiento de los datos conforme al principio de seguridad de datos personales.

    El mecanismo gubernamental de seguridad de la información abarcará y aplicará a todas les instituciones del sector público, contenidas en el artículo 225 de la Constitución de la República de Ecuador, así como a terceros que presten servicios públicos mediante concesión 1 otras figuras legalmente reconocidas.

    Estas, podrán incorporar medidas adicionales al mecanismo gubernamental de seguridad de la información.

    Artículo 39.- Protección de datos personales desde el diseño y por defecto

    Se entiende a la protección de datos desde el diseño como el deber del responsable del tratamiento de tener en cuenta, en las primeras fases de concepción y diseño del proyecto, que determinados tipos de tratamientos de datos personales entrañan una serie de riesgos para los derechos de los titulares en atención al estado de la técnica, naturaleza y fines del tratamiento, para lo cual, implementará las medidas técnicas, organizativas y de cualquier otra índole, con miras a garantizar el cumplimiento de las obligaciones en materia de protección de datos, en los términos del reglamento.

    La protección de datos por defecto hace referencia a que el responsable debe aplicar las medidas técnicas y organizativas adecuadas con miras a que, por defecto, solo sean objeto de tratamiento los datos personales que sean necesarios para cada uno cie los fines del tratamiento, en los términos del reglamento.

    Artículo 40.- Análisis de riesgo, amenazas y vulnerabilidades

    Para el análisis de riesgos, amenazas y vulnerabilidades, el responsable y el encargado del tratamiento de los datos personales deberán utilizar una metodología que considere, entre otras:

    1) Las particularidades del! tratamiento;

    2) Las particularidades de las partes involucradas; y,

    3) Las categorías y el volumen de datos personales objeto de tratamiento.

    Artículo 41.- Determinación de medidas de seguridad aplicables

    Para determinar las medidas de seguridad, aceptadas por el estado de la técnica, a las que están obligadas el responsable y el encargado del tratamiento de los datos personales, se deberán tomar en consideración, entre otros:

    1) Los resultados del análisis de riesgos, amenazas y vulnerabilidades;

    2) La naturaleza de los datos personales;

    3) Las características de las partes involucradas; y,

    4) Los antecedentes de destrucción de datos personales, la pérdida, alteración, divulgación y impedimento de acceso a los mismos por parte del titular, sean accidentales e intencionales, por acción u omisión, así como los antecedentes de transferencia, comunicación o de acceso no autorizado o exceso de autorización de tales datos.

    El responsable y el encargado del tratamiento de datos personales deberán tomar las medidas adecuadas y necesarias, de forma permanente y continua, para evaluar, prevenir, impedir, reducir, mitigar y controlar los riesgos, amenazas y vulnerabilidades, incluidas las que conlleven un alto riesgo para los derechos y libertades del titular, de conformidad con la normativa que emita la Autoridad de Protección de Datos Personales.

    Artículo 42.- Evaluación de impacto del tratamiento de datos personales

    El responsable realizará una evaluación de impacto del tratamiento de datos personales cuando se haya identificado la probabilidad de que dicho tratamiento, por su naturaleza, contexto o fines, conlleve un alto riesgo para los derechos y libertades del titular o cuando la Autoridad de Protección de Datos Personales lo requiera.

    La evaluación de impacto relativa a la protección de los datos será de carácter obligatoria en caso de:

    a) Evaluación sistemática y exhaustiva de aspectos personales de personas físicas que se base en un tratamiento automatizado, como la elaboración de perfiles, y sobre cuya base se tomen decisiones que produzcan efectos jurídicos para las personas naturales;

    b) Tratamiento a gran escala de las categorías especiales de datos, o de los datos personales relativos a condenas e infracciones penales, o

    c) Observación sistemática a gran escala de una zona de acceso público.

    La Autoridad de Protección de Datos Personales establecerá otros tipos de operaciones de tratamiento que requieran una evaluación de impacto relativa a la protección de datos.

    La evaluación de impacto deberá efectuarse previo al inicio del tratamiento de datos personales.

    Artículo 43.- Notificación de vulneración de seguridad

    El responsable del tratamiento deberá notificar la vulneración de la seguridad de datos personales a la Autoridad de Protección de Datos Personales y la Agencia de Regulación y Control de las Telecomunicaciones, tan pronto sea posible, y a más tardar en el término de cinco (5) días después de que haya tenido constancia de ella, a menos que sea improbable que dicha violación de la seguridad constituya un riesgo para los derechos y las libertades de las personas físicas. Si la notificación a la Autoridad de Protección de Datos no tiene lugar en el término de cinco (5) días, deberá ir acompañada de indicación de los motivos de la dilación.

    El encargado del tratamiento deberá notificar al responsable cualquier vulneración de la seguridad de datos personales tan pronto sea posible, y a más tardar dentro del término de dos (2) días contados a partir de la fecha en la que tenga conocimiento de ella.

    Artículo 44.- Acceso a datos personales para atención a emergencias e incidentes informáticos

    Las autoridades públicas competentes, los equipos de respuesta de emergencias informáticas, los equipos de respuesta a incidentes de seguridad informática, los centros de operaciones de seguridad, los prestadores y proveedores de servicios de telecomunicaciones y los proveedores de tecnología y servicios de seguridad, nacionales e internacionales, podrán acceder y efectuar tratamientos sobre los datos personales contenidos en las notificaciones de vulneración a las seguridades, durante el tiempo necesario, exclusivamente para la detección, análisis, protección y respuesta ante cualquier tipo de incidentes así como para adoptar e implementar medidas de seguridad adecuadas y proporcionadas a los riesgos identificados.

    Artículo 45.- Garantía del secreto de las comunicaciones y seguridad de datos personales

    Para la correcta prestación de los servicios de telecomunicaciones y la apropiada operación de redes de telecomunicaciones, los prestadores de servicios de telecomunicaciones deben garantizar el secreto de las comunicaciones y seguridad de datos personales. Únicamente por orden judicial, los prestadores le servicios de telecomunicaciones podrán utilizar equipos, infraestructuras £ instalaciones que permitan grabar los contenidos de las comunicaciones específicas dispuestas por los jueces competentes. Si se evidencia un tratamiento de grabación o interceptación de las comunicaciones no autorizadas por orden judicial, se aplicará lo dispuesto en la presente Ley.

    Artículo 46.- Notificación de vulneración de seguridad al titular

    El responsable del tratamiento deberá notificar sin dilación la vulneración de seguridad de datos personales al titular cuando conlleve un riesgo a sus derechos fundamentales y libertades individuales, dentro del término de tres días contados a partir de la fecha en la que tuvo conocimiento del riesgo.

    No se deberá notificar la vulneración de seguridad de datos personales al titular en los siguientes casos:

    1. Cuando el responsable del tratamiento haya adoptado medidas de protección técnicas organizativas c de cualquier otra índole apropiadas aplicadas a los datos personales afectados por la vulneración de seguridad que se pueda demostrar que son efectivas;

    2. Cuando el responsable del tratamiento haya tomado medidas que garanticen que el riesgo para los derechos fundamentales y las libertades individuales del titular no ocurrirá; y,

    3. Cuanto se requiera un esfuerzo desproporcionado para hacerlo; en cuyo caso, el responsable del tratamiento deberá realizar una comunicación pública a través de cualquier medio en la que se informe de la vulneración de seguridad de datos personales a los titulares.

    La procedencia de las excepciones de los numerales 1 y 2 deberá ser calificada por la Autoridad de Protección de Datos, una vez informada esta tan pronto sea posible, y en cualquier caso dentro de los plazos contemplados en el Articulo 43.

    La notificación al titular del dato objeto de la vulneración de seguridad contendrá lo señalado en el artículo 43 de esta ley.

    En caso de que el responsable del tratamiento de los datos personales no cumpliese oportunamente y de modo justificado con la notificación será sancionado conforme al régimen sancionatorio previsto en esta ley.

    La notificación oportuna de la violación por parte del responsable de tratamiento al titular y la ejecución oportuna de medidas de respuesta, serán consideradas atenuante de la infra

    CAPÍTULO VII. DEL RESPONSABLE, ENCARGO Y DELEGADO DE PROTECCIÓN DE DATOS PERSONALES

    Artículo 47.- Obligaciones del responsable y encargado del tratamiento de datos personales

    El responsable del tratamiento de datos personales está obligado a:

    1) Tratar datos personales en estricto apego a los principios y derechos desarrollados en. la presente Ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales, o normativa sobre la materia:

    2) Aplicar e implementar requisitos y herramientas administrativas, técnicas, físicas, organizativas y jurídicas apropiadas, a fin de garantizar y demostrar que el tratamiento de datos personales se ha realizado conforme a lo previsto en la presente Ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales. o normativa sobre la materia;

    3) Aplicar e implementar procesos de verificación, evaluación, valoración periódica de la eficiencia, eficacia y efectividad de los requisitos y herramientas administrativas, técnicas, físicas, organizativas y Jurídicas implementadas;

    4) Implementar políticas de protección. de datos personales afines al tratamiento de datos personales en cada caso en particular;

    5) Utilizar metodologías de análisis y gestión de riesgos adaptadas a las particularidades del tratamiento y de las partes involucradas:

    6) Realizar evaluaciones de adecuación al nivel de seguridad previas el tratamiento de datos personales:

    7) Tomar medidas tecnológicas, físicas, administrativas, organizativas y jurídicas necesarias para prevenir, impedir, reducir, mitigar y controlar los riesgos y las vulneraciones identificadas;

    8) Notificar a la Autoridad de Protección de Datos Personales y al titular de los datos acerca de violaciones a las seguridades implementadas para el tratamiento de datos personales conforme a lo establecido en el procedimiento previsto para el efecto;

    9) Implementar la protección de datos personales desde el diseño y por defecto;

    10) Suscribir contratos de confidencialidad y manejo adecuado de datos personales con el encargado y el personal a cargo del tratamiento de datos personales o que tenga conocimiento de los datos personales;

    11) Asegurar que el encargado del tratamiento de datos personales ofrezca mecanismos suficientes para garantizar el derecho a la protección de datos personales conforme a lo establecido en la presente ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales, normativa sobre la materia y las mejores prácticas a nivel nacional o internacional;

    12) Registrar y mantener actualizado el Registro Nacional de Protección de Datos Personales, de conformidad a lo dispuesto en la presente Ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales;

    13) Designar al Delegado de Protección de Datos Personales, en los casos que corresponda;

    14) Permitir y contribuir a la realización de auditorías o inspecciones, por parte de un auditor acreditado por la Autoridad de Protección de Datos Personales; y,

    15) Los demás establecidos en la presente Ley en su reglamento, en directrices, lineamientos, regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre la materia.

    El encargado de tratamiento de datos personales tendrá las mismas obligaciones que el responsable de tratamiento de datos personales, en lo que sea aplicable, de acuerdo a la presente ley y su reglamento.

    Artículo 48.- Delegado de protección de datos personales

    Se designará un delegado de protección de datos personales en los siguientes casos:

    1) Cuando el tratamiento se lleve a cabo por quienes conforman el sector público de acuerdo con lo establecido en el artículo 225 de la Constitución de la República;

    2) Cuando las actividades del responsable o encargado del tratamiento de datos personales requieran un control permanente y sistematizado por su volumen, naturaleza, alcance o finalidades del tratamiento, conforme se establezca en esta ley, el reglamento a ésta, o en la normativa que dicte al respecto la Autoridad de Protección de Datos Personales;

    3) Cuando se refiera al tratamiento a gran escala de categorías especiales de datos, de conformidad con lo establecido en el reglamento de esta ley; y,

    4) Cuando el tratamiento no se refiera a datos relacionados con la seguridad nacional y defensa del Estado que adolezcan de reserva ni fuesen secretos, de conformidad con lo establecido en la normativa especializada en la materia.

    La Autoridad de Protección de Datos Personales podrá definir nuevas condiciones en las que deba designarse un delegado de protección de datos personales y emitirá, a dicho efecto, las directrices suficientes para su designación.

    Artículo 49.- Funciones del delegado de protección de datos personales

    El delegado de protección de datos personales tendrá, entre otras, las siguientes funciones y atribuciones:

    1) Asesorar al responsable, al personal del responsable y al encargado del tratamiento de datos personales, sobre las disposiciones contenidas en esta ley, el reglamento, las directrices, lineamientos y demás regulaciones emitidas por la Autoridad de Protección de Datos Personales;

    2) Supervisar el cumplimiento de las disposiciones contenidas en esta ley, el reglamento, las directrices, lineamientos y demás regulaciones emitidas por la Autoridad de Protección de Datos Personales;

    3) Asesorar en el análisis de riesgo. evaluación de impacto y evaluación de medidas de seguridad, y supervisar su aplicación;

    4) Cooperar con la Autoridad de Protección de Datos Personales y actuar como punto de contacto con dicha entidad, con relación a las cuestiones referentes al tratamiento de datos personales; y,

    5) Las demás que llegase a establecer la Autoridad de Protección de Datos Personales con ocasión de las categorías especiales de datos personales.

    En caso de incumplimiento de sus funciones, el delegado de protección de datos personales responderá administrativa, civil y penalmente, de conformidad con la ley.

    Artículo 50.- Consideraciones especiales para el delegado de protección de datos personales Para la ejecución. de las funciones del delegado de protección de datos, el responsable y el encargado de tratamiento de datos personales, deberán observar lo siguiente:

    1) Garantizar que la participación del delegado de protección de datos personales, en todas las cuestiones relativas a la protección de datos personales, sea apropiada y oportuna;

    2) Facilitar el acceso a los datos personales de las operaciones de tratamiento, así como todos los recursos y elementos necesarios para garantizar el correcto y libre desempeño de sus funciones;

    3) Capacitar y actualizar en la materia al delegado de protección de datos personales, de conformidad con la normativa técnica que emita la Autoridad de Protección de Datos Personales;

    4) No podrán destituir o sancionar al delegado de protección de datos personales por el correcto desempeño de sus funciones;

    5) El delegado de protección de datos personales mantendrá relación directa con el más alto nivel ejecutivo y de decisión del responsable y con el encargado;

    6) El titular de los datos personales podrá contactar al delegado de protección de datos personales con relación al tratamiento de sus datos personales a fin de ejercer sus derechos; y,

    7) El delegado de protección de datos personales estará obligado a mantener la más estricta confidencialidad respecto a la ejecución de sus funciones.

    Siempre que no exista conflicto con las responsabilidades establecidas en la presente ley, su reglamento, directrices, lineamientos y demás regulaciones emitidas por le. Autoridad de Protección de Datos Personales, el delegado de protección de datos personales podrá desempeñar otras funciones dispuestas por el responsable o el encargado del tratamiento de datos personales.

    Artículo 51.- Registro Nacional de protección de datos personales

    El responsable del tratamiento de datos personales deberá reportar y mantener actualizada la información ante la Autoridad de Protección de Datos Personales, sobre lo siguiente:

    1) Identificación de la base de datos o del tratamiento;

    2) El nombre domicilio legal y datos de contacto del responsable y encargado del tratamiento de datos personales;

    3) Características y finalidad del tratamiento de datos personales;

    4) Naturaleza de los datos personales tratados,

    5) Identificación, nombre, domicilio legal y datos de contacto de los destinatarios de los datos personales, incluyendo encargados y terceros;

    6) Modo de interrelacionar la información registrada;

    7) Medios utilizados para implementar los principios, derechos y obligaciones contenidas en la presente ley y normativa especializada;

    8) Requisitos y herramientas administrativas técnicas y físicas, organizativas y jurídicas implementadas para garantizar le seguridad y protección de datos personales;

    9) Tiempo de conservación de los datos.

    CAPÍTULO VIII. DE LA RESPONSABILIDAD PROACTIVA

    Artículo 52.- Autorregulación

    Los responsables y encargados de tratamiento de datos personales podrán, de manera voluntaria, acogerse o adherirse a códigos de conducta, certificaciones, sellos y marcas de protección, cláusulas tipo, sin que esto constituya eximente de la responsabilidad de cumplir con las disposiciones de la presente ley, su reglamento, directrices lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y demás normativa sobre la materia.

    Artículo 53.- Códigos de conducta

    La Autoridad de Regulación y Control promoverá la elaboración de códigos Je conducta por sectores, industrias, empresas, organizaciones, que tengan como fin el cumplimiento de la normativa vigente en materia de protección de datos.

    Los códigos de conducta deberán tomar en, cuenta las necesidades específicas de los sectores en los que se efectúe tratamiento de datos personales, así como cumplir con los requisitos que se determinen en la normativa secundaria y con las disposiciones previstas en la. presente Ley, para su aprobación por la Autoridad de Regulación y Control.

    Los responsables o encargados de tratamiento de datos personales interesados podrán adherirse e implementar los códigos de conducta aprobados, para lo cual seguirán el procedimiento establecido en el Reglamento a la presente Ley.

    Artículo 54.- Entidades de Certificación

    En materia de protección de datos personales las Entidades de Certificación, de manera no exclusiva y en concordancia con el artículo 52, podrán:

    1) Emitir certificaciones de cumplimiento de la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y demás normativa sobre la materia;

    2) Emitir sellos de protección de datos personales;

    3) Llevar a cabo auditorías de protección de datos personales, y,

    4) Certificar los procesos de transferencias internacionales de datos personales.

    Los resultados de las auditorias podrán ser considerados como elementos probatorios dentro de los procesos sancionatorios.

    CAPÍTULO IX. TRANSFERENCIA O COMUNICACIÓN INTERNACIONAL DE DATOS PERSONALES

    Artículo 55.- Transferencia o comunicación internacional de datos personales

    La transferencia o comunicación internacional de datos personales será posible si se sujeta a lo previsto en el presente capítulo, la presente Ley o la normativa especializada en la materia, propendiendo siempre al efectivo ejercicio del derecho a la protección de datos personales.

    Artículo 56.- Transferencia o comunicación internacional de datos personales a países declarados como nivel adecuado de protección

    Por principio general se podrán transferir o comunicar datos personales a países, organizaciones y personas jurídicas en general que brinden niveles adecuados de protección, y que se ajusten a la obligación de cumplimiento y garantía de estándares reconocidos internacionalmente conforme a los criterios establecidos en el Reglamento a la ley.

    Cuando resulte necesario por la naturaleza de la transferencia, la Autoridad de Protección de Datos Personales podrá implementar métodos de control ex post que serán definidos en el Reglamento a la Ley. También establecerá acciones conjuntas entre las autoridades de ambos países con el objeto de prevenir, corregir o mitigar el tratamiento indebido de datos en ambos países.

    Para declarar de nivel adecuado de protección a países u organizaciones, la Autoridad de Protección de Datos Personales emitirá resolución motivada, en la que se establezca que la transferencia o comunicación internacional de datos personales cumple niveles adecuados de protección o de garantías adecuadas de protección, conforme a lo establecido en esta ley y su reglamento.

    Artículo 57.- Transferencia o comunicación mediante garantías adecuadas

    En caso de realizar una transferencia internacional de datos a un país, organización o territorio económico internacional que no haya sido calificado por la Autoridad de Protección de Datos de tener un nivel adecuado de protección, se podrá realizar la referida transferencia internacional siempre que el responsable o encargado del tratamiento de datos personales ofrezca garantías adecuadas para el titular, para lo cual se deberá observar lo siguiente:

    a. Garantizar el cumplimiento de principios, derechos y obligaciones en el tratamiento de datos personales en un estándar igual o mayor a la normativa ecuatoriana vigente.

    b. Efectiva tutela del derecho a la protección de datos personales, a través de la disponibilidad permanente de acciones administrativas o judiciales; y,

    c. El derecho a solicitar la reparación integral, de ser el caso.

    Para que ello ocurra, la transferencia internacional de datos personales se sustentará en un instrumento jurídico que contemple los estándares antes determinados, así como aquellos que establezca la Autoridad de Protección de Datos Personales, el mismo que deberá ser vinculante.

    Artículo 58. Normas corporativas vinculantes

    Los responsables o encargados del tratamiento de datos personales podrán presentar a la Autoridad de Protección de Datos Personales, normas corporativas vinculantes, específicas y aplicadas al ámbito de su actividad, las cuales deberán cumplir las siguientes condiciones:

    1. Será de obligatorio cumplimiento para el responsable del tratamiento y para la empresa a la que eventualmente transfieran datos personales.

    2. Brindar a los titulares los mecanismos adecuados para el ejercicio de sus derechos relacionados al tratamiento de sus datos personales observando las disposiciones de la presente ley;

    3. Incluir una enunciación detallada de las empresas filiales que, además del responsable del tratamiento, pertenecen al mismo grupo empresarial. Además, se incluirá la estructura y los datos del contacto del grupo empresarial o joint venture, dedicadas a una actividad económica conjunta y de cada uno de sus miembros.

    4. Incluir el detalle de las empresas encargadas del tratamiento de datos personales, las categorías de datos personales a ser utilizados. así como el tipo de tratamiento a realizarse y su finalidad;

    5. Observar en su contenido todas las disposiciones de la presente ley referentes a principios de tratamiento de datos personales, medidas de seguridad de datos, requisitos respecto a transferencia o comunicación internacional y transferencia o comunicación ulterior a organismos no sujetos a normas corporativas vinculantes;

    6. Contener la aceptación por parte del responsable o del encargado del tratamiento de los datos personales, o de cualquier miembro de su grupo empresarial sobre su responsabilidad por cualquier violación de las normas corporativas vinculantes. El responsable o encargado del tratamiento de datos personales no será responsable si demuestra que el acto que originó la violación no le es imputable;

    7. Incluir los mecanismos en que se facilita al titular la información clara y completa, respecto a las normas corporativas vinculantes;

    8. Incluir las funciones de todo delegado de protección de datos designado de cualquier otra persona o entidad encargada de la supervisión del cumplimiento de las normas corporativas vinculantes dentro del grupo empresarial o del joint venture dedicadas a una actividad económica conjunta bajo un mismo control así como los mecanismos y procesos de supervisión y tramitación de reclamaciones; .

    9. Enunciar de forma detallada los mecanismos establecidos en el grupo empresarial o empresas afiliadas que permitan al titular verificar efectivamente el cumplimiento de las normas corporativas vinculantes. Entre estos mecanismos se incluirán auditorías de protección de «daros, y aquellos métodos técnicos que brinden acciones correctivas para proteger los derechos del titular. Los resultados de las auditorias serán comunicadas al delegado de protección de datos designado de conformidad con la presente ley, o cualquier otra entidad o persona encargada del cumplimiento de las normas corporativas vinculantes dentro del grupo empresarial o empresas afiliadas dedicadas a una actividad económica conjunta y al Directorio de la empresa que controla un grupo empresarial, y a disposición de la Autoridad de protección de datos personales;

    10. Incluir los mecanismos para cooperar de forma coordinada con la autoridad de protección de datos personales y el responsable del tratamiento de los datos personales; y,

    11. Incluir la declaración y compromiso del responsable del tratamiento de los datos personales de promover la protección de datos personales entre sus empleados con formación continua.

    La Autoridad de Protección de Datos Personales definirá el formato y los procedimientos para la transferencia o comunicación de datos realizada por parte de los responsables, los encargados y las autoridades de control en lo relativo a la aplicación de las normas corporativas vinculantes a las que se refiere este artículo.

    Cualquier cambio a ser realizado a estas normas deberá ser notificado a la autoridad de protección de datos personales y al titular conforme a los mecanismos señalados por el responsable de tratamiento en su solicitud.

    Artículo 59.- Autorización pare transferencia internacional

    Para todos aquellos casos no contemplados en los artículos precedentes, en los que se pretenda realizar una transferencia internacional de datos personales, se requeriré la autorización de la Autoridad de Protección de Datos, para lo cual, se deberá garantizar documentadamente el cumplimiento de la normativa vigente sobre protección de datos de carácter personal, según lo determinado en el Reglamento de aplicación a la presente Ley.

    Sin perjuicio de lo anterior la información sobre transferencias internacionales de datos personales deberá ser registradas previamente en el Registro Nacional de Protección de Datos Personales por parte del responsable del tratamiento o, en su caso, del encargado, según el procedimiento establecido en el Reglamento de aplicación a la presente Ley.

    Artículo 60. Casos excepcionales de transferencias o comunicaciones internacionales

    Sin perjuicio de in establecido en los artículos precedentes se podrá realizar transferencias o comunicaciones internacionales de datos personales, en los siguientes casos:

    1. Cuando los datos personales sean requeridos para el cumplimiento de competencias institucionales, de conformidad con la normativa aplicable;

    2. Cuando el titular haya otorgado su consentimiento explícito a la transferencia o comunicación propuesta, tras haber sido informado de los posibles riesgos para él de dichas transferencias o comunicaciones internacionales, debido a la ausencia de una resolución de nivel adecuado de protección y de garantías adecuadas.

    3. Cuando la transferencia internacional tenga como finalidad el cumplimiento de una obligación legal o regulatoria;

    4. Cuando la transferencia internacional de datos personales sea necesaria para la ejecución de un contrato entre el titular y el responsable del tratamiento de datos personales, o para la ejecución de medidas de carácter precontractual adoptadas a solicitud del titular;

    5. Cuando la transferencia sea necesaria por razones de interés público.

    6. Cuando la transferencia internacional sea necesaria para la colaboración judicial internacional.

    7. Cuando la transferencia internacional sea necesaria para la cooperación dentro de la investigación de infracciones

    8. Cuando la transferencia internacional es necesaria para el cumplimiento de compromisos adquiridos en procesos de cooperación internacional entre Estados;

    9. Cuando se realicen transferencias de datos en operaciones bancarias y bursátiles.

    10. Cuando la transferencia internacional de Datos personales sea necesaria para la formulación, el ejercicio o la defensa de reclamaciones, acciones administrativas o jurisdiccionales y recursos; y,

    11. Cuando la transferencia internacional de datos personales sea necesaria para proteger los intereses vitales del interesado o de otras personas, cuando el interesado esté física o jurídicamente incapacitado para dar su consentimiento.

    Artículo 61.- Control continuo

    La Autoridad de Protección de Datos Personales en acciones conjuntas con la academia, realizará reportes continuos sobre la realidad internacional en materia de protección de datos personales.

    Dichos estudios servirán como elemento de control continuo del nivel adecuado de protección de datos personales de los países u organizaciones que ostenten tal reconocimiento.

    En caso de detectarse que un país u organización ya no cumple con un nivel adecuado de protección conforme los principios, derechos y obligaciones desarrollados en la presente Ley, la Autoridad de Protección de Datos Personales procederá a emitir la correspondiente resolución de no adecuación, a partir de la cual no procederán transferencias de datos personales, salvo que operen otros mecanismos de transferencia conforme lo dispuesto en el presente capitulo.

    La Autoridad de Protección de Datos Personales publicará en cualquier medio, de forma permanente y debidamente la lista de países, organizaciones, empresas o grupos económicos que garanticen niveles adecuados de protección de datos personales

    CAFÍTULO X. DE LOS REQUERIMIENTOS DIRECTOS Y DE LA GESTIÓN DEL PROCEDIMIENTO ADMINISTRATIVO

    Artículo 62.- Requerimiento directo del titular del dato de carácter personal al responsable del tratamiento

    El titular podrá en cualquier momento, de forma gratuita, por medios físicos o digitales puestos a su disposición por parte del responsable del tratamiento de los datos personales, presentar requerimientos, peticiones, quejas o reclamaciones directamente al responsable del tratamiento, relacionadas con el ejercicio de sus derechos, la aplicación de principios y el cumplimiento de obligaciones por parte del responsable del tratamiento, que tengan relación con él.

    Presentado el requerimiento ante el responsable este contará con un término de diez (10) días para contestar afirmativa o negativamente, notificar y ejecutar lo que corresponda.

    Artículo 63.- Actuaciones previas

    La Autoridad de Protección de Datos Personales podrá iniciar, de oficio o a petición del titular, actuaciones previas con el fin de conocer las circunstancias del caso concreto o la conveniencia o no de iniciar el procedimiento, para lo cual se estará conforme a las disposiciones del Código Orgánico Administrativo.

    Artículo 64.- Procedimiento administrativo

    En el caso de que el responsable del tratamiento no conteste el requerimiento, en el término establecido en la presente ley, o éste fuere negado, el titular podrá presentar el correspondiente reclamo administrativo ante la Autoridad de Protección de Datos Personales, para lo cual se deberá estar conforme al procedimiento establecido en el Código Orgánico Administrativo, la presente ley y demás normativa emitida por la Autoridad de Protección de Datos Personales. Sin perjuicio, el titular podrá presentar acciones civiles, penales o constitucionales de las que se crea asistido.

    CAPÍTULO XI. MEDIDAS CORRECTIVAS, INFRACCIONES Y RÉGIMEN SANCIONATORIO

    Artículo 65.- Medidas correctivas

    En caso de incumplimiento de las disposiciones previstas en la presente Ley, su reglamento, directrices y lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia, o transgresión a los derechos y principios que componen el derecho a la protección de datos personales, la Autoridad de Protección de Datos Personales dictará medidas correctivas con el objeto de evitar que se siga cometiendo le infracción y que la conducta se produzca nuevamente, sin perjuicio de la aplicación de las correspondientes sanciones administrativas.

    Las medidas correctivas podrán consistir, entre otras, en:

    1) El cese del tratamiento, bajo determinadas condiciones o plazos;

    2) La eliminación de los datos; y

    3) La imposición de medidas técnicas, jurídicas, organizativas o administrativas a garantizar un tratamiento adecuado de datos personales.

    La Autoridad de Protección de Datos Personales, en el marco de esta Ley, dictará, para cada caso, las medidas correctivas, previo informe de la unidad técnica competente, que permitan corregir, revertir o eliminar las conductas contrarias a la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia.

    Artículo 66.- Aplicación de medidas correctivas

    La Autoridad de Protección de Datos Personales, en el marco de esta ley, previo informe de la unidad técnica competente, aplicará para cada caso las medidas correctivas citadas en el artículo anterior, que permitan corregir, revertir o eliminar las conductas contrarias a la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre la materia.

    Para la aplicación de las medidas correctivas se seguirán las siguientes reglas:

    1. En el caso de que los responsables, encargados de tratamiento de datos personales y organismos de certificación y de ser el caso, a terceros, se encuentran incursos en el presunto cometimiento de una infracción leve y estos consten dentro del Registro Único de responsables y encargados incumplidos; la Autoridad de Protección de Datos Personales activará directamente el procedimiento administrativo sancionatorio, haciendo constar dentro de la resolución tanto las medidas correctivas aplicables como la sanción correspondiente a la infracción cometida; y,

    2. En el caso de que los responsables. encargados del tratamiento de datos personales y organismos de certificación, se encuentren incursos en el presunto cometimiento de una infracción grave; la Autoridad de Protección de Datos Personales; aplicará en primera instancia medidas correctivas. Si las medidas correctivas fueren cumplidas de forma tardía, parcial o defectuosa, la Autoridad de Protección de Datos Personales, aplicará las sanciones que corresponden a las infracciones graves, activando para el efecto el procedimiento administrativo sancionatorio y haciendo constar dentro de la resolución tanto las medidas correctivas aplicables como la sanción correspondiente a la infracción cometida; y,

    3. En el caso de que los responsables, encargados del tratamiento de datos personales y organismos de certificación, se encuentren incursos en el presunto cometimiento de una infracción muy grave, la Autoridad de Protección de Datos Personales activará directamente el procedimiento administrativo sancionatorio haciendo constar dentro de la resolución tanto las medidas correctivas aplicables como la sanción correspondiente a la infracción cometida.

    Sección 1ª. De las infracciones del Responsable de protección de datos

    Artículo 67.- Infracciones leves del Responsable de protección de datos

    Se consideran infracciones leves las siguientes:

    1. No tramitar, tramitar fuera del término previsto o negar injustificadamente las peticiones o quejas realizadas por el titular;

    2. No implementar protección de datos desde el diseño y por defecto;

    3. No mantener disponibles políticas le protección de datos personales afines al tratamiento de datos personales;

    4. Elegir un encargado del tratamiento de datos personales que no ofrezca garantías suficientes para hacer efectivo el ejercicio del derecho a la protección de datos personales;

    5. Incumplir las medidas correctivas dispuestas por la Autoridad de Protección de Datos Personales.

    Artículo 68.- Infracciones graves del Responsable de protección de datos

    Se consideran infracciones graves las siguientes:

    1) No implementar medidas administrativas, técnicas y físicas, organizativas y jurídicas a fin de garantizar el tratamiento de datos personales que realice conforme la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia:

    2) Utilizar información o datos para fines distintos a los declarados;

    3) Ceder o comunicar datos personales sin cumplir con los requisitos y procedimientos establecidos en la presento ley y su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia,

    4) No utilizar metodologías de análisis y gestión de riesgos adaptadas a la naturaleza de los. datos personales las particularidades del tratamiento y de las partes involucradas;

    5) No realizar evaluaciones de impacto al tratamiento de datos en los rasos en que era necesario realizarlas;

    6) No implementar medidas técnicas organizativas o de cualquier índole, necesarias para prevenir, impedir, reducir o mitigar y controlar los riesgos y las vulneraciones a la seguridad de datos personales que hayan sido identificadas;

    7) No notificar a la Autoridad de Protección de Datos Personales y al titular, de vulneraciones a la seguridad y protección de datos personales, cuando afecte los derechos fundamentales y libertades individuales de los titulares;

    8) No notificar a le Autoridad de Protección de Datos Personales del titular las vulneraciones de seguridad y protección de datos personales, cuando exista afectación a los derechos fundamentales y libertades individuales de los titulares;

    9) No suscribir contratos que incluyan cláusulas de confidencialidad y tratamiento adecuado de datos personales con el encargado y el personal a cargo del tratamiento de datos Personales o que tenga conocimiento de los datos personales.

    10) No mantener actualizado el Registro Nacional de protección de datos personales de conformidad a lo dispuesto en la presente ley su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia.

    11) No consignar en el Registro Nacional de Protección de Datos Personales lo dispuesto en la presente ley y su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre la materia.

    12) No designar el delegado de protección de datos personales cuando corresponde.

    13) No permitir y no contribuir a la realización de auditorías o inspecciones por parte del auditor acreditado por la Autoridad de Protección de Datos Personales, y,

    14) Incumplir las medidas correctivas o cumplir de forma tardía, parcial o defectuosa, siempre y cuando hubiese precedido por dicha causa la aplicación de una sanción por infracción leve, e incurrir de forma reiterada en faltas leves.

    Sección 2ª. De las infracciones del Encargado de protección de datos

    Artículo 69.- Infracciones leves del Encargado de protección de datos

    Se consideran infracciones leves las siguientes:

    1) No colaborar con el responsable del tratamiento datos personales, para que este cumpla con su obligación de atender solicitudes que tengan por objeto el ejercicio de los derechos del titular frente al tratamiento de sus datos personales;

    2) No facilitar el acceso al responsable del tratamiento de datos personales a toda la información referente al cumplimiento de las obligaciones establecidas en la presente Ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre le materia:

    3) No permitir o no contribuir a la realización de auditorías o inspecciones, por parte del responsable del tratamiento de datos personales o de otro auditor autorizado por la Autoridad de Protección de Datos Personales” y,

    4) Incumplir las medidas correctivas dispuestas por la Autoridad de Protección de Datos Personales

    Articulo 70.- infracciones graves del Encargado de protección de datos

    Se consideran infracciones graves las siguientes:

    1) Realizar tratamientos de datos personales sin observar los principios y derechos desarrollados en la presente Ley y su reglamento, directrices y lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia.

    2) No tratar datos personales de conformidad con lo previste en el contrato que mantenga con el responsable del tratamiento de datos personales inclusive en lo que respecta a la transferencia o comunicación internacional;

    3) No suscribir contratos que contengan cláusulas de confidencialidad y tratamiento adecuado de datos personales con el personal a cargo del tratamiento de datos personales o quien tenga conocimiento de los datos personales;

    4) No implementar mecanismos destinados a mantener la confidencialidad, integridad, disponibilidad y resiliencia de los datos personales;

    5) No implementar medidas preventivas y correctivas en la seguridad de los datos personales a fin de evitar vulneraciones;

    6) No suprimir los datos personales transferidos o comunicados al responsable del tratamiento de los datos personales, una vez haya culminado su encargo;

    7) Proceder a la comunicación de datos personales sin cumplir con los requisitos y procedimientos establecidos en la presente ley, su reglamento directrices lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    8) Incumplir las medidas correctivas o cumplirlas de forma tardía parcial o defectuosa, siempre y cuando hubiese precedido por dicha causa la aplicación de una sanción por infracción leve; y,

    9) No notificar al responsable del tratamiento de datos personajes sobre cualquier vulneración de le seguridad de datos personales conforme dispone esta ley o hacerlo con retraso injustificado.

    Artículo 71.- Sanciones por infracciones leves

    La Autoridad de Protección de Datos Personales impondrá las siguientes sanciones administrativas, en el caso de verificarse el cometimiento de una infracción leve, según las siguientes reglas:

    1. Servidores o funcionarios del sector público por cuya acción u omisión hayan incurrido en alguna de las infracciones leves establecidas en la presente ley, serán sancionados con una multa de uno (1) a diez (10) salarios básicos unificados del trabajador en general, sin perjuicio de la responsabilidad extracontractual del Estado, la cual se sujetará a las reglas establecidas en la normativa correspondiente;

    2. Si el responsable o el encargado del tratamiento de datos personales o de ser el caso un tercero es una entidad de derecho privado o una empresa pública, se aplicará una multa de entre el 0.1% y el 0.7% calculada sobre su volumen de negocio correspondiente al ejercicio económico inmediatamente anterior al de la imposición de la multa. La Autoridad de Protección de Datos Personales establecerá la multa aplicable en función del principio de proporcionalidad, para lo cual deberá verificar los siguientes presupuestos:

    a] La intencionalidad, misma que se establecerá en función a la conducta del infractor;

    b) Reiteración de la infracción, es decir cuando el responsable, el encargado del tratamiento de datos personales o de ser el caso un tercero, hubiese sido previamente sancionado por dos o más infracciones precedentes, que establezcan sanciones de menor gravedad a la que se pretende aplicar; o cuando hubiesen sido previamente sancionados por una infracción cuya sanción sea de igual o mayor gravedad a la que se pretende aplicar;

    c) La naturaleza del perjuicio ocasionado, es decir, las consecuencias lesivas para el ejercicio del derecho a la protección de datos personales, y,

    d) Reincidencia, es decir, cuando la infracción precedente sea de la misma naturaleza de aquella que se pretende sancionar.

    Artículo 72.- Sanciones por infracciones graves

    La Autoridad de Protección de Datos Personales impondrán las siguientes sanciones administrativas, en el caso de verificarse el cometimiento de una infracción grave, conforme a los presupuestos establecidos en el presente Capítulo:

    Los servidores o funcionarios del sector público por cuya acción u omisión hayan incurrido en alguna de las infracciones graves establecidas en la presente ley serán sancionados con una multa de entre 10 a 20 salarios básicos unificados del trabajador en general; sin perjuicio de la Responsabilidad Extracontractual del Estado, la cual se sujetará a las reglas establecidas en la normativa correspondiente;

    1) Si el responsable, encargado del tratamiento de datos personales o de ser el caso un tercero, es una entidad de derecho privado o una empresa pública se aplicará una multa de entre el 0,7% y el 1% calculada sobre su volumen de negocios, correspondiente al ejercicio económico inmediatamente anterior al de la imposición de la multa. La Autoridad de Protección de Datos Personales establecerá la multa aplicable en función del principio de proporcionalidad, para lo cual deberá verificar los siguientes presupuestos:

    a) La intencionalidad, misma que se establecerá en función a la conducta del infractor;

    b) Reiteración de la infracción, es decir, cuando el responsable, encargado del tratamiento de datos personales o de ser el caso, de un tercero hubiese sido previamente sancionado por dos o más infracciones precedentes que establezcan sanciones de menor gravedad a la que se pretende aplicar; o cuando hubiesen sido previamente sancionados por una infracción cuya sanción sea de igual o mayor gravedad a la que se pretende aplicar;

    c) La naturaleza del perjuicio ocasionado, es decir, las consecuencias lesivas para el ejercicio del derecho a la protección de datos personales; y,

    d) Reincidencia, es decir, cuando la infracción precedente sea de la misma naturaleza de aquella que se pretende sancionar.

    En el caso de que el responsable, encargado del tratamiento de datos personales a un tercero de ser el caso; sea una organización sin domicilio ni representación jurídica en el territorio ecuatoriano, se deberá notificar de la resolución con la cual se establezca la infracción cometida la Autoridad de Protección de Datos Personales, o quien hiciera sus veces, del lugar en donde dicha organización tiene su domicilio principal, a fin de que sea dicho organismo quien sustancia las acciones o procedimientos destinados al cumplimiento de las medidas correctivas y sanciones a las que hubiere lugar.

    Artículo 73.- Volumen de negocio

    A efectos del régimen sancionatorio de la presente ley, se entiende por volumen de negocio, a la cuantía resultante de la venta de productos y de la prestación de servicios realizados por operadores económicos, durante el último ejercicio que corresponda a sus actividades, previa deducción del Impuesto al Valor Agregado y de otros impuestos directamente relacionados con la operación económica.

    Artículo 74.- Medidas provisionales o cautelares

    La Autoridad de Protección de Datos Personales podrá aplicar medidas provisionales de protección o medidas cautelares contempladas en la norma procedimental administrativa.

    CAPÍTULO XII. AUTORIDAD DE PROTECCIÓN DE DATOS PERSONALES

    Artículo 75.- Autoridad de protección de datos personales

    La Autoridad de Protección de Datos Personales podrá iniciar, de oficio o a petición del titular, actuaciones previas con el fin de conocer las circunstancias del caso concreto o la conveniencia o no de iniciar el procedimiento, para lo cual se estará conforme a las disposiciones del Código Orgánico Administrativo.

    Artículo 76.- Funciones atribuciones y facultades

    La Autoridad de Protección de Datos Personales es el órgano de control y vigilancia encargado de garantizar a todos los ciudadanos la protección de sus datos personales, y de realizar todas las acciones necesarias para que se respeten los principios, derechos, garantías y procedimientos previstos en la presente Ley y en su reglamento de aplicación, para lo cual le corresponde las siguientes funciones, atribuciones y facultades:

    1) Ejercer la supervisión, control y evaluación de las actividades efectuadas por el responsable y encargado del tratamiento de datos personales;

    2) Ejercer la potestad sancionadora respecto de responsables, delegados, encargados y terceros, conforme a lo establecido en la presente Ley;

    3) Conocer, sustanciar y resolver los reclamos interpuestos por el titular o aquellos iniciados de oficio, así como aplicar las sanciones correspondientes:

    4) Realizar o delegar auditorias técnicas al tratamiento de datos personales;

    5) Emitir normativa general o técnica, criterios y demás actos que sean necesarios para el ejercicio de sus competencias y la garantía del ejercicio del derecho a la protección de datos personales,

    6) Crear, dirigir y administrar el Registro Nacional de Protección de Datos Personales, así como coordinar las acciones necesarias con entidades del sector público y privado para su efectivo funcionamiento;

    7) Promover una coordinación adecuada y eficaz con los encargados de la rendición de cuentas y participar en iniciativas internacionales y regionales para la protección «e le protección de los datos personales;

    8) Dictar las cláusulas estándar de protección de datos, así como verificar el contenido de las cláusulas o garantías adicionales o especificas;

    9) Atender consultas en materia de protección de datos personales

    10) Ejercer el control y emitir las resoluciones de autorización para la transferencia internacional de datos;

    11) Ejercer la representación internacional en materia de protección de datos personales;

    12) Emitir directrices para el diseño y contenido de la política de tratamiento de datos personales;

    13) Establecer directrices para el análisis evaluación y selección de medidas de seguridad de los datos personales,

    14) Llevar un registro estadístico sobre vulneraciones a la seguridad de datos personales e identificar posibles medidas de seguridad para cada una de ellas;

    15) Publicar periódicamente una guía de la normativa relativa a la protección de datos personales

    16) Promover e incentivar el derecho a la protección de datos personales, así como la concientización en las personas y le comprensión de los riesgos, normas, garantías y derechos, en relación con el tratamiento y uso de sus datos personales, con especial énfasis en actividades dirigidas a grupos de atención prioritaria tales como niñas niños y adolescentes;

    17) Controlar y supervisar el ejercicio del derecho a la protección de datos personales dentro del tratamiento de datos llevado a cabo a través del Sistema Nacional de Registros Públicos, y

    18) Las demás atribuciones establecidas en la normativa vigente.

    Artículo 77.- Del titular de la Autoridad de Protección de Datos

    El Superintendente de Protección de paros será designado de acuerdo a lo establecido en la Constitución de le República, de la terna que remita la Presidenta o Presidente de la República, siguiendo criterios de especialidad y méritos; se sujetará a escrutinio público y derecho de impugnación ciudadana.

    El Superintendente de Protección de Datos deberá ser un profesional el Derecho, de Sistemas de Información, de Comunicación o de Tecnologías con título de cuartó nivel y experiencia de al menos 10 años con áreas afines a la materia objeto de regulación de esta ley.

    Ejercerá sus funciones por un período de 5 años y únicamente cesará en sus funciones por las causales establecidas en la ley que regule el servicio público que le sean aplicables o por destitución, por la Asamblea Nacional.

     DISPOSICIONES GENERALES

    PRIMERA

    En lo dispuesto al procedimiento administrativo se estará a lo previsto en el Código Orgánico Administrativo.

    SEGUNDA

    En el ámbito del derecho de acceso a la información pública son aplicables las disposiciones de las leyes de la materia.

    TERCERA

    En el ámbito de los datos personales registrables, son aplicables las disposiciones de las leyes de la materia.

    CUARTA

    La Autoridad de Protección de Datos Personales será responsable de coordinar las acciones necesarias con entidades del sector público y privado para el efectivo funcionamiento del Registre Nacional de Protección de Datos Personales.

    QUINTA

    La Autoridad de Protección de Datos Personales será responsable de presentar informes anuales de evaluación v revisión de le presente Ley, a la ciudadanía.

    SEXTA

    Créase es Registro Único de Responsables v Encargados Incumplidos, en el cual se llevará un registro de los Responsables v Encargados del Tratamiento de Datos Personales, que hayan incurrido en una de las infracciones establecidas en la presente Ley: mismo que tendrá fines sociales, estadísticos, preventivos y de capacitación, cuyo funcionamiento estará establecido en el Reglamento de la Ley de Protección de Datos Personales.

    SÉPTIMA

    El ejercicio de los derechos reconocidos en la presente norma podrá ser exigido por el titular independiente de la entrada en vigor del régimen sancionatorio.

    OCTAVA

    Ninguna entidad pública o privada podrá cobrar valores por servicios de entrega de información sustentada en datos del solicitante de los mismos.

    NOVENA

    Se procurará que en lo referente a los pueblos y nacionalidades indígenas, el tratamiento de sus datos persónales sea en sus idiomas y lenguas ancestrales.

    DISPOSICIONES TRANSITORIAS

    PRIMERA

    Las disposiciones relacionadas con las medidas correctivas y el régimen sancionatorio entrarán en vigencia en dos años contados a partir de la publicación de esta ley en el Registro Oficial, en el transcurso de este tiempo los responsables y encargados del tratamiento. de datos personales se adecuarán a los preceptos establecidos dentro de esas disposiciones, su reglamento de aplicación y demás normativa emitida por la Autoridad de Protección de Datos Personales. El resto de disposiciones establecidas en esta ley entrarán en vigencia conforme se establece en la Disposición Final de esta Ley.

    SEGUNDA

    Todo tratamiento realizado previo a la entrada en vigencia de la presente Ley deberá adecuarse a lo previsto en la presente norma dentro del plazo de dos años contados a partir de su publicación en el Registro Oficial.

    El incumplimiento de la presente disposición dará lugar a la aplicación del régimen sancionatorio establecido en esta Ley.

    TERCERA

    Los responsables y encargados del. tratamiento de datos personales que hayan implementado los preceptos recogidos dentro de esta Ley antes de plazo señalado en la Disposición Transitoria Primera obtendrán un reconocimiento por buenas prácticas por parte de la Autoridad de Protección de Datos Personales.

    CUARTA

    La transferencia internacional de datos personales que hubiere sido realizada antes de la entrada en vigencia de la presente Ley será legítima, sin perjuicio de que el responsable del tratamiento de datos personales deba aplicar lo dispuesto en esta norma para acreditar su responsabilidad proactiva y demostrada.

    El responsable de tratamiento deberá adecuar la transferencia internacional de datos personales a la presente norma en un plazo no mayor de dos años contados a partir de la publicación de la presente norma en el Registro Oficial.

    El incumplimiento de la presente disposición dará lugar a la aplicación del régimen sancionatorio establecido en esta Ley.

    DISPOSICIONES REFORMATORIAS

    PRIMERA

    De la Ley de Comercio Electrónico, Firmas Electrónicas y Mensajes de Datos, publicada en el Suplemento del Registro Oficial 557 del 17 de abril de 2002:

    1. Suprímese las definiciones de intimidad, datos personales, datos personales autorizados del glosario de términos establecido en la Disposición General Novena.

    SEGUNDA

    En la Ley Orgánica del Sistema Nacional de Registro de Datos Públicos publicada en el suplemento del Registro Oficial 162 del 31 de marzo del 2010:

    1.- Sustitúyese:

    a) El término Dirección Nacional de Registro de Datos Públicos por Dirección Nacional de Registros Públicos;

    b) El término Sistema Nacional de Registro de Datos Públicos por Sistema Nacional de Registros Públicos;

    c) El término Registro de Datos Públicos por Registros Públicos;

    d) El término datos de carácter personal por datos personales;

    e) El término datos públicos registrales por la expresión datos públicos y datos personales registrables;

    f) El artículo 6, por el siguiente: “Art. 6.- Accesibilidad y confidencialidad.- Son confidenciales los datos de carácter personal. El acceso a estos datos, solo será posible cuando quien los requiera se encuentre debidamente legitimado, conforme a los parámetros previstos en la Ley Orgánica de Protección de Datos Personales, su respectivo reglamento y demás normativa emitida por la Autoridad de Protección de Datos Personales.

    Al amparo de esta Ley, para acceder a la información sobre el patrimonio de las personas cualquier solicitante deberá justificar y motivar su requerimiento, declarar el uso que hará del mismo y consignar sus datos básicos de identidad, tales como nombres y apellidos completos, número del documento de identidad o ciudadanía, dirección domiciliaria y los demás datos que mediante el respectivo reglamento se determinen. Un uso distinto al declarado dará lugar a la determinación de responsabilidades, sin perjuicio de las acciones legales que el titular de la información pueda ejercer.

    La Directora o Director Nacional de Registros Públicos, definirá los demás datos que integran el sistema nacional y el tipo de reserva y accesibilidad.

    2.- incorporase:

    a) En el artículo 31 referente a las atribuciones y facultades de la Dirección Nacional de Registro Públicos antes del numeral 14 lo siguiente:

    “14. Controlar y supervisar que las entidades pertenecientes el Sistema Nacional de Registros Públicos incorporen mecanismos de protección de datos personales, así como dar cumplimiento a las disposiciones establecidas en la Ley Orgánica de Protección de Datos Personales, su reglamento de aplicación y demás normativa que la Autoridad de Protección de Datos Personales dicte para el efecto:

    15. Tratar datos procedentes del Sistema Nacional de Registros Públicos o de cualquier otra fuente, para realizar procesos de analítica de datos, con el objeto de prestar servicios al sector público al sector privado y a personas en general, así como genera productos, reportes, informes o estudios, entre otros. Se utilizarán medidas adecuadas que garanticen el derecho a la protección de datos personales y su uso en todas las etapas del tratamiento, como por ejemplo, técnicas de disociación de datos, y,”

    3.- Suprimese del numeral 13 del artículo 31 lo siguiente: “y”;

    4.- Reenumerar el numeral 14 del artículo 31 por numeral “16”;

    TERCERA

    En el Código Orgánico de la Economía Social de los Conocimientos, Creatividad e Innovación publicado en el suplemento del Registro Oficial 899 del 09 de diciembre de 2016, sustitúyase la palabra confidencialidad por Protección en el numeral 5 del artículo 67.

    CUARTA

    En la Ley Orgánica de Telecomunicaciones, publicada en el tercer suplemento del Registro Oficial 439 del 18 de febrero de 2015

    1.- Suprimese:

    a) El inciso segundo, tercer y cuarto del articulo 79;

    b) En el primer inciso del artículo 83 lo siguiente “(…) y seguridad de datos personales (.)”; y

    c) En el inciso primero del artículo 85 lo siguiente “(…) como de seguridad de datos personal (…)”

    2.- Sustitúyese:

    a) El articulo 78 por el siguiente:

    “Art. 78.- Seguridad de los Datos Personales.- Las y los prestadores de servicios de telecomunicaciones deberán adoptar las medidas técnicas, organizativas y de cualquier otra índole adecuadas para preservar la seguridad de su red con el fin de garantizar la protección de los datos personales de conformidad con lo establecido en la Ley Orgánica de Protección de Datos Personales,”

    b) El articulo 81 por el siguiente:

    “Art. 81.- Guías telefónicas o de abonados en general – Los abonados, clientes o usuarios tienen el derecho a no figurar en guías telefónicas o de abonados.

    Deberán ser informados, de conformidad con lo establecido en la Ley Orgánica de Protección de Datos Personales, de sus derechos con respecto a la utilización de sus datos personales en las guías telefónicas o de abonados y, en particular, sobre el fin o los fines de dichas guías, así como sobre el derecho que tienen, en forma gratuita. a no ser incluidos, en tales guías.”

    c) El artículo 82 por el siguiente:

    Art. 82.- Uso comercial de datos personales.- Las y los prestadores de servicios no podrán usar datos personales, información del uso del servicio, información de tráfico o el patrón de consumo de sus abonados, clientes o usuarios para la promoción comercial de servicios o productos, a menos que el abonado o usuario al que se refieran los datos de tal información, haya dado su consentimiento conforme lo establecido en la Ley Orgánica de Protección de Datos Personales.

    Los usuarios o abonados dispondrás de la posibilidad clara y fácil de retirar su consentimiento para el uso de sus datos y de la información antes indicada. Tal consentimiento deberá especificar los datos personales o información cuyo uso se autorizan, el tiempo y su objetivo específico.

    Sin contar con tal consentimiento y con las mismas características, las y los prestadores de servicios de telecomunicaciones no podrán comercializar, ceder o transferir a terceros los datos personales de sus usuarios, clientes o abonados.

    Igual requisito se aplicará para la información del uso del servicio, información de tráfico o del patrón de consumo de sus usuarios, clientes y abonados.”

    d) El articulo 83 por el siguiente:

    “Art. 83 – Control técnico.- Cuando para la realización de las tareas de control técnico, ya sea para verificar el adecuado uso del espectro radioeléctrico, la correcta prestación de los servicios de telecomunicaciones, el apropiado uso y operación de redes de telecomunicaciones o para comprobar las medidas implementadas para garantizar el secreto de las comunicaciones y seguridad de datos personales, sea necesaria la utilización de equipos, infraestructuras e instalaciones que puedan vulnerar la seguridad e integridad de las redes. La Agencia de Regulación y Control de las Telecomunicaciones deberá diseñar y establecer procedimientos que reduzcan al mínimo el riesgo de afectar los contenidos de les comunicaciones.

    Cuando, como consecuencia de los controles técnicos efectuados, quede constancia de los contenidos, se deberá coordinar con la Autoridad de Protección de Datos Personales para que:

    a) Los soportes en los que éstos aparezcan no sean ni almacenados ni divulgados; y,

    b) Los soportes sean inmediatamente destruidos y desechados

    Si se evidencia un tratamiento ilegítimo o ilícito de datos personales, se aplicará lo dispuesto en la Ley Orgánica de Protección de Datos Personales.

    DISPOSICIONES DEROGATORIAS

    PRIMERA

    Derogase el artículo 2 de la Lev de Comercio Electrónico, Firmas Electrónicas y Mensajes de Datos, publicada en el suplemento del Registro Oficial 557 del 17 de abril de 2002.

    SEGUNDA

    Derogase los artículos 80 y 84 de la Ley Orgánica de Telecomunicaciones, publicada en el tercer suplemento del Registro Oficial 439 del 18 de febrero de 2015

    TERCERA

    Derogase el articulo 3 de la Ley Orgánica del Sistema Nacional de Registro de Datos Públicos publicada en el suplemento del Registro Oficial 162 de 31 de marzo de 2010.

    CUARTA

    Quedan así mismo derogadas todas aquellas disposiciones de igual o menor jerarquía que se contrapongan con la presente Ley Orgánica.

    DISPOSICIÓN FINAL

    La presente Lev entrará en vigencia una vez publicada en el Registro Oficial.

    Dado y suscrito, a los diez días del mes de mayo del año dos mil veintiuno

    ING. CÉSAR LITARDO CAICEDO. Presidente

    DR. JAVIER RUBIO DUQUE, Secretario General

    PALACIO NACIONAL, DISTRITO METROPOLITANO DE QUITO, A VEINTIUNO DE MAYO DE DOS MIL VEINTIUNO

    SANCIONESE Y PROMULGASE

    LENÍN MORENO GARCÉS, Presidente Constitucional de la República

    Es fiel copia del original.- Lo Certifico, Quito, 21 de mayo de 2021.

    DRA. JOHANA PESÁNTEZ BENÍTEZ, Secretario General Jurídica Presidencia de la República

    11Ago/21

    Resolución Ministerial nº 0326-2020-JUS, de 23 de diciembre de 2020

    Resolución Ministerial nº 0326-2020-JUS, de 23 de diciembre de 2020, que aprueba Metodología para el Cálculo de las Multas en materia de Protección de Datos Personales.

    Lima, 23 de diciembre de 2020

    VISTOS, el Informe n° 15-2020-JUS/DGTAIPD, de la Dirección General de Transparencia, Acceso a la Información Pública y Protección de Datos Personales; el Informe Legal n° 119-2020-JUS/DGDNCR, de la Dirección General de Desarrollo Normativo y Calidad Regulatoria; el Informe n° 412-2020-JUS/OGPM-OPRE, de la Oficina General de Planeamiento, Presupuesto y Modernización; y, el Informe n° 993-2020-JUS/OGAJ, de la Oficina General de Asesoría Jurídica, y

    CONSIDERANDO:

    Que, el numeral 6 del artículo 2 de la Constitución Política del Perú dispone que toda persona tiene derecho a que los servicios informáticos, computarizados o no, públicos o privados, no suministren informaciones que afecten la intimidad personal y familiar;

    Que, la Ley n° 29733, Ley de Protección de Datos Personales, tiene por objeto garantizar el derecho fundamental a la protección de datos personales, previsto en el numeral 6 del artículo 2 de la Constitución Política del Perú, estableciendo en su artículo 32 que la Autoridad Nacional de Protección de Datos Personales es el órgano competente para realizar todas las acciones necesarias para garantizar el cumplimiento de la Ley y su Reglamento, aprobado por Decreto Supremo nº 003-2013-JUS, para lo cual goza de potestad sancionadora, de conformidad con la Ley 27444, Ley del Procedimiento Administrativo General, o la que haga sus veces;

    Que, de acuerdo al artículo 38 de la citada Ley, las infracciones se clasifican en leves, graves y muy graves, las cuales son tipificadas vía reglamentaria; siendo que, conforme al artículo 39, la Autoridad Nacional de Protección de Datos Personales determina la infracción cometida y el monto de la multa imponible mediante resolución debidamente motivada, tomando en cuenta el criterio de razonabilidad establecido en el numeral 3 artículo 248 del Texto Único Ordenado de la Ley n° 27444, Ley del Procedimiento Administrativo General, y lo señalado en los artículos 125 y 126 del Reglamento de la Ley n° 29733, Ley de Protección de Datos Personales, aprobado por Decreto Supremo n° 003-2013-JUS;

    Que, conforme al literal d) del artículo 6 de la Ley n° 29809, Ley de Organización y Funciones del Ministerio de Justicia y Derechos Humanos, el Ministerio es competente para emitir normas y lineamientos técnicos para la adecuada ejecución y supervisión de las políticas nacionales, la gestión de los recursos del sector, así como para el otorgamiento y reconocimiento de derechos, la sanción, fiscalización y ejecución coactiva en las materias de su competencia;

    Que, de acuerdo al literal h) del artículo 7 de la mencionada Ley, el Ministerio de Justicia y Derechos Humanos, en el marco de sus competencias específicas, ejerce la Autoridad Nacional de Protección de Datos Personales a que se refiere la Ley n° 29733;

    Que, de acuerdo con el artículo 70 y el literal b) del artículo 71 del Reglamento de Organización y Funciones del Ministerio de Justicia y Recursos Humanos, aprobado por Decreto Supremo n° 013-2017-JUS, la Dirección General de Transparencia, Acceso a la Información Pública y Protección de Datos Personales, ejerce la Autoridad Nacional de Protección de Datos Personales, teniendo entre sus funciones, proponer políticas y proyectos normativos en materia de su competencia;

    Que, asimismo, de conformidad con los literales a) y d) del artículo 74 del citado Reglamento de Organización y Funciones, es función de la Dirección de Protección de Datos Personales, resolver los procedimientos administrativos sancionadores e imponer multas coercitivas;

    Que, se considera necesario contar con una metodología para el cálculo de multas en materia de protección de datos personales, a fin de brindar a los administrados pautas y criterios uniformes, predecibles y objetivos sobre cómo se calculan las multas por la comisión de infracciones a la normativa de protección de datos personales y así garantizar el principio de predictibilidad o de confianza legítima, coadyuvando a que la labor sancionadora de la Autoridad Nacional de Protección de Datos Personales se realice con arreglo al principio de razonabilidad que rige el procedimiento sancionador; así como, desincentivar la comisión de infracciones, permitiendo prever la cuantía de las multas a aplicar por violación de la normativa de protección de datos personales;

    Que, con Resolución Ministerial n° 0412-2019-JUS, se dispuso la publicación del proyecto de Metodología para el Cálculo de Multas en materia de Protección de Datos Personales, el proyecto de Resolución que la aprueba, y la Exposición de Motivos, en el Portal Institucional del Ministerio de Justicia y Derechos Humanos – MINJUSDH;

    Que, mediante Informe n° 15-2020-JUS/DGTAIPD, la Dirección General de Transparencia, Acceso a la Información Pública y Protección de Datos Personales, presenta el proyecto definitivo de Metodología para el Cálculo de las Multas en materia de Protección de Datos Personales, luego de haber procesado y sistematizado los comentarios, observaciones y sugerencias recibidos, conforme lo dispuesto en la Resolución Ministerial n° 0412-2019-JUS;

    Que, con Informe Legal n° 119-2020-JUS/DGDNCR, la Dirección General de Desarrollo Normativo y Calidad Regulatoria, considera que el proyecto definitivo de Metodología para el Cálculo de Multas en materia de Protección de Datos Personales resulta viable;

    Que, con Informe n° 993-2020-JUS/OGAJ, la Oficina General de Asesoría Jurídica, opina que es legalmente viable la emisión de la Resolución Ministerial que apruebe la Metodología para el Cálculo de Multas en materia de Protección de Datos Personales;

    Con el visado del Despacho Viceministerial de Justicia; de la Dirección General de Transparencia, Acceso a la Información Pública y Protección de Datos Personales; de la Oficina General de Planeamiento, Presupuesto y Modernización; y, de la Oficina General de Asesoría Jurídica;

    De conformidad con la Ley n° 29733, Ley de Protección de Datos Personales; la Ley n° 29158, Ley Orgánica del Poder Ejecutivo; la Ley n° 29809, Ley de Organización y Funciones del Ministerio de Justicia y Derechos Humanos; el Decreto Supremo n° 001-2009-JUS, que aprueba el Reglamento que establece disposiciones relativas a la publicidad, publicación de Proyectos Normativos y difusión de Normas Legales de Carácter General; y, el Reglamento de Organización y Funciones del Ministerio de Justicia y Derechos Humanos, aprobado por Decreto Supremo n° 013-2017-JUS;

    SE RESUELVE:

    Artículo 1.- Aprobación de la Metodología para el Cálculo de las Multas en materia de Protección de Datos Personales

    Aprobar la Metodología para el Cálculo de las Multas en materia de Protección de Datos Personales, que en Anexo forma parte integrante de la presente Resolución.

    Artículo 2.- Ámbito de aplicación

    La Metodología para el Cálculo de las Multas en materia de Protección de Datos Personales se aplica a cualquier persona natural, jurídica o entidad pública que realice tratamiento de datos personales independientemente del soporte en el que se encuentre.

    Artículo 3.- Vigencia de la Metodología

    Disponer que la Metodología que se aprueba mediante la presente Resolución entra en vigencia a los treinta (30) días calendario contados a partir del día siguiente de su publicación, fecha en la cual será de aplicación a todos los procedimientos sancionadores de la Autoridad Nacional de Protección de Datos Personales, incluyendo aquellos que se encuentren en trámite.

    Artículo 4.- Publicidad

    Disponer la publicación de la presente Resolución y su Anexo, en el Portal Institucional del Ministerio de Justicia y Derechos Humanos – MINJUSDH ( https://www.gob.pe/minjus), en la misma fecha de su publicación en el Diario Oficial El Peruano.

    Regístrese, comuníquese y publíquese.

    EDUARDO VEGA LUNA, Ministro de Justicia y Derechos Humanos

    09Ago/21

    Ley nº 31284 de 15 de julio de 2021

    Ley nº 31284 de 15 de julio de 2021, que modifica el Decreto Legislativo 1182, Decreto Legislativo que regula el uso de los Datos derivados de las Telecomunicaciones para la identificación, localización y geolocalización de equipos de comunicación, en la lucha contra la delincuencia y el crimen organizado.

    LA PRESIDENTA A. I. DEL CONGRESO DE LA REPÚBLICA

    POR CUANTO:

    EL CONGRESO DE LA REPÚBLICA;

    Ha dado la Ley siguiente:

    LEY QUE MODIFICA EL DECRETO LEGISLATIVO 1182, DECRETO LEGISLATIVO QUE REGULA EL USO DE LOS DATOS DERIVADOS DE LAS TELECOMUNICACIONES PARA LA IDENTIFICACIÓN, LOCALIZACIÓN Y GEOLOCALIZACIÓN DE EQUIPOS DE COMUNICACIÓN, EN LA LUCHA CONTRA LA DELINCUENCIA Y EL CRIMEN ORGANIZADO

    Artículo único. Modificación de los artículos 2, 3 y 4 del Decreto Legislativo 1182, Decreto Legislativo que regula el uso de los datos derivados de las telecomunicaciones para la identificación, localización y geolocalización de equipos de comunicación, en la lucha contra la delincuencia y el crimen organizado

    Modifícanse los artículos 2, 3 inciso a. y 4 numeral 4.3 del Decreto Legislativo 1182, Decreto Legislativo que regula el uso de los datos derivados de las telecomunicaciones para la identificación, localización y geolocalización de equipos de comunicación, en la lucha contra la delincuencia y el crimen organizado, conforme a los textos siguientes:

    “Artículo 2.- Finalidad

    La finalidad del presente decreto legislativo es regular el acceso de la unidad especializada de la Policía Nacional del Perú, en casos de flagrancia delictiva o en investigaciones preliminares por el delito contra la vida, el cuerpo y la salud, el delito contra la libertad, el delito contra el patrimonio, delitos contra la administración pública, delitos de lavado de activos, delitos de trata de personas, delitos de tráfico ilícito de drogas, delitos de minería ilegal y los delitos comprendidos en la Ley 30077, Ley contra el Crimen Organizado, a la localización, geolocalización o rastreo de los teléfonos móviles y/o de cualquier otro dispositivo electrónico de comunicación.

    Artículo 3.- Procedencia

    La unidad a cargo de la investigación policial solicita a la unidad especializada el acceso inmediato a los datos de localización, geolocalización o rastreo de los teléfonos móviles o de cualquier otro dispositivo electrónico de comunicación, siempre que concurran los siguientes presupuestos:

    a. Cuando se trate de flagrante delito, de conformidad con lo dispuesto en el artículo 259 del Decreto Legislativo n° 957, Código Procesal Penal, o investigaciones preliminares por el delito contra la vida, el cuerpo y la salud; el delito contra la libertad, el delito contra el patrimonio, delitos contra la administración pública, delitos de lavado de activos, delitos de trata de personas, delitos de tráfico ilícito de drogas, delitos de minería ilegal y los delitos comprendidos en la Ley 30077, Ley contra el Crimen Organizado.

    […]

    Artículo 4.- Procedimiento

    […]

    4.3. Los concesionarios de servicios públicos de telecomunicaciones o las entidades públicas y privadas relacionadas con estos servicios, están obligados a brindar los datos de localización, geolocalización o rastreo de manera inmediata y oportuna, dentro de un plazo máximo de veinticuatro (24) horas de solicitada la información por la unidad especializada de la Policía Nacional del Perú, cuya atención del requerimiento será las veinticuatro (24) horas del día de los trescientos sesenta y cinco (365) días del año, bajo apercibimiento de ser pasible de las responsabilidades de carácter administrativo, civil y penal, en caso de incumplimiento.

    […]”.

    DISPOSICIÓN COMPLEMENTARIA FINAL

    ÚNICA. Precisión

    Para efectos de la presente ley, entiéndase que toda mención a los datos de localización, geolocalización o rastreo de los teléfonos móviles o de cualquier otro dispositivo electrónico de comunicación, tiene como finalidad la eficacia en la ubicación del equipo o lugar donde se cometen o generen los delitos contra la vida, el cuerpo y la salud; el delito contra la libertad, el delito contra el patrimonio, delitos contra la administración pública, delitos de lavado de activos, delitos de trata de personas, delitos de tráfico ilícito de drogas, delitos de minería ilegal y los delitos comprendidos en la Ley 30077, Ley contra el Crimen Organizado.

    POR TANTO:

    Habiendo sido reconsiderada la Ley por el Congreso de la República, insistiendo en el texto aprobado en sesión del Pleno realizada el día catorce de mayo de dos mil veintiuno, de conformidad con lo dispuesto por el artículo 108 de la Constitución Política del Perú, ordeno que se publique y cumpla.

    En Lima, a los quince días del mes de julio de dos mil veintiuno.

    MIRTHA ESTHER VÁSQUEZ CHUQUILIN, Presidenta a. i. del Congreso de la República

    LUIS ANDRÉS ROEL ALVA, Segundo Vicepresidente del Congreso de la República

    13Jul/21

    COM(2020)0568. Resolución legislativa del Parlamento Europeo, de 6 de julio de 2021

    COM(2020)0568. Resolución legislativa del Parlamento Europeo, de 6 de julio de 2021, sobre la propuesta de Reglamento del Parlamento Europeo y del Consejo por el que se establece una excepción temporal a determinadas disposiciones de la Directiva 2002/58/CE del Parlamento Europeo y del Consejo en lo que respecta al uso de tecnologías por proveedores de servicios de comunicaciones interpersonales independientes de la numeración para el tratamiento de datos personales y de otro tipo con fines de lucha contra el abuso sexual de menores en línea. 

    El Parlamento Europeo,

    Vista la propuesta de la Comisión al Parlamento Europeo y al Consejo (COM(2020)0568),

    Vistos el artículo 294, apartado 2, y los artículos 16, apartado 2, y 114 del Tratado de Funcionamiento de la Unión Europea, conforme a los cuales la Comisión le ha presentado su propuesta (C9-0288/2020),

    Visto el artículo 294, apartado 3, del Tratado de Funcionamiento de la Unión Europea,

    Visto el dictamen del Comité Económico y Social Europeo de 29 de octubre de 2020 (1),

    Vistos el acuerdo provisional aprobado por la comisión competente con arreglo al artículo 74, apartado 4, de su Reglamento interno y el compromiso asumido por el representante del Consejo, mediante carta de 21 de mayo de 2021, de aprobar la Posición del Parlamento Europeo, de conformidad con el artículo 294, apartado 4, del Tratado de Funcionamiento de la Unión Europea,

    Visto el artículo 59 de su Reglamento interno,

    Vista la opinión de la Comisión de Derechos de las Mujeres e Igualdad de Género,

    Visto el informe de la Comisión de Libertades Civiles, Justicia y Asuntos de Interior (A9-0258/2020),

    1.  Aprueba la Posición en primera lectura que figura a continuación;

    2.  Pide a la Comisión que le consulte de nuevo si sustituye su propuesta, la modifica sustancialmente o se propone modificarla sustancialmente;

    3.  Encarga a su presidente que transmita la Posición del Parlamento al Consejo y a la Comisión, así como a los Parlamentos nacionales.

     Posición del Parlamento Europeo aprobada en primera lectura el 6 de julio de 2021 con vistas a la adopción del Reglamento (UE) 2021/… del Parlamento Europeo y del Consejo por el que se establece una excepción temporal a determinadas disposiciones de la Directiva 2002/58/CE en lo que respecta al uso de tecnologías por proveedores de servicios de comunicaciones interpersonales independientes de la numeración para el tratamiento de datos personales y de otro tipo con fines de lucha contra los abusos sexuales de menores en línea

    EL PARLAMENTO EUROPEO Y EL CONSEJO DE LA UNIÓN EUROPEA,

    Visto el Tratado de Funcionamiento de la Unión Europea, y en particular su artículo 16, apartado 2, en relación con su artículo 114, apartado 1,

    Vista la propuesta de la Comisión Europea,

    Previa transmisión del proyecto de acto legislativo a los Parlamentos nacionales,

    Visto el dictamen del Comité Económico y Social Europeo (1),

    De conformidad con el procedimiento legislativo ordinario (2),

    Considerando lo siguiente:

    (1)  La Directiva 2002/58/CE del Parlamento Europeo y del Consejo (3) establece normas que garantizan el derecho a la intimidad y la confidencialidad en lo que respecta al tratamiento de datos personales en los intercambios de datos en el sector de las comunicaciones electrónicas. Dicha Directiva desarrolla y completa el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo (4).

    (2)  La Directiva 2002/58/CE se aplica al tratamiento de datos personales en relación con la prestación de servicios de comunicaciones electrónicas puestos a disposición del público. Hasta el 21 de diciembre de 2020 era aplicable la definición de «servicio de comunicaciones electrónicas» establecida en el artículo 2, letra c), de la Directiva 2002/21/CE del Parlamento Europeo y del Consejo (5). En esa fecha, la Directiva (UE) 2018/1972 del Parlamento Europeo y del Consejo(6) derogó la Directiva 2002/21/CE.

    La definición de «servicios de comunicaciones electrónicas» del artículo 2, punto 4, de la Directiva (UE) 2018/1972 incluye los servicios de comunicaciones interpersonales independientes de la numeración, tal como se definen en el artículo 2, punto 7, de dicha Directiva. Los servicios de comunicaciones interpersonales independientes de la numeración, que incluyen, por ejemplo, los servicios de voz por protocolo de Internet, la mensajería y los servicios de correo electrónico basados en la web, se incluyeron, por lo tanto, en el ámbito de aplicación de la Directiva 2002/58/CE el 21 de diciembre de 2020.

    (3)  De conformidad con el artículo 6, apartado 1, del Tratado de la Unión Europea, la Unión reconoce los derechos, libertades y principios enunciados en la Carta de los Derechos Fundamentales de la Unión Europea (en lo sucesivo, «Carta»). El artículo 7 de la Carta protege el derecho fundamental de toda persona al respeto de su vida privada y familiar, de su domicilio y de sus comunicaciones, derecho que incluye la confidencialidad de las comunicaciones. El artículo 8 de la Carta consagra el derecho a la protección de los datos de carácter personal.

    (4)  El artículo 3, apartado 1, de la Convención de las Naciones Unidas sobre los Derechos del Niño de 1989 y el artículo 24, apartado 2, de la Carta establecen que, en todos los actos relativos a los niños llevados a cabo por autoridades públicas o instituciones privadas, el interés superior del niño constituirá una consideración primordial. El artículo 3, apartado 2, de la Convención de las Naciones Unidas sobre los Derechos del Niño de 1989 y el artículo 24, apartado 1, de la Carta contemplan, además, el derecho de los niños a tales protección y cuidados necesarios para su bienestar.

    (5)  La protección de los menores, tanto fuera de línea como en línea, es una de las prioridades de la Unión. El abuso sexual y la explotación sexual de los menores constituyen graves violaciones de los derechos humanos y fundamentales, en particular de los derechos de los menores a ser protegidos contra cualquier forma de violencia, abuso y abandono, maltrato o explotación, incluido el abuso sexual, tal como establecen la Convención de las Naciones Unidas sobre los Derechos del Niño de 1989 y la Carta. La digitalización ha traído consigo muchas ventajas para la sociedad y la economía, pero también ha traído consigo desafíos, como el aumento del abuso sexual de menores en línea. El 24 de julio de 2020, la Comisión adoptó una Comunicación titulada «Estrategia de la UE para una lucha más eficaz contra el abuso sexual de menores» (en lo sucesivo, «Estrategia»). La Estrategia tiene por objeto ofrecer una respuesta eficaz, a escala de la Unión, al delito de abuso sexual de menores.

    (6)  En consonancia con la Directiva 2011/93/UE del Parlamento Europeo y del Consejo (7), el presente Reglamento no regula las políticas de los Estados miembros con respecto a los actos sexuales consentidos en los que puedan participar menores y que pueden considerarse como el descubrimiento normal de la sexualidad en el proceso de desarrollo personal, habida cuenta de las diferentes tradiciones culturales y jurídicas y de las nuevas formas de entablar y mantener relaciones de los menores y adolescentes, incluso mediante tecnologías de la información y de las comunicaciones.

    (7)  Algunos proveedores de determinados servicios de comunicaciones interpersonales independientes de la numeración (en lo sucesivo, «proveedores»), como el correo web y los servicios de mensajería, ya utilizan de forma voluntaria tecnologías específicas con el fin de detectar el abuso sexual de menores en línea cometido en sus servicios y denunciarlo a las autoridades policiales y a las organizaciones que actúan en interés público contra los abusos sexuales de menores, escaneando el contenido, incluidas imágenes y texto, o los datos de tráfico de las comunicaciones, mediante el uso, en algunos casos, de datos históricos. La tecnología utilizada para dichas actividades podría consistir en tecnología de funciones de resumen («hashing») para imágenes y vídeos, y en clasificadores e inteligencia artificial para el análisis de textos o datos de tráfico. Cuando se usa una tecnología de funciones de resumen, el material de abuso sexual de menores en línea se detecta cuando se obtiene una respuesta positiva, es decir, una coincidencia que resulta de comparar una imagen o un vídeo y una firma digital única y no reconvertible («hash») de una base de datos gestionada por una organización que actúa en interés público contra los abusos sexuales de menores y que contiene material verificado de abuso sexual de menores en línea. Dichos proveedores se remiten a líneas directas nacionales que permiten denunciar la existencia de material de abuso sexual de menores en línea y a organizaciones, establecidas ambas tanto dentro de la Unión como en terceros países, cuyo objetivo es identificar a los menores y reducir la explotación sexual y el abuso sexual de menores y prevenir la victimización de menores. Estas organizaciones podrían no estar comprendidas en el ámbito de aplicación del Reglamento (UE) 2016/679. En conjunto, este tipo de actividades voluntarias tienen un gran valor, al permitir la identificación y el rescate de las víctimas, cuyos derechos fundamentales a la dignidad humana y a la integridad física y mental han sido gravemente vulnerados. Asimismo tales actividades voluntarias tienen su importancia para reducir la difusión de material relacionado con el abuso sexual de menores, y contribuir a la identificación e investigación de los delincuentes y a la prevención, detección, investigación y enjuiciamiento de los delitos de abuso sexual de menores.

    (8)  A pesar de que su objetivo sea legítimo, las actividades voluntarias de los proveedores para detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos representan una injerencia en los derechos fundamentales al respeto de la vida privada y familiar y a la protección de los datos personales de todos los usuarios de servicios de comunicaciones interpersonales independientes de la numeración (en lo sucesivo, «usuarios»). Ninguna limitación del ejercicio del derecho fundamental al respeto a la vida privada y familiar, incluida la confidencialidad de las comunicaciones, puede encontrar justificación en el mero hecho de que los proveedores empleasen determinadas tecnologías en un momento en el que los servicios de comunicaciones interpersonales independientes de la numeración no estaban comprendidos en la definición de «servicios de comunicaciones electrónicas». Dichas limitaciones son posibles únicamente en determinadas circunstancias. En virtud del artículo 52, apartado 1, de la Carta, dichas limitaciones deben estar establecidas por la ley y respetar el contenido esencial de los derechos a la protección de la vida privada y familiar y a la protección de los datos personales y, dentro del respeto del principio de proporcionalidad, ser necesarias y responder efectivamente a objetivos de interés general reconocidos por la Unión o a la necesidad de protección de los derechos y libertades de los demás. Cuando tales limitaciones impliquen con carácter permanente el seguimiento y análisis general e indiscriminado del contenido de las comunicaciones de todos los usuarios, constituyen una injerencia en el derecho a la confidencialidad de las comunicaciones.

    (9)  Hasta el 20 de diciembre de 2020, el tratamiento de datos personales por parte de los proveedores mediante medidas voluntarias destinadas a detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y a retirar el material de abuso sexual de menores en línea de sus servicios se regía únicamente por el Reglamento (UE) 2016/679. La Directiva (UE) 2018/1972, cuyo plazo de transposición expiró el 20 de diciembre de 2020, incluyó a los proveedores en el ámbito de aplicación de la Directiva 2002/58/CE. Con el fin de seguir utilizando dichas medidas voluntarias después del 20 de diciembre de 2020, los proveedores deben cumplir los requisitos establecidos en el presente Reglamento. El Reglamento (UE) 2016/679 seguirá aplicándose al tratamiento de datos personales efectuado mediante tales medidas voluntarias.

    (10)  La Directiva 2002/58/CE no contiene ninguna disposición específica relativa al tratamiento de datos personales por los proveedores en relación con la prestación de servicios de comunicación electrónica con el fin de detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y de retirar el material de abuso sexual de menores en línea de sus servicios. No obstante, de conformidad con el artículo 15, apartado 1, de dicha Directiva, los Estados miembros pueden adoptar medidas legislativas para restringir el alcance de los derechos y obligaciones establecidos, entre otros, en los artículos 5 y 6 de dicha Directiva, que se refieren a la confidencialidad de las comunicaciones y los datos de tráfico, con fines de prevención, detección, investigación y enjuiciamiento de delitos relacionados con el abuso sexual de menores. A falta de tales medidas legislativas nacionales, y a la espera de la adopción de un marco jurídico a más largo plazo para luchar contra el abuso sexual de menores a escala de la Unión, los proveedores ya no pueden acogerse al artículo 6 del Reglamento (UE) 2016/679 para seguir empleando medidas voluntarias para detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y retirar el material de abuso sexual de menores en línea de sus servicios después del 21 de diciembre de 2020. El presente Reglamento no proporciona una base jurídica para el tratamiento de datos personales por parte de los proveedores con el único fin de detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y de retirar de sus servicios el material de abuso sexual de menores en línea, pero establece una excepción a determinadas disposiciones de la Directiva 2002/58/CE. El presente Reglamento establece nuevas salvaguardias que deben ser respetadas por los proveedores si desean acogerse a él.

    (11)  El tratamiento de datos a efectos del presente Reglamento podría implicar el tratamiento de categorías especiales de datos personales establecidos en el Reglamento (UE) 2016/679. El tratamiento de imágenes y vídeos mediante medios técnicos específicos que permiten la identificación o autenticación unívocas de una persona física se considera tratamiento de categorías especiales de datos personales.

    (12)  El presente Reglamento establece una excepción temporal al artículo 5, apartado 1, y al artículo 6, apartado 1, de la Directiva 2002/58/CE, que protegen la confidencialidad de las comunicaciones y los datos de tráfico. La utilización voluntaria por parte de los proveedores de tecnologías para el tratamiento de datos personales y de otro tipo en la medida necesaria para detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y para retirar material de abuso sexual de menores en línea de sus servicios está comprendida en el ámbito de aplicación de la excepción establecida por el presente Reglamento, siempre que tal utilización cumpla las condiciones establecidas en el presente Reglamento y, por tanto, esté sujeta a las salvaguardias y condiciones establecidas en el Reglamento (UE) 2016/679.

    (13)  La Directiva 2002/58/CE se adoptó sobre la base del artículo 114 del Tratado de Funcionamiento de la Unión Europea (TFUE). Además, no todos los Estados miembros han adoptado medidas legislativas de conformidad con la Directiva 2002/58/CE para restringir el alcance de los derechos y obligaciones relacionados con la confidencialidad de las comunicaciones y los datos de tráfico como se dispone en dicha Directiva, y la adopción de tales medidas entraña un riesgo significativo de fragmentación que puede afectar negativamente al mercado interior. Por ello, el presente Reglamento debe basarse en el artículo 114 TFUE.

    (14)  Dado que los datos relativos a comunicaciones electrónicas que impliquen a personas físicas se consideran generalmente datos personales, el presente Reglamento también debe basarse en el artículo 16 del TFUE, que proporciona una base jurídica específica para la adopción de normas sobre la protección de las personas físicas en lo que respecta al tratamiento de datos personales por las instituciones, órganos y organismos de la Unión, así como por los Estados miembros en el ejercicio de las actividades comprendidas en el ámbito de aplicación del Derecho de la Unión, y sobre la libre circulación de esos datos.

    (15)  El Reglamento (UE) 2016/679 se aplica al tratamiento de datos personales en relación con la prestación de servicios de comunicaciones electrónicas por los proveedores con el único fin de detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y de retirar el material de abuso sexual de menores en línea de sus servicios en la medida en que dicho tratamiento esté comprendido en el ámbito de aplicación de la excepción establecida en el presente Reglamento.

    (16)  Los tipos de tecnologías utilizadas a efectos del presente Reglamento deben ser los menos intrusivos para la intimidad a la vista del estado de la técnica en el sector. Dichas tecnologías no deben emplearse para filtrar y escanear sistemáticamente el texto de las comunicaciones, salvo con el fin de detectar pautas que apunten a posibles razones concretas para sospechar de abuso sexual de menores en línea, y no deben poder deducir la sustancia del contenido de las comunicaciones. En el caso de la tecnología utilizada para identificar el embaucamiento de menores, tales razones concretas de sospecha deben basarse en factores de riesgo identificados objetivamente, como la diferencia de edad y la probable participación de un menor en la comunicación escaneada.

    (17)  Deben establecerse procedimientos y mecanismos de recurso adecuados para garantizar que los particulares puedan presentar reclamaciones ante los proveedores. Dichos procedimientos y mecanismos son especialmente pertinentes cuando se hayan retirado contenidos que no constituyan abusos sexuales de menores en línea, o cuando se hayan denunciado tales contenidos a las autoridades policiales o a una organización que actúe en interés público contra los abusos sexuales de menores.

    (18)  Con el fin de garantizar en la medida de lo posible la exactitud y fiabilidad, la tecnología utilizada a efectos del presente Reglamento, a la vista del estado de la técnica en el sector, debe limitar al máximo el número y las tasas de errores (falsos positivos) y debe, en caso necesario, corregir sin demora los errores que, no obstante, podrían producirse.

    (19)  Los datos de contenido y los datos de tráfico tratados y los datos personales generados en la realización de las actividades cubiertas por el presente Reglamento, y el período durante el cual se almacenan los datos en caso de detectarse un presunto abuso sexual de menores en línea, deben seguir limitados a lo estrictamente necesario para realizar dichas actividades. Los datos deben suprimirse inmediatamente y de manera permanente cuando ya no sean estrictamente necesarios para alguno de los fines enunciados en el presente Reglamento, también en el caso de que no se detecte ningún presunto abuso sexual de menores en línea, y, en cualquier caso, a más tardar doce meses a partir de la fecha de detección del presunto abuso sexual de menores en línea. Esto debe entenderse sin perjuicio de la posibilidad de almacenar los datos de contenido y datos de tráfico pertinentes de conformidad con la Directiva 2002/58/CE. El presente Reglamento no afecta a la aplicación de las obligaciones legales de conservación de datos impuestas por el Derecho de la Unión o de los Estados miembros impuestas a los proveedores.

    (20)  El presente Reglamento no impide a los proveedores que hayan denunciado abusos sexuales de menores en línea a las autoridades policiales solicitar un acuse de recibo de la denuncia a dichas autoridades.

    (21)  A fin de garantizar la transparencia y la rendición de cuentas con respecto a las actividades realizadas en virtud de la excepción prevista en el presente Reglamento, los proveedores deben, a más tardar el … [seis meses después de la fecha de entrada en vigor del presente Reglamento] y, posteriormente, a más tardar, el 31 de enero de cada año, publicar y presentar informes a la autoridad de control competente designada con arreglo al Reglamento (UE) 2016/679 (en lo sucesivo, «autoridad de control») y a la Comisión sobre el tratamiento comprendido en el ámbito de aplicación del presente Reglamento, incluidos el tipo y el volumen de datos tratados, los motivos específicos invocados para el tratamiento de datos personales de conformidad con el Reglamento (UE) 2016/679, los motivos invocados para las transferencias de datos personales fuera de la Unión de conformidad con el capítulo V del Reglamento (UE) 2016/679, en su caso, el número de casos detectados de abusos sexuales de menores en línea, diferenciando entre material de abuso sexual de menores en línea y embaucamiento de menores, el número de casos en los que un usuario haya presentado una reclamación ante el mecanismo de recurso interno o interpuesto una acción judicial y el resultado de dichas reclamaciones y causas judiciales, el número y las tasas de errores (falsos positivos) de las diferentes tecnologías utilizadas, las medidas aplicadas para limitar la tasa de error y la tasa de error alcanzada, la política de conservación de los datos y las salvaguardias de protección de datos aplicadas conforme al Reglamento (UE) 2016/679, y el nombre de las organizaciones que actúan en interés público contra los abusos sexuales de menores con las que se hayan compartido datos en virtud del presente Reglamento.

    (22)  A fin de apoyar en su labor a las autoridades de control, la Comisión debe solicitar al Comité Europeo de Protección de Datos que emita directrices sobre el cumplimiento del Reglamento (UE) 2016/679 en lo que respecta al tratamiento comprendido en el ámbito de aplicación de la excepción establecida en el presente Reglamento. Cuando las autoridades de control evalúen si una tecnología consolidada o nueva que se vaya a utilizar corresponde al estado de la técnica en el sector, es la menos intrusiva para la intimidad y opera sobre una base jurídica adecuada con arreglo al Reglamento (UE) 2016/679, dichas directrices deben, en particular, ayudar a las autoridades de control a prestar asesoramiento en el marco del procedimiento de consulta previa establecido en el Reglamento (UE) 2016/679.

    (23)  El presente Reglamento restringe el derecho a la protección de la confidencialidad de las comunicaciones y establece una excepción a la decisión adoptada en el marco de la Directiva (UE) 2018/1972 de someter los servicios de comunicaciones interpersonales independientes de la numeración a las mismas normas que se aplican a todos los demás servicios de comunicaciones electrónicas en lo que respecta a la privacidad, con el único fin de detectar abusos sexuales de menores en línea cometidos en dichos servicios y denunciarlos a las autoridades policiales o a organizaciones que actúen en interés público contra los abusos sexuales de menores y de retirar el material de abuso sexual de menores en línea de dichos servicios. Por consiguiente, el período de aplicación del presente Reglamento debe limitarse a tres años a partir de su fecha de aplicación, de modo que se deje el tiempo necesario para adoptar un nuevo marco jurídico a largo plazo. En caso de que el marco jurídico a largo plazo se adopte y entre en vigor antes de esa fecha, dicho marco jurídico a largo plazo debe derogar el presente Reglamento.

    (24)   Por lo que se refiere a todas las demás actividades comprendidas en el ámbito de aplicación de la Directiva 2002/58/CE, los proveedores deben estar sujetos a las obligaciones específicas establecidas en dicha Directiva, y, por tanto, a los poderes de control e investigación de las autoridades competentes designadas en virtud de esa Directiva.

    (25)  El cifrado de extremo a extremo es un instrumento importante para garantizar la seguridad y la confidencialidad de las comunicaciones de los usuarios, incluidas las de los menores. Todo debilitamiento del cifrado puede ser aprovechado por terceros malintencionados. Por tanto, ninguna disposición del presente Reglamento debe interpretarse en el sentido de que prohíbe o debilita el cifrado de extremo a extremo.

    (26)  El derecho al respeto de la vida privada y familiar, incluida la confidencialidad de las comunicaciones, es un derecho fundamental garantizado por el artículo 7 de la Carta. Por tanto, también es una condición necesaria para que haya comunicaciones seguras entre las víctimas de abusos sexuales de menores y un adulto de confianza o las organizaciones que se dedican a la lucha contra los abusos sexuales de menores, y comunicaciones entre las víctimas y sus abogados.

    (27)  El presente Reglamento debe entenderse sin perjuicio de las normas sobre secreto profesional de Derecho nacional, por ejemplo, las normas sobre la protección de las comunicaciones profesionales, entre médicos y sus pacientes, entre periodistas y sus fuentes, o entre abogados y sus clientes, en particular porque la confidencialidad de las comunicaciones entre abogados y sus clientes es fundamental para garantizar el ejercicio efectivo de los derechos de la defensa, que son parte esencial del derecho a un juicio justo. El presente Reglamento, debe entenderse también sin perjuicio de las normas nacionales sobre registros de autoridades públicas u organizaciones que ofrecen asesoramiento a personas en dificultades.

    (28)  Los proveedores deben comunicar a la Comisión los nombres de las organizaciones que actúan en interés público contra los abusos sexuales de menores a las que denuncian posibles abusos sexuales de menores en línea en virtud del presente Reglamento. Si bien es responsabilidad exclusiva de los proveedores que actúan como responsables del tratamiento evaluar con qué tercero pueden compartir datos personales con arreglo al Reglamento (UE) 2016/679, la Comisión debe garantizar la transparencia respecto de la transferencia de posibles casos de abusos sexuales de menores en línea publicando en su sitio web una lista de las organizaciones que actúan en interés público contra los abusos sexuales de menores que se le hayan comunicado. Dicha lista pública debe ser de fácil acceso. También debe ser posible para los proveedores utilizar dicha lista a fin de conocer las organizaciones pertinentes en la lucha mundial contra los abusos sexuales de menores en línea. Dicha lista debe entenderse sin perjuicio de las obligaciones de los proveedores que actúen como responsables del tratamiento en virtud del Reglamento (UE) 2016/679, en particular en lo que se refiere a su obligación de respetar el capítulo V de dicho Reglamento en las transferencias de datos personales fuera de la Unión y a su obligación de cumplir todas las obligaciones previstas en el capítulo IV de dicho Reglamento.

    (29)  Las estadísticas que han de ser presentadas por los Estados miembros con arreglo al presente Reglamento son indicadores importantes para evaluar la política en este ámbito, incluidas las medidas legislativas. Además, es importante tener presente el impacto de la victimización secundaria inherente al intercambio de imágenes y vídeos de víctimas de abusos sexuales de menores, que podrían haber estado circulando desde hace años, impacto que no se refleja plenamente en dichas estadísticas.

    (30)  En consonancia con las obligaciones establecidas en el Reglamento (UE) 2016/679, en particular con la obligación de que los Estados miembros velen por que las autoridades de control dispongan de los recursos humanos, técnicos y financieros necesarios para el cumplimiento efectivo de sus funciones y el ejercicio de sus poderes, los Estados miembros deben velar por que las autoridades de control dispongan de los recursos suficientes para el cumplimiento efectivo de las funciones y el ejercicio de los poderes que prevé el presente Reglamento.

    (31)  Cuando un proveedor haya realizado una evaluación de impacto relativa a la protección de datos y haya consultado a las autoridades de control en relación con una tecnología de conformidad con el Reglamento (UE) 2016/679 antes de la entrada en vigor del presente Reglamento, dicho proveedor no debe estar obligado, en virtud del presente Reglamento, a efectuar una nueva evaluación de impacto relativa a la protección de datos o una nueva consulta, siempre que las autoridades de control hayan indicado que el tratamiento de datos por dicha tecnología no entrañaría un riesgo elevado para los derechos y libertades de las personas físicas o que el responsable del tratamiento haya adoptado medidas para mitigar dicho riesgo.

    (32)  Los usuarios deben tener derecho a la tutela judicial efectiva cuando sus derechos hayan sido vulnerados como consecuencia del tratamiento de datos personales o de otro tipo con fines de detección de abusos sexuales de menores en línea en servicios de comunicaciones interpersonales independientes de la numeración y de su denuncia y de retirada de material de abuso sexual de menores en línea de dichos servicios, como en los casos en que el contenido o la identidad de los usuarios hayan sido comunicados a una organización que actúe en interés público contra los abusos sexuales de menores o a las autoridades policiales, o en que se hayan retirado contenidos o bloqueado la cuenta de un usuario o suspendido un servicio que se le ofrecía.

    (33)  De acuerdo con la Directiva 2002/58/CE y con el principio de minimización de datos, el tratamiento de datos personales y de otro tipo debe limitarse a datos de contenido y datos de tráfico conexos, en la medida que sea estrictamente necesaria para alcanzar el objetivo del presente Reglamento.

    (34)  La excepción establecida en el presente Reglamento debe extenderse a las categorías de datos a que se refieren los artículos 5, apartado 1, y 6, apartado 1, de la Directiva 2002/58/CE, que son aplicables al tratamiento de datos personales y no personales tratados en el contexto de la prestación de un servicio de comunicaciones interpersonales independiente de la numeración.

    (35)  El objetivo del presente Reglamento es establecer una excepción temporal a determinadas disposiciones de la Directiva 2002/58/CE sin crear fragmentación en el mercado interior. Además, es improbable que los Estados miembros puedan adoptar medidas legislativas nacionales a tiempo. Dado que el objetivo del presente Reglamento no puede ser alcanzado de manera suficiente por los Estados miembros, sino que puede lograrse mejor a escala de la Unión, esta puede adoptar medidas, de acuerdo con el principio de subsidiariedad establecido en el artículo 5 del TUE. De conformidad con el principio de proporcionalidad establecido en el mismo artículo, el presente Reglamento no excede de lo necesario para alcanzar dicho objetivo. El presente Reglamento introduce una excepción temporal y estrictamente limitada a la aplicabilidad de los artículos 5, apartado 1, y 6, apartado 1, de la Directiva 2002/58/CE, con una serie de salvaguardias que garantizan que dicha excepción no va más allá de lo necesario para alcanzar el objetivo fijado.

    (36)  El Supervisor Europeo de Protección de Datos, al que se consultó de conformidad con el artículo 42, apartado 1, del Reglamento (UE) n.º 2018/1725 del Parlamento Europeo y del Consejo(8), emitió su dictamen el 10 de noviembre de 2020.

    HAN ADOPTADO EL PRESENTE REGLAMENTO:

    Artículo 1. Objeto y ámbito de aplicación

    1.  El presente Reglamento introduce normas temporales y estrictamente limitadas que establecen una excepción a determinadas obligaciones impuestas por la Directiva 2002/58/CE, con el único objetivo de permitir a determinados proveedores de servicios de comunicaciones interpersonales independientes de la numeración (en lo sucesivo, «proveedores») usar, sin perjuicio de lo dispuesto en el Reglamento (UE) 2016/679, tecnologías específicas para el tratamiento de datos personales y de otro tipo en la medida estrictamente necesaria para detectar abusos sexuales de menores en línea cometidos en sus servicios y denunciarlos y para retirar el material de abuso sexual de menores en línea de sus servicios.

    2.  El presente Reglamento no se aplicará al escaneado de comunicaciones de audio.

    Artículo 2. Definiciones

    A efectos del presente Reglamento, se entenderá por:

    1) «servicio de comunicaciones interpersonales independiente de la numeración»: un servicio de comunicaciones interpersonales independiente de la numeración tal como se define en el artículo 2, punto 7, de la Directiva (UE) 2018/1972;

    2) «material de abuso sexual de menores en línea»:

    a)  pornografía infantil tal como se define en el artículo 2, letra c), de la Directiva 2011/93/UE;

    b)   espectáculo pornográfico tal como se define en el artículo 2, letra e), de la Directiva 2011/93/UE;

    3) «embaucamiento de menores»: cualquier conducta intencionada constitutiva de infracción penal conforme al artículo 6 de la Directiva 2011/93/UE;

    4) «abuso sexual de menores en línea»: material de abuso sexual de menores en línea» y embaucamiento de menores.

    Artículo 3. Alcance de la excepción

    1. El artículo 5, apartado 1, y el artículo 6, apartado 1, de la Directiva 2002/58/CE no se aplicarán a la confidencialidad de las comunicaciones que impliquen el tratamiento de datos personales y de otro tipo por parte de los proveedores en relación con la prestación de servicios de comunicaciones interpersonales independientes de la numeración, siempre que:

    a)  el tratamiento sea:

    i)  estrictamente necesario para el uso de tecnologías específicas con el único fin de detectar y retirar el material de abuso sexual de menores en línea y denunciarlo a las autoridades policiales y a las organizaciones que actúen en interés público contra los abusos sexuales de menores, y de detectar el embaucamiento de menores y denunciarlo a las autoridades policiales y a las organizaciones que actúen en interés público contra los abusos sexuales de menores;

    ii)  proporcionado y se limite a tecnologías utilizadas por los proveedores para los fines establecidos en el inciso i);

    iii)  limitado a los datos de contenido y de datos de tráfico conexos que sean estrictamente necesarios para los fines establecidos en el inciso i);

    iv)  limitado a lo estrictamente necesario para los fines establecidos en el inciso i);

    b)  las tecnologías utilizadas para los fines establecidos en la letra a), inciso i),del presente apartado correspondan al estado de la técnica en el sector y sean las menos intrusivas para la intimidad, teniendo en cuenta también el principio de protección de datos desde el diseño y por defecto, tal como se establece en el artículo 25 del Reglamento (UE) 2016/679 y, en la medida en que se utilicen para escanear el texto de comunicaciones, que no sean capaces de deducir la sustancia del contenido de las comunicaciones, sino que sean únicamente capaces de detectar patrones que apunten a posibles abusos sexuales de menores en línea;

    c)  en relación con cualquier tecnología específica utilizada para los fines establecidos en la letra a), inciso i), del presente apartado, se hayan llevado a cabo previamente una evaluación de impacto relativa a la protección de datos a que se refiere el artículo 35 del Reglamento (UE) 2016/679 y un procedimiento de consulta previa a que se refiere el artículo 36 de dicho Reglamento;

    d)  con respecto a tecnologías nuevas, es decir, tecnologías utilizadas para detectar material de abuso sexual de menores en línea que no hayan sido utilizadas por ningún proveedor para servicios prestados a los usuarios de servicios de comunicaciones interpersonales independientes de la numeración (en lo sucesivo, «usuarios») en la Unión antes de … [ fecha de entrada en vigor del presente Reglamento], y con respecto a tecnologías utilizadas para detectar el posible embaucamiento de menores, el proveedor informe a la autoridad competente sobre las medidas adoptadas para demostrar la conformidad con el asesoramiento por escrito emitido de conformidad con el artículo 36, apartado 2, del Reglamento (UE) 2016/679 por la autoridad de control competente designada a efectos del capítulo VI, sección 1, de dicho Reglamento (en lo sucesivo, «autoridad de control») durante el procedimiento de consulta previa;

    e)  las tecnologías utilizadas sean lo suficientemente fiables en cuanto que limiten en la mayor medida posible la tasa de errores en la detección de contenidos que representan abusos sexuales de menores en línea y, cuando se produzcan tales errores ocasionales, permitan rectificar sus consecuencias sin demora;

    f)  las tecnologías utilizadas para detectar patrones del posible embaucamiento de menores se limiten al uso de indicadores fundamentales pertinentes y factores de riesgo identificados objetivamente, como la diferencia de edad y la probable participación de un menor en la comunicación escaneada, sin perjuicio del derecho a una revisión humana;

    g)  los proveedores:

    i)  hayan establecido procedimientos internos para prevenir el abuso, el acceso no autorizado y las transferencias no autorizadas de datos personales y de otro tipo;

    ii)  garanticen la supervisión y, en caso necesario, la intervención humanas en relación con el tratamiento de datos personales y de otro tipo mediante la utilización de tecnologías a las que se aplica el presente Reglamento;

    iii)  se aseguren de que el material que no se haya considerado anteriormente material de abuso sexual de menores en línea no se remita sin confirmación humana previa a las autoridades policiales o a las organizaciones que actúan en interés público contra los abusos sexuales de menores;

    iv)  hayan establecido procedimientos y mecanismos de recurso adecuados para garantizar que los usuarios les puedan presentar reclamaciones en un plazo razonable con el fin de hacer oír su opinión;

    v)  informen a los usuarios de manera clara, destacada y comprensible de que han invocado, de conformidad con el presente Reglamento, la excepción legal a los artículos 5, apartado 1, y 6, apartado 1, de la Directiva 2002/58/CE en relación con la confidencialidad de las comunicaciones de los usuarios, únicamente para los fines establecidos en la letra a), inciso i), del presente apartado, la lógica subyacente a las medidas que hayan tomado en virtud de la excepción y el impacto en la confidencialidad de las comunicaciones de los usuarios, incluida la posibilidad de que los datos personales se compartan con las autoridades policiales y las organizaciones que actúen en interés público contra los abusos sexuales de menores;

    vi)  informen a los usuarios de los siguientes extremos, en caso de retirada de sus contenidos o bloqueo de su cuenta o suspensión del servicio que se les ofrecía:

    1)  las vías para recurrir ante ellos;

    2)  la posibilidad de presentar una reclamación ante una autoridad de control; y

    3)  el derecho a un recurso judicial;

    vii)   a más tardar el … [seis meses después de la fecha de entrada en vigor del presente Reglamento] y, posteriormente, a más tardar, el 31 de enero de cada año, publiquen y presenten un informe a la autoridad de control competente y a la Comisión sobre el tratamiento de datos personales en virtud del presente Reglamento, incluyendo sobre:

    1)  el tipo y el volumen de datos tratados;

    2)  el motivo específico invocado para el tratamiento de conformidad con el Reglamento (UE) 2016/679;

    3)  el motivo invocado para las transferencias de datos personales fuera de la Unión de conformidad con el capítulo V del Reglamento (UE) 2016/679, en su caso;

    4)  el número de casos detectados de abusos sexuales de menores en línea, diferenciando entre material de abuso sexual de menores en línea y embaucamiento de menores;

    5)  el número de casos en los que un usuario ha presentado una reclamación ante el mecanismo de recurso interno o ante una autoridad judicial y el resultado de dichas reclamaciones;

    6)  el número y las tasas de errores (falsos positivos) de las diferentes tecnologías utilizadas;

    7)  las medidas aplicadas para limitar la tasa de error y la tasa de error alcanzada;

    8)  la política de conservación de los datos y las salvaguardias de protección de datos aplicadas conforme al Reglamento (UE) 2016/679;

    9)  el nombre de las organizaciones que actúan en interés público contra los abusos sexuales de menores con las que se hayan compartido datos en virtud del presente Reglamento;

    h)  cuando se haya detectado un presunto abuso sexual de menores en línea, los datos de contenido y los datos de tráfico conexos tratados a los efectos de la letra a), inciso i), así como los datos personales generados mediante dicho tratamiento se almacenen de manera segura y únicamente con los fines siguientes:

    i)  denunciar sin demora el presunto abuso sexual de menores en línea a las autoridades policiales y judiciales competentes o a organizaciones que actúen en interés público contra los abusos sexuales de menores;

    ii)  bloquear la cuenta del usuario de que se trata, o de suspender o poner fin a la prestación del servicio a dicho usuario;

    iii)  crear una firma digital única y no reconvertible («hash») de datos identificados de forma fiable como material de abuso sexual de menores en línea;

    iv)  permitir al usuario de que se trate recurrir ante el proveedor o interponer recursos administrativos o judiciales en asuntos relacionados con el presunto abuso sexual de menores en línea; o

    v)  responder a las solicitudes emitidas por las autoridades policiales y judiciales competentes de conformidad con el Derecho aplicable para proporcionarles los datos necesarios para la prevención, detección, investigación o enjuiciamiento de infracciones penales establecidas en la Directiva 2011/93/UE;

    i)  los datos no se almacenen más tiempo del estrictamente necesario para el fin pertinente establecido en la letra h) y, en cualquier caso, no más de doce meses a partir de la fecha en que se detectó el presunto abuso sexual de menores en línea;

    j)  se denuncie sin demora todo caso de sospecha fundada y verificada de abuso sexual de menores en línea a las autoridades policiales nacionales competentes o a organizaciones que actúen en interés público contra los abusos sexuales de menores.

    2.  La condición establecida en el apartado 1, letra c), no se aplicará hasta el … [ocho meses después de la fecha de entrada en vigor del presente Reglamento] a los proveedores:

    a)  que utilizaban una tecnología específica antes del … [fecha de entrada en vigor del presente Reglamento] para los fines establecidos en el apartado 1, letra a), inciso i), sin haber completado previamente un procedimiento de consulta con respecto a dicha tecnología;

    b)  que inicien un procedimiento de consulta antes del … [un mes después de la fecha de entrada en vigor del presente Reglamento]; y

    c)  que cooperen debidamente con la autoridad de control competente en relación con el procedimiento de consulta a que se refiere la letra b).

    3.  La condición establecida en el apartado 1, letra d), no se aplicará hasta el … [ocho meses después de la fecha de entrada en vigor del presente Reglamento] a los proveedores que:

    a)  utilizaban una tecnología contemplada en el apartado 1, letra d), antes del … [fecha de entrada en vigor del presente Reglamento] sin haber completado previamente un procedimiento de consulta con respecto a dicha tecnología;

    b)  inicien un procedimiento a que se refiere el apartado 1, letra d), antes del … [un mes después de la fecha de entrada en vigor del presente Reglamento]; y

    c)  cooperen debidamente con la autoridad de control competente en relación con el procedimiento previsto en el apartado 1, letra d).

    Artículo 4. Directrices del Comité Europeo de Protección de Datos

    A más tardar el … [un mes después de la fecha de entrada en vigor del presente Reglamento], y con arreglo al artículo 70 del Reglamento (UE) 2016/679, la Comisión solicitará al Comité Europeo de Protección de Datos que emita directrices con el fin de ayudar a las autoridades de control a determinar si el tratamiento comprendido en el ámbito de aplicación del presente Reglamento en lo que respecta tanto a las tecnologías existentes como a las futuras, utilizado para los fines establecidos en el artículo 3, apartado 1, letra a), inciso i), del presente Reglamento, cumple lo dispuesto en el Reglamento (UE) 2016/679.

    Artículo 5. Tutela judicial efectiva

    De conformidad con el artículo 79 del Reglamento (UE) 2016/679 y el artículo 15, apartado 2, de la Directiva 2002/58/CE, los usuarios tendrán derecho a la tutela judicial efectiva cuando consideren que sus derechos han sido vulnerados como consecuencia del tratamiento de datos personales y de otro tipo para los fines establecidos en el artículo 3, apartado 1, letra a), inciso i), del presente Reglamento.

    Artículo 6. Autoridades de control

    Las autoridades de control designadas de conformidad con el capítulo VI, sección 1, del Reglamento (UE) 2016/679 controlarán el tratamiento comprendido en el ámbito de aplicación del presente Reglamento con arreglo a las competencias y poderes que le atribuye dicho capítulo.

    Artículo 7. Lista pública de organizaciones que actúan en interés público contra los abusos sexuales de menores

    1.  A más tardar el … [un mes después de la fecha de entrada en vigor del presente Reglamento], los proveedores comunicarán a la Comisión una lista con los nombres de las organizaciones que actúan en interés público contra los abusos sexuales de menores a las que los proveedores denuncian abusos sexuales de menores en línea con arreglo al presente Reglamento. Los proveedores comunicarán periódicamente a la Comisión toda modificación de dicha lista.

    2.  A más tardar el … [dos meses después de la fecha de entrada en vigor del presente Reglamento], la Comisión publicará una lista con los nombres de las organizaciones que actúan en interés público contra los abusos sexuales de menores que se le haya comunicado con arreglo al apartado 1. La Comisión mantendrá dicha lista actualizada.

    Artículo 8. Estadísticas

    1.  A más tardar el … [doce meses después de la fecha de entrada en vigor del presente Reglamento], y anualmente a partir de entonces, los Estados miembros publicarán y enviarán a la Comisión informes con datos estadísticos sobre los elementos siguientes:

    a)  el número total de denuncias de abusos sexuales de menores en línea detectados que hayan presentado los proveedores y las organizaciones que actúan en interés público contra los abusos sexuales de menores ante las autoridades policiales nacionales competentes, diferenciando, cuando se disponga de tal información, entre el número absoluto de casos y los casos denunciados varias veces, y también según el tipo de proveedor en cuyo servicio se detectó el abuso sexual de menores en línea;

    b)  el número de menores identificados mediante acciones con arreglo al artículo 3 del presente Reglamento, desglosado por género;

    c)  el número de infractores condenados.

    2.  La Comisión agregará las estadísticas contempladas a que se refiere el apartado 1 del presente artículo y las tomará en cuenta al elaborar el informe de aplicación contemplado en el artículo 9.

    Artículo 9. Informe de aplicación

    1.  Sobre la base de los informes presentados con arreglo al artículo 3, apartado 1, letra g), inciso vii) y de las estadísticas facilitadas con arreglo al artículo 8, la Comisión elaborará, a más tardar el … [dos años después de la fecha de entrada en vigor del presente Reglamento], un informe sobre la aplicación del presente Reglamento y lo presentará al Parlamento Europeo y al Consejo.

    2.  En el informe de aplicación, la Comisión tomará en consideración, en particular:

    a)  las condiciones para el tratamiento de datos personales y de otro tipo establecidas en el artículo 3, apartado 1, letra a), inciso ii) y letras b), c) y d);

    b)  la proporcionalidad de la excepción prevista en el presente Reglamento, incluida la evaluación de las estadísticas presentadas por los Estados miembros con arreglo al artículo 8;

    c)  los avances tecnológicos relativos a las actividades contempladas en el presente Reglamento, y la medida en que estos avances mejoran la precisión y reducen el número y las tasas de errores (falsos positivos).

    Artículo 10. Entrada en vigor y aplicación

    El presente Reglamento entrará en vigor a los tres días de su publicación en el Diario Oficial de la Unión Europea.

    Será aplicable hasta el … [tres años después de la fecha de entrada en vigor del presente Reglamento].

    El presente Reglamento será obligatorio en todos sus elementos y directamente aplicable en cada Estado miembro.

    Hecho en, el

    Por el Parlamento Europeo Por el Consejo

    El Presidente El Presidente

    ———————————————-

    (1) DO C 10 de 11.1.2021, p. 63.

    (2) Posición del Parlamento Europeo de 6 de julio de 2021.

    (3) Directiva 2002/58/CE del Parlamento Europeo y del Consejo, de 12 de julio de 2002, relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las comunicaciones electrónicas (Directiva sobre la privacidad y las comunicaciones electrónicas) (DO L 201 de 31.7.2002, p. 37).

    (4) Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos y por el que se deroga la Directiva 95/46/CE (Reglamento general de protección de datos) (DO L 119 de 4.5.2016, p. 1).

    (5) Directiva 2002/21/CE del Parlamento Europeo y del Consejo, de 7 de marzo de 2002, relativa a un marco regulador común de las redes y los servicios de comunicaciones electrónicas (Directiva marco) (DO L 108 de 24.4.2002, p. 33).

    (6) Directiva (UE) 2018/1972 del Parlamento Europeo y del Consejo, de 11 de diciembre de 2018, por la que se establece el Código Europeo de las Comunicaciones Electrónicas (DO L 321 de 17.12.2018, p. 36).

    (7) Directiva 2011/93/UE del Parlamento Europeo y del Consejo, de 13 de diciembre de 2011, relativa a la lucha contra los abusos sexuales y la explotación sexual de los menores y la pornografía infantil y por la que se sustituye la Decisión Marco 2004/68/JAI del Consejo (DO L 335 de 17.12.2011, p. 1).

    (8) Reglamento (UE) 2018/1725 del Parlamento Europeo y del Consejo, de 23 de octubre de 2018, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por las instituciones, órganos y organismos de la Unión, y a la libre circulación de esos datos, y por el que se derogan el Reglamento (CE) n.º 45/2001 y la Decisión n.º 1247/2002/CE (DO L 295 de 21.11.2018, p. 39)

    13Jul/21

    Decreto Legislativo nº 635 de 3 de abril de 1991

    Decreto Legislativo nº 635 de 3 de abril de 1991, que aprueba el Texto del Código Penal.

    Título Preliminar

    PRINCIPIOS GENERALES

    Finalidad Preventiva

    Artículo I. Este Código tiene por objeto la prevención de delitos y faltas como medio protector de la persona humana y de la sociedad.

    Principio de Legalidad

    Artículo II. Nadie será sancionado por un acto no previsto como delito o falta por la ley vigente al momento de su comisión, ni sometido a pena o medida de seguridad que no se encuentren establecidas en ella.

    Prohibición de la Analogía

    Artículo III. No es permitida la analogía para calificar el hecho como delito o falta, definir un estado de peligrosidad o determinar la pena o medida de seguridad que les corresponde.

    Principio de Lesividad

    Artículo IV. La pena, necesariamente, precisa de la lesión o puesta en peligro de bienes jurídicos tutelados por la ley.

    Garantía Jurisdiccional

    Artículo V. Sólo el Juez competente puede imponer penas o medidas de seguridad; y no puede hacerlo sino en la forma establecida en la ley.

    Principio de Garantía de Ejecución

    Artículo VI. No puede ejecutarse pena alguna en otra forma que la prescrita por la ley y reglamentos que la desarrollen. En todo caso, la ejecución de la pena será intervenida judicialmente.

    Responsabilidad Penal

    Artículo VII. La pena requiere de la responsabilidad penal del autor. Queda proscrita toda forma de responsabilidad objetiva.

    Proporcionalidad de las sanciones

    Artículo VIII. La pena no puede sobrepasar la responsabilidad por el hecho. Esta norma no rige en caso de reincidencia ni de habitualidad del agente al delito. La medida de seguridad sólo puede ser ordenada por intereses públicos predominantes.

    Fines de la Pena y Medidas de Seguridad

    Artículo IX. La pena tiene función preventiva, protectora y resocializadora. Las medidas de seguridad persiguen fines de curación, tutela y rehabilitación.

    Aplicación Supletoria de la Ley Penal

    Artículo X. Las normas generales de este Código son aplicables a los hechos punibles previstos en leyes especiales.

    LIBRO PRIMERO. PARTE GENERAL

    TÍTULO I. DE LA LEY PENAL

    CAPÍTULO I. APLICACIÓN ESPACIAL

    CAPÍTULO II. APLICACIÓN TEMPORAL

    CAPÍTULO III. APLICACIÓN PERSONAL

    TÍTULO II. DEL HECHO PUNIBLE

    CAPÍTULO I. BASES DE LA PUNIBILIDAD

    CAPÍTULO II. TENTATIVA

    CAPÍTULO III. CAUSAS QUE EXIMEN O ATENÚAN LA RESPONSABILIDAD PENAL

    CAPÍTULO IV. AUTORÍA Y PARTICIPACIÓN

    TÍTULO III. DE LAS PENAS

    CAPÍTULO I. CLASES DE PENA

    SECCIÓN I. PENA PRIVATIVA DE LIBERTAD

    SECCIÓN II. PENAS RESTRICTIVAS DE LIBERTAD

    SECCIÓN III. PENAS LIMITATIVAS DE DERECHOS

    SECCIÓN IV. PENA DE MULTA

    CAPÍTULO II. APLICACIÓN DE LA PENA

    CAPÍTULO III. DE LAS CONVERSIONES

    SECCIÓN I. CONVERSIONES DE LA PENA PRIVATIVA DE LIBERTAD

    SECCIÓN II. CONVERSIÓN DE LA PENA DE PRESTACIÓN DE SERVICIOS A LA COMUNIDAD Y LIMITATIVA DE DÍAS LIBRESECCIÓN

    SECCIÓN III. CONVERSIÓN DE LA PENA DE MULTA

    CAPÍTULO IV. SUSPENSIÓN DE LA EJECUCIÓN DE LA PENA

    CAPÍTULO V. RESERVA DEL FALLO CONDENATORIO

    CAPÍTULO VI. EXENCIÓN DE PENA

    CAPÍTULO VII. REHABILITACIÓN

    TÍTULO IV. DE LAS MEDIDAS DE SEGURIDAD

    TÍTULO V. EXTINCIÓN DE LA ACCIÓN PENAL Y DE LA PENA

    TÍTULO VI. DE LA REPARACIÓN CIVIL Y CONSECUENCIAS ACCESORIAS

    CAPÍTULO I. REPARACIÓN CIVIL

    CAPÍTULO II. CONSECUENCIAS ACCESORIAS

    LIBRO SEGUNDO. PARTE ESPECIAL DELITOS

    TÍTULO I. DELITOS CONTRA LA VIDA, EL CUERPO Y LA SALUD

    CAPÍTULO I. HOMICIDIO

    CAPÍTULO II. ABORTO

    CAPÍTULO III. LESIONES

    CAPÍTULO IV. EXPOSICIÓN A PELIGRO O ABANDONO DE PERSONAS EN PELIGRO

    TÍTULO I-A. DELITOS CONTRA LA DIGNIDAD HUMANA

    CAPÍTULO I. TRATA DE PERSONAS

    CAPÍTULO II. EXPLOTACIÓN

    Artículo 129-N. Publicación en los medios de comunicación sobre delitos de libertad sexual contra niñas, niños y adolescentes.

    El gerente o responsable u otro con poder de decisión sobre las publicaciones o ediciones que autorice o disponga que se difunda pornografía infantil o se publiciten actos que conlleven a la trata o la explotación sexual de niñas, niños y adolescentes será reprimido con pena privativa de libertad no menor de cuatro ni mayor de seis años, así como la pena de inhabilitación conforme al artículo 36, incisos 1, 2, 3, 4, 6, 8, 9, 10 y 11.

    TÍTULO II. DELITOS CONTRA EL HONOR

    CAPÍTULO ÚNICO. INJURIA, CALUMNIA Y DIFAMACIÓN

    Artículo 132.- Difamación

    El que, ante varias personas, reunidas o separadas, pero de manera que pueda difundirse la noticia, atribuye a una persona, un hecho, una cualidad o una conducta que pueda perjudicar su honor o reputación, será reprimido con pena privativa de libertad no mayor de dos años y con treinta a ciento veinte días-multa.

    Si la difamación se refiere al hecho previsto en el artículo 131, la pena será privativa de libertad no menor de uno ni mayor de dos años y con noventa a ciento veinte días-multa.

    Si el delito se comete por medio del libro, la prensa u otro medio de comunicación social, la pena será privativa de libertad no menor de uno ni mayor de tres años y de ciento veinte a trescientos sesentaicinco días-multa.

    TÍTULO III. DELITOS CONTRA LA FAMILIA

    CAPÍTULO I. MATRIMONIOS ILEGALES

    CAPÍTULO II. DELITOS CONTRA EL ESTADO CIVIL

    CAPÍTULO III. ATENTADOS CONTRA LA PATRIA POTESTAD

    CAPÍTULO IV. OMISIÓN DE ASISTENCIA FAMILIAR

    TÍTULO IV. DELITOS CONTRA LA LIBERTAD

    CAPÍTULO I. VIOLACIÓN DE LA LIBERTAD PERSONAL

    CAPÍTULO II. VIOLACIÓN DE LA INTIMIDAD

    Artículo 154.- Violación de la intimidad

    El que viola la intimidad de la vida personal o familiar ya sea observando, escuchando o registrando un hecho, palabra, escrito o imagen, valiéndose de instrumentos, procesos técnicos u otros medios, será reprimido con pena privativa de libertad no mayor de dos años.

    La pena será no menor de uno ni mayor de tres años y de treinta a ciento veinte días-multa, cuando el agente revela la intimidad conocida de la manera antes prevista.

    Si utiliza algún medio de comunicación social, la pena privativa de libertad será no menor de dos ni mayor de cuatro años y de sesenta a ciento ochenta días-multa.

    Artículo 154-A. Tráfico ilegal de datos personales

    El que ilegítimamente comercializa o vende información no pública relativa a cualquier ámbito de la esfera personal, familiar, patrimonial, laboral, financiera u otro de naturaleza análoga sobre una persona natural, será reprimido con pena privativa de libertad no menor de dos ni mayor de cinco años.

    Si el agente comete el delito como integrante de una organización criminal, la pena se incrementa hasta en un tercio por encima del máximo legal previsto en el párrafo anterior.

    Artículo 154-B.- Difusión de imágenes, materiales audiovisuales o audios con contenido sexual

    El que, sin autorización, difunde, revela, publica, cede o comercializa imágenes, materiales audiovisuales o audios con contenido sexual de cualquier persona, que obtuvo con su anuencia, será reprimido con pena privativa de libertad no menor de dos ni mayor de cinco años y con treinta a ciento veinte días-multa.

    La pena privativa de libertad será no menor de tres ni mayor de seis años y de ciento ochenta a trescientos sesenta y cinco días-multa, cuando concurra cualquiera de las siguientes circunstancias.

    1. Cuando la víctima mantenga o haya mantenido una relación de pareja con el agente, son o han sido convivientes o cónyuges.

    2. Cuando para materializar el hecho utilice redes sociales o cualquier otro medio que genere una difusión masiva.

    Artículo 155.- Agravante por razón de la función

    Si el agente es funcionario o servidor público y, en ejercicio del cargo, comete el hecho previsto en los artículos 154 y 154-A, la pena será no menor de tres ni mayor de seis años e inhabilitación conforme al artículo 36 incisos 1, 2 y 4.

    Si el agente es funcionario o servidor público y, en ejercicio del cargo, comete el hecho previsto en los artículos 154 y 154-A y la información tenga su origen a partir de la aplicación de la medida de la localización o geolocalización, la pena será no menor de seis ni mayor de ocho años e inhabilitación conforme al artículo 36 incisos 1, 2 y 4.

    Artículo 156.- Revelación de la intimidad personal y familiar

    El que revela aspectos de la intimidad personal o familiar que conociera con motivo del trabajo que prestó al agraviado o a la persona a quien éste se lo confió, será reprimido con pena privativa de libertad no mayor de un año.

    Artículo 157.- Uso indebido de archivos computarizados

    El que, indebidamente, organiza, proporciona o emplea cualquier archivo que tenga datos referentes a las convicciones políticas o religiosas y otros aspectos de la vida íntima de una o más personas, será reprimido con pena privativa de libertad no menor de uno ni mayor de cuatro años.

    Si el agente es funcionario o servidor público y comete el delito en ejercicio del cargo, la pena será no menor de tres ni mayor de seis años e inhabilitación conforme al artículo 36, incisos 1, 2 y 4.

    Artículo 158.- Ejercicio de la acción penal

    Los delitos previstos en este Capítulo son perseguibles por acción privada, salvo en el caso del delito previsto en los artículos 154-A y 155.

    CAPÍTULO III. VIOLACIÓN DE DOMICILIO

    Artículo 159.- Violación de domicilio

    El que, sin derecho, penetra en morada o casa de negocio ajena, en su dependencia o en el recinto habitado por otro o el que permanece allí rehusando la intimación que le haga quien tenga derecho a formularla, será reprimido con pena privativa de libertad no mayor de dos años y con treinta a noventa días-multa.

    Artículo 160.- Allanamiento ilegal de domicilio

    El funcionario o servidor público que allana un domicilio, sin las formalidades prescritas por la ley o fuera de los casos que ella determina, será reprimido con pena privativa de libertad no menor de uno ni mayor de tres años e inhabilitación de uno a dos años conforme al artículo 36, incisos 1, 2 y 3.

    CAPÍTULO IV. VIOLACIÓN DEL SECRETO DE LAS COMUNICACIONES

    Artículo 161.- Violación de correspondencia

    El que abre, indebidamente, una carta, un pliego, telegrama, radiograma, despacho telefónico u otro documento de naturaleza análoga, que no le esté dirigido, o se apodera indebidamente de alguno de estos documentos, aunque no esté cerrado, será reprimido con pena privativa de libertad no mayor de dos años y con sesenta a noventa días-multa.

    Artículo 162. Interferencia telefónica

    El que, indebidamente, interviene o interfiere o escucha una conversación telefónica o similar, será reprimido con pena privativa de libertad no menor de cinco ni mayor de diez años.

    La pena privativa de libertad será no menor de diez ni mayor de quince años.

    1. Cuando el agente tenga la condición de funcionario o servidor público, y se impondrá además la inhabilitación conforme al artículo 36, incisos 1, 2 y 4.

    2. Cuando el delito recaiga sobre información clasificada como secreta, reservada o confidencial de conformidad con la Ley 27806, Ley de Transparencia y Acceso a la Información Pública.

    3. Cuando el delito comprometa la defensa, seguridad o soberanía nacionales.

    Si el agente comete el delito como integrante de una organización criminal, la pena se incrementa hasta en un tercio por encima del máximo legal previsto en los supuestos anteriores.

    Artículo 162-A. Posesión o comercialización de equipos destinados a la interceptación telefónica o similar

    El que fabrica, adquiere, introduce al territorio nacional, posee o comercializa equipos o softwares destinados a interceptar ilegalmente las comunicaciones o similares, será reprimido con pena privativa de la libertad no menor de diez ni mayor de quince años.

    Artículo 162-B. Interferencia de comunicaciones electrónicas, de mensajería instantánea y similares

    El que, indebidamente, interviene o interfiere comunicaciones electrónicas o de mensajería instantánea o similares, será reprimido con pena privativa de libertad no menor de cinco ni mayor de diez años.

    La pena privativa de libertad será no menor de diez ni mayor de quince años, cuando.

    El agente tenga la condición de funcionario o servidor público, y se impondrá además la inhabilitación conforme al artículo 36, incisos 1, 2 y 4.

    2. El delito recaiga sobre información clasificada como secreta, reservada o confidencial de conformidad con la Ley nº 27806, Ley de Transparencia y Acceso a la Información Pública.

    3. El delito comprometa la defensa, seguridad o soberanía nacionales.

    Si el agente comete el delito como integrante de una organización criminal, la pena se incrementa hasta en un tercio por encima del máximo legal previsto en los supuestos anteriores.

    Artículo 163.- Supresión o extravío indebido de correspondencia

    El que, indebidamente, suprime o extravía de su destino una correspondencia epistolar o telegráfica, aunque no la haya violado, será reprimido con prestación de servicio comunitario de veinte a cincuentaidós jornadas.

    Artículo 164.- Publicación indebida de correspondencia

    El que publica, indebidamente, una correspondencia epistolar o telegráfica, no destinada a la publicidad, aunque le haya sido dirigida, será reprimido, si el hecho causa algún perjuicio a otro, con limitación de días libres de veinte a cincuentaidós jornadas.

    CAPÍTULO V. VIOLACIÓN DEL SECRETO PROFESIONAL

    CAPÍTULO VI. VIOLACIÓN DE LA LIBERTAD DE REUNIÓN

    CAPÍTULO VII. VIOLACIÓN DE LA LIBERTAD DE TRABAJO

    CAPÍTULO VIII. VIOLACIÓN DE LA LIBERTAD DE EXPRESIÓN

    CAPÍTULO IX. VIOLACIÓN DE LA LIBERTAD SEXUAL

    CAPÍTULO X. PROXENETISMO

    CAPÍTULO XI. OFENSAS AL PUDOR PÚBLICO

    CAPÍTULO XII. DISPOSICIÓN COMÚN

    TÍTULO V. DELITOS CONTRA EL PATRIMONIO

    CAPÍTULO I. HURTO

    CAPÍTULO II. ROBO

    CAPITULO II-A. ABIGEATO

    CAPÍTULO III. APROPIACIÓN ILÍCITA

    CAPÍTULO IV. RECEPTACIÓN

    CAPÍTULO V. ESTAFA Y OTRAS DEFRAUDACIONES

    CAPÍTULO VI. FRAUDE EN LA ADMINISTRACIÓN DE PERSONAS JURÍDICAS

    CAPÍTULO VII. EXTORSIÓN

    CAPÍTULO VIII. USURPACIÓN

    CAPÍTULO IX. DAÑOS

    CAPÍTULO X. DELITOS INFORMÁTICOS  (Incluido por el artículo Único de la Ley 27309 de 17 de julio de 2000). (Derogado por Disposición complementaria derogatoria de la Ley 30.096 de 21 de Octubre de 2013)

    (…)

    08Jul/21

    Acuerdo Ministerial nº 006-2021, de 17 de mayo de 2021

    Acuerdo Ministerial nº 006-2021, de 17 de mayo de 2021, del Ministro de Telecomunicaciones y de la Sociedad de la Información, que publica la Política de Ciberseguridad.

    ACUERDO MINISTERIAL 006-2021

    EL MINISTRO DE TELECOMUNICACIONES Y DE LA SOCIEDAD DE LA INFORMACIÓN (S)

    CONSIDERANDO:

    Que, el artículo 3 de la Constitución de la República determina como deber primordial del Estado garantizar sin discriminación alguna el efectivo goce de los derechos establecidos en la Constitución y en los instrumentos internacionales; el artículo 16 ibídem dispone que todas las personas, en forma individual o colectiva, tienen derecho a la comunicación e información;

    Que, el artículo 66, numeral 19, ibídem reconoce y garantizará a las personas: “El derecho a la protección de datos de carácter personal, que incluye el acceso y la decisión sobre información y datos de este carácter, así como su correspondiente protección. La recolección, archivo, procesamiento, distribución o difusión de estos datos o información requerirán la autorización del titular o el mandato de la ley” y en su numeral 21 garantiza a las personas “el derecho a la inviolabilidad y al secreto de la correspondencia física y virtual; ésta no podrá ser retenida, abierta ni examinada, excepto en los casos previstos en la ley, previa intervención judicial y con la obligación de guardar el secreto de los asuntos ajenos al hecho que motive su examen. Este derecho protege cualquier otro tipo o forma de comunicación”.

    Que, el artículo 85 de la Constitución de la República dispone: “La formulación, ejecución, evaluación y control de las políticas públicas y servicios públicos que garanticen los derechos reconocidos por la Constitución, se regularán de acuerdo con las siguientes disposiciones: 1. Las políticas públicas y la prestación de bienes y servicios públicos se orientarán a hacer efectivos el buen vivir y todos los derechos, y se formularán a partir del principio de solidaridad (…) En la formulación, ejecución, evaluación y control de las políticas públicas y servicios públicos se garantizará la participación de las personas, comunidades, pueblos y nacionalidades”;

    Que, el numeral 1 del artículo 154 de la Constitución de la República confiere a las ministras y ministros de Estado, además de las atribuciones establecidas en la ley, la rectoría de las políticas públicas del área a su cargo; así como la facultad de expedir los acuerdos y resoluciones administrativas que requiera su gestión;

    Que, el artículo 226 de la Constitución de la República indica que: “Las instituciones del Estado, sus organismos, dependencias, las servidoras o servidores públicos y las personas que actúen en virtud de una potestad estatal ejercerán solamente las competencias y facultades que les sean atribuidas en la Constitución y la ley. Tendrán el deber de coordinar acciones para el cumplimiento de sus fines y hacer efectivo el goce y ejercicio de los derechos reconocidos en la Constitución”;

    Que, el artículo 227 ibídem dispone: “La administración pública constituye un servicio a la colectividad que se rige por los principios de eficacia, eficiencia, calidad, jerarquía, desconcentración, descentralización, coordinación, participación, planificación, transparencia y evaluación”;

    Que, el numeral 10 del artículo 261 de la Constitución de la República determina que el Estado central tendrá competencias exclusivas: “(…) 10. El espectro radioeléctrico y el régimen general de comunicaciones y telecomunicaciones; puertos y aeropuertos”;

    Que, el artículo 280 de la norma constitucional señala: “El Plan Nacional de Desarrollo es el instrumento al que se sujetarán las políticas, programas y proyectos públicos; la programación y ejecución del presupuesto del Estado; y la inversión y la asignación de los recursos públicos; y coordinar las competencias exclusivas entre el Estado central y los gobiernos autónomos descentralizados. Su observancia será de carácter obligatorio para el sector público e indicativo para los demás sectores.”;

    Que, el artículo 313 de la Constitución de la República dispone: “El Estado se reserva el derecho de administrar, regular, controlar y gestionar los sectores estratégicos, de conformidad con los principios de sostenibilidad ambiental, precaución, prevención y eficiencia. Los sectores estratégicos, de decisión y control exclusivo del Estado, son aquellos que por su trascendencia y magnitud tienen decisiva influencia económica, social, política o ambiental, y deberán orientarse al pleno desarrollo de los derechos y al interés social. Se consideran sectores estratégicos la energía en todas sus formas, las telecomunicaciones, los recursos naturales no renovables, el transporte y la refinación de hidrocarburos, la biodiversidad y el patrimonio genético, el espectro radioeléctrico, el agua, y los demás que determine la ley”;

    Que, el inciso segundo del artículo 314 de la Constitución de la República dispone que el Estado garantizará que los servicios públicos, prestados bajo su control y regulación, respondan a principios de obligatoriedad, generalidad, uniformidad, eficiencia, responsabilidad, universalidad, accesibilidad, regularidad, continuidad y calidad;

    Que, en el artículo 1 de la Ley Orgánica de Telecomunicaciones señala: “La presente ley tiene por objeto desarrollar, el régimen general de telecomunicaciones y del espectro radioeléctrico como sectores estratégicos del Estado que comprende las potestades de administración, regulación, control y gestión en todo el territorio nacional, bajo los principios y derechos constitucionalmente establecidos”;

    Que, el artículo 3 numeral 1 de la Ley Orgánica de Telecomunicaciones establece como uno de los objetivos de la ley: “Promover el desarrollo y fortalecimiento del sector de las telecomunicaciones”;

    Que, el artículo 88 de la Ley Orgánica de Telecomunicaciones respecto de la promoción de la sociedad de la información establece que la actuación del Ministerio de Telecomunicaciones y de la Sociedad de la Información estará encaminada a la formulación de políticas, planes, programas y proyectos destinados entre otros, a:

    “1. Garantizar el derecho a la comunicación y acceso a la Información.

    2. Promover el acceso universal a los servicios de telecomunicaciones; en especial, en zonas urbano marginal o rural, afín de asegurar una adecuada cobertura de los servicios en beneficio de las y los ciudadanos ecuatorianos.

    3. Promover el establecimiento eficiente de infraestructura de telecomunicaciones, especialmente en zonas urbano marginales y rurales.

    4. Procurar el Servicio Universal.

    5. Promover el desarrollo y masificación del uso de las tecnologías de información y comunicación en todo el territorio nacional (…)”;

    Que, el artículo 140 de la Ley Orgánica de Telecomunicaciones dispone: “Rectoría del sector. El Ministerio encargado del sector de las Telecomunicaciones y de la Sociedad de la Información es el órgano rector de las telecomunicaciones y de la sociedad de la información, informática, tecnologías de la información y las comunicaciones y de la seguridad de la información. A dicho órgano le corresponde el establecimiento de políticas, directrices y planes aplicables en tales áreas para el desarrollo de la sociedad de la información, de conformidad con lo dispuesto en la presente Ley, su Reglamento General y los planes de desarrollo que se establezcan a nivel nacional. Los planes y políticas que dicte dicho Ministerio deberán enmarcarse dentro de los objetivos del Plan Nacional de Desarrollo y serán de cumplimiento obligatorio tanto para el sector público como privado”;

    Que, el numeral 2 del artículo 141 de la Ley Orgánica de Telecomunicaciones dispone que es competencia del órgano rector del sector de las Telecomunicaciones y de la Sociedad de la Información: “2. Formular, dirigir, orientar y coordinar las políticas, planes y proyectos para la promoción de las tecnologías de la información y la comunicación y el desarrollo de las telecomunicaciones, así como supervisar y evaluar su cumplimiento”;

    Que, la Ley Orgánica de Transparencia y Acceso a la Información Pública, y su Reglamento, enfatizan en el derecho de las personas al acceso a la información pública, conforme a las garantías consagradas en la Constitución de la República;

    Que, el artículo 6 de la Ley Orgánica del Sistema Nacional de Registro de Datos Públicos señala: “Accesibilidad y confidencialidad.- Son confidenciales los datos de carácter personal, tales como: ideología, afiliación política o sindical, etnia, estado de salud, orientación sexual, religión, condición migratoria y los demás atinentes a la intimidad personal y en especial aquella información cuyo uso público atente contra los derechos humanos consagrados en la Constitución e instrumentos internacionales. (…) La autoridad o funcionario que por naturaleza de sus funciones custodie datos de carácter personal, deberá adoptar las medidas de seguridad necesarias para proteger y garantizar la reserva de la información que reposa en sus archivos (…)”;

    Que, mediante Decreto Ejecutivo nº 8, de 13 de agosto de 2009, publicado en el Registro Oficial nº 10, de 24 de agosto de 2009, el Presidente de la República creó el Ministerio de Telecomunicaciones y de la Sociedad de la Información como órgano rector del desarrollo de las Tecnologías de la Información y Comunicación, que incluye las telecomunicaciones y el espectro radioeléctrico;

    Que, mediante Acuerdo Ministerial nº 011-2018, de 08 de agosto de 2018, se expide el Plan Nacional de Gobierno Electrónico 2018-2021. Este instrumento muestra la situación actual del país en materia de gobierno electrónico, las acciones que serán ejecutadas en tres programas; Gobierno Abierto, Gobierno Cercano y Gobierno Eficaz y Eficiente. En el Capítulo 1. Fundamentos Generales, literal 5. Diagnóstico se enfatiza que: “Dentro de las iniciativas relevantes que ha implementado el gobierno entorno a la ciberseguridad se encuentra la implementación del Esquema Gubernamental de Seguridad de la Información (EGSI) (…)”;

    Que, mediante Acuerdo Ministerial nº 15-2019, del 18 de julio del 2019, se expide la Política Ecuador Digital cuyo objeto es transformar al país hacia una economía basada en tecnologías digitales, mediante la disminución de la brecha digital, el desarrollo de la Sociedad de la Información y del Conocimiento, el Gobierno Digital, la eficiencia de la administración pública y la adopción digital en los sectores sociales y económicos;

    Que, la Política Ecuador Digital está compuesto por tres programas: Ecuador conectado, Ecuador eficiente y ciberseguro; y, Ecuador innovador y competitivo. El programa Ecuador eficiente y ciberseguro tiene como objetivo proteger a la sociedad frente a las amenazas cibernéticas, generar confianza en el uso del internet y fomentar el desarrollo económico y social basado en el uso de las Tecnologías de la Información y de la Comunicación (TIC);

    Que, el Gabinete Sectorial de Seguridad en Sesión Ordinaria de 8 de mayo de 2019, resolvió entre otros puntos: “PRESENTACIÓN POLÍTICA DE CIBERSEGURIDAD. El Ministerio de Telecomunicaciones y de la Sociedad de la Información deberá presentar en el próximo Gabinete Sectorial de Seguridad, la Política de Ciberseguridad integrada”;

    Que, mediante Acuerdo nº 052, de 10 de mayo de 2021, el Secretario General de la Presidencia de la República acordó la subrogación del señor Econ. Julio César Muñoz Bravo, Viceministro de Tecnologías de la Información y Comunicación, al cargo de Ministro de Telecomunicaciones y de la Sociedad de la Información;

    Que, la Vigésima Sesión Ordinaria del Gabinete Sectorial de Seguridad tuvo lugar en la ciudad de El Coca el 1 de abril de 2021. En ella se aprobó la Política Nacional de Ciberseguridad y se designó al Ministerio de Telecomunicaciones y de la Sociedad de la Información (MINTEL) como el encargado de publicarla mediante Acuerdo Ministerial.

    Que, mediante Memorando nº MINTEL-SGERC-2021-0134-M, de 27 abril de 2021, el Subsecretario de Gobierno Electrónico y Registro Civil remitió el informe técnico de motivación para la publicación de la Política Nacional de Ciberseguridad, en el que se recomienda: “(…) la publicación del instrumento legal correspondiente para la publicación de la Política Nacional de Ciberseguridad”.

    Que con sumilla inserta en el memorando nº MINTEL-SGERC-2021-0134-M, el Viceministro de Tecnologías de la Información y Comunicación aprobó el informe y dispuso la emisión de este Acuerdo

    En ejercicio de las atribuciones que le confiere el numeral 1 del artículo 154 de la Constitución de la República, el numeral 2 del artículo 141 de la Ley Orgánica de Telecomunicaciones; y, artículo 17 del Estatuto del Régimen Jurídico y Administrativo de la Función Ejecutiva.

    Acuerda:

    Artículo 1.- Publicar la Política de Ciberseguridad, que se encuentra anexa y que forma parte integral del presente Acuerdo Ministerial.

    Artículo 2.- El objetivo de la presente política es construir y fortalecer las capacidades nacionales que permitan garantizar el ejercicio de los derechos y libertades de la población y la protección de los bienes jurídicos del Estado en el ciberespacio.

    La política establece directrices que buscan afianzar un ciberespacio seguro para contribuir al desarrollo social, económico y humano del país, así como a la creación de una confianza digital que favorece el intercambio de información y, en consecuencia, de bienes y servicios en línea.

    La política tiene un enfoque multisectorial y multidimensional que se debe al carácter transversal de la ciberseguridad. Por tanto, la política alcanza a varios sectores y actores, públicos y privados, del país, y de manera vertical y horizontal. En esta medida, la política establece directrices para encaminar las acciones de las entidades de la Administración Pública Institucional y que dependen de la Función Ejecutiva, en coordinación con los otros poderes del Estado, sociedad civil y ciudadanía en general.

    Artículo 3.- De la ejecución del presente Acuerdo Ministerial, encárguese a la Subsecretaria Gobierno Electrónico y Registro Civil, que ejecutará las acciones necesarias para la implementación de la Política de Ciberseguridad.

    Disposición Final.- El presente Acuerdo Ministerial entrará en vigencia a partir de su suscripción, sin perjuicio de su publicación en el Registro Oficial.

    Dado en Quito, D.M., a los 17 días del mes de mayo del año 2021.

    Econ. Julio César Muñoz Bravo

    MINISTRO DE TELECOMUNICACIONES Y DE LA SOCIEDAD DE LA INFORMACIÓN (S)

    Elaborado por:

    Betty Cuarán, Abogada DALDN

    Revisado por:

    Gabriela Espinoza, Coordinadora General Jurídica

    Ricardo Dávalos, Director de Asesoría Legal y Desarrollo Normativo

    Firmado electrónicamente por: BETTY MARGOTH CUARAN SARZOSA

    Firmado electrónicamente por: RICARDO ALEJANDRO DAVALOS GONZALEZ

    Firmado electrónicamente por: MARJORIE GABRIELA ESPINOZA PLUA

    Firmado electrónicamente por: JULIO CESAR MUNOZ BRAVO

    ministerio de telecomunicaciones y de la sociedad de la información

    POLÍTICA DE CIBERSEGURIDAD

    PRESENTACIÓN

    La seguridad de toda la población ecuatoriana en el ciberespacio -en el “quinto dominio”-, es prioridad estratégica del Gobierno Nacional. En ese contexto, entidades del sector público y privado, así como de la sociedad civil y la academia, trabajan arduamente en el proceso de construcción de nuestra Política Nacional de Ciberseguridad (PNC).

    El Gobierno del presidente Moreno, en uso de sus atribuciones constitucionales, ha trazado y ha definido esta política, enriquecida por actores relacionados, para establecer lineamientos y acciones, sin descuidar el análisis de riesgos y amenazas -potenciales y reales- que enfrenta nuestro país. De esta forma podemos generar más capacidades para: identificar, monitorear, evaluar, gestionar, prevenir, mitigar; en suma, para enfrentar con éxito los riesgos y amenazas.

    Para alcanzar un Ecuador Digital Ciberseguro que garantice el Estado de Derecho, proteja los servicios e infraestructuras críticas del Estado y de seguridad a la población en el ciberespacio, el Gobierno trazó su línea de acción asentada en 7 pilares:

    1) Gobernanza de ciberseguridad;

    2) Sistemas de información y gestión de incidentes;

    3) Protección de servicios e infraestructuras críticas digitales;

    4) Soberanía y defensa;

    5) Seguridad pública y ciudadana;

    6) Diplomacia en el ciberespacio y cooperación internacional;

    7) Cultura y educación de ciberseguridad.

    Estas acciones priorizan el fortalecimiento institucional y la articulación efectiva por parte del Gobierno, de forma ordenada, con un enfoque integral y la activa presencia de múltiples actores. Por ello, las entidades gubernamentales y las entidades privadas del país deben cooperar con responsabilidad. Sólo de esa forma se tendrá un Ecuador Digital Ciberseguro.

    Esta política está en línea con la Agenda 2030 para el Desarrollo Sostenible de la ONU, el plan global de acción a favor de las personas, el planeta y la prosperidad, que busca fortalecer la paz universal y el acceso a la justicia. Los Objetivos de Desarrollo Sostenible de la ONU están contenidos en nuestro Plan Nacional de Desarrollo (PND) 2017-2021: acceso seguro a las TIC, internet de las cosas (IoT) y tecnología de la operación (TO). Estos elementos son clave para el desarrollo futuro de las actividades políticas, sociales, culturales y económicas de nuestro país.

    En razón de que el dominio del ciberespacio trasciende las fronteras del país, el enfoque de nuestra política se orienta al ámbito internacional; por eso, Ecuador deberá articular acciones para fortalecer la ciberseguridad a nivel regional y multilateral, al tiempo que promueva el uso de tecnologías para el desarrollo socioeconómico del país, en áreas de la economía digital.

    Una vez emitida la Política Nacional de Ciberseguridad, el siguiente desafío inmediato será su implementación, el constante monitoreo y la evaluación. Pero el primer paso está dado, gracias a la voluntad política del Presidente Moreno. La puesta en marcha de esta política es un avance muy importante, es un resultado tangible que resalta el compromiso del Gobierno Nacional en materia de ciberseguridad, puesta al servicio de nuestra población. Además, tiene el mérito de posicionar al país en el marco de la Agenda Global Digital, en tiempos tan duros y difíciles como los que afectan al país, a la región y al planeta en general.

    LISTADO DE ACRÓNIMOS

    APCID Administración Pública Central, Institucional y Dependiente

    ARCOTEL Agencia de Regulación y Control de las Telecomunicaciones CERT Critical Emergency Response Team – Centro de Respuesta Rápida Ante Incidentes Informáticos

    CICTE Comité Interamericano contra el Terrorismo

    CIES Centro de Inteligencia Estratégica

    CIRT Critical Incident Response Team– Centro de respuesta a incidentes informáticos

    CSIRT Critical Security Incident Response Team – Centros de Respuesta a Incidentes de Seguridad Informática

    E-government Survey. Encuesta de Gobierno Electrónico

    EcuCERT Centro de respuesta a incidentes informáticos del Ecuador

    EGDI Índice de Desarrollo de Gobierno Electrónico

    EGSI Esquema Gubernamental de Seguridad de la Información

    ESR ESET Security Report

    FIRST Forum of Incident Response and Security Teams)

    GCI Índice Global de Ciberseguridad

    IC Infraestructura crítica

    ICD Infraestructura crítica digital

    INEC Instituto Ecuatoriano de Estadísticas y Censos

    INEN Servicio Ecuatoriano de Normalización

    IoT Internet de las cosas

    UIT Unión Internacional de Telecomunicaciones

    MDN Ministerio de Defensa

    MDG Ministerio de Gobierno

    MREMH Ministerio de Relaciones Exteriores y Movilidad Humana

    MINTEL Ministerio de Telecomunicaciones y de la Sociedad de la Información

    NTE Norma Técnica Ecuatoriana

    OEA Organización de Estados Americanos

    PNC Política Nacional de Ciberseguridad (PNC)

    SDH Secretaría de Derechos Humanos

    SIETEL Sistema de Información y Estadística de los Servicios de

    SOC TCeelnetcomunicaciones ro de Operaciones de Seguridad

    SINARDAP Sistema Nacional de Registro de Datos Públicos

    TIC Tecnologías de la información y de la comunicación

    TO Tecnologías de la operación

    UNCRC The United Nations Convention on the Rights of the Child – Convención de las Naciones Unidas Sobre los Derechos del Niño

    INTRODUCCIÓN

    La agenda digital ha tomado mayor relevancia en el contexto actual –crisis por COVID-19-

    durante el cual se han evidenciado los beneficios y oportunidades que brinda el uso de las tecnologías de la información y comunicación, pero también el incremento de los delitos en línea y por tanto la necesidad de garantizar la seguridad de los ciudadanos en el ciberespacio.

    El Ecuador trabaja activamente en el ámbito nacional para garantizar un internet libre, abierto y seguro, a fin de continuar aprovechando los beneficios económicos y sociales que ofrece y que se enmarcan en la agenda de desarrollo sostenible.

    En este sentido, la ciberseguridad y la creación de confianza en el ciberespacio se tornan fundamental. Con ello, al igual que en foros internacionales, el Ecuador reconoce que el uso de las TIC ha sido ventajoso para su desarrollo socioeconómico, y que a la vez representa un desafío para la comunidad internacional, por los riesgos y amenazas del ciberespacio.

    En el mundo más de 4.100 millones de usuarios tienen acceso a internet (UIT – Unión Internacional de Telecomunicaciones, 2019), que representan más de la mitad de la población mundial (1). En el caso de las nuevas tecnologías de la información y comunicación, su creciente democratización ha traído consigo cambios y retos permanentes, al constituirse como uno de los pilares del mundo globalizado (2). El avance de estas tecnologías ha incrementado el uso de medios tecnológicos con fines delictivos de violencia y destrucción alrededor del mundo (3). Es así que un número creciente de personas y grupos obtienen ventajas de la rapidez, conveniencia y anonimato que brinda el Internet para perpetrar una serie de actividades delictivas de sabotaje y terrorismo, que no conocen fronteras físicas, representando amenazas reales para las víctimas a nivel global (4).

    Si en el pasado el delito cibernético era perpetrado principalmente por individuos o por pequeños grupos, en la actualidad se estarían configurando patrones novedosos bajo los cuales operan concertadamente redes delictivas muy complejas en el ciberespacio, que reúnen a individuos en distintos países en tiempo real, para cometer delitos y ataques cibernéticos a una escala sin precedentes. (INTERPOL, 2017).

    Entre los principales delitos cibernéticos, se destacan la piratería, que afecta a la propiedad intelectual, los ataques con códigos maliciosos, como por ejemplo ataques de denegación de servicios, que constituyen amenazas a la seguridad de los gobiernos, negocios e individuos y que suponen un desafío para los organismos de seguridad y agencias encargadas de la aplicación de la ley, entre otros. Estos delitos se producen, en parte, debido a que varios países no han desarrollado las capacidades necesarias para prevenir, investigar y combatir este tipo de fenómenos.

    En este sentido es importante el “Conjunto de actividades dirigidas a proteger el ciberespacio contra el uso indebido del mismo, defendiendo su infraestructura tecnológica, los servicios que prestan y la información que manejan” (CCN-CERT Centro Criptológico Nacional, 2015). El Ecuador entiende a la ciberseguridad como la capacidad del Estado para proteger a las personas, sus bienes activos de información y servicios esenciales ante riesgos y amenazas que se identifican en el ciberespacio. De forma complementaria el país se adhiere al concepto de la Unión Internacional de Telecomunicaciones -UIT- que la concibe como ¨el conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y a los usuarios en el ciberentorno¨ (UIT2010, 20).

    La ciberseguridad en el Ecuador se enmarca dentro de los deberes constitucionales del Estado, especialmente el desarrollo y el establecimiento de una cultura de paz. Dado el principio integral de la ciberseguridad y asuntos digitales, la presente Política Nacional de Ciberseguridad incluye aspectos que se enmarcan en competencias como la ciberdefensa, la ciberinteligencia y la ciberdiplomacia. Asimismo, se reconoce el alcance nacional, multisectorial y con un enfoque de múltiples actores, en el diseño, implementación y monitoreo de la PNC.

    Los principios que rigen esta política son la promoción y el respeto de los derechos humanos y libertades fundamentales, el fomento de la confianza, la resiliencia, la responsabilidad compartida, el f1omento del desarrollo de actividades en el entorno digital y el mercado nacional de TIC. En el marco de un Internet libre, abierto y seguro, prima la comunicación de las personas, la protección de datos, el derecho a la privacidad, y el marco de los objetivos de desarrollo sostenible. Esta política se basa en siete pilares que contemplan diversas temáticas de intervención del Estado, en coordinación con el sector privado, la academia y sociedad civil, que permitirán la ciberseguridad del Ecuador. Estos pilares se enfocan en el trabajo en la gobernanza de la ciberseguridad, en sistemas de información y gestión de incidentes, en la protección de los servicios e infraestructuras críticas, la soberanía y defensa, la seguridad pública y ciudadana, la diplomacia en el ciberespacio junto con la cooperación internacional y la promoción de la cultura y educación para la ciberseguridad. El objetivo general de esta política, articulado con sus objetivos específicos, es construir y fortalecer las capacidades nacionales que permitan garantizar el ejercicio de los derechos y libertades de la población, así como la protección de los bienes jurídicos del Estado en este dominio; encaminando acciones para garantizar un ciberespacio seguro.

    El objetivo contribuirá de manera directa al desarrollo social, económico y humano del país, así como a la creación de una confianza digital fundamental para favorecer el intercambio de información y, en consecuencia, de bienes y servicios en línea, fortaleciendo el compromiso del estado con la ciberseguridad.

    Su implementación conlleva un proceso de seguimiento, medición y evaluación continuo y flexible, que permitirá ajustarla efectivamente ante los rápidos cambios en el entorno digital e identificar el impacto de las acciones de esta política en el fortalecimiento de la ciberseguridad nacional. Para que esta política sea efectiva, el estado ecuatoriano deberá asignar los recursos financieros necesarios que aseguren la implementación de las líneas de acción enunciadas en ella.

    Esta política tiene un alcance nacional, alineada a la normativa y demás instrumentos de política pública. Debido al carácter ubicuo de la ciberseguridad, la política también se aplica al espectro radioeléctrico y en las infraestructuras digitales, donde se incluyen: los dominios, plataformas y programas donde se maneje información de carácter pública y privada de la población; asimismo, se consideran las infraestructuras con servicios automatizados y los servicios esenciales del Estado como parte de los bienes jurídicos a proteger.

    La ciberseguridad se convertirá, progresivamente, en un tema de vital importancia dentro de la agenda de seguridad, desarrollo y derechos humanos en el Ecuador, por lo que se requiere desarrollar y potenciar las capacidades nacionales, políticas, estrategias, planes, programas y proyectos intersectoriales para la seguridad cibernética.

    Es esencial la concientización en la sociedad ecuatoriana sobre las potenciales vulnerabilidades que enfrenta en el entorno cibernético, lo que permitirá propender a la garantía de derechos y libertades, como de la seguridad integral en el ciberespacio.

    PROCESO DE ELABORACIÓN DE LA POLÍTICA

    La elaboración de la presente política parte de un proceso técnico, con la conformación de una mesa interinstitucional, denominado “Grupo interinstitucional de Ciberseguridad”, conformada por las siguientes instituciones: Ministerio de Telecomunicaciones y Sociedad de la Información (MINTEL), quién preside el grupo, el Ministerio de Gobierno (MDG), el Ministerio de Defensa (MDN), el Centro de Inteligencia Estratégica (CIES) y el Ministerio de Relaciones Exteriores y Movilidad Humana (MREMH), que mediante un trabajo interdisciplinario ha contribuido desde los enfoques de cada una de las instituciones participantes, con el fin de garantizar la adaptabilidad de la misma al contexto aplicativo. Este instrumento toma en consideración los intereses nacionales y, a la vez, considera a los temas de ciberseguridad desde una visión holística, común, compartida y de largo plazo.

    La determinación de la metodología requirió la revisión de herramientas internacionales existentes para el desarrollo de políticas en este ámbito y un análisis de los avances de otros países en la materia. Asimismo, el desarrollo de este documento incluye la revisión de los marcos normativos vigentes nacionales e internacionales y los instrumentos de planificación nacional de los sectores involucrados. Además, contempla el levantamiento de un diagnóstico nacional que identifica las brechas existentes en cuanto a la ciberseguridad en el país. Una vez priorizadas, estas fundamentaron el diseño de acciones nacionales que permitirán solventar las problemáticas de la ciberseguridad en el Ecuador.

    En la construcción de esta política participaron actores de la Función Ejecutiva, al igual que otras funciones del Estado. Se contó con insumos de las Empresas Públicas, de los operadores de infraestructuras críticas, representantes de la academia, centros de respuesta a incidentes, actores del sector privado y de la sociedad civil. La política propone un horizonte definido al 2023, en el cual se implementarán las líneas de acción definidas en la política y a partir del proceso de seguimiento y monitoreo, se podrán observar los resultados de la misma a corto y mediano plazo.

    Figura 1: Aprobación de la Hoja de Ruta para la elaboración de la Política Nacional de Ciberseguridad.

    (…)

    Elaborado por: Grupo Interinstitucional de Ciberseguridad.

    ANTECEDENTES

    El compromiso del Ecuador con la ciberseguridad ha progresado recientemente con la adopción de varias políticas y estrategias sectoriales que definen el enfoque del gobierno con respecto a la ciberseguridad. Dichas estrategias precisan de coordinación general.

    Cabe resaltar que más allá de la ausencia de marcos reglamentarios a nivel nacional para la protección de infraestructura crítica, los sectores financieros y de telecomunicaciones han establecido y adoptado procesos de gestión de riesgos de ciberseguridad y las mejores prácticas en medidas de seguridad.

    En tal virtud, esta política se alinea a la normativa nacional vigente y al Plan Nacional de Desarrollo 2017-2021 “Toda una Vida”.

    Ecuador ha tomado en consideración el avance de las regulaciones internacionales, que se han desarrollado debido al aparecimiento de acciones susceptibles de causar afectaciones negativas, por lo que se emiten normas internas y se aúnan esfuerzos, para ir construyendo una primera generación de normativa nacional.

    A continuación, se lista el marco normativo relacionado.

    A. Marco normativo

    a. Nacional

    CONSTITUCIÓN DE LA REPÚBLICA

    La Constitución de 2008 se establece como la norma jurídica de mayor jerarquía dentro del ordenamiento jurídico ecuatoriano, primando inclusive sobre los convenios y tratados internacionales salvo excepciones en casos de derechos humanos más beneficiosos, leyes orgánicas y ordinarias, así como las demás normas.

    Artículo 3, 16, 66 (Núm. 19 y 21), 158, 313 y 393

    CÓDIGO ORGÁNICO INTEGRAL PENAL

    El Código Orgánico Integral Penal, a menudo referido por sus siglas COIP, es un conjunto sistematizado y organizado de normas jurídicas de carácter punitivo, es decir un compendio legislativo que establece delitos y penas conforme al sistema penal ecuatoriano.

    Artículo 103, 104, 170, 178, 188, 190, 194, 202.1, 202.2, 229 al 234, 262, 353.1, 415.1, 415.2, 472, 476, 526, 553.2,

    LEY ORGÁNICA DE LA IDENTIDAD Y DATOS CIVILES

    La presente Ley tiene por objeto garantizar el derecho a la identidad de las personas y normar y regular la gestión y el registro de los hechos y actos relativos al estado civil de las personas y su identificación.

    Artículo 1 y 3 (Núm. 4 y 6)

    LEY DE SEGURIDAD PÚBLICA Y DEL ESTADO

    La presente ley tiene por objeto regular la seguridad integral del Estado democrático de derechos y justicia y todos los habitantes del Ecuador, garantizando el orden público, la convivencia, la paz y el buen vivir, en el marco de sus derechos y deberes como personas

    naturales y jurídicas, comunidades, pueblos, nacionalidades y colectivos, asegurando la defensa nacional, previniendo los riesgos y amenazas de todo orden, a través del Sistema de Seguridad Pública y del Estado.

    Artículo 2, 3, 10, 11, 38, 41 y 43

    LEY ORGÁNICA DE TELECOMUNICACIONES

    Esta Ley tiene por objeto desarrollar, el régimen general de telecomunicaciones y del espectro radioeléctrico como sectores estratégicos del Estado que comprende las potestades de administración, regulación, control y gestión en todo el territorio nacional, bajo los principios y derechos constitucionalmente establecidos.

    Artículo 76, 77, 78, 79, 80, 81, 82, 83, 84, 85 y 140

    LEY ORGÁNICA PARA PREVENIR Y ERRADICAR LA VIOLENCIA CONTRA LAS MUJERES

    Esta Ley prevé de manera particular, enfocar la acción del Estado en la sensibilización y prevención de la violencia y con la participación de la ciudadanía, bajo el principio de corresponsabilidad. Estos dos actores deben garantizar a través de políticas, planes y programas, la transformación de los patrones socioculturales y la erradicación de prácticas que naturalizan la violencia contra las mujeres. Esta Ley establece además tres componentes para la erradicación de la violencia: atención, protección y reparación de las mujeres víctimas de violencia para garantizar su seguridad e integridad y para retomar su proyecto de vida.

    Artículo 12

    LEY ORGÁNICA DE COMERCIO ELECTRÓNICO, FIRMAS ELECTRONICAS Y MENSAJES DE DATOS

    Esta ley regula los mensajes de datos, la firma electrónica, los servicios de certificación, la contratación electrónica y telemática, la prestación de servicios electrónicos, a través de redes de información, incluido el comercio electrónico y la protección a los usuarios de estos sistemas.

    Artículo 5, 7,8, 9,10, 29, 51, 54, 58, 62, 63, 64

    CÓDIGO ORGÁNICO DE LA ECONOMÍA SOCIAL DE LOS CONOCIMIENTOS, CREATIVIDAD E INNOVACIÓN

    Protección a los derechos intelectuales y a asumir la defensa de los mismos, como un aspecto imprescindible para el desarrollo tecnológico del país. La ley, incluye en su codificación la protección de bases de datos que se encuentren en forma impresa u otra forma, así como también los programas de ordenador (software).

    NORMAS TÉCNICAS

    ● Familia de NTE INEN-ISO/IEC 27000, principalmente:

    – NTE INEN-ISO/IEC 27000, Tecnologías de la Información – Técnicas de Seguridad – Sistemas de Gestión de la Seguridad de la Información –

    Descripción general de vocabulario

    – NTE INEN-ISO/IEC 27002:2013, Tecnología de la información – Técnicas de seguridad – Código de prácticas para controles de seguridad de la información.

    – NTE INEN-ISO/IEC 27005, Tecnología de la Información – Técnicas de Seguridad – Gestión del Riesgo en la Seguridad de la información.

    – NTE INEN-ISO/IEC 27032, Tecnologías de la Información – Técnicas de seguridad–Directrices para Ciberseguridad

    ● Resolución ARCOTEL-2018-0652, Norma técnica para coordinar la gestión de incidentes y vulnerabilidades que afecten a la seguridad de las redes y servicios de telecomunicaciones, publicada en el Registro Oficial nº 331, del 20 de septiembre de 2018.

    ● Resolución nº SB-2018-771 de la Superintendencia de Bancos, que reforma la Norma de Control para la Gestión del Riesgo Operativo, publicada en el Suplemento del Registro Oficial nº 325, del 12 de septiembre de 2018.

    b. Internacional

    INSTRUMENTOS INTERNACIONALES

    Carta de las Naciones Unidas.

    ● Convenio de Ginebra y sus Protocolos adicionales.

    Resolución AG/RES 2004 (XXXIV-O / 04) de la Organización de Estados Americanos (OEA): Adopción de una Estrategia de Seguridad Cibernética

    Resoluciones UNGA 55/63 y 56/121 de las Naciones Unidas sobre la lucha contra el uso de la tecnología de la información con fines delictivos.

    Resoluciones UNGA 57/239, 58/199 y 64/211 de las Naciones Unidas sobre la creación de una cultura mundial de seguridad cibernética y la protección de infraestructuras críticas de la información.

    ● Resolución UNGA 73/266 sobre Promoción del comportamiento responsable de los Estados en el ciberespacio en el contexto de la seguridad internacional.

    ● Declaración para la protección de infraestructura crítica ante las amenazas emergentes – Comité Interamericano contra el Terrorismo de la OEA (20 de marzo de 2015).

    ● Resolución CICTE/RES. 1/19 del 24 de mayo de 2019 sobre Medidas Regionales de Fomento y Confianza en el Ciberespacio (MFCS) del Comité Interamericano contra el Terrorismo.

    B. Vinculación de la Ciberseguridad con la Planificación Nacional

    Plan Nacional de Desarrollo 2017-2021 “Toda una Vida” Objetivo 1.- Garantizar una vida digna con iguales oportunidades para todas las personas.

    Objetivo 7.- Incentivar una sociedad participativa, con un Estado cercano al servicio de la ciudadanía.

    Objetivo 9.- Garantizar la soberanía y la paz, y posicionar estratégicamente al país en la región y el mundo.

    Plan Nacional de Seguridad Integral 2019 – 2030

    Desde una visión holística de las problemáticas de seguridad para el Estado, evidencia la aparición de amenazas como los ciberataques que identifica como una problemática transversal por el creciente uso de la tecnología.

    Agenda de Coordinación Intersectorial de Seguridad Política PND 9.1 Promover la paz sostenible y garantizar servicios eficientes de seguridad integral. Estrategia 3: Automatización de la obtención y administración de la información para inteligencia estratégicas.

    Estrategia 4: Coordinación de la cooperación interinstitucional e internacional para fortalecer la gestión de inteligencia.

    Política de Defensa Nacional 2018

    Reconoce que los ciberataques y las vulneraciones a la infraestructura crítica tienen la capacidad de afectar al Estado. Determina que el ciberterrorismo, ciberespionaje e infiltraciones a los sistemas informáticos son instrumentos de agresión. La política propone el desarrollo de la industria de la defensa con miras a proveer productos y servicios estratégicos especializados para aportar las capacidades de la ciberdefensa.

    Plan Específico de Defensa Nacional 2019-2030

    Reconoce al ciberespacio como un componente más del territorio ecuatoriano. Las implicaciones se vinculan al desarrollo de operaciones en este dominio para la defensa de la soberanía; con el fin de aportar a la ciberseguridad nacional.

    Plan Específico de Seguridad Pública y Ciudadana 2019-2030

    Se establecen políticas articuladas y coordinadas de prevención y control respecto de las distintas expresiones del delito y en sus diferentes ámbitos, lo que lleva a prevenir, anticipar y combatir amenazas locales, nacionales e internacionales. La división entre seguridad pública y seguridad ciudadana permite un marco de acción diferenciado sobre la suscitación de delitos, por un lado, una competencia Estatal encaminada al resguardo del orden público y la protección interna, por otro lado, una seguridad ciudadana enfocada en las acciones institucionales dedicadas a reducir los factores de vulnerabilidad hacia el cometimiento de delitos.

    Plan Específico de Inteligencia 2019-2030

    Este plan entiende como amenaza para el Estado ecuatoriano a todo fenómeno o condición en la que uno o más actores con capacidad y fines específicos generen un daño, pérdida o consecuencia negativa directa contra los ejes de protección de la seguridad integral del Estado, entendiendo a estos como ser humano, Estado y naturaleza. En este contexto, se establece como una de las amenazas para el Ecuador las acciones contra el Estado en el ciberespacio.

    Plan Específico de Relaciones Exteriores y Movilidad Humana 2019-2030

    Objetivo Estratégico 3: Fomentar la cooperación internacional para la lucha contra la delincuencia organizada transnacional y las amenazas a la seguridad nacional”.

    Plan Nacional de Sociedad de la Información y del Conocimiento 2018-2021

    Es un instrumento de planificación orientado a propiciar el desarrollo nacional en torno al área de la Sociedad de la Información, contiene los programas y proyectos que permitirán alcanzar objetivos trazados en la Política Nacional de Telecomunicaciones y de la Sociedad de la Información. Dentro del Programa 1: Seguridad de la Información y uso responsable de las TIC, se busca de manera primordial fortalecer el marco regulatorio, normativo y estratégico para incrementar la seguridad de la información en el país por lo que promueve la elaboración la Estrategia Nacional de Ciberseguridad que permita determinar los lineamientos generales de la Ciberseguridad en el Ecuador.

    Plan Nacional de Gobierno Electrónico 2018-2021

    Este Plan plantea catorce estrategias, una de ellas enfocada en la ciberseguridad mencionando como principales beneficiarios a las personas naturales y jurídicas. Además, propone emitir un modelo estandarizado de ciberseguridad para la Administración Pública Central, Institucional y Dependiente (APCID), fortalecer el CERT, capacitar a los funcionarios de la APCID y difundir los beneficios de contar con este modelo a la ciudadanía.

    Política Ecuador Digital

    Instrumento cuyo objetivo es transformar y dirigir al país, hacia una economía basada en tecnologías digitales mediante la disminución de la brecha digital, el desarrollo de la Sociedad de la Información y del Conocimiento, el Gobierno Digital, la eficiencia de la administración pública, y la adopción digital en los sectores sociales y económicos, esta política se compone de 3 ejes: Ecuador Conectado, Ecuador Eficiente y Ciberseguro y Ecuador Innovador y Competitivo. Cada uno incluye un conjunto de proyectos para incrementar los índices de accesibilidad a las tecnologías de la información y comunicación, el fortalecimiento de las capacidades de talento humano, la potenciación de los sectores de la economía y el impulso del emprendimiento e innovación; es así que el eje de acción Ecuador Eficiente y Ciberseguro garantiza la participación ciudadana, la democratización de los servicios públicos, la simplificación de trámites, la gestión de la seguridad de la información y la protección de datos personales.

    Política Pública por una Internet segura para niños, niñas y adolescentes

    Instrumento cuyo objetivo es proteger la dignidad e integridad física, psicológica, emocional y sexual de la niñez y adolescencia; y potenciar las oportunidades y habilidades que ofrecen las tecnologías digitales en su vida y desarrollo integral.

    Plan Nacional de Seguridad Ciudadana y Convivencia Social Pacífica 2019 – 2030

    Este plan propone crear una estrategia que permita prepararnos con anticipación, ante los riesgos, establece en su Objetivo 7: Implementar anticipación estratégica en las acciones públicas para enfrentar riesgos y amenazas, fundamentalmente los relacionados al crimen organizado, lavado de activos, delincuencia transnacional, terrorismo y cibercriminalidad.

    SITUACIÓN ACTUAL

    A. Panorama Nacional de la Ciberseguridad

    Desde el año 2011, con la “Estrategia Ecuador Digital 2.0” emitida por el Ministerio de Telecomunicaciones y de la Sociedad de la Información (MINTEL), se inició el desarrollo de Políticas Públicas Sectoriales que permitirían que las tecnologías de la información y comunicación se usen efectivamente en el proceso de desarrollo productivo, social y solidario del Ecuador, para el bienestar de todos los ciudadanos. Con el objeto de implementar dicha Estrategia, se impulsaron cuatro planes estratégicos:

    ● Plan Nacional de Alistamiento Digital.

    ● Plan Nacional de Gobierno en Línea.

    ● Plan Nacional de Banda Ancha

    ● Plan Nacional de Gobierno Electrónico.

    El MINTEL, mediante Acuerdo Ministerial nº 015-2019, publicado en el Registro Oficial nº 69 del 28 de octubre de 2019, emite la “Política Ecuador Digital”, cuyo objetivo es transformar y dirigir al país, hacia una economía basada en tecnologías digitales mediante la disminución de la brecha digital, el desarrollo de la Sociedad de la Información y del Conocimiento, el Gobierno Digital, la eficiencia de la administración pública, y la adopción digital en los sectores sociales y económicos, esta política se compone de 3 ejes: Ecuador Conectado, Ecuador Eficiente y Ciberseguro y Ecuador Innovador y Competitivo. Cada uno incluye un conjunto de proyectos para incrementar los índices de accesibilidad a las tecnologías de la información y comunicación, el fortalecimiento de las capacidades de talento humano, la potenciación de los sectores de la economía y el impulso del emprendimiento e innovación; es así que el eje de acción Ecuador Eficiente y Ciberseguro garantiza la participación ciudadana, la democratización de los servicios públicos, la simplificación de trámites, la gestión de la seguridad de la información y la protección de datos personales.

    Esta política está enmarcada en los diferentes ejes establecidos en el Acuerdo Nacional 2030 y contribuye a la transformación digital de las instituciones públicas y los diferentes sectores de la economía, permitiendo el incremento de la productividad y competitividad de las empresas.

    En el año 2013 el gobierno central desarrolló e implementó el Esquema Gubernamental de Seguridad de la Información (EGSI), lo que permitió ampliar la accesibilidad de sus servicios a los ciudadanos. Esto, a su vez, generó desafíos para la protección de la información de los mismos. El EGSI se implementó en las instituciones de la Administración Pública Central con el fin de que las Instituciones públicas cuenten con un marco de referencia para la gestión de la seguridad de la información.

    Los resultados obtenidos del proceso de evaluación fueron la base para la actualización de este esquema gubernamental de seguridad de la información en el año 2020, denominado EGSI V2.0, cuyo objetivo es preservar la confidencialidad, integridad y disponibilidad de la información mediante la aplicación de un proceso de gestión de riesgos de seguridad de la información y la selección de controles para el tratamiento de los riesgos identificados. Cabe mencionar que según revela el informe “E-government Survey” (E-government Survey 2020, 2020), el Ecuador subió 10 escalones respecto al 2018 en su posición en el Índice de Desarrollo de Gobierno Electrónico (EGDI) de Naciones Unidas. Actualmente, el país ocupa el puesto 74 de 193 países, ubicándolo por encima de la media mundial y regional.

    A partir del año 2016, el Plan Nacional de Telecomunicaciones y TI 2016-2021, delinea el futuro del sector de las telecomunicaciones, impulsando la mejora de estos servicios y la reducción de la brecha digital. Además, se actualizó el Plan Nacional de Gobierno Electrónico 2018-2021, que en sus tres ejes de acción y catorce estrategias, vincula a la ciberseguridad con las personas naturales y jurídicas mediante la implementación de la emisión de un modelo estandarizado de ciberseguridad para la Administración Pública Central, Institucional y Dependiente (APCID), el fortalecimiento del Centro de Respuesta a Incidentes Informáticos del Ecuador (EcuCERT) actualmente gestionado por la Agencia de Regulación y Control de las Telecomunicaciones (ARCOTEL), y la capacitación de los funcionarios de la APCID en la implementación del modelo de ciberseguridad.

    Se ha desarrollado la propuesta de normativa de protección de datos personales a través de la Dirección Nacional de Registro de Datos Públicos (DINARDAP), entidad adscrita al MINTEL y que lidera este esfuerzo, apoyada por sectores claves que ayudan en el desarrollo de dicha normativa, Este proyecto de ley se encuentra en fase de análisis por parte de la Asamblea Nacional. Asimismo, la Ley Orgánica de Telecomunicaciones determina la obligación de los prestadores de servicios de telecomunicaciones de garantizar en el ejercicio de su actividad la protección de datos de carácter personal, al igual que la Ley Orgánica del Sistema Nacional de Registros de Datos Públicos, garantiza la protección de los datos contenidos en todos los registros públicos.

    La legislación de protección al consumidor de Ecuador no protege del todo a los consumidores contra el fraude en línea y otras formas de delito cibernético o negligencia comercial y la Defensoría del Pueblo, entidad responsable de la protección del consumidor no tiene capacidades suficientes para abordar la protección del consumidor en línea.

    Se ha adoptado una legislación integral sobre propiedad intelectual de productos y servicios en línea y el Servicio Nacional de Derechos Intelectuales (SENADI) está designado como la entidad encargada de velar por su cumplimiento.

    En 2020 se emitió la Política de Datos Abiertos, de aplicación para las Instituciones de la Administración Pública, cuyo objetivo es consolidar los procesos de organización y publicación de los datos que generan estas instituciones. La finalidad de esta política es fortalecer la participación ciudadana, la transparencia gubernamental, mejorar la eficiencia en la gestión pública, promover la investigación, el emprendimiento y la innovación en lo que se refiere a tecnologías de la información. Como complemento de esta política el 15 de enero de 2021, se publicó en el Registro Oficial Suplemento nº 371 la Guía de Datos Abiertos que permite la implementación de las directrices de la política, y cuyo objetivo es proporcionar criterios técnicos y metodológicos para planificar, abrir, publicar y promover la utilización de los datos abiertos gubernamentales. Estas acciones estatales junto al aporte del sector privado, han permitido, hasta el 2020, tener los siguientes avances según el reporte de Sistema de Información y Estadística de los servicios de Telecomunicaciones (SIETEL) de la ARCOTEL:

    • La masificación del uso de las TIC alcanzó a un 60,7% de la población.

    • El uso del internet llegó a un 64,19% de la población.

    • La cantidad de abonados que usan teléfonos inteligentes (Smartphones) es de 65,3%. • Las líneas activas 4G existentes equivalen al 54,79% de la población y el total de líneas activas móviles del 85,75% de la población.

    • El número de cuentas de internet de banda ancha alcanzó 1’990.489.

    De la misma manera, el MINTEL a través del Proyecto emblemático de “Infocentros Comunitarios”, implementó y administra a nivel nacional 886 infocentros y megainfocentros, que dotan a 735 parroquias rurales y urbano marginales de lugares de desarrollo comunitarios apoyados en herramientas TIC, y desde donde se han capacitado a 1.262.960 personas como una de las estrategias para contribuir con su desarrollo personal y profesional. El incremento en la conectividad de la sociedad en su conjunto, acarrea vulnerabilidades que requieren de la atención de parte de los distintos actores involucrados. En el Ecuador, conscientes de la necesidad de protección en el ciberespacio, en julio del año 2014 se creó el EcuCERT, reconocido como un CIRT (Critical Incident Response Team) nacional oficial de acuerdo al índice mundial de ciberseguridad y perfiles de ciberbienestar (ITU, 2015) y miembro certificado FIRST (Forum of Incident Response and Security Teams).

    La Comunidad Objetivo del EcuCERT de ARCOTEL está conformada por: el sector de las telecomunicaciones nacionales y las instituciones públicas, así como aquellas del sector privado que demanden los servicios que EcuCERT ofrece. Si bien EcuCERT está reconocido como un punto de contacto nacional e internacional para la gestión de vulnerabilidades e incidentes, sus atribuciones se enmarcan en el sector de telecomunicaciones, conforme la Ley Orgánica de Telecomunicaciones que lo rige.

    En agosto de 2018, la ARCOTEL expidió la “Norma Técnica para Coordinar la Gestión de Incidentes y Vulnerabilidades que Afecten a la Seguridad de las Redes y Servicios de Telecomunicaciones”. En esta norma se establece: la definición de un catálogo de vulnerabilidades e incidentes, tiempos de respuesta, protocolo para la clasificación de la información, mecanismo para el intercambio de información sobre un evento de seguridad y auditorías de seguridad para identificar vulnerabilidades en la infraestructura de los Prestadores de Servicios de Telecomunicaciones. La falta de regulación en materia de ciberseguridad hace que la aplicación de la normativa excluya a otros sectores por lo que el accionar del EcuCERT es limitado fuera del ámbito de las telecomunicaciones; no obstante, se emiten reportes sobre vulnerabilidades e incidentes a varias instituciones del Estado; así como, consejos y recomendaciones técnicas.

    A nivel nacional existen Centros de Respuesta a Incidentes de Seguridad Informática (CSIRT) en las siguientes áreas: académica, defensa, sector privado y sector financiero. Es fundamental articular una estructura o sistema para coordinar sus acciones, y de ese modo, trabajar de manera integrada, en base a protocolos normativa y lineamientos nacionales. El EcuCERT debe fomentar la generación de más CSIRT coordinadores sectoriales, a fin de gestionar los incidentes de manera nacional e intersectorial.

    Actualmente, existen trece CSIRT en Ecuador, a través de los cuales; y, enmarcados en un trabajo colaborativo con EcuCERT, se han ejecutado varias acciones técnicas frente a incidentes a nivel nacional. Así mismo, el Ministerio de Gobierno y la Policía Nacional del Ecuador han proyectado la creación de un CSIRT específico que permita la gestión de incidentes informáticos en materia de seguridad pública y ciudadana. Para ello se establecerán los mecanismos formales de colaboración, coordinación, intercambio de información, responsabilidades y respuesta a incidentes, a través de un protocolo nacional de gestión de incidentes nacionales.

    Debido a la emergencia sanitaria que se atraviesa a nivel mundial producto de la pandemia por el COVID-19, los gobiernos se han visto obligados a tomar medidas emergentes como el teletrabajo, la teleducación y la telemedicina. En este sentido, organismos e instituciones públicos y privados, así como la población en general, han optado por dichas modalidades. A raíz de esta situación se evidencia un incremento exponencial de incidentes en el ciberespacio en lo que va de este año. En Ecuador, la mayoría de organismos, instituciones y ciudadanía, no están preparados adecuadamente para enfrentar los riesgos asociados a la seguridad de la información debido a la falta de regulación, políticas, conciencia y herramientas que permitan contar con un ciberentorno seguro.

    La cultura de la ciberseguridad en Ecuador no se ha consolidado en su totalidad por cuanto no existe una conciencia generalizada de los riesgos asociados al uso de la Tecnología de la Información y la Comunicación, en especial la Internet. Es decir, no se reconoce a la seguridad en el ciberespacio como un tema prioritario y esto implica que no se toman medidas proactivas para mejorarla. De igual manera, la baja implementación de buenas prácticas de ciberseguridad aumenta las susceptibilidades a diversas amenazas cibernéticas y delitos informáticos. El país no cuenta con una política nacional que impulse la inversión de recursos para la educación en ciberseguridad. Las mallas escolares no abordan la temática y las universidades no ofrecen carreras enfocadas a la misma. Sin embargo, las discusiones sobre la necesidad de incluir programas de ciberseguridad a nivel universitario han comenzado y existen pocas propuestas de maestrías en temas de ciberseguridad. Se espera que esta política impulse estos programas para que a futuro se pueda cubrir la demanda nacional de profesionales especializados.

    En Ecuador están disponibles certificaciones profesionales en ciberseguridad, la mayoría de estas por parte de entidades internacionales. Esto quiere decir que existe una dependencia internacional en lo que respecta a certificaciones tanto para personas como para instituciones. Además, existe un desconocimiento sobre las mismas y algunas son demasiado costosas para el público en general, razón por la cual en muchos casos no se adquieren estas certificaciones.

    A nivel gubernamental, una problemática constante es la obsolescencia de los equipos (hardware) y las restricciones presupuestarias para adquirir bienes de larga duración, así como, licencias de software, lo que se configura como un reto para la protección de la información y la labor de las entidades de control. Un mayor uso de la Internet implica un aumento en la vulnerabilidad de la ciudadanía que hace uso de esta herramienta, tanto en lo profesional como en lo cotidiano. El aprovechamiento de estas vulnerabilidades en el ciberespacio por parte de actores delictuales se ha convertido en una nueva forma de atentar contra los derechos de las personas. Los delitos informáticos son desterritorializados, es decir que no necesariamente se anclan a las naciones, teniendo capacidades transfronterizas que limitan el actuar policial basado en la circunscripción territorial. Este tipo de delito pasa completamente desapercibido para la víctima quien, por lo general, no es consciente de haber sido perjudicada. Lo que conlleva que la mayoría de veces quienes han sido afectados, no presenten la debida denuncia ante las autoridades.

    A esto se suma la ausencia de un marco regulatorio que permita conocer los procedimientos policiales y judiciales para identificar y judicializar delitos informáticos, así como la no adhesión a convenios internacionales existentes, que faciliten acciones de cooperación en el ámbito de delitos transnacionales en el ciberespacio.

    Las unidades dedicadas al seguimiento e investigación de delitos informáticos requieren incrementar el talento humano especializado en áreas tecnológicas y el número de personal existente para atender oportunamente los requerimientos de la ciudadanía. En este ámbito se requiere que el personal involucrado cuente con capacitación y especialización a nivel de educación superior con el objetivo de tener un dominio de las herramientas existentes y aprovechar al máximo la tecnología, en la lucha contra los delitos informáticos.

    La información que mantiene el Ministerio de Gobierno evidencia que el principal delito informático que afecta a la población es la apropiación fraudulenta por medios electrónicos. La siguiente tabla muestra el listado de delitos informáticos registrados en los años 2018, 2019 y 2020

    Gráfico 1: Principales delitos informáticos en Ecuador 2018-2019-2020

    (…)

    Fuente: UIDT-DNPJ

    En base al riesgo que representan estos delitos y el mal uso del ciberespacio y de las TIC para la ciudadanía y el bienestar de un país, surge la necesidad de estructurar unidades especializadas de las distintas carteras de Estado para identificar, diagnosticar, prevenir y contrarrestar incidentes cibernéticos y demás acciones ilegales que puedan presentarse en el ciberespacio.

    Cabe mencionar que las innovaciones en las plataformas de delito cibernético tienen una mayor facilidad de uso y la popularidad de estos servicios conlleva a ataques más eficientes, inclusive siendo empleados por todos los demás grupos de actores de amenaza.

    En el marco de la prevención de incidentes cibernéticos se ha priorizado la protección de infraestructuras críticas digitales y servicios esenciales. Salvaguardar estas infraestructuras y servicios no es una tarea nueva, por cuanto desde la óptica de soberanía y seguridad del Estado ya se identificaban áreas estratégicas a defender. Los nuevos enfoques de la seguridad implican un cambio en la óptica de estos espacios vitales para el Estado, los cuales, en torno a consideraciones de desarrollo, económicas, ambientales y de seguridad, amplían el alcance y la concepción de estas infraestructuras. A nivel regional, el Comité Interamericano contra el Terrorismo (CICTE), de la Organización de los Estados Americanos (OEA), define a las infraestructuras críticas digitales y servicios esenciales como aquellas instalaciones, sistemas y redes, así como servicios y equipos físicos y de tecnología de la información, cuya inhabilitación o destrucción tendría un impacto negativo sobre la población, la salud pública, la seguridad, la actividad económica, el medio ambiente, servicios de gobierno, o el eficaz funcionamiento de un Estado (…) y que cualquier interrupción de estos (…) tendría graves consecuencias para los flujos de servicios esenciales y el funcionamiento de las cadenas de suministros (OEA/Ser.L/X.2.15; CICTE/doc.1/15).

    En lo nacional es imperante desarrollar una concepción de sectores estratégicos que contemple el concepto de protección de la infraestructura crítica digital y servicios esenciales planteado por la OEA. En este sentido, el Ecuador tiene la necesidad de actualizar o desarrollar normativas y regulaciones nacionales que permitan fortalecer la protección de estas infraestructuras y sus servicios. El Estado ecuatoriano reconoce como una prioridad la protección de las infraestructuras críticas y servicios esenciales, por cuanto las mismas se ven amenazadas por hechos de origen antrópico y también natural. En el país, la mayoría de estas infraestructuras y servicios, tanto públicos como privados, dependen de las TIC y TO para su normal funcionamiento. La vulneración de estos sistemas, ocasionaría la falla e interrupción de servicios esenciales para la sociedad, con graves consecuencias para la población.

    Determinar las vulnerabilidades de estas infraestructuras requiere, en principio, su identificación y definición a nivel nacional; su protección es responsabilidad del Estado, de los operadores y de la sociedad civil en general, siendo entonces fundamental la coordinación y cooperación entre sectores públicos y privados.

    B. Análisis de Riesgos y Amenazas

    La identificación de las tendencias emergentes sobre las amenazas cibernéticas y la comprensión de la evolución de los delitos cibernéticos son importantes para la ciberseguridad nacional. El panorama de amenazas cibernéticas proporciona información sobre los desarrollos internacionales relacionados con las amenazas en este aspecto; sin embargo, cada país tiene sus propias peculiaridades. Es vital entender el panorama nacional de amenazas cibernéticas para desarrollar las capacidades de ciberseguridad necesarias y mitigar efectivamente los riesgos en el ciberespacio.

    Los ciberataques y ciberdelitos tienen como característica fundamental el ser difíciles de rastrear. Al ser ataques y delitos que se realizan remotamente, su persecución no puede valerse de procedimientos ordinarios, requiriéndose necesariamente de análisis o peritajes informáticos. Además de su carácter remoto, este tipo de ataques y/o delitos se valen de técnicas para ocultar la locación desde la cual se originan. Los ataques informáticos por ejemplo pueden utilizar filtros como proxy chains o virtual private networks (VPN) que evitan los enlaces directos entre las máquinas que realizan los ataques y los servidores de internet, esto hace que los protocolos de internet (IP por sus siglas en inglés) cambien cuando se navega por internet, dificultando a las instituciones del orden conocer la locación, incluso el país de donde se producen estos ataques.

    La deep web es un ejemplo de cómo los ciberdelincuentes anonimizan su conexión por internet, navegando por páginas web no indexadas a los motores de búsqueda y evitando los registros o memoria de los buscadores convencionales como Yahoo, Bing, Google, entre otros. Lo anterior, les permite realizar transacciones y demás actividades no autorizadas por ley en el ámbito cibernético. A esto se suma la dark web que consiste en las páginas web que no pueden ser indexadas por motores de búsqueda y para acceder a ellas se necesita software y configuraciones específicas, manteniendo enlaces encriptados entre el usuario y los servidores de internet.

    El ciberespacio además de permitir el surgimiento de nuevos tipos de delitos, han perfeccionado delitos de tipificaciones no tan actuales, como es el caso de la pornografía infantil, la cual implica la representación, por cualquier medio, de un niño involucrado en actividades sexuales explícitas reales o simuladas o de sus partes íntimas con fines sexuales (UNCRC La Convención de las Naciones Unidas sobre los Derechos del Niño, 2002). Las páginas web del deep web y dark web han permitido la consolidación de comercialización de material pornográfico, de armas, de drogas, trata de personas y tráfico de personas. Se han creado verdaderos mercados ilícitos virtuales y anónimos dentro del internet, los cuales se han convertido en maneras de delinquir.

    En definitiva, prácticamente todos los delitos comunes se han potenciado con el uso de internet, de las tecnologías comunicacionales y las técnicas de anonimato. Delitos como la extorsión, anteriormente se lo consideraba ligado al secuestro de las personas o al robo de sus bienes tangibles, pero al momento se dan extorsiones en línea, ejerciendo presión a la víctima sobre su información personal y digital, amenazándola con difundir o eliminar su información, obteniendo réditos económicos a cambio de no publicarla. El Ecuador es vulnerable ante las amenazas cibernéticas, esto de acuerdo al Índice Global de Ciberseguridad (GCI), emitido por la ITU, publicado el 09 de julio de 2019, que ubica al país en el puesto 98 de 193, siendo 193 el país con mayores vulnerabilidades a nivel mundial. El número de ataques cibernéticos dirigidos para Ecuador, detectados por la firma de antivirus Kaspersky Lab (2020), refleja que el Ecuador se encuentra en el puesto número 89 de países más atacados en el mundo.

    Figura 2: Índice Global de Ciberseguridad (GCI por sus siglas en inglés)

    (…)

    Fuente: Índice Global de Ciberseguridad (GCI)

    La encuesta multipropósito TIC 2019, realizada por el Instituto Nacional de Estadísticas y

    Censos (INEC), refleja que el porcentaje de hogares con acceso a la Internet se ha incrementado en los últimos años; en 2019 el 45.5% de hogares a nivel nacional tuvieron acceso a internet. Esta misma encuesta indica que los niños, niñas y adolescentes entre 5 y 17 años, utilizan el internet principalmente desde su hogar (64.5%), desde centros de acceso público (15%) y desde su institución educativa (13.1%). En menor medida lo usan en el trabajo o en otros lugares.

    En cuanto al uso de teléfono celular inteligente, en 2019 el 12.2% de personas que tienen teléfono celular inteligente, son niños, niñas y adolescentes entre 5 y 15 años de edad, frente a 1,2% de niños, niñas y adolescentes entre 5 y 15 años de edad que tenían teléfono celular inteligente en el año 2012.

    Sin duda, la tecnología y la experiencia digital tienen muchos aspectos positivos, sin embargo, la exposición al mundo digital sin un entorno seguro, implica muchos riesgos, en particular, para niños, niñas y adolescentes: desde trastornos relacionados con el juego, riesgos financieros, recopilación y monetización de datos personales, ciberacoso, ciberbulling, discursos de odio, racismo, violación a la intimidad y/o datos personales y exposición a conductas o contenidos inapropiados, entre otros.

    Según la firma ESET, el Ecuador se encuentra entre los 10 países de América Latina más afectados por software malicioso (malware).

     Gráfico 2: Detecciones de Ransomware por país

    (…)

    Fuente: ESET Security Report Latinoamerica 2020

    En el Informe anual de esta firma; Security Report Latinoamerica 2020 se menciona que la seguridad no solo aborda al área tecnológica, también es necesario complementarla con políticas, planes que permitan gestionar adecuadamente la seguridad de la información.

    Esto último se ve reflejado precisamente en que casi el 98% de las empresas en la región cuenta con algún control basado en tecnología. Sin embargo, aún el 39% de las empresas no cuenta con políticas de seguridad y apenas un 28% clasifica su información.

    Gráfico 3: Niveles de implementación de prácticas de gestión para la seguridad por país

    (…)

    Fuente: ESET Security Report (ESR) 2020

    En el informe anual Security Report (ESR) del 2019, ofrece un panorama sobre el estado de la seguridad digital en los sectores gubernamental, financiero, telecomunicaciones, tecnología y salud en la región. El informe evidencia que la adopción de las medidas y tecnologías de protección es mayor en el sector financiero, ubicándose en los dos últimos puestos los sectores de salud y de gobierno.

    Gráfico 4: Implementación de medidas de protección de seguridad por sector en Latinoamérica, 2019.

    (…)

    Fuente: ESET Security Report 2019.

    EDR: Endpoint Detection and Response, 2AF: Segundo factor de Autenticidad; Cifrado: En el año 2019, según el informe realizado por la firma consultora NRD Cyber Security, “Panorama de Amenaza Cibernética y Revisión de la Capacidad de la Ciberseguridad en Ecuador, se identificó que las 10 principales ciberamenazas que afectan al país son:

    suplantación de identidad, correo no deseado, software malicioso, fuga de información, amenaza interna, manipulación física, robo de identidad, ataques de aplicaciones web, programa de secuestro de datos, denegación de servicio, ataques basados en la web, violaciones de datos, redes de bots, minería de criptomonedas maliciosa y espionaje cibernético (6). Entre estas amenazas se mencionan tanto vectores de ataque como acciones maliciosas, los cuales son empleados por una variedad de actores. Los vectores de ataque permiten ejecutar acciones contra los países, sus instituciones, empresas y ciudadanos. El ciberespionaje y/o ciber sabotaje facilita a los actores de amenaza a mejorar su posición estratégica, geopolítica, económica o tecnológica, pudiendo inclusive para este fin llegar a interrumpir la normal prestación y el funcionamiento de la infraestructura crítica y servicios esenciales. Así mismo, algunos de estos actores están en condiciones de obtener, encriptar y eliminar información; impedir accesos y, de este modo, generar afectaciones a la sociedad en su conjunto.

    Entre estos actores, uno de los más activos en el Ecuador son los delincuentes cibernéticos. Su principal motivo es la monetización, por lo tanto, dan lugar a amenazas como la suplantación de identidad, software malicioso, entre otros, con el objetivo de atacar a víctimas con un alto potencial de réditos. Otro actor son los Estados naciones, que han desarrollado capacidades ofensivas cibernéticas muy complejas, las que emplean con fines militares y geopolíticos. La desinformación es otra amenaza, que puede originarse desde los Estados naciones o por parte de los actores internos (insiders), por cuanto el ciberespacio les permite aumentar la velocidad, la escala y la intensidad de estas campañas. Las corporaciones también se consideran actores que utilizan diferentes vectores a fin de obtener conocimiento competitivo. Por otra parte, los hacktivistas constituyen un grupo de agentes de amenaza con diversas motivaciones y sus actividades se centran principalmente en la lucha por una causa en particular. Sus objetivos suelen ser el gobierno, las organizaciones del sector público y las empresas. Los actores internos actúan maliciosa o inadvertidamente con diversas motivaciones, entre estas las ganancias financieras; pero, son las acciones no intencionales de los funcionarios y empleados las que están causando la mayor parte del daño a entidades y empresas. Algunos expertos en ciberseguridad ubican a este grupo de agentes de amenaza como una segunda fuente de riesgo después de los ciberdelincuentes. Todas estas acciones y situaciones llevaron a la nominación, desarrollo y descripción de los pilares que conforman la política que nos ocupa.

    PILARES

    Los competidores estratégicos del Ecuador, conducen campañas cibernéticas para erosionar nuestro ciberespacio, amenazan nuestra infraestructura crítica y reducir nuestra prosperidad económica. El Gobierno del Ecuador debe perseguir, métodos innovadores para aprovechar nuestras capacidades y recursos existentes en el manejo estratégico de los riesgos en el ciberespacio. Se han creado pilares que aseguran la existencia y disponibilidad de las funciones críticas de la nación, a la vez que promueven eficacia, innovación, comunicación confiable y prosperidad económica. Estos Pilares cibernéticos son consistentes con nuestros valores nacionales e intentan proteger las libertades de nuestros ciudadanos.

    I) Gobernanza de la ciberseguridad

    Los actores involucrados y sus interacciones en el sistema de ciberseguridad son la base para la organización en este ámbito. Es por esto que es necesario la conformación de un cuerpo colegiado con el propósito de articular los lineamientos y acciones que aportan al fortalecimiento de la ciberseguridad en el país, que será el “Comité Nacional de Ciberseguridad”.

    En la actualidad existe un Grupo Interinstitucional de Ciberseguridad para el desarrollo de la política compuesto por las siguientes instituciones: el Ministerio de Telecomunicaciones y Sociedad de la Información (MINTEL), quién preside el grupo, el Ministerio de Gobierno (MDG), el Ministerio de Defensa (MDN), el Centro de Inteligencia Estratégica (CIES) y el Ministerio de Relaciones Exteriores y Movilidad Humana (MREMH).

    El Gabinete Sectorial de Seguridad elaboró una propuesta para la creación de cuerpos colegiados con roles, funciones y responsabilidades determinadas. Uno de ellos es el Comité Nacional de Ciberseguridad, cuya estructura sería la misma que la que actualmente tiene el Grupo Interinstitucional de Ciberseguridad, presidida por MINTEL. La emisión de la política deberá incluir una disposición de creación del cuerpo colegiado.

    II) Sistemas de información y gestión de incidentes

    Este pilar se enfoca en la protección de los sistemas que permiten el procesamiento de datos en todo nivel, por cuanto son fundamentales para las actividades de entidades, empresas y  ciudadanía. En este sentido, se considera fundamental la atención a incidentes informáticos que afecten a estos sistemas impactando la confidencialidad, integridad y disponibilidad de los datos y la entrega y calidad de los servicios.

    En este aspecto, el Ecuador mantiene una estructura para el manejo de incidentes de seguridad informática, siendo el EcuCERT la instancia de coordinación nacional. En consecuencia, se fortalecerá la normativa vigente a fin de que ECUCERT pueda establecer mecanismos de articulación y coordinación con los CERT existentes en el país. Este pilar enmarca acciones dirigidas a potenciar la capacidad del país en base a la articulación de los distintos actores, como, instituciones públicas, sector privado, academia, sociedad civil para la atención de eventos en el ciberespacio.

    III) Protección de la infraestructura crítica digital y servicios esenciales

    Las acciones que se generan en torno a este pilar están encaminadas a construir las condiciones necesarias de robustez y resiliencia para garantizar el normal funcionamiento de las infraestructuras críticas digitales y minimizar el impacto de incidentes en las mismas. Estas infraestructuras pueden ser vulneradas por medios informáticos, tecnológicos y a través de redes de datos en el ciberespacio. Las repercusiones de estas vulneraciones no se limitan a la parte digital, sino que afectan la parte física en lo referente a su operatividad, la cual se entiende como vital para el desarrollo del país. Este pilar considera la existencia de infraestructuras críticas digitales y servicios esenciales en diversos ámbitos, cuya afectación, denegación, interrupción o destrucción puede tener consecuencias importantes para los ecuatorianos. La economía, salud pública, sistemas electorales, seguridad, el funcionamiento del Estado y del sector privado, pueden verse vulnerados directamente, impactando el bienestar de la ciudadanía en general. La protección de estas infraestructuras y servicios exige el trabajo coordinado de todos los actores privados y públicos involucrados, asegurando así su funcionamiento y la entrega de servicios esenciales para la ciudadanía. Por otro lado, su defensa es una parte primordial de la garantía de la integridad territorial y la soberanía nacional.

    IV) Soberanía y defensa

    Este pilar se fundamenta en el reconocimiento del ciberespacio como un dominio, donde las vulneraciones a los activos digitales y sus afectaciones en el entorno físico, pueden atentar contra la ciudadanía y el Estado en su totalidad. La ciberdefensa es un complemento de la ciberseguridad, que provee la defensa contra las amenazas en el ciberespacio en beneficio de toda la población. Ésta se fundamenta en las líneas de acción estratégica de la Política de Defensa 2018 y en el respeto al Derecho Internacional.

    El Ecuador promueve una cultura de paz en este dominio, manteniendo como principios la transparencia y la cooperación en ciberdefensa. Este pilar propende el fortalecimiento de la seguridad internacional y el fomento de la confianza entre los Estados, impulsando el diálogo regional e internacional en este ámbito.

    El ser humano constituye el eje central de esta política; y, en ese sentido, defender las infraestructuras críticas digitales, tanto en el Ecuador como en las sedes diplomáticas, agregadurías militares, oficinas consulares y oficinas comerciales, se consolida como uno de los objetivos de la ciberdefensa.

    La Defensa Nacional contribuirá al desarrollo de la capacidad nacional de resiliencia, para hacer frente a las amenazas que se presenten en el ciberespacio, manteniendo la paz y protegiendo a la población y sus recursos.

    V) Seguridad pública y ciudadana

    Como parte de una competencia exclusiva del Estado, este pilar obedece a las acciones que se desarrollan para garantizar y proteger los derechos humanos y las libertades ciudadanas, así como la protección de las personas ante un amplio espectro de riesgos y amenazas en el ámbito de los delitos informáticos en el ciberespacio. Para ello se busca afianzar la convivencia social pacífica en todo ámbito, previniendo, avizorando y contrarrestando de acuerdo a las facultades legales, cualquier acción que atente o pretenda transgredir las normas establecidas, con especial énfasis en el dominio digital.

    El ordenamiento jurídico penal ecuatoriano abordará concomitantemente el delito cibernético y garantizará la protección de los derechos fundamentales y el estado de derecho.

    VI) Diplomacia en el ciberespacio y cooperación internacional

    Las amenazas que enfrentamos en el ciberespacio son, en mayor medida, transnacionales y la única forma de abordarlas de manera efectiva es a través del diálogo, la cooperación internacional y la creación y fortalecimiento de la confianza. En este sentido, el rol de la diplomacia se vuelve relevante, posicionando al Ecuador en la agenda digital global y regional, en varias esferas, tales como la seguridad internacional, los derechos humanos, el desarrollo sostenible, la cooperación internacional, el comercio mundial, entre otros.

    Además, la diplomacia reviste de tal importancia debido a que en este tema están en juego cuestiones geopolíticas como la gobernanza del Internet, la seguridad e incluso el ciberconflicto.

    Se debe garantizar la calidad de los procesos y seguridad de la información de los órganos del servicio exterior, agregadurías, procesos electorales, oficinas comerciales y, en general, servicios por delegación fuera del país. Para cumplir con este objetivo se deberá realizar el desarrollo normativo, tecnológico y la actualización pertinente de procesos y servicios.

    Se reconocen los esfuerzos de la comunidad internacional para el desarrollo de medidas de fomento de la confianza, especialmente en el ámbito interamericano, con el objetivo de minimizar las situaciones de conflictos en el ciberespacio a través de la diplomacia.

    VII) Cultura y educación de la ciberseguridad

    Las acciones enmarcadas en este pilar promulgan el desarrollo educativo en el ámbito de seguridad en el ciberespacio y fomentan la construcción de una cultura de ciberseguridad que va desde la ciudadanía hasta las entidades públicas o privadas, con el objeto de construir una cultura y generar una conciencia compartida de los riesgos y amenazas en el ciberespacio. Es fundamental que el país trabaje en el desarrollo de capacidades de los ciudadanos, en todos los niveles de educación, al incluir elementos específicos de la educación en cibernética. El fomento de habilidades en ese ámbito puede desarrollarse en todo momento de la vida educativa de una persona, lo que coadyuvará a contar con una fuerza laboral preparada. El Estado ecuatoriano debe formular políticas educativas al respecto e impulsar el aumento de la oferta académica de tercer y cuarto nivel relacionada directamente con la temática. Así también, es necesario que las universidades, centros de investigación y otras instituciones académicas incluyan a la educación en cibernética entre sus prioridades de investigación.

    Este pilar se basa en la necesidad de establecer buenas prácticas y fortalecer el conocimiento de la población en ciberseguridad, por cuanto los usuarios son el principal objetivo por proteger. En este ámbito, las personas son consideradas la primera línea de protección ante los riesgos y amenazas en el ciberespacio.

    OBJETIVOS Y LÍNEAS DE ACCIÓN

    La política nacional de ciberseguridad establecerá lineamientos para la coordinación de actividades de todas las partes interesadas relevantes en seguridad cibernética, quienes tendrán funciones, responsabilidades claras respaldadas con capacidades operativas suficientes.

    OBJETIVO GENERAL

    Construir y fortalecer las capacidades nacionales que permitan garantizar el ejercicio de los derechos y libertades de la población y la protección de los bienes jurídicos del Estado en el ciberespacio, encaminando acciones para garantizar un ciberespacio seguro.

    Este objetivo contribuirá de manera directa al desarrollo social, económico y humano del país, así como a la creación de una confianza digital fundamental para favorecer el intercambio de información y, en consecuencia, de bienes y servicios en línea, fortaleciendo el compromiso del estado con la ciberseguridad, la cual tiene un campo de aplicación que abarca todas las industrias y todos los sectores, tanto vertical como horizontalmente.

    OBJETIVOS ESPECÍFICOS Y LÍNEAS DE ACCIÓN

    1. Promover la cooperación entre el sector público y privado a nivel nacional fomentando la confianza y generando respuestas comunes a los riesgos y amenazas del ciberespacio.

    1.1. Establecer un marco normativo e institucional con funciones y responsabilidades de los actores gubernamentales para la ciberseguridad;

    1.2. Adoptar un marco de gestión del riesgo cibernético e integrarlo con un enfoque de resiliencia y seguridad nacional.

    1.3. Articular los diferentes planes, programas y proyectos con las instituciones del sector público y los demás actores involucrados en esta temática.

    1.4. Impulsar la formulación y promulgación de normativa y la adopción de buenas prácticas que viabilicen la interacción y trabajo colaborativo entre los diversos actores del ciberespacio.

    2. Potenciar las capacidades de detección, previsión, prevención y gestión de los incidentes cibernéticos, al igual que el manejo de crisis de ciberseguridad de manera oportuna, efectiva, eficiente y coordinada.

    2.1. Desarrollar e implementar procesos y herramientas comunes de gestión y atención a incidentes cibernéticos a nivel nacional sobre la base de protocolos de gestión, modelamiento de escenarios de posible ocurrencia e impacto.

    2.2. Establecer mecanismos de coordinación interinstitucional que permitan el intercambio efectivo de información y el reporte de incidentes cibernéticos.

    2.3. Definir e implementar procedimientos interinstitucionales que fortalezcan la resiliencia cibernética.

    2.4. Impulsar el desarrollo y/o actualización de un marco normativo para el sistema nacional de gestión y atención de incidentes en el ciberespacio y definir competencias claras para cada uno de los actores involucrados.

    2.5. Fortalecer la capacidad de los CSIRT como elementos clave del sistema nacional de gestión y atención de incidentes cibernéticos. 2.6. Fortalecer la capacidad de protección de datos, información, activos y servicios digitales en el sector público garantizando así la seguridad de los mismos y confianza en el ciberespacio.

    2.7. Implementar sistemas de enlace prioritarios normalizados ante crisis cibernéticas

    3. Proteger la infraestructura crítica digital del Estado ante amenazas y riesgos en el ciberespacio para garantizar su adecuado funcionamiento y la entrega de servicios esenciales. 3.1. Establecer una metodología compatible con estándares internacionales para la evaluación de riesgos y amenazas.

    3.2. Establecer estrategias para evaluar el estado de la ciberseguridad a nivel estatal.

    3.3. Identificar y definir la infraestructura crítica digital (ICD) a nivel nacional, teniendo en cuenta que engloba múltiples sectores, basándose en consideraciones políticas, sociales, económicas y ambientales.

    3.4. Reducir el nivel de vulnerabilidades identificadas en la infraestructura crítica digital, fundamentado en la gestión de riesgos. 3.5. Establecer e implementar un modelo de coordinación entre las instituciones del Estado y los propietarios de las ICD, en base a la construcción de confianza.

    3.6. Fortalecer la capacidad de resiliencia para asegurar la disponibilidad de las IC y servicios esenciales.

    3.7. Fortalecer la capacidad de defensa de las áreas reservadas de seguridad e ICD en el ciberespacio en línea con la política exterior ecuatoriana.

    3.8. Organizar ejercicios nacionales de ciberseguridad para evaluar la efectividad de los planes de contingencia establecidos.

    3.9. Simular escenarios de crisis cibernética para la defensa y evaluar la respuesta de las mismas.

    3.10. Impulsar un marco normativo y de buenas prácticas que fundamente la protección y defensa de las infraestructuras críticas digitales y servicios esenciales.

    3.11. Monitorizar, analizar, mitigar y neutralizar las amenazas para reducir el nivel de riesgos en el ciberespacio con impacto en la soberanía del país.

    3.12. Fortalecer las capacidades institucionales y operativas de defensa, exploración y respuesta ante la situación de ciberataques.

    4. Resguardar la seguridad pública y ciudadana en el ciberespacio, previniendo y contribuyendo a la investigación de delitos cibernéticos, para el normal desarrollo de las actividades públicas y privadas, y el ejercicio de los derechos fundamentales de la ciudadanía, en un entorno de confianza.

    4.1. Proteger los activos digitales tanto públicos como privados dentro del ámbito de delitos informáticos que atenten a la seguridad ciudadana en el ciberespacio.

    4.2. Fortalecer las capacidades institucionales y operativas para la prevención, previsión y respuesta ante la suscitación de ciberdelitos.

    4.3. Establecer y promover mecanismos de denuncia del delito cibernético.

    4.4. Adaptar el ordenamiento penal interno relativo al cibercrimen con los estándares internacionales.

    5. Potenciar la diplomacia ecuatoriana en el ámbito de la ciberseguridad por medio de los espacios de cooperación a nivel regional e internacional, en línea con el interés nacional y la política exterior del Ecuador. 5.1. Insertar al Ecuador en la agenda digital global y regional.

    5.2. Representar al Ecuador en las negociaciones sobre la temática en foros internacionales y posicionar la agenda digital en las relaciones bilaterales, regionales y multilaterales.

    5.3. Liderar el camino para la adhesión del Ecuador a la Convención de Budapest y otros instrumentos internacionales, que respondan al interés nacional.

    5.4. Transversalizar los asuntos digitales nacionales en el marco de cumplimiento de la Agenda 2030 para el Desarrollo Sostenible.

    5.5. Fortalecer la cooperación internacional en asuntos de ciberseguridad.

    6. Generar una cultura de ciberseguridad y promover el uso responsable del ciberespacio en el Ecuador. 6.1. Fomentar la conciencia ciudadana, empleo responsable de las tecnologías y promoción de conocimiento en el ámbito de la ciberseguridad., así como también promover campañas de sensibilización sobre las distintas formas de violencia y delitos cibernéticos para su prevención.

    6.2. Impulsar planes, proyectos e iniciativas de educación en ciberseguridad en todos los niveles, que contribuyan al fortalecimiento en la construcción de las capacidades nacionales.

    RESPONSABILIDADES DE LAS ÁREAS DE OPERACIÓN.

    Para cumplir con la ejecución de la Política Nacional de Ciberseguridad (PNC), se precisa establecer responsables directos y permanentes para cada uno de los pilares y objetivos establecidos. Además, es necesaria la coordinación estratégica de cada una de las instituciones responsables en materia de ciberseguridad, a fin de mejorar la eficiencia y eficacia en el ámbito de la Ciberseguridad. Las responsabilidades acordes a las necesidades y en función de los roles y tareas que cada institución debe cumplir, quedan establecidas de la siguiente manera.

    (…)

    SEGUIMIENTO Y MONITOREO DE LAS LÍNEAS DE ACCIÓN

    La definición de objetivos específicos, metas, indicadores y responsables descritos a continuación, corresponden a las líneas de acción definidas a corto y mediano plazo. Estas líneas se plantean hasta el año 2023 y que deben implementarse en las instituciones de la administración pública, a partir de la aprobación de la presente política.

    En este sentido el indicador general de gestión de esta política se enmarca en el Índice de Ciberseguridad Global (GCI), el cual se lo define en base a 25 indicadores, los cuales están repartidos dentro de 5 pilares definidos en la Agenda Global de Ciberseguridad de la ITU. La Agenda Global de Ciberseguridad de la ITU es un marco para la cooperación internacional orientada a mejorar la confianza y la seguridad en la sociedad de la información.

    Se sugiere la revisión del presente instrumento y de la normativa relacionada directa o indirectamente con la política cada 3 años, o cuando se produzca un cambio de mandato institucional. Así se podrá verificar la eficacia y eficiencia de las líneas de acción establecidas, las cuales permitirán al país lograr una mejor resiliencia cibernética nacional y garantizar el bienestar de una nación.

    (…)

    REFERENCIAS

    CCN-CERT CENTRO CRIPTOLÓGICO NACIONAL. (2015). HTTPS://WWW.CCN-CERT.CNI.ES/. OBTENIDO DE HTTPS://WWW.CCN-CERT.CNI.ES/PDF/GUIAS/GLOSARIO-DE-TERMINOS/22-401-DESCARGARGLOSARIO/FILE.HTML

    E-GOVERNMENT SURVEY 2020. (JULIO DE 2020).

    HTTPS://PUBLICADMINISTRATION.UN.ORG/EN/RESEARCH/UN-E-GOVERNMENT-SURVEYS.

    ESET. (2020). SECURITY REPORT LATINOAMERICA 2020. OBTENIDO DE HTTPS://WWW.WELIVESECURITY.COM/WP-CONTENT/UPLOADS/2020/08/ESET-SECURITY-REPORTLATAM_2020.PDF

    INTERPOL. (2017). INFORME ANUAL DE INTERPOL – 2017.

    JOINT COMMITTEE ON HUMAN RIGHTS. (2002).

    HTTPS://PUBLICATIONS.PARLIAMENT.UK/PA/JT200203/JTSELECT/JTRIGHTS/117/117.PDF. OBTENIDO DE HTTPS://PUBLICATIONS.PARLIAMENT.UK/PA/JT200203/JTSELECT/JTRIGHTS/117/117.PDF

    UIT – UNIÓN INTERNACIONAL DE TELECOMUNICACIONES. (NOVIEMBRE DE 2019). ITU. OBTENIDO DE HTTPS://WWW.ITU.INT/ES/MEDIACENTRE/PAGES/2019-PR19.ASPX

    UNCRC LA CONVENCIÓN DE LAS NACIONES UNIDAS SOBRE LOS DERECHOS DEL NIÑO. (2002).

    HTTPS://PUBLICATIONS.PARLIAMENT.UK/PA/JT200203/JTSELECT/JTRIGHTS/117/117.PDF. OBTENIDO DE HTTPS://PUBLICATIONS.PARLIAMENT.UK/PA/JT200203/JTSELECT/JTRIGHTS/117/117.PDF

    Memorando Nº MINTEL-SGERC-2021-0134-M

    Quito, D.M., 27 de abril de 2021

    PARA: Sr. Econ. Julio Cesar Muñoz Bravo, Viceministro de Tecnologías de la Información y Comunicación

    ASUNTO: Solicitud de aprobación del Informe Técnico de motivación de la Política Nacional de Ciberseguridad y elaboración del Acuerdo Ministerial

    De mi consideración:

    El Ministerio de Telecomunicaciones y de la Sociedad de la Información (MINTEL), fue convocado a la Quinta sesión ordinaria del Gabinete Sectorial de Seguridad del 08 de mayo de 2019 como invitado, en las resoluciones emitidas por el Gabinete Sectorial de Seguridad, se destaca la resolución nº GSS-509, en la que se dispone que el Ministerio de Telecomunicaciones y de la Sociedad de la Información, deberá elaborar la Política Nacional de Ciberseguridad.

    En consecuencia, dado que la ciberseguridad es una disciplina que está dentro del ámbito de la seguridad de la información y considerando que es un tema transversal, el Ministerio de Telecomunicaciones y de la Sociedad de la Información, como ente rector y en base a sus competencias lideró el desarrollo de la Política Nacional de Ciberseguridad, a través de un “Grupo interinstitucional de Ciberseguridad”, conformada por el Ministerio de Gobierno (MDG), el Ministerio de Defensa (MDN), el Centro de Inteligencia Estratégica (CIES) y el Ministerio de Relaciones Exteriores y Movilidad Humana (MREMH).

    Una vez que la Política Nacional de Ciberseguridad fue aprobado por el Gabinete Sectorial de Seguridad, en su Vigésima Sesión Ordinaria de 1 de abril de 2021, le corresponde al Ministerio de Telecomunicaciones su publicación a través de un Acuerdo Ministerial.

    En este contexto, el MINTEL a través de la Subsecretaría de Gobierno Electrónico y Registro Civil, ha elaborado el Informe técnico de motivación de la Política Nacional de Ciberseguridad que se adjunta a la presente.

    En tal virtud se solicita su aprobación y se disponga a la Coordinación General Jurídica la elaboración del Acuerdo Ministerial.

    (…)

    1. ANTECEDENTES

    1.1 Marco Normativo Nacional

    Las facultades de interactuar en el ámbito de ciberseguridad las define la normativa nacional. La Constitución de la República del Ecuador garantiza la libre comunicación de las personas, la inviolabilidad de la información, la protección de datos personales y el derecho a la intimidad, en concordancia con la Ley Orgánica de Telecomunicaciones. Así mismo se garantiza, la seguridad integral y la prevención de riesgos y amenazas de todo orden, tanto desde la Constitución como desde la Ley de Seguridad Pública y del Estado. En ese contexto, la Política Nacional de Ciberseguridad fue construida y está amparada en el siguiente marco jurídico.

    A. CONSTITUCIÓN DE LA REPÚBLICA

    Artículo 3.- Son deberes primordiales del Estado:

    1. Garantizar sin discriminación alguna el efectivo goce de los derechos establecidos en la Constitución y en los instrumentos internacionales, en particular la educación, la salud, la alimentación, la seguridad social y el agua para sus habitantes.

    2. Garantizar y defender la soberanía nacional.

    3. Fortalecer la unidad nacional en la diversidad.

    4. Garantizar la ética laica como sustento del quehacer público y el ordenamiento jurídico.

    5. Planificar el desarrollo nacional, erradicar la pobreza, promover el desarrollo sustentable y la redistribución equitativa de los recursos y la riqueza, para acceder al buen vivir.

    6. Promover el desarrollo equitativo y solidario de todo el territorio, mediante el fortalecimiento del proceso de autonomías y descentralización.

    7. Proteger el patrimonio natural y cultural del país.

    8. Garantizar a sus habitantes el derecho a una cultura de paz, a la seguridad integral y a vivir en una sociedad democrática y libre de corrupción;

    Artículo 16.- Todas las personas, en forma individual o colectiva, tienen derecho a:

    1. Una comunicación libre, intercultural, incluyente, diversa y participativa, en todos los ámbitos de la interacción social, por cualquier medio y forma, en su propia lengua y con sus propios símbolos.

    2. El acceso universal a las tecnologías de información y comunicación.

    3. La creación de medios de comunicación social, y al acceso en igualdad de condiciones al uso de las frecuencias del espectro radioeléctrico para la gestión de estaciones de radio y televisión públicas, privadas y comunitarias, y a bandas libres para la explotación de redes inalámbricas.

    4. El acceso y uso de todas las formas de comunicación visual, auditiva, sensorial y a otras que permitan la inclusión de personas con discapacidad. 5. Integrar los espacios de participación previstos en la Constitución en el campo de la comunicación;

    Artículo 66.- Se reconoce y garantiza a las personas:

    (…)

    19. El derecho a la protección de datos de carácter personal, que incluye el acceso y la decisión sobre información y datos de este carácter, así como su correspondiente protección. La recolección, archivo, procesamiento, distribución o difusión de estos datos o información requerirán la autorización del titular o el mandato de la ley.

    (…)

    21. El derecho a la inviolabilidad y al secreto de la correspondencia física y virtual; ésta no podrá ser retenida, abierta ni examinada, excepto en los casos previstos en la ley, previa intervención judicial y con la obligación de guardar el secreto de los asuntos ajenos al hecho que motive su examen. Este derecho protege cualquier otro tipo o forma de comunicación;

    Artículo 158.- Las Fuerzas Armadas y la Policía Nacional son instituciones de protección de los derechos, libertades y garantías de los ciudadanos. Las Fuerzas Armadas tienen como misión fundamental la defensa de la soberanía y la integridad territorial.- La protección interna y el mantenimiento del orden público son funciones privativas del Estado y responsabilidad de la Policía Nacional.- Las servidoras y servidores de las Fuerzas Armadas y la Policía Nacional se formarán bajo los fundamentos de la democracia y de los derechos humanos, y respetarán la dignidad y los derechos de las personas sin discriminación alguna y con apego irrestricto al ordenamiento jurídico;

    Artículo 313.- El Estado se reserva el derecho de administrar, regular, controlar y gestionar los sectores estratégicos, de conformidad con los principios de sostenibilidad ambiental, precaución, prevención y eficiencia. Los sectores estratégicos, de decisión y control exclusivo del Estado, son aquellos que por su trascendencia y magnitud tienen decisiva influencia económica, social, política o ambiental, y deberán orientarse al pleno desarrollo de los derechos y al interés social. Se consideran sectores estratégicos la energía en todas sus formas, las telecomunicaciones, los recursos naturales no renovables, el transporte y la refinación de hidrocarburos, la biodiversidad y el patrimonio genético, el espectro radioeléctrico, el agua, y los demás que determine la ley;

    Artículo 393.- El Estado garantizará la seguridad humana a través de políticas y acciones integradas, para asegurar la convivencia pacífica de las personas, promover una cultura de paz y prevenir las formas de violencia y discriminación y la comisión de infracciones y delitos. La planificación y aplicación de estas políticas se encargará a órganos especializados en los diferentes niveles de gobierno;

    B. CÓDIGO ORGÁNICO INTEGRAL PENAL (COIP)

    Artículo 103.- Pornografía con utilización de niñas, niños o adolescentes.- La persona que fotografíe, filme, grabe, produzca, transmita o edite materiales visuales, audiovisuales, informáticos, electrónicos o de cualquier otro soporte físico o formato que contenga la representación visual de desnudos o semidesnudos reales simulados de niñas, niños o adolescentes en actitud sexual; será sancionada con pena privativa de libertad de trece a dieciséis años.

    Si la víctima, además, sufre algún tipo de discapacidad o enfermedad grave o incurable, se sancionará con pena privativa de libertad de dieciséis a diecinueve años.

    Cuando la persona infractora sea el padre, la madre, pariente hasta el cuarto grado de consanguinidad o segundo de afinidad, tutor, representante legal, curador o pertenezca al entorno íntimo de la familia; ministro de culto, profesor, maestro, o persona que por su profesión o actividad haya abusado de la víctima, será sancionada con pena privativa de libertad de veintidós a veintiséis años;

    Artículo 104.- Comercialización de pornografía con utilización de niñas, niños o adolescentes.- La persona que publicite, compre, posea, porte, transmita, descargue, almacene, importe, exporte o venda, por cualquier medio, para uso personal o para intercambio pornografía de niños, niñas y adolescentes, será sancionada con pena privativa de libertad de diez a trece años;

    Artículo 178.- Violación a la intimidad.- La persona que, sin contar con el consentimiento o la autorización legal, acceda, intercepte, examine, retenga, grabe, reproduzca, difunda o publique datos personales, mensajes de datos, voz, audio y vídeo, objetos postales, información contenida en soportes informáticos, comunicaciones privadas o reservadas de otra persona por cualquier medio, será sancionada con pena privativa de libertad de uno a tres años.

    No son aplicables estas normas para la persona que divulgue grabaciones de audio y vídeo en las que interviene personalmente, ni cuando se trata de información pública de acuerdo con lo previsto en la ley;

    Artículo 190.- Apropiación fraudulenta por medios electrónicos.- La persona que utilice fraudulentamente un sistema informático o redes electrónicas y de telecomunicaciones para facilitar la apropiación de un bien ajeno o que procure la transferencia no consentida de bienes, valores o derechos en perjuicio de esta o de una tercera, en beneficio suyo o de otra persona alterando, manipulando o modificando el funcionamiento de redes electrónicas, programas, sistemas informáticos, telemáticos y equipos terminales de telecomunicaciones, será sancionada con pena privativa de libertad de uno a tres años.

    La misma sanción se impondrá si la infracción se comete con inutilización de sistemas de alarma o guarda, descubrimiento o descifrado de claves secretas o encriptadas, utilización de tarjetas magnéticas o perforadas, utilización de controles o instrumentos de apertura a distancia, o violación de seguridades electrónicas, informáticas u otras semejantes;

    Artículo 194.- Comercialización ilícita de terminales móviles.- La persona que comercialice terminales móviles con violación de las disposiciones y procedimientos previstos en la normativa emitida por la autoridad competente de telecomunicaciones, será sancionada con pena privativa de libertad de uno a tres años;

    Artículo 229.- Revelación ilegal de base de datos.- La persona que, en provecho propio o de un tercero, revele información registrada, contenida en ficheros, archivos, bases de datos o medios semejantes, a través o dirigidas a un sistema electrónico, informático, telemático o de telecomunicaciones; materializando voluntaria e intencionalmente la violación del secreto, la intimidad y la privacidad de las personas, será sancionada con pena privativa de libertad de uno a tres años. Si esta conducta se comete por una o un servidor público, empleadas o empleados bancarios internos o de instituciones de la economía popular y solidaria que realicen intermediación financiera o contratistas, será sancionada con pena privativa de libertad de tres a cinco años;

    Artículo 230.- Interceptación ilegal de datos.- Será sancionado con pena privativa de libertad de tres a cinco años:

    1. La persona que, sin orden judicial previa, en provecho propio o de un tercero, intercepte, escuche, desvíe, grabe u observe, en cualquier forma un dato informático en su origen, destino o en el interior de un sistema informático, una señal o una transmisión de datos o señales con la finalidad de obtener información registrada o disponible.

    2. La persona que diseñe, desarrolle, venda, ejecute, programe o envíe mensajes, certificados de seguridad o páginas electrónicas, enlaces o ventanas emergentes o modifique el sistema de resolución de nombres de dominio de un servicio financiero o pago electrónico u otro sitio personal o de confianza, de tal manera que induzca a una persona a ingresar a una dirección o sitio de internet diferente a la que quiere acceder.

    3. La persona que a través de cualquier medio copie, clone o comercialice información contenida en las bandas magnéticas, chips u otro dispositivo electrónico que esté soportada en las tarjetas de crédito, débito, pago o similares.

    4. La persona que produzca, fabrique, distribuya, posea o facilite materiales, dispositivos electrónicos o sistemas informáticos destinados a la comisión del delito descrito en el inciso anterior;

    Artículo 231.- Transferencia electrónica de activo patrimonial.- La persona que, con ánimo de lucro, altere, manipule o modifique el funcionamiento de programa o sistema informático o telemático o mensaje de datos, para procurarse la transferencia o apropiación no consentida de un activo patrimonial de otra persona en perjuicio de esta o de un tercero, será sancionada con pena privativa de libertad de tres a cinco años.

    Con igual pena, será sancionada la persona que facilite o proporcione datos de su cuenta bancaria con la intención de obtener, recibir o captar de forma ilegítima un activo patrimonial a través de una transferencia electrónica producto de este delito para sí mismo o para otra persona;

    Artículo 232.- Ataque a la integridad de sistemas informáticos.- La persona que destruya, dañe, borre, deteriore, altere, suspenda, trabe, cause mal funcionamiento, comportamiento no deseado o suprima datos informáticos, mensajes de correo electrónico, de sistemas de tratamiento de información, telemático o de telecomunicaciones a todo o partes de sus componentes lógicos que lo rigen, será sancionada con pena privativa de libertad de tres a cinco años.

    Con igual pena será sancionada la persona que:

    1. Diseñe, desarrolle, programe, adquiera, envíe, introduzca, ejecute, venda o distribuya de cualquier manera, dispositivos o programas informáticos maliciosos o programas destinados a causar los efectos señalados en el primer inciso de este artículo.

    2. Destruya o altere sin la autorización de su titular, la infraestructura tecnológica necesaria para la transmisión, recepción o procesamiento de información en general.

    Si la infracción se comete sobre bienes informáticos destinados a la prestación de un servicio público o vinculado con la seguridad ciudadana, la pena será de cinco a siete años de privación de libertad;

    Artículo 233.- Delitos contra la información pública reservada legalmente.- La persona que destruya o inutilice información clasificada de conformidad con la Ley, será sancionada con pena privativa de libertad de cinco a siete años.

    La o el servidor público que, utilizando cualquier medio electrónico o informático, obtenga este tipo de información, será sancionado con pena privativa de libertad de tres a cinco años.

    Cuando se trate de información reservada, cuya revelación pueda comprometer gravemente la seguridad del Estado, la o el servidor público encargado de la custodia o utilización legítima de la información que sin la autorización correspondiente revele dicha información, será sancionado con pena privativa de libertad de siete a diez años y la inhabilitación para ejercer un cargo o función pública por seis meses, siempre que no se configure otra infracción de mayor gravedad;

    Artículo 234.- Acceso no consentido a un sistema informático, telemático o de telecomunicaciones.- La persona que sin autorización acceda en todo o en parte a un sistema informático o sistema telemático o de telecomunicaciones o se mantenga dentro del mismo en contra de la voluntad de quien tenga el legítimo derecho, para explotar ilegítimamente el acceso logrado, modificar un portal web, desviar o redireccionar de tráfico de datos o voz u ofrecer servicios que estos sistemas proveen a terceros, sin pagarlos a los proveedores de servicios legítimos, será sancionada con la pena privativa de la libertad de tres a cinco años;

    Artículo 472.- Información de circulación restringida.- No podrá circular libremente la siguiente información:

    1. Aquella que esté protegida expresamente con una cláusula de reserva previamente establecida en la ley.

    2. La información acerca de datos de carácter personal y la que provenga de las comunicaciones personales cuya difusión no haya sido autorizada expresamente por su titular, por la ley o por la o el juzgador.

    3. La información producida por la o el fiscal en el marco de una investigación previa y aquella originada en la orden judicial relacionada con las técnicas especiales de investigación.

    4. La información acerca de niñas, niños y adolescentes que viole sus derechos según lo establecido en el Código Orgánico de la Niñez y Adolescencia y la Constitución.

    5. La información calificada por los organismos que conforman el Sistema nacional de inteligencia;

    Artículo 476.- Interceptación de las comunicaciones o datos informáticos.- La o el juzgador ordenará la interceptación de las comunicaciones o datos informáticos previa solicitud fundamentada de la o el fiscal cuando existan indicios que resulten relevantes a los fines de la investigación, de conformidad con las siguientes reglas:

    1. La o el juzgador determinará la comunicación interceptada y el tiempo de intercepción, que no podrá ser mayor a un plazo de noventa días. Transcurrido el tiempo autorizado se podrá solicitar motivadamente por una sola vez una prórroga hasta por un plazo de noventa días.

    Cuando sean investigaciones de delincuencia organizada y sus delitos relacionados, la interceptación podrá realizarse hasta por un plazo de seis meses.

    Transcurrido el tiempo autorizado se podrá solicitar motivadamente por una sola vez una prórroga hasta por un plazo de seis meses.

    2. La información relacionada con la infracción que se obtenga de las comunicaciones que se intercepten durante la investigación serán utilizadas en el proceso para el cual se las autoriza y con la obligación de guardar secreto de los asuntos ajenos al hecho que motive su examen.

    3. Cuando, en el transcurso de una interceptación se conozca del cometimiento de otra infracción, se comunicará inmediatamente a la o al fiscal para el inicio de la investigación correspondiente. En el caso de delitos flagrantes, se procederá conforme con lo establecido en este Código.

    4. Previa autorización de la o el juzgador, la o el fiscal, realizará la interceptación y registro de los datos informáticos en transmisión a través de los servicios de telecomunicaciones como: telefonía fija, satelital, móvil e inalámbrica, con sus servicios de llamadas de voz, mensajes SMS, mensajes MMS, transmisión de datos y voz sobre IP, correo electrónico, redes sociales, videoconferencias, multimedia, entre otros, cuando la o el fiscal lo considere indispensable para comprobar la existencia de una infracción o la responsabilidad de los partícipes.

    5. Está prohibida la interceptación de cualquier comunicación protegida por el derecho a preservar el secreto profesional y religioso. Las actuaciones procesales que violenten esta garantía carecen de eficacia probatoria, sin perjuicio de las respectivas sanciones.

    6. Al proceso solo se introducirá de manera textual la transcripción de aquellas conversaciones o parte de ellas que se estimen útiles o relevantes para los fines de la investigación. No obstante, la persona procesada podrá solicitar la audición de todas sus grabaciones, cuando lo considere apropiado para su defensa.

    7. El personal de las prestadoras de servicios de telecomunicaciones, así como las personas encargadas de interceptar, grabar y transcribir las comunicaciones o datos informáticos tendrán la obligación de guardar reserva sobre su contenido, salvo cuando se las llame a declarar en juicio.

    8. El medio de almacenamiento de la información obtenida durante la interceptación deberá ser conservado por la o el fiscal en un centro de acopio especializado para el efecto, hasta que sea presentado en juicio.

    9. Quedan prohibidas la interceptación, grabación y transcripción de comunicaciones que vulneren los derechos de los niños, niñas y adolescentes, especialmente en aquellos casos que generen la revictimización en infracciones de violencia contra la mujer o miembros del núcleo familiar, sexual, física, sicológica y otros.

    C. LEY ORGANICA DE GESTIÓN DE LA IDENTIDAD Y DATOS CIVILES

    Artículo 1.- Objeto. La presente Ley tiene por objeto garantizar el derecho a la identidad de las personas y normar y regular la gestión y el registro de los hechos y actos relativos al estado civil de las personas y su identificación;

    Artículo 3.- Objetivos. La presente Ley tiene como objetivos:

    1. Asegurar el ejercicio del derecho a la identidad de las personas.

    2. Precautelar la situación jurídica entre el Estado y las personas naturales dentro de sus relaciones de familia.

    3. Proteger el registro de los hechos y actos relativos al estado civil de las personas.

    4. Proteger la confidencialidad de la información personal.

    5. Evitar el subregistro o carencia de datos en registro de una persona.

    6. Proteger la información almacenada en archivos y bases de datos de los hechos y actos relativos al estado civil de las personas.

    7. Propender a la simplificación, automatización e interoperabilidad de los procesos concernientes a los hechos y actos relativos al estado civil de las personas, de conformidad a la normativa legal vigente para el efecto;

    D. LEY DE SEGURIDAD PÚBLICA Y DEL ESTADO

    Artículo 2.- De los ámbitos de la ley.- Al amparo de esta ley se establecerán e implementarán políticas, planes, estrategias y acciones oportunas para garantizar la soberanía e integridad territorial, la seguridad de las personas, comunidades, pueblos, nacionalidades y colectivos, e instituciones, la convivencia ciudadana de una manera integral, multidimensional, permanente, la complementariedad entre lo público y lo privado, la iniciativa y aporte ciudadanos, y se establecerán estrategias de prevención para tiempos de crisis o grave conmoción social.

    Se protegerá el patrimonio cultural, la diversidad biológica, los recursos genéticos, los recursos naturales, la calidad de vida ciudadana, la soberanía alimentaria; y en el ámbito de la seguridad del Estado la protección y control de los riesgos tecnológicos y científicos, la tecnología e industria militar, el material bélico, tenencia y porte de armas, materiales, sustancias biológicas y radioactivas, etc.;

    Artículo 3.- De la garantía de seguridad pública.- Es deber del Estado promover y garantizar la seguridad de todos los habitantes, comunidades, pueblos, nacionalidades y colectivos del Ecuador, y de la estructura del Estado, a través del Sistema de Seguridad Pública y del Estado;

    E. LEY ORGÁNICA DE TELECOMUNICACIONES

    Artículo 76.- Medidas técnicas de seguridad e invulnerabilidad.- Las y los prestadores de servicios ya sea que usen red propia o la de un tercero, deberán adoptar las medidas técnicas y de gestión adecuadas para preservar la seguridad de sus servicios y la invulnerabilidad de la red y garantizar el secreto de las comunicaciones y de la información transmitida por sus redes. Dichas medidas garantizarán un nivel de seguridad adecuado al riesgo existente;

    Artículo 77.- Interceptaciones.- únicamente se podrán realizar interceptaciones cuando exista orden expresa de la o el Juez competente, en el marco de una investigación de un delito o por razones de seguridad pública y del Estado, de conformidad con lo que establece la ley y siguiendo el debido proceso;

    Artículo 78.- Derecho a la intimidad.- para la plena vigencia del derecho a la intimidad, establecido en el artículo 66, numeral 20 de la Constitución de la República, las y los prestadores de servicios de telecomunicaciones deberán garantizar, en el ejercicio de su actividad, la protección de los datos de carácter personal.

    Para tal efecto, las y los prestadores de servicios de telecomunicaciones deberán adoptar las medidas técnicas y de gestión adecuadas para preservar la seguridad de su red con el fin de garantizar la protección de los datos de carácter personal de conformidad con la ley;

    Artículo 79.- Deber de información.- en caso de que exista un riesgo particular de violación de la seguridad de la red pública o del servicio de telecomunicaciones, el prestador de servicios de telecomunicaciones deberá informar a sus abonados, clientes y usuarios sobre dicho riesgo y sobre las medidas a adoptar;

    Artículo 80.- Procedimientos de revelación.- Las y los prestadores de servicios implementarán procedimientos internos para atender las solicitudes de acceso a los datos personales de sus abonados, clientes o usuarios por parte de las autoridades legalmente autorizadas. Los procedimientos internos que se implementen, para fines de supervisión y control, estarán a disposición de la Agencia de Regulación y Control de las Telecomunicaciones;

    Artículo 82.- Uso comercial de datos personales.- Las y los prestadores de servicios no podrán usar datos personales, información del uso del servicio, información de tráfico o el patrón de consumo de sus abonados, clientes o usuarios para la promoción comercial de servicios o productos, a menos que el abonado o usuario al que se refieran los datos o tal información, haya dado su consentimiento previo y expreso. Los usuarios o abonados dispondrán de la posibilidad clara y fácil de retirar su consentimiento para el uso de sus datos y de la información antes indicada. Tal consentimiento deberá especificar los datos personales o información cuyo uso se autorizan, el tiempo y su objetivo específico;

    Artículo 83.- Control técnico.- cuando para la realización de las tareas de control técnico, ya sea para verificar el adecuado uso del espectro radioeléctrico, la correcta prestación de los servicios de telecomunicaciones, el apropiado uso y operación de redes de telecomunicaciones o para comprobar las medidas implementadas para garantizar el secreto de las comunicaciones y seguridad de datos personales, sea necesaria la utilización de equipos, infraestructuras e instalaciones que puedan vulnerar la seguridad e integridad de las redes, la Agencia de Regulación y Control de las Telecomunicaciones deberá diseñar y establecer procedimientos que reduzcan al mínimo el riesgo de afectar los contenidos de las comunicaciones;

    Artículo 84.- Entrega de información.- Las y los prestadores de servicios, entregarán a las autoridades competentes la información que les sea requerida dentro del debido proceso, con el fin de investigación de delitos. La Agencia de Regulación y Control de las Telecomunicaciones establecerá los mecanismos y procedimientos que sean necesarios;

    Artículo 140.- Rectoría del sector.- El Ministerio encargado del sector de las Telecomunicaciones y de la Sociedad de la Información es el órgano rector de las telecomunicaciones y de la sociedad de la información, informática, tecnologías de la información y las comunicaciones y de la seguridad de la información. A dicho órgano le corresponde el establecimiento de políticas, directrices y planes aplicables en tales áreas para el desarrollo de la sociedad de la información, de conformidad con lo dispuesto en la presente Ley, su Reglamento General y los planes de desarrollo que se establezcan a nivel nacional. Los planes y políticas que dicte dicho Ministerio deberán enmarcarse dentro de los objetivos del Plan Nacional de Desarrollo y serán de cumplimiento obligatorio tanto para el sector público como privado.

    F. LEY ORGÁNICA INTEGRAL PARA PREVENIR Y ERRADICAR LA VIOLENCIA CONTRA LAS MUJERES

    Artículo 12.- Ámbitos donde se desarrolla la violencia contra las mujeres.- Son los diferentes espacios y contextos en los que se desarrollan los tipos de violencia de género contra las mujeres: niñas, adolescentes, jóvenes, adultas y adultas mayores. Están comprendidos, entre otros, los siguientes:

    1. Intrafamiliar o doméstico.- Comprende el contexto en el que la violencia es ejercida en el núcleo familiar. La violencia es ejecutada por parte del cónyuge, la pareja en unión de hecho, el conviviente, los ascendientes, los descendientes, las hermanas, los hermanos, los parientes por consanguinidad y afinidad y las personas con las que la víctima mantenga o haya mantenido vínculos familiares, íntimos, afectivos, conyugales, de convivencia, noviazgo o de cohabitación;

    2. Educativo.- Comprende el contexto de enseñanza y aprendizaje en el cual la violencia es ejecutada por docentes, personal administrativo, compañeros u otro miembro de la comunidad educativa de todos los niveles;

    3. Laboral.- Comprende el contexto laboral en donde se ejerce el derecho al trabajo y donde se desarrollan las actividades productivas, en el que la violencia es ejecutada por personas que tienen un vínculo o convivencia de trabajo con la víctima, independientemente de la relación jerárquica. Incluye condicionar la contratación o permanencia en el trabajo a través de favores de naturaleza sexual; la negativa a contratar a la víctima o a respetar su permanencia o condiciones generales de trabajo; el descrédito público por el trabajo realizado y no acceso a igual remuneración por igual tarea o función, así como el impedimento a las mujeres de que se les acredite el período de gestación y lactancia;

    4. Deportivo.- Comprende el contexto público o privado en el cual la violencia es ejercida en la práctica deportiva formativa, de alto rendimiento, profesional, adaptada/paralímpica, amateur, escolar o social;

    5. Estatal e institucional.- Comprende el contexto en el que la violencia es ejecutada en el ejercicio de la potestad estatal, de manera expresa o tácita y que se traduce en acciones u omisiones, provenientes del Estado. Comprende toda acción u omisión de instituciones, personas jurídicas, servidoras y servidores públicos o de personal de instituciones privadas; y, de todo tipo de colectivo u organización, que incumpliendo sus responsabilidades en el ejercicio de sus funciones, retarden, obstaculicen o impidan que las mujeres tengan acceso a las políticas públicas y a sus servicios derivados; y, a que ejerzan los derechos previstos en esta Ley;

    6. Centros de Privación de Libertad.- Comprende el contexto donde la violencia se ejerce en centros de privación de libertad, por el personal que labora en los centros;

    7. Mediático y cibernético.- Comprende el contexto en el que la violencia es ejercida a través de los medios de comunicación públicos, privados o comunitarios, sea por vía tradicional o por cualquier tecnología de la información, incluyendo las redes sociales, plataformas virtuales o cualquier otro;

    8. En el espacio público o comunitario.- Comprende el contexto en el cual la violencia se ejerce de manera individual o colectiva en lugares o espacios públicos, privados de acceso público; espacios de convivencia barrial o comunitaria; transporte público y otros de uso común tanto rural como urbano, mediante toda acción física, verbal o de connotación sexual no consentida, que afecte la seguridad e integridad de las mujeres, niñas y adolescentes;

    9. Centros e instituciones de salud.- Comprende el contexto donde la violencia se ejerce en los centros de salud pública y privada, en contra de las usuarias del Sistema Nacional de Salud, ejecutada por el personal administrativo, auxiliares y profesionales de la salud; y,

    10. Emergencias y situaciones humanitarias.- Comprende el contexto donde la violencia se ejerce en situaciones de emergencia y desastres que promuevan las desigualdades entre hombres y mujeres, que pongan en riesgo la integridad física, psicológica y sexual de mujeres: niñas, adolescentes, jóvenes, adultas y adultas mayores.

    G. LEY ORGÁNICA DE COMERCIO ELECTRÓNICO, FIRMAS ELECTRONICAS Y MENSAJES DE DATOS

    Artículo 5.- Confidencialidad y reserva.- Se establecen los principios de confidencialidad y reserva para los mensajes de datos, cualquiera sea su forma, medio o intención. Toda violación a estos principios, principalmente aquellas referidas a la intrusión electrónica, transferencia ilegal de mensajes de datos o violación del secreto profesional, será sancionada conforme a lo dispuesto en esta ley y demás normas que rigen la materia;

    Artículo 7.- Información original.- Cuando la ley requiera u obligue que la información sea presentada o conservada en su forma original, este requisito quedará cumplido con un mensaje de datos, si siendo requerido conforme a la ley, puede comprobarse que ha conservado la integridad de la información a partir del momento en que se generó por primera vez en su forma definitiva, como mensaje de datos;

    Artículo 8.- De la conservación de los mensajes de datos.- Toda información sometida a esta ley, podrá ser conservada; este requisito quedará cumplido mediante el archivo del mensaje de datos y de acuerdo a varias condiciones;

    Artículo 9.- Protección de datos.- Para la elaboración, transferencia o utilización de bases de datos, obtenidas directa o indirectamente del uso o transmisión de mensajes de datos, se requerirá el consentimiento expreso del titular de éstos, quien podrá seleccionar la información a compartirse con terceros;

    Artículo 10.- Procedencia e identidad de un mensaje de datos.- Salvo prueba en contrario se entenderá que un mensaje de datos proviene de quien lo envía y, autoriza a quien lo recibe, para actuar conforme al contenido del mismo, cuando de su verificación exista concordancia entre la identificación del emisor y su firma electrónica;

    H. CÓDIGO ORGÁNICO DE LA ECONOMÍA SOCIAL DE LOS CONOCIMIENTOS, CREATIVIDAD E INNOVACIÓN

    Apartado Primero, del software de código cerrado y bases de datos

    Artículo 140.- Materia protegible por las bases de datos. – Las compilaciones de datos o de otros materiales, en cualquier forma, que por razones de la originalidad de la selección o disposición de sus contenidos constituyan creaciones de carácter intelectual, están protegidas como tales. Esta protección de una base de datos, según el presente Título, no se extiende a los datos o información recopilada, pero no afectará los derechos que pudieren subsistir sobre las obras o prestaciones protegidas por derechos de autor o derechos conexos que la conforman.

    La protección reconocida a las bases de datos en virtud del presente artículo no se aplicará al software utilizado en la fabricación o en el funcionamiento de bases de datos accesibles por medios electrónicos.

    1.2 Vinculación de la Ciberseguridad con la Planificación Nacional

    El desarrollo de la Política implicó la vinculación del documento con la Planificación Nacional, específicamente con los instrumentos que se enlistan a continuación y de los que se presenta un breve detalle de su contenido

    Plan Nacional de Desarrollo 2017-2021 “Toda una Vida”

    Objetivo 1.- Garantizar una vida digna con iguales oportunidades para todas las personas.

    Objetivo 7.- Incentivar una sociedad participativa, con un Estado cercano al servicio de la ciudadanía.

    Objetivo 9.- Garantizar la soberanía y la paz, y posicionar estratégicamente al país en la región y el mundo.

    Plan Nacional de Seguridad Integral 2019 – 2030

    Desde una visión holística de las problemáticas de seguridad para el Estado, evidencia la aparición de amenazas como los ciberataques que identifica como una problemática transversal por el creciente uso de la tecnología.

    El presente informe busca motivar la emisión de una política que permita la coordinación de actividades de todas las partes interesadas relevantes en seguridad cibernética, quienes tendrán funciones, responsabilidades claras respaldadas en sus competencias y con capacidades operativas suficientes. Esta política se alinea a la normativa nacional vigente y al Plan Nacional de Desarrollo 2017-2021 “Toda una Vida”.

    Agenda de Coordinación Intersectorial de Seguridad

    Política PND 9.1 Promover la paz sostenible y garantizar servicios eficientes de seguridad integral. Estrategia 3: Automatización de la obtención y administración de la información para inteligencia estratégicas. Estrategia 4: Coordinación de la cooperación interinstitucional e internacional para fortalecer la gestión de inteligencia.

    Política de Defensa Nacional 2018

    Reconoce que los ciberataques y las vulneraciones a la infraestructura crítica tienen la capacidad de afectar al Estado. Determina que el ciberterrorismo, ciberespionaje e infiltraciones a los sistemas informáticos son instrumentos de agresión. La política propone el desarrollo de la industria de la defensa con miras a proveer productos y servicios estratégicos especializados para aportar las capacidades de la ciberdefensa.

    Plan Específico de Defensa Nacional 2019-2030

    Reconoce al ciberespacio como un componente más del territorio ecuatoriano. Las implicaciones se vinculan al desarrollo de operaciones en este dominio para la defensa de la soberanía; con el fin de aportar a la ciberseguridad nacional.

    Plan Específico de Seguridad Pública y Ciudadana 2019-2030

    Se establecen políticas articuladas y coordinadas de prevención y control respecto de las distintas expresiones del delito y en sus diferentes ámbitos, lo que lleva a prevenir, anticipar y combatir amenazas locales, nacionales e internacionales. La división entre seguridad pública y seguridad ciudadana permite un marco de acción diferenciado sobre la suscitación de delitos, por un lado, una competencia Estatal encaminada al resguardo del orden público y la protección interna, por otro lado, una seguridad ciudadana enfocada en las acciones institucionales dedicadas a reducir los factores de vulnerabilidad hacia el cometimiento de delitos.

    Plan Específico de Inteligencia 2019-2030

    Este plan entiende como amenaza para el Estado ecuatoriano a todo fenómeno o condición en la que uno o más actores con capacidad y fines específicos generen un daño, pérdida o consecuencia negativa directa contra los ejes de protección de la seguridad integral del Estado, entendiendo a estos como ser humano, Estado y naturaleza. En este contexto, se establece como una de las amenazas para el Ecuador las acciones contra el Estado en el ciberespacio.

    Plan Específico de Relaciones Exteriores y Movilidad Humana 2019-2030

    Objetivo Estratégico 3: Fomentar la cooperación internacional para la lucha contra la delincuencia organizada transnacional y las amenazas a la seguridad nacional”.

    Plan Nacional de Sociedad de la Información y del Conocimiento 2018-2021

    Es un instrumento de planificación orientado a propiciar el desarrollo nacional en torno al área de la Sociedad de la Información, contiene los programas y proyectos que permitirán alcanzar objetivos trazados en la Política Nacional de Telecomunicaciones y de la Sociedad de la Información. Dentro del Programa 1: Seguridad de la Información y uso responsable de las TIC, se busca de manera primordial fortalecer el marco regulatorio, normativo y estratégico para incrementar la seguridad de la información en el país por lo que promueve la elaboración de la Estrategia Nacional de Ciberseguridad que permita determinar los lineamientos generales de la Ciberseguridad en el Ecuador.

    Plan Nacional de Gobierno Electrónico 2018-2021

    Este Plan plantea catorce estrategias, una de ellas enfocada en la ciberseguridad mencionando como principales beneficiarios a las personas naturales y jurídicas. Además, propone emitir un modelo estandarizado de ciberseguridad para la Administración Pública Central, Institucional y Dependiente (APCID), fortalecer el EcuCERT (actualmente gestionado por la ARCOTEL), capacitar a los funcionarios de la APCID y difundir los beneficios de contar con este modelo a la ciudadanía.

    Política Ecuador Digital

    Instrumento cuyo objetivo es transformar y dirigir al país, hacia una economía basada en tecnologías digitales mediante la disminución de la brecha digital, el desarrollo de la Sociedad de la Información y del Conocimiento, el Gobierno Digital, la eficiencia de la administración pública, y la adopción digital en los sectores sociales y económicos, esta política se compone de 3 ejes: Ecuador Conectado, Ecuador Eficiente y Ciberseguro y Ecuador Innovador y Competitivo. Cada uno incluye un conjunto de proyectos para incrementar los índices de accesibilidad a las tecnologías de la información y comunicación, el fortalecimiento de las capacidades de talento humano, la potenciación de los sectores de la economía y el impulso del emprendimiento e innovación; es así que el eje de acción Ecuador Eficiente y Ciberseguro garantiza la participación ciudadana, la democratización de los servicios públicos, la simplificación de trámites, la gestión de la seguridad de la información y la protección de datos personales.

    Política Pública por una Internet segura para niños, niñas y adolescentes

    Instrumento cuyo objetivo es proteger la dignidad e integridad física, psicológica, emocional y sexual de la niñez y adolescencia; y potenciar las oportunidades y habilidades que ofrecen las tecnologías digitales en su vida y desarrollo integral.

    Plan Nacional de Seguridad Ciudadana y Convivencia Social Pacífica 2019 – 2030

    Este plan propone crear una estrategia que permita prepararnos con anticipación, ante los riesgos, establece en su Objetivo 7: Implementar anticipación estratégica en las acciones públicas para enfrentar riesgos y amenazas, fundamentalmente los relacionados al crimen organizado, lavado de activos, delincuencia transnacional, terrorismo y cibercriminalidad.

    El presente informe busca motivar la emisión de una política que permita la coordinación de actividades de todas las partes interesadas relevantes en seguridad cibernética, quienes tendrán funciones, responsabilidades claras respaldadas con capacidades operativas suficientes. Esta política se alinea a la normativa nacional vigente y al Plan Nacional de Desarrollo 2017-2021 “Toda una Vida”.

    2. OBJETIVO DEL INFORME

    Justificar la publicación de la Política Nacional de Ciberseguridad – PNC, elaborada como parte de un proceso técnico liderado por el Ministerio de Telecomunicaciones y Sociedad de la Información (MINTEL), como ente rector de la Seguridad de la Información, en base a sus competencias y aprobada por el Gabinete Sectorial de Seguridad.

    3. ANÁLISIS TÉCNICO

    3.1 Análisis de Situación Actual

    Desde el año 2011, con la “Estrategia Ecuador Digital 2.0” emitida por el Ministerio de Telecomunicaciones y de la Sociedad de la Información (MINTEL), se inició el desarrollo de Políticas Públicas Sectoriales que permitirían que las tecnologías de la información y comunicación se usen efectivamente en el proceso de desarrollo productivo, social y solidario del Ecuador, para el bienestar de todos los ciudadanos y con el objeto de implementar dicha Estrategia, se impulsaron cuatro planes estratégicos:

    Plan Nacional de Alistamiento Digital.

    Plan Nacional de Gobierno en Línea.

    Plan Nacional de Banda Ancha

    Plan Nacional de Gobierno Electrónico.

    Adicionalmente, la Estrategia Ecuador Digital 2.0 estaba enmarcada en los diferentes ejes establecidos en el Acuerdo Nacional 2030 y contribuyó a la transformación digital de las instituciones públicas y los diferentes sectores de la economía, permitiendo el incremento de la productividad y competitividad de las empresas. Al respecto, en materia de seguridad en el ciberespacio, el eje de acción Ecuador Eficiente y Ciberseguro garantizó la participación ciudadana, la democratización de los servicios públicos, la simplificación de trámites, la gestión de la seguridad de la información y la protección de datos personales.

    En el año 2013 el gobierno central desarrolló e implementó el Esquema Gubernamental de Seguridad de la Información (EGSI), lo que permitió ampliar la accesibilidad de sus servicios a los ciudadanos. Esto, a su vez, generó desafíos para la protección de la información de los mismos. El EGSI se implementó en las instituciones de la Administración Pública Central con el fin de que las Instituciones Públicas cuenten con un marco de referencia para la gestión de la seguridad de la información.

    Los resultados obtenidos del proceso de evaluación fueron la base para la actualización de este esquema de seguridad de la información en el año 2020, denominado EGSI V2.0. Cabe mencionar que según revela el informe “E-government Survey” (E-government Survey 2020, 2020), el Ecuador subió 10 escalones respecto al 2018 en su posición en el Índice de Desarrollo de Gobierno Electrónico (EGDI) de Naciones Unidas. Actualmente, el país ocupa el puesto 74 de 193 países, ubicándolo por encima de la media mundial y regional.

    A partir del año 2016, el Plan Nacional de Telecomunicaciones y TI 2016-2021, delinea el futuro del sector de las telecomunicaciones, impulsando la mejora de estos servicios y la reducción de la brecha digital. Además, se actualizó el Plan Nacional de Gobierno Electrónico 2018-2021, que en sus tres ejes de acción y catorce estrategias, vincula a la ciberseguridad con las personas naturales y jurídicas mediante la implementación de la emisión de un modelo estandarizado de ciberseguridad para la Administración Pública Central, Institucional y Dependiente (APCID), el fortalecimiento del Centro de Respuesta a Incidentes Informáticos del Ecuador (EcuCERT) actualmente gestionado por la Agencia de Regulación y Control de las Telecomunicaciones (ARCOTEL), y la capacitación de los funcionarios de la APCID en la implementación del modelo de ciberseguridad.

    Se ha desarrollado la propuesta de normativa de protección de datos personales a través de la Dirección Nacional de Registro de Datos Públicos (DINADARP), entidad adscrita al MINTEL y que lidera este esfuerzo, apoyada por sectores clave que ayudan en el desarrollo de dicha normativa, Este proyecto de ley se encuentra en fase de análisis por parte de la Asamblea Nacional. Asimismo, la Ley Orgánica de Telecomunicaciones determina la obligación de los prestadores de servicios de telecomunicaciones de garantizar en el ejercicio de su actividad la protección de datos de carácter personal, al igual que la Ley Orgánica del Sistema Nacional de Registros de Datos Públicos, garantiza la protección de los datos contenidos en todos los registros públicos.

    La legislación de protección al consumidor de Ecuador no protege del todo a los consumidores contra el fraude en línea y otras formas de delito cibernético o negligencia comercial y la Defensoría del Pueblo (responsable de la protección del consumidor) no tiene capacidades suficientes para abordar la protección del consumidor en línea.

    Se ha adoptado una legislación integral sobre propiedad intelectual de productos y servicios en línea y el Servicio Nacional de Derechos Intelectuales (SENADI) está designado como la entidad encargada de velar por su cumplimiento.

    En 2020 se emitió la Política de Datos Abiertos, de aplicación para las Instituciones de la Administración Pública, cuyo objetivo es consolidar los procesos de organización y publicación de los datos que generan estas instituciones. La finalidad de esta política es fortalecer la participación ciudadana, la transparencia gubernamental, mejorar la eficiencia en la gestión pública, promover la investigación, el emprendimiento y la innovación en lo que se refiere a tecnologías de la información. Como complemento de esta política el 15 de enero de 2021, mediante Registro Oficial Suplemento nº 371, se emitió la Guía de Datos Abiertos que permite la implementación de las directrices de la política, y cuyo objetivo es proporcionar criterios técnicos y metodológicos para planificar, abrir, publicar y promover la utilización de los datos abiertos gubernamentales.

    Estas acciones estatales junto al aporte del sector privado, han permitido hasta el 2020, tener los siguientes avances según el reporte de Sistema de Información y Estadística de los servicios de Telecomunicaciones (SIETEL) de la ARCOTEL:

    La masificación del uso de las TIC alcanzó a un 60,7% de la población.

    El uso del internet llegó a un 64,19% de la población.

    La cantidad de abonados que usan teléfonos inteligentes (Smartphones) es de 65,3%.

    Las líneas activas 4G existentes equivalen al 54,79% de la población y el total de líneas activas móviles del 85,75% de la población.

    El número de cuentas de internet de banda ancha alcanzó 1.990.489.

    Así mismo, el MINTEL a través del Proyecto emblemático de Infocentros Comunitarios, implementó y administra a nivel nacional 886 infocentros y megainfocentros, que dotan a 735 parroquias rurales y urbano marginales de lugares de desarrollo comunitarios apoyados en herramientas TIC, y desde donde se han capacitado a 1’262.960 personas como una de las estrategias para contribuir con su desarrollo personal y profesional.

    El incremento en la conectividad de la sociedad en su conjunto, acarrea vulnerabilidades que requieren de la atención de parte de los distintos actores involucrados. En el Ecuador, conscientes de la necesidad de proteger en el ciberespacio, en julio del año 2014 se creó el EcuCERT, reconocido como un CIRT (Critical Incident Response Team) nacional oficial de acuerdo al índice mundial de ciberseguridad y perfiles de ciberbienestar (ITU, 2015) y miembro certificado FIRST (Forum of Incident Response and Security Teams).

    La Comunidad Objetivo del EcuCERT de ARCOTEL está conformada por: el sector de las telecomunicaciones nacionales y las instituciones públicas, así como aquellas del sector privado que demanden los servicios que EcuCERT ofrece. Si bien EcuCERT está reconocido como un punto de contacto nacional e internacional para la gestión de vulnerabilidades e incidentes, sus atribuciones se enmarcan en el sector de telecomunicaciones, conforme la Ley Orgánica de Telecomunicaciones que lo rige.

    En agosto de 2018, la ARCOTEL expidió la “Norma Técnica para Coordinar la Gestión de Incidentes y Vulnerabilidades que Afecten a la Seguridad de las Redes y Servicios de Telecomunicaciones”. En esta norma se establece: la definición de un catálogo de vulnerabilidades e incidentes, tiempos de respuesta, protocolo para la clasificación de la información, mecanismo para el intercambio de información sobre un evento de seguridad y auditorías de seguridad para identificar vulnerabilidades en la infraestructura de los Prestadores de Servicios de Telecomunicaciones.

    El accionar del EcuCERT es limitado al sector de las telecomunicaciones, no obstante, se emiten reportes sobre vulnerabilidades e incidentes a varias instituciones del Estado; así como, consejos y recomendaciones técnicas. La escasez de regulación en materia de ciberseguridad hace que su aplicación no considere a otros sectores.

    A nivel nacional existen Centros de Respuesta a Incidentes de Seguridad Informática (CSIRT) en las siguientes áreas: académica, defensa, sector privado y sector financiero. Es fundamental articular una estructura o sistema para coordinar sus acciones, y de ese modo, trabajar de manera integrada, en base a protocolos normativa y lineamientos nacionales. Una vez fortalecido el EcuCERT debería fomentar la generación de más CSIRT coordinadores sectoriales, a fin de gestionar los incidentes de manera nacional e intersectorial.

    Actualmente, existen trece CSIRT en Ecuador, a través de los cuales; y, enmarcados en un trabajo colaborativo con EcuCERT, se han ejecutado varias acciones técnicas frente a incidentes a nivel nacional. No obstante, la coordinación y gestión debe formalizarse y establecer mecanismos de colaboración, intercambio de información, responsabilidades y respuesta a incidentes, a través de un protocolo de gestión de incidentes nacionales.

    3.1.1 Panorama Nacional de la Ciberseguridad.

    Un mayor uso de la Internet implica un aumento en la vulnerabilidad de la ciudadanía que hace uso de esta herramienta, tanto en lo profesional como en lo cotidiano. El aprovechamiento de estas vulnerabilidades en el ciberespacio por parte de actores delictuales se ha convertido en una nueva forma de atentar contra los derechos de las personas.

    Los delitos informáticos son des territorializados, es decir que no necesariamente se anclan a las naciones, teniendo capacidades transfronterizas que limitan el actuar policial basado en la circunscripción territorial. Este tipo de delito pasa completamente desapercibido para la víctima quien, por lo general, no es consciente de haber sido perjudicada. Lo que conlleva que la mayoría de veces quienes han sido afectados no presenten la debida denuncia ante las autoridades.

    A esto se suma, la ausencia de un marco regulatorio que permita conocer los procedimientos policiales y judiciales para identificar y judicializar delitos informáticos; así como, la no adhesión de convenios internacionales existentes, que faciliten acciones de cooperación en el ámbito de delitos transnacionales en el ciberespacio.

    Las unidades dedicadas al seguimiento e investigación de delitos informáticos, requieren incrementar el talento humano especializado en áreas tecnológicas; y, el número de personal existente para atender oportunamente los requerimientos de la ciudadanía. En este ámbito se requiere que el personal involucrado cuente con capacitación y especialización a nivel de educación superior con el objetivo de tener un dominio de las herramientas existentes y aprovechar al máximo la tecnología, en la lucha contra los delitos informáticos.

    La información que mantiene el Ministerio de Gobierno evidencia que el principal delito informático que afecta a la población es la apropiación fraudulenta por medios electrónicos. La siguiente tabla muestra el listado de delitos informáticos registrados en los años 2018, 2019 y 2020.

    (…)

    Gráfico 1: Principales delitos informáticos en Ecuador 2018-2019-2020(Fuente: UIDT-DNPJ)

    3.1.2 Análisis de Riesgos y Amenazas

    La identificación de las tendencias emergentes sobre las amenazas cibernéticas y la comprensión de la evolución de los delitos cibernéticos son importantes para la ciberseguridad nacional. El panorama de amenazas cibernéticas proporciona información sobre los desarrollos internacionales relacionados con las amenazas en este aspecto; sin embargo, cada país tiene sus propias peculiaridades. Es vital entender el panorama nacional de amenazas cibernéticas para desarrollar las capacidades de ciberseguridad necesarias y mitigar efectivamente los riesgos en el ciberespacio.

    Los ciberataques y ciberdelitos tienen como característica fundamental el ser difíciles de rastrear. Al ser delitos que se realizan remotamente, su persecución no puede valerse de procedimientos ordinarios, requiriéndose necesariamente de análisis o peritajes informáticos. Además de su carácter remoto, este tipo de delitos se valen de técnicas para ocultar la locación desde los cuales se originan. Los ataques informáticos por ejemplo pueden utilizar filtros como proxy chains o virtual private networks (VPN) que evitan los enlaces directos entre las máquinas que realizan los ataques y los servidores de internet, esto hace que los protocolos de internet (IP por sus siglas en inglés) cambien cuando se navega por internet, dificultando a las instituciones del orden conocer la locación, incluso el país de donde se producen estos ataques.

    El Ecuador es vulnerable ante las amenazas cibernéticas, esto de acuerdo al Índice Global de Ciberseguridad (GCI), emitido por la ITU, publicado el 09 de julio de 2019, que ubica al país en el puesto 98 de 193, siendo 193 el país con mayores vulnerabilidades a nivel mundial. El número de ataques cibernéticos dirigidos para Ecuador, detectados por la firma de antivirus Kaspersky Lab (2020), refleja que el Ecuador se encuentra en el puesto número 89 de países más atacados en el mundo.

    (…)

    Gráfico 2: Índice Global de Ciberseguridad (GCI por sus siglas en inglés)

    Según la firma ESET, el Ecuador se encuentra entre los 10 países de América Latina más afectados por software malicioso (malware).

    (…)

    Gráfico 3: Detecciones de Ransomware por país (Fuente: ESET Security Report Latinoamerica 2020)

    En el Informe anual de esta firma; Security Report Latinoamérica 2020 se menciona que la seguridad no solo aborda al área tecnológica, también es necesario complementarla con políticas, planes que permitan gestionar adecuadamente la seguridad de la información.

    Esto último se ve reflejado precisamente en que casi el 98% de las empresas en la región cuenta con algún control basado en tecnología. Sin embargo, aún el 39% de las empresas no cuenta con políticas de seguridad y apenas un 28% clasifica su información.

    (…)

    Gráfico 3: Niveles de implementación de prácticas de gestión para la seguridad por país (Fuente: ESET Security Report (ESR) 2020)

    En el año 2019, según el informe realizado por la firma consultora NRD Cyber Security, “Panorama de Amenaza Cibernética y Revisión de la Capacidad de la Ciberseguridad en Ecuador”, se identificó que las 10 principales ciber amenazas que afectan al país son: suplantación de identidad, correo no deseado, software malicioso, fuga de información, amenaza interna, manipulación física, robo de identidad, ataques de aplicaciones web, programa de secuestro de datos, denegación de servicio, ataques basados en la web, violaciones de datos, redes de bots, minería de criptomonedas maliciosa y espionaje cibernético1. Entre estas amenazas se mencionan tanto vectores de ataque como acciones maliciosas, los cuales son empleados por una variedad de actores.

    3.2 Falta de regulación en materia de Ciberseguridad

    La falta regulación en materia de ciberseguridad ha impedido que exista la articulación y los lineamientos requeridos para que las instituciones públicas en base a sus competencias actúen con asignación de funciones, responsabilidades claras respaldadas con capacidades operativas suficientes de una manera coordinada en función de tener un ciberespacio seguro y confiable.

    La ciberseguridad se convertirá, progresivamente, en un tema de vital importancia dentro de la agenda de seguridad, desarrollo y derechos humanos en el Ecuador, por lo que se requiere desarrollar y potenciar las capacidades nacionales, políticas, estrategias, planes, programas y proyectos intersectoriales para la seguridad cibernética, así como una concientización en la sociedad ecuatoriana sobre las potenciales vulnerabilidades que enfrentamos en el entorno cibernético, lo que permitirá propender a la garantía de derechos y libertades, como de la seguridad integral en el ciberespacio.

    4. JUSTIFICACIÓN TÉCNICA DE LA EMISIÓN DE LA POLÍTICA PROPUESTA

    La seguridad de la información busca la protección de la información en todo tipo de medios, tanto digitales como físicos, por lo que con las políticas y normativas que construyen el marco jurídico de la seguridad de la información, lo que se busca es protegerla de cualquier tipo de riesgo.

    La seguridad de la información es el paraguas que abarca el resto de disciplinas (ciberseguridad, seguridad informática, seguridad de TI, seguridad de aplicaciones, otros). En otras palabras, la protección de la información es el libro y la ciberseguridad es un capítulo dentro de ese libro.

    La ciberseguridad, entonces, se define como “un conjunto de medidas de protección de la información, a través del tratamiento de las amenazas que ponen en riesgo la información que es tratada por los sistemas de información que se encuentran interconectados”. (7)

    En definitiva, la ciberseguridad busca, entre otras cosas, la protección de la información. Sin embargo, tiene como foco principal la protección de la información digital de los sistemas. Por ello, se puede considerar que la ciberseguridad está comprendida dentro de la seguridad de la información.

    Por otra parte, la disponibilidad y la fiabilidad del Ciberespacio en muchos aspectos se basan en la disponibilidad y la fiabilidad de los servicios de infraestructura críticas asociados, tales como la infraestructura de la red de telecomunicaciones. La seguridad del Ciberespacio también está estrechamente relacionada con la seguridad de Internet, de las redes empresariales y de los hogares y la seguridad de la información en general. Hacer frente a los problemas de la Ciberseguridad requiere, por lo tanto, una gran comunicación y coordinación entre las diferentes entidades públicas y privadas de diferentes países y organizaciones.(8)

    En consecuencia, dado que la ciberseguridad es una disciplina que está dentro del ámbito de la seguridad de la información y considerando que es un tema transversal, el Ministerio de Telecomunicaciones y de la Sociedad de la Información, como ente rector y en base a sus competencias lideró el desarrollo de la Política Nacional de Ciberseguridad, a través de un “Grupo interinstitucional de Ciberseguridad”, conformada por el Ministerio de Gobierno (MDG), el Ministerio de Defensa (MDN), el Centro de Inteligencia Estratégica (CIES) y el Ministerio de Relaciones Exteriores y Movilidad Humana (MREMH).

    Una vez que la Política Nacional de Ciberseguirdad fue aprobado por el Gabinete Sectorial de Seguridad, en su Vigésima Sesión Ordinaria de 1 de abril de 2021, le corresponde al Ministerio de Telecomunicaciones su publicación a través de un Acuerdo Ministerial.

    4.1 Problemática identificada

    El uso masivo de internet, de las tecnologías comunicacionales y las técnicas de anonimato, han originado que muchos delitos que usualmente se cometían en espacios físicos se hayan potenciado y ahora se cometan también en espacios cibernéticos. Delitos como la extorsión, anteriormente se lo consideraba ligado al secuestro de las personas o al robo de sus bienes tangibles, pero al momento se dan extorsiones en línea, ejerciendo presión a la víctima sobre su información personal y digital, amenazándola con difundir o eliminar su información, obteniendo réditos económicos a cambio de no publicarla.

    En el año 2019, según el informe realizado por la firma consultora NRD Cyber Security, “Panorama de Amenaza Cibernética y Revisión de la Capacidad de la Ciberseguridad en el Ecuador se identificó que las 10 principales ciber amenazas que afectan al país son: suplantación de identidad, correo no deseado, software malicioso, fuga de información, amenaza interna, manipulación física, robo de identidad, ataques de aplicaciones web, programa de secuestro de datos, denegación de servicio, ataques basados en la web, violaciones de datos, redes de bots, minería de criptomonedas maliciosa y espionaje cibernético . Entre estas amenazas se mencionan tanto vectores de ataque como acciones maliciosas, los cuales son empleados por una variedad de actores (5).

    Según la firma ESET, el Ecuador se encuentra entre los 10 países de América Latina más afectados por software malicioso (Informe anual de esta firma; Security Report Latinoamérica 2020).

    De acuerdo al Índice Global de Ciberseguridad (GCI), emitido por la ITU, publicado el 09 de julio de 2019, el Ecuador es vulnerable ante las amenazas cibernéticas, este índice global ubica al país en el puesto 98 de 193, siendo 193 el país con mayores vulnerabilidades a nivel mundial. El número de ataques cibernéticos dirigidos para Ecuador, detectados por la firma de antivirus Kaspersky Lab (2020), refleja que el Ecuador se encuentra en el puesto número 89 de países más atacados en el mundo.

    Debido a la emergencia sanitaria que se atraviesa a nivel mundial producto de la pandemia por el COVID 19, los gobiernos se han visto obligados a tomar medidas emergentes como el teletrabajo, la teleducación y la telemedicina. En este sentido, organismos e instituciones públicos y privados, así como la población en general, han optado por dichas modalidades.

    A raíz de esta situación se evidencia un incremento exponencial de incidentes en el ciberespacio en lo que va de este año.

    En el Ecuador, la mayoría de organismos, instituciones y ciudadanía, no están preparados adecuadamente para enfrentar los riesgos asociados a la seguridad de la información debido a la falta de regulación, políticas, conciencia y herramientas que permitan contar con un ciber entorno seguro.

    4.2 Potencial solución identificada

    En función de la problemática presentada, surgió la necesidad de generar una Política Nacional de Ciberseguridad (PNC), con la finalidad de establecer lineamientos y acciones, basadas en un examen de los riesgos y amenazas, tanto potenciales como reales, que enfrenta el Ecuador; permitiendo de esta manera, generar las capacidades adecuadas para prevenirlos, identificarlos, transferirlos, mitigarlos, aceptarlos, gestionarlos, atenderlos, monitorearlos y evaluarlos.

    Esta política estará basada en siete pilares que contemplan diversas temáticas de intervención del Estado, en coordinación con el sector privado, la academia y sociedad civil, que permitirán la ciberseguridad del Ecuador. Estos pilares se enfocan en el trabajo en la gobernanza de la ciberseguridad, en sistemas de información y gestión de incidentes, en la protección de los servicios e infraestructuras críticas, la Soberanía y Defensa, la Seguridad Pública y Ciudadana, la Diplomacia en el ciberespacio junto con la cooperación internacional y en la promoción de la cultura y educación para la ciberseguridad

    Su implementación conlleva un proceso de seguimiento, medición y evaluación continuo y flexible, que permitirá ajustarla efectivamente ante los rápidos cambios en el entorno digital e identificar el impacto de las acciones de esta política en el fortalecimiento de la ciberseguridad nacional. Para que esta política sea efectiva el estado ecuatoriano deberá asignar los recursos financieros necesarios que aseguren la implementación de las líneas de acción enunciadas en esta política

    4.3 Metodología para desarrollo de la política

    La elaboración de la presente política parte de un proceso técnico, con la constitución de una mesa interinstitucional, que mediante un trabajo interdisciplinario ha contribuido desde los enfoques de cada una de las instituciones participantes, con el fin de garantizar la adaptabilidad de la misma al contexto aplicativo. Este instrumento toma en consideración los intereses nacionales y, a la vez, considera a los temas de ciberseguridad desde una visión, holística, común, compartida y de largo plazo.

    La determinación de la metodología requirió la revisión de herramientas internacionales existentes para el desarrollo de políticas en este ámbito y un análisis de los avances de otros países en la materia. Asimismo, el desarrollo de este documento incluye la revisión de los marcos normativos vigentes nacionales e internacionales y los instrumentos de planificación nacional de los sectores involucrados. Además, contempla el levantamiento de un diagnóstico nacional que identifica las brechas existentes en cuanto a la ciberseguridad en el país. Una vez priorizadas, estas fundamentaron el diseño de acciones nacionales que permitirán solventar las problemáticas de la ciberseguridad en el Ecuador.

    En la construcción de esta política participaron actores de la Función Ejecutiva, al igual que otras funciones del Estado. Se contó con insumos de las Empresas Públicas, de los operadores de infraestructuras críticas, representantes de la academia, centros de respuesta a incidentes, actores del sector privado y de la sociedad civil.

    La política propone un horizonte definido al 2023, en el cual se implementarán las líneas de acción definidas en la política y a partir del proceso de seguimiento y monitoreo, se podrán observar los resultados de la misma a corto y mediano plazo.

    (…)

    Gráfico 2. Hoja de Ruta aprobada para la elaboración de la Política Nacional de Ciberseguridad

    La elaboración de la hoja de ruta plasma las actividades más relevantes que se realizaron para la construcción del instrumento Política Nacional de Ciberseguridad y que se detallan a continuación:

    Conformación del Grupo Insterinstitucional de Ciberseguridad, para la elaboración del documento de la Política Nacional de Ciberseguridad cuyos integrantes y en función de sus competencias, son los siguientes: MDG Ministerio de Gobierno (Ciberdelitos), MDN Ministerio de Defensa Nacional (Ciberdefensa e infraestructura crítica), CIES Centro de Inteligencia Estratégica (Ciberinteligencia, infraestructura crítica), MREMH Ministerio de Relaciones Exteriores y Movilidad Humana (Diplomacia en el ciberespacio y Cooperación Internacional), Presidencia – Vicepresidencia (Gobernanza y articulación), MINTEL Ministerio de Telecomunicaciones y de la Sociedad de la Información (Seguridad de la información) y quien lidera el grupo.

    Glosario de términos de ciberseguridad

    Gestiones para apoyo técnico de expertos internacionales, en las mejores prácticas para el desarrollo e implementación de políticas y estrategias nacionales en materia Cibernética como: Misión Técnica del Departamento de Estado de los Estados Unidos de América (MITRE), Organización de Estados Americanos, (OEA), Banco Interamericano de Desarrollo (BID), NRD Cyber Security, Comité Interamericano contra el Terrorismo (CICTE) / OEA

    Insumos proporcionados por la consultora NRD Cyber Security, línea base para la construcción de la Política Nacional de Ciberseguridad (PNC).

    Hoja de ruta, planificación de las etapas para la elaboración de la PNC

    Guía para el levantamiento de infraestructura crítica

    Nota técnica conceptual con el apoyo de la Organización de Estados Americanos (OEA)

    Vicepresidencia integra el grupo de trabajo de ciberseguridad para articulación y seguimiento de las actividades del grupo.

    Plan de mejora de Ciberseguridad, que contiene 40 líneas de acciones enfocadas a disminuir las brechas encontradas.

    Grupo técnico para trabajar sobre gestión de incidentes

    Secretaría Técnica Planifica Ecuador (STPE) se integra al grupo como apoyo técnico para validación de indicadores y fichas metodológicas.

    Por pedido del Gabinete Sectorial de seguridad se elaboró las funciones roles y responsabilidades para la creación del cuerpo colegiado, “Comité de ciberseguridad” el que se adicionó al Proyecto de Decreto Ejecutivo Cuerpos Colegiados – Sector Seguridad.

    Actualización de hoja de ruta crítica con la coordinación y articulación de Vicepresidencia.

    STPE realiza la socialización y conceptualización de indicadores y fichas metodológica de los indicadores.

    Indicadores de gestión en base a los pilares, objetivos específicos y competencias de cada cartera de estado

    Publicación en la plataforma DIALOGO 2.0, el borrador de la Política Nacional de Ciberseguridad, para socializar el instrumento con diferentes actores del país con el objeto de recibir aportaciones y enriquecer el documento, proceso que inicio el 24 de noviembre y culminó el 7 de diciembre de 2020, más de 260 aportaciones o comentarios.

    Aprobación de las aportaciones realizadas e inclusión en el documento “Política Nacional de Ciberseguridad”

    Actualización de indicadores y fichas metodológicas

    Inclusión de observaciones y comentarios realizada por la CICTE-OEA al documento de la PNC.

    Remisión del documento final de la Política Nacional de Ciberseguridad para aprobación y revisión del Gabinete Sectorial de Seguridad.

    La Vigésima Sesión Ordinaria del Gabinete Sectorial de Seguridad, tuvo lugar en la ciudad de El Coca el 1 de abril de 2021. En ella se aprobó la Política Nacional de Ciberseguridad y se designó al Ministerio de Telecomunicaciones y de la Sociedad de la Información MINTEL como el encargado de publicarla mediante acuerdo ministerial.

    5. PROPUESTA DE LA POLÍTICA

    En función de lo expuesto, toda vez que la Política Nacional de Ciberseguridad fue aprobada por el Gabinete Sectorial de Seguridad y al amparo de las competencias del Ministerio de Telecomunicaciones y se la Sociedad de la Información, se propone el siguiente articulado para el Acuerdo Ministerial en el que se la publicará.

    “Artículo 1.- Publicar la Política Nacional de Ciberseguridad, que se encuentra anexa y que forma parte integral del presente Acuerdo Ministerial.

    Artículo 2.- El objetivo de la presente política es construir y fortalecer las capacidades nacionales que permitan garantizar el ejercicio de los derechos y libertades de la población y la protección de los bienes jurídicos del Estado en el ciberespacio.

    La política establece directrices que buscan garantizar un ciberespacio seguro para contribuir al desarrollo social, económico y humano del país, así como a la creación de una confianza digital que favorece el intercambio de información y, en consecuencia, de bienes y servicios en línea.

    La política tiene un enfoque multisectorial y multidimensional que se debe al carácter transversal de la ciberseguridad. Por tanto, la política alcanza a varios sectores y actores, públicos y privados, del país, y de manera vertical y horizontal. En esta medida, la política establece directrices para encaminar las acciones de las entidades de la Administración Pública Institucional y que dependen de la Función Ejecutiva, en coordinación con los otros poderes del Estado, sociedad civil y ciudadanía en general.

    Artículo 3.- De la ejecución del presente Acuerdo Ministerial, encárguese a la Subsecretaria Gobierno Electrónico y Registro Civil, que ejecutará las acciones necesarias para la implementación de la Política Nacional de Ciberseguridad

    Disposición Final. – El presente Acuerdo Ministerial entrará en vigencia a partir de su suscripción, sin perjuicio de su publicación en el Registro Oficial.”

    6. CONCLUSIONES

    En el Ecuador no existe un instrumento legal que emita directrices para proteger la infraestructura crítica, gestionando los riesgos del ciberespacio, de una forma integral y desde una visión nacional, en coordinación y cooperación con los sectores público, privado, academia y sociedad civil.

    La participación de diferentes actores de la Función Ejecutiva, al igual que otras funciones del Estado, las Empresas Públicas, los operadores de infraestructuras críticas, los representantes de la academia, los centros de respuesta a incidentes, actores del sector privado y de la sociedad civil en la elaboración de la Política, permitirá establecer un horizonte en el cual se implementen diferentes líneas de acción y a partir un proceso de seguimiento y monitoreo, poder obtener resultados a corto y mediano plazo, a través con el liderazgo del Ministerio de Telecomunicaciones y de la Sociedad de la Información.

    7. RECOMENDACIONES

    En función del análisis técnico realizado en el presente informe, se recomienda a la máxima autoridad o su delegado la publicación del instrumento legal correspondiente para la publicación de la Política Nacional de Ciberseguridad.

    (1) Uno de cada tres de estos usuarios es menor de 18 años y accede al internet en su mayoría a través del teléfono celular. Niños niñas y adolescentes en el mundo están en línea alrededor de dos horas al día entre semana y aproximadamente el doble de tiempo el fin de semana

    (2) Las Tecnologías de la información y de la comunicación (TIC) son fundamentales para la democratización del conocimiento. Es decir, las TIC constituyen un elemento indispensable de cara a las proyecciones de desarrollo social de los países, de los grupos sociales y de los individuos (Lugo, 2010, IIPE, 2014).

    (3) El aumento de la capacidad delincuencial en el ciberespacio, así como la utilización de nuevas tecnologías para generar amenazas informáticas, constituyen una preocupación común a todos los países, dado que impactan de manera significativa la seguridad de la información, en los ámbitos tanto público como privado, e incluyendo a la sociedad civil.

    Según Naciones Unidas, en el mundo los cibercrímenes (o ciberdelitos) llegaría a representar un costo de 600 mil millones USD (ONUDC, 2016).

    (4) Un impacto primario del delito cibernético es financiero, considerando que puede incluir muchos tipos diferentes de actividades delictivas con fines de lucro, incluidos ataques de ransomware, fraude por correo electrónico e internet y fraude de identidad, así como intentos de robo de cuentas financieras, tarjetas de crédito u otra información de tarjetas de pago. No obstante, también se ven afectadas las personas y los Estados.

    (5) Panorama de Amenazas y Riesgos (2019). NRD Cybersecurity con el apoyo del BID

    (6) Panorama de Amenazas y Riesgos (2019). NRD Cybersecurity con el apoyo del BID.

    (7) (ISACA-Information Systems Audit and Control Association – Asociación de Auditoría y Control sobre los Sistemas de Información)

    (8) NTE INEN-ISO/IEC 27032, Tercera edición, Tecnologías de la Información – Técnicas de Seguridad – Directrices Para Ciberseguridad (ISO/IEC 27032:2012, Idt)

    (9) Los vectores de ataque permiten ejecutar acciones contra los países, sus instituciones, empresas y ciudadanos. El ciber espionaje y/o ciber sabotaje facilita a los actores de amenaza a mejorar su posición estratégica, geopolítica, económica o tecnológica, pudiendo inclusive para este fin llegar a interrumpir la normal prestación y el funcionamiento de la infraestructura crítica y servicios esenciales. Así mismo, algunos de estos actores (delincuentes cibernéticos, Estados naciones, corporaciones, funcionarios y empleados) están en condiciones de obtener, encriptar y eliminar información; impedir accesos y, de este modo, generar afectaciones a la sociedad en su conjunto.

    30Jun/21

    COM 2021/206 FINAL

    COM 2021/206 FINAL. Proposal for a regulation of the European Parliament and of the Council Laying Down harmonised rules on Artificial Intelligence (Artificial Inteligence Act) and amending certain union legislative Acts.

    Brussels, 21.4.2021

    COM(2021) 206 final 2021/0106 (COD)

    Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL LAYING DOWN HARMONISED RULES ON ARTIFICIAL INTELLIGENCE (ARTIFICIAL INTELLIGENCE ACT) AND AMENDING CERTAIN UNION LEGISLATIVE ACTS

    1. CONTEXT OF THE PROPOSAL

    1.1. Reasons for and objectives of the proposal

    This explanatory memorandum accompanies the proposal for a Regulation laying down harmonised rules on artificial intelligence (Artificial Intelligence Act). Artificial Intelligence (AI) is a fast evolving family of technologies that can bring a wide array of economic and societal benefits across the entire spectrum of industries and social activities. By improving prediction, optimising operations and resource allocation, and personalising service delivery, the use of artificial intelligence can support socially and environmentally beneficial outcomes and provide key competitive advantages to companies and the European economy. Such action is especially needed in high-impact sectors, including climate change, environment and health, the public sector, finance, mobility, home affairs and agriculture. However, the same elements and techniques that power the socio-economic benefits of AI can also bring about new risks or negative consequences for individuals or the society. In light of the speed of technological change and possible challenges, the EU is committed to strive for a balanced approach. It is in the Union interest to preserve the EU’s technological leadership and to ensure that Europeans can benefit from new technologies developed and functioning according to Union values, fundamental rights and principles.

    This proposal delivers on the political commitment by President von der Leyen, who announced in her political guidelines for the 2019-2024 Commission “A Union that strives for more” (1), that the Commission would put forward legislation for a coordinated European approach on the human and ethical implications of AI. Following on that announcement, on 19 February 2020 the Commission published the White Paper on AI – A European approach to excellence and trust (2). The White Paper sets out policy options on how to achieve the twin objective of promoting the uptake of AI and of addressing the risks associated with certain uses of such technology. This proposal aims to implement the second objective for the development of an ecosystem of trust by proposing a legal framework for trustworthy AI. The proposal is based on EU values and fundamental rights and aims to give people and other users the confidence to embrace AI-based solutions, while encouraging businesses to develop them. AI should be a tool for people and be a force for good in society with the ultimate aim of increasing human well-being. Rules for AI available in the Union market or otherwise affecting people in the Union should therefore be human centric, so that people can trust that the technology is used in a way that is safe and compliant with the law, including the respect of fundamental rights. Following the publication of the White Paper, the Commission launched a broad stakeholder consultation, which was met with a great interest by a large number of stakeholders who were largely supportive of regulatory intervention to address the challenges and concerns raised by the increasing use of AI.

    The proposal also responds to explicit requests from the European Parliament (EP) and the European Council, which have repeatedly expressed calls for legislative action to ensure a well-functioning internal market for artificial intelligence systems (‘AI systems’) where both benefits and risks of AI are adequately addressed at Union level. It supports the objective of the Union being a global leader in the development of secure, trustworthy and ethical artificial intelligence as stated by the European Council (3) and ensures the protection of ethical principles as specifically requested by the European Parliament (4).

    In 2017, the European Council called for a ‘sense of urgency to address emerging trends’ including ‘issues such as artificial intelligence …, while at the same time ensuring a high level of data protection, digital rights and ethical standards’ (5). In its 2019 Conclusions on the Coordinated Plan on the development and use of artificial intelligence Made in Europe (6), the Council further highlighted the importance of ensuring that European citizens’ rights are fully respected and called for a review of the existing relevant legislation to make it fit for purpose for the new opportunities and challenges raised by AI. The European Council has also called for a clear determination of the AI applications that should be considered high-risk (7).

    The most recent Conclusions from 21 October 2020 further called for addressing the opacity, complexity, bias, a certain degree of unpredictability and partially autonomous behaviour of certain AI systems, to ensure their compatibility with fundamental rights and to facilitate the enforcement of legal rules (8).

    The European Parliament has also undertaken a considerable amount of work in the area of AI. In October 2020, it adopted a number of resolutions related to AI, including on ethics (9), liability (10) and copyright (11). In 2021, those were followed by resolutions on AI in criminal matters (12) and in education, culture and the audio-visual sector (13). The EP Resolution on a Framework of Ethical Aspects of Artificial Intelligence, Robotics and Related Technologies specifically recommends to the Commission to propose legislative action to harness the opportunities and benefits of AI, but also to ensure protection of ethical principles. The resolution includes a text of the legislative proposal for a regulation on ethical principles for the development, deployment and use of AI, robotics and related technologies. In accordance with the political commitment made by President von der Leyen in her Political Guidelines as regards resolutions adopted by the European Parliament under Article 225 TFEU, this proposal takes into account the aforementioned resolution of the European Parliament in full respect of proportionality, subsidiarity and better law making principles.

    Against this political context, the Commission puts forward the proposed regulatory framework on Artificial Intelligence with the following specific objectives:

    • ensure that AI systems placed on the Union market and used are safe and respect existing law on fundamental rights and Union values;

    • ensure legal certainty to facilitate investment and innovation in AI;

    • enhance governance and effective enforcement of existing law on fundamental rights and safety requirements applicable to AI systems;

    • facilitate the development of a single market for lawful, safe and trustworthy AI applications and prevent market fragmentation.

    To achieve those objectives, this proposal presents a balanced and proportionate horizontal regulatory approach to AI that is limited to the minimum necessary requirements to address the risks and problems linked to AI, without unduly constraining or hindering technological development or otherwise disproportionately increasing the cost of placing AI solutions on the market. The proposal sets a robust and flexible legal framework. On the one hand, it is comprehensive and future-proof in its fundamental regulatory choices, including the principle-based requirements that AI systems should comply with. On the other hand, it puts in place a proportionate regulatory system centred on a well-defined risk-based regulatory approach that does not create unnecessary restrictions to trade, whereby legal intervention is tailored to those concrete situations where there is a justified cause for concern or where such concern can reasonably be anticipated in the near future. At the same time, the legal framework includes flexible mechanisms that enable it to be dynamically adapted as the technology evolves and new concerning situations emerge.

    The proposal sets harmonised rules for the development, placement on the market and use of AI systems in the Union following a proportionate risk-based approach. It proposes a single future-proof definition of AI. Certain particularly harmful AI practices are prohibited as contravening Union values, while specific restrictions and safeguards are proposed in relation to certain uses of remote biometric identification systems for the purpose of law enforcement. The proposal lays down a solid risk methodology to define “high-risk” AI systems that pose significant risks to the health and safety or fundamental rights of persons. Those AI systems will have to comply with a set of horizontal mandatory requirements for trustworthy AI and follow conformity assessment procedures before those systems can be placed on the Union market. Predictable, proportionate and clear obligations are also placed on providers and users of those systems to ensure safety and respect of existing legislation protecting fundamental rights throughout the whole AI systems’ lifecycle. For some specific AI systems, only minimum transparency obligations are proposed, in particular when chatbots or ‘deep fakes’ are used.

    The proposed rules will be enforced through a governance system at Member States level, building on already existing structures, and a cooperation mechanism at Union level with the establishment of a European Artificial Intelligence Board. Additional measures are also proposed to support innovation, in particular through AI regulatory sandboxes and other measures to reduce the regulatory burden and to support Small and Medium-Sized Enterprises (‘SMEs’) and start-ups.

    1.2. Consistency with existing policy provisions in the policy area

    The horizontal nature of the proposal requires full consistency with existing Union legislation applicable to sectors where high-risk AI systems are already used or likely to be used in the near future.

    Consistency is also ensured with the EU Charter of Fundamental Rights and the existing secondary Union legislation on data protection, consumer protection, non-discrimination and gender equality. The proposal is without prejudice and complements the General Data Protection Regulation (Regulation (EU) 2016/679) and the Law Enforcement Directive (Directive (EU) 2016/680) with a set of harmonised rules applicable to the design, development and use of certain high-risk AI systems and restrictions on certain uses of remote biometric identification systems. Furthermore, the proposal complements existing Union law on non-discrimination with specific requirements that aim to minimise the risk of algorithmic discrimination, in particular in relation to the design and the quality of data sets used for the development of AI systems complemented with obligations for testing, risk management, documentation and human oversight throughout the AI systems’ lifecycle. The proposal is without prejudice to the application of Union competition law.

    As regards high-risk AI systems which are safety components of products, this proposal will be integrated into the existing sectoral safety legislation to ensure consistency, avoid duplications and minimise additional burdens. In particular, as regards high-risk AI systems related to products covered by the New Legislative Framework (NLF) legislation (e.g. machinery, medical devices, toys), the requirements for AI systems set out in this proposal will be checked as part of the existing conformity assessment procedures under the relevant NLF legislation. With regard to the interplay of requirements, while the safety risks specific to AI systems are meant to be covered by the requirements of this proposal, NLF legislation aims at ensuring the overall safety of the final product and therefore may contain specific requirements regarding the safe integration of an AI system into the final product. The proposal for a Machinery Regulation, which is adopted on the same day as this proposal fully reflects this approach. As regards high-risk AI systems related to products covered by relevant Old Approach legislation (e.g. aviation, cars), this proposal would not directly apply. However, the ex-ante essential requirements for high-risk AI systems set out in this proposal will have to be taken into account when adopting relevant implementing or delegated legislation under those acts.

    As regards AI systems provided or used by regulated credit institutions, the authorities responsible for the supervision of the Union’s financial services legislation should be designated as competent authorities for supervising the requirements in this proposal to ensure a coherent enforcement of the obligations under this proposal and the Union’s financial services legislation where AI systems are to some extent implicitly regulated in relation to the internal governance system of credit institutions. To further enhance consistency, the conformity assessment procedure and some of the providers’ procedural obligations under this proposal are integrated into the procedures under Directive 2013/36/EU on access to the activity of credit institutions and the prudential supervisión (14).

    This proposal is also consistent with the applicable Union legislation on services, including on intermediary services regulated by the e-Commerce Directive 2000/31/EC (15) and the Commission’s recent proposal for the Digital Services Act (DSA) (16).

    In relation to AI systems that are components of large-scale IT systems in the Area of Freedom, Security and Justice managed by the European Union Agency for the Operational Management of Large-Scale IT Systems (eu-LISA), the proposal will not apply to those AI systems that have been placed on the market or put into service before one year has elapsed from the date of application of this Regulation, unless the replacement or amendment of those legal acts leads to a significant change in the design or intended purpose of the AI system or AI systems concerned.

    1.3. Consistency with other Union policies

    The proposal is part of a wider comprehensive package of measures that address problems posed by the development and use of AI, as examined in the White Paper on AI. Consistency and complementarity is therefore ensured with other ongoing or planned initiatives of the Commission that also aim to address those problems, including the revision of sectoral product legislation (e.g. the Machinery Directive, the General Product Safety Directive) and initiatives that address liability issues related to new technologies, including AI systems. Those initiatives will build on and complement this proposal in order to bring legal clarity and foster the development of an ecosystem of trust in AI in Europe.

    The proposal is also coherent with the Commission’s overall digital strategy in its contribution to promoting technology that works for people, one of the three main pillars of the policy orientation and objectives announced in the Communication ‘Shaping Europe’s digital future’ (17). It lays down a coherent, effective and proportionate framework to ensure AI is developed in ways that respect people’s rights and earn their trust, making Europe fit for the digital age and turning the next ten years into the Digital Decade (18).

    Furthermore, the promotion of AI-driven innovation is closely linked to the Data Governance Act (19), the Open Data Directive (20) and other initiatives under the EU strategy for data (21), which will establish trusted mechanisms and services for the re-use, sharing and pooling of data that are essential for the development of data-driven AI models of high quality.

    The proposal also strengthens significantly the Union’s role to help shape global norms and standards and promote trustworthy AI that is consistent with Union values and interests. It provides the Union with a powerful basis to engage further with its external partners, including third countries, and at international fora on issues relating to AI.

    2. LEGAL BASIS, SUBSIDIARITY AND PROPORTIONALITY

    2.1. Legal basis

    The legal basis for the proposal is in the first place Article 114 of the Treaty on the Functioning of the European Union (TFEU), which provides for the adoption of measures to ensure the establishment and functioning of the internal market.

    This proposal constitutes a core part of the EU digital single market strategy. The primary objective of this proposal is to ensure the proper functioning of the internal market by setting harmonised rules in particular on the development, placing on the Union market and the use of products and services making use of AI technologies or provided as stand-alone AI systems. Some Member States are already considering national rules to ensure that AI is safe and is developed and used in compliance with fundamental rights obligations. This will likely lead to two main problems: i) a fragmentation of the internal market on essential elements regarding in particular the requirements for the AI products and services, their marketing, their use, the liability and the supervision by public authorities, and ii) the substantial diminishment of legal certainty for both providers and users of AI systems on how existing and new rules will apply to those systems in the Union. Given the wide circulation of products and services across borders, these two problems can be best solved through EU harmonizing legislation.

    Indeed, the proposal defines common mandatory requirements applicable to the design and development of certain AI systems before they are placed on the market that will be further operationalised through harmonised technical standards. The proposal also addresses the situation after AI systems have been placed on the market by harmonising the way in which ex-post controls are conducted.

    In addition, considering that this proposal contains certain specific rules on the protection of individuals with regard to the processing of personal data, notably restrictions of the use of AI systems for ‘real-time’ remote biometric identification in publicly accessible spaces for the purpose of law enforcement, it is appropriate to base this regulation, in as far as those specific rules are concerned, on Article 16 of the TFEU.

    2.2. Subsidiarity (for non-exclusive competence)

    The nature of AI, which often relies on large and varied datasets and which may be embedded in any product or service circulating freely within the internal market, entails that the objectives of this proposal cannot be effectively achieved by Member States alone. Furthermore, an emerging patchwork of potentially divergent national rules will hamper the seamless circulation of products and services related to AI systems across the EU and will be ineffective in ensuring the safety and protection of fundamental rights and Union values across the different Member States. National approaches in addressing the problems will only create additional legal uncertainty and barriers, and will slow market uptake of AI.

    The objectives of this proposal can be better achieved at Union level to avoid a further fragmentation of the Single Market into potentially contradictory national frameworks preventing the free circulation of goods and services embedding AI. A solid European regulatory framework for trustworthy AI will also ensure a level playing field and protect all people, while strengthening Europe’s competitiveness and industrial basis in AI. Only common action at Union level can also protect the Union’s digital sovereignty and leverage its tools and regulatory powers to shape global rules and standards.

    2.3. Proportionality

    The proposal builds on existing legal frameworks and is proportionate and necessary to achieve its objectives, since it follows a risk-based approach and imposes regulatory burdens only when an AI system is likely to pose high risks to fundamental rights and safety. For other, non-high-risk AI systems, only very limited transparency obligations are imposed, for example in terms of the provision of information to flag the use of an AI system when interacting with humans. For high-risk AI systems, the requirements of high quality data, documentation and traceability, transparency, human oversight, accuracy and robustness, are strictly necessary to mitigate the risks to fundamental rights and safety posed by AI and that are not covered by other existing legal frameworks. Harmonised standards and supporting guidance and compliance tools will assist providers and users in complying with the requirements laid down by the proposal and minimise their costs. The costs incurred by operators are proportionate to the objectives achieved and the economic and reputational benefits that operators can expect from this proposal.

    2.4. Choice of the instrument

    The choice of a regulation as a legal instrument is justified by the need for a uniform application of the new rules, such as definition of AI, the prohibition of certain harmful AI-enabled practices and the classification of certain AI systems. The direct applicability of a Regulation, in accordance with Article 288 TFEU, will reduce legal fragmentation and facilitate the development of a single market for lawful, safe and trustworthy AI systems. It will do so, in particular, by introducing a harmonised set of core requirements with regard to AI systems classified as high-risk and obligations for providers and users of those systems, improving the protection of fundamental rights and providing legal certainty for operators and consumers alike.

    At the same time, the provisions of the regulation are not overly prescriptive and leave room for different levels of Member State action for elements that do not undermine the objectives of the initiative, in particular the internal organisation of the market surveillance system and the uptake of measures to foster innovation.

    3. RESULTS OF EX-POST EVALUATIONS, STAKEHOLDER CONSULTATIONS AND IMPACT ASSESSMENTS

    3.1. Stakeholder consultation

    This proposal is the result of extensive consultation with all major stakeholders, in which the general principles and minimum standards for consultation of interested parties by the Commission were applied.

    An online public consultation was launched on 19 February 2020 along with the publication of the White Paper on Artificial Intelligence and ran until 14 June 2020. The objective of that consultation was to collect views and opinions on the White Paper. It targeted all interested stakeholders from the public and private sectors, including governments, local authorities, commercial and non-commercial organisations, social partners, experts, academics and citizens. After analysing all the responses received, the Commission published a summary outcome and the individual responses on its website (22).

    In total, 1215 contributions were received, of which 352 were from companies or business organisations/associations, 406 from individuals (92%individuals from EU ), 152 on behalf of academic/research institutions, and 73 from public authorities. Civil society’s voices were represented by 160 respondents (among which 9 consumers’ organisations, 129 non-governmental organisations and 22 trade unions), 72 respondents contributed as ‘others’. Of the 352 business and industry representatives, 222 were companies and business representatives, 41.5% of which were micro, small and medium-sized enterprises. The rest were business associations. Overall, 84% of business and industry replies came from the EU-27. Depending on the question, between 81 and 598 of the respondents used the free text option to insert comments. Over 450 position papers were submitted through the EU Survey website, either in addition to questionnaire answers (over 400) or as stand-alone contributions (over 50).

    Overall, there is a general agreement amongst stakeholders on a need for action. A large majority of stakeholders agree that legislative gaps exist or that new legislation is needed. However, several stakeholders warn the Commission to avoid duplication, conflicting obligations and overregulation. There were many comments underlining the importance of a technology neutral and proportionate regulatory framework.

    Stakeholders mostly requested a narrow, clear and precise definition for AI. Stakeholders also highlighted that besides the clarification of the term of AI, it is important to define ‘risk’, ‘high-risk’, ‘low-risk’, ‘remote biometric identification’ and ‘harm’.

    Most of the respondents are explicitly in favour of the risk-based approach. Using a risk-based framework was considered a better option than blanket regulation of all AI systems. The types of risks and threats should be based on a sector-by-sector and case-by-case approach. Risks also should be calculated taking into account the impact on rights and safety.

    Regulatory sandboxes could be very useful for the promotion of AI and are welcomed by certain stakeholders, especially the Business Associations.

    Among those who formulated their opinion on the enforcement models, more than 50%, especially from the business associations, were in favour of a combination of an ex-ante risk self-assessment and an ex-post enforcement for high-risk AI systems.

    3.2. Collection and use of expertise

    The proposal builds on two years of analysis and close involvement of stakeholders, including academics, businesses, social partners, non-governmental organisations, Member States and citizens. The preparatory work started in 2018 with the setting up of a High-Level Expert Group on AI (HLEG) which had an inclusive and broad composition of 52 well-known experts tasked to advise the Commission on the implementation of the Commission’s Strategy on Artificial Intelligence. In April 2019, the Commission supported (23) the key requirements set out in the HLEG ethics guidelines for Trustworthy AI (24), which had been revised to take into account more than 500 submissions from stakeholders. The key requirements reflect a widespread and common approach, as evidenced by a plethora of ethical codes and principles developed by many private and public organisations in Europe and beyond, that AI development and use should be guided by certain essential value-oriented principles. The Assessment List for Trustworthy Artificial Intelligence (ALTAI) (25) made those requirements operational in a piloting process with over 350 organisations.

    In addition, the AI Alliance (26) was formed as a platform for approximately 4000 stakeholders to debate the technological and societal implications of AI, culminating in a yearly AI Assembly.

    The White Paper on AI further developed this inclusive approach, inciting comments from more than 1250 stakeholders, including over 450 additional position papers. As a result, the Commission published an Inception Impact Assessment, which in turn attracted more than 130 comments (27). Additional stakeholder workshops and events were also organised the results of which support the analysis in the impact assessment and the policy choices made in this proposal (28). An external study was also procured to feed into the impact assessment.

    3.3. Impact assessment

    In line with its “Better Regulation” policy, the Commission conducted an impact assessment for this proposal examined by the Commission’s Regulatory Scrutiny Board. A meeting with the Regulatory Scrutiny Board was held on 16 December 2020, which was followed by a negative opinion. After substantial revision of the impact assessment to address the comments and a resubmission of the impact assessment, the Regulatory Scrutiny Board issued a positive opinion on 21 March 2021. The opinions of the Regulatory Scrutiny Board, the recommendations and an explanation of how they have been taken into account are presented in Annex 1 of the impact assessment.

    The Commission examined different policy options to achieve the general objective of the proposal, which is to ensure the proper functioning of the single market by creating the conditions for the development and use of trustworthy AI in the Union.

    Four policy options of different degrees of regulatory intervention were assessed:

    • Option 1: EU legislative instrument setting up a voluntary labelling scheme;

    • Option 2: a sectoral, “ad-hoc” approach;

    • Option 3: Horizontal EU legislative instrument following a proportionate risk-based approach;

    • Option 3+: Horizontal EU legislative instrument following a proportionate risk-based approach + codes of conduct for non-high-risk AI systems;

    • Option 4: Horizontal EU legislative instrument establishing mandatory requirements for all AI systems, irrespective of the risk they pose.

    According to the Commission’s established methodology, each policy option was evaluated against economic and societal impacts, with a particular focus on impacts on fundamental rights. The preferred option is option 3+, a regulatory framework for high-risk AI systems only, with the possibility for all providers of non-high-risk AI systems to follow a code of conduct. The requirements will concern data, documentation and traceability, provision of information and transparency, human oversight and robustness and accuracy and would be mandatory for high-risk AI systems. Companies that introduced codes of conduct for other AI systems would do so voluntarily.

    The preferred option was considered suitable to address in the most effective way the objectives of this proposal. By requiring a restricted yet effective set of actions from AI developers and users, the preferred option limits the risks of violation of fundamental rights and safety of people and foster effective supervision and enforcement, by targeting the requirements only to systems where there is a high risk that such violations could occur. As a result, that option keeps compliance costs to a minimum, thus avoiding an unnecessary slowing of uptake due to higher prices and compliance costs. In order to address possible disadvantages for SMEs, this option includes several provisions to support their compliance and reduce their costs, including creation of regulatory sandboxes and obligation to consider SMEs interests when setting fees related to conformity assessment.

    The preferred option will increase people’s trust in AI, companies will gain in legal certainty, and Member States will see no reason to take unilateral action that could fragment the single market. As a result of higher demand due to higher trust, more available offers due to legal certainty, and the absence of obstacles to cross-border movement of AI systems, the single market for AI will likely flourish. The European Union will continue to develop a fast-growing AI ecosystem of innovative services and products embedding AI technology or stand-alone AI systems, resulting in increased digital autonomy.

    Businesses or public authorities that develop or use AI applications that constitute a high risk for the safety or fundamental rights of citizens would have to comply with specific requirements and obligations. Compliance with these requirements would imply costs amounting to approximately EUR € 6000 to EUR € 7000 for the supply of an average high-risk AI system of around EUR € 170000 by 2025. For AI users, there would also be the annual cost for the time spent on ensuring human oversight where this is appropriate, depending on the use case. Those have been estimated at approximately EUR € 5000 to EUR € 8000 per year. Verification costs could amount to another EUR € 3000 to EUR € 7500 for suppliers of high-risk AI. Businesses or public authorities that develop or use any AI applications not classified as high risk would only have minimal obligations of information. However, they could choose to join others and together adopt a code of conduct to follow suitable requirements, and to ensure that their AI systems are trustworthy. In such a case, costs would be at most as high as for high-risk AI systems, but most probably lower.

    The impacts of the policy options on different categories of stakeholders (economic operators/ business; conformity assessment bodies, standardisation bodies and other public bodies; individuals/citizens; researchers) are explained in detail in Annex 3 of the Impact assessment supporting this proposal.

    3.4. Regulatory fitness and simplification

    This proposal lays down obligation that will apply to providers and users of high-risk AI systems. For providers who develop and place such systems on the Union market, it will create legal certainty and ensure that no obstacle to the cross-border provision of AI-related services and products emerge. For companies using AI, it will promote trust among their customers. For national public administrations, it will promote public trust in the use of AI and strengthen enforcement mechanisms (by introducing a European coordination mechanism, providing for appropriate capacities, and facilitating audits of the AI systems with new requirements for documentation, traceability and transparency). Moreover, the framework will envisage specific measures supporting innovation, including regulatory sandboxes and specific measures supporting small-scale users and providers of high-risk AI systems to comply with the new rules.

    The proposal also specifically aims at strengthening Europe’s competitiveness and industrial basis in AI. Full consistency is ensured with existing sectoral Union legislation applicable to

    AI systems (e.g. on products and services) that will bring further clarity and simplify the enforcement of the new rules.

    3.5. Fundamental rights

    The use of AI with its specific characteristics (e.g. opacity, complexity, dependency on data, autonomous behaviour) can adversely affect a number of fundamental rights enshrined in the EU Charter of Fundamental Rights (‘the Charter’). This proposal seeks to ensure a high level of protection for those fundamental rights and aims to address various sources of risks through a clearly defined risk-based approach. With a set of requirements for trustworthy AI and proportionate obligations on all value chain participants, the proposal will enhance and promote the protection of the rights protected by the Charter: the right to human dignity (Article 1), respect for private life and protection of personal data (Articles 7 and 8), non-discrimination (Article 21) and equality between women and men (Article 23). It aims to prevent a chilling effect on the rights to freedom of expression (Article 11) and freedom of assembly (Article 12), to ensure protection of the right to an effective remedy and to a fair trial, the rights of defence and the presumption of innocence (Articles 47 and 48), as well as the general principle of good administration. Furthermore, as applicable in certain domains, the proposal will positively affect the rights of a number of special groups, such as the workers’ rights to fair and just working conditions (Article 31), a high level of consumer protection (Article 28), the rights of the child (Article 24) and the integration of persons with disabilities (Article 26). The right to a high level of environmental protection and the improvement of the quality of the environment (Article 37) is also relevant, including in relation to the health and safety of people. The obligations for ex ante testing, risk management and human oversight will also facilitate the respect of other fundamental rights by minimising the risk of erroneous or biased AI-assisted decisions in critical areas such as education and training, employment, important services, law enforcement and the judiciary. In case infringements of fundamental rights still happen, effective redress for affected persons will be made possible by ensuring transparency and traceability of the AI systems coupled with strong ex post controls.

    This proposal imposes some restrictions on the freedom to conduct business (Article 16) and the freedom of art and science (Article 13) to ensure compliance with overriding reasons of public interest such as health, safety, consumer protection and the protection of other fundamental rights (‘responsible innovation’) when high-risk AI technology is developed and used. Those restrictions are proportionate and limited to the minimum necessary to prevent and mitigate serious safety risks and likely infringements of fundamental rights.

    The increased transparency obligations will also not disproportionately affect the right to protection of intellectual property (Article 17(2)), since they will be limited only to the minimum necessary information for individuals to exercise their right to an effective remedy and to the necessary transparency towards supervision and enforcement authorities, in line with their mandates. Any disclosure of information will be carried out in compliance with relevant legislation in the field, including Directive 2016/943 on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure. When public authorities and notified bodies need to be given access to confidential information or source code to examine compliance with substantial obligations, they are placed under binding confidentiality obligations.

    4. BUDGETARY IMPLICATIONS

    Member States will have to designate supervisory authorities in charge of implementing the legislative requirements. Their supervisory function could build on existing arrangements, for example regarding conformity assessment bodies or market surveillance, but would require sufficient technological expertise and human and financial resources. Depending on the pre-existing structure in each Member State, this could amount to 1 to 25 Full Time Equivalents per Member State.

    A detailed overview of the costs involved is provided in the ‘financial statement’ linked to this proposal.

    5. OTHER ELEMENTS

    5.1. Implementation plans and monitoring, evaluation and reporting arrangements

    Providing for a robust monitoring and evaluation mechanism is crucial to ensure that the proposal will be effective in achieving its specific objectives. The Commission will be in charge of monitoring the effects of the proposal. It will establish a system for registering stand-alone high-risk AI applications in a public EU-wide database. This registration will also enable competent authorities, users and other interested people to verify if the high-risk AI system complies with the requirements laid down in the proposal and to exercise enhanced oversight over those AI systems posing high risks to fundamental rights. To feed this database, AI providers will be obliged to provide meaningful information about their systems and the conformity assessment carried out on those systems.

    Moreover, AI providers will be obliged to inform national competent authorities about serious incidents or malfunctioning that constitute a breach of fundamental rights obligations as soon as they become aware of them, as well as any recalls or withdrawals of AI systems from the market. National competent authorities will then investigate the incidents/or malfunctioning, collect all the necessary information and regularly transmit it to the Commission with adequate metadata. The Commission will complement this information on the incidents by a comprehensive analysis of the overall market for AI.

    The Commission will publish a report evaluating and reviewing the proposed AI framework five years following the date on which it becomes applicable.

    5.2. Detailed explanation of the specific provisions of the proposal

    5.2.1. SCOPE AND DEFINITIONS (TITLE I)

    Title I defines the subject matter of the regulation and the scope of application of the new rules that cover the placing on the market, putting into service and use of AI systems. It also sets out the definitions used throughout the instrument. The definition of AI system in the legal framework aims to be as technology neutral and future proof as possible, taking into account the fast technological and market developments related to AI. In order to provide the needed legal certainty, Title I is complemented by Annex I, which contains a detailed list of approaches and techniques for the development of AI to be adapted by the Commission in line with new technological developments. Key participants across the AI value chain are also clearly defined such as providers and users of AI systems that cover both public and private operators to ensure a level playing field.

    5.2.2. PROHIBITED ARTIFICIAL INTELLIGENCE PRACTICES (TITLE II)

    Title II establishes a list of prohibited AI. The regulation follows a risk-based approach, differentiating between uses of AI that create (i) an unacceptable risk, (ii) a high risk, and (iii) low or minimal risk. The list of prohibited practices in Title II comprises all those AI systems whose use is considered unacceptable as contravening Union values, for instance by violating fundamental rights. The prohibitions covers practices that have a significant potential to manipulate persons through subliminal techniques beyond their consciousness or exploit vulnerabilities of specific vulnerable groups such as children or persons with disabilities in order to materially distort their behaviour in a manner that is likely to cause them or another person psychological or physical harm. Other manipulative or exploitative practices affecting adults that might be facilitated by AI systems could be covered by the existing data protection, consumer protection and digital service legislation that guarantee that natural persons are properly informed and have free choice not to be subject to profiling or other practices that might affect their behaviour. The proposal also prohibits AI-based social scoring for general purposes done by public authorities. Finally, the use of ‘real time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement is also prohibited unless certain limited exceptions apply.

    5.2.3. HIGH-RISK AI SYSTEMS (TITLE III)

    Title III contains specific rules for AI systems that create a high risk to the health and safety or fundamental rights of natural persons. In line with a risk-based approach, those high-risk AI systems are permitted on the European market subject to compliance with certain mandatory requirements and an ex-ante conformity assessment. The classification of an AI system as high-risk is based on the intended purpose of the AI system, in line with existing product safety legislation. Therefore, the classification as high-risk does not only depend on the function performed by the AI system, but also on the specific purpose and modalities for which that system is used.

    Chapter 1 of Title III sets the classification rules and identifies two main categories of high-risk AI systems:

    • AI systems intended to be used as safety component of products that are subject to third party ex-ante conformity assessment;

    • other stand-alone AI systems with mainly fundamental rights implications that are explicitly listed in Annex III.

    This list of high-risk AI systems in Annex III contains a limited number of AI systems whose risks have already materialised or are likely to materialise in the near future. To ensure that the regulation can be adjusted to emerging uses and applications of AI, the Commission may expand the list of high-risk AI systems used within certain pre-defined areas, by applying a set of criteria and risk assessment methodology.

    Chapter 2 sets out the legal requirements for high-risk AI systems in relation to data and data governance, documentation and recording keeping, transparency and provision of information to users, human oversight, robustness, accuracy and security. The proposed minimum requirements are already state-of-the-art for many diligent operators and the result of two years of preparatory work, derived from the Ethics Guidelines of the HLEG (29), piloted by more than 350 organisations (30). They are also largely consistent with other international recommendations and principles, which ensures that the proposed AI framework is compatible with those adopted by the EU’s international trade partners. The precise technical solutions to achieve compliance with those requirements may be provided by standards or by other technical specifications or otherwise be developed in accordance with general engineering or scientific knowledge at the discretion of the provider of the AI system. This flexibility is particularly important, because it allows providers of AI systems to choose the way to meet their requirements, taking into account the state-of-the-art and technological and scientific progress in this field.

    Chapter 3 places a clear set of horizontal obligations on providers of high-risk AI systems. Proportionate obligations are also placed on users and other participants across the AI value chain (e.g., importers, distributors, authorized representatives).

    Chapter 4 sets the framework for notified bodies to be involved as independent third parties in conformity assessment procedures, while Chapter 5 explains in detail the conformity assessment procedures to be followed for each type of high-risk AI system. The conformity assessment approach aims to minimise the burden for economic operators as well as for notified bodies, whose capacity needs to be progressively ramped up over time. AI systems intended to be used as safety components of products that are regulated under the New Legislative Framework legislation (e.g. machinery, toys, medical devices, etc.) will be subject to the same ex-ante and ex-post compliance and enforcement mechanisms of the products of which they are a component. The key difference is that the ex-ante and ex-post mechanisms will ensure compliance not only with the requirements established by sectorial legislation, but also with the requirements established by this regulation.

    As regards stand-alone high-risk AI systems that are referred to in Annex III, a new compliance and enforcement system will be established. This follows the model of the New Legislative Framework legislation implemented through internal control checks by the providers with the exception of remote biometric identification systems that would be subject to third party conformity assessment. A comprehensive ex-ante conformity assessment through internal checks, combined with a strong ex-post enforcement, could be an effective and reasonable solution for those systems, given the early phase of the regulatory intervention and the fact the AI sector is very innovative and expertise for auditing is only now being accumulated. An assessment through internal checks for ‘stand-alone’ high-risk AI systems would require a full, effective and properly documented ex ante compliance with all requirements of the regulation and compliance with robust quality and risk management systems and post-market monitoring. After the provider has performed the relevant conformity assessment, it should register those stand-alone high-risk AI systems in an EU database that will be managed by the Commission to increase public transparency and oversight and strengthen ex post supervision by competent authorities. By contrast, for reasons of consistency with the existing product safety legislation, the conformity assessments of AI systems that are safety components of products will follow a system with third party conformity assessment procedures already established under the relevant sectoral product safety legislation. New ex ante re-assessments of the conformity will be needed in case of substantial modifications to the AI systems (and notably changes which go beyond what is pre-determined by the provider in its technical documentation and checked at the moment of the ex-ante conformity assessment).

    5.2.4. TRANSPARENCY OBLIGATIONS FOR CERTAIN AI SYSTEMS (TITLE IV)

    Title IV concerns certain AI systems to take account of the specific risks of manipulation they pose. Transparency obligations will apply for systems that (i) interact with humans, (ii) are used to detect emotions or determine association with (social) categories based on biometric data, or (iii) generate or manipulate content (‘deep fakes’). When persons interact with an AI system or their emotions or characteristics are recognised through automated means, people must be informed of that circumstance. If an AI system is used to generate or manipulate image, audio or video content that appreciably resembles authentic content, there should be an obligation to disclose that the content is generated through automated means, subject to exceptions for legitimate purposes (law enforcement, freedom of expression). This allows persons to make informed choices or step back from a given situation.

    5.2.5. MEASURES IN SUPPORT OF INNOVATION (TITLE V)

    Title V contributes to the objective to create a legal framework that is innovation-friendly, future-proof and resilient to disruption. To that end, it encourages national competent authorities to set up regulatory sandboxes and sets a basic framework in terms of governance, supervision and liability. AI regulatory sandboxes establish a controlled environment to test innovative technologies for a limited time on the basis of a testing plan agreed with the competent authorities. Title V also contains measures to reduce the regulatory burden on SMEs and start-ups.

    5.2.6. GOVERNANCE AND IMPLEMENTATION (TITLES VI, VII AND VII)

    Title VI sets up the governance systems at Union and national level. At Union level, the proposal establishes a European Artificial Intelligence Board (the ‘Board’), composed of representatives from the Member States and the Commission. The Board will facilitate a smooth, effective and harmonised implementation of this regulation by contributing to the effective cooperation of the national supervisory authorities and the Commission and providing advice and expertise to the Commission. It will also collect and share best practices among the Member States.

    At national level, Member States will have to designate one or more national competent authorities and, among them, the national supervisory authority, for the purpose of supervising the application and implementation of the regulation. The European Data Protection Supervisor will act as the competent authority for the supervision of the Union institutions, agencies and bodies when they fall within the scope of this regulation.

    Title VII aims to facilitate the monitoring work of the Commission and national authorities through the establishment of an EU-wide database for stand-alone high-risk AI systems with mainly fundamental rights implications. The database will be operated by the Commission and provided with data by the providers of the AI systems, who will be required to register their systems before placing them on the market or otherwise putting them into service.

    Title VIII sets out the monitoring and reporting obligations for providers of AI systems with regard to post-market monitoring and reporting and investigating on AI-related incidents and malfunctioning. Market surveillance authorities would also control the market and investigate compliance with the obligations and requirements for all high-risk AI systems already placed on the market. Market surveillance authorities would have all powers under Regulation (EU) 2019/1020 on market surveillance. Ex-post enforcement should ensure that once the AI system has been put on the market, public authorities have the powers and resources to intervene in case AI systems generate unexpected risks, which warrant rapid action. They will also monitor compliance of operators with their relevant obligations under the regulation. The proposal does not foresee the automatic creation of any additional bodies or authorities at Member State level. Member States may therefore appoint (and draw upon the expertise of) existing sectorial authorities, who would be entrusted also with the powers to monitor and enforce the provisions of the regulation.

    All this is without prejudice to the existing system and allocation of powers of ex-post enforcement of obligations regarding fundamental rights in the Member States. When necessary for their mandate, existing supervision and enforcement authorities will also have the power to request and access any documentation maintained following this regulation and, where needed, request market surveillance authorities to organise testing of the high-risk AI system through technical means.

    5.2.7. CODES OF CONDUCT (TITLE IX)

    Title IX creates a framework for the creation of codes of conduct, which aim to encourage providers of non-high-risk AI systems to apply voluntarily the mandatory requirements for high-risk AI systems (as laid out in Title III). Providers of non-high-risk AI systems may create and implement the codes of conduct themselves. Those codes may also include voluntary commitments related, for example, to environmental sustainability, accessibility for persons with disability, stakeholders’ participation in the design and development of AI systems, and diversity of development teams.

    5.2.8. FINAL PROVISIONS (TITLES X, XI AND XII)

    Title X emphasizes the obligation of all parties to respect the confidentiality of information and data and sets out rules for the exchange of information obtained during the implementation of the regulation. Title X also includes measures to ensure the effective implementation of the regulation through effective, proportionate, and dissuasive penalties for infringements of the provisions.

    Title XI sets out rules for the exercise of delegation and implementing powers. The proposal empowers the Commission to adopt, where appropriate, implementing acts to ensure uniform application of the regulation or delegated acts to update or complement the lists in Annexes I to VII.

    Title XII contains an obligation for the Commission to assess regularly the need for an update of Annex III and to prepare regular reports on the evaluation and review of the regulation. It also lays down final provisions, including a differentiated transitional period for the initial date of the applicability of the regulation to facilitate the smooth implementation for all parties concerned.

    2021/0106 (COD)

    Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL LAYING DOWN HARMONISED RULES ON ARTIFICIAL INTELLIGENCE (ARTIFICIAL INTELLIGENCE ACT) AND AMENDING CERTAIN UNION LEGISLATIVE ACTS

    THE EUROPEAN PARLIAMENT AND THE COUNCIL OF THE EUROPEAN UNION,

    Having regard to the Treaty on the Functioning of the European Union, and in particular Articles 16 and 114 thereof,

    Having regard to the proposal from the European Commission,

    After transmission of the draft legislative act to the national parliaments,

    Having regard to the opinion of the European Economic and Social Committee (31),

    Having regard to the opinion of the Committee of the Regions (32),

    Acting in accordance with the ordinary legislative procedure,

    Whereas:

    (1) The purpose of this Regulation is to improve the functioning of the internal market by laying down a uniform legal framework in particular for the development, marketing and use of artificial intelligence in conformity with Union values. This Regulation pursues a number of overriding reasons of public interest, such as a high level of protection of health, safety and fundamental rights, and it ensures the free movement of AI-based goods and services cross-border, thus preventing Member States from imposing restrictions on the development, marketing and use of AI systems, unless explicitly authorised by this Regulation.

    (2) Artificial intelligence systems (AI systems) can be easily deployed in multiple sectors of the economy and society, including cross border, and circulate throughout the Union. Certain Member States have already explored the adoption of national rules to ensure that artificial intelligence is safe and is developed and used in compliance with fundamental rights obligations. Differing national rules may lead to fragmentation of the internal market and decrease legal certainty for operators that develop or use AI systems. A consistent and high level of protection throughout the Union should therefore be ensured, while divergences hampering the free circulation of AI systems and related products and services within the internal market should be prevented, by laying down uniform obligations for operators and guaranteeing the uniform protection of overriding reasons of public interest and of rights of persons throughout the internal market based on Article 114 of the Treaty on the Functioning of the European Union (TFEU). To the extent that this Regulation contains specific rules on the protection of individuals with regard to the processing of personal data concerning restrictions of the use of AI systems for ‘real-time’ remote biometric identification in publicly accessible spaces for the purpose of law enforcement, it is appropriate to base this Regulation, in as far as those specific rules are concerned, on Article 16 of the TFEU. In light of those specific rules and the recourse to Article 16 TFEU, it is appropriate to consult the European Data Protection Board.

    (3) Artificial intelligence is a fast evolving family of technologies that can contribute to a wide array of economic and societal benefits across the entire spectrum of industries and social activities. By improving prediction, optimising operations and resource allocation, and personalising digital solutions available for individuals and organisations, the use of artificial intelligence can provide key competitive advantages to companies and support socially and environmentally beneficial outcomes, for example in healthcare, farming, education and training, infrastructure management, energy, transport and logistics, public services, security, justice, resource and energy efficiency, and climate change mitigation and adaptation.

    (4) At the same time, depending on the circumstances regarding its specific application and use, artificial intelligence may generate risks and cause harm to public interests and rights that are protected by Union law. Such harm might be material or immaterial.

    (5) A Union legal framework laying down harmonised rules on artificial intelligence is therefore needed to foster the development, use and uptake of artificial intelligence in the internal market that at the same time meets a high level of protection of public interests, such as health and safety and the protection of fundamental rights, as recognised and protected by Union law. To achieve that objective, rules regulating the placing on the market and putting into service of certain AI systems should be laid down, thus ensuring the smooth fun (ctioning of the internal market and allowing those systems to benefit from the principle of free movement of goods and services. By laying down those rules, this Regulation supports the objective of the Union of being a global leader in the development of secure, trustworthy and ethical artificial intelligence, as stated by the European Council (33), and it ensures the protection of ethical principles, as specifically requested by the European Parliament (34).

    (6) The notion of AI system should be clearly defined to ensure legal certainty, while providing the flexibility to accommodate future technological developments. The definition should be based on the key functional characteristics of the software, in particular the ability, for a given set of human-defined objectives, to generate outputs such as content, predictions, recommendations, or decisions which influence the environment with which the system interacts, be it in a physical or digital dimension. AI systems can be designed to operate with varying levels of autonomy and be used on a stand-alone basis or as a component of a product, irrespective of whether the system is physically integrated into the product (embedded) or serve the functionality of the product without being integrated therein (non-embedded). The definition of AI system should be complemented by a list of specific techniques and approaches used for its development, which should be kept up-to–date in the light of market and technological developments through the adoption of delegated acts by the Commission to amend that list.

    (7) The notion of biometric data used in this Regulation is in line with and should be interpreted consistently with the notion of biometric data as defined in Article 4(14) of Regulation (EU) 2016/679 of the European Parliament and of the Council (35), Article 3(18) of Regulation (EU) 2018/1725 of the European Parliament and of the Council (36) and Article 3(13) of Directive (EU) 2016/680 of the European Parliament and of the Council (37).

    (8) The notion of remote biometric identification system as used in this Regulation should be defined functionally, as an AI system intended for the identification of natural persons at a distance through the comparison of a person’s biometric data with the biometric data  (contained in a reference database, and without prior knowledge whether the targeted person will be present and can be identified, irrespectively of the particular technology, processes or types of biometric data used. Considering their different characteristics and manners in which they are used, as well as the different risks involved, a distinction should be made between ‘real-time’ and ‘post’ remote biometric identification systems. In the case of ‘real-time’ systems, the capturing of the biometric data, the comparison and the identification occur all instantaneously, near-instantaneously or in any event without a significant delay. In this regard, there should be no scope for circumventing the rules of this Regulation on the ‘real-time’ use of the AI systems in question by providing for minor delays. ‘Real-time’ systems involve the use of ‘live’ or ‘near-‘live’ material, such as video footage, generated by a camera or other device with similar functionality. In the case of ‘post’ systems, in contrast, the biometric data have already been captured and the comparison and identification occur only after a significant delay. This involves material, such as pictures or video footage generated by closed circuit television cameras or private devices, which has been generated before the use of the system in respect of the natural persons concerned.

    (9) For the purposes of this Regulation the notion of publicly accessible space should be understood as referring to any physical place that is accessible to the public, irrespective of whether the place in question is privately or publicly owned. Therefore, the notion does not cover places that are private in nature and normally not freely accessible for third parties, including law enforcement authorities, unless those parties have been specifically invited or authorised, such as homes, private clubs, offices, warehouses and factories. Online spaces are not covered either, as they are not physical spaces. However, the mere fact that certain conditions for accessing a particular space may apply, such as admission tickets or age restrictions, does not mean that the space is not publicly accessible within the meaning of this Regulation. Consequently, in addition to public spaces such as streets, relevant parts of government buildings and most transport infrastructure, spaces such as cinemas, theatres, shops and shopping centres are normally also publicly accessible. Whether a given space is accessible to the public should however be determined on a case-by-case basis, having regard to the specificities of the individual situation at hand.

    (10) In order to ensure a level playing field and an effective protection of rights and freedoms of individuals across the Union, the rules established by this Regulation should apply to providers of AI systems in a non-discriminatory manner, irrespective of whether they are established within the Union or in a third country, and to users of AI systems established within the Union.

    (11) In light of their digital nature, certain AI systems should fall within the scope of this Regulation even when they are neither placed on the market, nor put into service, nor used in the Union. This is the case for example of an operator established in the Union that contracts certain services to an operator established outside the Union in relation to an activity to be performed by an AI system that would qualify as high-risk and whose effects impact natural persons located in the Union. In those circumstances, the AI system used by the operator outside the Union could process data lawfully collected in and transferred from the Union, and provide to the contracting operator in the Union the output of that AI system resulting from that processing, without that AI system being placed on the market, put into service or used in the Union. To prevent the circumvention of this Regulation and to ensure an effective protection of natural persons located in the Union, this Regulation should also apply to providers and users of AI systems that are established in a third country, to the extent the output produced by those systems is used in the Union. Nonetheless, to take into account existing arrangements and special needs for cooperation with foreign partners with whom information and evidence is exchanged, this Regulation should not apply to public authorities of a third country and international organisations when acting in the framework of international agreements concluded at national or European level for law enforcement and judicial cooperation with the Union or with its Member States. Such agreements have been concluded bilaterally between Member States and third countries or between the European Union, Europol and other EU agencies and third countries and international organisations.

    (12) This Regulation should also apply to Union institutions, offices, bodies and agencies when acting as a provider or user of an AI system. AI systems exclusively developed or used for military purposes should be excluded from the scope of this Regulation where that use falls under the exclusive remit of the Common Foreign and Security Policy regulated under Title V of the Treaty on the European Union (TEU). This Regulation should be without prejudice to the provisions regarding the liability of intermediary service providers set out in Directive 2000/31/EC of the European Parliament and of the Council [as amended by the Digital Services Act].

    (13) In order to ensure a consistent and high level of protection of public interests as regards health, safety and fundamental rights, common normative standards for all high-risk AI systems should be established. Those standards should be consistent with the Charter of fundamental rights of the European Union (the Charter) and should be non-discriminatory and in line with the Union’s international trade commitments.

    (14) In order to introduce a proportionate and effective set of binding rules for AI systems, a clearly defined risk-based approach should be followed. That approach should tailor the type and content of such rules to the intensity and scope of the risks that AI systems can generate. It is therefore necessary to prohibit certain artificial intelligence practices, to lay down requirements for high-risk AI systems and obligations for the relevant operators, and to lay down transparency obligations for certain AI systems.

    (15) Aside from the many beneficial uses of artificial intelligence, that technology can also be misused and provide novel and powerful tools for manipulative, exploitative and social control practices. Such practices are particularly harmful and should be prohibited because they contradict Union values of respect for human dignity, freedom, equality, democracy and the rule of law and Union fundamental rights, including the right to non-discrimination, data protection and privacy and the rights of the child.

    (16) The placing on the market, putting into service or use of certain AI systems intended to distort human behaviour, whereby physical or psychological harms are likely to occur, should be forbidden. Such AI systems deploy subliminal components individuals cannot perceive or exploit vulnerabilities of children and people due to their age, physical or mental incapacities. They do so with the intention to materially distort the behaviour of a person and in a manner that causes or is likely to cause harm to that or another person. The intention may not be presumed if the distortion of human behaviour results from factors external to the AI system which are outside of the control of the provider or the user. Research for legitimate purposes in relation to such AI systems should not be stifled by the prohibition, if such research does not amount to use of the AI system in human-machine relations that exposes natural persons to harm and such research is carried out in accordance with recognised ethical standards for scientific research.

    (17) AI systems providing social scoring of natural persons for general purpose by public authorities or on their behalf may lead to discriminatory outcomes and the exclusion of certain groups. They may violate the right to dignity and non-discrimination and the values of equality and justice. Such AI systems evaluate or classify the trustworthiness of natural persons based on their social behaviour in multiple contexts or known or predicted personal or personality characteristics. The social score obtained from such AI systems may lead to the detrimental or unfavourable treatment of natural persons or whole groups thereof in social contexts, which are unrelated to the context in which the data was originally generated or collected or to a detrimental treatment that is disproportionate or unjustified to the gravity of their social behaviour. Such AI systems should be therefore prohibited.

    (18) The use of AI systems for ‘real-time’ remote biometric identification of natural persons in publicly accessible spaces for the purpose of law enforcement is considered particularly intrusive in the rights and freedoms of the concerned persons, to the extent that it may affect the private life of a large part of the population, evoke a feeling of constant surveillance and indirectly dissuade the exercise of the freedom of assembly and other fundamental rights. In addition, the immediacy of the impact and the limited opportunities for further checks or corrections in relation to the use of such systems operating in ‘real-time’ carry heightened risks for the rights and freedoms of the persons that are concerned by law enforcement activities.

    (19) The use of those systems for the purpose of law enforcement should therefore be prohibited, except in three exhaustively listed and narrowly defined situations, where the use is strictly necessary to achieve a substantial public interest, the importance of which outweighs the risks. Those situations involve the search for potential victims of crime, including missing children; certain threats to the life or physical safety of natural persons or of a terrorist attack; and the detection, localisation, identification or prosecution of perpetrators or suspects of the criminal offences referred to in Council Framework Decision 2002/584/JHA (38) if those criminal offences are punishable in the Member State concerned by a custodial sentence or a detention order for a maximum period of at least three years and as they are defined in the law of that Member State. Such threshold for the custodial sentence or detention order in accordance with national law contributes to ensure that the offence should be serious enough to potentially justify the use of ‘real-time’ remote biometric identification systems. Moreover, of the 32 criminal offences listed in the Council Framework Decision 2002/584/JHA, some are in practice likely to be more relevant than others, in that the recourse to ‘real-time’ remote biometric identification will foreseeably be necessary and proportionate to highly varying degrees for the practical pursuit of the detection, localisation, identification or prosecution of a perpetrator or suspect of the different criminal offences listed and having regard to the likely differences in the seriousness, probability and scale of the harm or possible negative consequences.

    (20) In order to ensure that those systems are used in a responsible and proportionate manner, it is also important to establish that, in each of those three exhaustively listed and narrowly defined situations, certain elements should be taken into account, in particular as regards the nature of the situation giving rise to the request and the consequences of the use for the rights and freedoms of all persons concerned and the safeguards and conditions provided for with the use. In addition, the use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement should be subject to appropriate limits in time and space, having regard in particular to the evidence or indications regarding the threats, the victims or perpetrator. The reference database of persons should be appropriate for each use case in each of the three situations mentioned above.

    (21) Each use of a ‘real-time’ remote biometric identification system in publicly accessible spaces for the purpose of law enforcement should be subject to an express and specific authorisation by a judicial authority or by an independent administrative authority of a Member State. Such authorisation should in principle be obtained prior to the use, except in duly justified situations of urgency, that is, situations where the need to use the systems in question is such as to make it effectively and objectively impossible to obtain an authorisation before commencing the use. In such situations of urgency, the use should be restricted to the absolute minimum necessary and be subject to appropriate safeguards and conditions, as determined in national law and specified in the context of each individual urgent use case by the law enforcement authority itself. In addition, the law enforcement authority should in such situations seek to obtain an authorisation as soon as possible, whilst providing the reasons for not having been able to request it earlier.

    (22) Furthermore, it is appropriate to provide, within the exhaustive framework set by this Regulation that such use in the territory of a Member State in accordance with this Regulation should only be possible where and in as far as the Member State in question has decided to expressly provide for the possibility to authorise such use in its detailed rules of national law. Consequently, Member States remain free under this Regulation not to provide for such a possibility at all or to only provide for such a possibility in respect of some of the objectives capable of justifying authorised use identified in this Regulation.

    (23) The use of AI systems for ‘real-time’ remote biometric identification of natural persons in publicly accessible spaces for the purpose of law enforcement necessarily involves the processing of biometric data. The rules of this Regulation that prohibit, subject to certain exceptions, such use, which are based on Article 16 TFEU, should apply as lex specialis in respect of the rules on the processing of biometric data contained in Article 10 of Directive (EU) 2016/680, thus regulating such use and the processing of biometric data involved in an exhaustive manner. Therefore, such use and processing should only be possible in as far as it is compatible with the framework set by this Regulation, without there being scope, outside that framework, for the competent authorities, where they act for purpose of law enforcement, to use such systems and process such data in connection thereto on the grounds listed in Article 10 of Directive (EU) 2016/680. In this context, this Regulation is not intended to provide the legal basis for the processing of personal data under Article 8 of Directive 2016/680. However, the use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for purposes other than law enforcement, including by competent authorities, should not be covered by the specific framework regarding such use for the purpose of law enforcement set by this Regulation. Such use for purposes other than law enforcement should therefore not be subject to the requirement of an authorisation under this Regulation and the applicable detailed rules of national law that may give effect to it.

    (24) Any processing of biometric data and other personal data involved in the use of AI systems for biometric identification, other than in connection to the use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement as regulated by this Regulation, including where those systems are used by competent authorities in publicly accessible spaces for other purposes than law enforcement, should continue to comply with all requirements resulting from Article 9(1) of Regulation (EU) 2016/679, Article 10(1) of Regulation (EU) 2018/1725 and Article 10 of Directive (EU) 2016/680, as applicable.

    (25) In accordance with Article 6a of Protocol nº 21 on the position of the United Kingdom and Ireland in respect of the area of freedom, security and justice, as annexed to the TEU and to the TFEU, Ireland is not bound by the rules laid down in Article 5(1), point (d), (2) and (3) of this Regulation adopted on the basis of Article 16 of the TFEU which relate to the processing of personal data by the Member States when carrying out activities falling within the scope of Chapter 4 or Chapter 5 of Title V of Part Three of the TFEU, where Ireland is not bound by the rules governing the forms of judicial cooperation in criminal matters or police cooperation which require compliance with the provisions laid down on the basis of Article 16 of the TFEU.

    (26) In accordance with Articles 2 and 2a of Protocol nº 22 on the position of Denmark, annexed to the TEU and TFEU, Denmark is not bound by rules laid down in Article 5(1), point (d), (2) and (3) of this Regulation adopted on the basis of Article 16 of the TFEU, or subject to their application, which relate to the processing of personal data by the Member States when carrying out activities falling within the scope of Chapter 4 or Chapter 5 of Title V of Part Three of the TFEU.

    (27) High-risk AI systems should only be placed on the Union market or put into service if they comply with certain mandatory requirements. Those requirements should ensure that high-risk AI systems available in the Union or whose output is otherwise used in the Union do not pose unacceptable risks to important Union public interests as recognised and protected by Union law. AI systems identified as high-risk should be limited to those that have a significant harmful impact on the health, safety and fundamental rights of persons in the Union and such limitation minimises any potential restriction to international trade, if any.

    (28) AI systems could produce adverse outcomes to health and safety of persons, in particular when such systems operate as components of products. Consistently with the objectives of Union harmonisation legislation to facilitate the free movement of products in the internal market and to ensure that only safe and otherwise compliant products find their way into the market, it is important that the safety risks that may be generated by a product as a whole due to its digital components, including AI systems, are duly prevented and mitigated. For instance, increasingly autonomous robots, whether in the context of manufacturing or personal assistance and care should be able to safely operate and performs their functions in complex environments. Similarly, in the health sector where the stakes for life and health are particularly high, increasingly sophisticated diagnostics systems and systems supporting human decisions should be reliable and accurate. The extent of the adverse impact caused by the AI system on the fundamental rights protected by the Charter is of particular relevance when classifying an AI system as high-risk. Those rights include the right to human dignity, respect for private and family life, protection of personal data, freedom of expression and information, freedom of assembly and of association, and non-discrimination, consumer protection, workers’ rights, rights of persons with disabilities, right to an effective remedy and to a fair trial, right of defence and the presumption of innocence, right to good administration. In addition to those rights, it is important to highlight that children have specific rights as enshrined in Article 24 of the EU Charter and in the United Nations Convention on the Rights of the Child (further elaborated in the UNCRC General Comment No. 25 as regards the digital environment), both of which require consideration of the children’s vulnerabilities and provision of such protection and care as necessary for their well-being. The fundamental right to a high level of environmental protection enshrined in the Charter and implemented in Union policies should also be considered when assessing the severity of the harm that an AI system can cause, including in relation to the health and safety of persons.

    (29) As regards high-risk AI systems that are safety components of products or systems, or which are themselves products or systems falling within the scope of Regulation (EC) nº 300/2008 of the European Parliament and of the Council (39), Regulation (EU) nº 167/2013 of the European Parliament and of the Council (40), Regulation (EU) nº 168/2013 of the European Parliament and of the Council (41), Directive 2014/90/EU of the European Parliament and of the Council (42), Directive (EU) 2016/797 of the European Parliament and of the Council (43), Regulation (EU) 2018/858 of the European Parliament and of the Council (44), Regulation (EU) 2018/1139 of the European Parliament and of the Council (45), and Regulation (EU) 2019/2144 of the European Parliament and of the Council (46), it is appropriate to amend those acts to ensure that the Commission takes into account, on the basis of the technical and regulatory specificities of each sector, and without interfering with existing governance, conformity assessment and enforcement mechanisms and authorities established therein, the mandatory requirements for high-risk AI systems laid down in this Regulation when adopting any relevant future delegated or implementing acts on the basis of those acts.

    (30) As regards AI systems that are safety components of products, or which are themselves products, falling within the scope of certain Union harmonisation legislation, it is appropriate to classify them as high-risk under this Regulation if the product in question undergoes the conformity assessment procedure with a third-party conformity assessment body pursuant to that relevant Union harmonisation legislation. In particular, such products are machinery, toys, lifts, equipment and protective systems intended for use in potentially explosive atmospheres, radio equipment, pressure equipment, recreational craft equipment, cableway installations, appliances burning gaseous fuels, medical devices, and in vitro diagnostic medical devices.

    (31) The classification of an AI system as high-risk pursuant to this Regulation should not necessarily mean that the product whose safety component is the AI system, or the AI system itself as a product, is considered ‘high-risk’ under the criteria established in the relevant Union harmonisation legislation that applies to the product. This is notably the case for Regulation (EU) 2017/745 of the European Parliament and of the Council (47) and Regulation (EU) 2017/746 of the European Parliament and of the Council (48), where a third-party conformity assessment is provided for medium-risk and high-risk products.

    (32) As regards stand-alone AI systems, meaning high-risk AI systems other than those that are safety components of products, or which are themselves products, it is appropriate to classify them as high-risk if, in the light of their intended purpose, they pose a high risk of harm to the health and safety or the fundamental rights of persons, taking into account both the severity of the possible harm and its probability of occurrence and they are used in a number of specifically pre-defined areas specified in the Regulation. The identification of those systems is based on the same methodology and criteria envisaged also for any future amendments of the list of high-risk AI systems.

    (33) Technical inaccuracies of AI systems intended for the remote biometric identification of natural persons can lead to biased results and entail discriminatory effects. This is particularly relevant when it comes to age, ethnicity, sex or disabilities. Therefore, ‘real-time’ and ‘post’ remote biometric identification systems should be classified as high-risk. In view of the risks that they pose, both types of remote biometric identification systems should be subject to specific requirements on logging capabilities and human oversight.

    (34) As regards the management and operation of critical infrastructure, it is appropriate to classify as high-risk the AI systems intended to be used as safety components in the management and operation of road traffic and the supply of water, gas, heating and electricity, since their failure or malfunctioning may put at risk the life and health of persons at large scale and lead to appreciable disruptions in the ordinary conduct of social and economic activities.

    (35) AI systems used in education or vocational training, notably for determining access or assigning persons to educational and vocational training institutions or to evaluate persons on tests as part of or as a precondition for their education should be considered high-risk, since they may determine the educational and professional course of a person’s life and therefore affect their ability to secure their livelihood. When improperly designed and used, such systems may violate the right to education and training as well as the right not to be discriminated against and perpetuate historical patterns of discrimination.

    (36) AI systems used in employment, workers management and access to self-employment, notably for the recruitment and selection of persons, for making decisions on promotion and termination and for task allocation, monitoring or evaluation of persons in work-related contractual relationships, should also be classified as high-risk, since those systems may appreciably impact future career prospects and livelihoods of these persons. Relevant work-related contractual relationships should involve employees and persons providing services through platforms as referred to in the Commission Work Programme 2021. Such persons should in principle not be considered users within the meaning of this Regulation. Throughout the recruitment process and in the evaluation, promotion, or retention of persons in work-related contractual relationships, such systems may perpetuate historical patterns of discrimination, for example against women, certain age groups, persons with disabilities, or persons of certain racial or ethnic origins or sexual orientation. AI systems used to monitor the performance and behaviour of these persons may also impact their rights to data protection and privacy.

    (37) Another area in which the use of AI systems deserves special consideration is the access to and enjoyment of certain essential private and public services and benefits necessary for people to fully participate in society or to improve one’s standard of living. In particular, AI systems used to evaluate the credit score or creditworthiness of natural persons should be classified as high-risk AI systems, since they determine those persons’ access to financial resources or essential services such as housing, electricity, and telecommunication services. AI systems used for this purpose may lead to discrimination of persons or groups and perpetuate historical patterns of discrimination, for example based on racial or ethnic origins, disabilities, age, sexual orientation, or create new forms of discriminatory impacts. Considering the very limited scale of the impact and the available alternatives on the market, it is appropriate to exempt AI systems for the purpose of creditworthiness assessment and credit scoring when put into service by small-scale providers for their own use. Natural persons applying for or receiving public assistance benefits and services from public authorities are typically dependent on those benefits and services and in a vulnerable position in relation to the responsible authorities. If AI systems are used for determining whether such benefits and services should be denied, reduced, revoked or reclaimed by authorities, they may have a significant impact on persons’ livelihood and may infringe their fundamental rights, such as the right to social protection, non-discrimination, human dignity or an effective remedy. Those systems should therefore be classified as high-risk. Nonetheless, this Regulation should not hamper the development and use of innovative approaches in the public administration, which would stand to benefit from a wider use of compliant and safe AI systems, provided that those systems do not entail a high risk to legal and natural persons. Finally, AI systems used to dispatch or establish priority in the dispatching of emergency first response services should also be classified as high-risk since they make decisions in very critical situations for the life and health of persons and their property.

    (38) Actions by law enforcement authorities involving certain uses of AI systems are characterised by a significant degree of power imbalance and may lead to surveillance, arrest or deprivation of a natural person’s liberty as well as other adverse impacts on fundamental rights guaranteed in the Charter. In particular, if the AI system is not trained with high quality data, does not meet adequate requirements in terms of its accuracy or robustness, or is not properly designed and tested before being put on the market or otherwise put into service, it may single out people in a discriminatory or otherwise incorrect or unjust manner. Furthermore, the exercise of important procedural fundamental rights, such as the right to an effective remedy and to a fair trial as well as the right of defence and the presumption of innocence, could be hampered, in particular, where such AI systems are not sufficiently transparent, explainable and documented. It is therefore appropriate to classify as high-risk a number of AI systems intended to be used in the law enforcement context where accuracy, reliability and transparency is particularly important to avoid adverse impacts, retain public trust and ensure accountability and effective redress. In view of the nature of the activities in question and the risks relating thereto, those high-risk AI systems should include in particular AI systems intended to be used by law enforcement authorities for individual risk assessments, polygraphs and similar tools or to detect the emotional state of natural person, to detect ‘deep fakes’, for the evaluation of the reliability of evidence in criminal proceedings, for predicting the occurrence or reoccurrence of an actual or potential criminal offence based on profiling of natural persons, or assessing personality traits and characteristics or past criminal behaviour of natural persons or groups, for profiling in the course of detection, investigation or prosecution of criminal offences, as well as for crime analytics regarding natural persons. AI systems specifically intended to be used for administrative proceedings by tax and customs authorities should not be considered high-risk AI systems used by law enforcement authorities for the purposes of prevention, detection, investigation and prosecution of criminal offences.

    (39) AI systems used in migration, asylum and border control management affect people who are often in particularly vulnerable position and who are dependent on the outcome of the actions of the competent public authorities. The accuracy, non-discriminatory nature and transparency of the AI systems used in those contexts are therefore particularly important to guarantee the respect of the fundamental rights of the affected persons, notably their rights to free movement, non-discrimination, protection of private life and personal data, international protection and good administration. It is therefore appropriate to classify as high-risk AI systems intended to be used by the competent public authorities charged with tasks in the fields of migration, asylum and border control management as polygraphs and similar tools or to detect the emotional state of a natural person; for assessing certain risks posed by natural persons entering the territory of a Member State or applying for visa or asylum; for verifying the authenticity of the relevant documents of natural persons; for assisting competent public authorities for the examination of applications for asylum, visa and residence permits and associated complaints with regard to the objective to establish the eligibility of the natural persons applying for a status. AI systems in the area of migration, asylum and border control management covered by this Regulation should comply with the relevant procedural requirements set by the Directive 2013/32/EU of the European Parliament and of the Council (49), the Regulation (EC) nº 810/2009 of the European Parliament and of the Council (50) and other relevant legislation.

    (40) Certain AI systems intended for the administration of justice and democratic processes should be classified as high-risk, considering their potentially significant impact on democracy, rule of law, individual freedoms as well as the right to an effective remedy and to a fair trial. In particular, to address the risks of potential biases, errors and opacity, it is appropriate to qualify as high-risk AI systems intended to assist judicial authorities in researching and interpreting facts and the law and in applying the law to a concrete set of facts. Such qualification should not extend, however, to AI systems intended for purely ancillary administrative activities that do not affect the actual administration of justice in individual cases, such as anonymisation or pseudonymisation of judicial decisions, documents or data, communication between personnel, administrative tasks or allocation of resources.

    (41) The fact that an AI system is classified as high risk under this Regulation should not be interpreted as indicating that the use of the system is necessarily lawful under other acts of Union law or under national law compatible with Union law, such as on the protection of personal data, on the use of polygraphs and similar tools or other systems to detect the emotional state of natural persons. Any such use should continue to occur solely in accordance with the applicable requirements resulting from the Charter and from the applicable acts of secondary Union law and national law. This Regulation should not be understood as providing for the legal ground for processing of personal data, including special categories of personal data, where relevant.

    (42) To mitigate the risks from high-risk AI systems placed or otherwise put into service on the Union market for users and affected persons, certain mandatory requirements should apply, taking into account the intended purpose of the use of the system and according to the risk management system to be established by the provider.

    (43) Requirements should apply to high-risk AI systems as regards the quality of data sets used, technical documentation and record-keeping, transparency and the provision of information to users, human oversight, and robustness, accuracy and cybersecurity. Those requirements are necessary to effectively mitigate the risks for health, safety and fundamental rights, as applicable in the light of the intended purpose of the system, and no other less trade restrictive measures are reasonably available, thus avoiding unjustified restrictions to trade.

    (44) High data quality is essential for the performance of many AI systems, especially when techniques involving the training of models are used, with a view to ensure that the high-risk AI system performs as intended and safely and it does not become the source of discrimination prohibited by Union law. High quality training, validation and testing data sets require the implementation of appropriate data governance and management practices. Training, validation and testing data sets should be sufficiently relevant, representative and free of errors and complete in view of the intended purpose of the system. They should also have the appropriate statistical properties, including as regards the persons or groups of persons on which the high-risk AI system is intended to be used. In particular, training, validation and testing data sets should take into account, to the extent required in the light of their intended purpose, the features, characteristics or elements that are particular to the specific geographical, behavioural or functional setting or context within which the AI system is intended to be used. In order to protect the right of others from the discrimination that might result from the bias in AI systems, the providers shouldbe able to process also special categories of personal data, as a matter of substantial public interest, in order to ensure the bias monitoring, detection and correction in relation to high-risk AI systems.

    (45) For the development of high-risk AI systems, certain actors, such as providers, notified bodies and other relevant entities, such as digital innovation hubs, testing experimentation facilities and researchers, should be able to access and use high quality datasets within their respective fields of activities which are related to this Regulation. European common data spaces established by the Commission and the facilitation of data sharing between businesses and with government in the public interest will be instrumental to provide trustful, accountable and non-discriminatory access to high quality data for the training, validation and testing of AI systems. For example, in health, the European health data space will facilitate non-discriminatory access to health data and the training of artificial intelligence algorithms on those datasets, in a privacy-preserving, secure, timely, transparent and trustworthy manner, and with an appropriate institutional governance. Relevant competent authorities, including sectoral ones, providing or supporting the access to data may also support the provision of high-quality data for the training, validation and testing of AI systems.

    (46) Having information on how high-risk AI systems have been developed and how they perform throughout their lifecycle is essential to verify compliance with the requirements under this Regulation. This requires keeping records and the availability of a technical documentation, containing information which is necessary to assess the compliance of the AI system with the relevant requirements. Such information should include the general characteristics, capabilities and limitations of the system, algorithms, data, training, testing and validation processes used as well as documentation on the relevant risk management system. The technical documentation should be kept up to date.

    (47) To address the opacity that may make certain AI systems incomprehensible to or too complex for natural persons, a certain degree of transparency should be required for high-risk AI systems. Users should be able to interpret the system output and use it appropriately. High-risk AI systems should therefore be accompanied by relevant documentation and instructions of use and include concise and clear information, including in relation to possible risks to fundamental rights and discrimination, where appropriate.

    (48) High-risk AI systems should be designed and developed in such a way that natural persons can oversee their functioning. For this purpose, appropriate human oversight measures should be identified by the provider of the system before its placing on the market or putting into service. In particular, where appropriate, such measures should guarantee that the system is subject to in-built operational constraints that cannot be overridden by the system itself and is responsive to the human operator, and that the natural persons to whom human oversight has been assigned have the necessary competence, training and authority to carry out that role.

    (49) High-risk AI systems should perform consistently throughout their lifecycle and meet an appropriate level of accuracy, robustness and cybersecurity in accordance with the generally acknowledged state of the art. The level of accuracy and accuracy metrics should be communicated to the users.

    (50) The technical robustness is a key requirement for high-risk AI systems. They should be resilient against risks connected to the limitations of the system (e.g. errors, faults, inconsistencies, unexpected situations) as well as against malicious actions that may compromise the security of the AI system and result in harmful or otherwise undesirable behaviour. Failure to protect against these risks could lead to safety impacts or negatively affect the fundamental rights, for example due to erroneous decisions or wrong or biased outputs generated by the AI system.

    (51) Cybersecurity plays a crucial role in ensuring that AI systems are resilient against attempts to alter their use, behaviour, performance or compromise their security properties by malicious third parties exploiting the system’s vulnerabilities. Cyberattacks against AI systems can leverage AI specific assets, such as training data sets (e.g. data poisoning) or trained models (e.g. adversarial attacks), or exploit vulnerabilities in the AI system’s digital assets or the underlying ICT infrastructure. To ensure a level of cybersecurity appropriate to the risks, suitable measures should therefore be taken by the providers of high-risk AI systems, also taking into account as appropriate the underlying ICT infrastructure.

    (52) As part of Union harmonisation legislation, rules applicable to the placing on the market, putting into service and use of high-risk AI systems should be laid down consistently with Regulation (EC) No 765/2008 of the European Parliament and of the Council51 setting out the requirements for accreditation and the market surveillance of products, Decision No 768/2008/EC of the European Parliament and of the Council (52) on a common framework for the marketing of products and Regulation (EU) 2019/1020 of the European Parliament and of the Council (53) on market surveillance and compliance of products (‘New Legislative Framework for the marketing of products’).

    (53) It is appropriate that a specific natural or legal person, defined as the provider, takes the responsibility for the placing on the market or putting into service of a high-risk AI system, regardless of whether that natural or legal person is the person who designed or developed the system.

    (54) The provider should establish a sound quality management system, ensure the accomplishment of the required conformity assessment procedure, draw up the relevant documentation and establish a robust post-market monitoring system. Public authorities which put into service high-risk AI systems for their own use may adopt and implement the rules for the quality management system as part of the quality management system adopted at a national or regional level, as appropriate, taking into account the specificities of the sector and the competences and organisation of the public authority in question.

    (55) Where a high-risk AI system that is a safety component of a product which is covered by a relevant New Legislative Framework sectorial legislation is not placed on the market or put into service independently from the product, the manufacturer of the final product as defined under the relevant New Legislative Framework legislation should comply with the obligations of the provider established in this Regulation and notably ensure that the AI system embedded in the final product complies with the requirements of this Regulation.

    (56) To enable enforcement of this Regulation and create a level-playing field for operators, and taking into account the different forms of making available of digital products, it is important to ensure that, under all circumstances, a person established in the Union can provide authorities with all the necessary information on the compliance of an AI system. Therefore, prior to making their AI systems available in the Union, where an importer cannot be identified, providers established outside the Union shall, by written mandate, appoint an authorised representative established in the Union.

    (57) In line with New Legislative Framework principles, specific obligations for relevant economic operators, such as importers and distributors, should be set to ensure legal certainty and facilitate regulatory compliance by those relevant operators.

    (58) Given the nature of AI systems and the risks to safety and fundamental rights possibly associated with their use, including as regard the need to ensure proper monitoring of the performance of an AI system in a real-life setting, it is appropriate to set specific responsibilities for users. Users should in particular use high-risk AI systems in accordance with the instructions of use and certain other obligations should be provided for with regard to monitoring of the functioning of the AI systems and with regard to record-keeping, as appropriate.

    (59) It is appropriate to envisage that the user of the AI system should be the natural or legal person, public authority, agency or other body under whose authority the AI system is operated except where the use is made in the course of a personal non-professional activity.

    (60) In the light of the complexity of the artificial intelligence value chain, relevant third parties, notably the ones involved in the sale and the supply of software, software tools and components, pre-trained models and data, or providers of network services, should cooperate, as appropriate, with providers and users to enable their compliance with the obligations under this Regulation and with competent authorities established under this Regulation.

    (61) Standardisation should play a key role to provide technical solutions to providers to ensure compliance with this Regulation. Compliance with harmonised standards as defined in Regulation (EU) No 1025/2012 of the European Parliament and of the Council (54) should be a means for providers to demonstrate conformity with the requirements of this Regulation. However, the Commission could adopt common technical specifications in areas where no harmonised standards exist or where they are insufficient.

    (62) In order to ensure a high level of trustworthiness of high-risk AI systems, those systems should be subject to a conformity assessment prior to their placing on the market or putting into service.

    (63) It is appropriate that, in order to minimise the burden on operators and avoid any possible duplication, for high-risk AI systems related to products which are covered by existing Union harmonisation legislation following the New Legislative Framework approach, the compliance of those AI systems with the requirements of this Regulation should be assessed as part of the conformity assessment already foreseen under that legislation. The applicability of the requirements of this Regulation should thus not affect the specific logic, methodology or general structure of conformity assessment under the relevant specific New Legislative Framework legislation. This approach is fully reflected in the interplay between this Regulation and the [Machinery Regulation]. While safety risks of AI systems ensuring safety functions in machinery are addressed by the requirements of this Regulation, certain specific requirements in the [Machinery Regulation] will ensure the safe integration of the AI system into the overall machinery, so as not to compromise the safety of the machinery as a whole.

    The [Machinery Regulation] applies the same definition of AI system as this Regulation.

    (64) Given the more extensive experience of professional pre-market certifiers in the field of product safety and the different nature of risks involved, it is appropriate to limit, at least in an initial phase of application of this Regulation, the scope of application of third-party conformity assessment for high-risk AI systems other than those related to products. Therefore, the conformity assessment of such systems should be carried out as a general rule by the provider under its own responsibility, with the only exception of AI systems intended to be used for the remote biometric identification of persons, for which the involvement of a notified body in the conformity assessment should be foreseen, to the extent they are not prohibited.

    (65) In order to carry out third-party conformity assessment for AI systems intended to be used for the remote biometric identification of persons, notified bodies should be designated under this Regulation by the national competent authorities, provided they are compliant with a set of requirements, notably on independence, competence and absence of conflicts of interests.

    (66) In line with the commonly established notion of substantial modification for products regulated by Union harmonisation legislation, it is appropriate that an AI system undergoes a new conformity assessment whenever a change occurs which may affect the compliance of the system with this Regulation or when the intended purpose of the system changes. In addition, as regards AI systems which continue to ‘learn’ after being placed on the market or put into service (i.e. they automatically adapt how functions are carried out), it is necessary to provide rules establishing that changes to the algorithm and its performance that have been pre-determined by the provider and assessed at the moment of the conformity assessment should not constitute a substantial modification.

    (67) High-risk AI systems should bear the CE marking to indicate their conformity with this Regulation so that they can move freely within the internal market. Member States should not create unjustified obstacles to the placing on the market or putting into service of high-risk AI systems that comply with the requirements laid down in this Regulation and bear the CE marking.

    (68) Under certain conditions, rapid availability of innovative technologies may be crucial for health and safety of persons and for society as a whole. It is thus appropriate that under exceptional reasons of public security or protection of life and health of natural persons and the protection of industrial and commercial property, Member States could authorise the placing on the market or putting into service of AI systems which have not undergone a conformity assessment.

    (69) In order to facilitate the work of the Commission and the Member States in the artificial intelligence field as well as to increase the transparency towards the public, providers of high-risk AI systems other than those related to products falling within the scope of relevant existing Union harmonisation legislation, should be required to register their high-risk AI system in a EU database, to be established and managed by the Commission. The Commission should be the controller of that database, in accordance with Regulation (EU) 2018/1725 of the European Parliament and of the Council (55). In order to ensure the full functionality of the database, when deployed, the procedure for setting the database should include the elaboration of functional specifications by the Commission and an independent audit report.

    (70) Certain AI systems intended to interact with natural persons or to generate content may pose specific risks of impersonation or deception irrespective of whether they qualify as high-risk or not. In certain circumstances, the use of these systems should therefore be subject to specific transparency obligations without prejudice to the requirements and obligations for high-risk AI systems. In particular, natural persons should be notified that they are interacting with an AI system, unless this is obvious from the circumstances and the context of use. Moreover, natural persons should be notified when they are exposed to an emotion recognition system or a biometric categorisation system. Such information and notifications should be provided in accessible formats for persons with disabilities. Further, users, who use an AI system to generate or manipulate image, audio or video content that appreciably resembles existing persons, places or events and would falsely appear to a person to be authentic, should disclose that the content has been artificially created or manipulated by labelling the artificial intelligence output accordingly and disclosing its artificial origin.

    (71) Artificial intelligence is a rapidly developing family of technologies that requires novel forms of regulatory oversight and a safe space for experimentation, while ensuring responsible innovation and integration of appropriate safeguards and risk mitigation measures. To ensure a legal framework that is innovation-friendly, future-proof and resilient to disruption, national competent authorities from one or more Member States should be encouraged to establish artificial intelligence regulatory sandboxes to facilitate the development and testing of innovative AI systems under strict regulatory oversight before these systems are placed on the market or otherwise put into service.

    (72) The objectives of the regulatory sandboxes should be to foster AI innovation by establishing a controlled experimentation and testing environment in the development and pre-marketing phase with a view to ensuring compliance of the innovative AI systems with this Regulation and other relevant Union and Member States legislation; to enhance legal certainty for innovators and the competent authorities’ oversight and understanding of the opportunities, emerging risks and the impacts of AI use, and to accelerate access to markets, including by removing barriers for small and medium enterprises (SMEs) and start-ups. To ensure uniform implementation across the Union and economies of scale, it is appropriate to establish common rules for the regulatory sandboxes’ implementation and a framework for cooperation between the relevant authorities involved in the supervision of the sandboxes. This Regulation should provide the legal basis for the use of personal data collected for other purposes for developing certain AI systems in the public interest within the AI regulatory sandbox, in line with Article 6(4) of Regulation (EU) 2016/679, and Article 6 of Regulation (EU) 2018/1725, and without prejudice to Article 4(2) of Directive (EU) 2016/680. Participants in the sandbox should ensure appropriate safeguards and cooperate with the competent authorities, including by following their guidance and acting expeditiously and in good faith to mitigate any high-risks to safety and fundamental rights that may arise during the development and experimentation in the sandbox. The conduct of the participants in the sandbox should be taken into account when competent authorities decide whether to impose an administrative fine under Article 83(2) of Regulation 2016/679 and Article 57 of Directive 2016/680.

    (73) In order to promote and protect innovation, it is important that the interests of small-scale providers and users of AI systems are taken into particular account. To this objective, Member States should develop initiatives, which are targeted at those operators, including on awareness raising and information communication. Moreover, the specific interests and needs of small-scale providers shall be taken into account when Notified Bodies set conformity assessment fees. Translation costs related to mandatory documentation and communication with authorities may constitute a significant cost for providers and other operators, notably those of a smaller scale. Member States should possibly ensure that one of the languages determined and accepted by them for relevant providers’ documentation and for communication with operators is one which is broadly understood by the largest possible number of cross-border users.

    (74) In order to minimise the risks to implementation resulting from lack of knowledge and expertise in the market as well as to facilitate compliance of providers and notified bodies with their obligations under this Regulation, the AI-on demand platform, the European Digital Innovation Hubs and the Testing and Experimentation Facilities established by the Commission and the Member States at national or EU level should possibly contribute to the implementation of this Regulation. Within their respective mission and fields of competence, they may provide in particular technical and scientific support to providers and notified bodies.

    (75) It is appropriate that the Commission facilitates, to the extent possible, access to Testing and Experimentation Facilities to bodies, groups or laboratories established or accredited pursuant to any relevant Union harmonisation legislation and which fulfil tasks in the context of conformity assessment of products or devices covered by that Union harmonisation legislation. This is notably the case for expert panels, expert laboratories and reference laboratories in the field of medical devices pursuant to Regulation (EU) 2017/745 and Regulation (EU) 2017/746.

    (76) In order to facilitate a smooth, effective and harmonised implementation of this Regulation a European Artificial Intelligence Board should be established. The Board should be responsible for a number of advisory tasks, including issuing opinions, recommendations, advice or guidance on matters related to the implementation of this Regulation, including on technical specifications or existing standards regarding the requirements established in this Regulation and providing advice to and assisting the Commission on specific questions related to artificial intelligence.

    (77) Member States hold a key role in the application and enforcement of this Regulation. In this respect, each Member State should designate one or more national competent authorities for the purpose of supervising the application and implementation of this Regulation. In order to increase organisation efficiency on the side of Member States and to set an official point of contact vis-à-vis the public and other counterparts at Member State and Union levels, in each Member State one national authority should be designated as national supervisory authority.

    (78) In order to ensure that providers of high-risk AI systems can take into account the experience on the use of high-risk AI systems for improving their systems and the design and development process or can take any possible corrective action in a timely manner, all providers should have a post-market monitoring system in place. This system is also key to ensure that the possible risks emerging from AI systems which continue to ‘learn’ after being placed on the market or put into service can be more efficiently and timely addressed. In this context, providers should also be required to have a system in place to report to the relevant authorities any serious incidents or any breaches to national and Union law protecting fundamental rights resulting from the use of their AI systems.

    (79) In order to ensure an appropriate and effective enforcement of the requirements and obligations set out by this Regulation, which is Union harmonisation legislation, the system of market surveillance and compliance of products established by Regulation (EU) 2019/1020 should apply in its entirety. Where necessary for their mandate, national public authorities or bodies, which supervise the application of Union law protecting fundamental rights, including equality bodies, should also have access to any documentation created under this Regulation.

    (80) Union legislation on financial services includes internal governance and risk management rules and requirements which are applicable to regulated financial institutions in the course of provision of those services, including when they make use of AI systems. In order to ensure coherent application and enforcement of the obligations under this Regulation and relevant rules and requirements of the Union financial services legislation, the authorities responsible for the supervision and enforcement of the financial services legislation, including where applicable the European Central Bank, should be designated as competent authorities for the purpose of supervising the implementation of this Regulation, including for market surveillance activities, as regards AI systems provided or used by regulated and supervised financial institutions. To further enhance the consistency between this Regulation and the rules applicable to credit institutions regulated under Directive 2013/36/EU of the European Parliament and of the Council (56), it is also appropriate to integrate the conformity assessment procedure and some of the providers’ procedural obligations in relation to risk management, post marketing monitoring and documentation into the existing obligations and procedures under Directive 2013/36/EU. In order to avoid overlaps, limited derogations should also be envisaged in relation to the quality management system of providers and the monitoring obligation placed on users of high-risk AI systems to the extent that these apply to credit institutions regulated by Directive 2013/36/EU.

    (81) The development of AI systems other than high-risk AI systems in accordance with the requirements of this Regulation may lead to a larger uptake of trustworthy artificial intelligence in the Union. Providers of non-high-risk AI systems should be encouraged to create codes of conduct intended to foster the voluntary application of the mandatory requirements applicable to high-risk AI systems. Providers should also be encouraged to apply on a voluntary basis additional requirements related, for example, to environmental sustainability, accessibility to persons with disability, stakeholders’ participation in the design and development of AI systems, and diversity of the development teams. The Commission may develop initiatives, including of a sectorial nature, to facilitate the lowering of technical barriers hindering cross-border exchange of data for AI development, including on data access infrastructure, semantic and technical interoperability of different types of data.

    (82) It is important that AI systems related to products that are not high-risk in accordance with this Regulation and thus are not required to comply with the requirements set out herein are nevertheless safe when placed on the market or put into service. To contribute to this objective, the Directive 2001/95/EC of the European Parliament and of the Council (57) would apply as a safety net.

    (83) In order to ensure trustful and constructive cooperation of competent authorities on Union and national level, all parties involved in the application of this Regulation should respect the confidentiality of information and data obtained in carrying out their tasks.

    (84) Member States should take all necessary measures to ensure that the provisions of this Regulation are implemented, including by laying down effective, proportionate and dissuasive penalties for their infringement. For certain specific infringements, Member States should take into account the margins and criteria set out in this Regulation. The European Data Protection Supervisor should have the power to impose fines on Union institutions, agencies and bodies falling within the scope of this Regulation.

    (85) In order to ensure that the regulatory framework can be adapted where necessary, the power to adopt acts in accordance with Article 290 TFEU should be delegated to the Commission to amend the techniques and approaches referred to in Annex I to define AI systems, the Union harmonisation legislation listed in Annex II, the high-risk AI systems listed in Annex III, the provisions regarding technical documentation listed in Annex IV, the content of the EU declaration of conformity in Annex V, the provisions regarding the conformity assessment procedures in Annex VI and VII and the provisions establishing the high-risk AI systems to which the conformity assessment procedure based on assessment of the quality management system and assessment of the technical documentation should apply. It is of particular importance that the Commission carry out appropriate consultations during its preparatory work, including at expert level, and that those consultations be conducted in accordance with the principles laid down in the Interinstitutional Agreement of 13 April 2016 on Better Law-Making58. In particular, to ensure equal participation in the preparation of delegated acts, the European Parliament and the Council receive all documents at the same time as Member States’ experts, and their experts systematically have access to meetings of Commission expert groups dealing with the preparation of delegated acts.

    (86) In order to ensure uniform conditions for the implementation of this Regulation, implementing powers should be conferred on the Commission. Those powers should be exercised in accordance with Regulation (EU) No 182/2011 of the European Parliament and of the Council59.

    (87) Since the objective of this Regulation cannot be sufficiently achieved by the Member States and can rather, by reason of the scale or effects of the action, be better achieved at Union level, the Union may adopt measures in accordance with the principle of subsidiarity as set out in Article 5 TEU. In accordance with the principle of proportionality as set out in that Article, this Regulation does not go beyond what is necessary in order to achieve that objective.

    (88) This Regulation should apply from … [OP – please insert the date established in Art. 85]. However, the infrastructure related to the governance and the conformity assessment system should be operational before that date, therefore the provisions on notified bodies and governance structure should apply from … [OP – please insert the date – three months following the entry into force of this Regulation]. In addition, Member States should lay down and notify to the Commission the rules on penalties, including administrative fines, and ensure that they are properly and effectively implemented by the date of application of this Regulation. Therefore the provisions on penalties should apply from [OP – please insert the date – twelve months following the entry into force of this Regulation].

    (89) The European Data Protection Supervisor and the European Data Protection Board were consulted in accordance with Article 42(2) of Regulation (EU) 2018/1725 and delivered an opinion on […]”.

    HAVE ADOPTED THIS REGULATION:

    TITLE I. GENERAL PROVISIONS

    Article 1 Subject matter

    This Regulation lays down:

    (a) harmonised rules for the placing on the market, the putting into service and the use of artificial intelligence systems (‘AI systems’) in the Union;

    (a) prohibitions of certain artificial intelligence practices;

    (b) specific requirements for high-risk AI systems and obligations for operators of such systems;

    (c) harmonised transparency rules for AI systems intended to interact with natural persons, emotion recognition systems and biometric categorisation systems, and AI systems used to generate or manipulate image, audio or video content;

    (d) rules on market monitoring and surveillance.               

    Article 2 Scope

    1. This Regulation applies to:

    (a) providers placing on the market or putting into service AI systems in the Union, irrespective of whether those providers are established within the Union or in a third country;

    (b) users of AI systems located within the Union;

    (c) providers and users of AI systems that are located in a third country, where the output produced by the system is used in the Union;

    2. For high-risk AI systems that are safety components of products or systems, or which are themselves products or systems, falling within the scope of the following acts, only Article 84 of this Regulation shall apply:

    (a) Regulation (EC) 300/2008;

    (b) Regulation (EU) nº 167/2013;

    (c) Regulation (EU) nº 168/2013;

    (d) Directive 2014/90/EU;

    (e) Directive (EU) 2016/797;

    (f) Regulation (EU) 2018/858;

    (g) Regulation (EU) 2018/1139;

    (h) Regulation (EU) 2019/2144.

    3. This Regulation shall not apply to AI systems developed or used exclusively for military purposes.

    4. This Regulation shall not apply to public authorities in a third country nor to international organisations falling within the scope of this Regulation pursuant to paragraph 1, where those authorities or organisations use AI systems in the framework of international agreements for law enforcement and judicial cooperation with the Union or with one or more Member States.

    5. This Regulation shall not affect the application of the provisions on the liability of intermediary service providers set out in Chapter II, Section IV of Directive 2000/31/EC of the European Parliament and of the Council (60) [as to be replaced by the corresponding provisions of the Digital Services Act].

    Article 3 Definitions

    For the purpose of this Regulation, the following definitions apply:

    (1) ‘artificial intelligence system’ (AI system) means software that is developed with one or more of the techniques and approaches listed in Annex I and can, for a given set of human-defined objectives, generate outputs such as content, predictions, recommendations, or decisions influencing the environments they interact with;

    (1) ‘provider’ means a natural or legal person, public authority, agency or other body that develops an AI system or that has an AI system developed with a view to placing it on the market or putting it into service under its own name or trademark, whether for payment or free of charge;

    (3) ‘small-scale provider’ means a provider that is a micro or small enterprise within the meaning of Commission Recommendation 2003/361/EC (61);

    (4) ‘user’ means any natural or legal person, public authority, agency or other body using an AI system under its authority, except where the AI system is used in the course of a personal non-professional activity;

    (5) ‘authorised representative’ means any natural or legal person established in the Union who has received a written mandate from a provider of an AI system to, respectively, perform and carry out on its behalf the obligations and procedures established by this Regulation;

    (6) ‘importer’ means any natural or legal person established in the Union that places on the market or puts into service an AI system that bears the name or trademark of a natural or legal person established outside the Union;

    (7) ‘distributor’ means any natural or legal person in the supply chain, other than the provider or the importer, that makes an AI system available on the Union market without affecting its properties;

    (8) ‘operator’ means the provider, the user, the authorised representative, the importer and the distributor;

    (9) ‘placing on the market’ means the first making available of an AI system on the Union market;

    (10) ‘making available on the market’ means any supply of an AI system for distribution or use on the Union market in the course of a commercial activity, whether in return for payment or free of charge;

    (11) ‘putting into service’ means the supply of an AI system for first use directly to the user or for own use on the Union market for its intended purpose;

    (12) ‘intended purpose’ means the use for which an AI system is intended by the provider, including the specific context and conditions of use, as specified in the information supplied by the provider in the instructions for use, promotional or sales materials and statements, as well as in the technical documentation;

    (13) ‘reasonably foreseeable misuse’ means the use of an AI system in a way that is not in accordance with its intended purpose, but which may result from reasonably foreseeable human behaviour or interaction with other systems;

    (14) ‘safety component of a product or system’ means a component of a product or of a system which fulfils a safety function for that product or system or the failure or malfunctioning of which endangers the health and safety of persons or property;

    (15) ‘instructions for use’ means the information provided by the provider to inform the user of in particular an AI system’s intended purpose and proper use, inclusive of the specific geographical, behavioural or functional setting within which the high-risk AI system is intended to be used;

    (16) ‘recall of an AI system’ means any measure aimed at achieving the return to the provider of an AI system made available to users;

    (17) ‘withdrawal of an AI system’ means any measure aimed at preventing the distribution, display and offer of an AI system;

    (18) ‘performance of an AI system’ means the ability of an AI system to achieve its intended purpose;

    (19) ‘notifying authority’ means the national authority responsible for setting up and carrying out the necessary procedures for the assessment, designation and notification of conformity assessment bodies and for their monitoring;

    (20) ‘conformity assessment’ means the process of verifying whether the requirements set out in Title III, Chapter 2 of this Regulation relating to an AI system have been fulfilled;

    (21) ‘conformity assessment body’ means a body that performs third-party conformity assessment activities, including testing, certification and inspection;

    (22) ‘notified body’ means a conformity assessment body designated in accordance with this Regulation and other relevant Union harmonisation legislation;

    (23) ‘substantial modification’ means a change to the AI system following its placing on the market or putting into service which affects the compliance of the AI system with the requirements set out in Title III, Chapter 2 of this Regulation or results in a modification to the intended purpose for which the AI system has been assessed;

    (24) ‘CE marking of conformity’ (CE marking) means a marking by which a provider indicates that an AI system is in conformity with the requirements set out in Title III, Chapter 2 of this Regulation and other applicable Union legislation harmonising the conditions for the marketing of products (‘Union harmonisation legislation’) providing for its affixing;

    (25) ‘post-market monitoring’ means all activities carried out by providers of AI systems to proactively collect and review experience gained from the use of AI systems they place on the market or put into service for the purpose of identifying any need to immediately apply any necessary corrective or preventive actions;

    (26) ‘market surveillance authority’ means the national authority carrying out the activities and taking the measures pursuant to Regulation (EU) 2019/1020;

    (27) ‘harmonised standard’ means a European standard as defined in Article 2(1)(c) of Regulation (EU) nº 1025/2012;

    (28) ‘common specifications’ means a document, other than a standard, containing technical solutions providing a means to, comply with certain requirements and obligations established under this Regulation;

    (29) ‘training data’ means data used for training an AI system through fitting its learnable parameters, including the weights of a neural network;

    (30) ‘validation data’ means data used for providing an evaluation of the trained AI system and for tuning its non-learnable parameters and its learning process, among other things, in order to prevent overfitting; whereas the validation dataset can be a separate dataset or part of the training dataset, either as a fixed or variable split;

    (31) ‘testing data’ means data used for providing an independent evaluation of the trained and validated AI system in order to confirm the expected performance of that system before its placing on the market or putting into service;

    (32) ‘input data’ means data provided to or directly acquired by an AI system on the basis of which the system produces an output;

    (33) ‘biometric data’ means personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images or dactyloscopic data;

    (34) ‘emotion recognition system’ means an AI system for the purpose of identifying or inferring emotions or intentions of natural persons on the basis of their biometric data;

    (35) ‘biometric categorisation system’ means an AI system for the purpose of assigning natural persons to specific categories, such as sex, age, hair colour, eye colour, tattoos, ethnic origin or sexual or political orientation, on the basis of their biometric data;

    (36) ‘remote biometric identification system’ means an AI system for the purpose of identifying natural persons at a distance through the comparison of a person’s biometric data with the biometric data contained in a reference database, and without prior knowledge of the user of the AI system whether the person will be present and can be identified ;

    (37) ‘‘real-time’ remote biometric identification system’ means a remote biometric identification system whereby the capturing of biometric data, the comparison and the identification all occur without a significant delay. This comprises not only instant identification, but also limited short delays in order to avoid circumvention.

    (38) ‘‘post’ remote biometric identification system’ means a remote biometric identification system other than a ‘real-time’ remote biometric identification system;

    (39) ‘publicly accessible space’ means any physical place accessible to the public, regardless of whether certain conditions for access may apply;

    (40) ‘law enforcement authority’ means:

    (a) any public authority competent for the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security; or

    (b) any other body or entity entrusted by Member State law to exercise public authority and public powers for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security;

    (41) ‘law enforcement’ means activities carried out by law enforcement authorities for the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security;

    (42) ‘national supervisory authority’ means the authority to which a Member State assigns the responsibility for the implementation and application of this Regulation, for coordinating the activities entrusted to that Member State, for acting as the single contact point for the Commission, and for representing the Member State at the European Artificial Intelligence Board;

    (43) ‘national competent authority’ means the national supervisory authority, the notifying authority and the market surveillance authority;

    (44) ‘serious incident’ means any incident that directly or indirectly leads, might have led or might lead to any of the following:

    (a) the death of a person or serious damage to a person’s health, to property or the environment,

    (b) a serious and irreversible disruption of the management and operation of critical infrastructure.

    Article 4 Amendments to Annex I

    The Commission is empowered to adopt delegated acts in accordance with Article 73 to amend the list of techniques and approaches listed in Annex I, in order to update that list to market and technological developments on the basis of characteristics that are similar to the techniques and approaches listed therein.

    TITLE II. PROHIBITED ARTIFICIAL INTELLIGENCE PRACTICES

    Article 5

    1. The following artificial intelligence practices shall be prohibited:

    (a) the placing on the market, putting into service or use of an AI system that deploys subliminal techniques beyond a person’s consciousness in order to materially distort a person’s behaviour in a manner that causes or is likely to cause that person or another person physical or psychological harm;

    (b) the placing on the market, putting into service or use of an AI system that exploits any of the vulnerabilities of a specific group of persons due to their age, physical or mental disability, in order to materially distort the behaviour of a person pertaining to that group in a manner that causes or is likely to cause that person or another person physical or psychological harm;

    (c) the placing on the market, putting into service or use of AI systems by public authorities or on their behalf for the evaluation or classification of the trustworthiness of natural persons over a certain period of time based on their social behaviour or known or predicted personal or personality characteristics, with the social score leading to either or both of the following:

    (i) detrimental or unfavourable treatment of certain natural persons or whole groups thereof in social contexts which are unrelated to the contexts in which the data was originally generated or collected;

    (ii) detrimental or unfavourable treatment of certain natural persons or whole groups thereof that is unjustified or disproportionate to their social behaviour or its gravity; (d) the use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement, unless and in as far as such use is strictly necessary for one of the following objectives:

    (i) the targeted search for specific potential victims of crime, including missing children;

    (ii) the prevention of a specific, substantial and imminent threat to the life or physical safety of natural persons or of a terrorist attack;

    (iii) the detection, localisation, identification or prosecution of a perpetrator or suspect of a criminal offence referred to in Article 2(2) of Council Framework Decision 2002/584/JHA (62) and punishable in the Member State concerned by a custodial sentence or a detention order for a maximum period of at least three years, as determined by the law of that Member State.

    2. The use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement for any of the objectives referred to in paragraph 1 point d) shall take into account the following elements:

    (a) the nature of the situation giving rise to the possible use, in particular the seriousness, probability and scale of the harm caused in the absence of the use of the system;

    (b) the consequences of the use of the system for the rights and freedoms of all persons concerned, in particular the seriousness, probability and scale of those consequences.

    In addition, the use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement for any of the objectives referred to in paragraph 1 point d) shall comply with necessary and proportionate safeguards and conditions in relation to the use, in particular as regards the temporal, geographic and personal limitations.

    3. As regards paragraphs 1, point (d) and 2, each individual use for the purpose of law enforcement of a ‘real-time’ remote biometric identification system in publicly accessible spaces shall be subject to a prior authorisation granted by a judicial authority or by an independent administrative authority of the Member State in which the use is to take place, issued upon a reasoned request and in accordance with the detailed rules of national law referred to in paragraph 4. However, in a duly justified situation of urgency, the use of the system may be commenced without an authorisation and the authorisation may be requested only during or after the use.

    The competent judicial or administrative authority shall only grant the authorisation where it is satisfied, based on objective evidence or clear indications presented to it, that the use of the ‘real-time’ remote biometric identification system at issue is necessary for and proportionate to achieving one of the objectives specified in paragraph 1, point (d), as identified in the request. In deciding on the request, the competent judicial or administrative authority shall take into account the elements referred to in paragraph 2.

    4. A Member State may decide to provide for the possibility to fully or partially authorise the use of ‘real-time’ remote biometric identification systems in publicly accessible spaces for the purpose of law enforcement within the limits and under the conditions listed in paragraphs 1, point (d), 2 and 3. That Member State shall lay down in its national law the necessary detailed rules for the request, issuance and exercise of, as well as supervision relating to, the authorisations referred to in paragraph 3. Those rules shall also specify in respect of which of the objectives listed in paragraph 1, point (d), including which of the criminal offences referred to in point (iii) thereof, the competent authorities may be authorised to use those systems for the purpose of law enforcement.

    TITLE III. HIGH-RISK AI SYSTEMS

    CHAPTER 1. CLASSIFICATION OF AI SYSTEMS AS HIGH-RISK

    Article 6 Classification rules for high-risk AI systems

    1. Irrespective of whether an AI system is placed on the market or put into service independently from the products referred to in points (a) and (b), that AI system shall be considered high-risk where both of the following conditions are fulfilled:

    (a) the AI system is intended to be used as a safety component of a product, or is itself a product, covered by the Union harmonisation legislation listed in Annex II;

    (b) the product whose safety component is the AI system, or the AI system itself as a product, is required to undergo a third-party conformity assessment with a view to the placing on the market or putting into service of that product pursuant to the Union harmonisation legislation listed in Annex II.

    2. In addition to the high-risk AI systems referred to in paragraph 1, AI systems referred to in Annex III shall also be considered high-risk.

    Article 7 Amendments to Annex III

    1. The Commission is empowered to adopt delegated acts in accordance with Article 73 to update the list in Annex III by adding high-risk AI systems where both of the following conditions are fulfilled:

    (a) the AI systems are intended to be used in any of the areas listed in points 1 to 8 of Annex III;

    (b) the AI systems pose a risk of harm to the health and safety, or a risk of adverse impact on fundamental rights, that is, in respect of its severity and probability of occurrence, equivalent to or greater than the risk of harm or of adverse impact posed by the high-risk AI systems already referred to in Annex III.

    2. When assessing for the purposes of paragraph 1 whether an AI system poses a risk of harm to the health and safety or a risk of adverse impact on fundamental rights that is equivalent to or greater than the risk of harm posed by the high-risk AI systems already referred to in Annex III, the Commission shall take into account the following criteria:

    (a) the intended purpose of the AI system;

    (b) the extent to which an AI system has been used or is likely to be used;

    (c) the extent to which the use of an AI system has already caused harm to the health and safety or adverse impact on the fundamental rights or has given rise to significant concerns in relation to the materialisation of such harm or adverse impact, as demonstrated by reports or documented allegations submitted to national competent authorities;

    (d) the potential extent of such harm or such adverse impact, in particular in terms of its intensity and its ability to affect a plurality of persons;

    (e) the extent to which potentially harmed or adversely impacted persons are dependent on the outcome produced with an AI system, in particular because for practical or legal reasons it is not reasonably possible to opt-out from that outcome;

    (f) the extent to which potentially harmed or adversely impacted persons are in a vulnerable position in relation to the user of an AI system, in particular due to an imbalance of power, knowledge, economic or social circumstances, or age;

    (g) the extent to which the outcome produced with an AI system is easily reversible, whereby outcomes having an impact on the health or safety of persons shall not be considered as easily reversible;

    (h) the extent to which existing Union legislation provides for:

    (i) effective measures of redress in relation to the risks posed by an AI system, with the exclusion of claims for damages;

    (ii) effective measures to prevent or substantially minimise those risks.

    CHAPTER 2. REQUIREMENTS FOR HIGH-RISK AI SYSTEMS

    Article 8. Compliance with the requirements

    1. High-risk AI systems shall comply with the requirements established in this Chapter.

    2. The intended purpose of the high-risk AI system and the risk management system referred to in Article 9 shall be taken into account when ensuring compliance with those requirements.

    Article 9. Risk management system

    1. A risk management system shall be established, implemented, documented and maintained in relation to high-risk AI systems.

    2. The risk management system shall consist of a continuous iterative process run throughout the entire lifecycle of a high-risk AI system, requiring regular systematic updating. It shall comprise the following steps:

    (a) identification and analysis of the known and foreseeable risks associated with each high-risk AI system;

    (b) estimation and evaluation of the risks that may emerge when the high-risk AI system is used in accordance with its intended purpose and under conditions of reasonably foreseeable misuse;

    (c) evaluation of other possibly arising risks based on the analysis of data gathered from the post-market monitoring system referred to in Article 61;

    (d) adoption of suitable risk management measures in accordance with the provisions of the following paragraphs.

    3. The risk management measures referred to in paragraph 2, point (d) shall give due consideration to the effects and possible interactions resulting from the combined application of the requirements set out in this Chapter 2. They shall take into account the generally acknowledged state of the art, including as reflected in relevant harmonised standards or common specifications.

    4. The risk management measures referred to in paragraph 2, point (d) shall be such that any residual risk associated with each hazard as well as the overall residual risk of the high-risk AI systems is judged acceptable, provided that the high-risk AI system is used in accordance with its intended purpose or under conditions of reasonably foreseeable misuse. Those residual risks shall be communicated to the user.

    In identifying the most appropriate risk management measures, the following shall be ensured:

    (a) elimination or reduction of risks as far as possible through adequate design and development;

    (b) where appropriate, implementation of adequate mitigation and control measures in relation to risks that cannot be eliminated;

    (c) provision of adequate information pursuant to Article 13, in particular as regards the risks referred to in paragraph 2, point (b) of this Article, and, where appropriate, training to users.

    In eliminating or reducing risks related to the use of the high-risk AI system, due consideration shall be given to the technical knowledge, experience, education, training to be expected by the user and the environment in which the system is intended to be used.

    5. High-risk AI systems shall be tested for the purposes of identifying the most appropriate risk management measures. Testing shall ensure that high-risk AI systems perform consistently for their intended purpose and they are in compliance with the requirements set out in this Chapter.

    6. Testing procedures shall be suitable to achieve the intended purpose of the AI system and do not need to go beyond what is necessary to achieve that purpose.

    7. The testing of the high-risk AI systems shall be performed, as appropriate, at any point in time throughout the development process, and, in any event, prior to the placing on the market or the putting into service. Testing shall be made against preliminarily defined metrics and probabilistic thresholds that are appropriate to the intended purpose of the high-risk AI system.

    8. When implementing the risk management system described in paragraphs 1 to 7, specific consideration shall be given to whether the high-risk AI system is likely to be accessed by or have an impact on children.

    9. For credit institutions regulated by Directive 2013/36/EU, the aspects described in paragraphs 1 to 8 shall be part of the risk management procedures established by those institutions pursuant to Article 74 of that Directive.

    Article 10. Data and data governance

    1. High-risk AI systems which make use of techniques involving the training of models with data shall be developed on the basis of training, validation and testing data sets that meet the quality criteria referred to in paragraphs 2 to 5.

    2. Training, validation and testing data sets shall be subject to appropriate data governance and management practices. Those practices shall concern in particular,

    (a) the relevant design choices;

    (b) data collection;

    (c) relevant data preparation processing operations, such as annotation, labelling, cleaning, enrichment and aggregation;

    (d) the formulation of relevant assumptions, notably with respect to the information that the data are supposed to measure and represent;

    (e) a prior assessment of the availability, quantity and suitability of the data sets that are needed;

    (f) examination in view of possible biases;

    (g) the identification of any possible data gaps or shortcomings, and how those gaps and shortcomings can be addressed.

    3. Training, validation and testing data sets shall be relevant, representative, free of errors and complete. They shall have the appropriate statistical properties, including, where applicable, as regards the persons or groups of persons on which the high-risk AI system is intended to be used. These characteristics of the data sets may be met at the level of individual data sets or a combination thereof.

    4. Training, validation and testing data sets shall take into account, to the extent required by the intended purpose, the characteristics or elements that are particular to the specific geographical, behavioural or functional setting within which the high-risk AI system is intended to be used.

    5. To the extent that it is strictly necessary for the purposes of ensuring bias monitoring, detection and correction in relation to the high-risk AI systems, the providers of such systems may process special categories of personal data referred to in Article 9(1) of Regulation (EU) 2016/679, Article 10 of Directive (EU) 2016/680 and Article 10(1) of Regulation (EU) 2018/1725, subject to appropriate safeguards for the fundamental rights and freedoms of natural persons, including technical limitations on the re-use and use of state-of-the-art security and privacy-preserving measures, such as pseudonymisation, or encryption where anonymisation may significantly affect the purpose pursued.

    6. Appropriate data governance and management practices shall apply for the development of high-risk AI systems other than those which make use of techniques involving the training of models in order to ensure that those high-risk AI systems comply with paragraph 2.

    Article 11. Technical documentation

    1. The technical documentation of a high-risk AI system shall be drawn up before that system is placed on the market or put into service and shall be kept up-to date.

    The technical documentation shall be drawn up in such a way to demonstrate that the high-risk AI system complies with the requirements set out in this Chapter and provide national competent authorities and notified bodies with all the necessary information to assess the compliance of the AI system with those requirements. It shall contain, at a minimum, the elements set out in Annex IV.

    2. Where a high-risk AI system related to a product, to which the legal acts listed in Annex II, section A apply, is placed on the market or put into service one single technical documentation shall be drawn up containing all the information set out in Annex IV as well as the information required under those legal acts.

    3. The Commission is empowered to adopt delegated acts in accordance with Article 73 to amend Annex IV where necessary to ensure that, in the light of technical progress, the technical documentation provides all the necessary information to assess the compliance of the system with the requirements set out in this Chapter.

    Article 12. Record-keeping

    1. High-risk AI systems shall be designed and developed with capabilities enabling the automatic recording of events (‘logs’) while the high-risk AI systems is operating. Those logging capabilities shall conform to recognised standards or common specifications.

    2. The logging capabilities shall ensure a level of traceability of the AI system’s functioning throughout its lifecycle that is appropriate to the intended purpose of the system.

    3. In particular, logging capabilities shall enable the monitoring of the operation of the high-risk AI system with respect to the occurrence of situations that may result in the AI system presenting a risk within the meaning of Article 65(1) or lead to a substantial modification, and facilitate the post-market monitoring referred to in Article 61.

    4. For high-risk AI systems referred to in paragraph 1, point (a) of Annex III, the logging capabilities shall provide, at a minimum:

    (a) recording of the period of each use of the system (start date and time and end date and time of each use);

    (b) the reference database against which input data has been checked by the system;

    (c) the input data for which the search has led to a match;

    (d) the identification of the natural persons involved in the verification of the results, as referred to in Article 14 (5).

    Article 13. Transparency and provision of information to users

    1. High-risk AI systems shall be designed and developed in such a way to ensure that their operation is sufficiently transparent to enable users to interpret the system’s output and use it appropriately. An appropriate type and degree of transparency shall be ensured, with a view to achieving compliance with the relevant obligations of the user and of the provider set out in Chapter 3 of this Title.

    2. High-risk AI systems shall be accompanied by instructions for use in an appropriate digital format or otherwise that include concise, complete, correct and clear information that is relevant, accessible and comprehensible to users.

    3. The information referred to in paragraph 2 shall specify:

    (a) the identity and the contact details of the provider and, where applicable, of its authorised representative;

    (b) the characteristics, capabilities and limitations of performance of the high-risk AI system, including:

    (i) its intended purpose;

    (ii) the level of accuracy, robustness and cybersecurity referred to in Article 15 against which the high-risk AI system has been tested and validated and which can be expected, and any known and foreseeable circumstances that may have an impact on that expected level of accuracy, robustness and cybersecurity;

    (iii) any known or foreseeable circumstance, related to the use of the high-risk AI system in accordance with its intended purpose or under conditions of reasonably foreseeable misuse, which may lead to risks to the health and safety or fundamental rights;

    (iv) its performance as regards the persons or groups of persons on which the system is intended to be used;

    (v) when appropriate, specifications for the input data, or any other relevant information in terms of the training, validation and testing data sets used, taking into account the intended purpose of the AI system.

    (c) the changes to the high-risk AI system and its performance which have been pre-determined by the provider at the moment of the initial conformity assessment, if any;

    (d) the human oversight measures referred to in Article 14, including the technical measures put in place to facilitate the interpretation of the outputs of AI systems by the users;

    (e) the expected lifetime of the high-risk AI system and any necessary maintenance and care measures to ensure the proper functioning of that AI system, including as regards software updates.

    Article 14. Human oversight

    1. High-risk AI systems shall be designed and developed in such a way, including with appropriate human-machine interface tools, that they can be effectively overseen by natural persons during the period in which the AI system is in use.

    2. Human oversight shall aim at preventing or minimising the risks to health, safety or fundamental rights that may emerge when a high-risk AI system is used in accordance with its intended purpose or under conditions of reasonably foreseeable misuse, in particular when such risks persist notwithstanding the application of other requirements set out in this Chapter.

    3. Human oversight shall be ensured through either one or all of the following measures:

    (a) identified and built, when technically feasible, into the high-risk AI system by the provider before it is placed on the market or put into service;

    (b) identified by the provider before placing the high-risk AI system on the market or putting it into service and that are appropriate to be implemented by the user.

    4. The measures referred to in paragraph 3 shall enable the individuals to whom human oversight is assigned to do the following, as appropriate to the circumstances:

    (a) fully understand the capacities and limitations of the high-risk AI system and be able to duly monitor its operation, so that signs of anomalies, dysfunctions and unexpected performance can be detected and addressed as soon as possible;

    (b) remain aware of the possible tendency of automatically relying or over-relying on the output produced by a high-risk AI system (‘automation bias’), in particular for high-risk AI systems used to provide information or recommendations for decisions to be taken by natural persons;

    (c) be able to correctly interpret the high-risk AI system’s output, taking into account in particular the characteristics of the system and the interpretation tools and methods available;

    (d) be able to decide, in any particular situation, not to use the high-risk AI system or otherwise disregard, override or reverse the output of the high-risk AI system;

    (e) be able to intervene on the operation of the high-risk AI system or interrupt the system through a “stop” button or a similar procedure.

    5. For high-risk AI systems referred to in point 1(a) of Annex III, the measures referred to in paragraph 3 shall be such as to ensure that, in addition, no action or decision is taken by the user on the basis of the identification resulting from the system unless this has been verified and confirmed by at least two natural persons.

    Article 15. Accuracy, robustness and cybersecurity

    1. High-risk AI systems shall be designed and developed in such a way that they achieve, in the light of their intended purpose, an appropriate level of accuracy, robustness and cybersecurity, and perform consistently in those respects throughout their lifecycle.

    2. The levels of accuracy and the relevant accuracy metrics of high-risk AI systems shall be declared in the accompanying instructions of use.

    3. High-risk AI systems shall be resilient as regards errors, faults or inconsistencies that may occur within the system or the environment in which the system operates, in particular due to their interaction with natural persons or other systems.

    The robustness of high-risk AI systems may be achieved through technical redundancy solutions, which may include backup or fail-safe plans.

    High-risk AI systems that continue to learn after being placed on the market or put into service shall be developed in such a way to ensure that possibly biased outputs due to outputs used as an input for future operations (‘feedback loops’) are duly addressed with appropriate mitigation measures.

    4. High-risk AI systems shall be resilient as regards attempts by unauthorised third parties to alter their use or performance by exploiting the system vulnerabilities.

    The technical solutions aimed at ensuring the cybersecurity of high-risk AI systems shall be appropriate to the relevant circumstances and the risks.

    The technical solutions to address AI specific vulnerabilities shall include, where appropriate, measures to prevent and control for attacks trying to manipulate the training dataset (‘data poisoning’), inputs designed to cause the model to make a mistake (‘adversarial examples’), or model flaws.

    CHAPTER 3. OBLIGATIONS OF PROVIDERS AND USERS OF HIGH-RISK AI SYSTEMS AND OTHER PARTIES

    Article 16. Obligations of providers of high-risk AI systems

    Providers of high-risk AI systems shall:

    (a) ensure that their high-risk AI systems are compliant with the requirements set out in Chapter 2 of this Title;

    (b) have a quality management system in place which complies with Article 17;

    (c) draw-up the technical documentation of the high-risk AI system;

    (d) when under their control, keep the logs automatically generated by their high-risk AI systems;

    (e) ensure that the high-risk AI system undergoes the relevant conformity assessment procedure, prior to its placing on the market or putting into service;

    (f) comply with the registration obligations referred to in Article 51;

    (g) take the necessary corrective actions, if the high-risk AI system is not in conformity with the requirements set out in Chapter 2 of this Title;

    (h) inform the national competent authorities of the Member States in which they made the AI system available or put it into service and, where applicable, the notified body of the non-compliance and of any corrective actions taken;

    (i) to affix the CE marking to their high-risk AI systems to indicate the conformity with this Regulation in accordance with Article 49;

    (j) upon request of a national competent authority, demonstrate the conformity of the high-risk AI system with the requirements set out in Chapter 2 of this Title.

    Article 17. Quality management system

    1. Providers of high-risk AI systems shall put a quality management system in place that ensures compliance with this Regulation. That system shall be documented in a systematic and orderly manner in the form of written policies, procedures and instructions, and shall include at least the following aspects:

    (a) a strategy for regulatory compliance, including compliance with conformity assessment procedures and procedures for the management of modifications to the high-risk AI system;

    (b) techniques, procedures and systematic actions to be used for the design, design control and design verification of the high-risk AI system;

    (c) techniques, procedures and systematic actions to be used for the development, quality control and quality assurance of the high-risk AI system;

    (d) examination, test and validation procedures to be carried out before, during and after the development of the high-risk AI system, and the frequency with which they have to be carried out;

    (e) technical specifications, including standards, to be applied and, where the relevant harmonised standards are not applied in full, the means to be used to ensure that the high-risk AI system complies with the requirements set out in Chapter 2 of this Title;

    (f) systems and procedures for data management, including data collection, data analysis, data labelling, data storage, data filtration, data mining, data aggregation, data retention and any other operation regarding the data that is performed before and for the purposes of the placing on the market or putting into service of high-risk AI systems;

    (g) the risk management system referred to in Article 9;

    (h) the setting-up, implementation and maintenance of a post-market monitoring system, in accordance with Article 61;

    (i) procedures related to the reporting of serious incidents and of malfunctioning in accordance with Article 62;

    (j) the handling of communication with national competent authorities, competent authorities, including sectoral ones, providing or supporting the access to data, notified bodies, other operators, customers or other interested parties;

    (k) systems and procedures for record keeping of all relevant documentation and information;

    (l) resource management, including security of supply related measures;

    (m) an accountability framework setting out the responsibilities of the management and other staff with regard to all aspects listed in this paragraph.

    2. The implementation of aspects referred to in paragraph 1 shall be proportionate to the size of the provider’s organisation.

    3. For providers that are credit institutions regulated by Directive 2013/36/ EU, the obligation to put a quality management system in place shall be deemed to be fulfilled by complying with the rules on internal governance arrangements, processes and mechanisms pursuant to Article 74 of that Directive. In that context, any harmonised standards referred to in Article 40 of this Regulation shall be taken into account.

    Article 18. Obligation to draw up technical documentation

    1. Providers of high-risk AI systems shall draw up the technical documentation referred to in Article 11 in accordance with Annex IV.

    2. Providers that are credit institutions regulated by Directive 2013/36/EU shall maintain the technical documentation as part of the documentation concerning internal governance, arrangements, processes and mechanisms pursuant to Article 74 of that Directive.

    Article 19. Conformity assessment

    1. Providers of high-risk AI systems shall ensure that their systems undergo the relevant conformity assessment procedure in accordance with Article 43, prior to their placing on the market or putting into service. Where the compliance of the AI systems with the requirements set out in Chapter 2 of this Title has been demonstrated following that conformity assessment, the providers shall draw up an EU declaration of conformity in accordance with Article 48 and affix the CE marking of conformity in accordance with Article 49.

    2. For high-risk AI systems referred to in point 5(b) of Annex III that are placed on the market or put into service by providers that are credit institutions regulated by Directive 2013/36/EU, the conformity assessment shall be carried out as part of the procedure referred to in Articles 97 to101 of that Directive.

    Article 20. Automatically generated logs

    1. Providers of high-risk AI systems shall keep the logs automatically generated by their high-risk AI systems, to the extent such logs are under their control by virtue of a contractual arrangement with the user or otherwise by law. The logs shall be kept for a period that is appropriate in the light of the intended purpose of high-risk AI system and applicable legal obligations under Union or national law.

    2. Providers that are credit institutions regulated by Directive 2013/36/EU shall maintain the logs automatically generated by their high-risk AI systems as part of the documentation under Articles 74 of that Directive.

    Article 21. Corrective actions

    Providers of high-risk AI systems which consider or have reason to consider that a high-risk AI system which they have placed on the market or put into service is not in conformity with this Regulation shall immediately take the necessary corrective actions to bring that system into conformity, to withdraw it or to recall it, as appropriate. They shall inform the distributors of the high-risk AI system in question and, where applicable, the authorised representative and importers accordingly.

    Article 22. Duty of information Where the high-risk AI system presents a risk within the meaning of Article 65(1) and that risk is known to the provider of the system, that provider shall immediately inform the national competent authorities of the Member States in which it made the system available and, where applicable, the notified body that issued a certificate for the high-risk AI system, in particular of the non-compliance and of any corrective actions taken.

    Article 23. Cooperation with competent authorities

    Providers of high-risk AI systems shall, upon request by a national competent authority, provide that authority with all the information and documentation necessary to demonstrate the conformity of the high-risk AI system with the requirements set out in Chapter 2 of this Title, in an official Union language determined by the Member State concerned. Upon a reasoned request from a national competent authority, providers shall also give that authority access to the logs automatically generated by the high-risk AI system, to the extent such logs are under their control by virtue of a contractual arrangement with the user or otherwise by law.

    Article 24. Obligations of product manufacturers Where a high-risk AI system related to products to which the legal acts listed in Annex II, section A, apply, is placed on the market or put into service together with the product manufactured in accordance with those legal acts and under the name of the product manufacturer, the manufacturer of the product shall take the responsibility of the compliance of the AI system with this Regulation and, as far as the AI system is concerned, have the same obligations imposed by the present Regulation on the provider.

    Article 25. Authorised representatives

    1. Prior to making their systems available on the Union market, where an importer cannot be identified, providers established outside the Union shall, by written mandate, appoint an authorised representative which is established in the Union.

    2. The authorised representative shall perform the tasks specified in the mandate received from the provider. The mandate shall empower the authorised representative to carry out the following tasks:

    (a) keep a copy of the EU declaration of conformity and the technical documentation at the disposal of the national competent authorities and national authorities referred to in Article 63(7);

    (b) provide a national competent authority, upon a reasoned request, with all the information and documentation necessary to demonstrate the conformity of a high-risk AI system with the requirements set out in Chapter 2 of this Title, including access to the logs automatically generated by the high-risk AI system to the extent such logs are under the control of the provider by virtue of a contractual arrangement with the user or otherwise by law;

    (c) cooperate with competent national authorities, upon a reasoned request, on any action the latter takes in relation to the high-risk AI system.

    Article 26. Obligations of importers

    1. Before placing a high-risk AI system on the market, importers of such system shall ensure that:

    (a) the appropriate conformity assessment procedure has been carried out by the provider of that AI system

    (b) the provider has drawn up the technical documentation in accordance with Annex IV;

    (c) the system bears the required conformity marking and is accompanied by the required documentation and instructions of use.

    2. Where an importer considers or has reason to consider that a high-risk AI system is not in conformity with this Regulation, it shall not place that system on the market until that AI system has been brought into conformity. Where the high-risk AI system presents a risk within the meaning of Article 65(1), the importer shall inform the provider of the AI system and the market surveillance authorities to that effect.

    3. Importers shall indicate their name, registered trade name or registered trade mark, and the address at which they can be contacted on the high-risk AI system or, where that is not possible, on its packaging or its accompanying documentation, as applicable.

    4. Importers shall ensure that, while a high-risk AI system is under their responsibility, where applicable, storage or transport conditions do not jeopardise its compliance with the requirements set out in Chapter 2 of this Title.

    5. Importers shall provide national competent authorities, upon a reasoned request, with all necessary information and documentation to demonstrate the conformity of a high-risk AI system with the requirements set out in Chapter 2 of this Title in a language which can be easily understood by that national competent authority, including access to the logs automatically generated by the high-risk AI system to the extent such logs are under the control of the provider by virtue of a contractual arrangement with the user or otherwise by law. They shall also cooperate with those authorities on any action national competent authority takes in relation to that system.

    Article 27. Obligations of distributors

    1. Before making a high-risk AI system available on the market, distributors shall verify that the high-risk AI system bears the required CE conformity marking, that it is accompanied by the required documentation and instruction of use, and that the provider and the importer of the system, as applicable, have complied with the obligations set out in this Regulation.

    2. Where a distributor considers or has reason to consider that a high-risk AI system is not in conformity with the requirements set out in Chapter 2 of this Title, it shall not make the high-risk AI system available on the market until that system has been brought into conformity with those requirements. Furthermore, where the system presents a risk within the meaning of Article 65(1), the distributor shall inform the provider or the importer of the system, as applicable, to that effect.

    3. Distributors shall ensure that, while a high-risk AI system is under their responsibility, where applicable, storage or transport conditions do not jeopardise the compliance of the system with the requirements set out in Chapter 2 of this Title.

    4. A distributor that considers or has reason to consider that a high-risk AI system which it has made available on the market is not in conformity with the requirements set out in Chapter 2 of this Title shall take the corrective actions necessary to bring that system into conformity with those requirements, to withdraw it or recall it or shall ensure that the provider, the importer or any relevant operator, as appropriate, takes those corrective actions. Where the high-risk AI system presents a risk within the meaning of Article 65(1), the distributor shall immediately inform the national competent authorities of the Member States in which it has made the product available to that effect, giving details, in particular, of the non-compliance and of any corrective actions taken.

    5. Upon a reasoned request from a national competent authority, distributors of high-risk AI systems shall provide that authority with all the information and documentation necessary to demonstrate the conformity of a high-risk system with the requirements set out in Chapter 2 of this Title. Distributors shall also cooperate with that national competent authority on any action taken by that authority.

    Article 28. Obligations of distributors, importers, users or any other third-party

    1. Any distributor, importer, user or other third-party shall be considered a provider for the purposes of this Regulation and shall be subject to the obligations of the provider under Article 16, in any of the following circumstances:

    (a) they place on the market or put into service a high-risk AI system under their name or trademark;

    (b) they modify the intended purpose of a high-risk AI system already placed on the market or put into service;

    (c) they make a substantial modification to the high-risk AI system.

    2. Where the circumstances referred to in paragraph 1, point (b) or (c), occur, the provider that initially placed the high-risk AI system on the market or put it into service shall no longer be considered a provider for the purposes of this Regulation.

    Article 29. Obligations of users of high-risk AI systems

    1. Users of high-risk AI systems shall use such systems in accordance with the instructions of use accompanying the systems, pursuant to paragraphs 2 and 5.

    2. The obligations in paragraph 1 are without prejudice to other user obligations under Union or national law and to the user’s discretion in organising its own resources and activities for the purpose of implementing the human oversight measures indicated by the provider.

    3. Without prejudice to paragraph 1, to the extent the user exercises control over the input data, that user shall ensure that input data is relevant in view of the intended purpose of the high-risk AI system.

    4. Users shall monitor the operation of the high-risk AI system on the basis of the instructions of use. When they have reasons to consider that the use in accordance with the instructions of use may result in the AI system presenting a risk within the meaning of Article 65(1) they shall inform the provider or distributor and suspend the use of the system. They shall also inform the provider or distributor when they have identified any serious incident or any malfunctioning within the meaning of Article 62 and interrupt the use of the AI system. In case the user is not able to reach the provider, Article 62 shall apply mutatis mutandis.

    For users that are credit institutions regulated by Directive 2013/36/EU, the monitoring obligation set out in the first subparagraph shall be deemed to be fulfilled by complying with the rules on internal governance arrangements, processes and mechanisms pursuant to Article 74 of that Directive.

    5. Users of high-risk AI systems shall keep the logs automatically generated by that high-risk AI system, to the extent such logs are under their control. The logs shall be kept for a period that is appropriate in the light of the intended purpose of the high-risk AI system and applicable legal obligations under Union or national law.

    Users that are credit institutions regulated by Directive 2013/36/EU shall maintain the logs as part of the documentation concerning internal governance arrangements, processes and mechanisms pursuant to Article 74 of that Directive.

    6. Users of high-risk AI systems shall use the information provided under Article 13 to comply with their obligation to carry out a data protection impact assessment under Article 35 of Regulation (EU) 2016/679 or Article 27 of Directive (EU) 2016/680, where applicable.

    CHAPTER 4. NOTIFIYING AUTHORITIES AND NOTIFIED BODIES

    Article 30. Notifying authorities

    1. Each Member State shall designate or establish a notifying authority responsible for setting up and carrying out the necessary procedures for the assessment, designation and notification of conformity assessment bodies and for their monitoring.

    2. Member States may designate a national accreditation body referred to in Regulation (EC) No 765/2008 as a notifying authority.

    3. Notifying authorities shall be established, organised and operated in such a way that no conflict of interest arises with conformity assessment bodies and the objectivity and impartiality of their activities are safeguarded.

    4. Notifying authorities shall be organised in such a way that decisions relating to the notification of conformity assessment bodies are taken by competent persons different from those who carried out the assessment of those bodies.

    5. Notifying authorities shall not offer or provide any activities that conformity assessment bodies perform or any consultancy services on a commercial or competitive basis.

    6. Notifying authorities shall safeguard the confidentiality of the information they obtain.

    7. Notifying authorities shall have a sufficient number of competent personnel at their disposal for the proper performance of their tasks.

    8. Notifying authorities shall make sure that conformity assessments are carried out in a proportionate manner, avoiding unnecessary burdens for providers and that notified bodies perform their activities taking due account of the size of an undertaking, the sector in which it operates, its structure and the degree of complexity of the AI system in question.

    Article 31. Application of a conformity assessment body for notification

    1. Conformity assessment bodies shall submit an application for notification to the notifying authority of the Member State in which they are established.

    2. The application for notification shall be accompanied by a description of the conformity assessment activities, the conformity assessment module or modules and the artificial intelligence technologies for which the conformity assessment body claims to be competent, as well as by an accreditation certificate, where one exists, issued by a national accreditation body attesting that the conformity assessment body fulfils the requirements laid down in Article 33. Any valid document related to existing designations of the applicant notified body under any other Union harmonisation legislation shall be added.

    3. Where the conformity assessment body concerned cannot provide an accreditation certificate, it shall provide the notifying authority with the documentary evidence necessary for the verification, recognition and regular monitoring of its compliance with the requirements laid down in Article 33. For notified bodies which are designated under any other Union harmonisation legislation, all documents and certificates linked to those designations may be used to support their designation procedure under this Regulation, as appropriate.

    Article 32. Notification procedure

    1. Notifying authorities may notify only conformity assessment bodies which have satisfied the requirements laid down in Article 33.

    2. Notifying authorities shall notify the Commission and the other Member States using the electronic notification tool developed and managed by the Commission.

    3. The notification shall include full details of the conformity assessment activities, the conformity assessment module or modules and the artificial intelligence technologies concerned.

    4. The conformity assessment body concerned may perform the activities of a notified body only where no objections are raised by the Commission or the other Member States within one month of a notification.

    5. Notifying authorities shall notify the Commission and the other Member States of any subsequent relevant changes to the notification.

    Article 33. Notified bodies

    1. Notified bodies shall verify the conformity of high-risk AI system in accordance with the conformity assessment procedures referred to in Article 43.

    2. Notified bodies shall satisfy the organisational, quality management, resources and process requirements that are necessary to fulfil their tasks.

    3. The organisational structure, allocation of responsibilities, reporting lines and operation of notified bodies shall be such as to ensure that there is confidence in the performance by and in the results of the conformity assessment activities that the notified bodies conduct.

    4. Notified bodies shall be independent of the provider of a high-risk AI system in relation to which it performs conformity assessment activities. Notified bodies shall also be independent of any other operator having an economic interest in the high-risk AI system that is assessed, as well as of any competitors of the provider.

    5. Notified bodies shall be organised and operated so as to safeguard the independence, objectivity and impartiality of their activities. Notified bodies shall document and implement a structure and procedures to safeguard impartiality and to promote and apply the principles of impartiality throughout their organisation, personnel and assessment activities.

    6. Notified bodies shall have documented procedures in place ensuring that their personnel, committees, subsidiaries, subcontractors and any associated body or personnel of external bodies respect the confidentiality of the information which comes into their possession during the performance of conformity assessment activities, except when disclosure is required by law. The staff of notified bodies shall be bound to observe professional secrecy with regard to all information obtained in carrying out their tasks under this Regulation, except in relation to the notifying authorities of the Member State in which their activities are carried out.

    7. Notified bodies shall have procedures for the performance of activities which take due account of the size of an undertaking, the sector in which it operates, its structure, the degree of complexity of the AI system in question.

    8. Notified bodies shall take out appropriate liability insurance for their conformity assessment activities, unless liability is assumed by the Member State concerned in accordance with national law or that Member State is directly responsible for the conformity assessment.

    9. Notified bodies shall be capable of carrying out all the tasks falling to them under this Regulation with the highest degree of professional integrity and the requisite competence in the specific field, whether those tasks are carried out by notified bodies themselves or on their behalf and under their responsibility.

    10. Notified bodies shall have sufficient internal competences to be able to effectively evaluate the tasks conducted by external parties on their behalf. To that end, at all times and for each conformity assessment procedure and each type of high-risk AI system in relation to which they have been designated, the notified body shall have permanent availability of sufficient administrative, technical and scientific personnel who possess experience and knowledge relating to the relevant artificial intelligence technologies, data and data computing and to the requirements set out in Chapter 2 of this Title.

    11. Notified bodies shall participate in coordination activities as referred to in Article 38. They shall also take part directly or be represented in European standardisation organisations, or ensure that they are aware and up to date in respect of relevant standards.

    12. Notified bodies shall make available and submit upon request all relevant documentation, including the providers’ documentation, to the notifying authority referred to in Article 30 to allow it to conduct its assessment, designation, notification, monitoring and surveillance activities and to facilitate the assessment outlined in this Chapter.

    Article 34. Subsidiaries of and subcontracting by notified bodies

    1. Where a notified body subcontracts specific tasks connected with the conformity assessment or has recourse to a subsidiary, it shall ensure that the subcontractor or the subsidiary meets the requirements laid down in Article 33 and shall inform the notifying authority accordingly.

    2. Notified bodies shall take full responsibility for the tasks performed by subcontractors or subsidiaries wherever these are established.

    3. Activities may be subcontracted or carried out by a subsidiary only with the agreement of the provider.

    4. Notified bodies shall keep at the disposal of the notifying authority the relevant documents concerning the assessment of the qualifications of the subcontractor or the subsidiary and the work carried out by them under this Regulation.

    Article 35. Identification numbers and lists of notified bodies designated under this Regulation

    1. The Commission shall assign an identification number to notified bodies. It shall assign a single number, even where a body is notified under several Union acts.

    2. The Commission shall make publicly available the list of the bodies notified under this Regulation, including the identification numbers that have been assigned to them and the activities for which they have been notified. The Commission shall ensure that the list is kept up to date.

    Article 36. Changes to notifications

    1. Where a notifying authority has suspicions or has been informed that a notified body no longer meets the requirements laid down in Article 33, or that it is failing to fulfil its obligations, that authority shall without delay investigate the matter with the utmost diligence. In that context, it shall inform the notified body concerned about the objections raised and give it the possibility to make its views known. If the notifying authority comes to the conclusion that the notified body investigation no longer meets the requirements laid down in Article 33 or that it is failing to fulfil its obligations, it shall restrict, suspend or withdraw the notification as appropriate, depending on the seriousness of the failure. It shall also immediately inform the Commission and the other Member States accordingly.

    2. In the event of restriction, suspension or withdrawal of notification, or where the notified body has ceased its activity, the notifying authority shall take appropriate steps to ensure that the files of that notified body are either taken over by another notified body or kept available for the responsible notifying authorities at their request.

    Article 37. Challenge to the competence of notified bodies

    1. The Commission shall, where necessary, investigate all cases where there are reasons to doubt whether a notified body complies with the requirements laid down in Article 33.

    2. The Notifying authority shall provide the Commission, on request, with all relevant information relating to the notification of the notified body concerned.

    3. The Commission shall ensure that all confidential information obtained in the course of its investigations pursuant to this Article is treated confidentially.

    4. Where the Commission ascertains that a notified body does not meet or no longer meets the requirements laid down in Article 33, it shall adopt a reasoned decision requesting the notifying Member State to take the necessary corrective measures, including withdrawal of notification if necessary. That implementing act shall be adopted in accordance with the examination procedure referred to in Article 74(2).

    Article 38. Coordination of notified bodies

    1. The Commission shall ensure that, with regard to the areas covered by this Regulation, appropriate coordination and cooperation between notified bodies active in the conformity assessment procedures of AI systems pursuant to this Regulation are put in place and properly operated in the form of a sectoral group of notified bodies.

    2. Member States shall ensure that the bodies notified by them participate in the work of that group, directly or by means of designated representatives.

    Article 39. Conformity assessment bodies of third countries

    Conformity assessment bodies established under the law of a third country with which the Union has concluded an agreement may be authorised to carry out the activities of notified Bodies under this Regulation.

    CHAPTER 5. STANDARDS, CONFORMITY ASSESSMENT, CERTIFICATES, REGISTRATION

    Article 40. Harmonised standards

    High-risk AI systems which are in conformity with harmonised standards or parts thereof the references of which have been published in the Official Journal of the European Union shall be presumed to be in conformity with the requirements set out in Chapter 2 of this Title, to the extent those standards cover those requirements.

    Article 41. Common specifications

    1. Where harmonised standards referred to in Article 40 do not exist or where the Commission considers that the relevant harmonised standards are insufficient or that there is a need to address specific safety or fundamental right concerns, the Commission may, by means of implementing acts, adopt common specifications in respect of the requirements set out in Chapter 2 of this Title. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 74(2).

    2. The Commission, when preparing the common specifications referred to in paragraph 1, shall gather the views of relevant bodies or expert groups established under relevant sectorial Union law.

    3. High-risk AI systems which are in conformity with the common specifications referred to in paragraph 1 shall be presumed to be in conformity with the requirements set out in Chapter 2 of this Title, to the extent those common specifications cover those requirements.

    4. Where providers do not comply with the common specifications referred to in paragraph 1, they shall duly justify that they have adopted technical solutions that are at least equivalent thereto.

    Article 42. Presumption of conformity with certain requirements

    1. Taking into account their intended purpose, high-risk AI systems that have been trained and tested on data concerning the specific geographical, behavioural and functional setting within which they are intended to be used shall be presumed to be in compliance with the requirement set out in Article 10(4).

    2. High-risk AI systems that have been certified or for which a statement of conformity has been issued under a cybersecurity scheme pursuant to Regulation (EU) 2019/881 of the European Parliament and of the Council (63) and the references of which have been published in the Official Journal of the European Union shall be presumed to be in compliance with the cybersecurity requirements set out in Article 15 of this Regulation in so far as the cybersecurity certificate or statement of conformity or parts thereof cover those requirements.

    Article 43 Conformity assessment

    1. For high-risk AI systems listed in point 1 of Annex III, where, in demonstrating the compliance of a high-risk AI system with the requirements set out in Chapter 2 of this Title, the provider has applied harmonised standards referred to in Article 40, or, where applicable, common specifications referred to in Article 41, the provider shall follow one of the following procedures:

    (a) the conformity assessment procedure based on internal control referred to in Annex VI;

    (b) the conformity assessment procedure based on assessment of the quality management system and assessment of the technical documentation, with the involvement of a notified body, referred to in Annex VII.

    Where, in demonstrating the compliance of a high-risk AI system with the requirements set out in Chapter 2 of this Title, the provider has not applied or has applied only in part harmonised standards referred to in Article 40, or where such harmonised standards do not exist and common specifications referred to in Article 41 are not available, the provider shall follow the conformity assessment procedure set out in Annex VII.

    For the purpose of the conformity assessment procedure referred to in Annex VII, the provider may choose any of the notified bodies. However, when the system is intended to be put into service by law enforcement, immigration or asylum authorities as well as EU institutions, bodies or agencies, the market surveillance authority referred to in Article 63(5) or (6), as applicable, shall act as a notified body.

    2. For high-risk AI systems referred to in points 2 to 8 of Annex III, providers shall follow the conformity assessment procedure based on internal control as referred to in Annex VI, which does not provide for the involvement of a notified body. For high-risk AI systems referred to in point 5(b) of Annex III, placed on the market or put into service by credit institutions regulated by Directive 2013/36/EU, the conformity assessment shall be carried out as part of the procedure referred to in Articles 97 to101 of that Directive.

    3. For high-risk AI systems, to which legal acts listed in Annex II, section A, apply, the provider shall follow the relevant conformity assessment as required under those legal acts. The requirements set out in Chapter 2 of this Title shall apply to those high-risk AI systems and shall be part of that assessment. Points 4.3., 4.4., 4.5. and the fifth paragraph of point 4.6 of Annex VII shall also apply.

    For the purpose of that assessment, notified bodies which have been notified under those legal acts shall be entitled to control the conformity of the high-risk AI systems with the requirements set out in Chapter 2 of this Title, provided that the compliance of those notified bodies with requirements laid down in Article 33(4), (9) and (10) has been assessed in the context of the notification procedure under those legal acts.

    Where the legal acts listed in Annex II, section A, enable the manufacturer of the product to opt out from a third-party conformity assessment, provided that that manufacturer has applied all harmonised standards covering all the relevant requirements, that manufacturer may make use of that option only if he has also applied harmonised standards or, where applicable, common specifications referred to in Article 41, covering the requirements set out in Chapter 2 of this Title.

    4. High-risk AI systems shall undergo a new conformity assessment procedure whenever they are substantially modified, regardless of whether the modified system is intended to be further distributed or continues to be used by the current user.

    For high-risk AI systems that continue to learn after being placed on the market or put into service, changes to the high-risk AI system and its performance that have been pre-determined by the provider at the moment of the initial conformity assessment and are part of the information contained in the technical documentation referred to in point 2(f) of Annex IV, shall not constitute a substantial modification.

    5. The Commission is empowered to adopt delegated acts in accordance with Article 73 for the purpose of updating Annexes VI and Annex VII in order to introduce elements of the conformity assessment procedures that become necessary in light of technical progress.

    6. The Commission is empowered to adopt delegated acts to amend paragraphs 1 and 2 in order to subject high-risk AI systems referred to in points 2 to 8 of Annex III to the conformity assessment procedure referred to in Annex VII or parts thereof. The Commission shall adopt such delegated acts taking into account the effectiveness of the conformity assessment procedure based on internal control referred to in Annex VI in preventing or minimizing the risks to health and safety and protection of fundamental rights posed by such systems as well as the availability of adequate capacities and resources among notified bodies.

    Article 44. Certificates

    1. Certificates issued by notified bodies in accordance with Annex VII shall be drawn-up in an official Union language determined by the Member State in which the notified body is established or in an official Union language otherwise acceptable to the notified body.

    2. Certificates shall be valid for the period they indicate, which shall not exceed five years. On application by the provider, the validity of a certificate may be extended for further periods, each not exceeding five years, based on a re-assessment in accordance with the applicable conformity assessment procedures.

    3. Where a notified body finds that an AI system no longer meets the requirements set out in Chapter 2 of this Title, it shall, taking account of the principle of proportionality, suspend or withdraw the certificate issued or impose any restrictions on it, unless compliance with those requirements is ensured by appropriate corrective action taken by the provider of the system within an appropriate deadline set by the notified body. The notified body shall give reasons for its decision.

    Article 45. Appeal against decisions of notified bodies

    Member States shall ensure that an appeal procedure against decisions of the notified bodies is available to parties having a legitimate interest in that decision.

    Article 46. Information obligations of notified bodies

    1. Notified bodies shall inform the notifying authority of the following:

    (a) any Union technical documentation assessment certificates, any supplements to those certificates, quality management system approvals issued in accordance with the requirements of Annex VII;

    (b) any refusal, restriction, suspension or withdrawal of a Union technical documentation assessment certificate or a quality management system approval issued in accordance with the requirements of Annex VII;

    (c) any circumstances affecting the scope of or conditions for notification;

    (d) any request for information which they have received from market surveillance authorities regarding conformity assessment activities;

    (e) on request, conformity assessment activities performed within the scope of their notification and any other activity performed, including cross-border activities and subcontracting.

    2. Each notified body shall inform the other notified bodies of:

    (a) quality management system approvals which it has refused, suspended or withdrawn, and, upon request, of quality system approvals which it has issued;

    (b) EU technical documentation assessment certificates or any supplements thereto which it has refused, withdrawn, suspended or otherwise restricted, and, upon request, of the certificates and/or supplements thereto which it has issued.

    3. Each notified body shall provide the other notified bodies carrying out similar conformity assessment activities covering the same artificial intelligence technologies with relevant information on issues relating to negative and, on request, positive conformity assessment results.

    Article 47. Derogation from conformity assessment procedure

    1. By way of derogation from Article 43, any market surveillance authority may authorise the placing on the market or putting into service of specific high-risk AI systems within the territory of the Member State concerned, for exceptional reasons of public security or the protection of life and health of persons, environmental protection and the protection of key industrial and infrastructural assets. That authorisation shall be for a limited period of time, while the necessary conformity assessment procedures are being carried out, and shall terminate once those procedures have been completed. The completion of those procedures shall be undertaken without undue delay.

    2. The authorisation referred to in paragraph 1 shall be issued only if the market surveillance authority concludes that the high-risk AI system complies with the requirements of Chapter 2 of this Title. The market surveillance authority shall inform the Commission and the other Member States of any authorisation issued pursuant to paragraph 1.

    3. Where, within 15 calendar days of receipt of the information referred to in paragraph 2, no objection has been raised by either a Member State or the Commission in respect of an authorisation issued by a market surveillance authority of a Member State in accordance with paragraph 1, that authorisation shall be deemed justified.

    4. Where, within 15 calendar days of receipt of the notification referred to in paragraph 2, objections are raised by a Member State against an authorisation issued by a market surveillance authority of another Member State, or where the Commission considers the authorisation to be contrary to Union law or the conclusion of the Member States regarding the compliance of the system as referred to in paragraph 2 to be unfounded, the Commission shall without delay enter into consultation with the relevant Member State; the operator(s) concerned shall be consulted and have the possibility to present their views. In view thereof, the Commission shall decide whether the authorisation is justified or not. The Commission shall address its decision to the Member State concerned and the relevant operator or operators.

    5. If the authorisation is considered unjustified, this shall be withdrawn by the market surveillance authority of the Member State concerned.

    6. By way of derogation from paragraphs 1 to 5, for high-risk AI systems intended to be used as safety components of devices, or which are themselves devices, covered by Regulation (EU) 2017/745 and Regulation (EU) 2017/746, Article 59 of Regulation (EU) 2017/745 and Article 54 of Regulation (EU) 2017/746 shall apply also with regard to the derogation from the conformity assessment of the compliance with the requirements set out in Chapter 2 of this Title.

    Article 48. EU declaration of conformity

    1. The provider shall draw up a written EU declaration of conformity for each AI system and keep it at the disposal of the national competent authorities for 10 years after the AI system has been placed on the market or put into service. The EU declaration of conformity shall identify the AI system for which it has been drawn up. A copy of the EU declaration of conformity shall be given to the relevant national competent authorities upon request.

    2. The EU declaration of conformity shall state that the high-risk AI system in question meets the requirements set out in Chapter 2 of this Title. The EU declaration of conformity shall contain the information set out in Annex V and shall be translated into an official Union language or languages required by the Member State(s) in which the high-risk AI system is made available.

    3. Where high-risk AI systems are subject to other Union harmonisation legislation which also requires an EU declaration of conformity, a single EU declaration of conformity shall be drawn up in respect of all Union legislations applicable to the high-risk AI system. The declaration shall contain all the information required for identification of the Union harmonisation legislation to which the declaration relates.

    4. By drawing up the EU declaration of conformity, the provider shall assume responsibility for compliance with the requirements set out in Chapter 2 of this Title. The provider shall keep the EU declaration of conformity up-to-date as appropriate.

    5. The Commission shall be empowered to adopt delegated acts in accordance with Article 73 for the purpose of updating the content of the EU declaration of conformity set out in Annex V in order to introduce elements that become necessary in light of technical progress.

    Article 49. CE marking of conformity

    1. The CE marking shall be affixed visibly, legibly and indelibly for high-risk AI systems. Where that is not possible or not warranted on account of the nature of the high-risk AI system, it shall be affixed to the packaging or to the accompanying documentation, as appropriate.

    2. The CE marking referred to in paragraph 1 of this Article shall be subject to the general principles set out in Article 30 of Regulation (EC) No 765/2008.

    3. Where applicable, the CE marking shall be followed by the identification number of the notified body responsible for the conformity assessment procedures set out in Article 43. The identification number shall also be indicated in any promotional material which mentions that the high-risk AI system fulfils the requirements for CE marking.

    Article 50. Document retention

    The provider shall, for a period ending 10 years after the AI system has been placed on the market or put into service, keep at the disposal of the national competent authorities:

    (a) the technical documentation referred to in Article 11;

    (b) the documentation concerning the quality management system referred to Article 17;

    (c) the documentation concerning the changes approved by notified bodies where applicable;

    (d) the decisions and other documents issued by the notified bodies where applicable;

    (e) the EU declaration of conformity referred to in Article 48.

    Article 51. Registration

    Before placing on the market or putting into service a high-risk AI system referred to in Article 6(2), the provider or, where applicable, the authorised representative shall register that system in the EU database referred to in Article 60.

    TITLE IV. TRANSPARENCY OBLIGATIONS FOR CERTAIN AI SYSTEMS

    Article 52. Transparency obligations for certain AI systems

    1. Providers shall ensure that AI systems intended to interact with natural persons are designed and developed in such a way that natural persons are informed that they are interacting with an AI system, unless this is obvious from the circumstances and the context of use. This obligation shall not apply to AI systems authorised by law to detect, prevent, investigate and prosecute criminal offences, unless those systems are available for the public to report a criminal offence.

    2. Users of an emotion recognition system or a biometric categorisation system shall inform of the operation of the system the natural persons exposed thereto. This obligation shall not apply to AI systems used for biometric categorisation, which are permitted by law to detect, prevent and investigate criminal offences. 3. Users of an AI system that generates or manipulates image, audio or video content that appreciably resembles existing persons, objects, places or other entities or events and would falsely appear to a person to be authentic or truthful (‘deep fake’), shall disclose that the content has been artificially generated or manipulated. However, the first subparagraph shall not apply where the use is authorised by law to detect, prevent, investigate and prosecute criminal offences or it is necessary for the exercise of the right to freedom of expression and the right to freedom of the arts and sciences guaranteed in the Charter of Fundamental Rights of the EU, and subject to appropriate safeguards for the rights and freedoms of third parties.

    4. Paragraphs 1, 2 and 3 shall not affect the requirements and obligations set out in Title III of this Regulation.

    TITLE V. MEASURES IN SUPPORT OF INNOVATION

    Article 53. AI regulatory sandboxes

    1. AI regulatory sandboxes established by one or more Member States competent authorities or the European Data Protection Supervisor shall provide a controlled environment that facilitates the development, testing and validation of innovative AI systems for a limited time before their placement on the market or putting into service pursuant to a specific plan. This shall take place under the direct supervision and guidance by the competent authorities with a view to ensuring compliance with the requirements of this Regulation and, where relevant, other Union and Member States legislation supervised within the sandbox.

    2. Member States shall ensure that to the extent the innovative AI systems involve the processing of personal data or otherwise fall under the supervisory remit of other national authorities or competent authorities providing or supporting access to data, the national data protection authorities and those other national authorities are associated to the operation of the AI regulatory sandbox.

    3. The AI regulatory sandboxes shall not affect the supervisory and corrective powers of the competent authorities. Any significant risks to health and safety and fundamental rights identified during the development and testing of such systems shall result in immediate mitigation and, failing that, in the suspension of the development and testing process until such mitigation takes place.

    4. Participants in the AI regulatory sandbox shall remain liable under applicable Union and Member States liability legislation for any harm inflicted on third parties as a result from the experimentation taking place in the sandbox.

    5. Member States’ competent authorities that have established AI regulatory sandboxes shall coordinate their activities and cooperate within the framework of the European Artificial Intelligence Board. They shall submit annual reports to the Board and the Commission on the results from the implementation of those scheme, including good practices, lessons learnt and recommendations on their setup and, where relevant, on the application of this Regulation and other Union legislation supervised within the sandbox.

    6. The modalities and the conditions of the operation of the AI regulatory sandboxes, including the eligibility criteria and the procedure for the application, selection, participation and exiting from the sandbox, and the rights and obligations of the participants shall be set out in implementing acts. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 74(2).

    Article 54. Further processing of personal data for developing certain AI systems in the public interest in the AI regulatory sandbox

    1. In the AI regulatory sandbox personal data lawfully collected for other purposes shall be processed for the purposes of developing and testing certain innovative AI systems in the sandbox under the following conditions:

    (a) the innovative AI systems shall be developed for safeguarding substantial public interest in one or more of the following areas:

    (i) the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, including the safeguarding against and the prevention of threats to public security, under the control and responsibility of the competent authorities. The processing shall be based on Member State or Union law;

    (ii) public safety and public health, including disease prevention, control and treatment;

    (iii) a high level of protection and improvement of the quality of the environment;

    (b) the data processed are necessary for complying with one or more of the requirements referred to in Title III, Chapter 2 where those requirements cannot be effectively fulfilled by processing anonymised, synthetic or other non-personal data;

    (c) there are effective monitoring mechanisms to identify if any high risks to the fundamental rights of the data subjects may arise during the sandbox experimentation as well as response mechanism to promptly mitigate those risks and, where necessary, stop the processing;

    (d) any personal data to be processed in the context of the sandbox are in a functionally separate, isolated and protected data processing environment under the control of the participants and only authorised persons have access to that data;

    (e) any personal data processed are not be transmitted, transferred or otherwise accessed by other parties;

    (f) any processing of personal data in the context of the sandbox do not lead to measures or decisions affecting the data subjects;

    (g) any personal data processed in the context of the sandbox are deleted once the participation in the sandbox has terminated or the personal data has reached the end of its retention period;

    (h) the logs of the processing of personal data in the context of the sandbox are kept for the duration of the participation in the sandbox and 1 year after its termination, solely for the purpose of and only as long as necessary for fulfilling accountability and documentation obligations under this Article or other application Union or Member States legislation;

    (i) complete and detailed description of the process and rationale behind the training, testing and validation of the AI system is kept together with the testing results as part of the technical documentation in Annex IV;

    (j) a short summary of the AI project developed in the sandbox, its objectives and expected results published on the website of the competent authorities.

    2. Paragraph 1 is without prejudice to Union or Member States legislation excluding processing for other purposes than those explicitly mentioned in that legislation.

    Article 55. Measures for small-scale providers and users

    1. Member States shall undertake the following actions:

    (a) provide small-scale providers and start-ups with priority access to the AI regulatory sandboxes to the extent that they fulfil the eligibility conditions;

    (b) organise specific awareness raising activities about the application of this Regulation tailored to the needs of the small-scale providers and users;

    (c) where appropriate, establish a dedicated channel for communication with small-scale providers and user and other innovators to provide guidance and respond to queries about the implementation of this Regulation.

    2. The specific interests and needs of the small-scale providers shall be taken into account when setting the fees for conformity assessment under Article 43, reducing those fees proportionately to their size and market size.

    TITLE VI. GOVERNANCE

    CHAPTER 1. EUROPEAN ARTIFICIAL INTELLIGENCE BOARD

    Article 56. Establishment of the European Artificial Intelligence Board

    1. A ‘European Artificial Intelligence Board’ (the ‘Board’) is established.

    2. The Board shall provide advice and assistance to the Commission in order to:

    (a) contribute to the effective cooperation of the national supervisory authorities and the Commission with regard to matters covered by this Regulation;

    (b) coordinate and contribute to guidance and analysis by the Commission and the national supervisory authorities and other competent authorities on emerging issues across the internal market with regard to matters covered by this Regulation;

    (c) assist the national supervisory authorities and the Commission in ensuring the consistent application of this Regulation.

    Article 57. Structure of the Board

    1. The Board shall be composed of the national supervisory authorities, who shall be represented by the head or equivalent high-level official of that authority, and the European Data Protection Supervisor. Other national authorities may be invited to the meetings, where the issues discussed are of relevance for them.

    2. The Board shall adopt its rules of procedure by a simple majority of its members, following the consent of the Commission. The rules of procedure shall also contain the operational aspects related to the execution of the Board’s tasks as listed in Article 58. The Board may establish sub-groups as appropriate for the purpose of examining specific questions.

    3. The Board shall be chaired by the Commission. The Commission shall convene the meetings and prepare the agenda in accordance with the tasks of the Board pursuant to this Regulation and with its rules of procedure. The Commission shall provide administrative and analytical support for the activities of the Board pursuant to this Regulation.

    4. The Board may invite external experts and observers to attend its meetings and may hold exchanges with interested third parties to inform its activities to an appropriate extent. To that end the Commission may facilitate exchanges between the Board and other Union bodies, offices, agencies and advisory groups.

    Article 58. Tasks of the Board

    When providing advice and assistance to the Commission in the context of Article 56(2), the Board shall in particular:

    (a) collect and share expertise and best practices among Member States;

    (b) contribute to uniform administrative practices in the Member States, including for the functioning of regulatory sandboxes referred to in Article 53;

    (c) issue opinions, recommendations or written contributions on matters related to the implementation of this Regulation, in particular

    (i) on technical specifications or existing standards regarding the requirements set out in Title III, Chapter 2,

    (ii) on the use of harmonised standards or common specifications referred to in Articles 40 and 41,

    (iii) on the preparation of guidance documents, including the guidelines concerning the setting of administrative fines referred to in Article 71.

    CHAPTER 2. NATIONAL COMPETENT AUTHORITIES

    Article 59. Designation of national competent authorities

    1. National competent authorities shall be established or designated by each Member State for the purpose of ensuring the application and implementation of this Regulation. National competent authorities shall be organised so as to safeguard the objectivity and impartiality of their activities and tasks.

    2. Each Member State shall designate a national supervisory authority among the national competent authorities. The national supervisory authority shall act as notifying authority and market surveillance authority unless a Member State has organisational and administrative reasons to designate more than one authority.

    3. Member States shall inform the Commission of their designation or designations and, where applicable, the reasons for designating more than one authority.

    4. Member States shall ensure that national competent authorities are provided with adequate financial and human resources to fulfil their tasks under this Regulation. In particular, national competent authorities shall have a sufficient number of personnel permanently available whose competences and expertise shall include an in-depth understanding of artificial intelligence technologies, data and data computing, fundamental rights, health and safety risks and knowledge of existing standards and legal requirements.

    5. Member States shall report to the Commission on an annual basis on the status of the financial and human resources of the national competent authorities with an assessment of their adequacy. The Commission shall transmit that information to the Board for discussion and possible recommendations.

    6. The Commission shall facilitate the exchange of experience between national competent authorities.

    7. National competent authorities may provide guidance and advice on the implementation of this Regulation, including to small-scale providers. Whenever national competent authorities intend to provide guidance and advice with regard to an AI system in areas covered by other Union legislation, the competent national authorities under that Union legislation shall be consulted, as appropriate. Member States may also establish one central contact point for communication with operators.

    8. When Union institutions, agencies and bodies fall within the scope of this Regulation, the European Data Protection Supervisor shall act as the competent authority for their supervision.

    TITLE VII. EU DATABASE FOR STAND-ALONE HIGH-RISK AI SYSTEMS

    Article 60. EU database for stand-alone high-risk AI systems

    1. The Commission shall, in collaboration with the Member States, set up and maintain a EU database containing information referred to in paragraph 2 concerning high-risk AI systems referred to in Article 6(2) which are registered in accordance with Article (51).

    2. The data listed in Annex VIII shall be entered into the EU database by the providers. The Commission shall provide them with technical and administrative support.

    3. Information contained in the EU database shall be accessible to the public.

    4. The EU database shall contain personal data only insofar as necessary for collecting and processing information in accordance with this Regulation. That information shall include the names and contact details of natural persons who are responsible for registering the system and have the legal authority to represent the provider.

    5. The Commission shall be the controller of the EU database. It shall also ensure to providers adequate technical and administrative support.

    TITLE VIII. POST-MARKET MONITORING, INFORMATION SHARING, MARKET SURVEILLANCE

    CHAPTER 1. POST-MARKET MONITORING

    Article 61. Post-market monitoring by providers and post-market monitoring plan for high-risk AI systems

    1. Providers shall establish and document a post-market monitoring system in a manner that is proportionate to the nature of the artificial intelligence technologies and the risks of the high-risk AI system.

    2. The post-market monitoring system shall actively and systematically collect, document and analyse relevant data provided by users or collected through other sources on the performance of high-risk AI systems throughout their lifetime, and allow the provider to evaluate the continuous compliance of AI systems with the requirements set out in Title III, Chapter 2.

    3. The post-market monitoring system shall be based on a post-market monitoring plan. The post-market monitoring plan shall be part of the technical documentation referred to in Annex IV. The Commission shall adopt an implementing act laying down detailed provisions establishing a template for the post-market monitoring plan and the list of elements to be included in the plan.

    4. For high-risk AI systems covered by the legal acts referred to in Annex II, where a post-market monitoring system and plan is already established under that legislation, the elements described in paragraphs 1, 2 and 3 shall be integrated into that system and plan as appropriate.

    The first subparagraph shall also apply to high-risk AI systems referred to in point 5(b) of Annex III placed on the market or put into service by credit institutions regulated by Directive 2013/36/EU.

    CHAPTER 2. SHARING OF INFORMATION ON INCIDENTS AND MALFUNCTIONING

    Article 62. Reporting of serious incidents and of malfunctioning

    1. Providers of high-risk AI systems placed on the Union market shall report any serious incident or any malfunctioning of those systems which constitutes a breach of obligations under Union law intended to protect fundamental rights to the market surveillance authorities of the Member States where that incident or breach occurred.

    Such notification shall be made immediately after the provider has established a causal link between the AI system and the incident or malfunctioning or the reasonable likelihood of such a link, and, in any event, not later than 15 days after the providers becomes aware of the serious incident or of the malfunctioning.

    2. Upon receiving a notification related to a breach of obligations under Union law intended to protect fundamental rights, the market surveillance authority shall inform the national public authorities or bodies referred to in Article 64(3). The Commission shall develop dedicated guidance to facilitate compliance with the obligations set out in paragraph 1. That guidance shall be issued 12 months after the entry into force of this Regulation, at the latest.

    3. For high-risk AI systems referred to in point 5(b) of Annex III which are placed on the market or put into service by providers that are credit institutions regulated by Directive 2013/36/EU and for high-risk AI systems which are safety components of devices, or are themselves devices, covered by Regulation (EU) 2017/745 and Regulation (EU) 2017/746, the notification of serious incidents or malfunctioning shall be limited to those that that constitute a breach of obligations under Union law intended to protect fundamental rights.

    CHAPTER 3. ENFORCEMENT

    Article 63. Market surveillance and control of AI systems in the Union market

    1. Regulation (EU) 2019/1020 shall apply to AI systems covered by this Regulation. However, for the purpose of the effective enforcement of this Regulation:

    (a) any reference to an economic operator under Regulation (EU) 2019/1020 shall be understood as including all operators identified in Title III, Chapter 3 of this Regulation;

    (b) any reference to a product under Regulation (EU) 2019/1020 shall be understood as including all AI systems falling within the scope of this Regulation.

    2. The national supervisory authority shall report to the Commission on a regular basis the outcomes of relevant market surveillance activities. The national supervisory authority shall report, without delay, to the Commission and relevant national competition authorities any information identified in the course of market surveillance activities that may be of potential interest for the application of Union law on competition rules.

    3. For high-risk AI systems, related to products to which legal acts listed in Annex II, section A apply, the market surveillance authority for the purposes of this Regulation shall be the authority responsible for market surveillance activities designated under those legal acts.

    4. For AI systems placed on the market, put into service or used by financial institutions regulated by Union legislation on financial services, the market surveillance authority for the purposes of this Regulation shall be the relevant authority responsible for the financial supervision of those institutions under that legislation.

    5. For AI systems listed in point 1(a) in so far as the systems are used for law enforcement purposes, points 6 and 7 of Annex III, Member States shall designate as market surveillance authorities for the purposes of this Regulation either the competent data protection supervisory authorities under Directive (EU) 2016/680, or Regulation 2016/679 or the national competent authorities supervising the activities of the law enforcement, immigration or asylum authorities putting into service or using those systems.

    6. Where Union institutions, agencies and bodies fall within the scope of this Regulation, the European Data Protection Supervisor shall act as their market surveillance authority.

    7. Member States shall facilitate the coordination between market surveillance authorities designated under this Regulation and other relevant national authorities or bodies which supervise the application of Union harmonisation legislation listed in Annex II or other Union legislation that might be relevant for the high-risk AI systems referred to in Annex III.

    Article 64. Access to data and documentation

    1. Access to data and documentation in the context of their activities, the market surveillance authorities shall be granted full access to the training, validation and testing datasets used by the provider, including through application programming interfaces (‘API’) or other appropriate technical means and tools enabling remote access.

    2. Where necessary to assess the conformity of the high-risk AI system with the requirements set out in Title III, Chapter 2 and upon a reasoned request, the market surveillance authorities shall be granted access to the source code of the AI system.

    3. National public authorities or bodies which supervise or enforce the respect of obligations under Union law protecting fundamental rights in relation to the use of high-risk AI systems referred to in Annex III shall have the power to request and access any documentation created or maintained under this Regulation when access to that documentation is necessary for the fulfilment of the competences under their mandate within the limits of their jurisdiction. The relevant public authority or body shall inform the market surveillance authority of the Member State concerned of any such request.

    4. By 3 months after the entering into force of this Regulation, each Member State shall identify the public authorities or bodies referred to in paragraph 3 and make a list publicly available on the website of the national supervisory authority. Member States shall notify the list to the Commission and all other Member States and keep the list up to date.

    5. Where the documentation referred to in paragraph 3 is insufficient to ascertain whether a breach of obligations under Union law intended to protect fundamental rights has occurred, the public authority or body referred to paragraph 3 may make a reasoned request to the market surveillance authority to organise testing of the high-risk AI system through technical means. The market surveillance authority shall organise the testing with the close involvement of the requesting public authority or body within reasonable time following the request.

    6. Any information and documentation obtained by the national public authorities or bodies referred to in paragraph 3 pursuant to the provisions of this Article shall be treated in compliance with the confidentiality obligations set out in Article 70.

    Article 65. Procedure for dealing with AI systems presenting a risk at national level

    1. AI systems presenting a risk shall be understood as a product presenting a risk defined in Article 3, point 19 of Regulation (EU) 2019/1020 insofar as risks to the health or safety or to the protection of fundamental rights of persons are concerned.

    2. Where the market surveillance authority of a Member State has sufficient reasons to consider that an AI system presents a risk as referred to in paragraph 1, they shall carry out an evaluation of the AI system concerned in respect of its compliance with all the requirements and obligations laid down in this Regulation. When risks to the protection of fundamental rights are present, the market surveillance authority shall also inform the relevant national public authorities or bodies referred to in Article 64(3). The relevant operators shall cooperate as necessary with the market surveillance authorities and the other national public authorities or bodies referred to in Article 64(3).

    Where, in the course of that evaluation, the market surveillance authority finds that the AI system does not comply with the requirements and obligations laid down in this Regulation, it shall without delay require the relevant operator to take all appropriate corrective actions to bring the AI system into compliance, to withdraw the AI system from the market, or to recall it within a reasonable period, commensurate with the nature of the risk, as it may prescribe.

    The market surveillance authority shall inform the relevant notified body accordingly. Article 18 of Regulation (EU) 2019/1020 shall apply to the measures referred to in the second subparagraph.

    3. Where the market surveillance authority considers that non-compliance is not restricted to its national territory, it shall inform the Commission and the other Member States of the results of the evaluation and of the actions which it has required the operator to take.

    4. The operator shall ensure that all appropriate corrective action is taken in respect of all the AI systems concerned that it has made available on the market throughout the Union.

    5. Where the operator of an AI system does not take adequate corrective action within the period referred to in paragraph 2, the market surveillance authority shall take all appropriate provisional measures to prohibit or restrict the AI system’s being made available on its national market, to withdraw the product from that market or to recall it. That authority shall inform the Commission and the other Member States, without delay, of those measures.

    6. The information referred to in paragraph 5 shall include all available details, in particular the data necessary for the identification of the non-compliant AI system, the origin of the AI system, the nature of the non-compliance alleged and the risk involved, the nature and duration of the national measures taken and the arguments put forward by the relevant operator. In particular, the market surveillance authorities shall indicate whether the non-compliance is due to one or more of the following:

    (a) a failure of the AI system to meet requirements set out in Title III, Chapter 2;

    (b) shortcomings in the harmonised standards or common specifications referred to in Articles 40 and 41 conferring a presumption of conformity.

    7. The market surveillance authorities of the Member States other than the market surveillance authority of the Member State initiating the procedure shall without delay inform the Commission and the other Member States of any measures adopted and of any additional information at their disposal relating to the non-compliance of the AI system concerned, and, in the event of disagreement with the notified national measure, of their objections.

    8. Where, within three months of receipt of the information referred to in paragraph 5, no objection has been raised by either a Member State or the Commission in respect of a provisional measure taken by a Member State, that measure shall be deemed justified. This is without prejudice to the procedural rights of the concerned operator in accordance with Article 18 of Regulation (EU) 2019/1020.

    9. The market surveillance authorities of all Member States shall ensure that appropriate restrictive measures are taken in respect of the product concerned, such as withdrawal of the product from their market, without delay.

    Article 66. Union safeguard procedure

    1. Where, within three months of receipt of the notification referred to in Article 65(5), objections are raised by a Member State against a measure taken by another Member State, or where the Commission considers the measure to be contrary to Union law, the Commission shall without delay enter into consultation with the relevant Member State and operator or operators and shall evaluate the national measure. On the basis of the results of that evaluation, the Commission shall decide whether the national measure is justified or not within 9 months from the notification referred to in Article 65(5) and notify such decision to the Member State concerned.

    2. If the national measure is considered justified, all Member States shall take the measures necessary to ensure that the non-compliant AI system is withdrawn from their market, and shall inform the Commission accordingly. If the national measure is considered unjustified, the Member State concerned shall withdraw the measure.

    3. Where the national measure is considered justified and the non-compliance of the AI system is attributed to shortcomings in the harmonised standards or common specifications referred to in Articles 40 and 41 of this Regulation, the Commission shall apply the procedure provided for in Article 11 of Regulation (EU) No 1025/2012.

    Article 67. Compliant AI systems which present a risk

    1. Where, having performed an evaluation under Article 65, the market surveillance authority of a Member State finds that although an AI system is in compliance with this Regulation, it presents a risk to the health or safety of persons, to the compliance with obligations under Union or national law intended to protect fundamental rights or to other aspects of public interest protection, it shall require the relevant operator to take all appropriate measures to ensure that the AI system concerned, when placed on the market or put into service, no longer presents that risk, to withdraw the AI system from the market or to recall it within a reasonable period, commensurate with the nature of the risk, as it may prescribe.

    2. The provider or other relevant operators shall ensure that corrective action is taken in respect of all the AI systems concerned that they have made available on the market throughout the Union within the timeline prescribed by the market surveillance authority of the Member State referred to in paragraph 1.

    3. The Member State shall immediately inform the Commission and the other Member States. That information shall include all available details, in particular the data necessary for the identification of the AI system concerned, the origin and the supply chain of the AI system, the nature of the risk involved and the nature and duration of the national measures taken.

    4. The Commission shall without delay enter into consultation with the Member States and the relevant operator and shall evaluate the national measures taken. On the basis of the results of that evaluation, the Commission shall decide whether the measure is justified or not and, where necessary, propose appropriate measures.

    5. The Commission shall address its decision to the Member States.

    Article 68. Formal non-compliance

    1. Where the market surveillance authority of a Member State makes one of the following findings, it shall require the relevant provider to put an end to the non-compliance concerned:

    (a) the conformity marking has been affixed in violation of Article 49;

    (b) the conformity marking has not been affixed;

    (c) the EU declaration of conformity has not been drawn up;

    (d) the EU declaration of conformity has not been drawn up correctly;

    (e) the identification number of the notified body, which is involved in the conformity assessment procedure, where applicable, has not been affixed;

    2. Where the non-compliance referred to in paragraph 1 persists, the Member State concerned shall take all appropriate measures to restrict or prohibit the high-risk AI system being made available on the market or ensure that it is recalled or withdrawn from the market.

    TITLE IX. CODES OF CONDUCT

    Article 69. Codes of conduct

    1. The Commission and the Member States shall encourage and facilitate the drawing up of codes of conduct intended to foster the voluntary application to AI systems other than high-risk AI systems of the requirements set out in Title III, Chapter 2 on the basis of technical specifications and solutions that are appropriate means of ensuring compliance with such requirements in light of the intended purpose of the systems.

    2. The Commission and the Board shall encourage and facilitate the drawing up of codes of conduct intended to foster the voluntary application to AI systems of requirements related for example to environmental sustainability, accessibility for persons with a disability, stakeholders participation in the design and development of the AI systems and diversity of development teams on the basis of clear objectives and key performance indicators to measure the achievement of those objectives.

    3. Codes of conduct may be drawn up by individual providers of AI systems or by organisations representing them or by both, including with the involvement of users and any interested stakeholders and their representative organisations. Codes of conduct may cover one or more AI systems taking into account the similarity of the intended purpose of the relevant systems.

    4. The Commission and the Board shall take into account the specific interests and needs of the small-scale providers and start-ups when encouraging and facilitating the drawing up of codes of conduct.

    TITLE X. CONFIDENTIALITY AND PENALTIES

    Article 70. Confidentiality

    1. National competent authorities and notified bodies involved in the application of this Regulation shall respect the confidentiality of information and data obtained in carrying out their tasks and activities in such a manner as to protect, in particular:

    (a) intellectual property rights, and confidential business information or trade secrets of a natural or legal person, including source code, except the cases referred to in Article 5 of Directive 2016/943 on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure apply.

    (b) the effective implementation of this Regulation, in particular for the purpose of inspections, investigations or audits;(c) public and national security interests;

    (c) integrity of criminal or administrative proceedings.

    2. Without prejudice to paragraph 1, information exchanged on a confidential basis between the national competent authorities and between national competent authorities and the Commission shall not be disclosed without the prior consultation of the originating national competent authority and the user when high-risk AI systems referred to in points 1, 6 and 7 of Annex III are used by law enforcement, immigration or asylum authorities, when such disclosure would jeopardise public and national security interests.

    When the law enforcement, immigration or asylum authorities are providers of high-risk AI systems referred to in points 1, 6 and 7 of Annex III, the technical documentation referred to in Annex IV shall remain within the premises of those authorities. Those authorities shall ensure that the market surveillance authorities referred to in Article 63(5) and (6), as applicable, can, upon request, immediately access the documentation or obtain a copy thereof. Only staff of the market surveillance authority holding the appropriate level of security clearance shall be allowed to access that documentation or any copy thereof.

    3. Paragraphs 1 and 2 shall not affect the rights and obligations of the Commission, Member States and notified bodies with regard to the exchange of information and the dissemination of warnings, nor the obligations of the parties concerned to provide information under criminal law of the Member States.

    4. The Commission and Member States may exchange, where necessary, confidential information with regulatory authorities of third countries with which they have concluded bilateral or multilateral confidentiality arrangements guaranteeing an adequate level of confidentiality.

    Article 71. Penalties

    1. In compliance with the terms and conditions laid down in this Regulation, Member States shall lay down the rules on penalties, including administrative fines, applicable to infringements of this Regulation and shall take all measures necessary to ensure that they are properly and effectively implemented. The penalties provided for shall be effective, proportionate, and dissuasive. They shall take into particular account the interests of small-scale providers and start-up and their economic viability.

    2. The Member States shall notify the Commission of those rules and of those measures and shall notify it, without delay, of any subsequent amendment affecting them.

    3. The following infringements shall be subject to administrative fines of up to 30 000 000 EUR or, if the offender is company, up to 6 % of its total worldwide annual turnover for the preceding financial year, whichever is higher:

    (a) non-compliance with the prohibition of the artificial intelligence practices referred to in Article 5;

    (b) non-compliance of the AI system with the requirements laid down in Article 10.

    4. The non-compliance of the AI system with any requirements or obligations under this Regulation, other than those laid down in Articles 5 and 10, shall be subject to administrative fines of up to 20 000 000 EUR or, if the offender is a company, up to 4 % of its total worldwide annual turnover for the preceding financial year, whichever is higher.

    5. The supply of incorrect, incomplete or misleading information to notified bodies and national competent authorities in reply to a request shall be subject to administrative fines of up to 10 000 000 EUR or, if the offender is a company, up to 2 % of its total worldwide annual turnover for the preceding financial year, whichever is higher.

    6. When deciding on the amount of the administrative fine in each individual case, all relevant circumstances of the specific situation shall be taken into account and due regard shall be given to the following:

    (a) the nature, gravity and duration of the infringement and of its consequences;

    (b) whether administrative fines have been already applied by other market surveillance authorities to the same operator for the same infringement.

    (c) the size and market share of the operator committing the infringement;

    7. Each Member State shall lay down rules on whether and to what extent administrative fines may be imposed on public authorities and bodies established in that Member State.

    8. Depending on the legal system of the Member States, the rules on administrative fines may be applied in such a manner that the fines are imposed by competent national courts of other bodies as applicable in those Member States. The application of such rules in those Member States shall have an equivalent effect.

    Article 72. Administrative fines on Union institutions, agencies and bodies

    1. The European Data Protection Supervisor may impose administrative fines on Union institutions, agencies and bodies falling within the scope of this Regulation. When deciding whether to impose an administrative fine and deciding on the amount of the administrative fine in each individual case, all relevant circumstances of the specific situation shall be taken into account and due regard shall be given to the following:

    (a) the nature, gravity and duration of the infringement and of its consequences;

    (b) the cooperation with the European Data Protection Supervisor in order to remedy the infringement and mitigate the possible adverse effects of the infringement, including compliance with any of the measures previously ordered by the European Data Protection Supervisor against the Union institution or agency or body concerned with regard to the same subject matter;

    (c) any similar previous infringements by the Union institution, agency or body;

    2. The following infringements shall be subject to administrative fines of up to 500 000 EUR:

    (a) non-compliance with the prohibition of the artificial intelligence practices referred to in Article 5;

    (b) non-compliance of the AI system with the requirements laid down in Article 10.

    3. The non-compliance of the AI system with any requirements or obligations under this Regulation, other than those laid down in Articles 5 and 10, shall be subject to administrative fines of up to 250 000 EUR.

    4. Before taking decisions pursuant to this Article, the European Data Protection Supervisor shall give the Union institution, agency or body which is the subject of the proceedings conducted by the European Data Protection Supervisor the opportunity of being heard on the matter regarding the possible infringement. The European Data Protection Supervisor shall base his or her decisions only on elements and circumstances on which the parties concerned have been able to comment. Complainants, if any, shall be associated closely with the proceedings.

    5. The rights of defense of the parties concerned shall be fully respected in the proceedings. They shall be entitled to have access to the European Data Protection Supervisor’s file, subject to the legitimate interest of individuals or undertakings in the protection of their personal data or business secrets.

    6. Funds collected by imposition of fines in this Article shall be the income of the general budget of the Union.

    TITLE XI. DELEGATION OF POWER AND COMMITTEE PROCEDURE

    Article 73. Exercise of the delegation

    1. The power to adopt delegated acts is conferred on the Commission subject to the conditions laid down in this Article.

    2. The delegation of power referred to in Article 4, Article 7(1), Article 11(3), Article 43(5) and (6) and Article 48(5) shall be conferred on the Commission for an indeterminate period of time from [entering into force of the Regulation].

    3. The delegation of power referred to in Article 4, Article 7(1), Article 11(3), Article 43(5) and (6) and Article 48(5) may be revoked at any time by the European Parliament or by the Council. A decision of revocation shall put an end to the delegation of power specified in that decision. It shall take effect the day following that of its publication in the Official Journal of the European Union or at a later date specified therein. It shall not affect the validity of any delegated acts already in force.

    4. As soon as it adopts a delegated act, the Commission shall notify it simultaneously to the European Parliament and to the Council.

    5. Any delegated act adopted pursuant to Article 4, Article 7(1), Article 11(3), Article 43(5) and (6) and Article 48(5) shall enter into force only if no objection has been expressed by either the European Parliament or the Council within a period of three months of notification of that act to the European Parliament and the Council or if, before the expiry of that period, the European Parliament and the Council have both informed the Commission that they will not object. That period shall be extended by three months at the initiative of the European Parliament or of the Council.

    Article 74. Committee procedure

    1. The Commission shall be assisted by a committee. That committee shall be a committee within the meaning of Regulation (EU) nº 182/2011.

    2. Where reference is made to this paragraph, Article 5 of Regulation (EU) nº 182/2011 shall apply.

    TITLE XII. FINAL PROVISIONS

    Article 75. Amendment to Regulation (EC) nº 300/2008

    In Article 4(3) of Regulation (EC) nº 300/2008, the following subparagraph is added:

    “When adopting detailed measures related to technical specifications and procedures for approval and use of security equipment concerning Artificial Intelligence systems in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council*, the requirements set out in Chapter 2, Title III of that Regulation shall be taken into account.”

    ——————————————————————————

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”

    ——————————————————————————

    Article 76. Amendment to Regulation (EU) nº 167/2013

    In Article 17(5) of Regulation (EU) No 167/2013, the following subparagraph is added:

    “When adopting delegated acts pursuant to the first subparagraph concerning artificial intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council*, the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.

    ——————————————————————————

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”

    ——————————————————————————

    Article 77. Amendment to Regulation (EU) nº 168/2013

    In Article 22(5) of Regulation (EU) No 168/2013, the following subparagraph is added:

    “When adopting delegated acts pursuant to the first subparagraph concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX on [Artificial Intelligence] of the European Parliament and of the Council*, the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.

    ——————————————————————————-

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”

    ——————————————————————————-

    Article 78. Amendment to Directive 2014/90/EU

    In Article 8 of Directive 2014/90/EU, the following paragraph is added:

    “4. For Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council*, when carrying out its activities pursuant to paragraph 1 and when adopting technical specifications and testing standards in accordance with paragraphs 2 and 3, the Commission shall take into account the requirements set out in Title III, Chapter 2 of that Regulation.

    ——————————————————————————-

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”.

    Article 79. Amendment to Directive (EU) 2016/797

    In Article 5 of Directive (EU) 2016/797, the following paragraph is added:

    12. When adopting delegated acts pursuant to paragraph 1 and implementing acts pursuant to paragraph 11 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council*, the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.

    —————————————————————————–

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”.

    Article 80. Amendment to Regulation (EU) 2018/858

    In Article 5 of Regulation (EU) 2018/858 the following paragraph is added:

    “4. When adopting delegated acts pursuant to paragraph 3 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council *, the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.

    —————————————————————————–

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”.

    Article 81 Amendment to Regulation (EU) 2018/1139

    Regulation (EU) 2018/1139 is amended as follows:

    (1) In Article 17, the following paragraph is added:

    “3. Without prejudice to paragraph 2, when adopting implementing acts pursuant to paragraph 1 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council*, the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.

    ——————————————————————————

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”

    (2) In Article 19, the following paragraph is added:

    “4. When adopting delegated acts pursuant to paragraphs 1 and 2 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence], the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.”

    (3) In Article 43, the following paragraph is added:

    “4. When adopting implementing acts pursuant to paragraph 1 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence], the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.”

    (4) In Article 47, the following paragraph is added:

    “3. When adopting delegated acts pursuant to paragraphs 1 and 2 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence], the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.”

    (5) In Article 57, the following paragraph is added:

    “When adopting those implementing acts concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence], the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.”

    (6) In Article 58, the following paragraph is added:

    “3. When adopting delegated acts pursuant to paragraphs 1 and 2 concerning Artificial Intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] , the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.”.

    Article 82. Amendment to Regulation (EU) 2019/2144

    In Article 11 of Regulation (EU) 2019/2144, the following paragraph is added:

    “3. When adopting the implementing acts pursuant to paragraph 2, concerning artificial intelligence systems which are safety components in the meaning of Regulation (EU) YYY/XX [on Artificial Intelligence] of the European Parliament and of the Council*, the requirements set out in Title III, Chapter 2 of that Regulation shall be taken into account.

    ——————————————————————————–

    * Regulation (EU) YYY/XX [on Artificial Intelligence] (OJ …).”.

    ——————————————————————————-

    Article 83. AI systems already placed on the market or put into service

    1. This Regulation shall not apply to the AI systems which are components of the large-scale IT systems established by the legal acts listed in Annex IX that have been placed on the market or put into service before [12 months after the date of application of this Regulation referred to in Article 85(2)], unless the replacement or amendment of those legal acts leads to a significant change in the design or intended purpose of the AI system or AI systems concerned.

    The requirements laid down in this Regulation shall be taken into account, where applicable, in the evaluation of each large-scale IT systems established by the legal acts listed in Annex IX to be undertaken as provided for in those respective acts.

    2. This Regulation shall apply to the high-risk AI systems, other than the ones referred to in paragraph 1, that have been placed on the market or put into service before [date of application of this Regulation referred to in Article 85(2)], only if, from that date, those systems are subject to significant changes in their design or intended purpose.

    Article 84. Evaluation and review

    1. The Commission shall assess the need for amendment of the list in Annex III once a year following the entry into force of this Regulation.

    2. By [three years after the date of application of this Regulation referred to in Article 85(2)] and every four years thereafter, the Commission shall submit a report on the evaluation and review of this Regulation to the European Parliament and to the Council. The reports shall be made public.

    3. The reports referred to in paragraph 2 shall devote specific attention to the following:

    (a) the status of the financial and human resources of the national competent authorities in order to effectively perform the tasks assigned to them under this Regulation;

    (b) the state of penalties, and notably administrative fines as referred to in Article 71(1), applied by Member States to infringements of the provisions of this Regulation.

    4. Within [three years after the date of application of this Regulation referred to in Article 85(2)] and every four years thereafter, the Commission shall evaluate the impact and effectiveness of codes of conduct to foster the application of the requirements set out in Title III, Chapter 2 and possibly other additional requirements for AI systems other than high-risk AI systems.

    5. For the purpose of paragraphs 1 to 4 the Board, the Member States and national competent authorities shall provide the Commission with information on its request.

    6. In carrying out the evaluations and reviews referred to in paragraphs 1 to 4 the Commission shall take into account the positions and findings of the Board, of the European Parliament, of the Council, and of other relevant bodies or sources.

    7. The Commission shall, if necessary, submit appropriate proposals to amend this Regulation, in particular taking into account developments in technology and in the light of the state of progress in the information society.

    Article 85 Entry into force and application

    1. This Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.

    2. This Regulation shall apply from [24 months following the entering into force of the Regulation].

    3. By way of derogation from paragraph 2:

    (a) Title III, Chapter 4 and Title VI shall apply from [three months following the entry into force of this Regulation];

    (b) Article 71 shall apply from [twelve months following the entry into force of this Regulation].

    This Regulation shall be binding in its entirety and directly applicable in all Member States.

    Done at Brussels,

    For the European Parliament For the Council

    The President The President

    LEGISLATIVE FINANCIAL STATEMENT

    1. FRAMEWORK OF THE PROPOSAL/INITIATIVE

    1.1. Title of the proposal/initiative

    1.2. Policy area(s) concerned

    1.3. The proposal/initiative relates to:

    1.4. Objective(s)

    1.4.1. General objective(s)

    1.4.2. Specific objective(s)

    1.4.3. Expected result(s) and impact

    1.4.4. Indicators of performance

    1.5. Grounds for the proposal/initiative

    1.5.1. Requirement(s) to be met in the short or long term including a detailed timeline for roll-out of the implementation of the initiative

    1.5.2. Added value of Union involvement (it may result from different factors, e.g. coordination gains, legal certainty, greater effectiveness or complementarities). For the purposes of this point ‘added value of Union involvement’ is the value resulting from Union intervention which is additional to the value that would have been otherwise created by Member States alone

    1.5.3. Lessons learned from similar experiences in the past

    1.5.4. Compatibility with the Multiannual Financial Framework and possible synergies with other appropriate instruments

    1.5.5 Assessment of the different available financing options, including scope for redeployment

    1.6. Duration and financial impact of the proposal/initiative

    1.7. Management mode(s) planned

    2. MANAGEMENT MEASURES

    2.1. Monitoring and reporting rules

    2.2. Management and control system

    2.2.1. Justification of the management mode(s), the funding implementation mechanism(s), the payment modalities and the control strategy proposed

    2.2.2. Information concerning the risks identified and the internal control system(s) set up to mitigate them

    2.2.3. Estimation and justification of the cost-effectiveness of the controls (ratio of “control costs ÷ value of the related funds managed”), and assessment of the expected levels of risk of error (at payment & at closure)

    2.3. Measures to prevent fraud and irregularities

    3. ESTIMATED FINANCIAL IMPACT OF THE PROPOSAL/INITIATIVE

    3.1. Heading(s) of the multiannual financial framework and expenditure budget line(s) affected

    3.2. Estimated financial impact of the proposal on appropriations

    3.2.1. Summary of estimated impact on operational appropriations

    3.2.2. Estimated output funded with operational appropriations

    3.2.3. Summary of estimated impact on administrative appropriations

    3.2.4. Compatibility with the current multiannual financial framework

    3.2.5. Third-party contributions

    3.3. Estimated impact on revenue

    LEGISLATIVE FINANCIAL STATEMENT

    1. FRAMEWORK OF THE PROPOSAL/INITIATIVE

    1.1. Title of the proposal/initiative

    Regulation of the European Parliament and of the Council Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and Amending Certain Union Legislative Acts

    1.2. Policy area(s) concerned

    Communications Networks, Content and Technology;

    Internal Market, Industry, Entrepreneurship and SMEs;

    The budgetary impact concerns the new tasks entrusted with the Commission, including the support to the EU AI Board;

    Activity: Shaping Europe’s digital future.

    1.3. The proposal/initiative relates to:

    X a new action

    * a new action following a pilot project/preparatory action (64)

    * the extension of an existing action

    * an action redirected towards a new action

    1.4. Objective(s)

    1.4.1. General objective(s)

    The general objective of the intervention is to ensure the proper functioning of the single market by creating the conditions for the development and use of trustworthy artificial intelligence in the Union.

    1.4.2. Specific objective(s)

    Specific objective nº 1

    To set requirements specific to AI systems and obligations on all value chain participants in order to ensure that AI systems placed on the market and used are safe and respect existing law on fundamental rights and Union values;

    Specific objective nº 2

    To ensure legal certainty to facilitate investment and innovation in AI by making it clear what essential requirements, obligations, as well as conformity and compliance procedures must be followed to place or use an AI system in the Union market;

    Specific objective nº 3

    To enhance governance and effective enforcement of existing law on fundamental rights and safety requirements applicable to AI systems by providing new powers, resources and clear rules for relevant authorities on conformity assessment and ex post monitoring procedures and the division of governance and supervision tasks between national and EU levels;

    Specific objective nº 4

    To facilitate the development of a single market for lawful, safe and trustworthy AI applications and prevent market fragmentation by taking EU action to set minimum requirement for AI systems to be placed and used in the Union market in compliance with existing law on fundamental rights and safety.

    1.4.3. Expected result(s) and impact

    Specify the effects which the proposal/initiative should have on the beneficiaries/groups targeted.

    AI suppliers should benefit from a minimal but clear set of requirements, creating legal certainty and ensuring access to the entire single market.

    AI users should benefit from legal certainty that the high-risk AI systems they buy comply with European laws and values.

    Consumers should benefit by reducing the risk of violations of their safety or fundamental rights.

    1.4.4. Indicators of performance

    Specify the indicators for monitoring implementation of the proposal/initiative.

    Indicator 1

    Number of serious incidents or AI performances which constitute a serious incident or a breach of fundamental rights obligations (semi-annual) by fields of applications and calculated a) in absolute terms, b) as share of applications deployed and c) as share of citizens concerned.

    Indicator 2

    a) Total AI investment in the EU (annual)

    b) Total AI investment by Member State (annual)

    c) Share of companies using AI (annual)

    d) Share of SMEs using AI (annual)

    a) and b) will be calculated based on official sources and benchmarked against private estimates

    c) and d) will be collected by regular company surveys

    1.5. Grounds for the proposal/initiative

    1.5.1. Requirement(s) to be met in the short or long term including a detailed timeline for roll-out of the implementation of the initiative

    The Regulation should be fully applicable one year and a half after its adoption. However, elements of the governance structure should be in place before then. In particular, Member States shall have appointed existing authorities and/or established new authorities performing the tasks set out in the legislation earlier, and the EU AI Board should be set-up and effective. By the time of applicability, the European database of AI systems should be fully operative. In parallel to the adoption process, it is therefore necessary to develop the database, so that its development has come to an end when the regulation enters into force.

    1.5.2. Added value of Union involvement (it may result from different factors, e.g. coordination gains, legal certainty, greater effectiveness or complementarities). For the purposes of this point ‘added value of Union involvement’ is the value resulting from Union intervention which is additional to the value that would have been otherwise created by Member States alone.

    An emerging patchy framework of potentially divergent national rules will hamper the seamless provision of AI systems across the EU and is ineffective in ensuring the safety and protection of fundamental rights and Union values across the different Member States. A common EU legislative action on AI could boost the internal market and has great potential to provide European industry with a competitive edge at the global scene and economies of scale that cannot be achieved by individual Member States alone.

    1.5.3. Lessons learned from similar experiences in the past

    The E-commerce Directive 2000/31/EC provides the core framework for the functioning of the single market and the supervision of digital services and sets a basic structure for a general cooperation mechanism among Member States, covering in principle all requirements applicable to digital services. The evaluation of the Directive pointed to shortcomings in several aspects of this cooperation mechanism, including important procedural aspects such as the lack of clear timeframes for response from Member States coupled with a general lack of responsiveness to requests from their counterparts. This has led over the years to a lack of trust between Member States in addressing concerns about providers offering digital services cross-border. The evaluation of the Directive showed the need to define a differentiated set of rules and requirements at European level. For this reason, the implementation of the specific obligations laid down in this Regulation would require a specific cooperation mechanism at EU level, with a governance structure ensuring coordination of specific responsible bodies at EU level.

    1.5.4. Compatibility with the Multiannual Financial Framework and possible synergies with other appropriate instruments

    The Regulation Laying Down Harmonised Rules on Artificial Intelligence and Amending Certain Union Legislative Acts defines a new common framework of requirements applicable to AI systems, which goes well beyond the framework provided by existing legislation. For this reason, a new national and European regulatory and coordination function needs to be established with this proposal.

    As regards possible synergies with other appropriate instruments, the role of notifying authorities at national level can be performed by national authorities fulfilling similar functions sunder other EU regulations.

    Moreover, by increasing trust in AI and thus encouraging investment in development and adoption of AI, it complements Digital Europe, for which promoting the diffusion of AI is one of five priorities.

    1.5.5. Assessment of the different available financing options, including scope for redeployment

    The staff will be redeployed. The other costs will be supported from the DEP. envelope, given that the objective of this regulation – ensuring trustworthy AI – contributes directly to one key objective of Digital Europe – accelerating AI development and deployment in Europe.

    1.6. Duration and financial impact of the proposal/initiative limited duration

    – in effect from [DD/MM]YYYY to [DD/MM]YYYY

    – Financial impact from YYYY to YYYY for commitment appropriations and from YYYY to YYYY for payment appropriations.

    X unlimited duration

    – Implementation with a start-up period from one/two (tbc) year,

    – followed by full-scale operation.

    1.7. Management mode(s) planned (65)

    X Direct management by the Commission

    –  by its departments, including by its staff in the Union delegations;

    –  by the executive agencies

    Shared management with the Member States

    Indirect management by entrusting budget implementation tasks to:

    – third countries or the bodies they have designated;

    – international organisations and their agencies (to be specified);

    – the EIB and the European Investment Fund;

    – bodies referred to in Articles 70 and 71 of the Financial Regulation;

    – public law bodies;

    – bodies governed by private law with a public service mission to the extent that they provide adequate financial guarantees;

    – bodies governed by the private law of a Member State that are entrusted with the implementation of a public-private partnership and that provide adequate financial guarantees;

    – persons entrusted with the implementation of specific actions in the CFSP pursuant to Title V of the TEU, and identified in the relevant basic act.

    – If more than one management mode is indicated, please provide details in the ‘Comments’ section.

    Comments

    2. MANAGEMENT MEASURES

    2.1. Monitoring and reporting rules

    Specify frequency and conditions.

    The Regulation will be reviewed and evaluated five years from the entry into force of the regulation. The Commission will report on the findings of the evaluation to the European Parliament, the Council and the European Economic and Social Committee.

    2.2. Management and control system(s)

    2.2.1. Justification of the management mode(s), the funding implementation mechanism(s), the payment modalities and the control strategy proposed

    The Regulation establishes a new policy with regard to harmonised rules for the provision of artificial intelligence systems in the internal market while ensuring the respect of safety and fundamental rights. These new rules require a consistency mechanism for the cross-border application of the obligations under this Regulation in the form of a new advisory group coordinating the activities of national authorities.

    In order to face these new tasks, it is necessary to appropriately resource the Commission’s services. The enforcement of the new Regulation is estimated to require 10 FTE à regime (5 FTE for the support to the activities of the Board and 5 FTE for the European Data Protection Supervisor acting as a notifying body for AI systems deployed by a body of the European Union).

    2.2.2. Information concerning the risks identified and the internal control system(s) set up to mitigate them

    In order to ensure that the members of the Board have the possibility to make informed analysis on the basis of factual evidence, it is foreseen that the Board should be supported by the administrative structure of the Commission and that an expert group be created to provide additional expertise where required.

    2.2.3. Estimate and justification of the cost-effectiveness of the controls (ratio of “control costs ÷ value of the related funds managed”), and assessment of the expected levels of risk of error (at payment & at closure)

    For the meeting expenditure, given the low value per transaction (e.g. refunding travel costs for a delegate for a meeting), standard control procedures seem sufficient. Regarding the development of the database, contract attribution has a strong internal control system in place in DG CNECT through centralised procurement activities.

    2.3. Measures to prevent fraud and irregularities

    Specify existing or envisaged prevention and protection measures, e.g. from the Anti-Fraud Strategy.

    The existing fraud prevention measures applicable to the Commission will cover the additional appropriations necessary for this Regulation.

    3. ESTIMATED FINANCIAL IMPACT OF THE PROPOSAL/INITIATIVE

    3.1. Heading(s) of the multiannual financial framework and expenditure budget line(s) affected

    • Existing budget lines

    In order of multiannual financial framework headings and budget lines.

    3.2. Estimated financial impact of the proposal on appropriations

    3.2.1. Summary of estimated impact on expenditure on operational appropriations

    –  The proposal/initiative does not require the use of operational appropriations

    – X The proposal/initiative requires the use of operational appropriations, as explained below:

    3.2.3. Summary of estimated impact on administrative appropriations

    –  The proposal/initiative does not require the use of appropriations of an administrative nature

    – X The proposal/initiative requires the use of appropriations of an administrative nature, as explained below:

    The appropriations required for human resources and other expenditure of an administrative nature will be met by appropriations from the DG that are already assigned to management of the action and/or have been redeployed within the DG, together if necessary with any additional allocation which may be granted to the managing DG under the annual allocation procedure and in the light of budgetary constraints.

    3.2.3.1. Estimated requirements of human resources

    –  The proposal/initiative does not require the use of human resources.

    – X The proposal/initiative requires the use of human resources, as explained below:

    The human resources required will be met by staff from the DG who are already assigned to management of the action and/or have been redeployed within the DG, together if necessary with any additional allocation which may be granted to the managing DG under the annual allocation procedure and in the light of budgetary constraints.

    EDPS is expected to provide half of the resources required.

    Description of tasks to be carried out:

    Officials and temporary staff

    To prepare a total of 13-16 meetings, draft reports, continue policy work, e.g. regarding future amendments of the list of high-risk AI applications, and maintain relations with Member States’ authorities will require four AD FTE and 1 AST FTE.

    For AI systems developed by the EU institutions, the European Data Protection Supervisor is responsible. Based on past experience, it can be estimated that 5 AD FTE are reuqired to fulfill the EDPS responsibilites under the draft legislation.

    External staff

    3.2.4. Compatibility with the current multiannual financial framework

    The proposal/initiative:

    – X can be fully financed through redeployment within the relevant heading of the Multiannual Financial Framework (MFF).

    No reporgramming is needed.

    –  requires use of the unallocated margin under the relevant heading of the MFF and/or use of the special instruments as defined in the MFF Regulation.

    Explain what is required, specifying the headings and budget lines concerned, the corresponding amounts, and the instruments proposed to be used.

    –  requires a revision of the MFF.

    Explain what is required, specifying the headings and budget lines concerned and the corresponding amounts.

    3.2.5. Third-party contributions

    The proposal/initiative:

    – X does not provide for co-financing by third parties

    –  provides for the co-financing by third parties estimated below:

    Appropriations in EUR million (to three decimal places)

    3.3. Estimated impact on revenue

    –  The proposal/initiative has the following financial impact:

    –  The proposal/initiative has the following financial impact:

    –  on other revenue

    –  on other revenue

    – Please indicate, if the revenue is assigned to expenditure lines

    EUR million (to three decimal places)

    For assigned revenue, specify the budget expenditure line(s) affected.

    Other remarks (e.g. method/formula used for calculating the impact on revenue or any other information).

    (1) https://ec.europa.eu/commission/sites/beta-political/files/political-guidelines-next-commission_en.pdf

    (2) European Commission, White Paper on Artificial Intelligence – A European approach to excellence and trust, COM(2020) 65 final, 2020.

    (3) European Council, Special meeting of the European Council (1 and 2 October 2020) – Conclusions, EUCO 13/20, 2020, p. 6.

    (4) European Parliament resolution of 20 October 2020 with recommendations to the Commission on a framework of ethical aspects of artificial intelligence, robotics and related technologies, 2020/2012(INL).

    (5) European Council, European Council meeting (19 October 2017) – Conclusion EUCO 14/17, 2017, p. 8.

    (6) Council of the European Union, Artificial intelligence b) Conclusions on the coordinated plan on artificial intelligence-Adoption 6177/19, 2019.

    (7) European Council, Special meeting of the European Council (1and 2 October 2020) – Conclusions EUCO 13/20, 2020.

    (8) Council of the European Union, Presidency conclusions – The Charter of Fundamental Rights in the context of Artificial Intelligence and Digital Change, 11481/20, 2020.

    (9) European Parliament resolution of 20 October 2020 on a framework of ethical aspects of artificial intelligence, robotics and related technologies, 2020/2012(INL).

    (1)0 European Parliament resolution of 20 October 2020 on a civil liability regime for artificial intelligence, 2020/2014(INL).

    (11) European Parliament resolution of 20 October 2020 on intellectual property rights for the development of artificial intelligence technologies, 2020/2015(INI).

    (12) European Parliament Draft Report, Artificial intelligence in criminal law and its use by the police and judicial authorities in criminal matters, 2020/2016(INI).

    (13) European Parliament Draft Report, Artificial intelligence in education, culture and the audiovisual sector, 2020/2017(INI). In that regard, the Commission has adopted the Digital Education Action Plan 2021-2027: Resetting education and training for the digital age, which foresees the development of ethical guidelines in AI and Data usage in education – Commission Communication COM(2020) 624 final.

    (14) Directive 2013/36/EU of the European Parliament and of the Council of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, amending Directive 2002/87/EC and repealing Directives 2006/48/EC and 2006/49/EC Text with EEA relevance, OJ L 176, 27.6.2013, p. 338–436.

    (15) Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (‘Directive on electronic commerce’), OJ L 178, 17.7.2000, p. 1–16.

    (16) See Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on a Single Market For Digital Services (Digital Services Act) and amending Directive 2000/31/EC COM/2020/825 final.

    (17) Communication from the Commission, Shaping Europe’s Digital Future, COM/2020/67 final.

    (18) 2030 Digital Compass: the European way for the Digital Decade.

    (19) Proposal for a Regulation on European data governance (Data Governance Act) COM/2020/767.

    (20) Directive (EU) 2019/1024 of the European Parliament and of the Council of 20 June 2019 on open data and the re-use of public sector information, PE/28/2019/REV/1, OJ L 172, 26.6.2019, p. 56–83.

    (21) Commission Communication, A European strategy for data COM/2020/66 final.

    (22) See all consultation results here.

    (23) European Commission, Building Trust in Human-Centric Artificial Intelligence, COM(2019) 168.

    (24) HLEG, Ethics Guidelines for Trustworthy AI, 2019.

    (25) HLEG, Assessment List for Trustworthy Artificial Intelligence (ALTAI) for self-assessment, 2020.

    (26) The AI Alliance is a multi-stakeholder forum launched in June 2018, AI Alliance https://ec.europa.eu/digital-single-market/en/european-ai-alliance

    (27) European Commission, Inception Impact Assessment For a Proposal for a legal act of the European Parliament and the Council laying down requirements for Artificial Intelligence.

    (28) For details of all the consultations that have been carried out see Annex 2 of the impact assessment.

    (29) High-Level Expert Group on Artificial Intelligence, Ethics Guidelines for Trustworthy AI, 2019.

    (30) They were also endorsed by the Commission in its 2019 Communication on human-centric approach to AI.

    (31) OJ C […], […], p. […].

    (32) OJ C […], […], p. […].

    (33) European Council, Special meeting of the European Council (1 and 2 October 2020) – Conclusions, EUCO 13/20, 2020, p. 6.

    (34) European Parliament resolution of 20 October 2020 with recommendations to the Commission on a framework of ethical aspects of artificial intelligence, robotics and related technologies, 2020/2012(INL).

    (35) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (OJ L 119, 4.5.2016, p. 1).

    (36) Regulation (EU) 2018/1725 of the European Parliament and of the Council of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement of such data, and repealing Regulation (EC) No 45/2001 and Decision No 1247/2002/EC (OJ L 295, 21.11.2018, p. 39)

    (37) Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA (Law Enforcement Directive) (OJ L 119, 4.5.2016, p. 89).

    (38) Council Framework Decision 2002/584/JHA of 13 June 2002 on the European arrest warrant and the surrender procedures between Member States (OJ L 190, 18.7.2002, p. 1).

    (39) Regulation (EC) No 300/2008 of the European Parliament and of the Council of 11 March 2008 on common rules in the field of civil aviation security and repealing Regulation (EC) No 2320/2002 (OJ L 97, 9.4.2008, p. 72).

    (40) Regulation (EU) No 167/2013 of the European Parliament and of the Council of 5 February 2013 on the approval and market surveillance of agricultural and forestry vehicles (OJ L 60, 2.3.2013, p. 1).

    (41) Regulation (EU) No 168/2013 of the European Parliament and of the Council of 15 January 2013 on the approval and market surveillance of two- or three-wheel vehicles and quadricycles (OJ L 60, 2.3.2013, p. 52).

    (42) Directive 2014/90/EU of the European Parliament and of the Council of 23 July 2014 on marine equipment and repealing Council Directive 96/98/EC (OJ L 257, 28.8.2014, p. 146).

    (43) Directive (EU) 2016/797 of the European Parliament and of the Council of 11 May 2016 on the interoperability of the rail system within the European Union (OJ L 138, 26.5.2016, p. 44).

    (44) Regulation (EU) 2018/858 of the European Parliament and of the Council of 30 May 2018 on the approval and market surveillance of motor vehicles and their trailers, and of systems, components and separate technical units intended for such vehicles, amending Regulations (EC) No 715/2007 and (EC) No 595/2009 and repealing Directive 2007/46/EC (OJ L 151, 14.6.2018, p. 1).

    (45) Regulation (EU) 2018/1139 of the European Parliament and of the Council of 4 July 2018 on common rules in the field of civil aviation and establishing a European Union Aviation Safety Agency, and amending Regulations (EC) nº 2111/2005, (EC) nº 1008/2008, (EU) nº 996/2010, (EU) nº 376/2014 and Directives 2014/30/EU and 2014/53/EU of the European Parliament and of the Council, and repealing Regulations (EC) nº 552/2004 and (EC) nº 216/2008 of the European Parliament and of the Council and Council Regulation (EEC) nº 3922/91 (OJ L 212, 22.8.2018, p. 1).

    (46) Regulation (EU) 2019/2144 of the European Parliament and of the Council of 27 November 2019 on type-approval requirements for motor vehicles and their trailers, and systems, components and separate technical units intended for such vehicles, as regards their general safety and the protection of vehicle occupants and vulnerable road users, amending Regulation (EU) 2018/858 of the European Parliament and of the Council and repealing Regulations (EC) nº 78/2009, (EC) nº 79/2009 and (EC) nº 661/2009 of the European Parliament and of the Council and Commission Regulations (EC) nº 631/2009, (EU) nº 406/2010, (EU) nº 672/2010, (EU) nº 1003/2010, (EU) nº 1005/2010, (EU) nº 1008/2010, (EU) nº 1009/2010, (EU) nº 19/2011, (EU) nº 109/2011, (EU) nº 458/2011, (EU) nº 65/2012, (EU) nº 130/2012, (EU) nº 347/2012, (EU) nº 351/2012, (EU) nº 1230/2012 and (EU) 2015/166 (OJ L 325, 16.12.2019, p. 1).

    (47) Regulation (EU) 2017/745 of the European Parliament and of the Council of 5 April 2017 on medical devices, amending Directive 2001/83/EC, Regulation (EC) nº 178/2002 and Regulation (EC) nº 1223/2009 and repealing Council Directives 90/385/EEC and 93/42/EEC (OJ L 117, 5.5.2017, p. 1).

    (48) Regulation (EU) 2017/746 of the European Parliament and of the Council of 5 April 2017 on in vitro diagnostic medical devices and repealing Directive 98/79/EC and Commission Decision 2010/227/EU (OJ L 117, 5.5.2017, p. 176).

    (49) Directive 2013/32/EU of the European Parliament and of the Council of 26 June 2013 on common procedures for granting and withdrawing international protection (OJ L 180, 29.6.2013, p. 60).

    (50) Regulation (EC) nº 810/2009 of the European Parliament and of the Council of 13 July 2009 establishing a Community Code on Visas (Visa Code) (OJ L 243, 15.9.2009, p. 1).

    (51) Regulation (EC) nº 765/2008 of the European Parliament and of the Council of 9 July 2008 setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) nº 339/93 (OJ L 218, 13.8.2008, p. 30).

    (52) Decision nº 768/2008/EC of the European Parliament and of the Council of 9 July 2008 on a common framework for the marketing of products, and repealing Council Decision 93/465/EEC (OJ L 218, 13.8.2008, p. 82).

    (53) Regulation (EU) 2019/1020 of the European Parliament and of the Council of 20 June 2019 on market surveillance and compliance of products and amending Directive 2004/42/EC and Regulations (EC) nº 765/2008 and (EU) nº 305/2011 (Text with EEA relevance) (OJ L 169, 25.6.2019, p. 1–44).

    (54) Regulation (EU) nº 1025/2012 of the European Parliament and of the Council of 25 October 2012 on European standardisation, amending Council Directives 89/686/EEC and 93/15/EEC and Directives 94/9/EC, 94/25/EC, 95/16/EC, 97/23/EC, 98/34/EC, 2004/22/EC, 2007/23/EC, 2009/23/EC and 2009/105/EC of the European Parliament and of the Council and repealing Council Decision 87/95/EEC and Decision nº 1673/2006/EC of the European Parliament and of the Council (OJ L 316, 14.11.2012, p. 12).

    (55) Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (OJ L 119, 4.5.2016, p. 1).

    (56) Directive 2013/36/EU of the European Parliament and of the Council of 26 June 2013 on access to the activity of credit institutions and the prudential supervision of credit institutions and investment firms, amending Directive 2002/87/EC and repealing Directives 2006/48/EC and 2006/49/EC (OJ L 176, 27.6.2013, p. 338).

    (57) Directive 2001/95/EC of the European Parliament and of the Council of 3 December 2001 on general product safety (OJ L 11, 15.1.2002, p. 4).

    (58) OJ L 123, 12.5.2016, p. 1.

    (59) Regulation (EU) nº 182/2011 of the European Parliament and of the Council of 16 February 2011 laying down the rules and general principles concerning mechanisms for control by the Member States of the Commission’s exercise of implementing powers (OJ L 55, 28.2.2011, p.13).

    (60) Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (‘Directive on electronic commerce’) (OJ L 178, 17.7.2000, p. 1).

    (61) Commission Recommendation of 6 May 2003 concerning the definition of micro, small and medium-sized enterprises (OJ L 124, 20.5.2003, p. 36).

    (62) Council Framework Decision 2002/584/JHA of 13 June 2002 on the European arrest warrant and the surrender procedures between Member States (OJ L 190, 18.7.2002, p. 1).

    (63) Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (OJ L 151, 7.6.2019, p. 1).

    (64) As referred to in Article 54(2)(a) or (b) of the Financial Regulation

    (65) Details of management modes and references to the Financial Regulation may be found on the BudgWeb site: http://www.cc.cec/budg/man/budgmanag/budgmanag_en.html

    (66) Diff. = Differentiated appropriations / Non-diff. = Non-differentiated appropriations.

    (67) EFTA: European Free Trade Association.

    (68) Candidate countries and, where applicable, potential candidate countries from the Western Balkans.

    (69) Indicative and dependent on budget availability.

    (70) According to the official budget nomenclature.

    (71) Technical and/or administrative assistance and expenditure in support of the implementation of EU programmes and/or actions (former ‘BA’ lines), indirect research, direct research.

    (72) All figures in this column are indicative and subject to the continuation of the programmes and availability of appropriations

    (73) All figures in this column are indicative and subject to the continuation of the programmes and availability of appropriations

    (74) As described in point 1.4.2. ‘Specific objective(s)…’

    (75) All figures in this column are indicative and subject to the continuation of the programmes and availability of appropriations.

    (76) Technical and/or administrative assistance and expenditure in support of the implementation of EU programmes and/or actions (former ‘BA’ lines), indirect research, direct research.

    (77) All figures in this column are indicative and subject to the continuation of the programmes and availability of appropriations.

    (78) AC = Contract Staff; AL = Local Staff; END = Seconded National Expert; INT = agency staff; JPD = Junior Professionals in Delegations.

    (79) Sub-ceiling for external staff covered by operational appropriations (former ‘BA’ lines).

    (80) Year N is the year in which implementation of the proposal/initiative starts. Please replace “N” by the expected first year of implementation (for instance: 2021). The same for the following years.

    (81) As regards traditional own resources (customs duties, sugar levies), the amounts indicated must be net amounts, i.e. gross amounts after deduction of 20 % for collection costs.

    21Jun/21

    Decreto nº 59.767, de 15 de setembro de 2020, Regulamenta a aplicação da Lei Federal nº 13.709, de 14 de agosto de 2018

    Decreto nº 59.767, de 15 de setembro de 2020, Regulamenta a aplicação da Lei Federal nº 13.709, de 14 de agosto de 2018 – Lei de Proteção de Dados Pessoais (LGPD) – no âmbito da Administração Municipal direta e indireta.

    BRUNO COVAS, Prefeito do Município de São Paulo, no uso das atribuições que lhe são conferidas por lei,

    D E C R E T A:

    CAPÍTULO I. DAS DISPOSIÇÕES PRELIMINARES

    Artigo 1º

    Este decreto regulamenta a Lei Federal nº 13.709, de 14 de agosto de 2018, Lei de Proteção de Dados Pessoais (LGPD), no âmbito do Poder Executivo Municipal, estabelecendo competências, procedimentos e providências correlatas a serem observados por seus órgãos e entidades, visando garantir a proteção de dados pessoais.

    Artigo 2º

    Para os fins deste decreto, considera-se:

    I. dado pessoal: informação relacionada a pessoa natural identificada ou identificável;

    II. dado pessoal sensível: dado pessoal sobre origem racial ou étnica, convicção religiosa, opinião política, filiação a sindicato ou a organização de caráter religioso, filosófico ou político, dado referente à saúde ou à vida sexual, dado genético ou biométrico, quando vinculado a uma pessoa natural;

    III. dado anonimizado: dado relativo a titular que não possa ser identificado, considerando a utilização de meios técnicos razoáveis e disponíveis na ocasião de seu tratamento;

    IV. banco de dados: conjunto estruturado de dados pessoais, estabelecido em um ou em vários locais em suporte eletrônico ou físico;

    V. titular: pessoa natural a quem se referem os dados pessoais que são objeto de tratamento;

    VI. controlador: pessoal natural ou jurídica, de direito público ou privado, a quem competem as decisões referentes ao tratamento de dados pessoais;

    VII. operador: pessoa natural ou jurídica, de direito público ou privado, que realiza o tratamento de dados pessoais em nome do controlador;

    VIII. encarregado: pessoa indicada pelo controlador e operador como canal de comunicação entre o controlador, os titulares dos dados e a Autoridade Nacional de Proteção de Dados (ANPD);

    IX. agentes de tratamento: o controlador e o operador;

    X. tratamento: toda operação realizada com dados pessoais, como as que se referem a coleta, produção, recepção, classificação, utilização, acesso, reprodução, transmissão, distribuição, processamento, arquivamento, armazenamento, eliminação, avaliação ou controle da informação, modificação, comunicação, transferência, difusão ou extração;

    X.- anonimização: utilização de meios técnicos razoáveis e disponíveis no momento do tratamento, por meio dos quais um dado perde a possibilidade de associação, direta ou indireta, a um indivíduo;

    XII. consentimento: manifestação livre, informada e inequívoca pela qual o titular dos dados concorda com o tratamento de seus dados pessoais para uma finalidade determinada;

    XIII. plano de adequação: conjunto das regras de boas práticas e de governança de dados pessoais que estabeleçam as condições de organização, o regime de funcionamento, os procedimentos, as normas de segurança, os padrões técnicos, as obrigações específicas para os diversos agentes envolvidos no tratamento, as ações educativas, os mecanismos internos de supervisão e de mitigação de riscos, o plano de respostas a incidentes de segurança e outros aspectos relacionados ao tratamento de dados pessoais.

    Artigo 3º

    As atividades de tratamento de dados pessoais pelos órgãos e entidades municipais deverão observar a boa-fé e os seguintes princípios:

    I. finalidade: realização do tratamento para propósitos legítimos, específicos, explícitos e informados ao titular, sem possibilidade de tratamento posterior de forma incompatível com essas finalidades;

    II. adequação: compatibilidade do tratamento com as finalidades informadas ao titular, de acordo com o contexto do tratamento;

    III. necessidade: limitação do tratamento ao mínimo necessário para a realização de suas finalidades, com abrangência dos dados pertinentes, proporcionais e não excessivos em relação às finalidades do tratamento de dados;

    IV. livre acesso: garantia, aos titulares, de consulta facilitada e gratuita sobre a forma e a duração do tratamento, bem como sobre a integralidade de seus dados pessoais;

    V. qualidade dos dados: garantia, aos titulares, de exatidão, clareza, relevância e atualização dos dados, de acordo com a necessidade e para o cumprimento da finalidade de seu tratamento;

    VI. transparência: garantia aos titulares, de informações claras, precisas e facilmente acessíveis sobre a realização do tratamento e os respectivos agentes de tratamento, observados os segredos comercial e industrial;

    VII. segurança: utilização de medidas técnicas e administrativas aptas a proteger os dados pessoais de acessos não autorizados e de situações acidentais ou ilícitas de destruição, perda, alteração, comunicação ou difusão;

    VIII. prevenção: adoção de medidas para prevenir a ocorrência de dados em virtude do tratamento de dados pessoais;

    IX. não discriminação: impossibilidade de realização do tratamento para fins discriminatórios ilícitos ou abusivos;

    X. responsabilização e prestação de contas: demonstração, pelo agente, da adoção de medidas eficazes e capazes de comprovar a observância e o cumprimento das normas de proteção de dados pessoais e, inclusive, da eficácia dessas medidas.

    CAPÍTULO II. DAS RESPONSABILIDADES

    SEÇÃO I. DAS RESPONSABILIDADES NA ADMINISTRAÇÃO PÚBLICA MUNICIPAL DIRETA

    Artigo 4º

    O Poder Executivo Municipal, por meio de suas Secretarias e Subprefeituras, nos termos da Lei Federal nº 13.709, de 2018, deve realizar e manter continuamente atualizados:

    I. o mapeamento dos dados pessoais existentes e dos fluxos de dados pessoais em suas unidades;

    II. a análise de risco;

    III. o plano de adequação, observadas as exigências do Artigo 15 deste decreto;

    IV. o relatório de impacto à proteção de dados pessoais, quando solicitado.

    Parágrafo único. Para fins do inciso III do “caput” deste artigo, as Secretarias e Subprefeituras devem observar as diretrizes editadas pelo Controlador Geral do Município, após deliberação favorável da Comissão Municipal de Acesso à Informação (CMAI).

    Artigo 5º

    Fica designado o Controlador Geral do Município como o encarregado da proteção de dados pessoais, para os fins do Artigo 41 da Lei Federal nº 13.709, de 2018.

    Parágrafo único. A identidade e as informações de contato do encarregado devem ser divulgadas publicamente, de forma clara e objetiva, no Portal da Transparência, em seção específica sobre tratamento de dados pessoais.

    Artigo 6º

    São atribuições do encarregado da proteção de dados pessoais:

    I. aceitar reclamações e comunicações dos titulares, prestar esclarecimentos e adotar providências;

    II. receber comunicações da autoridade nacional e adotar providências;

    III. orientar os funcionários e os contratados da Administração Pública Direta a respeito das práticas a serem tomadas em relação à proteção de dados pessoais;

    IV. editar diretrizes para a elaboração dos planos de adequação, conforme Artigo 4º, inciso III deste decreto;

    V. determinar a órgãos da Prefeitura a realização de estudos técnicos para elaboração das diretrizes previstas no inciso IV deste artigo;

    VI. submeter à Comissão Municipal de Acesso à Informação (CMAI), sempre que julgar necessário, matérias atinentes a este decreto;

    VII. decidir sobre as sugestões formuladas pela autoridade nacional a respeito da adoção de padrões e de boas práticas para o tratamento de dados pessoais, nos termos do Artigo 32 da Lei Federal nº 13.709, de 2018;

    VIII. providenciar a publicação dos relatórios de impacto à proteção de dados pessoais previstos pelo Artigo 32 da Lei Federal nº 13.709, de 2018;

    IX. recomendar a elaboração de planos de adequação relativos à proteção de dados pessoais ao encarregado das entidades integrantes da Administração indireta, informando eventual ausência à Secretaria responsável pelo controle da entidade, para as providências pertinentes;

    X. providenciar, em caso de recebimento de informe da autoridade nacional com medidas cabíveis para fazer cessar uma afirmada violação à Lei Federal nº 13.709, de 2018, nos termos do Artigo 31 daquela lei, o encaminhamento ao órgão municipal responsável pelo tratamento de dados pessoais, fixando prazo para atendimento à solicitação ou apresentação das justificativas pertinentes;

    XI. avaliar as justificativas apresentadas nos termos do inciso X deste artigo, para o fim de:

    a) caso avalie ter havido a violação, determinar a adoção das medidas solicitadas pela autoridade nacional;

    b) caso avalie não ter havido a violação, apresentar as justificativas pertinentes à autoridade nacional, segundo o procedimento cabível;

    XII. requisitar das Secretarias e Subprefeituras responsáveis as informações pertinentes, para sua compilação em um único relatório, caso solicitada pela autoridade nacional a publicação de relatórios de impacto à proteção de dados pessoais, nos termos do artigo 32 da Lei Federal nº 13.709, de 2018;

    XIII. executar as demais atribuições estabelecidas em normas complementares.

    § 1º O Controlador Geral do Município terá os recursos operacionais e financeiros necessários ao desempenho dessas funções e à manutenção dos seus conhecimentos, bem como acesso motivado a todas as operações de tratamento.

    § 2º Na qualidade de encarregado da proteção de dados, o Controlador Geral do Município está vinculado à obrigação de sigilo ou de confidencialidade no exercício das suas funções, em conformidade com a Lei Federal nº 13.709, de 2018, com a Lei Federal nº 12.527, de 18 de novembro de 2011, e com o Decreto nº 53.623, de 12 de dezembro de 2012.

    Artigo 7º

    Cabe aos Chefes de Gabinete das Secretarias e Subprefeituras:

    I. dar cumprimento, no âmbito dos respectivos órgãos, às ordens e recomendações do Controlador Geral do Município na qualidade de encarregado de proteção de dados pessoais;

    II. atender às solicitações encaminhadas pelo Controlador Geral do Município no sentido de fazer cessar uma afirmada violação à Lei Federal nº 13.709, de 2018, ou apresentar as justificativas pertinentes;

    III. encaminhar ao encarregado, no prazo por este fixado:

    a) informações sobre o tratamento de dados pessoais que venham a ser solicitadas pela autoridade nacional, nos termos do Artigo 29 da Lei Federal nº 13.709, de 2018;

    b) relatórios de impacto à proteção de dados pessoais, ou informações necessárias à elaboração de tais relatórios, nos termos do Artigo 32 da Lei Federal nº 13.709, de 2018.

    IV- assegurar que o Controlador Geral do Município seja informado, de forma adequada e em tempo útil, de todas as questões relacionadas com a proteção de dados pessoais no âmbito do Poder Executivo municipal.

    Artigo 8º

    Cabe à Secretaria Municipal de Inovação e Tecnologia (SMIT):

    I. oferecer os subsídios técnicos necessários à edição das diretrizes pelo Controlador Geral do Município para a elaboração dos planos de adequação;

    II. orientar, sob o ponto de vista tecnológico, as Secretarias e as Subprefeituras na implantação dos respectivos planos de adequação.

    Artigo 9º

    Cabe à Comissão Municipal de Acesso à Informação (CMAI), por solicitação do Controlador Geral do Município:

    I. deliberar sobre proposta de diretrizes para elaboração dos planos de adequação, nos termos do Artigo 4º, parágrafo único deste decreto;

    II. deliberar sobre qualquer assunto relacionado à aplicação da Lei Federal nº 13.709, de 2018, e do presente decreto pelos órgãos do Poder Executivo.

    SEÇÃO II. DAS RESPONSABILIDADES NA ADMINISTRAÇÃO PÚBLICA MUNICIPAL INDIRETA

    Artigo 10.

    Cabe às entidades da Administração indireta observar, no âmbito da sua respectiva autonomia, as exigências da Lei Federal nº 13.709, de 2018, observada, no mínimo:

    I. a designação de um encarregado de proteção de dados pessoais, nos termos do Artigo 41 da Lei Federal nº 13.709, de 2018, cuja identidade e informações de contato devem ser divulgadas publicamente, de forma clara e objetiva;

    II. a elaboração e manutenção de um plano de adequação, nos termos do Artigo 4º, inc. III, e parágrafo único deste decreto.

    CAPÍTULO III. DO TRATAMENTO DE DADOS PESSOAIS PELA ADMINISTRAÇÃO PÚBLICA MUNICIPAL

    Artigo 11.

    O tratamento de dados pessoais pelos órgãos e entidades da Administração Pública Municipal deve:

    I. objetivar o exercício de suas competências legais ou o cumprimento das atribuições legais do serviço público, para o atendimento de sua finalidade pública e a persecução do interesse público;

    II. observar o dever de conferir publicidade às hipóteses de sua realização, com o fornecimento de informações claras e atualizadas sobre a previsão legal, finalidade, os procedimentos e as práticas utilizadas para a sua execução.

    Artigo 12.

    Os órgãos e as entidades da Administração Pública Municipal podem efetuar o uso compartilhado de dados pessoais com outros órgãos e entidades públicas para atender a finalidades específicas de execução de políticas públicas, no âmbito de suas atribuições legais, respeitados os princípios de proteção de dados pessoais elencados no Artigo 6º da Lei Federal nº 13.709, de 2018.

    Artigo 13.

    É vedado aos órgãos e entidades da Administração Pública Municipal transferir a entidades privadas dados pessoais constantes de bases de dados a que tenha acesso, exceto:

    I. em casos de execução descentralizada de atividade pública que exija a transferência, exclusivamente para esse fim específico e determinado, observado o disposto na Lei Federal nº 12.527, de 2011;

    II. nos casos em que os dados forem acessíveis publicamente, observadas as disposições da Lei Federal nº 13.709, de 2018;

    III. quando houver previsão legal ou a transferência for respaldada, por meio de cláusula específica, em contratos, convênios ou instrumentos congêneres, cuja celebração deverá ser informada pelo responsável ao Controlador Geral do Município para comunicação à autoridade nacional de proteção de dados;

    IV. na hipótese de a transferência dos dados objetivar exclusivamente a prevenção de fraudes e irregularidades, ou proteger e resguardar a segurança e a integridade do titular dos dados, desde que vedado o tratamento para outras finalidades.

    Parágrafo único. Em quaisquer das hipóteses previstas neste artigo:

    I. a transferência de dados dependerá de autorização específica conferida pelo órgão municipal à entidade privada;

    II. as entidades privadas deverão assegurar que não haverá comprometimento do nível de proteção dos dados garantido pelo órgão ou entidade municipal.

    Artigo 14.

    Os órgãos e entidades da Administração Pública Municipal podem efetuar a comunicação ou o uso compartilhado de dados pessoais a pessoa de direito privado, desde que:

    I. o Controlador Geral do Município informe a Autoridade Nacional de Proteção de Dados, na forma do regulamento federal correspondente;

    II. seja obtido o consentimento do titular, salvo:

    a) nas hipóteses de dispensa de consentimento previstas na Lei Federal nº 13.709, de 2018;

    b) nos casos de uso compartilhado de dados, em que será dada publicidade nos termos do Artigo 11, inciso II deste decreto;

    c) nas hipóteses do Artigo 13 deste decreto.

    Parágrafo único. Sempre que necessário o consentimento, a comunicação dos dados pessoais a entidades privadas e o uso compartilhado entre estas e o órgãos e entidades municipais poderão ocorrer somente nos termos e para as finalidades indicadas no ato do consentimento.

    Artigo 15.

    Os planos de adequação devem observar, no mínimo, o seguinte:

    I. publicidade das informações relativas ao tratamento de dados em veículos de fácil acesso, preferencialmente nas páginas dos órgãos e entidades na internet, bem como no Portal da Transparência, em seção específica a que se refere o parágrafo único do Artigo 5º deste decreto;

    II. atendimento das exigências que vierem a ser estabelecidas pela Autoridade Nacional de Proteção de Dados, nos termos do Artigo 23, § 1º, e do Artigo 27, parágrafo único da Lei Federal nº 13.709, de 2018;

    III. manutenção de dados em formato interoperável e estruturado para o uso compartilhado de dados com vistas à execução de políticas públicas, à prestação de serviços públicos, à descentralização da atividade pública e à disseminação e ao acesso das informações pelo público em geral.

    Artigo 16.

    As entidades integrantes da Administração Municipal indireta que atuarem em regime de concorrência, sujeitas ao disposto no Artigo 173 da Constituição Federal, deverão observar o regime relativo às pessoas jurídicas de direito privado particulares, exceto quando estiverem operacionalizando políticas públicas e no âmbito da execução delas, nos termos do Artigo 24 da Lei nº 13.709, de 2018.

    CAPÍTULO IV. DAS DISPOSIÇÕES FINAIS

    Artigo 17.

    As Secretarias e Subprefeituras deverão comprovar ao Controlador Geral do Município estar em conformidade com o disposto no Artigo 4º deste decreto no prazo de 180 (cento e oitenta dias) dias a contar da sua publicação.

    Artigo 18.

    As entidades da Administração indireta deverão apresentar ao Controlador Geral do Município, no prazo de 90 (noventa) dias, o respectivo plano de adequação às exigências da Lei Federal nº 13.709, de 2018.

    Artigo 19.

    O artigo 53 do Decreto Municipal nº 53.623, de 2012, passa a vigorar com a seguinte alteração:

    “Artigo 53. ……………………………………………..

    ……………………………………………………………….

    VII – deliberar sobre qualquer assunto relacionado à aplicação da Lei Federal nº 13.709, de 14 de agosto de 2018, e do presente decreto pelos órgãos do Poder Executivo.

    ……………………………………………………………….

    § 3º As questões referentes ao inciso VII do “caput” deste artigo entrarão em pauta a partir de solicitação do Controlador Geral do Município, que poderá convocar sessão extraordinária para a referida deliberação.”

    Artigo 20.

    Este decreto entrará em vigor na data de sua publicação.

    PREFEITURA DO MUNICÍPIO DE SÃO PAULO, aos 15 de setembro de 2020, 467º da fundação de São Paulo.

    BRUNO COVAS, PREFEITO

    JUAN MANUEL QUIRÓS SADIR, Secretário Municipal de Inovação e Tecnologia

    JOÃO MANOEL SCUDELER DE BARROS, Controlador Geral Do Município

    ORLANDO LINDÓRIO DE FARIA, Secretário Municipal da Casa Civil

    MARINA MAGRO BERINGHS MARTINEZ, Respondendo pelo cargo de Secretária Municipal de Justiça

    RUBENS NAMAN RIZEK JUNIOR, Secretário de Governo Municipal

    Publicado na Casa Civil, em 15 de setembro de 2020.

    21Jun/21

    Decreto nº 59.755, de 14 de setembro de 2020

    Decreto nº 59.755, de 14 de setembro de 2020. Institui o regime permanente de teletrabalho nos órgaos de administração direita, autarquias e fundações do Municipio de São Paulo.

    BRUNO COVAS, Prefeito do Município de São Paulo, no uso de suas atribuições que lhe são conferidas por lei,

    CONSIDERANDO que a experiência global aponta para o caminho irreversível de teletrabalho;

    CONSIDERANDO que, para o enfrentamento da pandemia decorrente da COVID-19, foi declarada situação de emergência no Município de São Paulo, pelo Decreto nº 59.283, de 16 de março de 2020, bem como autorizada a instituição do regime de teletrabalho no decorrer desse período;

    CONSIDERANDO que da experiência com a adoção do regime de teletrabalho no período de emergência advieram resultados satisfatórios para a Administração, como o aumento da produtividade e a melhoria na prestação de serviços;

    CONSIDERANDO os ganhos ambientais decorrentes da redução da circulação de veículos de passeio, uso de transporte coletivo, do consumo de energia elétrica, água, esgoto, papel e outros materiais e serviços;

    CONSIDERANDO a significativa redução de despesas de custeio estimadas com a implantação e adesão ao regime de teletrabalho;

    CONSIDERANDO, por fim, que serão mantidas as regras de teletrabalho no contexto do enfrentamento da pandemia da COVID-19, em especial as de proteção ao grupo de risco, enquanto perdurar a emergência de saúde pública,

    D E C R E T A:

    Artigo 1º

    Fica instituído o regime permanente de teletrabalho nos órgãos da administração direta, autarquias e fundações do Município de São Paulo.

    Parágrafo único. Poderão se submeter ao regime permanente de teletrabalho ora instituído os servidores e empregados públicos municipais efetivos vinculados aos órgãos e entidades referidos no “caput” deste decreto.

    Artigo 2º

    Considera-se regime de teletrabalho, para os fins deste decreto, aquele em que os servidores ou empregados públicos cumprem suas jornadas em local diverso das instalações da unidade de trabalho, com comparecimento presencial obrigatório na frequência mínima definida pela autoridade competente.

    § 1º O regime de teletrabalho definido no “caput” deste artigo caracteriza-se pela execução das tarefas habituais e rotineiras desenvolvidas pelo servidor ou empregado público, execução de projetos ou de tarefas específicas, compatíveis com as atribuições do cargo ou emprego público, da sua unidade de trabalho e com o regime não presencial, mediante o uso de tecnologias de informação e comunicação.

    § 2º A execução de ações que, por sua própria natureza, constituam trabalho externo não caracteriza, por si, atividade em regime de teletrabalho.

    Artigo 3º

    Sem prejuízo de outros requisitos e condições fixados no exercício das competências definidas neste decreto, a implementação do regime de teletrabalho pressupõe:

    I. a fixação de metas para a realização dos trabalhos;

    II.  que o desempenho possa ser objetivamente mensurado;

    III. o não prejuízo ao regular funcionamento da unidade de trabalho e ao atendimento ao público;

    IV. o registro eletrônico de assiduidade e das atividades desenvolvidas para fins de apuração objetiva do desempenho;

    V. o comparecimento periódico à sua unidade de trabalho, nos termos das escalas previstas no artigo 10 deste decreto, e sempre que houver convocação.

    § 1º A fixação e os critérios de mensuração objetiva de desempenho deverão ser reavaliados periodicamente, de forma a garantir o contínuo incremento da produtividade e a adequação do regime de teletrabalho.

    § 2º É preferível o regime de teletrabalho ao afastamento para participação em congressos, cursos, certames desportivos, culturais ou científicos, nas situações previstas na legislação vigente, hipótese em que o inciso V do “caput” deste artigo, bem como outras condições previstas neste decreto ou nos demais atos normativos a serem expedidos poderão ser afastadas ou mitigadas, excepcionalmente, por decisão do Secretário, Subprefeito ou autoridade equiparada, na administração direta, ou do dirigente da autarquia e fundação.

    § 3º Sem prejuízo dos dias de comparecimento periódico, o servidor ou empregado público deverá estar apto atender à convocação para comparecimento presencial, no dia e horário fixados pela chefia imediata ou mediata, desde que avisado com, no mínimo, 4 horas de antecedência.

    Artigo 4º

    Compete à Secretaria Municipal de Gestão:

    I. fixar, por portaria, as diretrizes e normas gerais, incluindo os requisitos mínimos, condições e restrições à adesão pelo servidor ou empregado público, bem como condutas vedadas no regime de teletrabalho, sem prejuízo da previsão de outras restrições ou vedações a serem fixadas pelos Secretários, Subprefeitos e autoridades equiparadas, na administração direta, e pelos dirigentes das autarquias e fundações, em função das especificidades de cada órgão ou entidade;

    II. supervisionar a implantação do regime de teletrabalho permanente nos órgãos e entidades;

    III. validar e acompanhar as metas de redução de despesas projetadas com a implementação do regime de teletrabalho para os órgãos e entidades;

    IV. definir diretrizes e orientar a transparência das ações do regime de teletrabalho, a serem observadas pelos órgãos e entidades;

    V. orientar os órgãos e entidades e dirimir os casos omissos.

    Parágrafo único. Para o desempenho das competências a que se referem os incisos do “caput” deste artigo, a Secretaria Municipal de Gestão poderá constituir grupo de trabalho com representantes de outros órgãos.

    Artigo 5º

    À Secretaria Municipal de Inovação e Tecnologia caberá a proposição de estratégias inovadoras e soluções tecnológicas para o regime permanente de teletrabalho, bem como a coordenação e orientação para garantia da infraestrutura tecnológica necessária à operacionalização do teletrabalho, em especial ferramenta de apoio para execução, monitoramento e avaliação do desempenho individual e da unidade.

    Artigo 6º

    Os Secretários, Subprefeitos e autoridades equiparadas, na administração direta, e os dirigentes das autarquias e fundações deverão, no âmbito de seus respectivos órgãos ou entidades, adotar, prioritariamente, o regime de teletrabalho para as atividades que, por sua natureza ou meio de produção, sejam passíveis de realização à distância.

    § 1º Em decorrência do disposto no “caput” deste artigo, os órgãos e entidades deverão, observadas as normas constantes deste decreto e as regras e diretrizes gerais fixadas em portaria da Secretaria Municipal de Gestão, adotar, como regra, o regime de teletrabalho para os servidores e empregados públicos cujas atividades ou unidades de trabalho sejam elegíveis à execução do trabalho sob esse regime.

    § 2º Na impossibilidade ou havendo razões para, de forma excepcional, não se adotar o regime de teletrabalho para os servidores e empregados públicos de que trata o §1º deste artigo, o órgão ou entidade deverá encaminhar sua posição, com os devidos argumentos e justificativas, para avaliação da Secretaria Municipal de Gestão.

    § 3º Não concordando com os argumentos e justificativas apresentadas pelo órgão ou entidade, a Secretaria Municipal de Gestão deverá submeter a questão ao crivo do Secretário de Governo Municipal, que deliberará quanto à adoção, no caso em exame, do regime de teletrabalho.

    Artigo 7º

    A implementação do regime permanente de teletrabalho nos órgãos e entidades dependerá da publicação de portaria do Secretário, Subprefeito ou autoridade equiparada, na administração direta, e ato normativo específico do dirigente da autarquia ou fundação, no âmbito de seu respectivo órgão ou entidade, dispondo sobre:

    I. a fixação de regras específicas aplicáveis ao regime de teletrabalho nas unidades do órgão ou entidade, respeitadas as normas constantes deste decreto e as regras e diretrizes gerais fixadas em portaria da Secretaria Municipal de Gestão;

    II. a definição das atividades e unidades elegíveis à realização do teletrabalho;

    III. a aprovação das metas da unidade elegível para o teletrabalho;

    IV. a orientação para definição dos planos de trabalho e dos instrumentos de acompanhamento;

    V. a diretrizes dos perfis elegíveis para ingresso no regime de teletrabalho;

    VI. a fixação da escala ou das alternativas de escala dos servidores ou empregados públicos, dentre as hipóteses previstas no artigo 10 deste decreto, bem como estabelecer requisitos ou condicionantes distintas para a adesão a cada uma das escalas semanais de teletrabalho.

    Parágrafo único. A unidade cujo cargo de direção e chefia esteja vago, mesmo que transitoriamente:

    I. não poderá ser indicada para adesão ao regime de teletrabalho;

    II. se já aderente ao regime, terá o teletrabalho suspenso enquanto perdurar a vacância.

    Artigo 8º

    Caberá à chefia imediata, observadas as normas deste decreto, as regras e diretrizes fixadas na portaria da Secretaria Municipal de Gestão e na portaria expedida pelo titular do órgão ou entidade:

    I. indicar os servidores ou empregados públicos elegíveis para adesão ao regime de teletrabalho;

    II. elaborar e pactuar os planos de trabalho com os servidores ou empregados públicos;

    III. acompanhar o andamento das atividades no regime de teletrabalho;

    IV. definir a escala dos servidores ou empregados públicos, observado o disposto no artigo 10 deste decreto e eventuais definições e restrições contidas na portaria do órgão ou entidade de trabalho, expedida com fundamento no artigo 7º, inciso VI, deste decreto;

    V. convocar os servidores ou empregados públicos para atividades presenciais, sempre que necessário;

    VI. oferecer as condições e buscar soluções para a viabilização e melhoria constante do regime permanente de teletrabalho, com o apoio da chefia mediata e do gabinete da secretaria, subprefeitura, autarquia ou fundação.

    Parágrafo único. O acompanhamento das atividades no regime de teletrabalho deverá possibilitar a apuração objetiva do desempenho dos servidores ou empregados públicos, bem como de suas respectivas unidades.

    Artigo 9º

    Na definição para atuação no regime de teletrabalho, a chefia imediata deverá observar o perfil profissional dos servidores ou empregados públicos, de forma a promover e capacitar as seguintes características:

    I. organização: capacidade de estruturar suas atribuições, estabelecendo prioridades;

    II. autonomia: capacidade de atuar com disciplina e comprometimento sem acompanhamento presencial;

    III. orientação para resultados: capacidade de atentar aos objetivos e trabalhar para alcançá-los, observados sempre os prazos previamente estabelecidos;

    IV. controle de qualidade: capacidade de avaliar criticamente o trabalho realizado e alcançar com qualidade os objetivos fixados;

    V. integração do trabalho: capacidade de alinhar tarefas individuais com a equipe e chefia, tornando o trabalho mais efetivo e sem sobreposição e/ou retrabalho.

    Artigo 10.

    Os servidores ou empregados públicos em regime de teletrabalho deverão cumprir uma das seguintes escalas semanais de trabalho:

    I. 4 (quatro) dias de trabalho à distância e 1 (um) dia de trabalho presencial;

    II. 3 (três) dias de trabalho à distância e 2 (dois) dias de trabalho presencial;

    III. 2 (dois) dias de trabalho à distância e 3 (três) dias de trabalho presencial.

    Parágrafo único. Fica vedado o estabelecimento de dia da semana fixo para comparecimento presencial dos servidores ou empregados públicos, sendo necessária a alternância dos dias da semana que compõem a escala de trabalho, garantindo, assim, com essa alternância, maior efetividade na integração e troca de informações necessárias entre os membros das equipes.

    Artigo 11.

    O Secretário, Subprefeito e autoridade equiparada, na administração direta, e o dirigente da autarquia e fundação poderão, excepcionalmente, estabelecer periodicidades de escalas superiores à definida no inciso I do “caput” do artigo 10 deste decreto, de adesão facultativa pelos servidores ou empregados públicos e mediante o estabelecimento de metas e condições mais elevadas, para realização de trabalhos em regime de força-tarefa, por prazo determinado e não superior a 90 (noventa) dias.

    Parágrafo único. A nova fixação das condições excepcionais de que trata o “caput” deste artigo ao servidor ou empregado público que tenha integrado força-tarefa somente poderá ser autorizada após o decurso de 6 (seis) meses do encerramento de sua participação nesses trabalhos.

    Artigo 12.

    A adesão dos servidores ou empregados públicos eleitos para o regime de teletrabalho é facultativa, devendo ser formalizada mediante formulário próprio e condicionada à:

    I. pactuação de plano de trabalho contendo atividades passíveis de serem objetivamente mensuradas, bem como as demais condições específicas a que se submeterá o servidor ou empregado público, incluindo o estabelecimento do regime de assiduidade;

    II. indicação do local do teletrabalho, podendo o servidor ou empregado público optar por indicar sua residência ou outro local compatível com o cumprimento das normas e condições gerais e específicas fixadas para o regime, em especial observância de prazo fixado para atendimento à convocação para comparecimento presencial;

    III. subscrição de compromisso de realização das metas desempenho e demais condições fixadas.

    Parágrafo único. A prestação de serviços em regime de teletrabalho poderá ser executado, eventualmente, em local diverso do pactuado, mediante prévia e expressa autorização da chefia imediata.

    Artigo 13.

    O ingresso no regime de teletrabalho não constitui direito do servidor ou empregado público.

    Parágrafo único. A adesão ao regime de teletrabalho poderá ser revertida em função:

    I. da conveniência ou necessidade do serviço;

    II. da inadequação ao regime;

    III. do desempenho inferior ao estabelecido;

    IV. da desistência do servidor ou empregado público;

    V. de informação acerca de fundados indícios de violação às regras e condições do teletrabalho pactuado, até sua devida apuração.

    Artigo 14.

    A inobservância injustificada de requisito ou condição do regime de teletrabalho poderá ensejar, nos termos definidos em portaria da Secretaria Municipal de Gestão e nos atos normativos específicos expedidos pelo Secretário, Subprefeito ou autoridade equiparada, na administração direta, ou dirigente da autarquia ou fundação, e expressamente fixados no plano de trabalho, a caracterização do descumprimento da jornada de trabalho pelo servidor ou empregado público.

    Artigo 15.

    Os Secretários, Subprefeitos e autoridades equiparadas, na administração direta, bem como os dirigentes das autarquias e fundações deverão apresentar ao Gabinete do Prefeito, no prazo de 90 (noventa) dias, a contar da publicação deste decreto, balanço da implantação do regime permanente de teletrabalho em seus respectivos órgão ou entidades.

    Artigo 16.

    As empresas públicas deverão fixar internamente as regras e condições do regime de teletrabalho para seus empregados públicos, observadas, no que couber, as disposições constantes deste decreto e as normas e diretrizes gerais estabelecidas pela Secretaria Municipal de Gestão.

    Artigo 17.

    As regras de teletrabalho contidas no Decreto nº 59.283, de 16 de março de 2020, permanecem inalteradas e válidas enquanto durar o período de emergência decorrente da COVID-19, sem prejuízo da implantação das regras previstas neste decreto, naquilo que com elas não conflitarem.

    Artigo 18.

    Ficam recepcionados os atos normativos editados anteriormente com fundamento no Decreto nº 56.370, de 26 de agosto de 2015, salvo no que conflitarem com este decreto.

    Artigo 19.

    Este decreto entrará em vigor na data de sua publicação, revogado o Decreto nº 56.370, de 26 de agosto de 2015.

    PREFEITURA DO MUNICÍPIO DE SÃO PAULO, aos 14 de setembro de 2020, 467º da fundação de São Paulo.

    BRUNO COVAS, PREFEITO

    MALDE MARIA VILAS BÔAS, Secretária Municipal de Gestão

    ORLANDO LINDÓRIO DE FARIA, Secretário Municipal da Casa Civil

    MARINA MAGRO BERINGHS MARTINEZ, Respondendo pelo cargo de Secretária Municipal de Justiça

    RUBENS NAMAN RIZEK JUNIOR, Secretário de Governo Municipal

    Publicado na Casa Civil, em 14 de setembro de 2020.

    21Jun/21

    Acuerdo Ministerial nº 128-2020, de 24 de agosto de 2020

    Acuerdo Ministerial nº 128-2020, de 24 de agosto de 2020. Se ordena el uso de las comunicaciones, firma electrónica y firma electrónica avanzada, en el Ministerio de Gobernación, por parte del Ministro, Viceministros, Asesores, Empleados públicos así como funcionarios y dependencias que ejerzan dirección.

    EL MINISTRO DE GOBERNACIÓN

    CONSIDERANDO

    Que desde el año dos mil ocho entró en vigencia el Decreto número 47-2008 del Congreso de la República de Guatemala, el cual contiene la Ley para el Reconocimiento de las Comunicaciones y Firmas Electrónicas, misma que, en sus considerandos establece que el Estado como responsable del bien común debe mantener, reforzar y aplicar políticas y acciones que permitan una mayor participación en la dinámica y beneficios del desarrollo económico y social libres, la modernización, los procesos económicos sin obstáculos artificiales, así como la inserción del país en las comentes del progreso mundial de manera sostenible y equitativa. El desarrollo entre otras actividades puede derivarse de poderosas herramientas tales como la inmersión masiva de la tecnología y la transformación digital en nuestro mundo, tal cual es la firma electrónica avanzada y la tramitación de todos los expedientes públicos de manera digital. A través del presente Acuerdo Ministerial el Ministerio de Gobernación y sus dependencias quedaran expresamente facultados para la utilización de las comunicaciones y firmas electrónicas.

    CONSIDERANDO

    Que dentro de los objetivos trazados por el actual Gobierno de la República está la modernización del servicio público para que éste sea más expedito, eficaz y transparente, lo cual puede conseguirse utilizando las herramientas tecnológicas que establece el Decreto citado en el considerando anterior, tal como las comunicaciones y la firma electrónica avanzada, cuya implementación redundará en beneficio del quehacer económico del país ya que evitará el uso de papel en los expedientes públicos, la tramitación in situ de las gestiones de los interesados, la celeridad en la tramitación de los expedientes, el control de la tramitación de los mismos de forma inmediata y directa no solo por la administración sino por todas las personas interesadas, mediante accesos electrónicos, que pueden operarse desde cualquier dispositivo electrónico con acceso a internet salvo aquellos cuyo acceso restrinja la Ley, con lo cual este Ministerio transparentará totalmente las actividades que por ley corresponde realizar.

    CONSIDERANDO

    Que se estima necesario que dentro de los distintos procesos y actos administrativos del Ministerio de Gobernación y sus Dependencias, se implementen las Comunicaciones, Firma Electrónica y Firma Electrónica Avanzada, por lo que es importante aprobar la normativa legal interna respectiva, con la finalidad de establecer los mecanismos de uso de las mismas y que permita a los funcionarios de este Ministerio y sus Dependencias, conocer las obligaciones y responsabilidades que conlleva, relacionadas a la autenticación y validación de la Firma Electrónica, por lo que es procedente emitir la disposición legal correspondiente.

    POR TANTO

    En el ejercicio de lo dispuesto en los artículos 1, 2, 194 literales a), f) e i) de la Constitución Política de la República de Guatemala, y con fundamento en el artículo 27 literales a), f) y m) del Decreto número 114-97 del Congreso de la República de Guatemala, Ley del Organismo Ejecutivo, y, 1, 2, 5, 7, 8 y 9 del Decreto número 47-2008 del Congreso de la República de Guatemala, Ley para el Reconocimiento de las Comunicaciones y Firmas Electrónicas.

    ACUERDA

    Artículo 1. Comunicaciones, Firma Electrónica y Firma Electrónica Avanzada.

    Se ordena el uso de las comunicaciones, firma electrónica y firma electrónica avanzada, en el Ministerio de Gobernación, por parre del Ministro, Viceministros, Asesores, Empleados Públicos así como todos aquellos funcionarios y dependencias que ejerzan dirección y cuyas instrucciones las realicen mediante informes, oficios, circulares, providencias y dictámenes que actualmente se asientan en papel. La firma electrónica avanzada debe ser utilizada obligatoriamente por el Ministro, Viceministros, así como por cualquier funcionario que firme resoluciones en los expedientes, cuyo resultado final implique respuesta a solicitudes de los administrados, que puedan ser objeto de recursos administrativos o judiciales o disposiciones que impliquen la erogación de sumas dinerarias, derivadas del ejercicio del presupuesto asignado a este Ministerio.

    Artículo 2. Certificado Digital de Firma Electrónica.

     Un certificado digital de firma electrónica es el equivalente a la firma manuscrita en medios digitales que utiliza algoritmos criptográficos emitidos por los distintos prestadores de servicios debidamente registrados en el Registro de Prestadores de Servicios de Certificación del Ministerio de Economía, y que permiten identificar de manera inequívoca a una persona en medios digitales.

    Artículo 3. Implementación Progresiva.

    Las comunicaciones, firma electrónica y firma electrónica avanzada deberán implementarse de forma progresiva, iniciando en el Ministerio de Gobernación y continuará en todas sus Dependencias, quienes deberán efectuar la planificación correspondiente, en atención a sus capacidades técnicas, operativas y disponibilidad financiera

    Artículo 4. Comunicaciones Electrónicas.

    Se ordena el uso de las comunicaciones electrónicas en todo el Ministerio de Gobernación de conformidad con lo establecido en el Decreto número 47-2008 del Congreso de la República de Guatemala, Ley para el Reconocimiento de las Comunicaciones y Firmas Electrónicas.

    Artículo 5. Presentación Física.

    Las solicitudes y demás documentos que se presentan en papel ante el Ministerio de Gobernación y sus Dependencias, serán recibidos, sellados y digitalizados inmediatamente para la conformación del expediente electrónico.

    Los originales de los documentos digitalizados serán devueltos a quien los presente y las partes deberán preservarlos hasta que finalice el trámite del expediente, bajo su estricta responsabilidad.

    Artículo 6. Notificaciones electrónicas inviables.

    Cuando por motivo técnico resulte inviable el uso del medio electrónico para la realización de alguna comunicación, esos actos podrán ser practicados físicamente.

    Artículo 7. Archivo de los expedientes electrónicos.

    El Ministerio de Gobernación y sus Dependencias, deberán conservar los expedientes total o parcialmente, por medios electrónicos, tanto aquellos que concluyan su trámite como aquellos que ya se encuentren fenecidos con anterioridad a la vigencia de este Acuerdo Ministerial.

    Los expedientes electrónicos deberán ser protegidos por medio de sistemas de seguridad de acceso y almacenados en un medio que garantice la preservación e integridad de los datos, evitando la formación de legajos paralelos.

    Artículo 8. Plazo de implementación.

    Lo ordenado en las normas anteriores deberá estar implementado en el Ministerio de Gobernación, en un plazo que no deberá exceder de tres meses contados a partir de la fecha de este Acuerdo, y en las Dependencias del Ministerio de Gobernación en un plazo que no exceda de doce meses, contados a partir de la fecha de este Acuerdo.

    Artículo 9. Entidad Rectora.

    El Ministerio de Gobernación, a través del Cuarto Viceministerio de Gobernación, será la entidad rectora y tendrá a su cargo la dirección, coordinación, y socialización de los procedimientos a seguir para la correcta implementación de las Comunicaciones, Firma Electrónica y Firma Electrónica Avanzada dentro del Ministerio de Gobernación y sus Dependencias.

    Artículo 10. Recursos Financieros.

    Las Unidades Ejecutoras del Ministerio de Gobernación y sus Dependencias, deberán de readecuar su presupuesto interno y adquirir en base a los procesos de contratación pública que regula el Decreto número 57-92 del Congreso de la República de Guatemala, Ley de Contrataciones del Estado y del Acuerdo Gubernativo numero 122-2016 del Presidente de la República, Reglamento de la Ley de Contrataciones del Estado, los Certificados Digitales de Firmas Electrónicas debidamente registrados en el Registro de Prestadores de Servicios de Certificación del Ministerio de Economía.

    Artículo 11. Derogatoria.

    Se deroga el Acuerdo Ministerial número 63-2015 de fecha 22 de enero de 2015 del Ministerio de Gobernación.

    Artículo 12.

    Por ser de interés del Estado de Guatemala, la publicación de este Acuerdo se encuentra exenta del pago de la tarifa respectiva que establece el Acuerdo Gubernativo número 112-2015 del Presidente de la República, de fecha 26 de marzo de 2015.

    Artículo 13.

    El presente Acuerdo Ministerial empezará a regir un día después de su publicación en el Diario de Centro América.

    COMUNÍQUESE,

    Licenciado Oliverio García Rodas, Ministro de Gobernación

    Licenciado Oscar Humberto Conde López, Segundo Viceministro. Ministerio de Gobernación

    20Jun/21

    A proposta regulatória da União Europeia para a Inteligência Artificial (3ª parte). Sistemas de “alto risco (18.06.2021)

    Download the PDF file .

    20Jun/21

    Resolución de Secretaría de Gobierno Digital nº 001-2021-PCM/SGD, de 15 de junio de 2021

    Resolución de Secretaría de Gobierno Digital nº 001-2021-PCM/SGD, de 15 de junio de 2021. Aprueban la Directiva n° 001-2021-PCM/SGD, “Directiva que establece los Lineamientos para la Conversión Integral de Procedimientos Administrativos a Plataformas o Servicios Digitales”

    VISTO:

    El Informe nº D000010-2020-PCM-SSTRD-SLA de la Subsecretaría de Transformación Digital de la Secretaría de Gobierno Digital de la Presidencia del Consejo de Ministros; y,

    CONSIDERANDO:

    Que, de acuerdo a lo establecido en el Decreto Legislativo nº 1412, Decreto Legislativo que aprueba la Ley de Gobierno Digital, dispone que la Presidencia del Consejo de Ministros, a través de la Secretaría de Gobierno Digital, es el ente rector en materia de gobierno digital que comprende tecnologías digitales, identidad digital, interoperabilidad, servicio digital, datos, seguridad digital y arquitectura digital; dictando para tal efecto las normas y procedimientos en dicha materia;

    Que, el numeral 3 del artículo 3 de la citada norma establece que el servicio digital es aquel provisto de forma total o parcial a través de Internet u otra red equivalente, que se caracteriza por ser automático, no presencial y utilizar de manera intensiva las tecnologías digitales, para la producción y acceso a datos y contenidos que generen valor público para los ciudadanos y personas en general;

    Que, consistente con lo precitado, el artículo 23 del Decreto Supremo n° 029-2021-PCM, Decreto Supremo que aprueba el Reglamento del Decreto Legislativo n° 1412, Decreto Legislativo que aprueba la Ley de Gobierno Digital, y establece disposiciones sobre las condiciones, requisitos y uso de las tecnologías y medios electrónicos en el procedimiento administrativo, dispone la creación del Marco de Servicios Digitales del Estado Peruano, dirigido, supervisado y evaluado por la Presidencia del Consejo de Ministros, a través de la Secretaría de Gobierno Digital, en su calidad de ente rector de servicios digitales, que emite lineamientos, especificaciones, guías, directivas, normas técnicas y estándares para su aplicación por parte de las entidades de la Administración Pública a fin de garantizar el diseño, seguridad, escalabilidad, interoperabilidad, integridad, accesibilidad, usabilidad, omnicanalidad de los servicios digitales y el adecuado uso de las tecnologías digitales;

    Que, conforme a lo dispuesto en los artículos 7 y 8 del Decreto de Urgencia n° 006-2020, Decreto de Urgencia que crea el Sistema Nacional de Transformación Digital, dispone que la Presidencia del Consejo de Ministros, a través de la Secretaría de Gobierno Digital, es el ente rector del Sistema Nacional de Transformación Digital, constituyéndose en la autoridad técnico-normativa a nivel nacional sobre la materia; que tiene entre sus funciones, elaborar y aprobar lineamientos, procedimientos, metodologías, instrumentos, técnicas, modelos, directivas u otros para la transformación digital del país;

    Que, a través de los artículos 1 y 5 del Decreto de Urgencia n° 007-2020, Decreto de Urgencia que aprueba el Marco de Confianza Digital y dispone medidas para su fortalecimiento, se establecen las medidas necesarias para garantizar la confianza de las personas en su interacción con los servicios digitales prestados por entidades públicas y organizaciones del sector privado en el territorio nacional; y se dispone que la Presidencia del Consejo de Ministros, a través de la Secretaría de Gobierno Digital, es el ente rector en materia de Confianza Digital y responsable de la articulación de cada uno de sus ámbitos;

    Que, en ese contexto, mediante el Decreto Legislativo nº 1497, Decreto Legislativo que establece medidas para promover y facilitar condiciones regulatorias que contribuyan a reducir el impacto en la Economía Peruana por la Emergencia Sanitaria producida por el COVID-19, el cual tiene por objeto dotar del marco normativo que promueva y facilite las condiciones regulatorias exigidas para la obtención de la licencia de funcionamiento municipal; así como también, la obligatoriedad de optimizar las condiciones para que la atención de los procedimientos administrativos se desarrollen de manera más eficiente con el fin de mitigar el impacto y consecuencias ocasionadas por la propagación del COVID-19;

    Que, la Octava Disposición Complementaria Final del citado dispositivo legal, dispone que mediante Resolución Secretarial de la Secretaría de Gobierno Digital de la Presidencia del Consejo de Ministros se apruebe los lineamientos para la conversión de procedimientos administrativos para su atención mediante plataformas o servicios digitales, siendo un componente el diseño de los servicios digitales;

    Que, según lo dispuesto en los artículos 47 y 48 del Reglamento de Organización y Funciones de la Presidencia del Consejo de Ministros, aprobado mediante Decreto Supremo n° 022-2017-PCM, la Secretaría de Gobierno Digital es el órgano de línea con autoridad técnica normativa a nivel nacional, que tiene entre sus funciones aprobar normas, directivas, lineamientos y demás disposiciones, en las materias de su competencia; así como supervisar su cumplimiento;

    Que, en ese sentido, a fin de orientar a las entidades en la conversión integral de los procedimientos administrativos a plataformas o servicios digitales, resulta necesario emitir los lineamientos que definan las consideraciones generales para la referida conversión, y así lograr el desarrollo y consolidación del gobierno y transformación digital, haciendo uso estratégico de las tecnologías digitales, para fortalecer la competitividad, la reactivación económica y el bienestar social de nuestro país;

    De conformidad con lo dispuesto en el Decreto Legislativo n° 1412, Decreto Legislativo que aprueba la Ley de Gobierno Digital; el Decreto Legislativo nº 1497, Decreto Legislativo que establece medidas para promover y facilitar condiciones regulatorias que contribuyan a reducir el impacto en la Economía Peruana por la Emergencia Sanitaria producida por el COVID-19; el Decreto de Urgencia n° 006-2020, Decreto de Urgencia que crea el Sistema Nacional de Transformación Digital; el Decreto de Urgencia n° 007-2020, Decreto de Urgencia que aprueba el Marco de Confianza Digital y dispone medidas para su fortalecimiento; el Reglamento de Organización y Funciones de la Presidencia del Consejo de Ministros, aprobado mediante Decreto Supremo nº 022-2017-PCM y modificatoria; y, el Decreto Supremo n° 029-2021-PCM, Decreto Supremo que aprueba el Reglamento del Decreto LegislativonN° 1412, Decreto Legislativo que aprueba la Ley de Gobierno Digital, y establece disposiciones sobre las condiciones, requisitos y uso de las tecnologías y medios electrónicos en el procedimiento administrativo;

    SE RESUELVE:

    Artículo 1.- Aprobación

    Apruébese la Directiva n° 001-2021-PCM/SGD, “Directiva que establece los Lineamientos para la Conversión Integral de Procedimientos Administrativos a Plataformas o Servicios Digitales” (en adelante la Directiva), que en Anexo forma parte integrante de la presente resolución y que entra en vigencia a partir del día siguiente de su publicación.

    Artículo 2.- Alcance

    La Directiva aprobada por la presente resolución, es de alcance obligatorio a todas las entidades de la Administración Pública comprendidas en el Artículo I del Título Preliminar del Texto Único Ordenado de la Ley n° 27444, Ley del Procedimiento Administrativo General, aprobado mediante Decreto Supremo n° 004-2019-JUS.

    Artículo 3.- Canal digital informativo sobre el diseño de servicios digitales

    3.1 La Presidencia del Consejo de Ministros, a través de la Secretaría de Gobierno Digital, implementa y mantiene un canal digital para la organización, mantenimiento y difusión de la Directiva, cuya dirección en Internet es https://guias.servicios.gob.pe/.

    3.2 Asimismo, la Secretaría de Gobierno Digital de la Presidencia del Consejo de Ministros actualiza la Directiva en función de las nuevas tendencias y avances tecnológicos necesarios para la transformación digital del país, los cuales son difundidos a través dicho canal.

    Artículo 4.- Uso y adopción de la Directiva

    4.1 La Directiva es adoptada y usada por las entidades de la Administración Pública de manera complementaria a las disposiciones establecidas en el Decreto Legislativo n° 1412, Decreto Legislativo que aprueba la Ley de Gobierno Digital y su Reglamento aprobado mediante Decreto Supremo n° 029-2021-PCM.

    4.2 La Directiva se constituye en un instrumento para la digitalización y conversión integral de los procedimientos administrativos a Plataformas o Servicios Digitales.

    Artículo 5.- Plataforma Integral de Solicitudes Digitales del Estado Peruano

    5.1 La Plataforma Integral de Solicitudes Digitales del Estado Peruano (FACILITA PERÚ) se constituye como un servicio digital cuya dirección en Internet es https://facilita.gob.pe/ y permite acelerar el proceso de conversión integral de procedimientos administrativos a plataformas o servicios digitales. Facilita Perú es gestionada por la Secretaría de Gobierno Digital de la Presidencia del Consejo de Ministros.

    5.2 FACILITA PERÚ permite la creación de formularios digitales para acceder a trámites o servicios prestados por las entidades públicas, efectuar pagos digitales u otro tipo de interacción digital que se requiera a fin de agilizar la gestión de solicitudes ciudadanas.

    5.3 FACILITA PERÚ forma parte del conjunto de servicios digitales de la Plataforma Digital Única del Estado Peruano para Orientación al Ciudadano – GOB.PE, conforme a lo dispuesto en el Decreto Supremo n° 033-2018-PCM, Decreto Supremo que crea la Plataforma Digital Única del Estado Peruano y establecen disposiciones adicionales para el desarrollo del Gobierno Digital.

    Artículo 6.- Plataforma Digital de Participación Ciudadana Participa Perú

    La Plataforma Digital de Participación Ciudadana Participa Perú (PARTICIPA PERÚ), cuyo dominio en Internet es https://www.gob.pe/participa y se constituye en el canal digital para fomentar la participación directa de la sociedad civil, los sectores público y privado, la academia y los ciudadanos con propuestas para el logro de los objetivos del país. Es gestionada por la Secretaría de Gobierno Digital de la Presidencia del Consejo de Ministros.

    Artículo 7.- Plataforma Nacional de Software Colaborativo

    7.1 La Plataforma Nacional de Software Colaborativo, se constituye como un repositorio de código libre, cuyo dominio en Internet es https://www.softwarecolaborativo.gob.pe, a fin de impulsar las prácticas de código abierto, los procesos de desarrollo colaborativo de software, la participación del sector privado, la academia y la sociedad civil, la transparencia y la vigilancia ciudadana en el desarrollo de plataformas con alto impacto en la sociedad. Es gestionada por la Presidencia del Consejo de Ministros, a través de la Secretaría de Gobierno Digital.

    7.2 La Plataforma Nacional de Software Colaborativo impulsa la ciencia abierta, análisis de métodos e instrumentos y la producción de datos, información y conocimiento en beneficio de la sociedad. Asimismo, la referida Plataforma permite dinamizar las intervenciones del Estado con un enfoque de datos y código abierto.

    Artículo 8.- Red Nacional de Innovadores Digitales

    La Secretaría de Gobierno Digital mediante la Red Nacional de Innovadores Digitales impulsa acciones para compartir innovaciones digitales públicas y privadas, difundir nuevas metodologías digitales para abordar desafíos públicos, conectar y construir redes público-privadas en innovación digital, activar espacios de innovación abierta, concursos y reconocimientos en transformación digital y co-diseñar proyectos de innovación digital en el sector público en favor del desarrollo del país.

    Artículo 9.- Índice de Innovación Digital

    La Secretaría de Gobierno Digital, a través del Índice de Innovación Digital evalúa el estado de madurez en el desarrollo de la innovación digital de las entidades de la Administración Pública que representa un punto de partida para impulsar los esfuerzos de innovación centrados en la transformación digital y establecer una hoja de ruta con metas, acciones concretas y acompañamiento para el logro de resultados y acciones más ágiles y flexibles en beneficio de los ciudadanos.

    Artículo 10.- Publicación

    Disponer la publicación de la presente resolución y su anexo en la Plataforma Digital Única del Estado Peruano para Orientación al Ciudadano (www.gob.pe), y en el Portal Institucional de la Presidencia del Consejo de Ministros (www.gob.pe/pcm), el mismo día de su publicación en el Diario Oficial El Peruano.

    Regístrese, comuníquese y publíquese.

    MARUSHKA VICTORIA LÍA CHOCOBAR REYES. Secretaria, Secretaría de Gobierno Digital

    29May/21

    Número 25, primer semestre de 2021

    1. Ortiz Negrín, Dayai A.
    2. Pompa Torres, Enrique Roberto
    3. Rodríguez Ramírez, María Isabel
    4. Vázquez Riverón, Arelys
    5. Reinaldo Filho, Demócrito
    ISSN 1989-5852
    Título clave: Revista informática jurídica
    Tít. abreviado: Rev. inform. jurid.

    Introducción

    En este vigésimo quinto número de la Revista, aparecen artículos de colaboradores por orden alfabético.

    Un agradecimiento especial a los 5 colaboradores que han aportado sus artículos para hacer posible la publicación semestral de esta revista, que ya lleva 12 años y medio.

    Quisiera aprovechar esta publicación deseando que el COVID pueda estar controlado este año y que podamos volver a nuestra anterior forma de vida.

    Un cordial saludo para todos y gracias por vuestra colaboración.

    José Cuervo Álvarez

    Ortiz Negrín, Dayai A.

    Carrera: Ingeniería en Ciencias Informáticas. Universidad de Granma. Cuba.

    Pompa Torres, Enrique Roberto

    Universidad de Granma, Facultad de Ciencias Informáticas, Naturales y Exactas. Cuba

    Rodríguez Ramírez, María Isabel

    Universidad de Granma, Facultad de Ciencias Informáticas, Naturales y Exactas. Cuba

    Vázquez Riverón, Arelys

    Universidad de Granma, Facultad de Ciencias Informáticas, Naturales y Exactas. Cuba

    Reinaldo Filho, Demócrito

    Desembargador do TJPE

    25May/21

    A proposta regulatória da União Europeia para a Inteligência Artificial (1ª parte). A hierarquização dos riscos

    Download the PDF file .

    16May/21

    Proyecto de Ley 121/000046, 19 de febrero de 2021

    Proyecto de Ley 121/000046. Proyecto de Ley Orgánica de protección de datos personales tratados para fines de prevención, detección, investigación y enjuiciamiento de infracciones penales y de ejecución de sanciones penales. (Boletín Oficial de las Cortes Generales. Congreso de los Diputados. XIV Legislatura, 19 de febrero de 2021).

    121/000046 Proyecto de Ley Orgánica de protección de datos personales tratados para fines de prevención, detección, investigación y enjuiciamiento de infracciones penales y de ejecución de sanciones penales.

    La Mesa de la Cámara, en su reunión del día de hoy, ha adoptado el acuerdo que se indica respecto del asunto de referencia.

    (121) Proyecto de ley.

    Proyecto de Ley Orgánica de protección de datos personales tratados para fines de prevención, detección, investigación y enjuiciamiento de infracciones penales y de ejecución de sanciones penales.

    Acuerdo:

    Encomendar Dictamen por el procedimiento de urgencia, conforme a los artículos 109 y 93 del Reglamento, a la Comisión de Interior. Asimismo, publicar en el Boletín Oficial de las Cortes Generales, estableciendo plazo de enmiendas, por un período de ocho días hábiles, que finaliza el día 1 de marzo de 2021.

    En ejecución de dicho acuerdo se ordena la publicación de conformidad con el artículo 97 del Reglamento de la Cámara.

    Palacio del Congreso de los Diputados, 16 de febrero de 2021. P.D. El Secretario General del Congreso de los Diputados, Carlos Gutiérrez Vicén.

    PROYECTO DE LEY ORGÁNICA DE PROTECCIÓN DE DATOS PERSONALES TRATADOS PARA FINES DE PREVENCIÓN, DETECCIÓN, INVESTIGACIÓN Y ENJUICIAMIENTO DE INFRACCIONES PENALES Y DE EJECUCIÓN DE SANCIONES PENALES

    Exposición de motivos

    I

    La Unión Europea es un espacio en el que los estándares y las garantías de protección de los derechos de las personas físicas a la protección de los datos personales se encuentran en la vanguardia internacional y constituyen un referente mundial. El rápido desarrollo tecnológico, especialmente de Internet, así como la creciente globalización de la economía mundial y europea han hecho imprescindible abordar la reforma del marco jurídico de la protección de datos, al objeto de consolidar e incluso mejorar este elevado nivel de protección a través de la creación de un marco legislativo nuevo, adaptado a la realidad cambiante, al tiempo que sólido, coherente e integral. En definitiva, un entorno normativo para un mundo globalizado y digital.

    En este sentido, la Comunicación de la Comisión Europea «Un enfoque global de la protección de los datos personales en la Unión Europea», de 4 de noviembre de 2010, precedida de un intenso periodo de consultas durante más de dos años con los Estados miembros, el público en general, así como con los distintos sectores afectados, sentó las bases de lo que sería esta nueva perspectiva normativa.

    El marco normativo resultante consta, principalmente, de dos instrumentos: el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos y por el que se deroga la Directiva 95/46/CE (Reglamento General de Protección de Datos), que sustituye a una norma vigente desde hacía más de veinte años, y la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, y a la libre circulación de dichos datos y por la que se deroga la Decisión Marco 2008/977/JAI del Consejo.

    En nuestro ordenamiento jurídico, la Ley Orgánica 3/2018, de 5 de diciembre, de Protección de Datos Personales y garantía de los derechos digitales, adaptó el Reglamento General de Protección de Datos, en lo que respecta al tratamiento de los datos personales y a la libre circulación de estos datos.

    II

    La Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, objeto de transposición por esta ley orgánica, deroga la Decisión Marco 2008/977/JAI del Consejo, de 27 de noviembre de 2008, relativa a la protección de datos personales tratados en el marco de la cooperación policial y judicial en materia penal, que había sido superada por varias razones.

    En primer lugar, se trataba de una norma previa al Tratado de Lisboa que requería de su oportuna adaptación a los nuevos Tratados, en particular, al artículo 16 del Tratado de Funcionamiento de la Unión Europea, que exige que el Consejo y el Parlamento Europeo, a través del procedimiento legislativo ordinario, regulen la protección de los datos personales.

    En segundo término, la decisión marco se aprobó conforme a la estructura de pilares de la Unión Europea, previa al Tratado de Lisboa, por lo que contaba con un ámbito de aplicación limitado exclusivamente al tratamiento de datos personales de carácter transfronterizo entre los Estados miembros, sin alcanzar, por tanto, a los tratamientos de carácter estrictamente nacional.

    Asimismo, otorgaba una amplísima capacidad de maniobra a los Estados miembros, sin asegurar un nivel mínimo de armonización deseable en determinados ámbitos, como el reconocimiento en todos los Estados del derecho de acceso de los interesados a sus propios datos, el principio del tratamiento de los datos para fines determinados o las condiciones para las transferencias internacionales.

    En definitiva, la fragmentación y complejidad de la regulación en este campo perjudicaba la necesaria confianza entre los actores de la cooperación policial y judicial penal en Europa, quienes mostraban recelos a compartir información, entre otros motivos, por la ausencia de una mínima armonización en cuanto a la protección de los datos de carácter personal; unos datos que resultan esenciales en el terreno de la cooperación operativa.

    III

    La Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, subsana estas deficiencias, ampliando su ámbito de aplicación al tratamiento nacional de los datos personales en el espacio de la cooperación policial y judicial penal. Toda vez que cubre otras carencias de la normativa europea anterior, dado que incluye la regulación de los datos genéticos —que reclamaba el Tribunal Europeo de Derechos Humanos—, así como la distinción entre los datos personales según su grado de exactitud y fiabilidad, o la diferenciación entre distintas categorías de interesados.

    Resulta pertinente poner de relieve que la citada directiva que transpone esta ley orgánica se aprobó como respuesta a las crecientes amenazas para la seguridad en el contexto nacional e internacional, que tienen, en numerosos casos, un componente transfronterizo. Por esta razón, la cooperación internacional y la transmisión de información de carácter personal entre los servicios policiales y judiciales de los países implicados se convierten en un objetivo ineludible. En efecto, los atentados terroristas de Nueva York en 2001 supusieron un punto de inflexión en la necesidad de reforzar la cooperación judicial y policial en la lucha contra el terrorismo, como volvería a ponerse de manifiesto con ocasión de los atentados de Bruselas y Niza en 2016.

    La cooperación encaminada a compartir a tiempo la información operativa precisa se erige en un requisito de eficacia en la prevención y lucha contra este tipo de amenazas. Todo ello, teniendo en cuenta el estado de la técnica, que permite, en la actualidad, tratamientos de datos a gran escala en el ámbito de la seguridad.

    Este intercambio de información debe realizarse, en todo caso, de manera que se garanticen los principios democráticos y la seguridad de las personas a lo largo de las fases del tratamiento.

    En consecuencia, esta ley orgánica asume la finalidad de lograr un elevado nivel de protección de los derechos de la ciudadanía, en general, y de sus datos personales, en particular, que resulte homologable al del resto de los Estados miembros de la Unión Europea, incorporando y concretando las reglas que establece la directiva.

    En este sentido, la Constitución española fue precursora del reconocimiento y la defensa del derecho fundamental a la protección de datos personales. Así, el artículo 18.4 de nuestra norma fundamental dispone que la ley limitará el uso de la informática para garantizar el honor y la intimidad personal y familiar de la ciudadanía y el pleno ejercicio de sus derechos. El Tribunal Constitucional, en reiterada jurisprudencia, entiende la protección de datos como un derecho fundamental que garantiza a toda persona la capacidad de controlar el uso y destino de sus datos, con el propósito de evitar el tráfico ilícito o lesivo de los mismos o una utilización para fines distintos de los que justificaron su obtención.

    Por todo ello, la transposición de esta directiva por los Estados miembros supone el establecimiento de un marco jurídico consistente, que proporciona la seguridad jurídica necesaria para facilitar la cooperación policial y judicial penal y, por tanto, una mayor eficacia en el desempeño de sus funciones por las Fuerzas y Cuerpos de Seguridad y de nuestro sistema judicial penal en su conjunto, incluido el penitenciario.

    IV

    Esta ley orgánica consta de sesenta y cinco artículos estructurados en ocho capítulos, cinco disposiciones adicionales, una disposición derogatoria y diez disposiciones finales.

    El capítulo I, relativo a las disposiciones generales, define el objeto de la ley orgánica, entendiéndose como la regulación del tratamiento de los datos personales para fines de prevención, detección, investigación y enjuiciamiento de infracciones penales y de ejecución de sanciones penales, incluida la protección y de prevención frente a las amenazas contra la seguridad pública, cuando dicho tratamiento se lleve a cabo por los órganos que, a efectos de esta ley orgánica, tengan la consideración de autoridades competentes.

    La finalidad principal es que los datos sean tratados por estas autoridades competentes de manera que se cumplan los fines prevenidos a la par que establecer los mayores estándares de protección de los derechos fundamentales y las libertades de los ciudadanos, de forma que se cumpla lo dispuesto en el artículo 8, apartado 1, de la Carta de los Derechos Fundamentales de la Unión Europea, así como en el artículo 16, apartado 1, del Tratado de Funcionamiento de la Unión Europea y el artículo 18.4 de la Constitución.

    Asimismo, en correspondencia con lo que dispone el artículo 22.6 de la Ley Orgánica 3/2018, de 5 de diciembre, cuando el tratamiento de los datos personales se realice para alguno de los fines establecidos en este ley orgánica y proceda de las imágenes y sonidos obtenidos mediante la utilización de cámaras y videocámaras por las Fuerzas y Cuerpos de Seguridad, o bien se lleve a cabo por los órganos competentes para la vigilancia y control en los centros penitenciarios o para el control, regulación, vigilancia y disciplina del tráfico, dichos tratamientos se regularán por las disposiciones de esta ley orgánica complementándose, en lo que no resulte contrario a su contenido, con la normativa vigente que regula estos ámbitos. De este modo, se establece un nuevo sistema que gira en torno a las obligaciones de los responsables del tratamiento y a las distintas misiones que se les asignan.

    Aunque se deben excluir con carácter general, se incluyen igualmente algunas previsiones específicas para el tratamiento de los datos de personas fallecidas a similitud de lo que se dispone en la precitada Ley Orgánica 3/2018, de 5 de diciembre.

    Las autoridades competentes, a efectos de esta ley orgánica, se definen como autoridades públicas con competencias legalmente encomendadas para la consecución de los fines específicos incluidos en el ámbito de aplicación. En concreto, se determina que serán autoridades competentes: las Fuerzas y Cuerpos de Seguridad; las autoridades judiciales del orden jurisdiccional penal y el Ministerio Fiscal; las Administraciones Penitenciarias; la Dirección Adjunta de Vigilancia Aduanera; el Servicio Ejecutivo de la Comisión de Prevención del Blanqueo de Capitales e Infracciones Monetarias; y la Comisión de Vigilancia de Actividades de Financiación del Terrorismo. Todo ello, sin perjuicio de que los tratamientos que se lleven a cabo por los órganos jurisdiccionales se rijan por lo dispuesto en esta ley orgánica, en la Ley Orgánica 6/1985, de 1 de julio, del Poder Judicial, y en las leyes procesales penales.

    Se excluyen expresamente del ámbito de aplicación ciertos tratamientos, como los realizados por las autoridades competentes para fines distintos de los cubiertos por la ley orgánica; los llevados a cabo por los órganos de la Administración General del Estado en el marco de las actividades comprendidas en el ámbito del capítulo II del título V del Tratado de la Unión Europea, en relación a la Política Exterior y de Seguridad Común; los derivados de una actividad no comprendida en el ámbito de aplicación del Derecho de la Unión Europea; y los sometidos a la normativa sobre materias clasificadas. Entre estos últimos se mencionan los tratamientos relativos a la Defensa Nacional, así como los tratamientos incluidos en ficheros clasificados relativos a la lucha contra el terrorismo y las formas graves de delincuencia organizada; para estos últimos se establecen, no obstante, unos requisitos específicos dirigidos a incrementar la protección de los derechos de los interesados.

    El capítulo II se refiere a los principios de protección de datos cuya garantía corresponde al responsable del tratamiento. Estos principios se regulan en términos similares a lo establecido en el Reglamento General de Protección de Datos, con algunas especialidades propias del ámbito de esta ley orgánica.

    Se incluye un deber de colaboración con las autoridades competentes, según el cual, salvo que legalmente sea exigible una autorización judicial, las Administraciones Públicas o cualquier persona física o jurídica deberá proporcionar a las autoridades judiciales, al Ministerio Fiscal o a la Policía Judicial la información necesaria para la investigación o enjuiciamiento de infracciones penales o la ejecución de las penas y la información necesaria para la protección y prevención frente a un peligro real y grave para la seguridad pública. Todo ello, con la obligación de no informar al interesado de dichos tratamientos ulteriores. Esta última precisión resulta fundamental para evitar que la puesta de la información a disposición del interesado pueda poner en peligro los fines que, de acuerdo con la directiva y esta ley orgánica, justifican el tratamiento de los datos.

    Se regulan, también, los plazos de conservación y de revisión de los datos de carácter personal tratados, siendo relevante el establecimiento de un plazo máximo de conservación de los datos con carácter general y la implantación de un sistema que permite al responsable revisar, en el plazo que el mismo establezca dentro del margen legal, la necesidad de conservar, limitar o suprimir el conjunto de los datos personales contenidos en cada una de sus actividades de tratamiento. El responsable deberá, en sus tratamientos, distinguir los datos que correspondan a las diversas categorías de interesados, tales como los sospechosos, los condenados o los sancionados, las víctimas o los terceros involucrados, así como diferenciar, en la medida de lo posible, si los datos que trata son datos basados en hechos o en apreciaciones.

    Se exigen igualmente ciertas condiciones que determinan la licitud de todo tratamiento de datos de carácter personal, esto es, que sean tratados por las autoridades competentes; que resulten necesarios para los fines de esta ley orgánica y que, en caso necesario y en cada ámbito particular, se especifiquen las especialidades por una norma con rango de ley que incluya unos contenidos mínimos.

    En el supuesto de transmisión de datos sujetos a condiciones específicas de tratamiento, dichas condiciones deberán ser respetadas por el destinatario de los mismos, en especial, la prohibición de transmitirlos o de utilizarlos para fines distintos para los que fueron transmitidos.

    De igual modo, se exige que el tratamiento de categorías especiales de datos, como son los que revelen el origen étnico o racial, las opiniones políticas, las convicciones religiosas o filosóficas, la afiliación sindical o los genéticos o biométricos, sólo pueda tener lugar cuando sea estrictamente necesario y se cumplan ciertas condiciones.

    Los datos biométricos (como las huellas dactilares o la imagen facial) sólo se consideran incluidos en esta categoría especial cuando su tratamiento está dirigido a identificar de manera unívoca a una persona física. Esta necesidad de identificación en las actuaciones amparadas legalmente se lleva a cabo, con frecuencia, por las distintas autoridades competentes. El propósito es singularizar los autores o partícipes de infracciones penales, así como poder reconocer si son las personas que se supone o se busca, y de esta forma, atribuir o exonerar, sin género de dudas, la participación en determinados hechos, gracias a posibles indicios o vestigios biométricos.

    Habida cuenta de la vertiginosa evolución tecnológica y los medios electrónicos de los que se dispone, se incluye la habilitación legal que facilite una respuesta rápida y adecuada en el uso de estos datos, con el objetivo final de garantizar y proteger los derechos de los interesados y de la ciudadanía en general.

    Se prohíbe, igualmente, la adopción de decisiones individuales automatizadas, incluida la elaboración de perfiles en este ámbito, salvo que esté autorizado por una norma con rango de ley del ordenamiento jurídico español o europeo.

    El capítulo III, se divide en dos secciones y aborda los derechos de las personas. Regula una serie de condiciones generales del ejercicio de los derechos, tales como la obligación exigible al responsable de facilitar la información correspondiente a los derechos del interesado de forma concisa, con un lenguaje claro y sencillo y de manera gratuita. Se establece la información que debe ponerse a disposición del interesado, siendo algunos datos obligatorios, en todo caso, y otros en casos concretos.

    Se reconocen los derechos de acceso, rectificación, supresión y limitación del tratamiento. En virtud de tales derechos se faculta al interesado a conocer si se están tratando o no sus datos y, en caso afirmativo, acceder a cierta información sobre el tratamiento; a obtener la rectificación de sus datos si estos resultaran inexactos; a suprimirlos cuando fueran contrarios a lo dispuesto en los artículos 6, 11 o 13, o cuando así lo requiera una obligación legal exigible al responsable; y a limitar el tratamiento, cuando el interesado ponga en duda la exactitud de los datos o estos datos deban conservarse únicamente a efectos probatorios.

    Estos derechos podrán ser ejercidos por el interesado directamente o, en determinados casos, a través de la autoridad de protección de datos.

    Dispone esta ley orgánica que estos derechos pueden ser restringidos por ciertas causas tasadas, como cuando sea necesario para evitar que se obstaculice una investigación o se ponga en peligro la seguridad pública o la seguridad nacional.

    Se establece, en su sección segunda, un régimen especial de derechos de los interesados en el marco de investigaciones y procesos penales.

    El capítulo IV recoge las obligaciones y responsabilidades de los responsables y encargados de protección de datos, las medidas de seguridad y la figura del delegado de protección de datos, a lo largo de tres secciones. El responsable del tratamiento, teniendo en cuenta la naturaleza, el ámbito, el contexto y los fines del tratamiento, así como los niveles de riesgo para los derechos y libertades de las personas físicas, aplicará las medidas técnicas y organizativas apropiadas.

    El encargado del tratamiento llevará a cabo sus funciones por cuenta del responsable, debiendo ofrecer garantías para aplicar medidas técnicas y organizativas apropiadas.

    Todo responsable y encargado del tratamiento deberá conservar un registro de actividades de tratamiento, con datos identificativos, tales como los datos de contacto del responsable, los fines o las categorías de interesados, y un registro de operaciones, pieza angular de este sistema e instrumento básico para acreditar el cumplimiento de varios de los principios de tratamiento, que comprenderá la recogida, la alteración, las consultas y las transferencias de los datos personales entre otras operaciones.

    Asimismo, están obligados a cooperar con la autoridad de protección de datos, en el marco de la legislación vigente.

    Se establecen ciertas obligaciones que responden a un nuevo modelo de responsabilidad activa que exige una valoración previa del riesgo que pudiera generar el tratamiento de los datos de carácter personal para los interesados, para, a partir de dicha valoración, adoptar las medidas que procedan.

    Se presta una atención detallada a la seguridad del tratamiento, regulándose alguna de las medidas de seguridad que se aplicarán, si bien solo se dispone como obligatoria la puesta en marcha del citado registro de operaciones como medida técnica y organizativa, siendo las demás las que el responsable determine como las más adecuadas para lograr el control que se le solicita en virtud del tipo de tratamiento que se esté llevando a cabo y del nivel de riesgo que se estime, tras el correspondiente análisis. Se impone, asimismo, el deber de notificación a la autoridad de protección de datos de cualquier violación de la seguridad que, con carácter general, deberá ser notificada al interesado, salvo en supuestos expresamente previstos en la ley.

    El delegado de protección de datos se configura como el órgano o figura de asesoramiento y supervisión de los responsables de protección de datos, que podrá ser único para varias autoridades competentes y cuya designación será obligatoria salvo en relación con los tratamientos de datos con fines jurisdiccionales. En el caso de que se dispongan tratamientos que queden bajo distintos ámbitos de aplicación, con el fin de evitar disfunciones en las organizaciones de las autoridades competentes, se establece que la figura del delegado de protección de datos será única para todos ellos.

    El capítulo V regula las transferencias de datos personales realizadas por las autoridades competentes españolas a un Estado que no sea miembro de la Unión Europea o a una organización internacional, incluidas las transferencias ulteriores a otro Estado que no pertenezca a la Unión Europea u otra organización internacional y se establecen las condiciones que deberán cumplirse para que éstas sean lícitas.

    Así, con el fin de garantizar que no se menoscabe el nivel de protección de las personas físicas previsto en esta ley orgánica, la transferencia respetará ciertas condiciones previstas en la misma. De este modo, sólo deben realizarse cuando sean necesarias para los fines de esta ley orgánica y cuando el responsable del tratamiento en el tercer país u organización internacional sea autoridad competente en relación a dichos fines.

    Asimismo, cuando el dato se transfiere a un tercer país o a una organización internacional, la autoridad competente del Estado miembro en el que se obtuvo el dato, debe autorizar previamente esta transferencia y las ulteriores que puedan tener lugar a otro tercer país o a una organización internacional. En cuanto al tercer país u organización internacional destinatario de la trasferencia, deberá ser objeto de evaluación por la Comisión Europea a la vista de su nivel de protección de datos o, en caso de ausencia de decisión, debe entenderse por el responsable del tratamiento que ofrece garantías adecuadas. Sólo por las causas excepcionales previstas en esta ley orgánica se podrán autorizar transferencias fuera de estos supuestos.

    Este capítulo finaliza con la regulación de la transferencia internacional de datos personales a destinatarios que, no siendo autoridades competentes, están establecidos en terceros países.

    El capítulo VI, relativo a las autoridades de protección de datos, dispone que dichas autoridades sean la Agencia Española de Protección de Datos y las Agencias Autonómicas de Protección de Datos, en sus respectivos ámbitos competenciales. Asimismo, la ley orgánica recoge sus potestades, funciones y la asistencia entre autoridades de protección de datos de los Estados miembros. Se remite en lo restante a la normativa que les resulte de aplicación.

    El capítulo VII prevé que los procedimientos de reclamación que se planteen ante las autoridades de protección de datos se rijan por lo establecido en la Ley Orgánica 3/2018, de 5 de diciembre, o, en su caso, por la normativa reguladora de la autoridad de protección de datos correspondiente. Se refiere a aquellos supuestos en que los responsables o encargados del tratamiento, o de la autoridad de protección de datos, en su caso, incumplan esta ley orgánica y generen un daño o lesión en los bienes o derechos del interesado.

    Este capítulo, además, aborda la responsabilidad de los responsables o encargados del tratamiento o de la autoridad de protección de datos, en su caso, cuando incumplan esta ley orgánica y se genere un daño o lesión en los bienes o derechos de un interesado. De igual modo, se detalla la forma de ejercer el derecho a la tutela judicial efectiva ante la jurisdicción contencioso-administrativa contra las decisiones de una autoridad de protección de datos que puedan entenderse que conciernen a los interesados.

    Finalmente, el capítulo VIII regula el régimen sancionador específico aplicable ante incumplimientos de las obligaciones previstas en esta ley orgánica. Se definen los sujetos sobre los que recaerá la responsabilidad por las infracciones cometidas. Se determinan las reglas del concurso de normas para resolver los casos en los que un hecho pueda ser calificado con arreglo a dos o más de ellas. Al tiempo que se tipifican las infracciones, que, en función de su gravedad, podrán ser leves, graves o muy graves.

    Por último, se establecen las sanciones que se pueden imponer, y se fijan los plazos de prescripción tanto de las infracciones como de las sanciones y de caducidad.

    Las disposiciones adicionales se refieren a regímenes específicos, al intercambio de datos dentro de la Unión Europea, a los acuerdos internacionales en el ámbito de la cooperación judicial en materia penal y de la cooperación policial, y a los tratamientos que se efectúen en relación con los ficheros y al registro de Población de las Administraciones Públicas.

    Las disposiciones finales introducen las modificaciones necesarias en la Ley Orgánica 1/1979, de 26 de septiembre, General Penitenciaria, para adecuarla a las previsiones de esta ley orgánica en relación con los tratamientos para ejecución de la pena; en la Ley Orgánica 3/2018, de 5 de diciembre; en la Ley Orgánica 1/2020, de 16 de septiembre, sobre la utilización de los datos del registro de nombres de pasajeros para la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves en correspondencia con determinadas obligaciones de los operadores; en la Ley 19/2007, de 11 de julio, contra la violencia, el racismo, la xenofobia y la intolerancia en el deporte; en la Ley 5/2014, de 4 de abril, de Seguridad Privada para adecuar, en ambos casos, los plazos de caducidad de los expedientes sancionadores; y en el texto refundido de la Ley sobre Tráfico, Circulación de Vehículos a Motor y Seguridad Vial, aprobado por el Real Decreto Legislativo 6/2015, de 30 de octubre, para dar soporte legal específico a las matriculaciones por razones de Seguridad Nacional.

    En la elaboración de esta ley orgánica se han observado los principios de necesidad, eficacia,

    proporcionalidad, seguridad jurídica, transparencia y eficiencia, exigidos por el artículo 129 de la Ley 39/2015, de 1 de octubre, del Procedimiento Administrativo Común de las Administraciones Públicas.

    En primer lugar, se trata de una norma necesaria, dado que la transposición de la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, exige una ley de carácter orgánico, al afectar la norma comunitaria a un derecho fundamental reconocido en el artículo 18 de la Constitución y por imperativo del artículo 81 de la misma. En este sentido, el artículo 18.4 de la Constitución dispone que la ley limitará el uso de la informática para garantizar el honor y la intimidad personal y familiar de la ciudadanía y el pleno ejercicio de sus derechos.

    Esta ley orgánica, además, incorpora a nuestro ordenamiento interno los instrumentos que permitirán una eficaz protección de los datos de las personas físicas frente a su tratamiento por parte de las autoridades competentes con fines de prevención, detección, investigación o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, incluidas la protección y la prevención frente a las amenazas contra la seguridad pública.

    Por lo que respecta al principio de seguridad jurídica, en razón de la materia objeto de regulación, la transposición de la directiva se realiza mediante una ley orgánica, cuya tramitación e integración en el ordenamiento jurídico goza de las garantías que amparan las normas de esta naturaleza.

    En cuanto al principio de proporcionalidad, esta ley orgánica contempla un importante número de garantías orientadas a que el tratamiento de datos personales sea proporcional, oportuno, mínimo y suficiente para el cumplimiento de los fines que se persiguen. En particular, su tratamiento se sujeta a los principios que rigen el tratamiento de datos personales, por lo que se exige que no sean tratados para otros fines distintos de los establecidos en la norma, salvo que dicho tratamiento esté autorizado por el Derecho de la Unión Europea o por nuestro Derecho interno. Cuando los datos personales sean tratados para otros fines que no sean los de la prevención, detección, investigación o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, incluidas la protección y la prevención frente a las amenazas contra la seguridad pública, se aplicará el Reglamento General de Protección de Datos, a menos que el tratamiento se efectúe como parte de una actividad que quede fuera del ámbito de aplicación del Derecho de la Unión Europea.

    Se cumple, también, el principio de transparencia, puesto que esta norma ha sido sometida a los correspondientes trámites de participación pública, esto es, el de consulta pública previa y el de audiencia e información pública.

    En la tramitación de esta ley orgánica, además de los diversos Ministerios concernidos por razón de la materia, han emitido informe la Agencia Española de Protección de Datos; la Agencia Vasca de Protección de Datos; la Autoridad Catalana de Protección de Datos; el Consejo Fiscal; el Consejo General del Poder Judicial; los Departamentos de Seguridad Pública del Gobierno Vasco y de Interior de la Generalidad de Cataluña; y finalmente el Consejo de Estado. Se trata, por tanto, de un texto en el cual se han incorporado las consideraciones de órganos tan relevantes como los expuestos.

    Por último, esta ley orgánica se dicta al amparo de las reglas 1.ª, 6.ª, 18.ª y 29.ª del artículo 149.1 de la Constitución, que atribuyen al Estado las competencias exclusivas, respectivamente, para la regulación de las condiciones básicas que garanticen la igualdad de todos los españoles en el ejercicio de los derechos y en el cumplimiento de los deberes constitucionales; sobre legislación penal, penitenciaria y procesal; respecto a las bases del régimen jurídico de las Administraciones Públicas, el procedimiento administrativo común y en relación al sistema de responsabilidad de todas las Administraciones públicas; y en materia de seguridad pública.

    CAPÍTULO I. Disposiciones generales

    Artículo 1. Objeto.

    Esta ley orgánica tiene por objeto establecer las normas relativas a la protección de las personas físicas en lo que respecta al tratamiento de los datos de carácter personal por parte de las autoridades competentes, con fines de prevención, detección, investigación y enjuiciamiento de infracciones penales o de ejecución de sanciones penales, incluidas la protección y prevención frente a las amenazas contra la seguridad pública.

    Artículo 2. Ámbito de aplicación.

    1. Será de aplicación al tratamiento total o parcialmente automatizado de datos personales, así como al tratamiento no automatizado de datos personales contenidos o destinados a ser incluidos en un fichero, realizado por las autoridades competentes, con fines de prevención, detección, investigación y enjuiciamiento de infracciones penales y de ejecución de sanciones penales, incluidas las protección y prevención frente a las amenazas contra la seguridad pública.

    2. El tratamiento de los datos personales llevado a cabo con ocasión de la tramitación por los órganos judiciales y fiscalías de las actuaciones o procesos de los que sean competentes, así como el realizado dentro de la gestión de la Oficina judicial y fiscal, se regirá por lo dispuesto en la presente Ley Orgánica, sin perjuicio de las disposiciones de la Ley Orgánica 6/1985, de 1 de julio, del Poder Judicial, las leyes procesales que le sean aplicables y, en su caso, por la Ley 50/1981, de 30 de diciembre, por la que se regula el Estatuto Orgánico del Ministerio Fiscal. Las autoridades de protección de datos a las que se refiere el capítulo VI no serán competentes para controlar estas operaciones de tratamiento.

    3. Quedan fuera del ámbito de aplicación de esta ley orgánica los siguientes tratamientos de datos personales:

    a) Los realizados por las autoridades competentes para fines distintos de los previstos en el artículo 1, incluidos los fines de archivo por razones de interés público, investigación científica e histórica o estadísticos. Estos tratamientos se someterán plenamente a lo establecido en el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos y por el que se deroga la Directiva 95/46/CE (Reglamento General de Protección de Datos), así como en la Ley Orgánica 3/2018, de 5 de diciembre, de protección de datos personales y garantía de los derechos digitales.

    b) Los llevados a cabo por los órganos de la Administración General del Estado en el marco de las actividades comprendidas en el ámbito de aplicación del capítulo II del título V del Tratado de la Unión Europea.

    c) Los tratamientos que afecten a actividades no comprendidas en el ámbito de aplicación del Derecho de la Unión Europea.

    d) Los relativos a la Defensa Nacional.

    e) Los sometidos a la normativa sobre materias clasificadas, entre los que se encuentran los tratamientos relativos a la lucha contra el terrorismo y a las formas graves de delincuencia organizada.

    A las actividades de tratamiento en materia de lucha contra el terrorismo y las formas graves de delincuencia organizada, no les será de aplicación ni el Reglamento General de Protección de Datos, ni la Ley Orgánica 3/2018, de 5 de diciembre, sino que estarán sujetos a lo dispuesto en la citada normativa sobre materias clasificadas y seguridad de la información. No obstante, en estos supuestos, el responsable del tratamiento comunicará previamente a la Autoridad de protección de datos competente, la actividad de tratamiento que se llevará a cabo, sus fines, las categorías de datos tratados, las categorías de interesados y destinatarios, las categorías de transferencias internacionales de datos personales y la elaboración de perfiles, en su caso, así como los elementos esenciales relativos a las medidas de seguridad.

    4. Esta ley orgánica no se aplicará a los tratamientos de datos de personas fallecidas, sin perjuicio de lo establecido en el artículo siguiente.

    Artículo 3. Datos de personas fallecidas.

    1. Las personas vinculadas al fallecido por razones familiares o de hecho, así como sus herederos, podrán dirigirse al responsable o encargado del tratamiento al objeto de solicitar el acceso, rectificación o supresión de los datos de aquel, de acuerdo con lo dispuesto en esta ley orgánica.

    2. En caso de fallecimiento de menores, estas facultades podrán ejercerse también por sus representantes legales o, en el marco de sus competencias, por el Ministerio Fiscal, que podrá actuar de oficio o a instancia de cualquier persona interesada.

    3. En caso de fallecimiento de personas con discapacidad, estas facultades también podrán ejercerse, además de por quienes señala el apartado anterior, por quienes hubiesen sido designados para el ejercicio de funciones de apoyo, si tales facultades se entendieran comprendidas en las medidas de apoyo prestadas por el designado.

    Artículo 4. Autoridades competentes.

    1. Será autoridad competente, a los efectos de esta ley orgánica, toda autoridad pública que tenga competencias encomendadas legalmente para el tratamiento de datos personales con alguno de los fines previstos en el artículo 1.

    En particular, tendrán esa consideración, en el ámbito de sus respectivas competencias, las siguientes autoridades:

    a) Las Fuerzas y Cuerpos de Seguridad.

    b) Las Administraciones Penitenciarias.

    c) La Dirección Adjunta de Vigilancia Aduanera de la Agencia Estatal de Administración Tributaria.

    d) El Servicio Ejecutivo de la Comisión de Prevención del Blanqueo de Capitales e Infracciones Monetarias.

    e) La Comisión de Vigilancia de Actividades de Financiación del Terrorismo.

    2. También tendrán consideración de autoridades competentes las Autoridades judiciales del orden jurisdiccional penal y el Ministerio Fiscal.

    Artículo 5. Definiciones.

    A efectos de esta ley orgánica se entenderá por:

    a) «datos personales»: toda información sobre una persona física identificada o identificable («el interesado»); se considerará persona física identificable a toda persona cuya identidad pueda determinarse, directa o indirectamente, en particular mediante un identificador, como por ejemplo un nombre, un número de identificación, unos datos de localización, un identificador en línea o uno o varios elementos propios de la identidad física, fisiológica, genética, psíquica, económica, cultural o social de dicha persona;

    b) «tratamiento»: cualquier operación o conjunto de operaciones realizadas sobre datos personales o conjuntos de datos personales, ya sea por procedimientos automatizados o no, como la recogida, registro, organización, estructuración, conservación, adaptación o modificación, extracción, consulta, utilización, comunicación por transmisión, difusión o cualquier otra forma de habilitación de acceso, cotejo o interconexión, limitación, supresión o destrucción;

    c) «limitación del tratamiento»: el marcado de los datos personales conservados con el fin de limitar su tratamiento en el futuro;

    d) «elaboración de perfiles»: toda forma de tratamiento automatizado de datos personales consistente en utilizar datos personales para evaluar determinados aspectos personales de una persona física, en particular para analizar o predecir aspectos relativos al rendimiento profesional, situación económica, salud, preferencias personales, intereses, fiabilidad, comportamiento, ubicación o movimientos de dicha persona física;

    e) «seudonimización»: el tratamiento de datos personales de manera tal que ya no puedan atribuirse a un interesado sin utilizar información adicional, siempre que dicha información adicional se mantenga por separado y esté sujeta a medidas técnicas y organizativas destinadas a garantizar que los datos personales no se atribuyan a una persona física identificada o identificable;

    f) «fichero»: todo conjunto estructurado de datos personales, accesibles con arreglo a criterios determinados, ya sea centralizado, descentralizado o dispersado de forma funcional o geográfica;

    g) «autoridad competente»: toda autoridad pública competente para la prevención, investigación, detección o enjuiciamiento de infracciones penales o la ejecución de sanciones penales, incluidas la protección y prevención frente a amenazas para la seguridad pública; o cualquier otro órgano o entidad a quien en nuestro ordenamiento jurídico haya confiado el ejercicio de la autoridad pública y las competencias públicas a efectos de prevención, investigación, detección o enjuiciamiento de infracciones penales o ejecución de sanciones penales, incluidas la protección y prevención frente a amenazas para la seguridad pública;

    h) «responsable del tratamiento» o «responsable»: la autoridad competente que sola o conjuntamente con otras, determine los fines y medios del tratamiento de datos personales;

    i) «encargado del tratamiento» o «encargado»: la persona física o jurídica, autoridad pública, servicio u otro organismo que trate datos personales por cuenta del responsable del tratamiento;

    j) «destinatario»: la persona física o jurídica, autoridad pública, servicio o cualquier otro organismo al que se comuniquen datos personales, se trate o no de un tercero. No obstante, no se considerará destinatarios las autoridades públicas que puedan recibir datos personales en el marco de una investigación concreta de conformidad con el ordenamiento jurídico interno o de la Unión; el tratamiento de tales datos por las citadas autoridades públicas será conforme con las normas en materia de protección de datos aplicables a los fines del tratamiento;

    k) «violación de la seguridad de los datos personales»: toda violación de la seguridad que ocasione la destrucción, pérdida o alteración accidental o ilícita, o la comunicación o acceso no autorizados a datos personales transmitidos, conservados o tratados de otra forma;

    l) «datos genéticos»: datos personales relativos a las características genéticas heredadas o adquiridas de una persona física que proporcionen una información única sobre la fisiología o la salud de esa persona, obtenidos en particular del análisis de una muestra biológica de la persona física de que se trate;

    m) «datos biométricos»: datos personales obtenidos a partir de un tratamiento técnico específico, relativos a las características físicas, fisiológicas o de conducta de una persona física que permitan o confirmen la identificación única de dicha persona, como imágenes faciales o datos dactiloscópicos;

    n) «datos relativos a la salud»: datos personales relativos a la salud física o mental de una persona física, incluida la prestación de servicios de atención sanitaria, que revelen información sobre su estado de salud;

    ñ) «autoridad de control»: una autoridad pública independiente, como la Agencia Española de Protección de Datos y las Agencias autonómicas;

    o) «organización internacional»: una organización internacional y sus entes subordinados de Derecho internacional público o cualquier otro organismo creado mediante un acuerdo entre dos o más países o en virtud de tal acuerdo.

    CAPÍTULO II. Principios, licitud del tratamiento y videovigilancia

    Sección 1.ª. Principios y licitud del tratamiento

    Artículo 6. Principios relativos al tratamiento de datos personales.

    1. Los datos personales serán:

    a) Tratados de manera lícita y leal.

    b) Recogidos con fines determinados, explícitos y legítimos, y no serán tratados de forma incompatible con esos fines.

    c) Adecuados, pertinentes y no excesivos en relación con los fines para los que son tratados.

    d) Exactos y, si fuera necesario, actualizados. Se adoptarán todas las medidas razonables para que se supriman o rectifiquen, sin dilación indebida, los datos personales que sean inexactos con respecto a los fines para los que son tratados.

    e) Conservados de forma que permitan identificar al interesado durante un período no superior al necesario para los fines para los que son tratados.

    f) Tratados de manera que se garantice una seguridad adecuada, incluida la protección contra el tratamiento no autorizado o ilícito y contra su pérdida, destrucción o daño accidental. Para ello, se utilizarán las medidas técnicas u organizativas adecuadas.

    2. Los datos personales recogidos por las autoridades competentes no serán tratados para otros fines distintos de los establecidos en el artículo 1, salvo que dicho tratamiento esté autorizado por el Derecho de la Unión Europea o por la legislación española. Cuando los datos personales sean tratados para otros fines, se aplicará el Reglamento General de Protección de Datos y la Ley Orgánica 3/2018, de 5 de diciembre, a menos que el tratamiento se efectúe como parte de una actividad que quede fuera del ámbito de aplicación del Derecho de la Unión Europea.

    3. Los datos personales podrán ser tratados por el mismo responsable o por otro, para fines establecidos en el artículo 1 distintos de aquel para el que hayan sido recogidos, en la medida en que concurran cumulativamente las dos circunstancias siguientes:

    a) Que el responsable del tratamiento sea competente para tratar los datos para ese otro fin, de acuerdo con el Derecho de la Unión Europea o la legislación española.

    b) Que el tratamiento sea necesario y proporcionado para la consecución de ese otro fin, de acuerdo con el Derecho de la Unión Europea o la legislación española.

    4. El tratamiento por el mismo responsable o por otro podrá incluir el archivo por razones de interés público, y el uso científico, estadístico o histórico para los fines establecidos en el artículo 1, con sujeción a las garantías adecuadas para los derechos y libertades de los interesados.

    5. El responsable del tratamiento deberá garantizar y estar en condiciones de demostrar el cumplimiento de lo establecido en este artículo.

    Artículo 7. Deber de colaboración.

    1. Las Administraciones públicas, así como cualquier persona física o jurídica, proporcionarán a las autoridades judiciales, al Ministerio Fiscal o a la Policía Judicial los datos, informes, antecedentes y justificantes que les soliciten y que sean necesarios para la investigación y enjuiciamiento de infracciones penales o para la ejecución de las penas. La petición de la policía judicial deberá ser concreta y específica.

    La comunicación de datos, informes, antecedentes y justificantes por la Administración tributaria, la Administración de la Seguridad Social y la Inspección de Trabajo y Seguridad Social, se efectuará de acuerdo con su legislación respectiva.

    2. En los restantes casos, las Administraciones públicas, así como cualquier persona física o jurídica, proporcionarán los datos, informes, antecedentes y justificantes a las autoridades competentes que los soliciten, siempre que éstos sean necesarios para el desarrollo específico de sus misiones para la prevención, detección e investigación de infracciones penales y para la prevención y protección frente a un peligro real y grave para la seguridad pública. La petición de la autoridad competente deberá ser concreta y específica y contener la motivación que acredite su relación con los indicados supuestos.

    3. No será de aplicación lo dispuesto en los apartados anteriores cuando legalmente sea exigible la autorización judicial para recabar los datos necesarios para el cumplimiento de los fines del artículo 1.

    4. En los supuestos contemplados en los apartados anteriores, el interesado no será informado de la transmisión de sus datos a las autoridades competentes, ni de haber facilitado el acceso a los mismos por dichas autoridades de cualquier otra forma, a fin de garantizar la actividad investigadora.

    Con el mismo propósito, los sujetos a los que el ordenamiento jurídico imponga un deber específico de colaboración con las autoridades competentes para el cumplimiento de los fines establecidos en el artículo 1, no informarán al interesado de la transmisión de sus datos a dichas autoridades, ni de haber facilitado el acceso a los mismos por dichas autoridades de cualquier otra forma, en cumplimiento de sus obligaciones específicas.

    Artículo 8. Plazos de conservación y revisión.

    1. El responsable del tratamiento determinará que la conservación de los datos personales tenga lugar sólo durante el tiempo necesario para cumplir con los fines previstos en el artículo 1.

    2. El responsable del tratamiento deberá revisar la necesidad de conservar, limitar o suprimir el conjunto de los datos personales contenidos en cada una de las actividades de tratamiento bajo su responsabilidad, como máximo cada tres años. Si es posible, se hará mediante el tratamiento automatizado apropiado. El plazo máximo de conservación será de 20 años.

    Artículo 9. Distinción entre categorías de interesados.

    El responsable del tratamiento, en la medida de lo posible, establecerá entre los datos personales de las distintas categorías de interesados, distinciones tales como:

    a) Personas respecto de las cuales existan motivos fundados para presumir que hayan cometido, puedan cometer o colaborar en la comisión de una infracción penal.

    b) Personas condenadas o sancionadas por una infracción penal.

    c) Víctimas o afectados por una infracción penal o que puedan serlo.

    d) Terceros involucrados en una infracción penal o un tratamiento comprendido en la letra a), como son, personas que puedan ser citadas a testificar en investigaciones relacionadas con infracciones o procesos penales ulteriores, personas que puedan facilitar información sobre dichas infracciones, o personas de contacto o asociados de una de las personas mencionadas en las letras a) y b).

    Artículo 10. Verificación de la calidad de los datos personales.

    1. El responsable del tratamiento, en la medida de lo posible, establecerá una distinción entre los datos personales basados en hechos y los basados en apreciaciones personales.

    2. Las autoridades competentes adoptarán todas las medidas razonables para garantizar que los datos personales que sean inexactos, incompletos o no estén actualizados, no se transmitan ni se pongan a disposición de terceros. En toda transmisión de datos se trasladará al mismo tiempo la valoración de su calidad, exactitud y actualización.

    En la medida de lo posible, en todas las transmisiones de datos personales se añadirá la información necesaria para que la autoridad competente receptora pueda valorar hasta qué punto son exactos, completos y fiables, y en qué medida están actualizados. Igualmente, la autoridad competente transmisora controlará la calidad de los datos personales antes de transmitirlos o ponerlos a disposición de terceros.

    3. Si se observara que los datos personales transmitidos son incorrectos o que se han transmitido ilegalmente, estas circunstancias se pondrán en conocimiento del destinatario sin dilación indebida. En tal caso, los datos deberán rectificarse o suprimirse, o el tratamiento deberá limitarse de conformidad con lo previsto en el artículo 23.

    Artículo 11. Licitud del tratamiento.

    1. El tratamiento sólo será lícito en la medida en que sea necesario para los fines señalados en el artículo 1 y se realice por una autoridad competente en ejercicio de sus funciones.

    2. Cualquier ley que regule tratamientos de datos personales para los fines incluidos dentro del ámbito de aplicación de esta ley orgánica deberá indicar, al menos, los objetivos del tratamiento, los datos personales que vayan a ser objeto del mismo y las finalidades del tratamiento.

    Artículo 12. Condiciones específicas de tratamiento.

    1. Cuando el Derecho de la Unión Europea o la legislación española prevea condiciones específicas aplicables al tratamiento, la autoridad competente transmitente deberá informar al destinatario al que se transmitan los datos, de dichas condiciones y de la obligación de respetarlas.

    2. Las condiciones específicas de tratamiento podrán ser, entre otras, la prohibición de transmisión de datos o de su utilización para fines distintos para los que fueron transmitidos o, en caso de limitación del derecho a la información, la prohibición de dar información al interesado sin la autorización previa de la autoridad transmisora.

    3. La autoridad competente transmitente no aplicará a los destinatarios de otros Estados miembros de la Unión Europea o de organismos, agencias y órganos establecidos en virtud de los capítulos 4 y 5 del título V de la tercera parte del Tratado de Funcionamiento de la Unión Europea, condiciones distintas de las aplicables a las transmisiones de datos similares dentro de España.

    Artículo 13. Tratamiento de categorías especiales de datos personales.

    1. El tratamiento de datos personales que revelen el origen étnico o racial, las opiniones políticas, las convicciones religiosas o filosóficas o la afiliación sindical, así como el tratamiento de datos genéticos, datos biométricos dirigidos a identificar de manera unívoca a una persona física, los datos relativos a la salud o a la vida sexual o a la orientación sexual de una persona física, sólo se permitirá cuando sea estrictamente necesario, con sujeción a las garantías adecuadas para los derechos y libertades del interesado y cuando se cumplan alguna de las siguientes circunstancias:

    a) Se encuentre previsto por una norma con rango de ley o por el Derecho de la Unión Europea.

    b) Resulte necesario para proteger los intereses vitales, así como los derechos y libertades fundamentales del interesado o de otra persona física.

    c) Dicho tratamiento se refiera a datos que el interesado haya hecho manifiestamente públicos.

    2. Las autoridades competentes, en el marco de sus respectivas funciones y competencias, podrán tratar datos biométricos dirigidos a identificar de manera unívoca a una persona física con los fines de prevención, investigación, detección de infracciones penales, incluidas la protección y la prevención frente a las amenazas contra la seguridad pública.

    3. Los datos de los menores de edad y de las personas con capacidad modificada judicialmente o que estén incursas en procesos de dicha naturaleza, se tratarán garantizando el interés superior de los mismos y con el nivel de seguridad adecuado.

    Artículo 14. Mecanismo de decisión individual automatizado.

    1. Están prohibidas las decisiones basadas únicamente en un tratamiento automatizado, incluida la elaboración de perfiles, que produzcan efectos jurídicos negativos para el interesado o que le afecten significativamente, salvo que se autorice expresamente por una norma con rango de ley o por el Derecho de la Unión Europea. La norma habilitante del tratamiento deberá establecer las medidas adecuadas para salvaguardar los derechos y libertades del interesado, incluyendo el derecho a obtener la intervención humana en el proceso de revisión de la decisión adoptada.

    2. Las decisiones a las que se refiere el apartado anterior no se basarán en las categorías especiales de datos personales contempladas en el artículo 13, salvo que se hayan tomado las medidas adecuadas para salvaguardar los derechos y libertades y los intereses legítimos del interesado.

    3. Queda prohibida la elaboración de perfiles que dé lugar a una discriminación de las personas físicas sobre la base de categorías especiales de datos personales establecidas en el artículo 13.

    Sección 2.ª. Tratamiento de datos personales en el ámbito de la videovigilancia por Fuerzas y Cuerpos de Seguridad

    Artículo 15. Sistemas de grabación de imágenes y sonido por las Fuerzas y Cuerpos de Seguridad.

    1. La captación, reproducción y tratamiento de datos personales por las Fuerzas y Cuerpos de Seguridad en los términos previstos en esta ley orgánica, así como las actividades preparatorias, no se considerarán intromisiones ilegítimas en el derecho al honor, a la intimidad personal y familiar y a la propia imagen, a los efectos de lo establecido en el artículo 2.2 de la Ley Orgánica 1/1982, de 5 de mayo, de protección civil del derecho al honor, a la intimidad personal y familiar y a la propia imagen.

    2. En la instalación de sistemas de grabación de imágenes y sonidos se tendrán en cuenta, conforme al principio de proporcionalidad, los siguientes criterios: asegurar la protección de los edificios e instalaciones propias; asegurar la protección de edificios e instalaciones públicas y de sus accesos que estén bajo custodia; salvaguardar y proteger las instalaciones útiles para la seguridad nacional; prevenir, detectar o investigar la comisión de infracciones penales y la protección y prevención frente a las amenazas contra la seguridad pública.

    3. En el caso de que dicha utilización se realice por las Unidades de Policía Judicial se estará a lo dispuesto en la Ley de Enjuiciamiento Criminal y en su normativa de aplicación. En los supuestos de uso destinados al control, regulación, vigilancia y disciplina del tráfico, se llevará a cabo conforme a la normativa específica en la materia.

    Artículo 16. Instalación de sistemas fijos.

    1. En las vías o lugares públicos donde se instalen videocámaras fijas, el responsable del tratamiento deberá realizar una valoración del citado principio de proporcionalidad en su doble versión de idoneidad e intervención mínima. Asimismo, llevar a cabo un análisis de los riesgos o una evaluación de impacto de protección de datos relativo al tratamiento que se pretenda llevar a cabo, en función del nivel de perjuicio que se pueda derivar para la ciudadanía y de la finalidad perseguida.

    2. Esta disposición se aplicará asimismo cuando las Fuerzas y Cuerpos de Seguridad utilicen instalaciones fijas de videocámaras de las que no sean titulares y exista, por su parte, un control y dirección efectiva del proceso completo de tratamiento.

    3. Estas instalaciones fijas de videocámaras no estarán sujetas al control preventivo de las entidades locales previsto en su legislación reguladora básica, ni al ejercicio de las competencias de las diferentes Administraciones públicas, sin perjuicio de que deban respetar los principios de la legislación vigente en cada ámbito material de la actuación administrativa.

    4. Los propietarios y, en su caso, los titulares de derechos reales sobre los bienes afectados por estas instalaciones, o quienes los posean por cualquier título, están obligados a facilitar y permitir su instalación y mantenimiento, sin perjuicio de las indemnizaciones que procedan.

    5. El público será informado de manera clara y permanente de la existencia de estas videocámaras fijas, sin especificar su emplazamiento, así como de la autoridad responsable del tratamiento ante la que poder ejercer sus derechos.

    Artículo 17. Dispositivos móviles.

    cumplimiento de los fines previstos en esta ley orgánica, conforme a las competencias específicas de las Fuerzas y Cuerpos de Seguridad. La toma de imagen y sonido, que ha de ser conjunta, queda supeditada, en todo caso, a la concurrencia de un peligro o evento concreto. El uso de los dispositivos móviles deberá estar autorizado por la persona titular de la Delegación o Subdelegación del Gobierno, quien atenderá a la naturaleza de los eventuales hechos susceptibles de filmación, adecuando la utilización de dichos dispositivos a los principios de tratamiento y al de proporcionalidad.

    En el caso de los Cuerpos de Policía propios de las comunidades autónomas que tengan y ejerzan competencias asumidas para la protección de las personas y bienes y para el mantenimiento del orden público, serán sus órganos correspondientes los que autorizarán este tipo de actuaciones para sus fuerzas policiales, así como para las dependientes de las Corporaciones locales radicadas en su territorio.

    2. En estos supuestos de dispositivos móviles, las autorizaciones no se podrán conceder en ningún caso con carácter indefinido o permanente, siendo otorgadas por el plazo adecuado a la naturaleza y las circunstancias derivadas del peligro o evento concreto, por un periodo máximo de un mes prorrogable por otro.

    3. En casos de urgencia o necesidad inaplazable será el responsable operativo de las Fuerzas y Cuerpos de Seguridad competentes el que podrá determinar su uso, siendo comunicada tal actuación con la mayor brevedad posible, y siempre en el plazo de 24 horas, al Delegado o Subdelegado del Gobierno o autoridad competente de las comunidades autónomas.

    Artículo 18. Tratamiento y conservación de las imágenes.

    1. Realizada la filmación de acuerdo con los requisitos establecidos en esta ley orgánica, si la grabación captara la comisión de hechos que pudieran ser constitutivos de infracciones penales, las Fuerzas y Cuerpos de Seguridad pondrán la cinta o soporte original de las imágenes y sonidos en su integridad, a disposición judicial a la mayor brevedad posible y, en todo caso, en el plazo máximo de setenta y dos horas desde su grabación. De no poder redactarse el atestado en tal plazo, se relatarán verbalmente los hechos a la autoridad judicial, o al Ministerio Fiscal, junto con la entrega de la grabación.

    2. Si se captaran hechos que pudieran ser constitutivos de infracciones administrativas relacionadas con la seguridad pública, se remitirán al órgano competente, de inmediato, para el inicio del oportuno procedimiento sancionador.

    3. Las grabaciones serán destruidas en el plazo máximo de tres meses desde su captación, salvo que estén relacionadas con infracciones penales o administrativas graves o muy graves en materia de seguridad pública, sujetas a una investigación policial en curso o con un procedimiento judicial o administrativo abierto.

    Artículo 19. Régimen disciplinario.

    1. Sin perjuicio de las responsabilidades penales en las que pudieran incurrir, las infracciones a lo dispuesto en esta ley orgánica por los miembros de las Fuerzas y Cuerpos de Seguridad, serán sancionadas con arreglo al régimen disciplinario correspondiente a los infractores y, en su defecto, con sujeción al régimen general de sanciones en materia de protección de datos de carácter personal establecido en esta ley orgánica.

    2. Se considerarán faltas muy graves en el régimen disciplinario de las Fuerzas y Cuerpos de Seguridad del Estado, las siguientes infracciones:

    a) Alterar o manipular los registros de imágenes y sonidos, siempre que no constituya delito.

    b) Permitir el acceso de personas no autorizadas a las imágenes y sonidos grabados o utilizar  éstos para fines distintos de los previstos legalmente.

    c) Reproducir las imágenes y sonidos para fines distintos de los previstos en esta ley orgánica.

    d) Utilizar los medios técnicos regulados en esta ley orgánica para fines distintos de los  previstos en la misma.

    CAPÍTULO III. Derechos de las personas

    Sección 1.ª. Régimen general

    Artículo 20. Condiciones generales de ejercicio de los derechos de los interesados.

    1. El responsable del tratamiento deberá facilitar al interesado, de forma concisa, inteligible, de fácil acceso y con lenguaje claro y sencillo para todas las personas, incluidas aquellas con discapacidad, toda la información contemplada en el artículo 21, así como la derivada de los artículos 14, 22 a 26 y 39.

    Además, el responsable del tratamiento deberá adoptar las medidas necesarias para garantizar al interesado el ejercicio de sus derechos a los que se refieren los artículos 14 y 22 a 26.

    2. El interesado, con capacidad de obrar, podrá actuar en su propio nombre y representación o por medio de representantes, de acuerdo con lo previsto en la normativa sobre el procedimiento administrativo común de las Administraciones Públicas.

    3. La información será facilitada por cualquier medio adecuado, incluidos los medios electrónicos, procurando utilizar el mismo medio empleado en la solicitud.

    4. El responsable del tratamiento informará por escrito al interesado, sin dilación indebida, sobre el curso dado a su solicitud. La solicitud se entenderá desestimada si transcurrido un mes desde su presentación no ha sido resuelta expresamente y notificada al interesado.

    5. La información a la que se refiere el apartado 1 se facilitará gratuitamente. Cuando las solicitudes de un interesado sean manifiestamente infundadas o excesivas, en particular debido a su carácter repetitivo, el responsable del tratamiento podrá inadmitirlas a trámite, mediante resolución motivada.

    El responsable del tratamiento deberá demostrar el carácter manifiestamente infundado o excesivo de la solicitud.

    En todo caso se considerará que la solicitud es repetitiva cuando se realicen tres solicitudes sobre el mismo supuesto durante el plazo de seis meses, salvo que exista causa legítima para ello.

    6. Cuando el responsable del tratamiento tenga dudas razonables acerca de la identidad de la persona física que formula la solicitud a la que se refieren los artículos 22 y 23, le requerirá para que facilite la información complementaria que resulte necesaria para confirmar su identidad en el plazo de diez días. Transcurrido dicho plazo sin que se aporte la información, se le tendrá por desistido de su petición mediante resolución motivada. El plazo de diez días comenzará a contar desde la fecha en que el interesado facilite la información solicitada.

    Artículo 21. Información que debe ponerse a disposición del interesado.

    1. El responsable del tratamiento de los datos pondrá a disposición del interesado, al menos, la siguiente información:

    a) La identificación del responsable del tratamiento y sus datos de contacto.

    b) Los datos de contacto del delegado de protección de datos, en su caso.

    c) Los fines del tratamiento a los que se destinen los datos personales.

    d) El derecho a presentar una reclamación ante la autoridad de protección de datos competente y los datos de contacto de la misma.

    e) El derecho a solicitar del responsable del tratamiento el acceso a los datos personales relativos al interesado y su rectificación, supresión o la limitación de su tratamiento.

    2. Además de la información a la que se refiere el apartado 1, atendiendo a las circunstancias del caso concreto, el responsable del tratamiento proporcionará al interesado la siguiente información adicional para permitir el ejercicio de sus derechos:

    a) La base jurídica del tratamiento.

    b) El plazo durante el cual se conservarán los datos personales o, cuando esto no sea posible, los criterios utilizados para determinar ese plazo.

    c) Las categorías de destinatarios de los datos personales, cuando corresponda, en particular, los establecidos en Estados que no sean miembros de la Unión Europea u organizaciones internacionales.

    d) Cualquier otra información necesaria, en especial, cuando los datos personales se hayan recogido sin conocimiento del interesado.

    Artículo 22. Derecho de acceso del interesado a sus datos personales.

    1. El interesado tendrá derecho a obtener del responsable del tratamiento confirmación de si se están tratando o no datos personales que le conciernen. En caso de que se confirme el tratamiento, el interesado tendrá derecho a acceder a dichos datos personales, así como a la siguiente información:

    a) Los fines y la base jurídica del tratamiento.

    b) Las categorías de datos personales de que se trate.

    c) Los destinatarios o las categorías de destinatarios a quienes hayan sido comunicados los datos personales, en particular, los destinatarios establecidos en Estados que no sean miembros de la Unión Europea u organizaciones internacionales.

    d) El plazo de conservación de los datos personales, cuando sea posible, o, en caso contrario, los criterios utilizados para determinar dicho plazo.

    e) La existencia del derecho a solicitar del responsable del tratamiento la rectificación o supresión de los datos personales relativos al interesado o la limitación de su tratamiento.

    f) El derecho a presentar una reclamación ante la autoridad de protección de datos competente y los datos de contacto de la misma.

    g) La comunicación de los datos personales objeto de tratamiento, así como cualquier información disponible sobre su origen, sin revelar la identidad de ninguna persona física, en especial en el caso de fuentes confidenciales.

    2. Cuando el responsable trate una gran cantidad de información relativa al interesado y éste ejercite su derecho de acceso sin especificar si se refiere a todos o a una parte de los datos, el responsable podrá requerir al interesado que concrete la solicitud en el plazo de diez días.

    3. Se entenderá concedido el derecho de acceso si el responsable del tratamiento facilita al interesado un sistema remoto, directo y seguro que garantice, de modo permanente, el acceso a la totalidad de sus datos personales. La notificación informando al interesado del procedimiento puesto en marcha a través de este sistema, permitirá denegar su solicitud de acceso efectuada por otras vías.

    Si el acceso remoto no facilita la totalidad de la información contenida en el apartado 1, el interesado tendrá derecho a solicitarla.

    4. Cuando el interesado elija un medio distinto al que se le ofrece que suponga un coste

    desproporcionado, la solicitud será considerada excesiva, por lo que dicho interesado asumirá el exceso de coste que su elección comporte. En este caso, sólo será exigible al responsable del tratamiento que la satisfacción del derecho de acceso a través del medio propuesto se produzca sin dilaciones indebidas. Si el interesado no asumiera el exceso de coste, se le facilitará el acceso por el medio inicialmente propuesto por el responsable del tratamiento.

    Artículo 23. Derechos de rectificación, supresión de datos personales y limitación de su tratamiento.

    1. El interesado tendrá derecho a obtener del responsable del tratamiento, sin dilación indebida, la rectificación de los datos personales que le conciernen, cuando tales datos resulten inexactos.

    Teniendo en cuenta los fines del tratamiento, el interesado tendrá derecho a que se completen los datos personales cuando éstos resulten incompletos.

    El interesado deberá indicar en su solicitud a qué datos se refiere y la corrección que haya de realizarse. Deberá acompañar, cuando sea preciso, la documentación justificativa del carácter incompleto o inexacto de los datos objeto de tratamiento.

    2. El responsable del tratamiento, a iniciativa propia o como consecuencia del ejercicio del derecho de supresión del interesado, suprimirá los datos personales sin dilación indebida y, en todo caso, en el plazo máximo de un mes a contar desde que tenga conocimiento, cuando el tratamiento infrinja los artículos 6, 11 o 13, o cuando los datos personales deban ser suprimidos en virtud de una obligación legal a la que esté sujeto.

    3. En lugar de proceder a la supresión, el responsable del tratamiento limitará el tratamiento de los datos personales cuando se dé alguna de las siguientes circunstancias:

    a) El interesado ponga en duda la exactitud de los datos personales y no pueda determinarse su exactitud o inexactitud.

    b) Los datos personales hayan de conservarse a efectos probatorios.

    Cuando el tratamiento esté limitado en virtud de la letra a), el responsable del tratamiento informará al interesado antes de levantar la limitación del tratamiento.

    4. En caso de que el responsable del tratamiento rectifique unos datos personales inexactos que provengan de otra autoridad competente, se deberá comunicar a ésta la rectificación.

    5. Cuando los datos personales hayan sido rectificados o suprimidos o el tratamiento haya sido limitado, el responsable del tratamiento lo notificará a los destinatarios, que deberán rectificar o suprimir los datos personales que estén bajo su responsabilidad o limitar su tratamiento.

    Artículo 24. Restricciones a los derechos de información, acceso, rectificación, supresión de datos personales y a la limitación de su tratamiento.

    1. El responsable del tratamiento podrá aplazar, limitar u omitir la información a la que se refiere el artículo 21.2, así como denegar, total o parcialmente, las solicitudes de ejercicio de los derechos contemplados en los artículos 22 y 23, siempre que, teniendo en cuenta los derechos fundamentales y los intereses legítimos de la persona afectada, resulte necesario y proporcional para la consecución de los siguientes fines:

    a) Impedir que se obstaculicen indagaciones, investigaciones o procedimientos judiciales.

    b) Evitar que se cause perjuicio a la prevención, detección, investigación y enjuiciamiento de infracciones penales o a la ejecución de sanciones penales.

    c) Proteger la seguridad pública.

    d) Proteger la Seguridad Nacional.

    e) Proteger los derechos y libertades de otras personas.

    2. En caso de restricción de los derechos contemplados en los artículos 22 y 23, el responsable del tratamiento informará por escrito al interesado sin dilación indebida, y en todo caso, en el plazo de un mes a contar desde que tenga conocimiento, de dicha restricción, de las razones de la misma, así como de las posibilidades de presentar una reclamación ante la autoridad de protección de datos, sin perjuicio de las restantes acciones judiciales que pueda ejercer en virtud de lo dispuesto en esta ley orgánica.

    Las razones de la restricción podrán ser omitidas o ser sustituidas por una redacción neutra cuando la revelación de los motivos de la restricción pueda poner en riesgo los fines a los que se refiere el apartado anterior.

    3. El responsable del tratamiento documentará los fundamentos de hecho o de derecho en los que se sustente la decisión denegatoria del ejercicio del derecho de acceso. Dicha información estará a disposición de las autoridades de protección de datos.

    Artículo 25. Ejercicio de los derechos del interesado a través de la autoridad de protección de datos.

    1. En los casos en que se produzca un aplazamiento, limitación u omisión de la información a que se refiere el artículo 21 o una restricción del ejercicio de los derechos contemplados en los artículos 22 y 23, en los términos previstos en el artículo 24, el interesado podrá ejercer sus derechos a través de la autoridad de protección de datos competente. El responsable del tratamiento informará al interesado de esta posibilidad.

    2. Cuando, en virtud de lo establecido en el apartado anterior, se ejerciten los derechos a través de la autoridad de protección de datos, ésta deberá informar al interesado, al menos, de la realización de todas las comprobaciones necesarias o la revisión correspondiente y de su derecho a interponer recurso contencioso-administrativo.

    Sección 2.ª. Régimen especial

    Artículo 26. Derechos de los interesados como consecuencia de investigaciones y procesos penales.

    1. El ejercicio de los derechos de información, acceso, rectificación, supresión y limitación del tratamiento a los que se hace referencia en los artículos anteriores se llevará a cabo de conformidad con las normas procesales penales cuando los datos personales figuren en una resolución judicial, o en un registro, diligencias o expedientes tramitados en el curso de investigaciones y procesos penales.

    2. Cuando los datos sean objeto de un tratamiento con fines jurisdiccionales del que sea responsable un órgano del orden jurisdiccional penal, el ejercicio de los derechos de información, acceso, rectificación, supresión y limitación del tratamiento se realizará de conformidad con lo previsto en la Ley Orgánica 6/1985, de 1 de julio, y en las normas procesales.

    3. En defecto de regulación del ejercicio de estos derechos en dichas normas, se aplicará lo dispuesto en esta ley orgánica.

    CAPÍTULO IV. Responsable y encargado de tratamiento

    Sección 1.ª Obligaciones generales

    Artículo 27. Obligaciones del responsable del tratamiento.

    1. El responsable del tratamiento, tomando en consideración la naturaleza, el ámbito, el contexto y los fines del tratamiento, así como los niveles de riesgo para los derechos y libertades de las personas físicas, aplicará las medidas técnicas y organizativas apropiadas para garantizar que el tratamiento se lleve a cabo de acuerdo con esta ley orgánica y con lo previsto en la legislación sectorial y en sus normas de desarrollo. Tales medidas se revisarán y actualizarán cuando resulte necesario.

    2. Entre las medidas mencionadas en el apartado anterior se incluirá la aplicación de las oportunas políticas de protección de datos, cuando sean proporcionadas en relación con las actividades de tratamiento.

    Artículo 28. Protección de datos desde el diseño y por defecto.

    1. En el momento de determinar los medios para el tratamiento, así como en el momento del tratamiento propiamente dicho, deberán aplicarse las medidas técnicas y organizativas que resulten apropiadas conforme al estado de la técnica y el coste de la aplicación, la naturaleza, el ámbito, el contexto, los fines del tratamiento y los riesgos para los derechos y libertades de las personas físicas. El objetivo será salvaguardar los principios de protección de datos de forma efectiva, al tiempo que integrar las garantías necesarias en el tratamiento. Entre estas medidas técnicas, se podrá adoptar la seudonimización de los datos personales a los efectos de contribuir a la aplicación de los principios establecidos en esta ley orgánica, en particular, el de minimización de datos personales.

    2. Además, las medidas técnicas y organizativas deberán garantizar que, por defecto, sólo sean objeto de tratamiento los datos personales que resulten necesarios para cada uno de los fines específicos del tratamiento. Dicha obligación se aplicará a la cantidad de datos personales recogidos, a la extensión de su tratamiento, a su período de conservación y a su accesibilidad.

    Tales medidas garantizarán que, por defecto, los datos personales no sean accesibles a un número indeterminado de personas sin intervención humana.

    Artículo 29. Supuestos de corresponsabilidad en el tratamiento.

    1. Cuando dos o más responsables del tratamiento determinen conjuntamente los objetivos y los medios de tratamiento serán considerados corresponsables del tratamiento.

    2. Salvo que las responsabilidades hayan sido previstas por el Derecho de la Unión Europea o por la legislación española, los corresponsables del tratamiento establecerán, de modo transparente y de mutuo acuerdo, a través del instrumento oportuno, sus respectivas responsabilidades en el cumplimiento de esta ley orgánica, en particular, en lo referido al ejercicio de los derechos del interesado y a sus respectivas obligaciones en el suministro de la información contemplada en el artículo 21.

    El citado acuerdo designará el punto de contacto para los interesados, a menos que venga ya determinado legalmente.

    La concreción de las responsabilidades se realizará atendiendo a las actividades que efectivamente desarrolle cada uno de los corresponsables del tratamiento.

    Artículo 30. Encargado del tratamiento.

    1. Cuando una operación de tratamiento vaya a ser llevada a cabo por cuenta de un responsable del tratamiento, éste recurrirá únicamente a encargados que ofrezcan garantías suficientes para aplicar medidas técnicas y organizativas apropiadas, de manera que el tratamiento sea conforme con los requisitos de esta ley orgánica y garantice la protección de los derechos del interesado.

    El encargado podrá ser una persona física o jurídica, de naturaleza privada o pública.

    2. El encargado del tratamiento no recurrirá a otro encargado sin la autorización previa por escrito del responsable del tratamiento. El encargado informará siempre al responsable de cualquier cambio previsto referido a la adición o sustitución de otros encargados, pudiendo el responsable oponerse a dichos cambios.

    3. El tratamiento por medio de un encargado se regirá por un contrato, convenio u otro instrumento jurídico que corresponda, por escrito, incluyendo la posibilidad del formato electrónico, concluido con arreglo al Derecho de la Unión Europea o a la legislación española. Dicho instrumento jurídico vinculará al encargado con el responsable y fijará el objeto y la duración del tratamiento, su naturaleza y finalidad, el tipo de datos personales y categorías de interesados, así como las obligaciones y derechos del responsable.

    El instrumento jurídico estipulará, en particular, que el encargado del tratamiento deberá:

    a) Actuar únicamente siguiendo las instrucciones del responsable del tratamiento.

    b) Garantizar, a través del instrumento o sistema oportuno, que las personas autorizadas para tratar datos personales se hayan comprometido a respetar la confidencialidad o estén sujetas a una obligación profesional de secreto o confidencialidad.

    c) Asistir al responsable del tratamiento por cualquier medio adecuado para garantizar el cumplimiento de las disposiciones sobre los derechos del interesado.

    d) Suprimir o devolver, a elección del responsable del tratamiento, todos los datos personales al responsable del tratamiento, una vez finalice la prestación de los servicios de tratamiento, así como suprimir las copias existentes, a menos que el Derecho de la Unión Europea o la legislación española requieran la conservación de los datos personales.

    e) Poner a disposición del responsable del tratamiento toda la información necesaria para demostrar el cumplimiento de estas obligaciones.

    f) Respetar las condiciones indicadas en este apartado y en el apartado 2 para contratar a otro encargado del tratamiento.

    4. Si un encargado del tratamiento determinase los fines y medios de dicho tratamiento, infringiendo esta ley orgánica, será considerado responsable con respecto a ese tratamiento.

    5. El encargado del tratamiento se regirá, en lo no previsto por esta ley orgánica, por lo establecido en la Ley Orgánica 3/2018, de 5 de diciembre.

    Artículo 31. Tratamiento bajo la autoridad del responsable o del encargado del tratamiento.

    El encargado del tratamiento, así como cualquier persona que actúe bajo la autoridad del responsable o del encargado del tratamiento y tenga acceso a datos personales, sólo podrá someterlos a tratamiento siguiendo instrucciones del responsable del tratamiento, a menos que esté obligado a hacerlo por el Derecho de la Unión Europea o por la legislación española.

    Artículo 32. Registros de las actividades de tratamiento.

    1. Cada responsable debe conservar un registro de todas las actividades de tratamiento de datos personales efectuadas bajo su responsabilidad. Dicho registro deberá contener la información siguiente:

    a) La identificación del responsable del tratamiento y sus datos de contacto, así como del corresponsable y del delegado de protección de datos.

    b) Los fines del tratamiento.

    c) Las categorías de destinatarios a quienes se hayan comunicado o vayan a comunicarse los datos personales, incluidos los destinatarios en Estados que no sean miembros de la Unión Europea u organizaciones internacionales.

    d) La descripción de las categorías de interesados y de las categorías de datos personales.

    e) El recurso a la elaboración de perfiles, en su caso.

    f) Las categorías de transferencias de datos personales a un Estado que no sea miembro de la Unión Europea o a una organización internacional, en su caso.

    g) La indicación de la base jurídica del tratamiento, así como, en su caso, las transferencias internacionales de las que van a ser objeto los datos personales.

    h) Los plazos previstos para la supresión de las diferentes categorías de datos personales, cuando sea posible.

    i) La descripción general de las medidas técnicas y organizativas de seguridad a las que se refiere el artículo 37.1, cuando sea posible.

    2. Cada encargado del tratamiento llevará un registro de todas las actividades de tratamiento de datos personales efectuadas en nombre de un responsable. Este registro contendrá la información siguiente:

    a) El nombre y los datos de contacto del encargado o encargados del tratamiento, de cada responsable del tratamiento en cuyo nombre actúe el encargado y, en su caso, del delegado de protección de datos.

    b) Las categorías de tratamientos efectuados en nombre de cada responsable.

    c) Las transferencias de datos personales a un Estado que no sea miembro de la Unión Europea o a una organización internacional, en su caso, incluida la identificación de dicho Estado o de dicha organización internacional cuando el responsable del tratamiento así lo ordene explícitamente.

    d) La descripción general de las medidas técnicas y organizativas de seguridad a las que se refiere el artículo 37.1, cuando sea posible.

    3. Los registros referidos en este artículo se establecerán y llevarán por escrito, incluida la posibilidad del formato electrónico.

    Estos registros estarán a disposición de la autoridad de protección de datos competente, a solicitud de ésta, de conformidad con lo dispuesto legalmente.

    4. Los responsables de los tratamientos harán público el registro de sus actividades de tratamiento, accesible por medios electrónicos, en el que constará la información a la que se refiere el apartado 1.

    Artículo 33. Registro de operaciones.

    1. Los responsables y encargados del tratamiento deberán mantener registros de, al menos, las siguientes operaciones de tratamiento en sistemas de tratamiento automatizados: recogida, alteración, consulta, comunicación, incluidas las transferencias, y combinación o supresión. Los registros de consulta y comunicación harán posible determinar la justificación, la fecha y la hora de tales operaciones y, en la medida de lo posible, el nombre de la persona que consultó o comunicó los datos personales, así como la identidad de los destinatarios de dichos datos personales.

    2. Estos registros se utilizarán únicamente a efectos de verificar la legalidad del tratamiento, controlar el cumplimiento de las medidas y de las políticas de protección de datos, garantizar la integridad y la seguridad de los datos personales en el ámbito de los procesos penales.

    Dichos registros estarán a disposición de la autoridad de protección de datos competente a solicitud de ésta, de conformidad con lo dispuesto legalmente.

    Artículo 34. Cooperación con las autoridades de protección de datos.

    El responsable y el encargado del tratamiento cooperarán con la autoridad de protección de datos competente, en el marco de la legislación vigente, cuando ésta lo solicite en el desempeño de sus funciones.

    Artículo 35. Evaluación de impacto relativa a la protección de datos.

    1. Cuando sea probable que un tipo de tratamiento, en particular si utiliza nuevas tecnologías, suponga por su naturaleza, alcance, contexto o fines, un alto riesgo para los derechos y libertades de las personas físicas, el responsable del tratamiento realizará, con carácter previo, una evaluación del impacto de las operaciones de tratamiento previstas en la protección de datos personales.

    2. La evaluación incluirá, como mínimo, una descripción general de las operaciones de tratamiento previstas, una evaluación de riesgos para los derechos y libertades de los interesados, las medidas contempladas para hacer frente a estos peligros, así como las medidas de seguridad y mecanismos destinados a garantizar la protección de los datos personales y a demostrar su conformidad con esta ley orgánica. Esta evaluación tendrá en cuenta los derechos e intereses legítimos de los interesados y de las demás personas afectadas.

    3. Las autoridades de protección de datos podrán establecer una lista de tratamientos que estén sujetos a la realización de una evaluación de impacto con arreglo a lo dispuesto en el apartado anterior y, del mismo modo, podrán establecer una lista de tratamientos que no estén sujetos a esta obligación.

    Ambas listas tendrán un carácter meramente orientativo.

    Artículo 36. Consulta previa a la autoridad de protección de datos.

    1. El responsable o el encargado del tratamiento consultará a la autoridad de protección de datos, antes de proceder al tratamiento de datos personales que vayan a formar parte de un nuevo fichero, en cualquiera de las siguientes circunstancias:

    a) Cuando la evaluación del impacto en la protección de los datos indique que el tratamiento entrañaría un alto nivel de riesgo, a falta de medidas adoptadas por el responsable para mitigar el riesgo o los posibles daños.

    b) Cuando el tipo de tratamiento pueda generar un alto nivel de riesgo para los derechos y libertades de los interesados, en particular, cuando se usen tecnologías, mecanismos o procedimientos nuevos.

    2. La autoridad de protección de datos correspondiente podrá establecer una lista de carácter orientativo, de las operaciones de tratamiento sujetas a consulta previa, con arreglo a lo dispuesto en el apartado anterior.

    3. El responsable del tratamiento facilitará a la autoridad de protección de datos competente, la evaluación de impacto contemplada en el artículo 35 y, previa solicitud, cualquier información adicional que permita a dicha autoridad de protección de datos evaluar la conformidad del tratamiento y, más concretamente, el nivel de riesgo para la protección de los datos personales del interesado y las garantías correspondientes.

    4. Cuando la autoridad de protección de datos considere que el tratamiento previsto en el apartado 1 pudiera infringir lo dispuesto en esta ley orgánica deberá, en un plazo de seis semanas desde la solicitud de la consulta, asesorar por escrito al responsable del tratamiento y, en su caso, al encargado del tratamiento, en especial, cuando el responsable del tratamiento no haya identificado o mitigado suficientemente el peligro o el nivel de riesgo. Asimismo, la autoridad de protección de datos podrá ejercer cualquiera de sus potestades de investigación, corrección o consulta.

    Este plazo podrá prorrogarse un mes, en función de la complejidad del tratamiento previsto. La autoridad de protección de datos informará al responsable y, en su caso, al encargado acerca de la prórroga, en el plazo de un mes a partir de la recepción de la solicitud de consulta, junto con los motivos de la dilación.

    En caso de no contestar a la consulta en el plazo previsto, se estará a lo dispuesto en el artículo 80.3 de la Ley 39/2015, de 1 de octubre.

    Sección 2.ª. Seguridad de los datos personales

    Artículo 37. Seguridad del tratamiento.

    1. El responsable y el encargado del tratamiento, teniendo en cuenta el estado de la técnica y los costes de aplicación, y la naturaleza, el alcance, el contexto y los fines del tratamiento, así como los niveles de riesgo para los derechos y libertades de las personas físicas, aplicarán medidas técnicas y organizativas apropiadas para garantizar un nivel de seguridad adecuado, especialmente en lo relativo al tratamiento de las categorías de datos personales a las que se refiere el artículo 13. En particular, deberán aplicar a los tratamientos de datos personales las medidas incluidas en el Esquema Nacional de Seguridad.

    2. Por lo que respecta al tratamiento automatizado, el responsable o encargado del tratamiento, a raíz de una evaluación de los riesgos, pondrá en práctica medidas de control con el siguiente propósito:

    a) En el control de acceso a los equipamientos, denegar el acceso a personas no autorizadas a los equipamientos utilizados para el tratamiento.

    b) En el control de los soportes de datos, impedir que éstos puedan ser leídos, copiados, modificados o cancelados por personas no autorizadas.

    c) En el control del almacenamiento, impedir que se introduzcan sin autorización datos personales, o que éstos puedan inspeccionarse, modificarse o suprimirse sin autorización.

    d) En el control de los usuarios, impedir que los sistemas de tratamiento automatizado puedan ser utilizados por personas no autorizadas por medio de instalaciones de transmisión de datos.

    e) En el control del acceso a los datos, garantizar que las personas autorizadas a utilizar un sistema de tratamiento automatizado, sólo puedan tener acceso a los datos personales para los que han sido autorizados.

    f) En el control de la transmisión, garantizar que sea posible verificar y establecer a qué organismos se han transmitido o pueden transmitirse, o a cuya disposición pueden ponerse los datos personales mediante equipamientos de comunicación de datos.

    g) En el control de la introducción, garantizar que pueda verificarse y constatarse, a posteriori, qué datos personales se han introducido en los sistemas de tratamiento automatizado, en qué momento y quién los ha introducido.

    h) En el control del transporte, impedir que durante las transferencias de datos personales o durante el transporte de soportes de datos, los datos personales puedan ser leídos, copiados, modificados o suprimidos sin autorización.

    i) En el control de restablecimiento, garantizar que los sistemas instalados puedan restablecerse en caso de interrupción.

    j) En el control de fiabilidad e integridad, garantizar que las funciones del sistema no presenten defectos, que los errores de funcionamiento sean señalados y que los datos personales almacenados no se degraden por fallos de funcionamiento del sistema.

    Artículo 38. Notificación a la autoridad de protección de datos de una violación de la seguridad de los datos personales.

    1. Cualquier violación de la seguridad de los datos personales será notificada por el responsable del tratamiento a la autoridad de protección de datos competente, a menos que sea improbable que la violación de la seguridad de los datos personales constituya un peligro para los derechos y las libertades de las personas físicas.

    La notificación deberá realizarse en el plazo de las setenta y dos horas siguientes al momento en que se haya tenido constancia de ella. En caso contrario, deberá ir acompañada de los motivos de la dilación.

    2. El encargado del tratamiento notificará, sin dilación indebida, al responsable del tratamiento, las violaciones de la seguridad de los datos personales de las que tenga conocimiento.

    3. La notificación contemplada en el apartado 1 deberá, al menos:

    a) Referir la naturaleza de la violación de la seguridad de los datos personales, incluyendo, cuando sea posible, las categorías y el número aproximado de personas afectadas, así como las categorías y el número aproximado de registros de datos personales afectados por la violación de la seguridad.

    b) Comunicar el nombre y los datos de contacto del delegado de protección de datos o de otro punto de contacto en el que pueda obtenerse más información.

    c) Detallar las posibles consecuencias de la violación de la seguridad de los datos personales.

    d) Describir las medidas adoptadas o propuestas por el responsable del tratamiento para poner remedio a la violación de la seguridad de los datos personales, incluyendo, si procede, las medidas adoptadas para mitigar sus posibles efectos negativos.

    4. Si no fuera posible facilitar la información simultáneamente, se podrá facilitar de forma progresiva, a medida que se disponga de ella.

    5. El responsable del tratamiento documentará cualquier violación de la seguridad de los datos personales, incluidos los hechos relativos a dicha violación, sus efectos y las medidas correctivas adoptadas.

    Dicha documentación estará a disposición de la autoridad de protección de datos competente al objeto de verificar el cumplimiento de lo dispuesto en este artículo.

    6. Cuando la violación de la seguridad de los datos personales afecte a datos que hayan sido transmitidos por el responsable del tratamiento o al responsable del tratamiento de otro Estado miembro de la Unión Europea, la información recogida en el apartado 3 se comunicará al responsable del tratamiento de dicho Estado.

    7. Todas las actividades relacionadas en este artículo se realizarán sin dilaciones indebidas.

    Artículo 39. Comunicación de una violación de la seguridad de los datos personales al interesado.

    1. Cuando existan indicios de que una violación de la seguridad de los datos personales supondría un alto riesgo para los derechos y libertades de las personas físicas, el responsable del tratamiento comunicará al interesado, sin dilación indebida, la violación de la seguridad de los datos personales.

    2. La comunicación al interesado describirá con lenguaje claro, sencillo y accesible conforme a sus circunstancias y capacidades, la naturaleza de la violación de la seguridad de los datos personales y contendrá, al menos, la información y las medidas a las que se refiere el artículo 38.3. b), c) y d).

    3. No se efectuará la comunicación al interesado que prevé el apartado 1 cuando se cumpla alguna de las condiciones siguientes:

    a) Que el responsable del tratamiento haya adoptado medidas apropiadas de protección técnica y organizativa y dichas medidas se hayan aplicado a los datos personales afectados por la violación de la seguridad antes de la misma, en particular, aquellas que hagan ininteligibles los datos personales para cualquier persona que no esté autorizada a acceder a ellos, como en el caso del cifrado.

    b) Que el responsable del tratamiento haya tomado medidas ulteriores para garantizar que no se materialice el alto nivel de riesgo para los derechos y libertades del interesado a que hace referencia el apartado 1.

    c) Que suponga un esfuerzo desproporcionado, en cuyo caso, se optará por su publicación en el boletín oficial correspondiente, en la sede electrónica del responsable del tratamiento o en otro canal oficial que permita una comunicación efectiva con el interesado.

    4. En el supuesto de que el responsable del tratamiento no haya comunicado al interesado la violación de la seguridad de los datos personales, la autoridad de protección de datos competente, una vez valorada la existencia de un alto nivel de riesgo, podrá exigirle que proceda a dicha comunicación, o bien que determine la concurrencia de alguna de las condiciones previstas en el apartado 3.

    5. La comunicación al interesado referida en el apartado 1 podrá aplazarse, limitarse u omitirse con sujeción a las condiciones y por los motivos previstos en el artículo 24.

    Sección 3.ª. Delegado de protección de datos

    Artículo 40. Designación del delegado de protección de datos.

    1. Los responsables del tratamiento designarán, en todo caso, un delegado de protección de datos.

    No estarán obligados a designarlo los órganos jurisdiccionales o el Ministerio Fiscal cuando el tratamiento de datos personales se realice en el ejercicio de sus funciones jurisdiccionales.

    2. El delegado de protección de datos será designado atendiendo a sus cualidades profesionales.

    En concreto, se tendrán en cuenta sus conocimientos especializados en legislación, su experiencia en materia de protección de datos y su capacidad para desempeñar las funciones a las que se refiere el artículo 42. En el caso de estar designado un delegado de protección de datos al amparo del Reglamento General de Protección de Datos, este será el que asumirá las funciones de delegado de protección de datos previstas en esta ley orgánica.

    3. Podrá designarse a un único delegado de protección de datos para varias autoridades competentes, teniendo en cuenta la estructura organizativa y el tamaño de éstas.

    4. Los responsables del tratamiento publicarán los datos de contacto del delegado de protección de datos y comunicarán a la autoridad de protección de datos competente su designación y cese, en el plazo de diez días desde que se haya producido.

    Artículo 41. Posición del delegado de protección de datos.

    1. El responsable del tratamiento velará por que el delegado de protección de datos participe adecuada y oportunamente en todas las cuestiones relativas a la protección de datos personales, al tiempo que cuidará de que mantenga sus conocimientos especializados, cuente con los recursos necesarios para el desempeño de sus funciones y acceda a los datos personales y a las operaciones de tratamiento.

    2. El delegado de protección de datos no podrá ser removido ni sancionado por el responsable o el encargado por desempeñar sus funciones, salvo que incurriera en dolo o negligencia grave en su ejercicio.

    Se garantizará la independencia del delegado de protección de datos dentro de la organización, debiendo evitar cualquier conflicto de intereses.

    3. En el ejercicio de sus funciones el delegado de protección de datos tendrá acceso a los datos personales y procesos de tratamiento. La existencia de cualquier deber de confidencialidad o secreto, no permitirá que el responsable o el encargado del tratamiento se oponga a dicho acceso.

    4. Cuando el delegado de protección de datos aprecie la existencia de una vulneración relevante en materia de protección de datos lo documentará y lo comunicará inmediatamente a los órganos de dirección del responsable o del encargado del tratamiento.

    Artículo 42. Funciones del delegado de protección de datos.

    El responsable del tratamiento encomendará al delegado de protección de datos, al menos, las siguientes funciones:

    a) Informar y asesorar al responsable del tratamiento y a los empleados que se ocupen del mismo, acerca de las obligaciones que les incumben en virtud de esta ley orgánica y de otras disposiciones de protección de datos aplicables.

    b) Supervisar el cumplimiento de lo dispuesto en esta ley orgánica y en otras disposiciones de protección de datos aplicables, así como de lo establecido en las políticas del responsable del tratamiento en materia de protección de datos personales, incluidas la asignación de responsabilidades, la concienciación y formación del personal que participe en las operaciones de tratamiento y las auditorías correspondientes.

    c) Ofrecer el asesoramiento que se le solicite acerca de la evaluación de impacto relativa a la protección de datos y supervisar su realización.

    d) Cooperar con la autoridad de protección de datos en los términos de la legislación vigente.

    e) Actuar como punto de contacto de la autoridad de protección de datos para las cuestiones relacionadas con el tratamiento, incluida la consulta previa referida en el artículo 36, y realizar consultas, en su caso, sobre cualquier otro asunto.

    CAPÍTULO V. Transferencias de datos personales a terceros países que no sean miembros de la Unión Europea o a organizaciones internacionales

    Artículo 43. Principios generales de las transferencias de datos personales.

    1. Al objeto de garantizar el nivel de protección de las personas físicas previsto en esta ley orgánica, cualquier transferencia de datos personales realizada por las autoridades competentes españolas a un Estado que no sea miembro de la Unión Europea o a una organización internacional, incluidas las transferencias ulteriores a otro Estado que no pertenezca a la Unión Europea o a otra organización internacional, deberá cumplir las siguientes condiciones:

    a) Que la transferencia sea necesaria para los fines establecidos en el artículo 1.

    b) Que los datos personales sean transferidos a un responsable del tratamiento competente para los fines mencionados en el artículo 1.

    c) Que, en caso de que los datos personales hayan sido transferidos a la autoridad competente española procedentes de otro Estado miembro de la Unión Europea, dicho Estado miembro autorice previamente la transferencia ulterior de conformidad con su Derecho nacional.

    d) Que la Comisión Europea haya adoptado una decisión de adecuación de acuerdo con el artículo 44 o, a falta de dicha decisión, cuando se hayan aportado o existan garantías apropiadas de conformidad con el artículo 45 o, a falta de ambas, cuando resulten de aplicación las excepciones para situaciones específicas de acuerdo con el artículo 46.

    e) Cuando se trate de una transferencia ulterior a un Estado que no sea miembro de la Unión Europea u organización internacional, de datos transferidos inicialmente por una autoridad competente española, ésta autorizará la transferencia ulterior, una vez considerados todos los factores pertinentes, entre éstos, la gravedad de la infracción penal, la finalidad para la que se transfirieron inicialmente los datos personales y el nivel de protección existente en ese Estado u organización internacional a los que se transfieran ulteriormente los datos personales.

    2. Las transferencias de datos personales por las autoridades españolas sin autorización previa de otro Estado miembro, conforme al párrafo 1c), sólo se permitirán si la transferencia de datos personales resulta necesaria para prevenir una amenaza inmediata y grave para la seguridad pública, tanto de un Estado miembro de la Unión Europea como no perteneciente a la misma, o para los intereses fundamentales de un Estado miembro de la Unión Europea, y cuando la autorización previa no pueda conseguirse a su debido tiempo.

    Las autoridades españolas informarán sin dilación a la autoridad responsable de conceder la autorización previa, y en todo caso en el plazo máximo de diez días a contar desde que se haya producido la transferencia.

    3. Se impulsará el establecimiento de mecanismos de cooperación internacional y de asistencia mutua, se fomentará el intercambio de normativa y de buenas prácticas con los Estados que no sean miembros de la Unión Europea y con las organizaciones internacionales, de manera que se facilite la aplicación efectiva de la legislación sobre la protección de datos personales, incluido en el ámbito de la resolución de conflictos jurisdiccionales, procurando la participación de todas las partes interesadas.

    Artículo 44. Transferencias basadas en una decisión de adecuación.

    1. Cuando la Comisión Europea, mediante una decisión de adecuación, haya decidido que un Estado que no sea miembro de la Unión Europea, un territorio o uno o varios sectores específicos de dicho Estado, o la organización internacional de que se trate, garantizan un nivel de protección adecuado, podrán realizarse transferencias de datos personales a ese Estado u organización internacional. Dichas transferencias no requerirán ninguna autorización específica.

    2. Toda decisión de adecuación de la Comisión Europea que determine que un Estado que no sea miembro de la Unión Europea, un territorio o uno o varios sectores específicos de dicho Estado, o una organización internacional ha dejado de garantizar un nivel de protección adecuado, se entenderá sin perjuicio de las transferencias de datos personales a dicho Estado, territorio o sector del mismo o a la organización internacional de que se trate, en virtud de los artículos 45 y 46.

    Artículo 45. Transferencias mediante garantías apropiadas.

    1. En ausencia de una decisión de adecuación de la Comisión Europea conforme al artículo 44 podrán realizarse transferencias de datos personales a un Estado que no sea miembro de la Unión Europea o a una organización internacional cuando concurra alguna de las siguientes circunstancias:

    a) Se hayan aportado garantías apropiadas respecto a la protección de datos personales en un instrumento jurídicamente vinculante.

    b) Se hayan evaluado, por parte del responsable del tratamiento, todas las circunstancias que concurren en la transferencia de datos personales y se haya concluido que existen garantías apropiadas respecto a la protección de datos personales.

    2. El responsable del tratamiento informará a la autoridad de protección de datos competente acerca de las categorías de transferencias a tenor del párrafo 1.b).

    3. Cuando las transferencias se basen en lo dispuesto en el párrafo 1.b) deberán documentarse. La documentación se pondrá a disposición de la autoridad de protección de datos competente, previa solicitud, con inclusión de la siguiente información: fecha, hora de la transferencia, información sobre la autoridad competente destinataria, justificación de la transferencia y datos personales transferidos.

    Artículo 46. Excepciones para situaciones específicas.

    1. En ausencia de una decisión de adecuación de la Comisión Europea o de garantías apropiadas de acuerdo con los artículos 44 y 45, podrán realizarse transferencias de datos personales a un Estado que no sea miembro de la Unión Europea o a una organización internacional cuando la transferencia sea necesaria por concurrir alguna de las siguientes circunstancias:

    a) Para proteger los intereses vitales o los derechos y libertades fundamentales del interesado o de otra persona.

    b) Para salvaguardar intereses legítimos del interesado reconocidos por la legislación española.

    c) Para prevenir una amenaza grave e inmediata para la seguridad pública de un Estado, tanto miembro de la Unión Europea como no perteneciente a la misma.

    d) En casos individuales, a efectos del artículo 1.

    e) Para el ejercicio, en un caso individual, de acciones legales o para la defensa frente a ellas en relación con los fines incluidos en el artículo 1.

    2. Los datos personales no se transferirán, si la autoridad competente de la transferencia determina que los derechos y libertades fundamentales del interesado prevalecen sobre el interés público en la transferencia, establecido en las letras d) y e) del apartado anterior.

    3. Las transferencias basadas en lo dispuesto en este artículo deberán documentarse. Esta documentación quedará a disposición de la autoridad de protección de datos competente, con inclusión de la fecha y la hora de la transferencia, la información sobre la autoridad competente destinataria, la justificación de la transferencia y los datos personales transferidos.

    Artículo 47. Transferencias directas de datos personales a destinatarios, que no sean autoridades competentes, establecidos en Estados no pertenecientes a la Unión Europea.

    1. Excepcionalmente, en casos particulares y específicos y sin perjuicio de la existencia de un acuerdo internacional entre España y un Estado que no sea miembro de la Unión Europea en el ámbito de la cooperación judicial penal o de la cooperación policial, las autoridades competentes españolas podrán transferir datos personales directamente a destinatarios que no tengan la condición de autoridad competente, establecidos en Estados que no sean miembros de la Unión Europea, siempre que se cumplan las disposiciones de esta ley orgánica y se satisfagan todas las condiciones siguientes:

    a) Que la transferencia sea estrictamente necesaria para la realización de una función de la autoridad competente que lleva a cabo la transferencia conforme al Derecho de la Unión Europea o a la legislación española, con cualquiera de los fines del artículo 1.

    b) Que la autoridad competente que realiza la transferencia determine que ninguno de los derechos y libertades fundamentales del interesado son superiores al interés público que precise de la transferencia de que se trate.

    c) Que la autoridad competente que realiza la transferencia considere que la transferencia a una autoridad competente del Estado en el que está establecido el destinatario, con cualquiera de los fines del artículo 1, resultaría ineficaz o inadecuada, en particular porque la transferencia no pueda efectuarse dentro de plazo.

    d) Que se informe sin dilación indebida a la autoridad competente para los fines que contempla el artículo 1 de dicho Estado, salvo que esto resulte ineficaz o inadecuado.

    e) Que la autoridad competente que realiza la transferencia informe al destinatario de la finalidad o finalidades específicas para las que puede tratar los datos personales, siempre y cuando dicho tratamiento sea necesario.

    2. La autoridad competente que realiza la transferencia informará a la autoridad de protección de datos competente acerca de las transferencias efectuadas a tenor de este artículo.

    3. Las transferencias basadas en lo dispuesto en este artículo deberán documentarse.

    CAPÍTULO VI. Autoridades de Protección de Datos Independientes

    Artículo 48. Autoridades de protección de datos.

     A los efectos de esta ley orgánica son autoridades de protección de datos independientes:

    a) La Agencia Española de Protección de Datos.

    b) Las autoridades autonómicas de protección de datos, exclusivamente en relación a aquellos tratamientos de los que sean responsables en su ámbito de competencia, y conforme a lo dispuesto en el artículo 57.1 de la Ley Orgánica 3/2018, de 5 de diciembre.

    Dichas autoridades se regirán por esta ley orgánica respecto de los tratamientos sometidos a la misma, y por lo establecido en el Título VII de la Ley Orgánica 3/2018, de 5 de diciembre, y en sus normas de creación, así como por lo que establezcan sus normas de desarrollo.

    La Agencia Española de Protección de Datos actuará como representante de las autoridades de protección de datos en el Comité Europeo de Protección de Datos.

    Artículo 49. Funciones.

    1. Las autoridades de protección de datos ejercerán, respecto de los tratamientos sometidos a esta ley orgánica, las siguientes funciones:

    a) Supervisar y hacer cumplir las disposiciones adoptadas con arreglo a esta ley orgánica.

    b) Promover la sensibilización y la comprensión del público acerca de los riesgos, normas, garantías y derechos relativos al tratamiento.

    c) Asesorar a las Cortes Generales, al Gobierno de la Nación y a los organismos dependientes o vinculados a la Administración General del Estado, así como, de acuerdo con su ámbito competencial, a las Asambleas Legislativas de las comunidades autónomas, los Consejos de Gobierno y los organismos dependientes o vinculados a la Administración de las comunidades autónomas, acerca de las medidas legislativas y administrativas relativas a la protección de los derechos y libertades de las personas físicas con respecto al tratamiento.

    d) Promover la sensibilización de los responsables y encargados del tratamiento en relación con las obligaciones que les incumben.

    e) Facilitar la información solicitada por los interesados sobre el ejercicio de sus derechos en virtud de esta ley orgánica y, en su caso, cooperar a tal fin con las autoridades de protección de datos de otros Estados miembros de la Unión Europea.

    f) Tramitar y responder las reclamaciones presentadas por un interesado o por una entidad, organización o asociación de conformidad con el artículo 55, e investigar, en la medida oportuna, el motivo de la reclamación e informar al reclamante sobre el curso y el resultado de la investigación en un plazo razonable.

    g) Controlar, de acuerdo con lo dispuesto en el artículo 25, la licitud del tratamiento e informar al interesado en un plazo razonable sobre el resultado del control o sobre los motivos por los que no se ha llevado a cabo.

    h) Cooperar, en particular compartiendo información, con otras autoridades de protección de datos y prestarse asistencia mutua.

    i) Llevar a cabo investigaciones sobre la aplicación de esta ley orgánica, en particular basándose en la información recibida de otra autoridad de protección de datos u otra autoridad pública.

    j) Realizar un seguimiento de acontecimientos que sean de interés, en la medida en que tengan incidencia en la protección de datos personales, de manera concreta sobre el desarrollo de las tecnologías de la información y la comunicación.

    k) Prestar asesoramiento sobre las operaciones de tratamiento contempladas en el artículo 36.

    l) Contribuir a las actividades del Comité Europeo de Protección de Datos.

    m) Informar todas las disposiciones legales o reglamentarias que afecten a tratamientos sometidos a esta ley orgánica.

    2. Las autoridades de protección de datos adoptarán medidas tendentes a facilitar la formulación de las reclamaciones incluidas en el párrafo 1f), tales como proporcionar formularios que puedan cumplimentarse electrónicamente, sin excluir otros medios.

    3. El desempeño de las funciones de las autoridades de control no implicará coste alguno para el interesado ni para el delegado de protección de datos.

    4. Cuando las solicitudes sean manifiestamente infundadas o excesivas, especialmente debido a su carácter repetitivo, la autoridad de protección de datos podrá negarse a actuar respecto de la solicitud. La carga de la demostración del carácter manifiestamente infundado o excesivo de la solicitud recaerá en la autoridad de protección de datos.

    Artículo 50. Potestades.

    Las autoridades de protección de datos tendrán atribuidas, en el ámbito de esta ley orgánica, las siguientes potestades:

    a) De investigación, incluyendo el acceso a todos los datos que estén siendo tratados por el responsable o el encargado del tratamiento, en los términos previstos por la legislación vigente.

    b) De advertencia y control de lo exigido en esta ley orgánica, incluida la sanción de las infracciones cometidas, la elaboración de recomendaciones, órdenes de rectificación, supresión o limitación del tratamiento de datos personales o de limitación temporal o definitiva del tratamiento, incluida su prohibición, así como la orden a los responsables del tratamiento de comunicar las vulneraciones de seguridad de los datos a los interesados.

    c) De asesoramiento, que comprende la consulta previa prevista en el artículo 36 y la emisión, por propia iniciativa o previa solicitud, de dictámenes destinados a las Cortes Generales o al Gobierno, a otras instituciones u organismos, así como al público en general, acerca de todo asunto relacionado con la protección de datos personales sujeto a esta ley orgánica.

    Artículo 51. Asistencia entre autoridades de protección de datos de los Estados miembros de la Unión Europea.

    1. Las autoridades de protección de datos españolas facilitarán la asistencia y cooperación necesaria a las autoridades de protección de datos de otros Estados miembros de la Unión Europea, debiendo responder a las solicitudes de éstas sin dilación indebida, y en cualquier caso, en el plazo máximo de un mes desde su recepción. La asistencia mutua abarcará, en particular, las solicitudes de información y las medidas de control, así como las solicitudes para llevar a cabo consultas, inspecciones e investigaciones.

    2. Las autoridades de protección de datos españolas podrán solicitar, en el ejercicio de sus funciones, la asistencia y cooperación de las autoridades de protección de datos de otros Estados miembros de la Unión Europea.

    Las solicitudes deberán contener toda la información necesaria para su contestación, incluidos los motivos y la finalidad de la solicitud. La información intercambiada se utilizará únicamente para el fin para el que haya sido solicitada.

    3. Las contestaciones de las autoridades de protección de datos españolas deberán indicar los resultados obtenidos o las medidas adoptadas con base en la solicitud recibida. Estas respuestas serán remitidas en formato electrónico, en la medida de lo posible.

    4. La solicitud de asistencia procedente de una autoridad de protección de datos de un Estado miembro de la Unión Europea únicamente podrá negarse a ser atendida, de manera motivada, cuando la autoridad de protección de datos española no sea competente respecto al objeto o a las medidas solicitadas, o bien cuando el hecho de atender la solicitud vulnere la legislación española o el Derecho de la Unión Europea. Se informará, en su caso, de la restricción de los derechos del interesado adoptada en aplicación del artículo 24.

    5. Las medidas adoptadas con ocasión de una solicitud de asistencia mutua serán gratuitas, sin perjuicio de que en circunstancias excepcionales puedan pactarse indemnizaciones por gastos específicos derivados de la prestación de la asistencia.

    CAPÍTULO VII. Reclamaciones

    Artículo 52. Régimen aplicable a los procedimientos tramitados ante las autoridades de protección de datos.

    1. En el caso de que los interesados aprecien que el tratamiento de los datos personales haya infringido las disposiciones de esta ley orgánica o no haya sido atendida su solicitud de ejercicio de los derechos reconocidos en los artículos 21, 22 y 23 tendrán derecho a presentar una reclamación ante la autoridad de protección de datos.

    2. Dichas reclamaciones serán tramitadas por la autoridad de protección de datos competente con sujeción al procedimiento establecido en el título VIII de la Ley Orgánica 3/2018, de 5 de diciembre, y, en su caso, a la legislación de las comunidades autónomas que resulte de aplicación.

    3. Tales procedimientos tramitados por la autoridad de protección de datos competente se regirán por lo dispuesto en el Reglamento General de Protección de Datos, la Ley Orgánica 3/2018, de 5 de diciembre, y las disposiciones reglamentarias dictadas en su desarrollo y, con carácter supletorio, por la normativa de procedimiento administrativo común de las Administraciones públicas.

    4. Todo interesado tendrá derecho a interponer recurso contencioso-administrativo, de acuerdo con su normativa reguladora, en caso de que la autoridad de protección de datos competente no dicte resolución expresa y se la notifique no dé curso en el plazo de tres meses.

    Artículo 53. Derecho a indemnización por entes del sector público.

    1. Los interesados tendrán derecho a ser indemnizados por el responsable del tratamiento, o por el encargado del tratamiento cuando formen parte del sector público, en el caso de que sufran daño o lesión en sus bienes o derechos como consecuencia del incumplimiento de lo dispuesto en esta ley orgánica.

    2. Cuando quien incumpla lo dispuesto en esta ley orgánica tenga la consideración de administración pública, la responsabilidad se exigirá de acuerdo con la legislación reguladora del régimen de responsabilidad previsto en la normativa sobre el procedimiento administrativo común de las Administraciones públicas y sobre el régimen jurídico del sector público.

    3. Cuando quien incumpla esta ley orgánica tenga la consideración de autoridad judicial o del Ministerio Fiscal, la responsabilidad se exigirá conforme a lo previsto en la Ley Orgánica 6/1985, de 1 de julio.

    Artículo 54. Derecho a indemnización por encargados del tratamiento del sector privado.

    1. Los interesados que sufran daño o lesión en sus bienes o derechos por parte del encargado del tratamiento que no forme parte del sector público, como consecuencia del incumplimiento de lo dispuesto en esta ley orgánica, tendrán derecho a ser indemnizados.

    2. El encargado del tratamiento estará obligado a indemnizar todos los daños y perjuicios que cause a los interesados o a terceros como resultado de las operaciones de tratamientos de datos previstas en el contrato u otro instrumento acto jurídico suscrito con el responsable del tratamiento conforme al artículo 30, de conformidad con el régimen de responsabilidad del contratista por los daños causados por terceros regulado en la normativa sobre contratos del sector público.

    3. Cuando tales daños y perjuicios hayan sido ocasionados como consecuencia inmediata y directa de una orden de la autoridad competente responsable del tratamiento, será ésta la responsable.

    4. Los interesados o los terceros perjudicados podrán requerir al responsable del tratamiento, dentro del año siguiente a la producción del hecho, para que informe, una vez oído el encargado del tratamiento, acerca de cuál de las partes contratantes o de las que hayan suscrito el acto jurídico conforme al artículo 30, corresponde la responsabilidad de los daños. El ejercicio de esta facultad interrumpe el plazo de prescripción de la acción.

    5. Con independencia de lo previsto en los apartados anteriores, el encargado del tratamiento que no forme parte del sector público responderá de los daños y perjuicios que durante las operaciones de tratamiento de datos cause. Deberá hacerlo tanto respecto del responsable del tratamiento, como respecto del interesado o de terceros por incumplimientos de esta ley orgánica, de infracciones de preceptos legales o reglamentarios, o por el incumplimiento de las previsiones contenidas en el contrato o en otro acto jurídico suscrito. El encargado del tratamiento que no forme parte del sector público deberá haber incurrido en actuaciones que le sean imputables, sin perjuicio de la aplicación del régimen sancionador, en su caso.

    Artículo 55. Tutela judicial efectiva.

    1. Sin perjuicio de cualquier otro recurso administrativo, toda persona física o jurídica tendrá derecho a recurrir ante la jurisdicción contencioso-administrativa, de acuerdo con su legislación reguladora, contra los actos y resoluciones dictadas por la autoridad de protección de datos competente.

    2. El interesado podrá conferir su representación a una entidad, organización o asociación sin ánimo de lucro que haya sido correctamente constituida, cuyos objetivos estatutarios sean de interés público y que actúe en el ámbito de la protección de los derechos y libertades de los interesados en materia de protección de sus datos personales, para que ejerza los derechos contemplados en el apartado anterior.

    CAPÍTULO VIII. Régimen sancionador

    Artículo 56. Sujetos responsables.

    1. La responsabilidad por las infracciones cometidas recaerá directamente en los sujetos obligados que, por acción u omisión, realizaran la conducta en que consista la infracción.

    2. Están sujetos al régimen sancionador:

    a) Los responsables de los tratamientos.

    b) Los encargados de los tratamientos.

    c) Los representantes de los encargados no establecidos en el territorio de la Unión Europea.

    d) El resto de las personas físicas o jurídicas obligadas por el contenido del deber de colaboración establecido en el artículo 7.

    3. No será de aplicación el régimen sancionador establecido en este capítulo al delegado de protección de datos.

    Artículo 57. Concurso de normas.

    1. Los hechos susceptibles de ser calificados con arreglo a dos o más preceptos de esta u otra ley, siempre que no constituyan infracciones al Reglamento General de Protección de Datos, ni a la Ley Orgánica 3/2018, de 5 de diciembre, se sancionarán observando las siguientes reglas:

    a) El precepto especial se aplicará con preferencia al general.

    b) El precepto más amplio o complejo absorberá el que sancione las infracciones subsumidas en aquél.

    c) En defecto de los criterios anteriores, se aplicará el precepto que sancione los hechos con la sanción mayor.

    2. En el caso de que un solo hecho constituya dos o más infracciones, o cuando una de ellas sea medio necesario para cometer la otra, la conducta será sancionada por aquella infracción que conlleve una mayor sanción.

    Artículo 58. Infracciones muy graves.

    Son infracciones muy graves:

    a) El tratamiento de datos personales que vulnere los principios y garantías establecidos en el artículo 6 o sin que concurra alguna de las condiciones de licitud del tratamiento establecidas en el artículo 11, siempre que se causen perjuicios de carácter muy grave a los interesados.

    b) El acceso, cesión, alteración y divulgación de los datos al margen de los supuestos autorizados por el responsable o encargado de los datos, siempre que no constituya ilícito penal.

    c) La transferencia temporal o definitiva de datos de carácter personal con destino a Estados que no sean miembros de la Unión Europea o a destinatarios que no sean autoridades competentes, establecidos en dichos Estados incumpliendo las condiciones previstas en los artículos 43 y 47.

    d) La utilización de los datos para una finalidad que no sea compatible con el objetivo para el que fueron recogidos o cuando no se cumplan las condiciones establecidas en el artículo 6, siempre que no se cuente con una base legal para ello.

    e) El tratamiento de datos personales de las categorías especiales sin que concurra alguna de las circunstancias previstas en el artículo 13 o sin garantizar las medidas de seguridad adecuadas, que cause perjuicios graves a los interesados.

    f) La omisión del deber de informar al interesado acerca del tratamiento de sus datos de carácter personal conforme a lo dispuesto en esta ley orgánica.

    g) La vulneración del deber de confidencialidad del encargado del tratamiento, establecido en el artículo 30.

    h) La adopción de decisiones individuales automatizadas sin las garantías señaladas en el artículo 14, siempre que se causen perjuicios de carácter muy grave para los interesados.

    i) El impedimento, la obstaculización o la falta de atención reiterada del ejercicio de los derechos del interesado de acceso, rectificación, supresión de sus datos o limitación del tratamiento, siempre que se causen perjuicios de carácter muy grave para los interesados.

    j) La negativa a proporcionar a las autoridades competentes la información necesaria para la prevención, detección, investigación y enjuiciamiento de infracciones penales, para la ejecución de sanciones penales o para la protección y prevención frente a las amenazas contra la seguridad pública de acuerdo con lo previsto en el artículo 7, así como informar al interesado cuando se comuniquen sus datos en virtud del deber de colaboración establecido en dicho artículo.

    k) La resistencia u obstrucción del ejercicio de la función inspectora de las autoridades de protección de datos competentes.

    l) La falta de notificación a las autoridades de protección de datos competentes acerca de una violación de la seguridad de los datos personales, cuando sea exigible, así como la ausencia de comunicación al interesado de una violación de la seguridad cuando sea procedente de acuerdo con el artículo 39, siempre que se deriven perjuicios de carácter muy grave para el interesado.

    m) El incumplimiento de las resoluciones dictadas por las autoridades de protección de datos competentes, en el ejercicio de las potestades que le confiere el artículo 50.

    n) No facilitar el acceso del personal de las autoridades de protección de datos competentes a los datos personales, información, locales, equipos y medios de tratamiento, cuando sean requeridos por las mismas, en el ejercicio de sus poderes de investigación.

    Artículo 59. Infracciones graves.

    Son infracciones graves:

    a) El incumplimiento de los plazos de conservación y revisión establecidos en virtud del artículo 8.

    b) El tratamiento de los datos de carácter personal cuando se incumplan los principios del artículo 6 o las condiciones de licitud del tratamiento del artículo 9, siempre que no constituya una infracción muy grave.

    c) El tratamiento de datos personales de las categorías especiales sin que concurra alguna de las circunstancias previstas en el artículo 13 o sin garantizar las medidas de seguridad adecuadas, siempre que no constituya una infracción muy grave.

    d) La adopción de decisiones individuales automatizadas sin las garantías señaladas en el artículo 14, siempre que no constituya una infracción muy grave.

    e) La falta de designación de un delegado de protección de datos en los términos previstos en el artículo 40 o no posibilitar la efectiva participación del mismo en todas las cuestiones relativas a la protección de datos personales, no respaldarlo o interferir en el desempeño de sus funciones.

    f) El incumplimiento de la puesta a disposición al interesado de la información prevista en el artículo 21 o del deber de comunicación al mismo, o a la autoridad de protección de datos competente, de una violación de la seguridad de los datos, que entrañe un grave perjuicio para los derechos y libertades del interesado.

    g) La ausencia de adopción de aquellas medidas técnicas y organizativas que resulten apropiadas para aplicar de forma efectiva los principios de protección de datos, incluidas las medidas oportunas desde el diseño y por defecto, así como para integrar las garantías necesarias en el tratamiento.

    h) El impedimento, la falta de atención o la obstaculización de los derechos del interesado de acceso, rectificación, supresión de sus datos o limitación del tratamiento, siempre que no constituya infracción muy grave.

    i) El incumplimiento de la obligación de llevanza de los registros de actividades de tratamiento o del registro de operaciones de tratamiento, si se causan perjuicios de carácter grave a los interesados.

    j) El incumplimiento de las estipulaciones recogidas en el contrato u acto jurídico que vincula al responsable y al encargado del tratamiento, salvo en los supuestos en que fuese necesario para evitar la infracción de la legislación en materia de protección de datos y se hubiese advertido de ello al responsable o al encargado del tratamiento, así como el incumplimiento de las obligaciones impuestas en el artículo 30.

    k) La falta de colaboración diligente con las autoridades competentes en el cumplimiento de las obligaciones establecidas en el artículo 7, cuando no constituya una infracción muy grave.

    l) La falta de cooperación, la actuación negligente o el impedimento de la función inspectora de las autoridades de protección de datos competentes, cuando no constituya infracción muy grave.

    m) El incumplimiento de la evaluación de impacto en la protección de los datos de carácter personal, si se derivan perjuicios o riesgos de carácter grave para los interesados.

    n) El tratamiento de datos personales sin haber consultado previamente a la autoridad de protección de datos competente, en los casos en que dicha consulta resulte preceptiva conforme al artículo 36.

    Artículo 60. Infracciones leves.

    Son infracciones leves:

    a) La afectación leve de los derechos de los interesados como consecuencia de la ausencia de la debida diligencia o del carácter inadecuado o insuficiente de las medidas técnicas y organizativas que se hubiesen implantado.

    b) El incumplimiento del principio de transparencia de la información o del derecho de información del interesado establecido en el artículo 21 cuando no se facilite toda la información exigida en esta ley orgánica.

    c) La inobservancia de la obligación de informar al interesado y a los destinatarios a los que se hayan comunicado o de los que procedan los datos personales rectificados, suprimidos o respecto de los que se haya limitado el tratamiento, conforme a lo establecido en el artículo 23.

    d) El incumplimiento de la llevanza de registros de actividades de tratamiento o del registro de operaciones o que los mismos no incorporen toda la información exigida legalmente, siempre que no constituya infracción grave.

    e) El incumplimiento de la obligación de suprimir los datos referidos a una persona fallecida cuando fuera exigible legalmente.

    f) La falta de formalización por los corresponsables del tratamiento del acuerdo que determine las obligaciones, funciones y responsabilidades respectivas, a propósito del tratamiento de datos personales y de sus relaciones con los interesados, así como la inexactitud o la falta de concreción en la determinación de las mismas.

    g) El incumplimiento de la obligación del encargado del tratamiento de informar al responsable del tratamiento acerca de una posible infracción de las disposiciones de esta ley orgánica, como consecuencia de una instrucción recibida de éste.

    h) La notificación incompleta o defectuosa a la autoridad de protección de datos competente de la información relacionada con una violación de seguridad de los datos personales, el incumplimiento de la obligación de documentarla o del deber de comunicar al interesado su existencia, cuando que no constituya una infracción grave.

    i) La aportación de información inexacta o incompleta a la autoridad de protección de datos competente, en los supuestos en los que el responsable del tratamiento deba elevarle una consulta previa.

    j) La falta de publicación de los datos de contacto del delegado de protección de datos, o la ausencia de comunicación de su designación y cese a la autoridad de protección de datos competente, de conformidad con el artículo 40, cuando su nombramiento sea exigible de acuerdo con esta ley orgánica.

    Artículo 61. Régimen jurídico.

    El ejercicio de la potestad sancionadora se regirá por lo dispuesto en el presente capítulo, por los títulos VII y IX de la Ley Orgánica 3/2018, de 5 de diciembre, y, en cuanto no las contradigan, con carácter supletorio, por la normativa de procedimiento administrativo común de las Administraciones públicas.

    Artículo 62. Sanciones.

    Por la comisión de las infracciones tipificadas en esta ley orgánica se impondrán las siguientes sanciones:

    1. En caso de que el sujeto responsable sea algunos de los enumerados en el artículo 77.1 de la Ley Orgánica 3/2018, de 5 de diciembre, se impondrán las sanciones y se adoptarán las medidas establecidas en dicho artículo.

    2. En caso de que el sujeto infractor sea distinto de los señalados en el artículo 77.1 de la Ley Orgánica 3/2018, de 5 de diciembre, podrá ser sancionado, con multa de la siguiente cuantía:

    a) Las infracciones muy graves, con multa de 360.001 a 1.000.000 euros.

    b) Las infracciones graves, con multa de 60.001 a 360.000 euros.

    c) Las leves, con multa de 6.000 a 60.000 euros.

    A efectos de la determinación de la cuantía de la sanción, se tendrán en cuenta los criterios establecidos en el artículo 83.2 del Reglamento General de Protección de Datos y en el artículo 76.2 de la Ley Orgánica 3/2018, de 5 de diciembre.

    Artículo 63. Prescripción de las infracciones y sanciones.

    1. Las infracciones administrativas tipificadas en esta ley orgánica prescribirán a los seis meses, a los dos o a los tres años de haberse cometido, según sean leves, graves o muy graves, respectivamente.

    Los plazos señalados en esta ley orgánica se computarán desde el día en que se haya cometido la infracción. No obstante, en los casos de infracciones continuadas y de infracciones de efectos permanentes, los plazos se computarán, respectivamente, desde el día en que se realizó la última infracción y desde que se eliminó la situación ilícita.

    Interrumpirá la prescripción la iniciación, con conocimiento del interesado, del procedimiento sancionador, reiniciándose el plazo de prescripción si el expediente sancionador estuviere paralizado durante más de seis meses por causas no imputables al presunto infractor.

    Se interrumpirá igualmente la prescripción como consecuencia de la apertura de un procedimiento judicial penal, hasta que la autoridad judicial comunique al órgano administrativo su finalización.

    2. Las sanciones impuestas por infracciones muy graves prescribirán a los tres años, las impuestas por infracciones graves, a los dos años, y las impuestas por infracciones leves al año, computados desde el día siguiente a aquel en que adquiera firmeza en vía administrativa la resolución por la que se impone la sanción.

    La prescripción se interrumpirá por la iniciación, con conocimiento del interesado, del procedimiento de ejecución, volviendo a transcurrir el plazo si el mismo está paralizado durante más de seis meses por causa no imputable al infractor.

    Artículo 64. Caducidad del procedimiento.

    1. El procedimiento caducará transcurridos seis meses desde su incoación sin que se haya notificado la resolución, debiendo, no obstante, tenerse en cuenta en el cómputo las posibles paralizaciones por causas imputables al interesado o la suspensión que debiera acordarse por la existencia de un procedimiento judicial penal, cuando concurra identidad de sujeto, hecho y fundamento, hasta la finalización de éste.

    2. La resolución que declare la caducidad se notificará al interesado y pondrá fin al procedimiento, sin perjuicio de que la administración pueda acordar la incoación de un nuevo procedimiento en tanto no haya prescrito la infracción. Los procedimientos caducados no interrumpirán el plazo de prescripción.

    Artículo 65. Carácter subsidiario del procedimiento administrativo sancionador respecto del penal.

    1. No podrán sancionarse los hechos que hayan sido sancionados penal o administrativamente cuando se aprecie identidad de sujeto, de hecho y de fundamento.

    2. En los supuestos en que las conductas pudieran ser constitutivas de delito, el órgano administrativo pasará el tanto de culpa a la autoridad judicial o al Ministerio Fiscal y se abstendrá de seguir el procedimiento sancionador mientras la autoridad judicial no dicte sentencia firme o resolución que de otro modo ponga fin al procedimiento penal, o el Ministerio Fiscal no acuerde la improcedencia de iniciar o proseguir las actuaciones en vía penal, quedando hasta entonces interrumpido el plazo de prescripción.

    La autoridad judicial y el Ministerio Fiscal comunicarán al órgano administrativo la resolución o acuerdo que hubieran adoptado.

    3. De no haberse estimado la existencia de ilícito penal, o en el caso de haberse dictado resolución de otro tipo que ponga fin al procedimiento penal, podrá iniciarse o proseguir el procedimiento sancionador.

    En todo caso, el órgano administrativo quedará vinculado por los hechos declarados probados en vía judicial.

    4. Las medidas cautelares adoptadas antes de la intervención judicial podrán mantenerse mientras la autoridad judicial no resuelva otra cosa.

    Disposición adicional primera. Regímenes específicos.

    1. El tratamiento de los datos personales procedentes de las imágenes y sonidos obtenidos mediante la utilización de cámaras y videocámaras por las Fuerzas y Cuerpos de Seguridad y por los órganos competentes para la vigilancia y control en los centros penitenciarios y para el control, regulación, vigilancia y disciplina del tráfico, para los fines previstos en al artículo 1, se regirá por esta ley orgánica, sin perjuicio de los requisitos establecidos en regímenes legales especiales que regulan otros ámbitos concretos como el procesal penal, la regulación del tráfico o la protección de instalaciones propias.

    2. El tratamiento de los datos personales procedentes de las imágenes y sonidos obtenidos mediante la utilización de cámaras y videocámaras por las Fuerzas y Cuerpos de Seguridad y por los órganos competentes para la vigilancia y control en los centros penitenciarios y para el control, regulación, vigilancia y disciplina del tráfico, para fines distintos de los previstos en el artículo 1, se regirá por lo dispuesto en la Ley Orgánica 4/1997, de 4 de agosto, por la que se regula la utilización de videocámaras por las Fuerzas y Cuerpos de Seguridad en lugares públicos, y en su Reglamento de desarrollo y ejecución, aprobado por el Real Decreto 596/1999, de 16 de abril, en todo aquello que no se oponga a lo dispuesto en esta ley orgánica.

    Disposición adicional segunda. Intercambio de datos dentro de la Unión Europea.

    El intercambio de datos personales por parte de las autoridades competentes españolas en el interior de la Unión Europea, cuando el Derecho de la Unión Europea o la legislación española exijan dicho intercambio, no estará limitado ni prohibido por motivos relacionados con la protección de las personas físicas respecto al tratamiento de sus datos personales.

    Disposición adicional tercera. Acuerdos internacionales en el ámbito de la cooperación judicial en materia penal y de la cooperación policial.

    Los acuerdos internacionales en el ámbito de la cooperación judicial en materia penal y de la cooperación policial que impliquen la transferencia de datos personales a Estados que no sean miembros de la Unión Europea u organizaciones internacionales y que hubieran sido celebrados por España antes del 6 de mayo de 2016, cumpliendo lo dispuesto en el Derecho de la Unión Europea aplicable antes de dicha fecha, seguirán en vigor hasta que sean objeto de modificación, enmienda o terminación.

    Disposición adicional cuarta. Ficheros y Registro de Población de las Administraciones Públicas.

    1. Las autoridades competentes podrán solicitar al Instituto Nacional de Estadística y a los órganos estadísticos de ámbito autonómico, sin consentimiento del interesado, una copia actualizada del fichero formado con los datos del documento de identidad, nombre, apellidos, domicilio, sexo y fecha de nacimiento que constan en el padrón municipal de habitantes y en el censo electoral correspondiente a los territorios donde ejerzan sus competencias. Esta solicitud deberá estar motivada en base a cualquiera de los fines de prevención, detección, investigación y enjuiciamiento de infracciones penales o de ejecución de sanciones penales, incluidas la protección y la prevención frente a las amenazas contra la seguridad pública.

    2. Los datos obtenidos tendrán como único propósito el cumplimiento de los fines de prevención, detección, investigación y enjuiciamiento de infracciones penales o de ejecución de sanciones penales, así como de protección y de prevención frente a las amenazas contra la seguridad pública y la comunicación de estas autoridades con los interesados residentes en los respectivos territorios, respecto a las relaciones jurídico-administrativas derivadas de las competencias respectivas.

    Disposición adicional quinta. Referencias normativas.

    Las referencias contenidas en normas vigentes en relación a las disposiciones que se derogan expresamente, deberán entenderse efectuadas a los artículos de esta ley orgánica que regulan la misma materia que aquéllas.

    Disposición derogatoria única. Derogación normativa.

    Quedan derogadas todas las normas de igual o inferior rango en lo que contradigan o se opongan a lo dispuesto en esta ley orgánica.

    Disposición final primera. Modificación de la Ley Orgánica 1/1979, de 26 de septiembre, General Penitenciaria.

    Se introduce un nuevo artículo 15 bis en la Ley Orgánica 1/1979, de 26 de septiembre, General Penitenciaria, que queda redactado como sigue:

    «Artículo 15 bis. Tratamientos de datos de carácter personal.

    1. Admitido en el establecimiento un interno, se procederá a verificar su identidad personal, efectuando la reseña alfabética, dactilar y fotográfica, así como a la inscripción en el libro de ingresos y a la apertura de un expediente personal relativo a su situación procesal y penitenciaria, respecto del que se reconoce el derecho de acceso. Este derecho sólo se verá limitado de forma individualizada y fundamentada en concretas razones de seguridad o tratamiento.

    2. El tratamiento de los datos personales de los internos se regirá por lo previsto en la Ley Orgánica de protección de datos personales tratados para fines de prevención, detección, investigación y enjuiciamiento de infracciones penales y de ejecución de sanciones penales, así como de protección y de prevención frente a las amenazas contra la seguridad pública. Los datos personales de categorías especiales que no figuren en el apartado anterior se podrán tratar con el consentimiento del interesado. Sólo se prescindirá de dicho consentimiento cuando sea estrictamente necesario y se efectúe con las garantías adecuadas para proteger el derecho a la protección de datos de los interesados, atendiendo al tipo de datos que se traten y a las finalidades de los distintos tratamientos dirigidos a la ejecución de la pena.

    3. Igualmente se procederá al cacheo de su persona y al registro de sus efectos, retirándose los enseres y objetos no autorizados.

    4. En el momento del ingreso se adoptarán las medidas de higiene personal necesarias, entregándose al interno las prendas de vestir adecuadas que precise, firmando el mismo su recepción.»

    Disposición final segunda. Modificación de la Ley Orgánica 3/2018, de 5 de diciembre, de Protección de Datos Personales y garantía de los derechos digitales.

    Se modifica la disposición adicional decimoquinta que queda redactada como sigue:

    «Disposición adicional decimoquinta. Requerimiento de información por parte de la Comisión Nacional del Mercado de Valores.

    Cuando no haya podido obtener por otros medios la información necesaria para realizar sus labores de supervisión e inspección relacionadas con la detección de delitos graves, la Comisión Nacional del Mercado de Valores podrá recabar de los operadores que presten servicios de comunicaciones electrónicas disponibles al público y de los prestadores de servicios de la sociedad de la información, los datos que obren en su poder relativos a la comunicación electrónica o servicio de la sociedad de la información proporcionados por dichos prestadores que sean distintos a su contenido y resulten imprescindibles para el ejercicio de dichas labores.

    La cesión de estos datos requerirá la previa obtención de autorización judicial otorgada conforme a las normas procesales.»

    Disposición final tercera. Modificación de la Ley Orgánica 1/2020, de 16 de septiembre, sobre la utilización de los datos del registro de nombres de pasajeros para la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves.

    Se modifica el artículo 10 que queda redactado como sigue:

    «1. Los momentos en los que las compañías aéreas deben transmitir los datos PNR a la UIP serán los siguientes:

    a) Entre las 24 y las 48 horas antes de la hora de salida programada del vuelo, e b) inmediatamente después del cierre del vuelo, una vez que los pasajeros hayan embarcado en el avión en preparación de la salida y no sea posible embarcar o desembarcar.

    Las compañías aéreas podrán limitar esta transmisión prevista en el párrafo b) a las actualizaciones de la información transmitida conforme al párrafo a).

    2. El Proveedor de Servicios de Navegación Aérea en el espacio aéreo de soberanía española, en colaboración con las compañías aéreas, deberá comunicar a la UIP cualquier cambio producido, previamente o durante el trayecto, respecto al destino donde se tuviera previsto aterrizar, así como la realización de una escala no programada.

    3. Además, cuando sea necesario acceder a los datos PNR para responder a una amenaza real y concreta relacionada con delitos de terrorismo o con delitos graves, en momentos distintos de los previstos en el apartado 1, todos los sujetos obligados, caso por caso, deberán transmitir a la UIP dichos datos con carácter inmediato al requerimiento recibido.»

    Disposición final cuarta. Modificación de la Ley 19/2007, de 11 de julio, contra la violencia, el racismo, la xenofobia y la intolerancia en el deporte.

    Se modifica el artículo 30 que queda redactado como sigue:

    «Artículo 30. Procedimiento sancionador.

    1. El ejercicio de la potestad sancionadora a la que se refiere este título, se regirá por lo dispuesto en la Ley 39/2015, de 1 de octubre, del Procedimiento Administrativo Común de las Administraciones Públicas, la Ley 40/2015, de 1 de octubre, de Régimen Jurídico del Sector Público y sus disposiciones de desarrollo, sin perjuicio de las especialidades que se regulan en este título.

    2. El procedimiento caducará transcurridos seis meses desde su incoación sin que se haya notificado la resolución, debiendo, no obstante, tenerse en cuenta en el cómputo las posibles paralizaciones por causas imputables al interesado o la suspensión que debiera acordarse por la existencia de un procedimiento judicial penal, cuando concurra identidad de sujeto, hecho y fundamento, hasta la finalización de éste.»

    Disposición final quinta. Modificación de la Ley 5/2014, de 4 de abril, de Seguridad Privada.

    Se modifica el artículo 69 que queda redactado como sigue:

    «Artículo 69. Régimen Jurídico.

    1. El ejercicio de la potestad sancionadora en materia de seguridad privada se regirá por lo dispuesto en la Ley 39/2015, de 1 de octubre, del Procedimiento Administrativo Común de las Administraciones Públicas, la Ley 40/2015, de 1 de octubre, de Régimen Jurídico del Sector Público y sus disposiciones de desarrollo, sin perjuicio de las especialidades que se regulan en este título.

    2. El procedimiento caducará transcurridos seis meses desde su incoación sin que se haya notificado la resolución, debiendo, no obstante, tenerse en cuenta en el cómputo las posibles paralizaciones por causas imputables al interesado o la suspensión que debiera acordarse por la existencia de un procedimiento judicial penal, cuando concurra identidad de sujeto, hecho y fundamento, hasta la finalización de éste.

    3. Iniciado el procedimiento sancionador, el órgano que haya ordenado su incoación podrá adoptar las medidas cautelares necesarias para garantizar su adecuada instrucción, así como para evitar la continuación de la infracción o asegurar el pago de la sanción, en el caso de que ésta fuese pecuniaria, y el cumplimiento de la misma en los demás supuestos.

    4. Dichas medidas, que deberán ser congruentes con la naturaleza de la presunta infracción y proporcionadas a la gravedad de la misma, podrán consistir en:

    a) La ocupación o precinto de vehículos, armas, material o equipo prohibido, no homologado o que resulte peligroso o perjudicial, así como de los instrumentos y efectos de la infracción.

    b) La retirada preventiva de las autorizaciones, habilitaciones, permisos o licencias, o la suspensión, en su caso, de la eficacia de las declaraciones responsables.

    c) La suspensión de la habilitación del personal de seguridad privada y, en su caso, de la tramitación del procedimiento para el otorgamiento de aquélla, mientras dure la instrucción de expedientes por infracciones graves o muy graves en materia de seguridad privada.

    También podrán ser suspendidas las indicadas habilitación y tramitación, hasta tanto finalice el proceso por delitos contra dicho personal.

    5. Las medidas cautelares previstas en los párrafos b) y c) del apartado anterior no podrán tener una duración superior a un año.»

    Disposición final sexta. Modificación del texto refundido de la Ley sobre Tráfico, Circulación de Vehículos a Motor y Seguridad Vial, aprobado por el Real Decreto Legislativo 6/2015, de 30 de octubre.

    Se modifica el artículo 68 que queda redactado como sigue:

    «Artículo 68. Matrículas.

    1. Para poner en circulación vehículos a motor, así como remolques de masa máxima autorizada superior a la que reglamentariamente se determine, es preciso matricularlos y que lleven las placas de matrícula con los caracteres que se les asigne del modo que se establezca. Esta obligación será exigida a los ciclomotores en los términos que reglamentariamente se determine.

    2. Deben ser objeto de matriculación definitiva en España los vehículos a los que se refiere el apartado anterior, cuando se destinen a ser utilizados en el territorio español por personas o entidades que sean residentes en España o que sean titulares de establecimientos situados en España. Reglamentariamente se establecerán los plazos, requisitos y condiciones para el cumplimiento de esta obligación y las posibles exenciones a la misma.

    3. La matriculación ordinaria será única para cada vehículo, salvo en los supuestos que se determinen reglamentariamente. Cuando concurran circunstancias que puedan afectar a la Seguridad Nacional, el Secretario de Estado de Seguridad podrá autorizar una nueva matrícula distinta de la inicialmente asignada. Este tipo de matrículas no serán públicas en el Registro General de Vehículos e, incluso en circunstancias excepcionales, podrá utilizarse una titularidad supuesta en el marco de la actuación de las Fuerzas y Cuerpos de Seguridad y del Centro Nacional de Inteligencia en el tráfico jurídico.

    4. En casos justificados, la autoridad competente para expedir el permiso de circulación podrá conceder permisos de circulación temporales y provisionales en los términos que se determine reglamentariamente.»

    Disposición final séptima. Naturaleza de la ley.

    Esta ley tiene el carácter de ley orgánica. No obstante, tienen carácter ordinario:

    a) El Capítulo VI.

    b) El Capítulo VII.

    c) El Capítulo VIII.

    d) Las disposiciones finales cuarta, quinta y sexta.

    Disposición final octava. Título competencial.

    Esta ley orgánica se dicta al amparo de las reglas 1.ª, 6.ª, 18.ª y 29.ª del artículo 149.1 de la Constitución, que atribuyen al Estado las competencias exclusivas, respectivamente, para la regulación de las condiciones básicas que garanticen la igualdad de todos los españoles en el ejercicio de los derechos y en el cumplimiento de los deberes constitucionales; respecto a las bases del régimen jurídico de las Administraciones Públicas, el procedimiento administrativo común y en relación al sistema de responsabilidad de todas las Administraciones públicas; sobre legislación penal, penitenciaria, procesal; y en materia de seguridad pública.

    Disposición final novena. Incorporación del Derecho de la Unión Europea.

    Mediante esta ley orgánica se incorpora al ordenamiento jurídico español la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, detección, investigación y enjuiciamiento de infracciones penales o de ejecución de sanciones penales, y a la libre circulación de dichos datos y por la que se deroga la Decisión Marco 2008/977/JAI del Consejo.

    Disposición final décima. Entrada en vigor.

    Esta ley orgánica entrará en vigor a los veinte días de su publicación en el «Boletín Oficial del Estado».

    No obstante, las previsiones contenidas en el capítulo IV producirán efectos a los seis meses de la entrada en vigor de la ley orgánica.

    16May/21

    Ley Orgánica 1/2020, de 16 de septiembre

    Ley Orgánica 1/2020, de 16 de septiembre, sobre la utilización de los datos del Registro de Nombres de Pasajeros para la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves.

    FELIPE VI, REY DE ESPAÑA

    A todos los que la presente vieren y entendieren.

    Sabed: Que las Cortes Generales han aprobado y Yo vengo en sancionar la siguiente ley orgánica.

    PREÁMBULO

    I

    La protección de la vida y de la seguridad de los ciudadanos constituye el objetivo principal del espacio de libertad, seguridad y justicia de la Unión Europea. Entre las medidas que se han adoptado para su consecución, el Consejo de la Unión Europea, a través del «Programa de Estocolmo: una Europa abierta y segura que sirva y proteja al ciudadano», de 4 de mayo de 2010, instó a la Comisión a presentar una propuesta sobre la utilización de datos del Registro de Nombres de los Pasajeros («Passenger Name Record», en adelante PNR) para prevenir, detectar, investigar y enjuiciar los delitos de terrorismo y los delitos graves.

    Asimismo, en el plano internacional se ha venido avanzando en la dimensión exterior de esta política de la Unión Europea. La Comisión presentó una serie de elementos esenciales de la misma en su Comunicación de 21 de septiembre de 2010 «Sobre el enfoque global de las transferencias de datos de los registros de nombres de los pasajeros (PNR) a los terceros países», y la Unión alcanzó diversos acuerdos internacionales con distintos Estados.

    El incremento de la amenaza del crimen organizado y especialmente del terrorismo en Europa constituyen violaciones muy graves de los valores universales de la dignidad humana, la libertad, la igualdad, la solidaridad y el disfrute de los derechos humanos y de las libertades fundamentales en los que se basa la Unión Europea. Con el objetivo de elevar los niveles de seguridad de sus ciudadanos y de crear un marco jurídico para la protección de sus datos de carácter personal, en lo que respecta a su tratamiento por las autoridades competentes, se adoptó la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativa a la utilización de datos del Registro de Nombres de los Pasajeros (PNR) para la prevención, detección, investigación y enjuiciamiento de los delitos de terrorismo y de la delincuencia grave.

    Con este fin se insta a los Estados miembros a que introduzcan en sus ordenamientos internos las disposiciones legales pertinentes para que los datos PNR de los vuelos exteriores de la Unión Europea sean transferidos a una Unidad de Información sobre Pasajeros que se cree en cada Estado, sin perjuicio de que pueda también aplicarse a los vuelos interiores de la Unión, según el criterio de cada país, como prevé la aludida Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, posibilidad de la que se hace uso en esta ley orgánica.

    Asimismo, la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, exige la creación de un sistema uniforme en la Unión Europea para el tratamiento de los datos PNR, precisando claramente cuáles son estos, los fines a los que se limita su recogida, la utilización y transmisión, el establecimiento de unidades únicas de información sobre los pasajeros en cada Estado miembro, así como la obligatoriedad de la adopción de medidas que faciliten el cumplimiento por los operadores de sus deberes, incluida la imposición de sanciones efectivas, proporcionadas y disuasorias ante eventuales incumplimientos.

    El tratamiento de los datos PNR va a mejorar la respuesta a la amenaza del terrorismo y la delincuencia grave mediante el cotejo de tales datos con las bases de datos disponibles y pertinentes, a los efectos de la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves, y el análisis y evaluación de los mismos utilizando unos criterios específicos y revisables periódicamente, que permitan la identificación de personas que pudieran estar relacionadas con este tipo de actividades criminales, al tiempo que minimizarán al máximo el riesgo de afectar a personas inocentes.

    II

    Esta ley orgánica se estructura en tres capítulos, treinta y cuatro artículos, seis disposiciones adicionales y cuatro disposiciones finales.

    El capítulo I establece las disposiciones generales.

    Su objeto es regular, por un lado la transferencia de los datos PNR por parte de las compañías aéreas y otras entidades obligadas; en segundo término, la recogida, el tratamiento y la protección de esos datos, su transmisión a las autoridades competentes y el intercambio de dichos datos con otros Estados miembros, Europol y terceros Estados; a su vez, la designación de la Unidad de Información sobre Pasajeros española, y por último, el régimen sancionador.

    Se especifican los fines para los que pueden ser utilizados los datos PNR, únicamente para prevenir, detectar, investigar y enjuiciar delitos de terrorismo y delitos graves.

    El ámbito de aplicación contempla, en principio, todos los vuelos internacionales que tengan origen, destino o tránsito en España, tanto de carácter comercial como privados, con una serie de excepciones basadas en el tipo de los vuelos.

    Excepcionalmente, como medida extraordinaria y siempre que existan indicios suficientes de una contrastada situación de riesgo, se podrán sujetar rutas o vuelos concretos de ámbito nacional a lo dispuesto en esta ley orgánica.

    Asimismo, se definen los sujetos obligados, diferenciando las compañías áreas de las entidades de gestión de reservas de vuelos, cuya incorporación en esta ley orgánica es una posibilidad prevista en Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016.

    Se determinan también los delitos de terrorismo y los demás delitos graves cuya prevención, detección, investigación o enjuiciamiento justifica la recogida de los datos PNR. Los delitos de terrorismo son los contemplados en la Ley Orgánica 10/1995, de 23 de noviembre, del Código Penal, como delitos de las organizaciones y grupos terroristas y delitos de terrorismo. En cuanto a los demás delitos graves, se considera como tales, a los efectos de esta ley, aquellos castigados con una pena de prisión igual o superior a tres años por ser constitutivos de algunos de los enumerados en el anexo II de la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016.

    Por otro lado, se especifican los datos de los pasajeros que deben ser enviados a la Unidad de Información sobre Pasajeros, de entre los recopilados por parte de los sujetos obligados para sus propios fines comerciales en el transcurso normal de su actividad. Entre estos figuran los datos contenidos en el sistema de información anticipada sobre pasajeros (sistema API), algunos de los cuales, a diferencia de los anteriores, han sido contrastados con los documentos oficiales de identificación.

    Deberá enviarse también cierta información sobre la tripulación correspondiente a los datos API. Asimismo, en el caso de los vuelos privados se deberán enviar dichos datos tanto de los pasajeros como de los tripulantes. Es imprescindible, para la consecución de las finalidades previstas en la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, disponer de tales datos de tripulaciones y de vuelos privados, sin los cuales se podrían correr graves riesgos de seguridad pública, como ha demostrado la experiencia de los últimos años.

    El capítulo II se ocupa del tratamiento de los datos PNR.

    Se regula la Unidad de Información sobre Pasajeros española (UIP), incardinada en la estructura del Centro de Inteligencia contra el Terrorismo y el Crimen Organizado dependiente de la Secretaría de Estado de Seguridad, órgano con experiencia en materia de coordinación y en la recepción y análisis de la información estratégica disponible en la lucha contra todo tipo de terrorismo y delincuencia organizada.

    Se determinan sus funciones, referidas tanto a la recepción, tratamiento y análisis de los datos PNR, como a las comunicaciones e intercambios de estos con las autoridades competentes nacionales y unidades análogas de otros Estados miembros, terceros países y Europol.

    Se regula específicamente la figura del responsable de protección de datos, cuyo principal cometido será el de garantizar la rigurosa observancia de la legislación vigente en materia de protección de datos de carácter personal durante todo el proceso de recepción, tratamiento, transmisión, conservación y supresión de los datos PNR.

    La transmisión de datos se llevará a cabo utilizando los formatos determinados y los protocolos definidos en la Decisión de Ejecución de la Comisión UE 2017/759, de 28 de abril de 2017, relativa a los protocolos comunes y los formatos de datos que deberán utilizar las compañías aéreas para la transmisión de los datos PNR a las Unidades de Información sobre Pasajeros.

    Las compañías aéreas informarán a la UIP del formato y protocolo de transmisión que utilizarán. Con respecto a las compañías aéreas que no dispongan de la infraestructura técnica necesaria, se contempla la posibilidad de acordar con el Ministerio del Interior los medios electrónicos de transmisión, siempre que se respeten las garantías de seguridad.

    Los datos serán enviados en dos momentos distintos; el primero entre las cuarenta y ocho y las veinticuatro horas anteriores a la salida programada del vuelo, y el segundo se producirá una vez cerrado el vuelo, es decir, en el momento a partir del cual nadie puede entrar en el avión ni abandonarlo. Si durante el vuelo se produce alguna modificación en el destino, también deberá ser transmitida.

    Cuando sea necesario acceder a los datos PNR para responder a una amenaza real y concreta en momentos distintos a los anteriores, caso por caso, las compañías aéreas deberán transmitir a la UIP dichos datos con carácter inmediato al requerimiento recibido.

    Sin perjuicio de las obligaciones establecidas en esta ley orgánica, los tratamientos de datos de carácter personal realizados por los sujetos obligados se regirán por lo dispuesto en el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos y por la legislación interna que se dicte en uso de la habilitación contenida en aquel.

    En relación con el tratamiento de los datos de carácter personal por parte de las autoridades competentes, estas estarán sujetas al deber de proporcionar o poner a disposición del interesado la información y facilitar el ejercicio de los derechos de estos contemplados en la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, y en la ley orgánica que la incorpore a nuestro ordenamiento interno.

    En este capítulo también se definen los propósitos para los que la UIP realizará el tratamiento de los datos PNR mediante la utilización de una definida metodología: Evaluar a las personas a bordo de la aeronave a fin de identificar a aquellas que pudieran tener relación con delitos de terrorismo o delitos graves; revisar individualmente los resultados de dicha evaluación previa automatizada; responder peticiones de las autoridades competentes o de Europol y establecer criterios predeterminados a utilizar en esas evaluaciones.

    Para ello, la UIP cotejará los datos PNR con las bases de datos disponibles y pertinentes a los efectos de la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves, y tratará los datos de acuerdo con los criterios predeterminados. Se realizará una verificación automática a priori, que, en el caso de ofrecer un resultado positivo, requerirá necesariamente una comprobación manual por parte de un especialista de la propia UIP.

    Se precisa cuáles son las autoridades competentes que pueden solicitar o recibir datos PNR o el resultado del tratamiento de dichos datos por la UIP, con el objetivo de seguir examinando dicha información o adoptar las medidas adecuadas para prevenir, detectar, investigar y enjuiciar delitos de terrorismo y delitos graves. Estas son las Direcciones Generales de la Policía y de la Guardia Civil, el Centro Nacional de Inteligencia, la Dirección Adjunta de Vigilancia Aduanera y el Ministerio Fiscal. También se contemplan como autoridades competentes las correspondientes de las Comunidades Autónomas que hayan asumido estatutariamente competencias para la protección de personas y bienes y para el mantenimiento de la seguridad ciudadana y cuenten con un cuerpo de policía propio. Los Jueces y Tribunales, en garantía del principio de independencia constitucional, se regirán en cuanto a las peticiones de dicha información y a la colaboración con la UIP por lo dispuesto en su legislación específica.

    Las peticiones de las autoridades competentes serán debidamente motivadas y con suficiente base. En ningún caso se admitirán peticiones masivas y no fundamentadas. Todo tratamiento que lleven a cabo estas autoridades competentes sobre los datos recibidos de la UIP, lo será para los fines propios de la lucha contra los delitos de terrorismo y los delitos graves.

    El capítulo recoge, además, una serie de disposiciones en materia de protección de datos, entre las que figuran la obligación de conservación de la documentación relativa a los sistemas y procedimientos de tratamiento; la obligación de registro de las operaciones de recogida, consulta, transferencia y supresión de los datos, así como la obligación de comunicar al interesado y a la autoridad nacional de control cualquier violación de los datos personales que dé lugar a un elevado riesgo para la protección de los mismos o afecte negativamente a la intimidad del interesado.

    En una Europa concebida como espacio de libertad, seguridad y justicia, la colaboración y cooperación entre los Estados miembros cobra una especial relevancia. Y dentro de esa cooperación, los aspectos relativos a la seguridad se han tornado fundamentales en los últimos años en la lucha contra el terrorismo y la criminalidad organizada. En esa línea de colaboración, España podrá enviar datos PNR o el resultado de su tratamiento a otros Estados miembros, de oficio o atendiendo una solicitud concreta. Las peticiones entre Estados han de ser motivadas y siempre orientadas al cumplimiento de los fines previstos en esta ley orgánica.

    Se contempla la posibilidad de que una autoridad competente española pueda dirigirse directamente a la Unidad de Información sobre Pasajeros de otro Estado miembro para una solicitud de información, siempre que se den conjuntamente las circunstancias de urgencia e imposibilidad de comunicación con la UIP nacional. En todo caso se remitirá copia de la petición a la UIP española.

    La transferencia de datos a Europol se llevará a cabo electrónicamente y de forma motivada, siempre que entre dentro del ámbito de sus competencias y sea necesaria para el ejercicio de sus funciones.

    Se incluye el procedimiento de transmisión de datos a terceros países. En este intercambio se tendrá que observar lo establecido en la legislación que transponga la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, y a la libre circulación de dichos datos y por la que se deroga la Decisión Marco 2008/977/JAI del Consejo. Además, deberá tratarse de una transmisión de datos necesaria para los fines de esta ley orgánica, y el Estado receptor de los mismos solamente podrá transmitirlos, a su vez, a otro tercer Estado si cuenta para ello con la expresa autorización de la Unidad española. En todo caso, se garantizará que la transmisión y la utilización de datos PNR a terceros Estados mantengan unos estándares y garantías como los previstos en esta ley orgánica.

    En garantía del derecho a la intimidad de los sujetos afectados y en especial de su derecho a la protección de datos de carácter personal, se contempla que los datos PNR facilitados a la UIP por los sujetos obligados serán conservados durante cinco años a contar desde su transmisión. Una vez transcurridos seis meses desde su recepción, los datos PNR que permitan la identificación directa del pasajero serán despersonalizados mediante enmascaramiento, y solo se permitirá el acceso a la totalidad de los mismos previa aprobación por la autoridad judicial o por la persona titular de la Secretaría de Estado de Seguridad.

    Cumplido el plazo de los cinco años serán suprimidos definitivamente, sin perjuicio de su utilización por parte de las autoridades competentes que los hayan recibido y que los estén utilizando en el marco de un asunto concreto a efectos de prevenir, detectar, investigar o enjuiciar delitos de terrorismo o delitos graves.

    Por último, se regulan en este capítulo las competencias de la Agencia Española de Protección de Datos en su condición de autoridad nacional de control de datos PNR.

    El capítulo III, que regula el régimen sancionador, se limita a establecer las especialidades estrictamente necesarias por razón de la materia, aplicándose en lo demás el régimen general previsto en la Ley 39/2015, de 1 de octubre, del Procedimiento Administrativo Común de las Administraciones Públicas.

    Así, se definen los sujetos responsables, los regímenes especiales de responsabilidad y el concurso de normas; se tipifican las infracciones que se clasifican en muy graves, graves y leves; se determinan las sanciones según la infracción de que se trate, para cuya graduación se tendrá en cuenta la repercusión en la seguridad pública, la gravedad, o el beneficio obtenido, entre otras circunstancias; se determina la competencia sancionadora; y, finalmente, se incluyen las normas procedimentales especiales sobre los gastos derivados de la adopción de posibles medidas provisionales por parte del órgano competente para resolver, así como sobre la caducidad del procedimiento.

    En las disposiciones adicionales se regula el plazo en el que las compañías aéreas deberán comunicar a la UIP el formato de datos y el protocolo de transmisión que utilizarán; se establece que las comunicaciones se harán según los procedimientos establecidos por la Secretaría de Estado de Seguridad; y se establecen normas referentes a la transmisión de los datos PNR remitidos a determinadas autoridades competentes como son el Centro Nacional de Inteligencia, las Direcciones Generales de la Policía y de la Guardia Civil, la Dirección Adjunta de Vigilancia Aduanera y los Jueces y Tribunales y el Ministerio Fiscal.

    Además, contiene cuatro disposiciones finales, relativas al título competencial, a los preceptos que tienen carácter de ley orgánica, a la incorporación de derecho de la Unión Europea y a la entrada en vigor.

    III

    En la elaboración de esta ley orgánica se han observado los principios de necesidad, eficacia, proporcionalidad, seguridad jurídica, transparencia y eficiencia, de acuerdo con el artículo 129 de la Ley 39/2015, de 1 de octubre. Se trata de una norma necesaria para la transposición de la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, cuya aprobación goza de las garantías correspondientes al rango de ley orgánica por suponer un desarrollo de derechos fundamentales de los ciudadanos.

    Por último, está incluida en el Plan Anual Normativo para 2018 aprobado por el Consejo de Ministros en su reunión de 7 de diciembre de 2017.

    CAPÍTULO I. Disposiciones generales

    Artículo 1. Objeto.

    1. Esta ley orgánica, con el propósito de garantizar y proteger la vida y la seguridad de los ciudadanos, tiene por objeto regular:

    a) La transferencia de datos del registro de nombres de los pasajeros (en adelante datos PNR), así como de la información de la tripulación referida en el artículo 5.3, correspondientes a vuelos internacionales y, en su caso, nacionales, en los términos y a los efectos previstos en el capítulo II.

    b) El sistema de recogida, uso, almacenamiento, tratamiento, protección, acceso y conservación de los datos PNR, la transmisión de dichos datos a las autoridades competentes, así como el intercambio de los mismos con los Estados miembros de la Unión Europea, con Europol y con terceros países.

    c) La determinación y atribución de las funciones de la Unidad de Información sobre Pasajeros española.

    d) El régimen sancionador aplicable a las infracciones de conformidad con lo dispuesto en esta ley orgánica.

    2. Los datos PNR podrán ser objeto de tratamiento únicamente con la finalidad de prevenir, detectar, investigar y enjuiciar los delitos de terrorismo y los delitos graves que se enumeran en el artículo 4, y de acuerdo con los propósitos establecidos en el artículo 12.2.

    Artículo 2. Ámbito de aplicación.

    1. Esta ley orgánica será de aplicación, en todo caso, a los datos PNR correspondientes a las personas que viajen en los vuelos internacionales, tanto interiores como exteriores de la Unión Europea, con su salida del territorio español o llegada al mismo, o que hagan escala en él. En este último supuesto, siempre se entenderán comprendidos los pasajeros en tránsito o en conexión, con las precisiones establecidas en el apartado siguiente.

    2. Su ámbito de aplicación se extiende a los vuelos comerciales y a los vuelos privados.

    No será de aplicación a los vuelos realizados por aeronaves de Estado y por aeronaves privadas, fletadas por el Estado para la prestación o apoyo de servicios de interés militar y en general servicios estatales no comerciales, durante los vuelos dedicados exclusivamente a materializar tal prestación o apoyo, que se asimilarán a las aeronaves de Estado, a los trabajos aéreos, a la aviación general que no tenga por objeto el transporte de personas, a los servicios aeroportuarios, a los servicios de navegación aérea, a los vuelos relacionados con la producción de aeronaves civiles, a los vuelos de entrenamiento de tripulaciones, a los vuelos de traslado para mantenimiento y revisión y a los vuelos relacionados con funciones regulatorias.

    3. Como medida extraordinaria y por el tiempo que resulte imprescindible, será de aplicación a las rutas o a los vuelos concretos nacionales, que no efectúen escalas en ningún otro Estado, siempre que existan indicios suficientes de una clara y contrastada situación de riesgo, con la finalidad de prevenir, detectar, investigar y enjuiciar los delitos a los que se refiere el artículo 4.

    La determinación de tales rutas o vuelos será acordada por el Consejo de Ministros, a propuesta del titular del Ministerio del Interior, teniendo en cuenta el carácter extraordinario de la medida, su necesidad y proporcionalidad.

    Artículo 3. Sujetos obligados.

    1. Son sujetos obligados las compañías aéreas, entendiendo como tales las empresas de transporte aéreo con una licencia de explotación válida o similar para el transporte por vía aérea.

    A los efectos de esta ley orgánica, la definición de empresa será la establecida en el Reglamento (CE) 1008/2008 del Parlamento Europeo y del Consejo, de 24 de septiembre de 2008, sobre normas comunes para la explotación de servicios aéreos en la Comunidad, comprendiendo cualquier persona física o jurídica, con o sin fines de lucro, o cualquier organismo oficial dotado o no de personalidad jurídica propia.

    En el caso de los vuelos privados serán sujetos obligados los operadores de las aeronaves bien sea como propietarios, arrendatarios o en virtud de otro título posesorio reconocido por la legislación vigente.

    2. Son igualmente sujetos obligados las entidades de gestión de reserva de vuelos, entendiendo como tales a las entidades que gestionen reservas de vuelos de pasajeros y recaben datos PNR de los mismos, cualesquiera que sean los medios utilizados para ello, tales como los operadores turísticos o las agencias de viajes, que estarán obligadas en los términos previstos en el artículo 9.2.

    Artículo 4. Delitos de terrorismo y delitos graves.

    1. A los exclusivos efectos de esta ley orgánica, son delitos de terrorismo los contemplados en la Ley Orgánica 10/1995, de 23 de noviembre, del Código Penal, como delitos de las organizaciones y grupos terroristas y delitos de terrorismo.

    2. Asimismo, a los exclusivos efectos de esta ley orgánica, son delitos graves aquellos que la ley castigue con una pena de prisión igual o superior a tres años por ser constitutivos de:

    a) Pertenencia a una organización delictiva.

    b) Trata de seres humanos.

    c) Explotación sexual de niños y pornografía infantil.

    d) Tráfico ilícito de estupefacientes y sustancias psicotrópicas.

    e) Tráfico ilícito de armas, municiones y explosivos.

    f) Corrupción.

    g) Fraude, incluido el que afecte a los intereses financieros de la Unión Europea.

    h) Blanqueo del producto del delito y falsificación de moneda, con inclusión del euro.

    i) Delitos informáticos/ciberdelincuencia.

    j) Delitos contra el medio ambiente, incluido el tráfico ilícito de especies animales protegidas y de especies y variedades vegetales protegidas.

    k) Ayuda a la entrada y residencia ilegales.

    l) Homicidio voluntario, agresión con lesiones graves.

    m) Tráfico ilícito de órganos y tejidos humanos.

    n) Secuestro, detención ilegal y toma de rehenes.

    ñ) Robo organizado y a mano armada.

    o) Tráfico ilícito de bienes culturales, incluidas las antigüedades y las obras de arte.

    p) Falsificación y violación de derechos de propiedad intelectual o industrial de mercancías.

    q) Falsificación de documentos administrativos y tráfico de documentos administrativos falsos.

    r) Tráfico ilícito de sustancias hormonales y otros factores de crecimiento.

    s) Tráfico ilícito de materiales radiactivos o sustancias nucleares.

    t) Violación.

    u) Delitos incluidos en la jurisdicción de la Corte Penal Internacional.

    v) Secuestro de aeronaves y buques.

    w) Sabotaje.

    x) Tráfico de vehículos robados.

    y) Espionaje industrial.

    Artículo 5. Datos del Registro de Nombres de Pasajeros (datos PNR).

    1. Los datos PNR son el conjunto de datos relativos al viaje de un pasajero, reservado por él o en su nombre, que recoge la información necesaria para la gestión de la reserva.

    2. Los datos PNR relativos a los pasajeros son los siguientes:

    a) Localizador de registro PNR.

    b) Fecha de reserva y de emisión del billete.

    c) Fechas previstas del viaje.

    d) Nombres y apellidos.

    e) Dirección y datos de contacto (número de teléfono, dirección de correo electrónico).

    f) Todos los datos de pago, incluida la dirección de facturación.

    g) Itinerario completo del viaje para el PNR específico.

    h) Información sobre viajeros frecuentes.

    i) Agencia de viajes u operador de viajes.

    j) Situación de vuelo del pasajero: confirmaciones, facturación, no comparecencia o pasajeros de última hora sin reserva.

    k) Información PNR escindida o dividida.

    l) Observaciones generales, incluida toda la información disponible sobre menores de dieciocho años no acompañados, como nombre, apellidos, y sexo del menor, edad, idiomas que habla, nombre, apellidos y dirección de contacto del acompañante en el aeropuerto de salida y vínculo con el menor, nombre, apellidos y dirección de contacto del acompañante en el aeropuerto de llegada y vínculo con el menor, agente en el lugar de salida y de llegada.

    m) Información sobre el billete, incluidos el número del billete, la fecha de emisión, los billetes solo de ida y la indicación de la tarifa de los billetes electrónicos (Automatic Ticket Fare Quote).

    n) Datos del asiento, incluido el número.

    ñ) Información sobre códigos compartidos.

    o) Toda la información relativa al equipaje.

    p) Número de viajeros y otros nombres de viajeros que figuran en el PNR.

    q) Cualquier información recogida en el sistema de información anticipada sobre los pasajeros (sistema API), incluidos el tipo, número, país de emisión y fecha de expiración de cualquier documento de identidad, nacionalidad, apellidos, nombre, sexo, fecha de nacimiento, compañía aérea, número de vuelo, fecha de salida, fecha de llegada, aeropuerto de salida, aeropuerto de llegada, hora de salida y hora de llegada.

    r) Todo el historial de cambios de los datos PNR indicados en los párrafos a) a q).

    3. En el caso de los vuelos comerciales las disposiciones de esta ley orgánica serán aplicables, además de a los datos de los pasajeros, a los datos de la tripulación en el caso del párrafo q) y a los datos de cualquier otra persona a bordo señalados en los párrafos o) y q) del apartado anterior. Igualmente, en el caso de los vuelos privados, serán de aplicación a tales datos de los pasajeros y tripulantes.

    CAPÍTULO II. Tratamiento de los datos PNR

    Artículo 6. Unidad de Información sobre Pasajeros.

    1. La Unidad de Información sobre Pasajeros española (UIP) se integra orgánicamente en el Centro de Inteligencia contra el Terrorismo y el Crimen Organizado, dependiente de la Secretaría de Estado de Seguridad del Ministerio del Interior.

    2. La UIP es la responsable del tratamiento de los datos PNR.

    Artículo 7. Funciones y facultades.

    1. La UIP realizará exclusivamente las siguientes funciones:

    a) Recoger los datos PNR, almacenarlos, tratarlos y transferir, en su caso, dichos datos o el resultado de su tratamiento a las autoridades competentes.

    b) Intercambiar tanto los datos PNR como el resultado de su tratamiento con las Unidades de Información sobre Pasajeros de otros Estados miembros de la Unión Europea, con Europol y con terceros países.

    2. Para la realización de las funciones mencionadas en el apartado anterior, la UIP será responsable de:

    a) Analizar, relacionar y valorar los datos obtenidos.

    b) Establecer y actualizar criterios útiles para identificar a las personas que puedan estar implicadas en delitos de terrorismo y delitos graves, en cooperación, en su caso, con las autoridades competentes.

    c) Elaborar informes de inteligencia estratégica y de análisis de riesgo.

    d) Colaborar con las autoridades competentes encargadas de las investigaciones y actuaciones operativas, así como elaborar los protocolos de actuación pertinentes en colaboración con las mismas.

    e) Poner los hechos que puedan ser constitutivos de las infracciones previstas en esta ley orgánica en conocimiento del órgano competente para sancionarlas.

    f) Elaborar estadísticas anuales sobre su actividad, incluyendo el número total de personas cuyos datos PNR hayan sido recopilados e intercambiados, así como el número de personas identificadas para un examen ulterior.

    3. El almacenamiento, tratamiento y análisis de los datos PNR se llevará a cabo exclusivamente en uno o varios lugares seguros dentro del territorio nacional.

    4. Cuando fuere preciso para el desarrollo de sus funciones, el personal al servicio de las autoridades competentes enumeradas en el artículo 14 podrá prestar servicios en la UIP. Dicho personal continuará en servicio activo en su Cuerpo dependiendo orgánica, funcional y retributivamente de su Administración de origen, sin perjuicio de que en el desarrollo de sus funciones en la UIP haya de atenerse a lo preceptuado para la misma respecto a su organización y funcionamiento.

    Artículo 8. Responsable de protección de datos.

    1. La UIP designará una persona como responsable de protección de los datos PNR que velará por que se adopten las medidas oportunas para controlar el tratamiento de estos datos y por que se apliquen las garantías en materia de protección de datos. El responsable de protección de datos actuará como punto de contacto único, al que cualquier interesado tendrá derecho a dirigirse para todas las cuestiones relativas al tratamiento de sus datos PNR.

    2. La persona designada lo será atendiendo a sus cualidades profesionales y, en particular, a sus conocimientos especializados de la legislación y las prácticas en materia de protección de datos personales, y a su capacidad para desempeñar las funciones contempladas en esta ley orgánica. Deberá contar con los medios necesarios para el desempeño de sus funciones de manera eficaz e independiente.

    3. La persona responsable de la protección de datos tendrá acceso a todos los datos PNR tratados por la UIP. Si considerase que el tratamiento de un dato no ha sido lícito, lo pondrá en conocimiento del responsable del tratamiento para que se adopten las medidas correctoras necesarias y, si lo estima oportuno, podrá remitir el asunto a la autoridad nacional de control.

    4. En lo no previsto en esta ley orgánica se regirá por lo regulado para los delegados de protección de datos en la legislación que transponga la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, y a la libre circulación de dichos datos y por la que se deroga la Decisión Marco 2008/977/JAI del Consejo, y hasta ese momento por las normas que regulen en Derecho español el tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección y enjuiciamiento de infracciones penales o de ejecución de sanciones penales.

    Artículo 9. Obligaciones de transmisión de datos.

    1. Las compañías aéreas enviarán los datos PNR correspondientes a los vuelos comprendidos en el artículo 2 que hayan recopilado en el transcurso normal de su actividad, a la base de datos de la UIP. En el caso de los vuelos privados, el operador asumirá la responsabilidad de que la información prevista en el artículo 5.3 sea remitida a la UIP.

    En el caso de que existan varias compañías aéreas relacionadas con un mismo vuelo, la obligación de transmitir los datos recaerá en la compañía aérea que actúe como operadora del mismo.

    2. Las entidades de gestión de reservas de vuelos introducirán en el PNR los datos que hayan recopilado en el transcurso normal de su actividad respecto a los vuelos comprendidos en el artículo 2.

    3. En el cumplimiento de sus obligaciones de información, y sin perjuicio de lo establecido en el Reglamento (UE) 2016/679 del Parlamento Europeo y el Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de sus datos personales y a la libre circulación de estos datos y en la legislación interna que se dicte en uso de la habilitación contenida en aquel, los sujetos obligados informarán a las personas a las que se refieran los datos PNR del motivo de su recogida y de su destinatario, la Unidad de Información sobre Pasajeros, ante cuyo responsable de protección de datos podrán dirigirse para todas las cuestiones relativas al tratamiento de sus datos PNR.

    4. Las compañías aéreas enviarán los datos PNR a la UIP, utilizando en todo caso medios electrónicos que ofrezcan garantías suficientes en relación con las medidas de seguridad técnicas y las medidas organizativas que rigen el tratamiento de datos que se va a llevar a cabo. Esta transmisión se realizará con arreglo a uno de los formatos de datos y mediante uno de los protocolos de transmisión establecidos en la Decisión de Ejecución de la Comisión (UE) 2017/759, de 28 de abril de 2017, relativa a los protocolos comunes y los formatos de datos que deberán utilizar las compañías aéreas para la transmisión de los datos PNR a las Unidades de Información sobre Pasajeros.

    En el caso de que transmitan datos API sobre los pasajeros de manera separada respecto del resto de los datos PNR para el mismo vuelo, deberán utilizar, para su envío a la UIP, el formato específico de datos que contempla la Decisión de Ejecución de la Comisión (UE) 2017/759, de 28 de abril de 2017.

    En caso de fallo técnico o imposibilidad sobrevenida, realizarán la transmisión de los datos PNR, en el plazo más breve posible, por cualquier otro medio apropiado que garantice un nivel adecuado de seguridad de dichos datos.

    5. Las compañías aéreas que no operen vuelos con arreglo a un calendario concreto y público y que no dispongan de la infraestructura técnica necesaria para usar los formatos de datos y los protocolos de transmisión incluidos en la Decisión de Ejecución de la Comisión (UE) 2017/759, de 28 de abril de 2017, utilizarán, para la transmisión de los datos PNR, los formatos y los medios electrónicos que se acuerden de forma bilateral entre la compañía aérea y el Ministerio del Interior, siempre que ofrezcan garantías suficientes respecto de las medidas de seguridad técnicas. Este régimen será el aplicable en todo caso a los vuelos privados.

    Artículo 10. Momentos de la transmisión de datos.

    1. Los momentos en los que las compañías aéreas deben transmitir los datos PNR a la UIP serán los siguientes:

    a) Entre las veinticuatro y las cuarenta y ocho horas antes de la hora de salida programada del vuelo, e

    b) inmediatamente después del cierre del vuelo, una vez que los pasajeros hayan embarcado en el avión en preparación de la salida y no sea posible embarcar o desembarcar.

    Las compañías aéreas podrán limitar esta transmisión prevista en el párrafo b) a las actualizaciones de la información transmitida conforme al párrafo a).

    2. Las compañías aéreas deberán comunicar cualquier cambio producido previamente o durante el trayecto, respecto al destino donde se tuviera previsto aterrizar o a la realización de una escala no programada.

    3. Además, cuando sea necesario acceder a los datos PNR para responder a una amenaza real y concreta relacionada con delitos de terrorismo o con delitos graves, en momentos distintos de los previstos en el apartado 1, todos los sujetos obligados, caso por caso, deberán transmitir a la UIP dichos datos con carácter inmediato al requerimiento recibido.

    Artículo 11. Régimen jurídico aplicable al tratamiento de datos PNR.

    1. Los tratamientos de datos de carácter personal que lleven a cabo la UIP y las autoridades competentes referidas en el artículo 14 se regirán por esta ley orgánica y supletoriamente por la legislación que transponga la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, y hasta ese momento por las normas que regulen en Derecho español el tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección y enjuiciamiento de infracciones penales o de ejecución de sanciones penales. En este régimen jurídico se incluye la protección de los datos personales de los pasajeros y sus derechos de acceso, rectificación, supresión, limitación del tratamiento, indemnización y recurso judicial.

    2. Sin perjuicio de las obligaciones establecidas en esta ley orgánica, los tratamientos de datos de carácter personal realizados por los sujetos obligados referidos en el artículo 3 se regirán por lo dispuesto en el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, y por la legislación interna que se dicte en uso de la habilitación contenida en aquel.

    Artículo 12. Tratamiento de los datos PNR.

    1. Los datos PNR serán recogidos por la UIP.

    Si la información transmitida incluyera datos distintos de los relacionados en esta ley orgánica, la UIP los suprimirá inmediatamente y de manera definitiva en el momento de su recepción.

    2. La UIP tratará los datos PNR solo para los siguientes propósitos:

    a) Realizar una evaluación de los pasajeros y de la tripulación antes de la llegada o salida programada del vuelo, a fin de identificar a las personas que deban ser examinadas de nuevo por las autoridades competentes y, en su caso, por Europol ante la posibilidad de que pudieran estar implicadas en un delito de terrorismo o en un delito grave.

    b) Responder en cada caso particular a las peticiones de las autoridades competentes, debidamente motivadas y con suficiente base, para que les transfieran datos PNR en supuestos específicos a efectos de prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves, así como el resultado de su tratamiento.

    c) Analizar los datos PNR con el fin de establecer o actualizar criterios que deben utilizarse en las evaluaciones realizadas en virtud del apartado 3.b), con el objeto de identificar a las personas que puedan estar implicadas en delitos de terrorismo o delitos graves.

    Estos criterios de evaluación predeterminados deberán ser proporcionados y específicos y estar orientados a la finalidad que persiguen. No se basarán en el origen racial o étnico, las opiniones políticas, las creencias religiosas o filosóficas, la pertenencia a un sindicato o partido político, la salud o la vida u orientación sexual de la persona. La UIP establecerá y revisará periódicamente estos criterios, en colaboración con las autoridades competentes.

    3. Al realizar la evaluación a que se refiere el apartado 2.a), la UIP podrá someter los datos PNR a las siguientes operaciones:

    a) Comparará los datos PNR con todas las bases de datos disponibles y pertinentes, a los efectos de la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves.

    b) Tratará los datos PNR de acuerdo con los criterios predeterminados establecidos para identificar a las personas que puedan estar implicadas en delitos de terrorismo o en delitos graves.

    4. Cuando la evaluación efectuada de acuerdo con el apartado 2.a) arrojara un resultado positivo, la UIP procederá a la revisión individual de tal resultado a través de medios no automatizados, con el fin de comprobar la necesidad de que las autoridades competentes realicen un examen ulterior o emprendan las acciones o inicien los procedimientos oportunos. A tal fin, la UIP deberá transmitir los datos PNR a las autoridades competentes.

    Artículo 13. Consecuencias de la evaluación.

    Las consecuencias de las evaluaciones de los pasajeros a las que se refiere el apartado 2.a) del artículo anterior, no perjudicarán el derecho de entrada en España de las personas que gocen del derecho de libre circulación en la Unión Europea.

    Cuando estas evaluaciones se efectúen en relación con pasajeros de vuelos interiores de la Unión Europea a los que sea aplicable el Reglamento (UE) 2016/399 del Parlamento Europeo y del Consejo, de 9 de marzo de 2016, por el que se establece un Código de normas de la Unión para el cruce de personas por las fronteras, las consecuencias se ajustarán a lo previsto en dicho reglamento.

    Artículo 14. Autoridades competentes.

    1. Las autoridades competentes para solicitar o recibir de la UIP datos PNR o el resultado del tratamiento de dichos datos a fin de seguir examinando esa información o de adoptar las medidas adecuadas para prevenir, detectar, investigar y enjuiciar delitos de terrorismo y delitos graves, serán las siguientes:

    a) La Dirección General de la Policía.

    b) La Dirección General de la Guardia Civil.

    c) El Centro Nacional de Inteligencia.

    d) La Dirección Adjunta de Vigilancia Aduanera.

    e) El Ministerio Fiscal.

    f) Las correspondientes de las Comunidades Autónomas que hayan asumido estatutariamente competencias para la protección de personas y bienes y para el mantenimiento de la seguridad ciudadana, y cuenten con un cuerpo de policía propio.

    2. Las peticiones de datos realizadas por las autoridades competentes serán debidamente motivadas y con suficiente base. En ningún caso se admitirán peticiones masivas y no fundamentadas.

    3. Las autoridades competentes colaborarán con la UIP, en el ámbito de sus competencias, para el cumplimiento de los fines de esta ley orgánica.

    4. A los Jueces y Tribunales, que tendrán la consideración de autoridades competentes, no les serán de aplicación los apartados 2 y 3, en atención al principio constitucional de independencia del poder judicial, rigiéndose en cuanto a las peticiones de datos y a la colaboración con la UIP por lo que establezca la legislación aplicable al ejercicio de la función jurisdiccional.

    5. Los datos remitidos por la UIP a las autoridades competentes podrán ser objeto de tratamiento posterior por estas, únicamente con los fines específicos de prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves, sin perjuicio de las acciones o procedimientos que puedan realizarse o iniciarse en el caso de que, como consecuencia del tratamiento de dichos datos, se detecten otros delitos o indicios de ellos.

    6. Las autoridades competentes no adoptarán ninguna decisión que produzca efectos jurídicos adversos para una persona o que afecte negativamente a una persona únicamente en razón del tratamiento automatizado de datos PNR.

    Dichas decisiones no deberán basarse en el origen racial o étnico, las opiniones políticas, las creencias religiosas o filosóficas, la pertenencia a un sindicato o partido político, la salud o la vida y orientación sexual de la persona.

    Artículo 15. Protección de los datos de carácter personal.

    1. La UIP no podrá tratar datos PNR que revelen el origen racial o étnico, las opiniones políticas, las creencias religiosas o filosóficas, la pertenencia a un sindicato o partido político, la salud, la vida o la orientación sexual de la persona. En el caso de que reciba datos PNR que revelen tal información, los suprimirá inmediatamente.

    2. La UIP conservará la documentación relativa a todos los sistemas y procedimientos de tratamiento bajo su responsabilidad.

    Dicha documentación constará como mínimo de los siguientes elementos:

    a) Los datos identificativos del personal de la UIP encargado del tratamiento de los datos PNR, así como del responsable de protección de datos, y los distintos niveles de autorización de acceso;

    b) las solicitudes cursadas por las autoridades competentes y por las Unidades de Información sobre Pasajeros de otros Estados miembros y;

    c) todas las solicitudes y transmisiones de datos PNR a un tercer país o a Europol.

    La UIP pondrá esta documentación a disposición de la autoridad nacional de control a petición de esta, de acuerdo con la legislación vigente.

    3. La UIP llevará registros, al menos, de las operaciones de recogida, consulta, transferencia y supresión de los datos.

    Los registros de consulta y transferencia mostrarán, en particular, la finalidad, la fecha y la hora de tales operaciones y, en la medida de lo posible, la identidad de la persona que consultó o transmitió los datos PNR y la identidad de los receptores de dichos datos.

    Los registros se utilizarán exclusivamente a efectos de verificación, autocontrol, y garantía de la integridad de los datos y de su seguridad o de auditoría. Dichos registros se conservarán por un período de cinco años.

    La UIP pondrá los registros a disposición de la autoridad nacional de control a petición de esta, de acuerdo con la legislación aplicable.

    4. Cuando sea probable que una violación de los datos personales dé lugar a un elevado riesgo para la protección de estos o afecte negativamente a la intimidad del interesado, la UIP comunicará, sin demora injustificada, dicha violación al interesado y a la autoridad nacional de control.

    5. La UIP aplicará las medidas y los procedimientos técnicos y organizativos adecuados para garantizar un elevado nivel de seguridad correspondiente a los riesgos que entrañen el tratamiento y las características de los datos PNR.

    Artículo 16. Intercambio de información entre Estados miembros de la Unión Europea.

    1. La UIP transmitirá los datos PNR pertinentes y necesarios o el resultado de su tratamiento, relativos a las personas identificadas por la misma como personas que puedan estar implicadas en un delito de terrorismo o en un delito grave, a las Unidades de Información sobre Pasajeros de los otros Estados miembros. Dicha transmisión sólo se llevará a cabo tras un análisis de cada caso y, en supuestos de tratamiento automatizado de los datos PNR, tras una revisión individualizada por medios no automatizados.

    En caso de que la UIP reciba datos PNR o el resultado de su tratamiento de la Unidad de Información sobre Pasajeros de otro Estado miembro deberá proporcionar todos los datos pertinentes y necesarios, a las autoridades competentes correspondientes, tras una revisión individualizada.

    2. La UIP tendrá derecho a solicitar, en cada caso concreto, para la prevención, detección, investigación o enjuiciamiento de delitos de terrorismo o delitos graves, a la Unidad de Información sobre Pasajeros de cualquier otro Estado miembro, que le suministre los datos PNR almacenados en su base de datos y que no hayan sido despersonalizados mediante enmascaramiento de elementos de los datos, así como, si fuera necesario, el resultado de cualquier tratamiento de los mismos. La solicitud deberá ser debidamente motivada.

    En el caso de que hayan sido despersonalizados mediante enmascaramiento de elementos de datos, la transmisión tendrá lugar de conformidad con el derecho nacional aplicable en el Estado miembro de la Unidad de Información sobre Pasajeros requerida.

    3. A su vez, la Unidad de Información sobre Pasajeros de cualquier Estado miembro podrá solicitar directamente a la UIP datos PNR o el resultado de su tratamiento, bajo las mismas condiciones previstas en el apartado anterior. En ese caso, la UIP proporcionará la información solicitada lo antes posible.

    En el supuesto de que los datos requeridos hayan sido despersonalizados mediante enmascaramiento, la UIP únicamente proporcionará los datos completos o el resultado de su tratamiento ante casos específicos cuando sea necesario para la prevención, detección, investigación y enjuiciamiento de delitos de terrorismo y delitos graves, y sólo cuando lo haya autorizado la autoridad judicial o la persona titular de la Secretaría de Estado de Seguridad.

    4. Las autoridades competentes que requieran datos PNR recabados por un Estado miembro de la Unión Europea canalizarán sus solicitudes de forma motivada a través de la UIP.

    Únicamente cuando no sea posible dirigir sus peticiones a través de la UIP y en caso de urgencia, y siempre que la solicitud cumpla con las condiciones establecidas en el apartado 2, las autoridades competentes podrán solicitar dichos datos directamente a la Unidad de Información sobre Pasajeros de otro Estado miembro.

    De estas solicitudes directas y urgentes se remitirá copia a la UIP, al mismo tiempo que a la Unidad de Información sobre Pasajeros del Estado miembro de que se trate, que deberá acompañarse, lo antes posible, de una motivación de la remisión directa.

    5. De manera excepcional, cuando sea necesario acceder a los datos PNR para responder a una amenaza concreta y real relacionada con delitos de terrorismo o delitos graves, la UIP solicitará a la Unidad de Información sobre Pasajeros del Estado miembro correspondiente que acceda a los datos PNR fuera de los momentos ordinarios de transmisión establecidos en el artículo 10 y que se los transmita.

    Del mismo modo, la UIP responderá lo antes posible a las solicitudes que reciba de otros Estados miembros en los supuestos previstos en el párrafo anterior.

    6. El intercambio de información previsto en este artículo podrá realizarse utilizando cualquiera de las vías existentes de cooperación entre las autoridades competentes de los Estados miembros.

    Artículo 17. Transferencia de datos a Europol.

    1. La UIP transferirá los datos PNR específicos o el resultado de su tratamiento solicitados por Europol, caso por caso, de forma electrónica y debidamente motivada, cuando sea estrictamente necesario para apoyar y reforzar la acción de un Estado miembro de la Unión Europea a efectos de prevenir, detectar, investigar o enjuiciar delitos de terrorismo o delitos graves, siempre que el delito entre dentro del ámbito de competencias de Europol y para el desempeño de sus funciones.

    2. La solicitud indicará las causas razonables por las que Europol considera que la transmisión de los datos PNR o de los resultados de su tratamiento va a contribuir significativamente a prevenir, detectar o investigar la infracción penal en cuestión.

    3. Europol informará al responsable de la protección de datos de cada uno de los intercambios de información en virtud de este artículo.

    4. El intercambio de información se realizará a través de la Red de Intercambio Seguro de Información (SIENA).

    Artículo 18. Transferencias de datos a terceros países no miembros de la Unión Europea.

    1. La UIP podrá transferir a terceros países no miembros de la UE datos PNR, así como el resultado de su tratamiento, en casos concretos y si se cumplen concurrentemente los siguientes requisitos:

    a) Las condiciones establecidas para las transferencias de datos a terceros países en la legislación que transponga la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, y hasta ese momento por las normas que regulen en Derecho español el tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección y enjuiciamiento de infracciones penales o de ejecución de sanciones penales.

    b) La transmisión resulta necesaria para los fines señalados en el artículo 1.2.

    c) El tercer país se compromete a transmitir los datos PNR a otro tercer país sólo si fuera estrictamente necesario para los fines de esta ley orgánica y siempre contando con la autorización expresa de la UIP.

    d) Los previstos en el artículo 16.

    2. Las transmisiones de datos PNR por la UIP sin consentimiento previo del Estado miembro del que fueron obtenidos se permitirán en circunstancias excepcionales y únicamente si:

    a) Son esenciales para responder a una amenaza específica y real relacionada con delitos de terrorismo o delitos graves de un Estado miembro o de un tercer país y;

    b) el consentimiento previo no pudo obtenerse a su debido tiempo.

    La UIP informará sin demora a la autoridad del Estado miembro responsable de dar el consentimiento. La transmisión se registrará por la UIP y podrá ser objeto de una verificación posterior.

    3. Cada vez que la UIP transfiera datos PNR a terceros países en virtud de lo previsto en este artículo, su responsable de protección de datos será informado.

    4. La UIP exclusivamente transmitirá datos PNR a las autoridades competentes de terceros países tras asegurarse de que se ajustan a un estándar de condiciones y garantías equivalente al de esta ley orgánica y de que la utilización de los datos PNR prevista por los receptores se ajusta a dichas condiciones y garantías.

    Artículo 19. Período de conservación de los datos y despersonalización.

    1. Los datos PNR proporcionados a la UIP por los sujetos obligados se conservarán en una base de datos de la Unidad durante un plazo de cinco años a partir de la fecha de su transmisión a la UIP.

    2. Transcurrido un plazo de seis meses desde la transmisión a la que se refiere el apartado 1, todos los datos PNR deberán ser despersonalizados mediante enmascaramiento, de manera que resulten invisibles para un usuario los siguientes elementos que servirían para identificar directamente a los afectados:

    a) Nombres y apellidos, incluidos los de otros pasajeros que figuran en el PNR, y número de personas que figuran en el PNR que viajan juntas;

    b) dirección y datos de contacto;

    c) todos los datos sobre el pago, incluida la dirección de facturación, en la medida en que contengan información que pueda servir para identificar directamente al pasajero al que se refiere el registro PNR, o a cualquier otra persona;

    d) información sobre viajeros frecuentes;

    e) observaciones generales, en la medida en que contengan información que pueda servir para identificar directamente al pasajero al que se refiere el registro, y

    f) todos los datos API sobre los pasajeros.

    3. Al finalizar el período de seis meses mencionado en el apartado 2, solo se permitirá la transmisión de los datos completos cuando concurran las dos circunstancias siguientes:

    a) Que sea necesario a los efectos establecidos en el artículo 12.2.b).

    b) Que haya sido aprobada por una autoridad judicial o por la persona titular de la Secretaría de Estado de Seguridad. En este último caso, se informará de la transmisión al responsable de protección de datos de la UIP, y estará sujeta a la revisión, a posteriori, por parte del mismo.

    4. Los datos PNR serán suprimidos de modo permanente al finalizar el período a que se refiere el apartado 1. Esta obligación se entenderá sin perjuicio de aquellos casos en que se hayan transferido datos PNR específicos a una autoridad competente y esta los esté utilizando en el marco de un asunto concreto a efectos de prevenir, detectar, investigar o enjuiciar delitos de terrorismo o delitos graves, en cuyo caso la conservación de los datos por la autoridad competente se regirá por la normativa específica.

    5. Los resultados del tratamiento a que se refiere el artículo 12.2.a) serán conservados por la UIP durante el tiempo necesario para informar de un resultado positivo a las autoridades competentes y a las Unidades de Información sobre Pasajeros de otros Estados miembros.

    Cuando el resultado de un tratamiento automatizado, tras un examen individual por medios no automatizados, arroje un resultado negativo, se podrá almacenar para evitar falsos resultados positivos posteriores, mientras los datos de base no se hayan eliminado según el apartado 4.

    Artículo 20. Competencias de la Agencia Española de Protección de Datos.

    Además de las competencias que le otorga su normativa específica, la Agencia Española de Protección de Datos, en su condición de autoridad nacional de control de datos PNR a los efectos previstos en esta ley orgánica, ejercerá las siguientes competencias:

    a) Asesorar, previa solicitud, sobre la aplicación de las disposiciones adoptadas en España para aplicar la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, y controlar su aplicación con el fin de proteger los derechos fundamentales de cualquier interesado en lo relativo al tratamiento de datos personales.

    b) Conocer de las reclamaciones presentadas contra los tratamientos realizados al amparo de esta ley orgánica y dar respuesta a las mismas en un plazo de tiempo razonable.

    c) Verificar la legalidad de los tratamientos, por propia iniciativa o como consecuencia de una reclamación, para lo cual podrá realizar investigaciones, inspecciones y auditorías, de acuerdo con lo dispuesto en su normativa reguladora, sin perjuicio de las funciones que corresponden al Consejo General del Poder Judicial como autoridad de control de los tratamientos de datos vinculados al ejercicio de la función jurisdiccional.

    CAPÍTULO III. Régimen sancionador

    Sección 1ª. Disposiciones generales

    Artículo 21. Sujetos responsables.

    La responsabilidad por las infracciones cometidas recaerá directamente en los sujetos obligados que, por acción u omisión, realizaran la conducta en que consista la infracción.

    Artículo 22. Responsable de tratamiento y responsable de protección de datos.

    La responsabilidad del responsable de tratamiento de los datos PNR y del responsable de protección de datos PNR se determinará de acuerdo con lo dispuesto en la legislación que transponga la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, y hasta ese momento por las normas que regulen en Derecho español el tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección y enjuiciamiento de infracciones penales o de ejecución de sanciones penales.

    Artículo 23. Regla especial.

    A los efectos exclusivos de esta ley orgánica, se entenderá que los incumplimientos de la obligación de transmisión o remisión de los datos PNR que se produzcan en relación a un mismo vuelo constituyen una única infracción.

    Artículo 24. Concurso de normas.

    1. Siempre que no constituyan infracciones a la normativa general de protección de datos de carácter personal, los hechos susceptibles de ser calificados con arreglo a dos o más preceptos de esta u otra ley orgánica se sancionarán observando las siguientes reglas:

    a) El precepto especial se aplicará con preferencia al general.

    b) El precepto más amplio o complejo absorberá el que sancione las infracciones subsumidas en aquel.

    c) En defecto de los criterios anteriores, se aplicará el precepto que sancione los hechos con la sanción mayor.

    2. En el caso de que un solo hecho constituya dos o más infracciones, o cuando una de ellas sea medio necesario para cometer la otra, la conducta será sancionada por aquella infracción a la que se aplique una mayor sanción.

    Sección 2ª. Infracciones

    Artículo 25. Clasificación de las infracciones.

    Las infracciones tipificadas en esta ley orgánica se clasifican en muy graves, graves y leves.

    Artículo 26. Infracciones muy graves.

    Constituyen infracciones muy graves:

    a) La falta de remisión de los datos PNR, de acuerdo con lo establecido en el artículo 10.1 y 2, cuando se haya generado un riesgo grave para la seguridad ciudadana, la vida o la integridad física de las personas.

    b) La falta de remisión de los datos PNR, conforme a los formatos y protocolos a los que se refiere el artículo 9.4, cuando se haya generado un riesgo grave para la seguridad ciudadana, la vida o la integridad física de las personas.

    c) En caso de requerimiento previo, la falta de remisión de los datos PNR o la remisión fuera del plazo concedido al efecto, cuando se haya generado un riesgo grave para la seguridad ciudadana, la vida o la integridad física de las personas.

    d) La falta de transmisión de los datos PNR a la UIP en los supuestos a los que se refiere el artículo 10.3.

    Artículo 27. Infracciones graves.

    Constituyen infracciones graves:

    a) La falta de remisión de los datos PNR, de acuerdo con lo establecido en el artículo 10.1 y 2.

    b) La falta de remisión de los datos PNR, conforme a los formatos y protocolos a los que se refiere el artículo 9.4.

    c) La falta de adopción en tiempo y forma, por parte de los sujetos obligados, de las medidas necesarias para realizar legalmente las transmisiones.

    d) En caso de requerimiento previo, la falta de remisión de los datos PNR o la remisión fuera del plazo establecido al efecto o sin cumplir con los requisitos técnicos y legales de transmisión.

    e) Las omisiones en la transmisión de datos.

    f) La falta de comunicación, conforme a lo dispuesto en esta ley orgánica, de cualquier cambio producido previamente o durante el trayecto, respecto al destino donde se tuviera previsto aterrizar.

    g) La falta de diligencia en el mantenimiento de los sistemas electrónicos seguros de transmisión de los datos PNR siempre que no constituya infracción con arreglo a la normativa general de protección de datos de carácter personal.

    Artículo 28. Infracciones leves.

    Constituyen infracciones leves:

    a) El incumplimiento de la obligación de informar a la UIP sobre los formatos de datos y protocolos de transmisión en el plazo previsto.

    b) Cualquier otro incumplimiento de lo previsto en esta ley orgánica y que no constituya infracción grave o muy grave.

    Sección 3ª. Sanciones

    Artículo 29. Sanciones.

    Las infracciones muy graves serán sancionadas con multa de 60.001 a 300.000 euros; de 20.001 a 60.000 euros las graves; y de 3.000 a 20.000 euros las leves.

    Artículo 30. Graduación de las sanciones.

    Atendiendo al principio de proporcionalidad, se graduará la cuantía de las sanciones teniendo en cuenta, entre otras, las siguientes circunstancias, además de las previstas en el artículo 29 de la Ley 40/2015, de 1 de octubre:

    a) La incidencia en la seguridad pública y/o en los derechos a la intimidad, la protección de datos, la imagen o el honor de las personas.

    b) El beneficio económico obtenido como consecuencia de la comisión de la infracción.

    c) La naturaleza, gravedad y duración de la infracción, teniendo en cuenta el número de afectados y los daños o perjuicios que hayan sufrido.

    d) El grado de cooperación para poner remedio o mitigar los posibles efectos adversos.

    Artículo 31. Competencia sancionadora.

    Son órganos competentes para la imposición de las sanciones:

    a) La persona titular del Ministerio del Interior, para la sanción de las infracciones muy graves.

    b) La persona titular de la Secretaría de Estado de Seguridad, para la sanción de las infracciones graves y leves.

    Sección 4ª. Normas especiales de procedimiento sancionador

    Artículo 32. Medidas provisionales.

    Los gastos ocasionados por la adopción de las posibles medidas provisionales serán de cuenta del causante de los hechos objeto del procedimiento sancionador. Dichos gastos, en su caso, serán reclamables mediante el procedimiento administrativo de apremio cuando la sanción adquiera firmeza en vía administrativa.

    Artículo 33. Caducidad del procedimiento.

    El procedimiento caducará transcurrido un año desde su incoación sin que se haya notificado la resolución, debiendo, no obstante, tenerse en cuenta en el cómputo las posibles paralizaciones por causas imputables al interesado o la suspensión que debiera acordarse por la existencia de un procedimiento judicial penal, cuando concurra identidad de sujeto, hecho y fundamento, hasta la finalización de este.

    Artículo 34. Acceso a los datos de otras Administraciones públicas.

    Los órganos competentes para imponer las sanciones previstas en esta ley orgánica podrán acceder, en el ejercicio de dichas competencias, a los datos relativos a los sujetos infractores que estén directamente relacionados con la investigación de los hechos constitutivos de infracción, con las debidas garantías de seguridad, integridad y disponibilidad. El acceso y el tratamiento posterior de los datos se realizarán, en todo caso, de conformidad con lo establecido en la normativa reguladora de protección de datos de carácter personal.

    Disposición adicional primera. Plazo para comunicar los formatos de datos y protocolos de transmisión.

    Las compañías aéreas informarán a la UIP del formato de datos y del protocolo de transmisión que utilizarán, en el plazo de cuarenta días a contar desde la fecha de publicación en el «Boletín Oficial del Estado» de esta ley orgánica. El formato y el protocolo deberán estar entre los previstos en la Decisión de Ejecución (UE) 2017/759 de la Comisión, de 28 de abril de 2017.

    Disposición adicional segunda. Transmisión de datos PNR.

    Las transmisiones de datos PNR se realizarán según los medios de transmisión establecidos por la Secretaría de Estado de Seguridad, de acuerdo con lo dispuesto en el artículo 9.

    Disposición adicional tercera. Régimen jurídico del acceso por el Centro Nacional de Inteligencia a datos PNR.

    El acceso a los datos PNR por parte del Centro Nacional de Inteligencia y su control, se realizarán de acuerdo con lo previsto en esta ley orgánica, salvaguardando, en todo caso, el carácter de materia legalmente clasificada como secreto de sus actividades y objetivos, con el fin de dar cumplimiento a las misiones y funciones establecidas en la Ley 11/2002, de 6 de mayo, reguladora del Centro Nacional de Inteligencia.

    Disposición adicional cuarta. Transmisiones de datos PNR a las Direcciones Generales de la Policía y de la Guardia Civil y a las autoridades competentes de las Comunidades Autónomas que cuenten con un cuerpo de policía propio e integral.

    Las transmisiones de datos PNR a las Direcciones Generales de la Policía y de la Guardia Civil y su control, se realizarán de acuerdo con lo previsto en esta ley orgánica, salvaguardando, en todo caso, el carácter reservado de sus investigaciones y de la inteligencia generada en torno a dichos datos en relación a delitos de terrorismo y demás delitos graves.

    Igual régimen de transmisión y salvaguarda de sus investigaciones e inteligencia que las contempladas en el párrafo anterior se aplicarán a las autoridades competentes de las Comunidades Autónomas que hayan asumido competencias para la protección de personas y bienes y para el mantenimiento de la seguridad ciudadana y cuenten con cuerpo de policía propio.

    Disposición adicional quinta. Transmisiones de datos PNR a la Dirección Adjunta de Vigilancia Aduanera.

    Las transmisiones de datos PNR a la Dirección Adjunta de Vigilancia Aduanera y su control, se harán de acuerdo con lo previsto en esta ley orgánica, salvaguardando, en todo caso, el carácter reservado de los datos con trascendencia tributaria, de acuerdo con la Ley 58/2003, de 17 de diciembre, General Tributaria, de sus investigaciones y de la inteligencia generada en torno a dichos datos en relación a delitos graves de su competencia.

    Disposición adicional sexta. Transmisiones de datos PNR a Jueces, Tribunales y Ministerio Fiscal.

    Las transmisiones de datos PNR a Jueces, Tribunales y Ministerio Fiscal se harán de acuerdo con lo previsto en esta ley orgánica, sin perjuicio de la aplicación a su tratamiento de la legislación reguladora del ejercicio de la potestad jurisdiccional.

    En particular, las transmisiones de datos PNR a Jueces y Tribunales se efectuarán de acuerdo con lo previsto en el artículo 14.4 de esta ley orgánica.

    Disposición final primera. Título competencial.

    Esta ley orgánica se dicta al amparo de lo previsto en el artículo 149.1.1.ª y 29.ª de la Constitución, que atribuyen al Estado la competencia exclusiva para la regulación de las condiciones básicas que garanticen la igualdad de todos los españoles en el ejercicio de los derechos y en el cumplimiento de los deberes constitucionales, y sobre la seguridad pública, respectivamente.

    Disposición final segunda. Preceptos que tienen carácter de ley orgánica.

    1. Tienen carácter orgánico los siguientes preceptos:

    a) Los artículos 4 y 5.

    b) El capítulo II.

    c) La disposición final segunda.

    2. Los preceptos no incluidos en el apartado anterior tienen carácter de ley ordinaria.

    Disposición final tercera. Incorporación de derecho de la Unión Europea.

    Mediante esta ley orgánica se incorpora al Derecho español la Directiva (UE) 2016/681 del Parlamento Europeo y del Consejo, de 27 de abril de 2016 relativa a la utilización de datos del registro de nombres de los pasajeros (PNR) para la prevención, detección, investigación y enjuiciamiento de los delitos de terrorismo y de la delincuencia grave.

    Disposición final cuarta. Entrada en vigor.

    Esta ley orgánica entrará en vigor a los dos meses de su publicación en el «Boletín Oficial del Estado», excepto la disposición adicional primera, que entrará en vigor al día siguiente de dicha publicación.

    Por tanto,

    Mando a todos los españoles, particulares y autoridades, que guarden y hagan guardar esta ley orgánica.

    Madrid, 16 de septiembre de 2020.

    FELIPE R.

    El Presidente del Gobierno, PEDRO SÁNCHEZ PÉREZ-CASTEJÓN

    16May/21

    COM 2010/492 final. Comunicación de 21 de septiembre de 2010

    COM 2010/492 final. Comunicación de la Comisión de 21 de septiembre de 2010 «Sobre el enfoque global de las transferencias de datos de los registros de nombres de los pasajeros (PNR) a los terceros países».

    La Unión Europea (UE) ha adoptado nuevas medidas de protección contra las amenazas del terrorismo y la delincuencia organizada que se han plasmado en la Comunicación de la Comisión sobre gestión de la información en el espacio de libertad, seguridad y justicia. Dichas medidas contemplan la utilización de datos de los registros de nombres de los pasajeros (PNR)* para fines represivos. El uso de los datos PNR es cada vez más frecuente, lo que plantea problemas en lo que respecta a la protección de los datos personales. Debido a esta problemática, la Comisión se ha replanteado su política general respecto a las transferencias de datos PNR a terceros países. Por consiguiente, la presente Comunicación establece una serie de criterios generales para los futuros acuerdos bilaterales relativos a los PNR, a fin de contribuir a la lucha contra el terrorismo y las formas graves de delincuencia transnacional, al tiempo que garantiza el respeto de los derechos fundamentales y la coherencia entre los distintos acuerdos en materia de PNR.

    Datos de registros de nombres de los pasajeros (PNR)

    Los datos PNR se emplean principalmente como instrumento de investigación penal con el objetivo de:

    • evaluar los riesgos de los pasajeros e identificar a personas «desconocidas»;
    • proporcionar los datos a los servicios represivos con anterioridad a la llegada o salida de los vuelos para otorgarles más tiempo para cualquier actividad de seguimiento;
    • identificar a las personas a las que pertenecen las direcciones o tarjetas de crédito concretas relacionadas con delitos;
    • identificar a las personas asociadas a los sospechosos.

    Los datos PNR se emplean en investigaciones y procesamientos. Asimismo, se utilizan para prevenir delitos y detener a personas cuando se ha cometido un delito, así como para realizar evaluaciones de viajes y comportamientos que faciliten la prevención de tales actos delictivos.

    No obstante, en virtud de las leyes de protección de datos de la UE, las compañías aéreas pueden no transmitir datos PNR a terceros países que no proporcionen un nivel adecuado de protección de los datos personales. Por este motivo, la UE firmó acuerdos internacionales en materia de PNR con Estados Unidos, Canadá y Australia. Sin embargo, tales acuerdos se negociaron en el marco de casos concretos y por tanto sus disposiciones en lo que respecta a las normas de aplicación a las compañías aéreas y a la protección de datos no son uniformes. Dado que cabe esperar que el número de acuerdos aumente en un futuro próximo, es preciso establecer normas generales, contenidos y criterios para los mismos.

    Enfoque global de los PNR

    Un enfoque global de los PNR permitirá una mayor uniformidad en cuanto a las garantías de protección de datos exigidas a los terceros países y a las modalidades de transmisión de datos a disposición de las compañías aéreas.

    La recogida y transferencia de datos PNR a terceros países afecta a un gran número de personas y sus respectivos datos personales. Dado que los regímenes de protección de datos de los terceros países pueden diferir del de la UE, es primordial que aseguren una protección legal adecuada para los datos PNR transferidos. Por tanto, los terceros países deberán aplicar los siguientes principios de base de la protección de datos personales:

    • la utilización de los datos deberá limitarse a la finalidad de la transferencia;
    • el intercambio de datos deberá limitarse al mínimo necesario;
    • los datos sensibles sólo deberán utilizarse en circunstancias excepcionales;
    • deberán adoptarse las medidas oportunas para preservar la seguridad, confidencialidad e integridad de los datos;
    • las autoridades que empleen los datos PNR ostentarán responsabilidad sobre los mismos y estarán sometidas a la supervisión de una autoridad pública independiente;
    • deberá informarse a los interesados del tratamiento de sus datos personales;
    • a las personas se les permitirá el acceso a sus datos PNR y éstas podrán solicitar su rectificación o supresión;
    • toda persona cuya privacidad se haya vulnerado tendrá derecho a tutela judicial y administrativa;
    • las decisiones que tengan efectos adversos para las personas no podrán basarse exclusivamente en el tratamiento automatizado de los datos personales;
    • el periodo de conservación de los datos deberá limitarse a la finalidad de la transferencia;
    • las transferencias posteriores de datos a otras autoridades públicas u otros terceros países deberá limitarse.

    Las normas por las que se rige la transmisión de datos a los terceros países por parte de las compañías aéreas deberán racionalizarse para aumentar la seguridad jurídica y reducir al mínimo la carga financiera de tales compañías. Se deberán normalizar al menos las siguientes modalidades de transmisión:

    • método de transmisión, que deberá basarse en el sistema de transmisión «push»;
    • frecuencia de la transmisión, que deberá limitarse;
    • recogida de datos adicionales, que no deberá ser obligatoria.

    Asimismo, los acuerdos en materia de PNR con los terceros países deberán ser válidos durante un periodo fijo y estar sujetos a revisión. Deberán establecerse mecanismos de seguimiento de la aplicación, así como de solución de conflictos en lo que respecta a la interpretación o aplicación. Asimismo, es esencial asegurar la reciprocidad entre los países de la UE y los terceros países, especialmente en lo que se refiere a las transferencias de información analítica derivada de datos PNR.

    Por último, y desde la perspectiva a largo plazo, si aumentase el número de países que utilizan los datos PNR, la UE deberá considerar la posibilidad de establecer normas a nivel internacional para la transmisión y utilización de los mismos, y por ende sustituir los acuerdos bilaterales en materia de PNR por un acuerdo multilateral.

    Términos clave del acto

    * Datos PNR: información no verificada que proporcionan los pasajeros y recogen las compañías aéreas para efectuar las reservas y llevar a cabo el proceso de facturación. Se trata de un registro de los requisitos de viaje de cada pasajero que figura en los sistemas de reservas y control de salidas de las compañías. Contiene diversos tipos de información, por ejemplo las fechas y el itinerario de viaje, los datos del billete, datos de contacto, agencia de viajes, información sobre el pago, número de asiento y datos del equipaje.

    15May/21

    Comunicación de la Comisión Europea de 4 de noviembre de 2010

    Comunicación de la Comisión Europea «Un enfoque global de la protección de los datos personales en la Unión Europea», de 4 de noviembre de 2010.

    El Parlamento Europeo,

    Visto el Tratado de Funcionamiento de la Unión Europea y, en particular, su artículo 16,

    Vistos la Carta de los Derechos Fundamentales de la Unión Europea, en particular sus artículos 7 y 8, y el Convenio Europeo para la Protección de los Derechos Humanos y las Libertades Fundamentales (CEDH), en particular su artículo 8, relativo al respeto de la vida privada y familiar, y su artículo 13 sobre el derecho a un recurso efectivo,

    Vista la Directiva 95/46/CE del Parlamento Europeo y del Consejo, de 24 de octubre de 1995, relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos (1),

    Vista la Decisión marco 2008/977/JAI del Consejo, de 27 de noviembre de 2008, relativa a la protección de datos personales tratados en el marco de la cooperación policial y judicial en materia penal (2),

    Visto el Reglamento (CE) nº 45/2001 del Parlamento Europeo y del Consejo de 18 de diciembre de 2000 relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por las instituciones y los organismos comunitarios y a la libre circulación de estos datos (3),

    Vista la Directiva 2002/58/CE del Parlamento Europeo y del Consejo, de 12 de julio de 2002, relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las comunicaciones electrónicas (Directiva sobre la privacidad y las comunicaciones electrónicas) (4),

    Vistos el Convenio 108 del Consejo de Europa, de 28 de enero de 1981, para la protección de las personas con respecto al tratamiento automatizado de datos de carácter personal que desarrolla la Directiva 95/46/CE y su Protocolo adicional, de 8 de noviembre de 2001, relativo a las autoridades de control y los tránsitos transfronterizos de datos, así como las recomendaciones del Comité de Ministros a los Estados miembros, en particular la Recomendación nº R (87) 15 dirigida a regular la utilización de datos de carácter personal en el sector de la policía y la Recomendación CM/Rec. (2010) 13 sobre la protección de individuos con respecto al procesamiento de datos personales en el contexto de perfiles,

    Vistos los Principios rectores para la reglamentación de los ficheros computadorizados de datos personales dictados por la Asamblea General de la ONU en 1990,

    Vista la Comunicación de la Comisión al Consejo, al Parlamento Europeo, al Comité Económico y Social Europeo y al Comité de las Regiones titulada «Un enfoque global de la protección de los datos personales en la Unión Europea» (COM(2010)0609),

    Vistas las conclusiones del Consejo relativas a la comunicación de la Comisión titulada «Un enfoque global de la protección de los datos personales en la Unión Europea» (5),

    Visto el dictamen del Supervisor Europeo de Protección de Datos de 14 de enero de 2011, relativo a la comunicación de la Comisión titulada «Un enfoque global de la protección de los datos personales en la Unión Europea»,

    Vista la contribución conjunta del Grupo de trabajo sobre protección de datos del artículo 29 y del Grupo «Policía y Justicia» a la consulta de la Comisión Europea sobre el marco jurídico para el derecho fundamental de protección de datos personales, titulada «El futuro de la vida privada» (6),

    Vista la opinión 8/10 del Grupo de trabajo sobre protección de datos del artículo 29, relativa a la legislación aplicable (7),

    Vistas sus anteriores resoluciones sobre la protección de datos y su resolución sobre el Programa de Estocolmo (8),

    Visto el artículo 48 de su Reglamento,

    Vistos el informe de la Comisión de Libertades Civiles, Justicia y Asuntos de Interior y las opiniones de la Comisión de Industria, Investigación y Energía, de la Comisión de Mercado Interior y Protección del Consumidor, de la Comisión de Cultura y Educación y de la Comisión de Asuntos Jurídicos (A7-0244/2011),

    A.  Considerando que la Directiva 95/46/CE sobre la protección de los datos y la Directiva 2009/140/CE sobre el paquete de telecomunicaciones de la UE posibilitan la libre circulación de los datos personales dentro del mercado interior,

    B.   Considerando que la legislación sobre protección de datos en la UE, en los Estados miembros y en otros países ha desarrollado una tradición jurídica que es preciso conservar y seguir perfeccionado,

    C.  Considerando que el principio fundamental de la Directiva 1995/46/CE sobre protección de datos sigue siendo válido, pero que se han constatado diferentes enfoques en los diferentes Estados miembros en la forma de aplicarlo y de cumplirlo; considerando que la UE debe dotarse – tras una exhaustiva evaluación del impacto – de un marco global, coherente, moderno y de alto nivel capaz de proteger los datos personales de los individuos dentro y fuera de la UE en todas circunstancias, con el fin de responder a los numerosos desafíos que supone la protección de datos, como los causados por la globalización, el desarrollo tecnológico y la preocupación por la seguridad (es decir, la lucha contra el terrorismo); considerando que un marco de protección de datos como este contribuye a aumentar la seguridad jurídica, limitar al máximo la carga administrativa, ofrecer unas condiciones equitativas para los operadores económicos, impulsar el mercado interior digital y suscitar la confianza de las personas en el comportamiento de los responsables del tratamiento de datos y las autoridades ejecutivas,

    D.  Considerando que las violaciones de las disposiciones sobre protección de datos pueden traducirse en graves riesgos para los derechos fundamentales de las personas y para los valores de los Estados miembros, de modo que la Unión y los Estados miembros deben adoptar medidas eficaces contra ese tipo de infracciones; considerando que esas violaciones conducen a una falta de confianza por parte de los ciudadanos que debilitará la oportuna utilización de las nuevas tecnologías, y que el mal uso y el abuso de datos personales debe ser punible mediante oportunas sanciones graves y disuasorias, incluidas sanciones penales,

    E.   Considerando que hay que tener en cuenta otros derechos fundamentales importantes, consagrados en la Carta, y otros objetivos recogidos en los Tratados, como el derecho a la libertad de expresión y de información y el principio de transparencia al tiempo que se garantiza el derecho fundamental a la protección de los datos personales,

    F.   Considerando que el nuevo fundamento jurídico establecido en el artículo 16 del TFUE y el reconocimiento en el artículo 8 de la Carta de los Derechos Fundamentales del derecho a la protección de datos personales y, en el artículo 7 del mismo, el derecho de la vida privada y familiar como un derecho autónomo exigen y justifican plenamente un enfoque global de la protección de datos en todos los ámbitos en los que se procesan datos personales, incluido el ámbito de la cooperación policial y judicial en materia penal, el ámbito de la Política Exterior y de Seguridad Común (PESC) sin perjuicio de las normas específicas establecidas en el artículo 39 del TUE, y el ámbito del procesamiento de datos por instituciones y órganos de la UE,

    G.  Considerando que es de suma importancia que se tenga en cuenta una serie de elementos clave a la hora de examinar soluciones legislativas, consistentes en una protección eficaz y efectiva, prestada en todas circunstancias e independientemente de las preferencias políticas dentro de un plazo determinado; considerando que el marco debe ser estable durante un largo periodo y que las limitaciones en el ejercicio del derecho, en caso necesario, deben ser excepcionales, de conformidad con la legislación, estrictamente necesarias y proporcionadas, estar debidamente justificadas y no afectar nunca a los elementos esenciales del propio derecho (9),

    H.  Considerando que la recopilación, el análisis, el intercambio y el uso indebido de datos y el riesgo de realización de perfiles, potenciados por el desarrollo tecnológico, han alcanzado dimensiones sin precedentes, por lo que son necesarias normas estrictas de protección de datos, como la ley aplicable y la definición de las responsabilidades de todas las partes interesadas en términos de aplicación de la legislación de la UE en materia de protección de datos; considerando la creciente utilización de tarjetas de fidelidad (por ejemplo, tarjetas de club, tarjetas de descuento o tarjetas con ventajas) por las empresas y el comercio, y que son, o pueden ser, utilizadas para crear perfiles de clientes,

    I.    Considerando que los ciudadanos no compran en línea con la misma seguridad que lo hacen fuera de línea debido a temores sobre el robo de identidad y a la falta de transparencia en cuanto a cómo se procesa y se utiliza su información personal,

    J.    Considerando que la tecnología está permitiendo cada vez más crear, enviar, procesar y almacenar datos en cualquier lugar y momento de formas muy diferentes, y que, en este contexto, es fundamental que las personas a las que se refieren los datos tengan un control efectivo sobre sus propios datos,

    K.  Considerando que los derechos fundamentales a la protección de datos y a la vida privada incluyen la protección de las personas contra la posible vigilancia e intromisión en sus datos por el propio Estado, así como por entidades privadas,

    L.   Considerando que es posible que exista privacidad y seguridad y que ambas son de importancia fundamental para los ciudadanos, lo que significa que no existe necesidad de optar entre ser libre o estar seguro,

    M.  Considerando que los niños merecen una protección específica, ya que pueden ser menos conscientes de los riesgos, las consecuencias, las garantías y los derechos en relación con el procesamiento de datos personales; considerando que los jóvenes divulgan datos personales en las redes sociales que se están extendiendo rápidamente por Internet,

    N.  Considerando que un control eficaz por parte de las personas a las que se refieren los datos y de las autoridades nacionales de protección de datos exige un comportamiento transparente por parte de los responsables del tratamiento de datos,

    O.  Considerando que no todos los responsables del tratamiento de datos son empresas en línea y que, por tanto, las nuevas normas para la protección de datos tienen que cubrir tanto el entorno en línea como el entorno fuera de línea, al tiempo que contemplan las posibles diferencias entre ambos,

    P.   Considerando que las autoridades nacionales de protección de datos están sujetas a normas que difieren notablemente en los 27 Estados miembros, sobre todo en lo referente a la condición estatutaria, los recursos y los poderes,

    Q.  Considerando que un sistema de protección de datos europeo e internacional sólido constituye el fundamento necesario para el flujo transfronterizo de datos personales, y que las actuales diferencias en la legislación en materia de protección de datos y su aplicación afectan a la protección de los derechos fundamentales y las libertades civiles, a la seguridad y la claridad jurídicas en las relaciones contractuales, al desarrollo del comercio electrónico y a las transacciones electrónicas, a la confianza del consumidor en el sistema, a las transacciones transfronterizas, a la economía global y al mercado único europeo; considerando en este contexto que el intercambio de datos es importante para permitir y garantizar la seguridad pública, a nivel nacional e internacional; considerando que la necesidad, la proporcionalidad, la limitación de fines, la vigilancia y la idoneidad son condiciones previas para el intercambio,

    R.   Considerando que las actuales normas y condiciones que rigen la transferencia de datos de la UE hacia terceros países han conducido a diferentes enfoques y prácticas en los diferentes Estados miembros; considerando que es imperativo que se respeten plenamente los derechos de las personas a las que se refieren los datos en los terceros países en los que se transfieren y tramitan los datos personales,

    Pleno compromiso con un enfoque global

    1.   Acoge con gran satisfacción y apoya la comunicación de la Comisión titulada «Un enfoque global de la protección de los datos personales en la Unión Europea» así como la atención especial que presta al fortalecimiento de las disposiciones vigentes, presentando nuevos principios y mecanismos y asegurando normas coherentes y elevadas en materia de protección de datos en la nueva configuración que ofrece la entrada en vigor del Tratado de Lisboa (artículo 16 del TFUE) y la Carta de los Derechos Fundamentales, que ha adquirido carácter vinculante, en especial su artículo 8;

    2.   Subraya que las normas y los principios que establece la Directiva 95/46/CE representan un punto de partida ideal y deberán detallarse, ampliarse y observarse como parte de una legislación moderna en materia de protección de datos;

    3.   Subraya la importancia del artículo 9 de la Directiva 95/46/CE que obliga a los Estados miembros a establecer exenciones respecto de las disposiciones sobre protección de datos cuando los datos personales se utilicen exclusivamente para fines periodísticos o de expresión artística o literaria; en ese contexto, pide a la Comisión que garantice que se mantengan esas excepciones y que se haga todo lo posible por evaluar la necesidad de desarrollar dichas excepciones teniendo en cuenta cualquier nueva disposición con el fin de proteger la libertad de prensa;

    4.   Subraya que el planteamiento tecnológicamente neutro de la Directiva 95/46/CE debe conservarse como principio para un nuevo marco;

    5.   Reconoce que los desarrollos tecnológicos han creado, de una parte, nuevas amenazas para la protección de los datos personales y, de otra, han dado lugar asimismo a un enorme incremento del uso de tecnologías de la información para fines cotidianos y normalmente inofensivos, y que dichos desarrollos significan que es necesaria una evaluación a fondo de las actuales normas sobre protección de datos para garantizar que

    i) las normas aún deparan un elevado nivel de protección,

    ii) las normas aún aseguran un equilibrio justo entre el derecho a la protección de los datos personales y el derecho a la libertad de expresión y de información, y

    iii) las normas no impiden necesariamente el procesamiento cotidiano de datos personales que normalmente es inofensivo;

    6.   Considera imperativo ampliar la aplicación de las normas generales de protección de datos a los ámbitos de la cooperación policial y judicial, incluso en el contexto del procesamiento de datos a nivel nacional, teniendo especialmente en cuenta la cuestionable tendencia a una reutilización sistemática de datos personales del sector privado para fines de aplicación de la ley, permitiendo al mismo tiempo, si fuera estrictamente necesario y proporcionado en una sociedad democrática, limitaciones perfectamente ajustadas y armonizadas de determinados derechos de protección de datos de las personas;

    7.   Subraya la necesidad de que el procesamiento de datos personales por las instituciones y organismos de la Unión Europea, que está regido por el Reglamento (CE) nº 45/2001, se encuentre incluido dentro del alcance del nuevo marco;

    8.   Reconoce que pueden ser necesarias medidas reforzadas adicionales para especificar de qué manera los principios generales establecidos por el marco global son aplicables a las actividades de sectores específicos y al tratamiento de datos, como ya ha ocurrido con la Directiva sobre la privacidad y las comunicaciones electrónicas, pero insiste en que las normas específicas de un sector no deben, en ninguna circunstancia, rebajar el nivel de protección asegurado por la legislación marco, sino que deben definir estrictamente las derogaciones excepcionales, necesarias, legítimas y perfectamente ajustadas a los principios de protección de datos;

    9.   Pide a la Comisión que asegure que la actual revisión de la legislación de la UE en materia de protección de datos prevé:

    • la plena armonización al más elevado nivel que proporcione certidumbre jurídica y un nivel elevado y uniforme de protección de los ciudadanos en toda circunstancia,
    • una explicación más detallada de las normas sobre la ley aplicable con vistas a proporcionar un grado uniforme de protección para los ciudadanos sea cual sea la localización geográfica del responsable del tratamiento de los datos, que abarque también la aplicación de la protección de datos por las autoridades o en los tribunales;

    10. Opina que el régimen de protección de datos revisado, a la vez que aplica plenamente los derechos de vida privada y de protección de datos, debe reducir al máximo las cargas burocrática y financiera y ofrecer instrumentos que permitan a las agrupaciones empresariales, concebidas como una unidad, actuar de manera unitaria y no como una multitud de empresas individuales; anima a la Comisión a realizar estudios de impacto y evaluar con detenimiento los costes de nuevas medidas;

    Reforzar los derechos de las personas

    11. Pide a la Comisión que refuerce los principios y los elementos existentes como la transparencia, la minimización de datos y la limitación de la finalidad, el consentimiento informado, previo y explícito, la notificación sobre infracciones de datos y los derechos de los interesados, como establece la Directiva 95/46/CE, mejorando su implantación en los Estados miembros, sobre todo en lo que respecta al «entorno en línea»;

    12. Subraya el hecho de que el consentimiento solo se considerará válido si es inequívoco, informado, dado libremente, específico y explícito, y que se deben aplicar mecanismos adecuados para registrar el consentimiento de los usuarios o su revocación;

    13. Señala el hecho de que el consentimiento voluntario no puede darse por supuesto en el ámbito de los contratos laborales;

    14. Manifiesta su preocupación por las derivas asociadas a la publicidad comportamental en línea y recuerda que la Directiva sobre la privacidad y las comunicaciones electrónicas estipula la necesidad de un consentimiento explícito y previo de la persona afectada para el envío de «cookies» y el posterior seguimiento de su comportamiento de navegación para dirigirle anuncios personalizados;

    15. Apoya plenamente la introducción de un principio de transparencia general, así como el uso de tecnologías que incrementan la transparencia y el desarrollo de notificaciones estándar de privacidad y permiten a las personas ejercer un control sobre sus propios datos; subraya que la información sobre el tratamiento de datos debe facilitarse en un lenguaje claro y sencillo y de una manera que sea fácil de entender y de fácil acceso;

    16. Subraya además la importancia de mejorar los medios para ejercer los derechos de acceso, rectificación, supresión y bloqueo de datos, así como el conocimiento de los mismos, de aclarar en detalle y codificar el derecho a ser olvidado (10) y de permitir la portabilidad de datos (11), al tiempo que se asegura el desarrollo y la implantación de la plena viabilidad técnica y organizativa para permitir el ejercicio de tales derechos; subraya que las personas necesitan suficiente control de sus datos en línea que les permita ejercer un uso responsable de Internet;

    17. Subraya que los ciudadanos deben poder ejercer gratuitamente sus derechos relativos a los datos personales; pide a las empresas que se abstengan de cualquier intento de añadir barreras innecesarias al derecho a acceder, modificar o suprimir datos personales; subraya que la persona a la que se refieren los datos tiene que encontrarse en posición de saber en todo momento qué datos han sido almacenados por quién, cuándo, para qué fin, durante qué período de tiempo y cómo se están procesando; hace hincapié en que las personas a las que se refieren los datos tienen que poder suprimir, corregir o bloquear los datos sin trámite burocrático alguno, y en que deben estar informadas de cualquier uso indebido de los datas o su violación; solicita, asimismo, que los datos se comuniquen a instancias de la persona interesada, y que se supriman, como muy tarde, cuando la persona lo solicite; subraya la necesidad de comunicar claramente a las personas a las que se refieren los datos el grado de protección de dichos datos en los terceros países; destaca que el derecho al acceso incluye no sólo el pleno acceso a los datos procesados sobre uno mismo, incluido su origen y destinatarios, sino también la información inteligible sobre la lógica aplicada en cualquier procesamiento automático; subraya que esto último adquirirá una mayor importancia con la realización de perfiles y la extracción de datos;

    18. Indica que la creación de perfiles es una de las tendencia principales en el mundo digital, debido a la importancia que están cobrando las redes sociales y los modelos integrados de empresa de Internet; pide a la Comisión, por consiguiente, que incluya disposiciones sobre la creación de perfiles definiendo al mismo tiempo de forma clara los términos «perfil» y «creación de perfiles»;

    19. Reitera la necesidad de aumentar las obligaciones de los responsables del tratamiento de datos respecto de la información de las personas a la que se refieren los datos y acoge con satisfacción la atención prestada por la comunicación a las actividades de sensibilización dirigidas al público general y más específicamente a los jóvenes; subraya la necesidad de tratar de un modo específico a las personas vulnerables y, en particular, a los niños y las personas de edad avanzada; anima a los diferentes actores a que emprendan esas actividades de sensibilización, y apoya la propuesta de la Comisión de cofinanciar las medidas de sensibilización sobre la protección de datos con cargo al presupuesto de la UE; pide una divulgación eficiente a escala de cada Estado miembro de la información sobre los derechos y las obligaciones de las personas físicas y jurídicas en lo relativo a la recopilación, procesamiento, almacenaje y envío de datos personales;

    20. Recuerda la necesidad de proteger específicamente a las personas vulnerables y, en particular, a los niños, en particular imponiendo por defecto un alto nivel de protección de los datos y adoptando medidas adecuadas y específicas para proteger sus datos personales;

    21. Subraya la importancia de la legislación en materia de protección de datos reconociendo la necesidad de proteger específicamente a niños y menores, entre otras cosas, teniendo en cuenta el mayor acceso de los niños a Internet y a contenidos digitales, y destaca que la alfabetización audiovisual debe convertirse en parte de la educación formal con vistas a instruir a los niños y a los menores sobre la forma de actuar responsablemente en el entorno en línea; a tal efecto, es necesario prestar particular atención a las disposiciones relativas a la recogida y ulterior procesamiento de los datos de los niños, al fortalecimiento de los fines de limitación en relación con los datos de los niños y a cómo se busca el consentimiento de los niños, así como a las disposiciones relativas a la protección contra la publicidad basada en el comportamiento (12);

    22. Se muestra a favor de una mayor aclaración y un refuerzo de garantías respecto del procesamiento de datos sensibles y pide que se reflexione sobre la necesidad de manejar nuevas categorías, como los datos genéticos y biométricos, especialmente en el contexto de la evolución tecnológica (por ejemplo, la computación en nube) y social;

    23. Subraya que los datos personales referentes a la situación profesional del usuario facilitados a su empleador no deben publicarse ni transmitirse a terceros sin el consentimiento previo del interesado;

    Seguir avanzando en la dimensión del mercado interior y garantizar una mejor aplicación de las normas de protección de datos

    24. Toma nota de que la protección de datos debería desempeñar un papel aún más importante en el mercado interior, y subraya que la protección eficaz del derecho a la intimidad es esencial para lograr la confianza de las personas, que es lo que se necesita para desbloquear el pleno potencial de crecimiento del mercado único digital; recuerda a la Comisión que unos principios y unas normas comunes tanto para los bienes como para los servicios son condiciones previas para un mercado único digital, puesto que los servicios constituyen una parte importante del mercado digital;

    25. Reitera su petición a la Comisión de que clarifique los criterios relativos a la legislación vigente en materia de protección de datos personales;

    26. Considera esencial reforzar las obligaciones de los responsables del tratamiento de datos para garantizar el cumplimiento de la legislación sobre protección de datos contando, entre otros, con mecanismos y procedimientos proactivos, y acoge con satisfacción las otras orientaciones propuestas en la comunicación de la Comisión;

    27. Recuerda que en este contexto es preciso prestar especial atención a los responsables del tratamiento de datos que están sujetos a obligaciones de confidencialidad profesional y que, para ellos, se debe considerar la posibilidad de crear estructuras especiales para la supervisión de la protección de datos;

    28. Acoge con satisfacción y respalda la consideración de la Comisión de introducir un principio de responsabilidad, ya que tiene una importancia fundamental para garantizar que los responsables del tratamiento de datos actúen de acuerdo con su responsabilidad; al mismo tiempo, pide a la Comisión que examine con detenimiento cómo se puede aplicar en la práctica dicho principio y que analice las consecuencias del mismo;

    29. Acoge con satisfacción la posibilidad de hacer obligatoria la designación de los responsables de la protección de datos, ya que la experiencia de los Estados miembros que ya han nombrado a un responsable muestra que este concepto está dando resultados positivos; destaca, no obstante, que esto deberá examinarse minuciosamente en lo que respecta a las pequeñas empresas y las microempresas con vistas a evitar imponerles costes o cargas excesivas;

    30. Se felicita igualmente en este contexto de los esfuerzos que se están realizando para simplificar y armonizar el actual sistema de notificación;

    31. Considera fundamental que se hagan obligatorios los estudios de impacto sobre la privacidad a fin de identificar riesgos para la intimidad, prever problemas y aportar soluciones proactivas;

    32. Considera de máxima importancia que se puedan ejercer los derechos de las personas a que se refieren los datos; indica que se podrían introducir acciones colectivas como una herramienta para que las personas puedan defender de forma colectiva sus derechos relativos a los datos personales y solicitar compensación por los daños resultantes de una violación de los mismos; señala, no obstante, que una introducción así debe estar sujeta a límites a fin de evitar abusos; pide a la Comisión que clarifique la relación entre la presente comunicación sobre protección de datos y la actual consulta pública sobre el recurso colectivo; pide, por consiguiente, un mecanismo de reparación colectiva para las infracciones de las normas sobre protección de datos a fin de permitir que las personas a que se refieren los datos sean indemnizadas por los daños sufridos,

    33. Pone de relieve la necesidad de una aplicación correcta y armonizada en toda la UE; pide a la Comisión que en su propuesta legislativa contemple sanciones severas y disuasorias, incluidas las penales, por el mal uso o abuso de datos personales;

    34. Anima a la Comisión a introducir un sistema de notificaciones generales obligatorias sobre infracción de datos personales, haciéndolo extensivo a sectores distintos del de las telecomunicaciones, asegurando al mismo tiempo que

    a) no se convierta en una alerta rutinaria para todos los tipos de infracciones, sino sobre todo para aquellas que puedan afectar negativamente al individuo, y

    b) que todas las infracciones sin excepción queden registradas y a disposición de las autoridades de protección de datos u otras competentes para su inspección y evaluación, asegurando de este modo unas condiciones equitativas y una protección uniforme a todos los ciudadanos;

    35. Ve en los conceptos de «privacidad por diseño» y «privacidad por defecto» un fortalecimiento de la protección de datos, y apoya el examen de las diferentes posibilidades para su aplicación concreta, reconociendo igualmente la necesidad de promover el uso de tecnologías de protección de la intimidad; destaca la necesidad de que cualquier aplicación de la «privacidad por diseño» se base en definiciones y criterios sólidos y concretos, a fin de proteger el derecho de las personas a la privacidad y la protección de datos, y garantizar la seguridad jurídica, la transparencia, unas condiciones de competencias equitativas y la libre circulación; opina que la «privacidad por diseño» debe basarse en el principio de la minimización de datos, lo que significa que todos los productos, servicios y sistemas deben realizarse de tal modo que solo se recopilen, utilicen y transmitan los datos personales indispensables para su funcionamiento;

    36. Indica que el desarrollo y el creciente uso de la computación en nube plantea nuevos desafíos en términos de intimidad y de protección de los datos personales; pide, por tanto, una clarificación de las capacidades de los responsables del tratamiento de datos, de los procesadores de datos y de los servidores de acogida para asignar mejor las responsabilidades jurídicas correspondientes y para que los interesados sepan dónde se almacenan sus datos, quién tiene acceso a sus datos, quién decide el uso que se dará a los datos de carácter personal, y qué tipo de procesos de copia de seguridad y de recuperación existen;

    37. Pide, por lo tanto, a la Comisión que, en el marco de la revisión de la Directiva 95/46/CE, tenga debidamente en cuenta las cuestiones relativas a la protección de los datos relacionados con la computación en nube, al mismo tiempo que se garantiza que las normas relativas a la protección de datos se aplican a todas las partes, incluidos los operadores de telecomunicaciones y los operadores no relacionados con las telecomunicaciones;

    38. Pide a la Comisión que asegure que todos los operadores de Internet asumen sus responsabilidades con respecto a la protección de datos, e insta a las agencias publicitarias y a los editores a que informen claramente a los internautas, antes de recopilar cualquier dato sobre ellos;

    39. Celebra el acuerdo recientemente firmado sobre un marco para la evaluación del impacto de la protección de datos y de la privacidad para las aplicaciones de identificación por radiofrecuencia (RFID), que pretende garantizar la intimidad de los consumidores antes de que se introduzcan en el mercado las etiquetas RFID;

    40. Respalda los esfuerzos encaminados a seguir avanzando en las iniciativas de autorregulación – como los códigos de conducta – y la reflexión sobre la creación de sistemas voluntarios de certificación de la UE, como pasos complementarios a las medidas legislativas, al tiempo que se mantiene que el sistema de protección de datos esté basado en una legislación que fije garantías de alto nivel; pide a la Comisión que lleve a cabo una evaluación de impacto de las iniciativas de autorregulación en tanto que instrumentos para una mejor aplicación de las normas en materia de protección de los datos;

    41. Opina que cualquier sistema de certificación o de distintivo debe garantizar su integridad y fiabilidad, ser neutro desde el punto de vista tecnológico, capaz de obtener un reconocimiento a nivel mundial, y tener un coste asequible a fin de no crear barreras de acceso;

    42. Se manifiesta a favor de seguir clarificando, fortaleciendo y armonizando el estatuto y las competencias de las autoridades nacionales de protección de datos, y de explorar diferentes vías para asegurar una aplicación más coherente de las normas de la UE en materia de protección de datos en todo el mercado interior; hace hincapié, además, en la importancia de asegurar la coherencia entre las competencias del SEPD, las autoridades nacionales en materia de protección de datos y el Grupo de Trabajo del artículo 29;

    43. Subraya, en este contexto, que la función y los poderes del Grupo de Trabajo del artículo 29 deben ser reforzados a fin de mejorar la coordinación y la cooperación entre las autoridades en materia de protección de datos de los Estados miembros, sobre todo por lo que respecta a la necesidad de garantizar la aplicación uniforme de las normas sobre protección de datos;

    44. Pide a la Comisión que, en el nuevo marco jurídico, aclare la noción esencial de independencia de las autoridades nacionales de protección de datos en el sentido de ausencia de cualquier tipo de influencia externa (13); subraya que hay que proporcionar a las autoridades nacionales de protección de datos los recursos necesarios y otorgarles competencias armonizadas para iniciar investigaciones e imponer sanciones;

    Fortalecimiento de la dimensión global de la protección de datos

    45. Pide a la Comisión que racionalice y refuerce los actuales procedimientos para la transferencia internacional de datos – acuerdos jurídicamente vinculantes y normas corporativas vinculantes – y que defina sobre la base de los principios en materia de protección de los datos personales anteriormente citados los aspectos esenciales ambiciosos de la protección de datos en la UE que deberán incluirse en los acuerdos internacionales; subraya que los acuerdos de la UE con países terceros en materia de intercambio de datos personales deben prever que los ciudadanos europeos gocen del mismo nivel de protección de datos personales que en el interior de la Unión Europea;

    46. Opina que el procedimiento de evaluación del carácter adecuado de la Comisión necesitaría una mayor clarificación, una aplicación, ejecución y supervisión más estrictas, y que convendría especificar mejor los criterios y requisitos para la evaluación del nivel de protección de datos en un país tercero o en organizaciones internacionales, tomando en consideración las nuevas amenazas para la intimidad y los datos personales;

    47. Pide a la Comisión que evalúe atentamente la eficacia y la correcta aplicación de los principios de puerto seguro;

    48. Celebra la posición adoptada por la Comisión sobre la reciprocidad en los niveles de protección por lo que respecta a las personas cuyos datos se exportan a terceros países o se conservan en ellos; pide a la Comisión que adopte medidas firmes para mejorar la cooperación reguladora con terceros países con miras a aclarar las normas aplicables y a la convergencia de la legislación de la UE y de terceros países en materia de protección de datos; pide a la Comisión que conceda prioridad a este respecto en el Consejo Económico Transatlántico, que ha reanudado sus actividades;

    49. Respalda los esfuerzos de la Comisión por reforzar la cooperación con los países terceros y las organizaciones internacionales, incluidas las Naciones Unidas, el Consejo de Europa y la OCDE, así como con organismos de normalización como el Comité Europeo de Normalización (CEN), el Organismo Internacional de Normalización (ISO), el World Wide Web Consortium (W3C) y el Grupo Especial sobre Ingeniería de Internet (IETF); alienta el desarrollo de normas internacionales (14), asegurando a la vez que exista coherencia entre las iniciativas para el desarrollo de normas internacionales y las actuales revisiones en la UE, la OCDE y el Consejo de Europa;

    50. Encarga a su Presidente que transmita la presente Resolución al Consejo y a la Comisión.

    ————————————————————————————————————

    (1) DO L 281 de 23.11.95, p. 31.

    (2) DO L 350 de 30.12.08, p. 60.

    (3) DO L 8 de 12.01.01, p. 1.

    (4) DO L 201 de 31.7.2002, p. 37.

    (5) Sesión nº 3071 del Consejo de Justicia y Asuntos de Interior, celebrada en Bruselas los días 24 y 25 de febrero de 2011, disponible en http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/en/jha/119461.pdf

    (6) 02356/09/EN WP 168.

    (7) 0836/10/EN WP 179.

    (8) Por ejemplo: Resolución legislativa del Parlamento Europeo, de 23 de septiembre de 2008, sobre el proyecto de Decisión marco del Consejo relativa a la protección de datos personales tratados en el marco de la cooperación policial y judicial en materia penal (DO C 8 E de 14.1.2010, p. 138); Recomendación del Parlamento Europeo destinada al Consejo, de 26 de marzo de 2009, sobre el refuerzo de la seguridad y de las libertades fundamentales en Internet (DO C 117 E de 6.5.2010, p. 206); Resolución del Parlamento Europeo, de 25 de noviembre de 2009 , sobre la Comunicación de la Comisión al Parlamento Europeo y al Consejo titulada «Un espacio de libertad, seguridad y justicia al servicio de los ciudadanos – Programa de Estocolmo» (DO C 285 E, 21.10.2010, p. 12).

    (9) Véase el dictamen del SEPD (nº 7) [30].

    (10) Debe existir una identificación clara y precisa de todos los elementos clave que sustentan este derecho.

    (11) La portabilidad de datos personales facilitará el buen funcionamiento tanto del mercado interior como de Internet y su apertura y conectividad características.

    (12) Podría considerarse la posibilidad de establecer una edad límite por debajo de la cual sean necesarios el consentimiento paterno y mecanismos para verificar la edad;

    (13) De conformidad con el artículo 16 del TFUE y el artículo 8 de la Carta.

    (14) Véase la Declaración de Madrid: Normas de privacidad global en un mundo globalizado, octubre de 2009 y la Resolución sobre Normas Internacionales, adoptada en la 32ª Conferencia Internacional de Autoridades de Protección de Datos y Privacidad, Jerusalén 27-29 de octubre de 2010.

    ——————————————————————————————-

     OPINIÓN DE LA COMISIÓN DE INDUSTRIA, INVESTIGACIÓN Y ENERGÍA (11.5.2011)         

    para la Comisión de Libertades Civiles, Justicia y Asuntos de Interior

    sobre un enfoque global de la protección de los datos personales en la Unión Europea

    (2011/2025(INI))

    Ponente: Giles Chichester

    SUGERENCIAS

    La Comisión de Industria, Investigación y Energía pide a la Comisión de Libertades Civiles, Justicia y Asuntos de Interior, competente para el fondo, que incorpore las siguientes sugerencias en la propuesta de resolución que apruebe:

    1.   Subraya que la protección eficaz del derecho a la intimidad es esencial para asegurar la confianza de los consumidores, que es lo que se necesita para desbloquear el pleno potencial de crecimiento del mercado único digital;

    2.   Opina que el mercado único digital requiere acuerdos comunes relativos a la protección de la intimidad a escala europea para alentar el comercio transfronterizo y evitar las distorsiones del mercado; subraya que un grado elevado de protección de los datos económicos sensibles (por ejemplo, números de tarjetas de crédito o direcciones) es fundamental en términos de credibilidad y consumo digital;

    3.   Recuerda a la Comisión que unos principios y normas comunes tanto para los bienes como para los servicios son condiciones previas para un mercado único digital, puesto que los servicios constituyen una parte importante del mercado digital;

    4.   Destaca que la Comisión debe considerar, en relación con cualquier propuesta, todos los aspectos, incluidos las necesidades verificadas, la seguridad jurídica, la reducción de las cargas administrativas, el mantenimiento de la igualdad de condiciones para los operadores y la viabilidad, así como el coste y el valor probable con respecto a la protección de datos;

    5.   Reconoce, no obstante, que la Directiva 95/46/CE relativa a la protección de datos ha conducido a un marco jurídico fragmentado debido a los diferentes enfoques de aplicación adoptados en los diferentes Estados miembros, y que los avances de las nuevas tecnologías han conducido a nuevos retos en lo que se refiere a la protección de datos; está de acuerdo, por lo tanto, en que se ha confirmado la necesidad de un nuevo marco jurídico;

    6.   Recuerda a la Comisión que hay que examinar cuidadosamente los efectos de la ampliación de las categorías de datos sensibles; sostiene que los criterios más estrictos para tratar datos sensibles no deberían requerir muchas autorizaciones legales nuevas para mantener las aplicaciones informáticas necesarias y deseadas, y que la lista de datos sensibles debe ampliarse únicamente para incluir todos aquellos datos que son sensibles en (casi) todas las situaciones concebibles de procesamiento de datos, como los datos genéticos;

    7.   Pide a la Comisión que modifique la Directiva 95/46/CE no solamente para incluir otras categorías de datos (como los datos genéticos) sino también para tener en cuenta la aparición futura de nuevos datos, y que revise en profundidad la Directiva en este ámbito;

    8.   Recuerda a la Comisión que no todos los responsables del tratamiento de datos son empresas de Internet; pide a la Comisión que se asegure de que las nuevas normas en materia de protección de datos pueden aplicarse tanto en el entorno en línea como fuera de línea;

    9.   Pide a la Comisión que siga regulando la recopilación, la venta y la compra de datos personales incluyendo este aspecto en el ámbito de cualquier norma nueva relativa a la protección de datos; subraya que esos datos no solo se utilizan para el comercio en línea sino también para la venta directa por correo;

    10. Invita a la Comisión a que, al tiempo que mantiene un grado elevado de protección de datos, considere detenidamente el impacto sobre las PYME, a fin de asegurar que no están en desventaja debido a cargas administrativas innecesarias o a requisitos de notificación múltiples que impiden sus actividades transfronterizas u otras cargas burocráticas; opina asimismo que el volumen y la naturaleza de los datos procesados deberían tenerse en cuenta independientemente de la dimensión del controlador;

    11. Opina que la revisión del marco jurídico debe garantizar la flexibilidad necesaria para que el nuevo marco sea capaz de responder a las necesidades futuras a medida que avanza la tecnología; pide a la Comisión que evalúe toda nueva disposición de conformidad con el principio de proporcionalidad y que se asegure de que no erige ninguna barrera comercial, infringe el derecho a un juicio justo o altera la competencia; destaca que cualquier nuevo principio debe proteger los derechos de las personas a las que se refieren los datos, ser necesario para lograr este propósito y suficientemente claro para garantizar seguridad jurídica y una competencia leal;

    12. Indica que la creación de perfiles es una de las tendencia principales en el mundo digital, debido a la importancia que están cobrando las redes sociales y los modelos integrados de empresa de Internet; pide, por consiguiente, a la Comisión que incluya disposiciones sobre la creación de perfiles definiendo al mismo tiempo de forma clara los términos «perfil» y «creación de perfiles»;

    13. Recuerda a la Comisión que es necesaria una definición precisa del término «derecho a ser olvidado» que identifique claramente los requisitos pertinentes y especifique a quién se debe aplicar el derecho;

    14. Subraya que los ciudadanos deben poder ejercer sus derechos relativos a los datos personales gratuitamente y sin costes postales o de otro tipo; pide a las empresas que se abstengan de cualquier intento de añadir obstáculos innecesarios al derecho a ver, modificar o borrar datos personales;

    15. Pide a la Comisión que vele por que los usuarios de las redes sociales puedan obtener una visión completa de los datos archivados referentes a ellos, sin que esto suponga costes ni esfuerzos inaceptables;

    16. Pide a la Comisión que facilite una mayor portabilidad de datos en Internet, teniendo en cuenta al mismo tiempo los modelos de empresa de los proveedores de servicios, los sistemas técnicos existentes y los intereses legítimos de las partes interesadas; subraya que los usuarios necesitan suficiente control de sus datos en línea para ejercer un uso soberano y responsable de Internet;

    17. Opina que cualquier sistema de certificación o de distintivo se puede basar en un modelo como EMAS y debe, en cualquier caso, garantizar su integridad y fiabilidad; pide que los certificados en esos sistemas lleven códigos de serie individuales visibles por el público y controlables en una base de datos central pública;

    18. Pide a la Comisión que fomente el fortalecimiento de las iniciativas de autorregulación, la responsabilidad personal y el derecho a controlar los propios datos, en particular en lo que respecta a Internet;

    19. Celebra el acuerdo recientemente firmado sobre un marco para la evaluación del impacto de la protección de datos y de la privacidad para las aplicaciones RFID, que pretende garantizar la intimidad de los consumidores antes de que se introduzcan en el mercado las etiquetas RFID;

    20. Anima a todos los organismos implicados a colaborar con vistas a establecer una norma común que permita determinar cuándo se puede considerar que una persona ha dado su consentimiento y alcanzar una edad de consentimiento común para el uso y la transferencia de datos;

    21. Acoge con satisfacción el hecho de que la Comisión está considerando la privacidad por diseño, y recomienda que toda aplicación concreta de este principio se base en el modelo de la UE existente del nuevo enfoque y el nuevo marco legislativo relativo a las mercancías, a fin de garantizar la libre circulación de productos y servicios de conformidad con los requisitos relativos a la privacidad armonizada y la protección de datos; destaca en este sentido la necesidad de que cualquier aplicación del mismo se base en definiciones y criterios sólidos y concretos, a fin de garantizar el derecho de los usuarios a la privacidad y la protección de datos, la seguridad jurídica, la transparencia, unas condiciones de competencias equitativas y la libre circulación; opina que la privacidad por diseño debe basarse en el principio de la minimización de datos, lo que significa que todos los productos, servicios y sistemas deben realizarse de tal modo que solo se recopilen, utilicen y transmitan los datos personales indispensables para su funcionamiento;

    22. Pone de relieve la necesidad de una aplicación correcta y armonizada en toda la UE; recomienda que la Comisión revise los tipos de sanciones de que disponen las autoridades responsables de la aplicación en caso de infracción probada, teniendo en cuenta la posibilidad de sancionar determinados comportamientos con objeto de evitar futuras infracciones;

    23.  Indica que se podrían introducir acciones colectivas como una herramienta para que las personas puedan defender de forma colectiva sus derechos relativos a los datos personales y solicitar compensación por los daños resultantes de una violación de los mismos; señala, no obstante, que una introducción así debe estar sujeta a límites a fin de evitar abusos; pide a la Comisión que clarifique la relación entre la presente comunicación sobre protección de datos y la actual consulta pública sobre el recurso colectivo;

    24. Subraya la necesidad de que los Estados miembros concedan mayores competencias al poder judicial y a las autoridades de protección de datos para sancionar a las empresas que infrinjan la protección de datos o que no apliquen la legislación en materia de protección de datos;

    25. Pide a la Comisión que clarifique y justifique las normas existentes por lo que respecta a su pertinencia, necesidad, eficiencia, claridad y aplicabilidad, así como a los poderes, la competencia y las medidas de ejecución de las autoridades, con objeto de que en la UE haya un marco de protección de datos único, amplio y armonizado que proporcione un nivel de protección elevado y equivalente independientemente del tipo de procesamiento de datos realizado; pide que la legislación revisada se aplique en toda la UE, así como a escala internacional, de modo que, una vez cubiertos por la legislación de la UE, los datos personales sigan cubiertos por la legislación de la UE, independientemente de toda transferencia de dichos datos o del lugar de establecimiento del responsable del tratamiento o del encargado del tratamiento de los datos, facilitando de este modo las operaciones transfronterizas sin socavar la protección de los datos personales de los individuos;

    26. Opina que todas las transferencias de datos personales deben estar sujetas a los requisitos en materia de trazabilidad (por lo que respecta al origen y destino) y que esta información debe facilitarse a la persona en cuestión; subraya que si una persona pide que un responsable del tratamiento modifique datos personales, el propietario de los datos deberá tener la posibilidad de presentar una solicitud al respecto tanto a la fuente original de datos como a cualquier otro responsable del tratamiento con el que se hayan compartido dichos datos;

    27. Pide a la Comisión que clarifique la responsabilidad jurídica de los controladores de datos; subraya que debe quedar claro si el responsable es el primero o el último controlador conocido o si están sujetos a una responsabilidad compartida;

    28. Insta a la Comisión a que promueva las normas de protección de datos personales de la UE en todos los foros y acuerdos internacionales pertinentes; atrae la atención, en este contexto, sobre su llamamiento a la Comisión para que presente una propuesta destinada a ampliar la aplicación del Reglamento Roma II sobre la legislación aplicable a las obligaciones no contractuales, a fin de incluir las violaciones de la intimidad y de la protección de datos, así como al Consejo para que autorice negociaciones con vistas a celebrar acuerdos internacionales que permitan a las personas en la UE recurrir eficazmente en caso de violaciones de sus derechos a la protección de datos y a la intimidad en virtud del Derecho de la UE;

    29. Insiste en que las normas sobre la notificación de las violaciones de seguridad y datos personales establecidas en el marco de telecomunicaciones modificado deben quedar reflejadas en los nuevos instrumentos generales a fin de asegurar unas condiciones de competencia equitativas y una protección uniforme para todos los ciudadanos.

    RESULTADO DE LA VOTACIÓN FINAL EN COMISIÓN

    Fecha de aprobación                                                     9.5.2011

    Resultado de la votación final                                    +:            32

                                                                                       –:            0

    0:              4

    Miembros presentes en la votación final              Ivo Belet, Bendt Bendtsen, Maria Da Graça Carvalho, Giles Chichester, Pilar del Castillo Vera, Lena Ek, Ioan Enciu, Adam Gierek, Norbert Glante, Fiona Hall, Romana Jordan Cizelj, Krišjānis Kariņš, Lena Kolarska-Bobińska, Bogdan Kazimierz Marcinkiewicz, Marisa Matias, Jaroslav Paška, Herbert Reul, Amalia Sartori, Britta Thomsen, Evžen Tošenovský, Ioannis A. Tsoukalas, Niki Tzavela, Marita Ulvskog, Kathleen Van Brempt, Henri Weber

    Suplente(s) presente(s) en la votación final         Matthias Groote, Françoise Grossetête, Satu Hassi, Jolanta Emilia Hibner, Yannick Jadot, Oriol Junqueras Vies, Silvana Koch-Mehrin, Vladko Todorov Panayotov, Markus Pieper, Algirdas Saudargas

    Suplente(s) (art. 187, apdo. 2)

     presente(s) en la votación final                                Alexandra Thein

    OPINIÓN DE LA COMISIÓN DE MERCADO INTERIOR Y PROTECCIÓN DEL CONSUMIDOR (14.4.2011)          

    para la Comisión de Libertades Civiles, Justicia y Asuntos de Interior

    sobre un enfoque global de la protección de los datos personales en la Unión Europea (2011/2025(INI))

    Ponente de opinión: Matteo Salvini

    SUGERENCIAS

    La Comisión de Mercado Interior y Protección del Consumidor pide a la Comisión de Libertades Civiles, Justicia y Asuntos de Interior, competente para el fondo, que incorpore las siguientes sugerencias en la propuesta de resolución que apruebe:

    A.  Considerando que la Directiva 95/46/CE sobre la protección de los datos y la Directiva 2009/140/CE sobre el paquete de telecomunicaciones de la UE posibilitan la libre circulación de los datos personales dentro del mercado interior,

    B.   Considerando que se están extendiendo rápidamente por Internet redes sociales de todo tipo y que los jóvenes, en particular, divulgan datos personales en las mismas,

    C.  Considerando que, si bien los principios básicos de la Directiva 95/46/CE siguen siendo válidos, la globalización y los rápidos avances tecnológicos han traído consigo nuevos retos en términos de protección de los datos personales como resultado de la creciente utilización de herramientas complejas de tecnología de la información para el procesamiento de los datos y de una mayor actividad en línea, incluido el comercio electrónico, la sanidad electrónica, la administración electrónica, el creciente uso de las redes sociales, el desarrollo de la publicidad basada en el comportamiento en línea o la computación en nube,

    D.  Considerando que el creciente intercambio de datos personales, en combinación con nuevos avances tecnológicos, ha generado un aumento de la recopilación, almacenamiento y uso de los datos de carácter personal, y plantean la cuestión de determinar qué ley debe aplicarse y la definición de las responsabilidades de las partes interesadas en cuanto a la aplicación de la legislación de la UE en materia de protección de datos (por ejemplo, una empresa que opere con datos personales de ciudadanos de la UE, cuya sede se encuentre fuera del territorio de la UE y que subcontrate con empresas que también se encuentren fuera del territorio de la UE),

    E.   Considerando que la revisión de la Directiva 95/46/CE sobre protección de los datos debería incluir una reforma general del marco de la UE para la protección de los datos que establezca, en particular, unas normas más estrictas en lo que respecta a la recogida de los datos, y que informe, en particular, a la persona por qué, por quién y por cuánto tiempo sus datos serán recogidos y utilizados, tanto en el ámbito en línea como en el entorno fuera de línea,

    F.   Considerando que los ciudadanos no compran en línea con la misma seguridad que lo hacen fuera de línea debido a temores sobre el robo de identidad y a la falta de transparencia en cuanto a cómo se procesa y se utiliza su información personal,

    G.  Considerando la creciente utilización de tarjetas de fidelidad (por ejemplo, tarjetas de club, tarjetas de descuento o tarjetas con ventajas) por las empresas y en el comercio, y que son, o pueden ser, utilizadas para crear perfiles de clientes,

    H.  Considerando que los datos recogidos a través de estas tarjetas de fidelidad se utilizan para crear perfiles de clientes y que se ha creado un mercado para la negociación de estos datos,

    1.   Pide que se aclare y refuerce la dimensión de la protección de los datos del mercado interior, tanto en línea como fuera de ella, a través de la plena armonización de la legislación de los Estados miembros, tras una evaluación exhaustiva de impacto y por analogía con la reglamentación marco en materia de telecomunicaciones con arreglo a un nivel muy elevado en materia de protección para aumentar la seguridad jurídica, velar por unos niveles coherentes de protección de la vida privada, reducir los trámites administrativos y los costes, evitar el riesgo de que se busquen foros de conveniencia en las legislaciones de los Estados miembros según su carácter más o menos estricto y asegurar unas condiciones equitativas para todos los agentes económicos y controladores de los datos; considera que ello impulsará el mercado interior digital y reducirá los costes innecesarios para las empresas, especialmente en lo que se refiere a las PYME;

    2.   Considera que la aplicación de las normas de la UE en materia de protección de los datos es desigual y se basa en un enfoque fragmentario en todo su territorio, por lo que tienen un efecto adverso sobre los derechos individuales y las libertades fundamentales con respecto a la protección de los datos y la intimidad, la seguridad jurídica y la claridad en las relaciones contractuales, el desarrollo del comercio electrónico y las transacciones electrónicas, la confianza del consumidor en el sistema, las transacciones transfronterizas y el establecimiento de unas condiciones verdaderamente equitativas para las empresas y las PYME en el mercado único;

    3.   Indica que la protección de los datos debería desempeñar un papel todavía más importante en el mercado interior;

    4.   Pide una rápida revisión del marco legislativo en vigor en la UE en materia de protección de datos, teniendo en cuenta, en particular, la creciente amenaza para los datos personales que representan las nuevas formas de tratamiento de los datos tales como la creación de perfiles o la transferencia no deseada de los datos;

    5.   Pide, en particular, que se adapten las normas relativas a la protección de los datos a los principios básicos de la Directiva relativa a la protección de la intimidad en el sector de las comunicaciones electrónicas en todos los ámbitos de la protección de los datos a fin de evitar un enfoque fragmentado;

    6.   Hace hincapié en la necesidad de un mercado único que funcione en lo que se refiere a una ejecución coherente, exhaustiva y eficaz de las normas en materia de protección de los datos, habida cuenta de las repercusiones de las nuevas tecnologías sobre los derechos de las personas, la transparencia de los procedimientos y los intereses legítimos de las personas interesadas que garantice, al mismo tiempo, la portabilidad de los datos personales para facilitar el buen funcionamiento tanto del mercado interior como de Internet y su apertura y conectividad características;

    7.   Considera que los datos personales y la información distribuida entre los diferentes puntos únicos de contacto y en el marco del sistema de Información del Mercado Interior sólo deben tratarse, utilizarse y recogerse con fines legítimos, y que deben establecerse las salvaguardias necesarias contra los abusos;

    8.   Subraya la importancia de actualizar la Directiva en consonancia con la evolución tecnológica mundial;

    9.   Considera que, en principio, sólo debe permitirse la creación de perfiles cuando exista una sólida base jurídica al efecto o cuando las personas interesadas den libremente su consentimiento informado, que podrá revocarse en todo momento;

    10. Indica que el desarrollo y el creciente uso de la computación en nube plantea nuevos desafíos en términos de intimidad y de protección de los datos personales; pide, por tanto, una clarificación de las capacidades de los controladores de datos, de los procesadores de datos y los servidores de acogida para asignar mejor las responsabilidades jurídicas correspondientes y para que los interesados sepan dónde se almacenan sus datos, quién tiene acceso a sus datos, quién decide el uso que se dará a los datos de carácter personal, y qué tipo de procesos de copia de seguridad y de recuperación existen;

    11. Subraya la necesidad de actividades de sensibilización y educativas y de unas estrategias de comunicación específicas en materia de protección de los datos a la intención de los proveedores de servicios, así como de los ciudadanos y consumidores; destaca la necesidad de garantizar que los ciudadanos estén informados adecuadamente sobre sus derechos y obligaciones por lo que respecta a la utilización de sus datos personales, las consecuencias a corto y largo plazo de la transmisión de determinados tipos de datos, las distintas modalidades del consentimiento, la portabilidad de datos, la protección de su intimidad y las herramientas a su disposición para impedir situaciones que violen su intimidad, como el derecho a ser olvidado (es decir, el derecho que tienen las personas a que sus datos personales no se conserven, analicen, procesen o utilicen en ningún modo, así como a que se eliminen, cuando ya no son necesarios para fines previstos desde el punto de vista jurídico), en particular en el contexto en línea;

    12. Pide a la Comisión que refuerce, aclare y armonice los criterios sobre el consentimiento libre e informado y que clarifique las cláusulas contractuales; pide que, en términos generales, cada persona deba dar su consentimiento previo antes de que sus datos personales se compilen, evalúen, sean perfilados o cedidos; solicita, asimismo, que estos datos se comuniquen a instancias de la persona interesada, así como que se supriman, como muy tarde, cuando ésta lo solicite; subraya la necesidad de comunicar claramente a las personas a las que se refieren los datos el grado de protección de dichos datos en los terceros países;

    13. Pone de relieve que la cuestión de la protección de los datos afecta tanto a los consumidores y empresas como a los empleados; pide, por consiguiente, que se establezca un nivel elevado de protección de los datos en lo que respecta a los empleados con el fin de reducir la supervisión inadecuada de sus datos personales;

    14. Pide a la Comisión que clarifique los criterios relativos a la legislación vigente en materia de protección de los datos personales dado que cada vez es más difícil determinar la responsabilidad de las partes interesadas como consecuencia de la globalización de los intercambios; subraya que es necesario garantizar la seguridad jurídica en relación con los controladores de datos y evitar lagunas en la protección de los datos personales prevista en la Directiva 95/46/CE;

    15. Hace hincapié en que las actividades económicas no deberían llevarse nunca a cabo sin la participación de los interesados; señala que estos últimos deben recibir siempre información suficiente para ejercer su derecho a decidir por sí mismos;

    16. Llama la atención de la Comisión sobre la alta importancia estratégica de la ubicación de los centros de datos y sobre el impacto potencial de dicha ubicación fuera del territorio de la UE;

    17. Acoge con satisfacción las propuestas de la Comisión sobre un sistema de notificación de las transgresiones en relación con los datos personales en la Directiva sobre la protección de la intimidad en el sector de las comunicaciones electrónicas, que, por lo demás, debería aplicarse de modo coherente en todos los ámbitos en los que es necesaria la protección de los datos; pide que se revise y simplifique el sistema existente en la actualidad en relación con la notificación de las transgresiones en lo que se refiere a los datos personales que vaya más allá del sector de las telecomunicaciones por lo que respecta a las transgresiones graves con objeto de que los criterios sobre el procesamiento de los datos no impliquen una carga excesiva para los controladores de los datos y se ponga fin a la existencia de requisitos nacionales divergentes en este ámbito; pide que se amplíe el sistema de notificación de las transgresiones en relación con los datos personales que vaya más allá del sector de las telecomunicaciones por lo que respecta a las transgresiones graves y pone de relieve la importancia de disponer de un sistema uniforme para la notificación de las transgresiones;

    18. Subraya que el derecho de las personas a decidir por sí mismas debe situarse en primer plano y que cada individuo tiene el derecho a ser informado de forma gratuita de los datos recopilados sobre su persona, así como el derecho a que se supriman dichos datos, especialmente los perfiles compilados con fines comerciales;

    19. Hace hincapié en la importancia que tiene para los titulares de los datos personales la designación de un controlador de la protección de datos con una función claramente identificada; considera que las organizaciones que operan en el mercado único deberían tener la posibilidad de nombrar a un controlador de la protección de datos en relación con sus actividades en la UE;

    20. Pide a la Comisión que, en el marco de la revisión de la Directiva 95/46/CE, tenga debidamente en cuenta las cuestiones relativas a la protección de los datos relacionados con la computación en nube, al mismo tiempo que se garantiza que las normas relativas a la protección de datos se aplican a todas las partes, incluidos los operadores de telecomunicaciones y los operadores no relacionados con las telecomunicaciones, y el desarrollo de la computación en nube;

    21. Subraya que los procedimientos relativos al acceso a los datos personales deben estar clara e inmediatamente a disposición de los ciudadanos en todos los Estados miembros deben apoyarse en una red de puntos de contacto y deben estar disponibles en línea; pide, en particular, que se simplifiquen las disposiciones de ejecución;

    22. Invita a la Comisión a que examine las modalidades de acceso, rectificación y supresión de los datos así como el recurso al mecanismo de resolución alternativa de litigios en el mercado interior, en particular en el entorno en línea; subraya la necesidad de una política adecuada en materia de infracción;

    23. Pide que las autoridades nacionales dispongan de una mayor capacidad de ejecución, también con respecto a las empresas que no son de la UE cuyas actividades estén dirigidas a consumidores de la UE;

    24. Insiste en la necesidad de promover el uso de tecnologías de protección de la intimidad y de aplicar el principio relativo a la protección de la intimidad desde el diseño para asegurar que las cuestiones relativas a la intimidad estarán incluidas en los futuros avances tecnológicos; pide a la Comisión que anime a los proveedores de tecnologías a integrar los principios básicos de la intimidad, incluida la minimización de los datos, la transparencia y el control del usuario, en el desarrollo y el despliegue de tecnologías para garantizar un nivel elevado de protección de los datos personal en el mercado único;

    25. Pide a la Comisión que, en el marco de una consulta al CEN, examine la posibilidad de elaborar criterios de servicio para la gestión de los datos personales y el desarrollo de herramientas de gestión de la información, teniendo en cuenta debidamente el principio relativo a la protección de la intimidad desde el diseño; opina que dichos criterios de diseño fomentarían las buenas prácticas en el desarrollo de los sistemas de gestión de datos y mejorarían, en particular, las características relacionadas con la seguridad de la gestión de las bases de datos y las aplicaciones de almacenamiento; subraya, sin embargo, que las propuestas deberían ser neutras desde el punto de vista tecnológico y favorables a la innovación;

    26. Pide a la Comisión que revise con el CEN los criterios europeos sobre el almacenamiento de los datos, teniendo debidamente en cuenta el principio relativo a la protección de la intimidad desde el diseño, y que fomente el desarrollo de normas de fabricación para permitir la eliminación definitiva de los datos almacenados en el hardware que ya no se utilicen o no se eliminen de otra manera; considera, además, que tales criterios de diseño promoverán unas mejores prácticas en la industria manufacturera; subraya, sin embargo, que las propuestas deben ser neutras desde el punto de vista tecnológico y favorables a la innovación;

    27. Pide un mayor papel para el Grupo de trabajo creado de conformidad con el artículo 29 de manera que se conceda carácter oficial al papel que desempeña en la aplicación de los criterios relativos a la protección de los datos y haga valer su independencia con respecto a la Comisión Europea;

    28. Pide a la Comisión que lleve a cabo una evaluación de impacto de las iniciativas de autorregulación en tanto que instrumentos para una mejor aplicación de las normas en materia de protección de los datos;

    29. Alienta el desarrollo de un régimen europeo de certificación en el ámbito de la protección de la intimidad y de los datos; señala que se debería estructurar de manera que se evite una carga excesiva para las empresas – las PYME, en particular – con una tramitación costosa y burocrática que podría desalentar la participación; señala que el régimen debería ser neutro desde el punto de vista tecnológico, capaz de obtener un reconocimiento a nivel mundial, y tener un coste asequible a fin de no crear barreras de acceso;

    30. Apoya la creación de un régimen de certificación de la UE para los sitios web que cumplan con la legislación de la UE en materia de protección de los datos, modelado sobre el Sello Europeo de Privacidad o EuroPriSe (una etiqueta voluntaria transeuropea para certificar el cumplimiento, en los productos o servicios basados en tecnologías de la información, de la legislación comunitaria sobre protección de datos) que sería aplicable en toda la UE y sustituiría a los diferentes regímenes privados de certificación y a etiquetas que frecuentemente sólo gozan de un reconocimiento local; opina que ello debería incluir una exhaustiva evaluación de impacto antes de su adopción;

    31. Considera que el desarrollo y la promoción de iniciativas de autorregulación puede mejorar el actual marco de protección de los datos, aunque no pueden sustituir a las medidas legislativas, especialmente por lo que atañe a la ejecución; pide a la Comisión y a los Estados miembros que fomenten este tipo de iniciativas y desarrollen y apoyen instrumentos que hagan más atractivo para las empresas llegar a un acuerdo sobre la autorregulación;

    32. Pide a la Comisión que no proponga un nivel de armonización demasiado estricto, que pudiera inhibir sistemas de protección de los datos que ya han demostrado su eficacia, como los controles de protección de los datos internos efectuados por los propios controladores de una empresa, con el apoyo de controles externos realizados por las autoridades estatales de supervisión de datos;

    33. Apoya la creación de unos criterios comunes y claros a escala de la UE para llevar a cabo auditorías en el ámbito de la protección de la intimidad y de los datos;

    34. Celebra la posición adoptada por la Comisión sobre la reciprocidad en los niveles de protección por lo que respecta a las personas cuyos datos se exportan a terceros países o se conservan en ellos; pide, sin embargo, a la Comisión que adopte firmes medidas para mejorar la cooperación reguladora con terceros países con miras a aclarar las normas aplicables y a la convergencia de la legislación de la UE y de terceros países en materia de protección de datos; pide a la Comisión que conceda prioridad a este respecto en el Consejo Económico Transatlántico, que ha reanudado sus actividades;

    35. Pide el desarrollo de unos métodos más fáciles y eficaces para permitir las transferencias internacionales de datos personales asegurando, al mismo tiempo, unos niveles adecuados de protección de los datos y de la intimidad de las personas;

    36. Pide a la Comisión que mantenga las exenciones actuales previstas en el artículo 9 de la Directiva 95/46/CE con respecto a ciertas normas de protección de los datos a efectos periodísticos para salvaguardar unos medios de comunicación libres e independientes en la UE y para apoyar la creatividad en la expresión artística o literaria.

    RESULTADO DE LA VOTACIÓN FINAL EN COMISIÓN

    Fecha de aprobación                                                     13.4.2011

     Resultado de la votación final                                   +:            36

                                                                                                   –:            0

                                                                                                   0:            0

    Miembros presentes en la votación final              Pablo Arias Echeverría, Adam Bielan, Lara Comi, Anna Maria Corazza Bildt, António Fernando Correia De Campos, Jürgen Creutzmann, Christian Engström, Evelyne Gebhardt, Louis Grech, Małgorzata Handzlik, Iliana Ivanova, Philippe Juvin, Sandra Kalniete, Eija-Riitta Korhola, Edvard Kožušník, Kurt Lechner, Toine Manders, Mitro Repo, Robert Rochefort, Zuzana Roithová, Heide Rühle, Matteo Salvini, Christel Schaldemose, Andreas Schwab, Eva-Britt Svensson, Róża Gräfin von Thun und Hohenstein, Kyriacos Triantaphyllides, Emilie Turunen, Bernadette Vergnaud, Barbara Weiler

    Suplente(s) presente(s) en la votación final         Ashley Fox, María Irigoyen Pérez, Pier Antonio Panzeri, Konstantinos Poupakis, Sylvana Rapti, Olle Schmidt

     OPINIÓN DE LA COMISIÓN DE CULTURA Y EDUCACIÓN (14.4.2011)        

    para la Comisión de Libertades Civiles, Justicia y Asuntos de Interior

    sobre un enfoque global de la protección de los datos personales en la Unión Europea (2011/2025(INI))

    Ponente de opinión: Seán Kelly

    SUGERENCIAS

    La Comisión de Cultura y Educación pide a la Comisión de Libertades Civiles, Justicia y Asuntos de Interior, competente para el fondo, que incorpore las siguientes sugerencias en la propuesta de resolución que apruebe:

    1.  Subraya la necesidad de contar con una definición mejor y más amplia del concepto de datos personales en el marco de las tecnologías en línea y digitales, particularmente respecto a nuevas formas de identificación y seguimiento individuales, especialmente en lo referente a las cookies del protocolo de transferencia de hipertexto (HTTP) y la Directiva 2002/58/CE (1), para garantizar la seguridad jurídica en el mercado único digital, a fin de facilitar una protección de datos más eficaz;

    Transparencia

    2.  Destaca la importancia que reviste informar a los usuarios acerca de la autoridad competente de protección de datos y de las maneras de acceder fácilmente a sus datos personales, de rectificarlos y de suprimirlos;

    3.  Insiste en que se deben establecer mecanismos adecuados para dejar constancia del consentimiento de los usuarios, que ha de ser explícito y no supuesto, o de la revocación del mismo;

    4.  Recuerda que los usuarios de Internet han de tener derecho a ser olvidados en el contexto de las redes sociales y de la computación en nube; subraya a este respecto que los usuarios han de tener derecho a controlar los aspectos de sus datos personales públicamente accesibles;

    5.  Subraya que los datos personales facilitados al empleador referentes a la situación profesional del usuario no deben publicarse ni transmitirse a terceros sin el consentimiento previo del interesado;

    6.  Subraya que las declaraciones de privacidad, en general, son muy difíciles de leer y comprender para todos los usuarios, por lo que es partidario de un sistema informativo mediante el cual los interesados puedan entender cómo se tratarán sus datos personales una vez otorgada la autorización;

    Protección de datos en el caso de los menores

    7.  Subraya la necesidad de adoptar medidas específicas para la protección de datos en línea con vistas a proteger a los menores; reitera que la alfabetización audiovisual y en materia de TIC debe ser un elemento esencial de la educación formal, de modo que se enseñe a los menores cómo actuar de manera responsable y segura en un medio en línea;

    8.  Subraya que los proveedores de redes sociales deben publicar sus políticas de seguridad en un lenguaje claro y sencillo, y colocar esta información en un lugar destacado con el fin de permitir que los usuarios menores de edad valoren los peligros que afrontan; destaca, en particular, que se deben dar orientaciones adecuadas a los usuarios menores de edad y que se han de realizar esfuerzos para proteger su anonimato si utilizan un seudónimo en línea; subraya también que se les debería instar a que introduzcan la cantidad mínima de información en las redes sociales, y que hay que conseguir que sean plenamente conscientes de los peligros que supone la publicación de datos personales, tales como fotografías, números de teléfono o direcciones;

    9.  Pide por lo tanto a los Estados miembros que incluyan la alfabetización audiovisual como parte integrante del plan de estudios en las escuelas y otros centros de enseñanza, incluidos los centros preescolares, y que ofrezcan a los enseñantes y educadores oportunidades adecuadas de formación y perfeccionamiento profesional;

    10. Pide que los responsables del tratamiento de los datos tengan la obligación de adoptar mecanismos para verificar la edad, siempre que este proceso no amenace la privacidad o impida que los consumidores legítimos accedan a los servicios en línea;

    11. Solicita que se establezcan obligaciones y requisitos específicos para el procesamiento de datos relativos a menores, y en particular a niños, incluida la prohibición de recoger datos sensibles referentes a niños; propone que no esté permitido recoger información personal a través de menores, salvo si es con fines legítimos;

    12. Considera que al recopilar y procesar datos relacionados con alumnos de escuelas u otros centros de enseñanza, se ha de proceder con la debida prudencia y los datos sólo se deben compartir después de haberse dado el consentimiento para ello, dentro del respeto de los intereses primordiales de los menores en cuestión;

    13. Propone un sistema en que el titular de los datos vea inmediatamente el nivel de protección de datos ofrecido, antes de que conceda la autorización, posiblemente en forma de un sistema de clasificación, supervisado por una autoridad independiente;

    Acciones de sensibilización

    14. Anima a la Comisión y a los Estados miembros a organizar campañas de sensibilización pública destinadas a los menores, y particularmente a los niños y a sus cuidadores, para poner de relieve los riesgos que entraña para su vida privada un medio en línea, lo que pueden hacer para protegerse a sí mismos y la necesidad de que asuman su propia responsabilidad; destaca que tal información se ha de facilitar de manera clara y comprensible; este requisito debe aplicarse, en particular, a la formulación de los textos que sirven de base para el consentimiento explícito del uso de los datos;

    15. Recomienda además que se emprendan campañas de formación y sensibilización destinadas a los responsables y los encargados del tratamiento de datos por las que se les informe de sus obligaciones y responsabilidades.

    16. Subraya la importancia de mantener y, en su caso, reforzar la exención con fines periodísticos en el artículo 9 de la Directiva 95/46/CE (2), que es una condición necesaria para el ejercicio de la actividad periodística en un entorno de medios tecnológicos cada vez más complejos y para el cumplimiento del papel de los medios de comunicación en las sociedades democráticas;

    RESULTADO DE LA VOTACIÓN FINAL EN COMISIÓN

    Fecha de aprobación                                                                    12.4.2011

    Resultado de la votación final                                                   +:            29

                                                                                                                  –:            0

                                                                                                                  0:            0

    Miembros presentes en la votación final

    Magdi Cristiano Allam, Maria Badia i Cutchet, Zoltán Bagó, Malika Benarab-Attou, Lothar Bisky, Piotr Borys, Jean-Marie Cavada, Silvia Costa, Santiago Fisas Ayxela, Mary Honeyball, Petra Kammerevert, Marek Henryk Migalski, Katarína Neveďalová, Doris Pack, Chrysoula Paliadeli, Marie-Thérèse Sanchez-Schmid, Marietje Schaake, Marco Scurria, Joanna Senyszyn, Hannu Takkula, László Tőkés, Helga Trüpel, Gianni Vattimo, Sabine Verheyen, Milan Zver

    Suplente(s) presente(s) en la votación final                        

    Ivo Belet, Nadja Hirsch, Seán Kelly

    ————————————————————

    (1) DO L 201 de 31.7.2002, p. 37.

    (2) DO L 281 de 23.11.1995, p. 31.

    ————————————————————

     OPINIÓN DE LA COMISIÓN DE ASUNTOS JURÍDICOS (25.5.2011)              

    para la Comisión de Libertades Civiles, Justicia y Asuntos de Interior

    sobre un enfoque global de la protección de los datos personales en la Unión Europea

    (2011/2025(INI))

    Ponente de opinión: Françoise Castex

    SUGERENCIAS

    La Comisión de Asuntos Jurídicos pide a la Comisión de Libertades Civiles, Justicia y Asuntos de Interior, competente para el fondo, que incorpore las siguientes sugerencias en la propuesta de resolución que apruebe:

    1.        Subraya que el rápido ritmo de los progresos tecnológicos en la sociedad global de la información requiere unas normas integrales y coherentes en materia de protección de datos; observa que, tras la entrada en vigor del Tratado de Lisboa y el carácter jurídicamente vinculante adquirido por la Carta de los Derechos Fundamentales, el artículo 16 del Tratado de Funcionamiento de la Unión Europea (TFUE) podría ofrecer un fundamento jurídico específico para la adopción de un instrumento jurídico sobre la protección de datos personales, si se basa en el nivel más elevado de protección previsto para ello en la legislación de la UE, y opina que esto podría proporcionar una mayor seguridad jurídica; considera que el artículo 8 de la Carta debe respetarse plenamente en este sentido;

    2.        Considera que esta creciente complejidad de las cuestiones vinculadas a la protección de datos y la actual falta de armonización entre las legislaciones nacionales de los Estados miembros exigen la adopción de un instrumento jurídico global a nivel europeo; pide, en este sentido, a la Comisión que cree un sistema de notificación de violación de datos personales, en consonancia con el introducido por la Directiva sobre la privacidad y las comunicaciones electrónicas;

    3.        Pide a la Comisión que aproveche la oportunidad para considerar y reforzar el nivel elevado de protección de los interesados y de esa forma mejorar la legislación europea sobre protección de datos;

    4.        Destaca que el derecho de acceso no solo incluye el pleno acceso a los procesamientos de datos que afecten al sujeto de los mismos, incluida su fuente y sus destinatarios, sino también información inteligible sobre la lógica aplicada en cualquier procesamiento automático; subraya que esto último adquirirá una mayor importancia con la realización de perfiles y la extracción de datos;

    5.        Pide a la Comisión que garantice las sinergias entre los derechos de protección de datos y los derechos del consumidor;

    6.        Recuerda la necesidad de proteger específicamente a las personas vulnerables y, en particular, a los niños, en particular imponiendo por defecto un alto nivel de protección de los datos y adoptando medidas adecuadas y específicas para proteger sus datos personales; considera que las autoridades nacionales de protección de datos deben realizar actividades de sensibilización, especialmente dirigidas a los menores de edad;

    7.        Pide a la Comisión que tenga en cuenta el riesgo de elección del fuero más ventajoso en sus propuestas relativas a la determinación del Derecho aplicable;

    8.        Respalda la introducción de un principio general de transparencia en el tratamiento de los datos personales que facilite el control ejercido por las personas en relación con sus propios datos;

    9.        Respalda firmemente la Comunicación de la Comisión en lo referente al consentimiento informado como un principio básico y pide que aclare y refuerce la normativa pertinente;

    10.      Manifiesta su preocupación por las derivas asociadas a la publicidad comportamental en línea y recuerda que la Directiva sobre la privacidad y las comunicaciones electrónicas estipula la necesidad de un consentimiento explícito y previo de la persona afectada para el envío de «cookies» y el posterior seguimiento de su comportamiento de navegación para dirigirle anuncios personalizados;

    11.      Acoge con agrado la decisión de la Comisión de estudiar las modalidades de introducción de una obligación general de notificación de las violaciones de los datos personales, limitada actualmente tan solo al sector de las telecomunicaciones;

    12.      Pide a la Comisión que proponga medidas específicas para los niños, que todavía no son conscientes de los riesgos asociados a la utilización de Internet;

    13.      Observa que la revisión de la reglamentación europea no debe generar costes desmesurados a las empresas europeas, ya que ello afectaría a su competitividad con respecto a sus competidores de terceros países;

    14.      Opina que debe fomentarse la autorregulación, en particular mediante códigos de conducta;

    15.      Señala que la protección de los datos personales afecta a todos, pero que el ejercicio de este derecho no puede conllevar la protección de actividades criminales o delictivas; recuerda, a este respecto, que el artículo 47 de la Carta Europea de los Derechos Fundamentales consagra el derecho a un recurso eficaz en caso de violación de los derechos y libertades garantizados por el Derecho de la Unión;

    16.      Respalda los esfuerzos por seguir avanzando en la elaboración de iniciativas de autorregulación aplicables y vinculantes, basadas en el marco jurídico incluido en la revisión sobre la protección de datos, tal como se propone en la Comunicación de la Comisión, y es favorable a que se dé un mayor apoyo a los sistemas de certificación de la UE; recuerda que el sector de la contratación pública debería desempeñar una importante función asumiendo el liderazgo en esta materia;

    17.      Respalda firmemente la Comunicación de la Comisión y pide a los Estados miembros que velen por que las autoridades nacionales de protección de datos posean los poderes adecuados y los recursos que les permitan desempeñar adecuadamente sus tareas a nivel nacional y garantizar su independencia;

    18.      Pide a la Comisión que continúe el diálogo con terceros países con el fin de establecer un marco jurídico internacional coherente, dado que los avances tecnológicos, como por ejemplo la computación en nube, permiten a los responsables del tratamiento de datos establecerse en diversos países; pide también a la Comisión que refuerce el concepto de normas corporativas vinculantes en el ámbito de la transferencia internacional de datos;

    19.      Pide a la Comisión que adopte medidas encaminadas a reafirmar y reforzar el papel del Grupo de Trabajo del Artículo 29 para asegurar su imparcialidad y la transparencia de sus actividades y para mejorar la cooperación entre las autoridades nacionales y la armonización en la aplicación de las normas de protección de datos personales; pide a la Comisión, al mismo tiempo, que proponga un marco jurídico que garantice la coherencia en el ejercicio de las competencias del SEPD, de las autoridades nacionales de protección de datos y del Grupo de Trabajo del Artículo 29;

    20.      Pide a la Comisión que garantice que la Directiva ofrezca definiciones claras y armonizadas;

    21.      Pide a la Comisión que prevea un alto nivel de transparencia en lo relativo al tratamiento de datos personales en el marco jurídico;

    22.      Pide a la Comisión que garantice el respeto de los principios de minimización de los datos y limitación a su propósito;

    23.      Destaca la importancia de los derechos de acceso, rectificación y supresión;

    24.      Pide a la Comisión que prevea un sistema restrictivo especial para los datos delicados, lo que requerirá una definición clara de esta categoría de datos;

    25.      Pide a la Comisión que garantice que se mantengan las excepciones permitidas para fines periodísticos en el artículo 9 de la actual Directiva sobre protección de datos y que se haga todo lo posible por evaluar la necesidad de desarrollar dichas excepciones teniendo en cuenta cualquier nueva disposición con el fin de proteger la libertad de prensa;

    26.      Pide a la Comisión que haga responsables al conjunto de los agentes de Internet sobre la cuestión de los datos personales y exige, en particular, que las agencias publicitarias y los editores informen claramente a los internautas antes de recopilar cualquier dato que les concierna.

    RESULTADO DE LA VOTACIÓN FINAL EN COMISIÓN

    Fecha de aprobación                                                     24.5.2011

     Resultado de la votación final                                   +:            23

                                                                                                  –:            0

                                                                                                  0:            2

    Miembros presentes en la votación final              Raffaele Baldassarre, Luigi Berlinguer, Sebastian Valentin Bodu, Françoise Castex, Christian Engström, Lidia Joanna Geringer de Oedenberg, Syed Kamall, Klaus-Heiner Lehne, Antonio Masip Hidalgo, Jiří Maštálka, Alajos Mészáros, Bernhard Rapkay, Evelyn Regner, Francesco Enrico Speroni, Dimitar Stoyanov, Alexandra Thein, Diana Wallis, Rainer Wieland, Cecilia Wikström, Zbigniew Ziobro, Tadeusz Zwiefka

    Suplente(s) presente(s) en la votación final         Piotr Borys, Kurt Lechner, Eva Lichtenberger, József Szájer

    Suplente(s) (art. 187, apdo. 2) presente(s)

    en la votación final                                                         Pablo Arias Echeverría

     RESULTADO DE LA VOTACIÓN FINAL EN COMISIÓN      

    Fecha de aprobación                                                     15.6.2011

    Resultado de la votación final                                    +:            49

                                                                                                  –:            1

                                                                                                  0:            0

    Miembros presentes en la votación final              Jan Philipp Albrecht, Rita Borsellino, Simon Busuttil, Carlos Coelho, Rosario Crocetta, Cornelis de Jong, Agustín Díaz de Mera García Consuegra, Cornelia Ernst, Tanja Fajon, Kinga Gál, Kinga Göncz, Nathalie Griesbeck, Sylvie Guillaume, Ágnes Hankiss, Anna Hedh, Salvatore Iacolino, Sophia in ‘t Veld, Lívia Járóka, Teresa Jiménez-Becerril Barrio, Timothy Kirkhope, Juan Fernando López Aguilar, Baroness Sarah Ludford, Clemente Mastella, Véronique Mathieu, Claude Moraes, Jan Mulder, Georgios Papanikolaou, Judith Sargentini, Birgit Sippel, Csaba Sógor, Rui Tavares, Wim van de Camp, Daniël van der Stoep, Axel Voss, Renate Weber, Tatjana Ždanoka

    Suplente(s) presente(s) en la votación final         Edit Bauer, Michael Cashman, Anna Maria Corazza Bildt, Luis de Grandes Pascual, Ioan Enciu, Heidi Hautala, Stavros Lambrinidis, Mariya Nedelcheva, Norica Nicolai, Zuzana Roithová, Michèle Striffler, Cecilia Wikström

    Suplente(s) (art. 187, apdo. 2) presente(s)

    en la votación final                                                         Marita Ulvskog, Silvia-Adriana Ţicău

    12May/21

    Proyecto de Ley “de Protección de Datos Personales” 30 de abril de 2021.

    PROYECTO-D-2162170. Presentación oficial del Proyecto de Ley “de Protección de Datos Personales” de la República del Paraguay, durante un evento organizada por la Comisión de Ciencia y Tecnología de la Cámara Baja el viernes 30 de abril de 2021.

    Asunción, 30 de abril de 2021.-

    Señor

    Pedro Hércules Alliana Rodríguez, Presidente

    Honorable Cámara de Diputados

    Presente

    De nuestra más distinguida consideración

    Los abajo firmantes, Diputados Nacionales, nos dirigimos a Vuestra Honorabilidad y por su intermedio a los Miembros de la Honorable Cámara de Diputados para elevar a consideración el Proyecto de Ley de Protección de Datos Personales en Paraguay, en virtud del Artículo 203 de la Constitución Nacional.

    El presente proyecto de ley tiene por objeto reglamentar los aspectos relativos a la “Protección General de los Datos Personales en la República del Paraguay”.

    En espera de que la presente iniciativa legislativa tenga el tratamiento favorable y oportuno, hacemos propicia la oportunidad para saludar al Señor Presidente con el mayor respeto y consideración.

    Se adjunta proyecto cuyos firmantes son los siguientes Diputados Nacionales;

    1- Sebastián García

    2- Edwin Reimer

    3- Carlos Maria López

    4- Kattya González

    5- Sebastián Villarejo

    6- Basilio Nuñez

    7- Edgar Acosta Alcaraz

    8- Antonio Buzarquis

    EXPOSICIÓN DE MOTIVOS

    Este proyecto de ley viene a llenar el actual vacío legal sobre una ley de protección de datos personales adecuada, integral y moderna. Con la derogación de la Ley 1682/2001 y sus leyes modificatorias, por la Ley nº 6534/2020 de Protección de Datos Personales Crediticios, se deja sin protección a los datos personales en general.

    Este proyecto de ley enmarca la protección de datos personales como un derecho inherente a cada persona física, en relación al tratamiento de sus datos, ya sea a través de entes públicos o privados, con fines lucrativos o no, a través de cualquier medio de transmisión o divulgación existentes, incluyendo tecnologías existentes y nuevas tecnologías a ser desarrolladas.

    Por ende, el proyecto de ley prevé ocuparse del tratamiento integral de datos personales, que constituye una asignatura pendiente. La visión integral resulta necesaria atendiendo a que los datos personales no son únicamente datos crediticios, sino que abarcan diversas facetas del individuo. La persona física debe tener el control de sus propios datos personales de manera eficaz para evitar una lesión en sus derechos más fundamentales.

    La recopilación, procesamiento y comunicación inadecuada de datos personales puede significar una vulneración a derechos como la vida, la salud, la integridad física, psicológica o sexual, entre muchos otros; lesiones que ya se han familiarizado con la realidad paraguaya e internacional. Por ejemplo, se pueden alterar elecciones, determinar quién recibe servicios de salud o alimenticios, además de utilizar para trata de personas, narcotráfico, terrorismo, robo, ataque, o incluso exposiciones ilegítimas de bases de datos de carácter público o privado, generado grandes perjuicios sociales y económicos.

    En Paraguay se volvió una práctica común que los abonados a servicios móviles, reciban innumerables mensajes o llamadas o para el ofrecimiento de cambio de aparatos celulares, créditos, planes de wi-fi, seguros odontológicos y un sinfín de ofertas, sin conocer cómo empresas con las que nunca tuvieron vínculo comercial obtienen su información. Toda esa información personal, puede ser tratada y abusada sin consentimiento, por falta de una regulación integral y por la falta de una autoridad de control independiente y efectiva.

    La legislación nacional vigente es inadecuada y no ha sido actualizada según los usos modernos que se hacen de los datos y el desafío que esto representa. El creciente volumen y uso de datos personales, junto con la aparición de tecnologías que habilitan nuevas maneras de tratamiento y uso de los mismos, evidencia la importancia de regular un marco efectivo de protección de datos personales.

    Por otro lado, en lo que respecta al contexto internacional, el Consejo de Derechos Humanos de la Asamblea General de Naciones Unidas, en Resolución 28/16Profundamente preocupado por los efectos negativos que pueden tener para el ejercicio y el goce de los derechos humanos la vigilancia y la interceptación de las comunicaciones, incluidas la vigilancia y la interceptación extraterritoriales de las comunicaciones y la recopilación de datos personales, en particular cuando se llevan a cabo a gran escala” nombró por primera vez a un Relator especial sobre derecho a la privacidad en la era digital en la era digital con la finalidad de que, entre otras tareas, presente informes que incluyan “observaciones importantes” sobre cómo garantizar este derecho fundamental, así como denuncias sobre posibles violaciones al mismo.

    En América Latina, muchas legislaciones han introducido este derecho, tutelándolo legalmente, y creando un órgano contralor de protección de datos. En Paraguay en el año 2001 el Poder Legislativo inició el proceso de regulación específica en la materia, pero aún no se han incorporado al derecho positivo nacional, normas integrales que tutelen el derecho a la autodeterminación informativa de forma eficaz.

    La Red Iberoamericana de Protección de Datos (RIPD) adoptó una declaración con motivo de su 6° Encuentro, celebrado en Colombia en mayo de 2008, en la que invitaba a todas las conferencias internacionales en materia de protección de datos, independientemente de su ámbito geográfico, a concentrar sus esfuerzos con vistas a adoptar un instrumento jurídico conjunto.

    La Unión Europea ha adoptado un nuevo marco normativo en la materia, con el objetivo de modernizar sus disposiciones y garantizar mayor solidez y coherencia en la protección efectiva del derecho fundamental a la protección de datos personales en la Unión Europea y con el fin de generar confianza en la sociedad en general y, a su vez, facilitar el desarrollo de la economía digital, tanto en su mercado interior como en sus relaciones globales. Este marco se posiciona como un referente obligado y determinante para la elaboración de las legislaciones nacionales de protección de datos en Iberoamérica.

    Paraguay no es parte del Convenio para la Protección de las Personas con respecto al Tratamiento Automatizado de Datos de Carácter Personal suscrito en el ámbito del Consejo de Europa. Este convenio está abierto a la firma de otros Estados de la región y cabe destacar que Argentina y Uruguay sí lo han suscrito. La sanción de este proyecto de ley posibilitará al Paraguay a formar parte del mismo y dará herramientas para la colaboración internacional en investigación y cooperación.

    Tomando en cuenta el acuerdo entre los bloques del Mercosur y la Unión Europea, aspiramos a transformar al Paraguay en un país que brinde un nivel de protección adecuado de acuerdo con los estándares promovidos por la Unión Europea, a efectos de acceder a la transferencia de datos personales desde esta y, con ello, facilitar la inversión de aquellos nichos de mercado que suponen tratamiento de datos provenientes de aquella. La inversión europea es superior en países “adecuados”, con relación a los países que no lo son. Además, estos estándares ayudarán a facilitar el desarrollo de la economía digital, promoviendo la innovación.

    Para el intercambio de bienes o servicios, en la mayoría de los casos, se requiere que exista el flujo transfronterizo de datos personales, y al no tener normativa amparada por un ente controlador especializado en la materia, no le es posible al país ofrecer un nivel adecuado de protección. Esto desalienta el comercio y genera que se prefieran destinos como Argentina, Uruguay, Brasil u otros países que sí cuentan con Ley de Protección de Datos Personales, dando certidumbre y confianza a usuarios, empresas, organizaciones y Estados a través de un marco jurídico sólido.

    En el contexto económico mundial, los Estados que no han desarrollado normativa alguna sobre la materia, o tienen normativa incompleta, dispersa o contradictoria, presentan mayor desventaja, no solo frente a los riesgos y peligros que trae consigo el manejo de datos personales, sino ante la imposibilidad de usarlos como insumos clave para su desarrollo económico y social.

    Antecedentes del proyecto

    El texto del proyecto de ley se originó en la Mesa de Trabajo de la Comisión de Ciencia y Tecnología de la Cámara de Diputados, liderado conjuntamente por su Presidente, el Diputado Sebastián García y la Coalición de Datos Personales (www.datospersonales.org.py), formada durante el cuarto Foro de Gobernanza de Internet del Paraguay – IGFPY en el año 2017 (www.igf.org.py).

    En dicho foro se trataron temas de privacidad como expediente médico digital, computación en la nube y big data, así como el futuro en Internet en Paraguay. Luego del debate generado en varios de esos paneles se detectó la necesidad de adecuar la legislación nacional vigente que trata los datos personales, para adecuarla a la era de Internet, la economía digital, la Internet de las cosas (IoT) y la inteligencia artificial (IA).

    El objetivo principal de la mesa de trabajo fue la redacción de un proyecto de ley sobre protección de datos personales que se adecuara a las nuevas tecnologías y al mundo globalizado, donde cada vez hay más transferencia internacional de datos.

    La mesa de trabajo siguió los principios de la gobernanza de Internet, siendo abierto, colaborativo, voluntario, inclusivo y transparente, con la participación de múltiples partes interesadas. Se realizaron webinars de socialización y discusión con 9 expertos regionales y de la Unión Europea sobre datos personales, para debatir el anteproyecto de ley y compartir experiencias de los diferentes actores.

    El proyecto de ley resultante está basado en la normativa y los estándares internacionales y se tuvieron en cuenta regulaciones existentes a nivel internacional específicas en la materia, como el Reglamento (UE) 2016/679, y legislación comparada que ha sido sancionada en los últimos años: Ley Orgánica de Protección de Datos de Carácter Personal de España, Anteproyecto de ley de Protección de Datos de Argentina, Lei Geral de Proteção de Dados de Brasil (LGPD), Ley de Protección de Datos Personales de Uruguay, Ley General de Protección de Datos Personales en Posesión de Sujetos Obligados de México, Ley de Protección de Datos Personales para el Distrito Federal de México. Así también se tuvieron en cuenta los comentarios de expertos internacionales de la Unidad de datos transfronterizos de la Unión Europea y Access Now. También se incluyeron los Estándares de Protección de Datos Personales para los Estados Iberoamericanos establecidos por la Red Iberoamericana de Protección de Datos.

    Además, se recibieron comentarios y contribuciones de la sociedad civil organizada, la comunidad empresarial, representantes del gobierno, del sector técnico y académico y ciudadanos interesados en el tema.

    Se tuvieron 3017 visitas en la web www.datospersonales.org.py  y 103 comentarios recibidos en el borrador del proyecto de ley: https://proyecto.datospersonales.org.py/ Todos estos valiosos comentarios y sugerencias han sido debidamente valorados.

    El proyecto de ley fue innovador al adoptar una plataforma que permitió una mayor interacción entre los participantes, asegurando que cada contribución fuera vista y comentada por todos los demás usuarios involucrados en el debate, asegurando una mejor sistematización del texto. El resultado de todo este proceso es el Proyecto que hoy se remite para su consideración.

    Fundamento Jurídico

    La protección de las personas físicas en relación con el tratamiento de sus datos personales es un derecho fundamental que se encuentra reconocido con rango máximo en la Constitución, artículos 33, 34 y 35 que refieren al derecho a la intimidad, la inviolabilidad de los recintos privados y los documentos identificatorios. El artículo 36 también hace referencia a la inviolabilidad del patrimonio documental y la comunicación privada.

    Los datos personales que ampara el precepto constitucional del derecho a la intimidad, son datos absolutamente personalísimos, que sólo pueden pertenecer a un individuo en concreto. Se lo define desde dos pilares: por un lado, el derecho a la protección de datos otorga la potestad a la persona cuyos datos pertenecen, a conocer quién tiene información sobre ella, cuál es dicha información, de dónde proviene y para qué finalidad se van a tratar sus datos. Por otro lado, este derecho se configura como el control sobre el uso que se hace de sus datos personales. Este control es lo que nos permite conocer qué datos nuestros se tratan y de qué manera, y ello conlleva a la necesidad  de protección jurídica sobre los datos personales .

    La Doctrina se refiere al derecho de autodeterminación informativa y a controlar la información personal como una nueva dimensión de la tradicional concepción del derecho a la privacidad .

    El objeto de protección de datos no se reduce solo a los datos íntimos de la persona, sino a cualquier tipo de dato, sea o no íntimo. Su objeto no es solo la intimidad individual, sino todos los datos de carácter personal, los que identifiquen o permitan identificar a la persona, realizando perfilamientos que podrían causar lesiones a su intimidad.

    En Paraguay, existen normas dispersas en diferentes cuerpos legales que protegen aisladamente diferentes aspectos del derecho a la privacidad, y de forma incompleta. Alguna de ellas son: el Código Penal en su Artículo 147 Revelación de un secreto de carácter privado, Artículo 148 Revelación de secretos privados por funcionarios o personas con obligación especial,  Artículo 149 Revelación de secretos privados por motivos económicos; la Ley 4083/2011 “Que crea el programa de acompañamiento y protección a testigos y víctimas en procesos penales” en su Artículo 4º; la Ley 5777/2018 Protección integral a las mujeres contra toda forma de violencia, en su Artículo 9º Confidencialidad; la  Ley 6534/2020 de protección de datos personales crediticios; la Ley n° 5282/14 De Acceso a la Información Pública y Decreto reglamentario 4064/15; la Ley n° 5830/17 Que Prohíbe la publicidad no autorizada por los usuarios titulares de telefonía móvil; la Ley n° 1334/1998 de Defensa del Consumidor, Código Civil y Comercial (cartas o misivas como prueba, al nombre de las personas físicas o jurídicas); la Ley n° 4017/10 de Firma electrónica y Firma Digital; la Ley n°4868/2013 de Comercio Electrónico y su decreto reglamentario n° 1165/14; la Ley n° 861/96 de Bancos y Entidades Financieras; la Ley n° 489 Orgánica del Banco Central y el Código de la Niñez y la Adolescencia. Además, leyes Tributarias y Reglamentaciones como: la Ley n° 125/1991 Nuevo Régimen Tributario, la Ley n° 2421/04 De Reordenamiento Administrativo y de Adecuación Fiscal, la Ley n° 6380/19 de Modernización y Simplificación del Sistema Tributario, la Ley n° 6446 Tipifica Delito de uso de información privilegiada, el Código de Organización Judicial, la Ley n° 1266/1987 Del Registro Civil y modificatorias, la Ley n° 834/96 Código Electoral Paraguayo y sus modificatorias, los Códigos Procesales (normas sobre audiencias o proceso privados, pruebas documentales, consistentes en cartas o misivas, etc.), la Ley n° 6495/19 Autoriza la implementación del sistema de audiencias por medios telemáticos en el Poder Judicial y el Ministerio Público. También leyes contra el Lavado de Dinero como: la Ley n°6399 de Transparencia de Sociedades por Acciones, la Ley n° 6452 Registro Administrativo de Personas y Estructuras Jurídicas y de Beneficiarios Finales, entre otras.

    En la actualidad carecemos de una regulación específica, uniforme, consolidada y actualizada en la materia. Esta carencia se hace vital ante la inminente implementación del proyecto de la “Agenda Digital” financiado por el BID. Este proyecto prevé una informatización de procesos públicos y privados nunca antes vista y sin un marco robusto, podría habilitar a vulnerabilidades en detrimento de toda la ciudadanía paraguaya.

    Este proyecto de ley es transversal a todos los sectores y en especial a los proyectos de leyes en actual estudio en el Congreso Nacional:  nro. Expediente: D-2059099 “De los servicios de confianza para las transacciones electrónicas, del documento electrónico y los documentos transmisibles electrónicos”, nro. Expediente: S-209516 proyecto de ley “Que crea la historia clínica electrónica y el registro nacional de historias clínicas electrónicas”, nro. Expediente: S-198840 Proyecto de ley “De procedimientos administrativos”.

    Finalmente, el reciente acuerdo sobre Comercio Electrónico del Mercosur MERCOSUR/CMC/DEC. nº 15/20, en su artículo 6º habla sobre la protección de datos personales y de la adopción por los Estados partes, de leyes, regulaciones o medidas administrativas que protejan la información de los consumidores del comercio electrónico, actualmente en estudio.  

    El objeto de la ley

    El objetivo de la ley es crear un marco general y coherente para la protección de datos personales, mediante normas precisas y detalladas para todos los sectores y la creación de una agencia encargada de la supervisión y ejecución de las disposiciones.

    Se busca dotar a nuestro país de una legislación más moderna que respete los derechos y garantías establecidos por nuestra Constitución Nacional y que al mismo tiempo se adapte a las nuevas tecnologías y a los cambios regulatorios ocurridos en el derecho comparado durante los últimos años, dotando de seguridad jurídica tanto a los responsables de los tratamientos de datos como a los ciudadanos.

    Características de la ley

    La protección de datos no se reduce a los datos íntimos, sino a cualquier tipo de dato personal, traspasando su objeto la intimidad personal e imponiendo a terceros deberes como requerir el consentimiento para la recogida y uso de los datos personales, ser informado sobre el destino y poder acceder, rectificar y cancelar los propios datos.

    Los principios de protección de datos personales enumerados en el Título II de la presente ley se encuentran en el centro del marco de protección de datos. La codificación efectiva de estos principios exige el desarrollo de un conjunto de derechos de los usuarios, una base jurídica para el tratamiento de datos, medidas de seguridad de datos, mecanismos de supervisión, obligaciones para las entidades que procesen datos, y medidas que habiliten la transferencia de datos a países terceros.

    Ningún marco de protección de datos puede estar completo sin un mecanismo robusto de aplicación de la ley. Una ley de protección de datos sería deficiente e inaplicable si no existiera una autoridad que tuviera los poderes y recursos para monitorear su implementación, llevar a cabo investigaciones, y sancionar a las entidades en caso de violaciones de protección de datos.

    Los Estándares de Protección de Datos enfatizan en la imperiosa necesidad de que cada Estado iberoamericano cuente con una autoridad de control independiente e imparcial en sus potestades cuyas decisiones únicamente puedan ser recurribles por el control judicial, ajena a toda influencia externa. Además, tendrá facultades de supervisión e investigación en materia de protección de datos personales y será encargada de vigilar el cumplimiento de la legislación nacional en la materia.       

    Debe además estar dotada de recursos humanos y materiales suficientes para garantizar el ejercicio de sus poderes y el desempeño efectivo de sus funciones.

    Por ello se crea, la autoridad de protección de datos y del régimen de reclamaciones y sanciones. Caso contrario, se aumentará la judicialización de disputas para dirimir controversias vinculadas a la protección de datos personales en sede judicial, aumentando los costos transaccionales, y colocando la responsabilidad en los sujetos de derechos para hacer valer dichos derechos, yendo en contra de la tendencia a nivel internacional sobre marcos robustos en materia de protección de datos personales.

    Análisis exegético del articulado

    El texto del proyecto de ley contiene 10 títulos que hacen referencia a las disposiciones generales, los principios de protección de datos, las bases legales para el tratamiento de datos personales, el tratamiento de datos especiales (casos de datos sensibles, con fines de publicidad, video vigilancia, o en el ámbito de la administración pública o fuerzas de seguridad). También se ocupa de los derechos de los titulares de datos, del responsable y encargado de tratamiento, así como la transferencia internacional de datos personales.

    El proyecto se refiere a la protección integral y consagra numerosos principios como el de exactitud (art. 6), licitud (art. 7), finalidad (art. 8), proporcionalidad (art. 9), lealtad (art. 10), transparencia (art. 11), límites a la conservación (art. 12), responsabilidad proactiva (art. 13), seguridad (art. 14) y confidencialidad (art. 15).

    En el art. 16 se prevé que el tratamiento de datos personales sólo podrá realizarse en los siguientes casos:

    1. con el consentimiento del titular;

    2. para el cumplimiento de una obligación legal o reglamentaria por parte del responsable del tratamiento;

    3. por la administración pública, para el tratamiento y uso compartido de los datos necesarios y proporcionales para la ejecución de las políticas públicas previstas en leyes y reglamentos, o sustentadas en convenios interinstitucionales, sujeto a lo dispuesto en el Capítulo I de esta Ley;

    4. el tratamiento de datos se realice sobre datos que figuren en fuentes de acceso público;

    5. cuando sea necesario para la ejecución de un contrato o trámites preliminares relacionados con un contrato del que el titular sea parte, a solicitud del interesado;

    6. para el ejercicio regular de derechos en procedimientos judiciales, administrativos o arbitrales

    7. para la protección de la vida o seguridad física del titular o de un tercero y para la protección de la salud, exclusivamente, en un procedimiento realizado por profesionales de la salud, servicios de salud o autoridad sanitaria;

    8. cuando sea necesario para atender los intereses legítimos del responsable del tratamiento o de un tercero, excepto en el caso de que prevalezcan los derechos y libertades fundamentales del titular que requieran la protección de datos personales, en particular cuando el titular sea un niño, niña o adolescente.

    Por lo dispuesto en el inciso 8 no será de aplicación al tratamiento realizado por las autoridades públicas en el ejercicio de sus funciones.

    A los efectos de proteger situaciones especiales, la ley se refiere también a los casos en los que pueden utilizarse datos personales con los fines expuestos en el Título IV. También se prevé que los titulares de datos puedan ejercer su derecho a la información (art. 36), acceso a los datos (art. 37), rectificación (art. 38), oposición (art. 39), supresión (art. 40), portabilidad (art. 41) y a no ser objeto de decisiones individuales automatizadas (art. 42).

    Se prevé la figura de un responsable y encargado de tratamiento que deberá adoptar las medidas técnicas y organizativas para el cumplimiento de las disposiciones previstas en la ley.

    Se legisla sobre la transferencia internacional de datos, considerando la posibilidad de que las informaciones sobre una persona sean requeridas por algún particular o empresa extranjera en el marco de diferentes operaciones, previendo que pueda realizarse si el Estado cuenta con un adecuado nivel de protección de datos personales.

    Se dispone la creación de la Agencia de Protección de Datos personales como un ente de derecho público y con facultades de ejercer acciones ante las autoridades nacionales e internacionales y organismos privados o personas vinculadas a la protección de datos (art. 62).

    Finalmente, se prevé el régimen de reclamaciones, faltas e imposición de sanciones.

    Conclusión

    El régimen de protección integral resulta necesario para la protección de los derechos de los habitantes del país y sus datos, brindándoles una protección adecuada equiparable a la de otros países de la región. Más aún, en el marco de una constante innovación tecnológica, el incremento del libre flujo de los datos personales que, en una economía global y digital, sobre los cuales se erigen las economías de los Estados.

    En virtud de los antecedentes citados, y dada la urgencia de legislación especializada que se encargue de regular el tratamiento de datos personales, es necesario contar con una Ley, que salvaguarde los derechos, promueva la actividad económica, comercial, de innovación tecnológica, social, cultural, entre otras y que delimite los parámetros para un tratamiento adecuado en el ámbito público y privado.

    Por los motivos que hemos desarrollado, solicitamos a las señoras diputadas y a los señores diputados que acompañen con su voto este proyecto.

    Agradecimiento

    A LAS PERSONAS QUE ENVIARON COMENTARIOS:

    Marlene Samaniego, Bruno Duarte, Gaspar Pisanu, Gonzalo Fleitas, Jose Fernando Casañas Levi, Marcelo Galvan, Paloma Lara Castro, Miguel Candia, Pablo Palazzi, Stael Olmedo Cabral, Dolores Dozo, Ralf Sauer, Manuel García-Sánchez, Pablo Lacasa.

    A LAS INSTITUCIONES PÚBLICAS QUE ENVIARON COMENTARIOS:

    Asociación de Bancos del Paraguay, Banco Central del Paraguay, Comisión Nacional de Telecomunicaciones, Despacho del Dip. Edwin Reimer, Dirección Nacional de Propiedad Intelectual, Dirección General de los Registros Públicos, Ministerio de Hacienda, Ministerio de Relaciones Exteriores, Ministerio Público, Ministerio de Salud Pública y Bienestar Social, Ministerio de Tecnologías y Comunicaciones, Instituto de Previsión Social, Dirección General del Registro del Estado Civil.

    REDACCIÓN DEL BORRADOR:

    Cecilia Abente, Mariel Aranda, Natalia Enciso, Miguel Angel Gaspar, Adriana Marecos y Alberto Poletti.

    EDICION FINAL:

    Cecilia Abente, Luis Alonzo, Eduardo Carrillo, Natalia Enciso, Marlene Samaniego y Maricarmen Sequera.

    Proyecto de Ley de Protección de Datos Personales en Paraguay

    EL CONGRESO DE LA NACIÓN PARAGUAYA SANCIONA CON FUERZA DE LEY:

    TÍTULO I. DISPOSICIONES GENERALES

    Artículo 1. Objeto de La Ley.

    La presente ley tiene por objeto la protección integral de los datos personales de las personas físicas a fin de garantizar el ejercicio pleno de los derechos de sus titulares, y la libre circulación de tales datos, de conformidad a lo establecido en la Constitución Nacional y los Tratados Internacionales de los cuales la República del Paraguay es parte.

    Artículo 2. Ámbito de Aplicación.

    Las normas de la presente ley serán de aplicación cuando:

    a. El responsable o encargado del tratamiento se encuentre establecido en el territorio nacional, aun cuando el tratamiento de datos tenga lugar fuera de dicho territorio;

    b. El responsable o encargado del tratamiento no se encuentre establecido en el territorio nacional, sino en un lugar en que se aplica la legislación nacional en virtud del derecho internacional o derivado de la celebración de un contrato;

    c. El responsable o encargado no se encuentre establecido en territorio nacional y las actividades del tratamiento estén relacionadas con la oferta de bienes o servicios dirigidos a los residentes, o bien, estén relacionadas con el control de su comportamiento, en la medida en que éste tenga lugar en la República del Paraguay, excepto cuando la ley del lugar donde se encuentra el responsable del tratamiento sea más favorable para la protección del titular de los datos.

    d. El responsable o encargado no se encuentre establecido en territorio nacional y utilice o recurra a medios, automatizados o no, situados en ese territorio para tratar datos personales, salvo que dichos medios se utilicen solamente con fines de tránsito.

    Artículo 3. Excepciones a la ley

    Se consideran exentos de aplicación de la presente ley, el tratamiento de datos cuando los datos personales estén destinados a actividades exclusivamente en el marco de la vida familiar o doméstica de una persona física, esto es, la utilización de datos personales en un entorno de amistad, parentesco o grupo personal cercano y que no tengan como propósito una divulgación o utilización comercial.

    Artículo 4. Limitaciones al derecho de la protección de datos

    La legislación nacional que se aplique al responsable o el encargado del tratamiento podrá limitar, a través de medidas legislativas, el alcance de las obligaciones y de los derechos establecidos en el Título V y los principios establecidos en el Título II, cuando tal limitación respete en lo esencial los derechos y libertades fundamentales y sea una medida necesaria y proporcionada en una sociedad democrática para salvaguardar:

    a) la seguridad del Estado;

    b) la defensa;

    c) la seguridad pública;

    d) la prevención, investigación, detección o enjuiciamiento de infracciones penales o la ejecución de sanciones penales, incluida la protección frente a amenazas a la seguridad pública y su prevención;

    e) otros objetivos de interés público, en particular un interés económico o financiero importante, inclusive en los ámbitos fiscal, presupuestario y monetario, la sanidad pública y la seguridad social;

    f) la protección de la independencia judicial y de los procedimientos judiciales;

    g) la prevención, la investigación, la detección y el enjuiciamiento de infracciones de normas deontológicas en las profesiones reguladas;

    h) una función de supervisión, inspección o reglamentación vinculada, incluso ocasionalmente, con el ejercicio de la autoridad pública en los casos contemplados en los incisos a) al e) y g);

    i) la protección del titular del dato o de los derechos y libertades de otros;

    j) la ejecución de demandas civiles.

    Cualquier ley que tenga como propósito limitar el derecho a la protección de datos personales contendrá, como mínimo, disposiciones relativas a:

    1. La finalidad del tratamiento.

    2. Las categorías de datos personales de que se trate.

    3. El alcance de las limitaciones establecidas.

    4. Las garantías adecuadas para evitar accesos o transferencias ilícitas o desproporcionadas.

    5. La determinación del responsable o responsables.

    6. Los plazos de conservación de los datos personales.

    7. Los posibles riesgos para los derechos y libertades de los titulares.

    8. El derecho de los titulares a ser informados sobre la limitación, salvo que resulte perjudicial o incompatible a los fines de ésta.

    Artículo 5. Definiciones

    A los efectos de la presente ley, se consideran las siguientes definiciones:

    1. Titular de Datos: Persona física sobre la cual se realiza el tratamiento de sus datos.

    2. Datos Personales: datos que colaboren para identificar a personas físicas determinadas o determinables. Se entenderá por determinable la persona que pueda ser identificada mediante algún identificador o por uno o varios elementos característicos de la identidad física, fisiológica, genética, psíquica, económica, cultural o social de dicha persona. Esto también incluye metadatos y fragmentos de datos.

    3. Datos personales sensibles: son los referentes a pertenencias raciales o étnicas, preferencias políticas, convicciones religiosas, filosófica o morales; participación o afiliación en una organización sindical o política; información referente a la salud, la preferencia o vida sexual, datos biométricos y genéticos vinculados a una persona física y, en general, los que fomenten prejuicios y discriminaciones ilícitas o arbitrarias,

    4. Datos Genéticos: Datos personales relativos a las características genéticas heredadas o adquiridas de una persona física que proporcionen una información única sobre la fisiología o la salud de esa persona, obtenidos en particular del análisis de una muestra biológica de tal persona.

    5. Datos Biométricos: Datos personales obtenidos a partir de un tratamiento técnico específico, relativos a las características físicas, fisiológicas o conductuales de una persona física que permitan o confirmen la identificación única de dicha persona, como imágenes faciales o datos dactiloscópicos.

    6. Tratamiento: cualquier operación o conjunto de operaciones efectuadas mediante procedimientos manuales, automatizados o parcialmente automatizados realizadas sobre datos personales, relacionadas de manera enunciativa más no limitativa, con la obtención, acceso, registro, organización, estructuración, adaptación, indexación, modificación, extracción, consulta, almacenamiento, conservación, bloqueo, elaboración, transferencia, cesión, difusión, posesión, aprovechamiento y en general cualquier uso o disposición de datos personales.

    7. Consentimiento: toda manifestación de voluntad libre, específica, informada e inequívoca por la que una persona física acepta y autoriza, ya sea mediante una declaración o una clara acción afirmativa realizada por escrito o por medios electrónicos, así como por cualquier forma similar que la tecnología permita, el tratamiento de los datos personales que le conciernen.

    8. Responsable Del Tratamiento: La persona física o jurídica, autoridad pública u otro organismo que, solo o junto con otros, determine los fines y medios del tratamiento de los datos.

    9. Encargado Del Tratamiento: La persona física o jurídica, autoridad pública, u otro organismo que trate datos personales en representación o mandato del responsable del tratamiento.

    10. Representante: persona física o jurídica establecida en la República del Paraguay que, habiendo sido designada por escrito por el responsable o el encargado del tratamiento, represente a los mismos en lo que respecta a sus respectivas obligaciones en virtud de la presente ley.

    11. Transferencia internacional: la transmisión de datos personales fuera del territorio nacional.

    12. Elaboración De Perfiles: toda forma de tratamiento automatizado y parcialmente automatizado de datos personales consistente en utilizar datos personales para evaluar determinados aspectos de una persona física, en particular para analizar o predecir cuestiones relativas al rendimiento profesional, situación económica, salud, preferencias personales, intereses, fiabilidad, comportamiento, ubicación, etnia, raza, sexo o movimientos de dicha persona física.

    13. Normas de autorregulación Vinculantes: Las políticas de protección de datos personales asumidas por un responsable o encargado del tratamiento establecido en el territorio nacional para transferencias de datos personales a un responsable o encargado en uno o más países terceros, dentro de un grupo empresarial o una unión de empresas dedicadas a una actividad económica conjunta.

    14. Evaluación De Impacto Relativa A La Protección De Datos: Análisis de carácter previo de aquellos tratamientos de datos que puedan suponer un alto riesgo para los derechos y libertades de las personas.

    15. Bloqueo de datos: La identificación y reserva de datos personales con el fin de impedir su tratamiento.

    16. Fuente de acceso público: la que contiene información destinada a ser difundida al público, de libre acceso e intercambio por razones de interés general, conforme a la Ley nº 5282/2014 “De libre acceso ciudadano a la información pública y transparencia gubernamental”.

    TÍTULO II. PRINCIPIOS DE PROTECCIÓN DE DATOS

    Artículo 6. Principio de exactitud de los datos

    Los datos personales serán exactos, completos y actualizados. Los responsables y encargados del tratamiento deben adoptar todas las medidas razonables para corregir errores, modificar los datos que resulten ser inexactos o incompletos y garantizar la certeza de la información objeto de tratamiento.

    Cuando los datos personales hubieren dejado de ser necesarios para el cumplimiento de las finalidades que motivaron su tratamiento, el responsable los suprimirá o eliminará de sus archivos, registros, bases de datos, expedientes o sistemas de información, o en su caso, los someterá a un procedimiento de anonimización o seudonimización. En la supresión de los datos personales, el responsable implementará métodos y técnicas orientadas a la eliminación definitiva y segura de éstos.

    Artículo 7. Principio de licitud del tratamiento

    Para que el tratamiento sea lícito, los datos personales deben ser tratados conforme a las bases jurídicas previstas en la presente ley en el artículo 16.

    Artículo 8. Principio de finalidad

    Los datos personales deben ser recogidos y procesados con fines determinados, explícitos, legítimos y de duración limitada, y no serán tratados, posteriormente, de manera incompatible o distinta con dichos fines.

    Artículo 9. Principio de proporcionalidad

    El responsable y el encargado tratará únicamente los datos personales que resulten adecuados, pertinentes y limitados al mínimo necesario con relación a las finalidades que justifican su tratamiento.

    Asimismo, los datos deberán someterse a revisión periódica para determinar si continúan cumpliendo la finalidad.

    Artículo 10. Principio de lealtad

    No podrán recabarse datos personales por medios o métodos fraudulentos, engañosos, desleales e ilícitos. Para los efectos de la presente ley, se considerarán desleales aquellos tratamientos de datos personales que den lugar a una discriminación injusta o arbitraria contra los titulares.

    Artículo 11. Principio de transparencia

    El responsable informará al titular sobre la existencia misma y características principales del tratamiento al que serán sometidos sus datos personales, a fin de que pueda tomar decisiones informadas al respecto.

    Artículo 12. Limitación del plazo de conservación

    No podrán conservarse o mantenerse los datos durante más tiempo del necesario para los fines del tratamiento. La Autoridad de Control deberá establecer los plazos para la supresión y/o revisión periódica.

    El tratamiento ulterior de los datos personales con fines de archivo e interés público, fines de investigación científica e histórica o fines estadísticos no se considerará incompatible con los fines iniciales, siempre que se encuentren anonimizados o seudonimizado.

    Artículo 13. Principio de responsabilidad proactiva

    El responsable o encargado del tratamiento debe adoptar las medidas técnicas y organizativas apropiadas a fin de garantizar un tratamiento adecuado de los datos personales y el cumplimiento de las obligaciones dispuestas por la presente Ley, y que le permitan demostrar a la autoridad de control su efectiva implementación.

    Artículo 14. Principio de seguridad

    En el tratamiento de datos personales se deberán adoptar medidas técnicas y organizativas que garanticen la seguridad de los datos y que tendrán como finalidad evitar la alteración, pérdida, tratamiento o acceso no autorizado. En el caso de datos definidos por esta ley como datos sensibles, se adoptarán medidas adicionales para garantizar la seguridad de los mismos.

    Para la determinación de las medidas referidas en el párrafo anterior, el responsable considerará los siguientes factores:

    a. El riesgo para los derechos y libertades de los titulares, en particular, por el valor potencial cuantitativo y cualitativo que pudieran tener los datos personales tratados para una tercera persona no autorizada para su posesión.

    b. El estado de la técnica.

    c. La naturaleza de los datos personales tratados, en especial si se trata de datos personales sensibles.

    d. El alcance, contexto y las finalidades del tratamiento.

    e. Las transferencias internacionales de datos personales que se realicen o pretendan realizar.

    f. El número de titulares.

    g. Las posibles consecuencias que se derivarían de una vulneración para los titulares.

    h. Las vulneraciones previas ocurridas en el tratamiento de datos personales.

    El responsable llevará a cabo una serie de acciones que garanticen el establecimiento, implementación, operación, monitoreo, revisión, mantenimiento y mejora continua de las medidas de seguridad aplicables al tratamiento de los datos personales, de manera periódica.

    Las condiciones técnicas de integridad y seguridad que deban reunir las bases de datos serán reguladas por la Autoridad de Control.

    Artículo 15. Principio de confidencialidad

    Los responsables y encargados del tratamiento de datos de carácter personal, así como toda persona que intervenga en cualquier fase de este estarán sujetas al deber de confidencialidad, obligación que subsistirá aun después de finalizar sus relaciones con el titular. Los mismos podrán ser relevados del deber de confidencialidad por decisión de un juez o tribunal.

    TÍTULO III. BASES LEGALES PARA EL TRATAMIENTO DE DATOS PERSONALES

    Artículo 16. Bases legales para el tratamiento de datos personales

    El tratamiento de datos personales sólo podrá realizarse si se cumple al menos una de las siguientes condiciones:

    1. mediante el consentimiento del titular;

    2. para el cumplimiento de una obligación legal o reglamentaria por parte del responsable del tratamiento;

    3. por la administración pública, para el tratamiento y uso compartido de los datos necesarios y proporcionales para la ejecución de las políticas públicas previstas en leyes y reglamentos o sustentadas en convenios interinstitucionales, sujeto a lo dispuesto en el Titulo IV, Capítulo I de esta Ley;

    4. el tratamiento de datos se realice sobre datos que figuren en fuentes de acceso público;

    5. cuando sea necesario para la ejecución de un contrato o trámites preliminares relacionados con un contrato del que el titular sea parte, a solicitud del mismo;

    6. para el ejercicio regular de derechos en procedimientos judiciales, administrativos o arbitrales,

    7. para la protección de la vida o seguridad física del titular o de un tercero y para la protección de la salud, exclusivamente, en un procedimiento realizado por profesionales de la salud, servicios de salud o autoridad sanitaria,

    8. cuando sea necesario para atender los intereses legítimos del responsable del tratamiento o de un tercero, excepto en el caso de que prevalezcan los derechos y libertades fundamentales del titular que requieran la protección de datos personales, en particular cuando el titular sea un niño, niña o adolescente;

    Lo dispuesto en el inciso 8 no será de aplicación al tratamiento realizado por las autoridades públicas en el ejercicio de sus funciones.

    Artículo 17. Consentimiento

    Cuando se pretenda fundar el tratamiento de los datos en el consentimiento del titular para una pluralidad de finalidades será preciso que conste de manera específica e inequívoca que dicho consentimiento se otorga para todas ellas.

    No podrá supeditarse la ejecución del contrato a que el titular del dato consienta el tratamiento de los datos personales para finalidades que no guarden relación con el mantenimiento, desarrollo o control de la relación contractual.

    Siempre que sea requerido el consentimiento para el tratamiento de los datos personales, el titular podrá revocarlo en cualquier momento, para lo cual el responsable establecerá mecanismos sencillos, ágiles, eficaces y gratuitos. Dicha revocación no tendrá efectos retroactivos.

    En el caso de que se requiera consentimiento, si hay cambios en la finalidad para el tratamiento de datos personales que no sean compatibles con el consentimiento original, el responsable deberá informar al titular con anticipación sobre los cambios en la finalidad, y el titular puede revocar el consentimiento, si no está de acuerdo con los cambios.

    El tratamiento de datos ulterior debe ser compatible con las finalidades manifiestas que surgen del contexto que originó la recolección, siempre que se garantice la preservación de los derechos del titular, así como los fundamentos y principios establecidos en esta Ley. En ningún caso procederá para el tratamiento de datos sensibles.

    Para el tratamiento de datos sensibles se requiere el consentimiento expreso, salvo las excepciones establecidas por ley.

    En todos los casos, el responsable del tratamiento tiene la carga de demostrar que el titular de los datos consintió el uso de sus datos personales.

    Artículo 18. Consentimiento de niños, niñas y adolescentes

    En el tratamiento de datos personales de una niña, niño o adolescente, se debe privilegiar la protección del interés superior de éstos, conforme a la Convención Sobre Los Derechos Del Niño y demás instrumentos internacionales firmados y ratificados por la República del Paraguay que busquen su bienestar y protección integral.

    El tratamiento de los datos personales de los y las adolescentes podrá fundarse en su consentimiento a partir de los catorce años. Se exceptúan los supuestos en que la ley exija la asistencia de los titulares de la patria potestad, guarda o tutela, para la celebración del acto o negocio jurídico en cuyo contexto se recaba el consentimiento para el tratamiento. El tratamiento de los datos de los niños y niñas de hasta trece años, fundado en el consentimiento, sólo será lícito si consta el del titular de la patria potestad, guarda o tutela, con el alcance que determinen los titulares de la patria potestad, guarda o tutela.

    El responsable y encargado deberán realizar esfuerzos razonables para verificar que el consentimiento fue otorgado por el titular de la patria potestad o tutela, o bien, por el menor directamente atendiendo a su edad de acuerdo con la legislación vigente, teniendo en cuenta la tecnología disponible.

    Artículo 19. Interés legítimo

    El interés legítimo del responsable del tratamiento sólo puede sustentar el tratamiento de datos personales con fines lícitos, considerados desde situaciones concretas y siempre que no prevalezca el interés o los derechos y libertades fundamentales del titular del dato, que incluyen, pero no se limitan a:

    1. Apoyo y promoción de las actividades del responsable del tratamiento; y

    2. Protección, en relación con el titular, del ejercicio regular de sus derechos o prestación de los servicios que le beneficien, respetando sus legítimas expectativas y derechos y libertades fundamentales, en los términos de esta Ley.

    Cuando el tratamiento se base en el interés legítimo del responsable del tratamiento, solo se podrán tratar los datos personales estrictamente necesarios para la finalidad prevista.

    El responsable del tratamiento debe adoptar medidas para garantizar la transparencia del tratamiento de los datos en función de su interés legítimo.

    La Autoridad de Control podrá solicitar al responsable del tratamiento un informe de impacto sobre la protección de datos personales, cuando el tratamiento se base en su interés legítimo, observando secretos comerciales e industriales.

    El titular tendrá derecho a oponerse en cualquier momento, por motivos relacionados con su situación particular, al tratamiento de sus datos personales basado en el interés legítimo del responsable.

    TÍTULO IV. TRATAMIENTOS ESPECIALES

    Artículo 20. Tratamiento de datos sensibles

    A fin de evitar el tratamiento con fines discriminatorios, ilícitos o abusivos queda prohibido el tratamiento de datos personales sensibles salvo que:

    1. El titular haya dado su consentimiento explícito y por escrito para el tratamiento de dichos datos personales, salvo en los casos en que por ley no sea requerido el otorgamiento de dicha autorización;

    2. El tratamiento sea necesario para el cumplimiento de obligaciones y el ejercicio de derechos específicos del responsable del tratamiento o del titular en el ámbito del Derecho laboral y de la seguridad social;

    3. El tratamiento sea necesario   para proteger intereses vitales del titular o de otra persona física, en el supuesto de que el titular no esté capacitado, física o jurídicamente, para dar su consentimiento y sus representantes legales no lo puedan realizar en tiempo oportuno;

    4. El tratamiento sea efectuado, en el ámbito de sus actividades legítimas y con las debidas garantías, por una fundación, una asociación o cualquier otro organismo sin ánimo de lucro, cuya finalidad sea política, filosófica, religiosa o sindical, siempre que el tratamiento se refiera exclusivamente a los miembros actuales o antiguos de tales organismos o a personas que mantengan contactos regulares con ellos en relación con sus fines y siempre que los datos personales no se comuniquen fuera de ellos sin el consentimiento de los titulares;

    5. El tratamiento sea necesario para la formulación, el ejercicio o la defensa de reclamaciones o cuando los tribunales actúen en ejercicio de su función judicial, o en procesos administrativos o arbitrales;

    6. El tratamiento sea necesario para fines de medicina preventiva o laboral, evaluación de la capacidad laboral del trabajador, diagnóstico médico, prestación de asistencia o tratamiento de tipo sanitario o social, o gestión de los sistemas y servicios de asistencia sanitaria y social, en virtud de un contrato con un profesional sanitario;

    7. El tratamiento sea necesario por razones de interés público en el ámbito de la salud pública, como la protección frente a amenazas transfronterizas graves para la salud, o para garantizar elevados niveles de calidad y de seguridad de la asistencia sanitaria y de los medicamentos o productos sanitarios;

    8. Se realice en el marco de asistencia humanitaria en casos de desastres naturales;

    9. Sea efectuado por establecimientos sanitarios públicos o privados o por profesionales vinculados a la ciencia de la salud en el marco de un tratamiento médico específico o que hubieren estado bajo tratamiento de aquéllos, respetando los principios del secreto profesional, la normativa específica y lo establecido en la presente ley;

    10. El tratamiento sea necesario con fines de archivo en interés público, fines de investigación científica o histórica o fines estadísticos, que debe ser proporcional al objetivo perseguido, respetar en lo esencial el derecho a la protección de datos y establecer medidas adecuadas y específicas para proteger los intereses y derechos fundamentales del titular. Los datos deberán estar anonimizados o seudonimizado;

    11. El tratamiento compartido de los datos sea necesario para la ejecución, por parte de la administración pública, de las políticas públicas previstas en las leyes.

    Se prohíbe la comunicación o uso compartido entre responsables del tratamiento de datos personales sensibles relacionados con la salud con el fin de obtener una ventaja económica, salvo en los casos relacionados  con la prestación de servicios sanitarios, asistencia farmacéutica y asistencia sanitaria, incluidos los servicios auxiliares para el diagnóstico y la terapia, para el beneficio de los intereses de los titulares de los datos, y para permitir la portabilidad de datos cuando lo solicite el titular.

    Se prohíbe a los operadores de planes de salud privados el procesamiento de datos de salud para la práctica de selección de riesgos al contratar cualquier modalidad, así como al contratar y excluir beneficiarios.

    Artículo 21. Tratamiento de datos de información crediticia

    Se remitirá a lo establecido en la ley nº 6534/20 de Protección de Datos personales crediticios

    Artículo 22. Tratamiento de datos con fines de publicidad

    Cuando los datos personales sean utilizados para perfiles determinados con fines promocionales, comerciales o publicitarios; o permitan establecer hábitos de consumo, así como quienes realicen estas actividades con el fin de comercializar sus propios productos o servicios o los de terceros, sólo podrán utilizar nombres y direcciones u otros datos de carácter personal cuando los mismos se encuentren  en fuentes de acceso público o hayan sido  obtenidos con el  consentimiento de los propios titulares.

    En toda comunicación con fines de publicidad que se realice por correo postal, teléfono, correo electrónico, Internet u otro medio de comunicación que permita la tecnología en el futuro, el responsable o encargado del tratamiento debe implementar medidas razonables que informen al titular de los datos la posibilidad de ejercer los derechos previstos en la presente Ley.

    El titular podrá en cualquier momento solicitar el retiro o bloqueo de sus datos de las bases de datos a los que se refiere el presente artículo. Cuando un afectado manifieste a un responsable su deseo de que sus datos no sean tratados para la remisión de comunicaciones comerciales, el responsable cumplirá con lo establecido en el artículo 39 del derecho de oposición.

    Quienes pretendan realizar comunicaciones de mercadotecnia directa, deberán previamente consultar los sistemas de exclusión publicitaria que pudieran afectar a su actuación, excluyendo del tratamiento los datos de los afectados que hubieran manifestado su oposición o negativa al mismo.

    Artículo 23. Tratamientos con fines de videovigilancia

    Las personas físicas o jurídicas, públicas o privadas, podrán llevar a cabo el tratamiento de imágenes a través de sistemas de cámaras o videocámaras con la finalidad de preservar la seguridad de las personas y bienes, así como de sus instalaciones.

    Solo podrán captarse imágenes de la vía pública en la medida en que resulte imprescindible para la finalidad mencionada en el apartado anterior.

    No obstante, será posible la captación de la vía pública en una extensión superior cuando fuese necesario para garantizar la seguridad de bienes o instalaciones estratégicas o de infraestructuras vinculadas al transporte, sin que en ningún caso pueda suponer la captación de imágenes del interior de un domicilio privado.

    Los datos serán suprimidos en un plazo máximo de hasta 6 meses desde su captación, salvo cuando hubieran de ser conservados para acreditar la comisión de actos que atenten contra la integridad de personas, bienes o instalaciones. En tal caso, las imágenes deberán ser puestas a disposición de la autoridad competente en un plazo máximo de setenta y dos horas desde que se tuviera conocimiento de la existencia de la grabación.

    Se considera excluido de su ámbito de aplicación el tratamiento por una persona física de imágenes que solamente capten el interior de su propio domicilio.

    Esta exclusión no abarca el tratamiento realizado por una entidad de seguridad privada que hubiera sido contratada para la vigilancia de un domicilio y tuviese acceso a las imágenes.

    CAPÍTULO I. DISPOSICIONES APLICABLES A LA ADMINISTRACIÓN PÚBLICA

    Artículo 24. Tratamiento de datos personales por la administración pública

    El tratamiento de los datos personales por la Administración Pública debe considerar la finalidad, la necesidad, la buena fe y el interés público, con el objetivo de ejecutar las facultades legales o cumplir con las atribuciones legales, siempre que:

    1. En ejercicio de sus competencias, realicen el tratamiento de datos personales, aportando información clara y actualizada sobre la disposición legal, finalidad, procedimientos y prácticas utilizadas para realizar estas actividades;

    2. Designe un responsable para la realización de operaciones de tratamiento de datos personales, de conformidad con el 53, numeral 1 de esta Ley;

    3. Los servicios notariales y registrales, que se realicen por delegación del Poder el Estado, tendrán el mismo tratamiento que las personas jurídicas de derecho público, en los términos de este Capítulo;

    4. Los notarios y órganos registrales deberán facilitar el acceso a los datos por medios electrónicos a la administración pública, a la vista de las finalidades a que se refiere el título de este artículo.

    5. Las empresas públicas y las sociedades de capital mixto, cuando se encuentren operando políticas públicas y en el ámbito de su implementación, tendrán el mismo tratamiento que se le da a los órganos y entidades de la Administración Pública, en los términos de este Capítulo.

    Los datos deben mantenerse en un formato interoperable y estructurado de uso compartido, con miras a la implementación de políticas públicas, la prestación de servicios públicos, la descentralización de la actividad pública y la difusión y acceso de la información al público en general.

    La autoridad de control podrá solicitar, en cualquier momento, a los órganos y entidades de la Administración Pública para la realización de operaciones de tratamiento de datos personales, información específica sobre el alcance y naturaleza de los datos, garantías y demás detalles del tratamiento realizado.

    La autoridad de control podrá establecer reglas complementarias para las actividades de comunicación y uso compartido de datos personales.

    Artículo 25. Comunicación de datos personales entre instituciones públicas

    Será lícita la comunicación de datos personales entre instituciones públicas, en la medida en que:

    1. La institución pública titular de la base de datos haya obtenido los datos en ejercicio de sus funciones,

    2. El tratamiento por parte de la institución pública que recibe la base de datos sea necesario para el cumplimiento de sus funciones legales y la finalidad de dicho tratamiento de datos se encuentre dentro del marco de sus competencias,

    3. Los datos involucrados sean adecuados, proporcionales y no excedan el límite de lo necesario en relación a esta última finalidad.

    4. El titular de los datos sensibles haya dado su consentimiento.

    El uso compartido de datos personales por parte de la Administración Pública debe servir para fines específicos, para la ejecución de políticas públicas y atribución legal por parte de organismos y entidades públicas, respetando los principios de protección de datos personales enumerados en el Título II de esta Ley.

    Artículo 26. Comunicación de datos personales a entidades privadas

    Se prohíbe a la Administración Pública transferir a entidades privadas datos personales contenidos en bases de datos a las que tenga acceso, salvo:

    1. En los casos de ejecución descentralizada de la actividad pública que requiera la comunicación, exclusivamente para este fin específico y determinado, previsto en la ley y sujeta a salvaguardas específicas;

    2. Cuando exista una disposición legal o la comunicación esté respaldada por contratos o convenios. Los contratos y acuerdos deben ser aprobados por la autoridad de control.

    Artículo 27. Tratamiento de datos en el ámbito de la función estadística pública

    El tratamiento de datos personales llevado a cabo por los organismos que tengan atribuidas las competencias relacionadas con el ejercicio de la función estadística pública se someterá a lo dispuesto en su legislación específica, así como en la presente ley.

    Dispondrán de medidas técnicas y organizativas, para garantizar el respeto del principio de minimización de los datos personales. Tales medidas podrán incluir la seudonimización, siempre que de esa forma puedan alcanzarse dichos fines.

    Los organismos competentes para el ejercicio de la función estadística pública podrán denegar las solicitudes de los derechos del Titular establecido en los artículos 35 al 42 cuando los datos se encuentren amparados por las garantías del secreto estadístico previstas en la legislación específica.

    Artículo 28. Tratamiento de datos con fines de archivo en interés Público por parte de las Administraciones Públicas

    Será lícito el tratamiento por las Administraciones Públicas de datos con fines de archivo en interés público, que se someterá a lo dispuesto en la presente ley y leyes específicas que incluyan salvaguardas para la protección de los derechos de los titulares.

    Artículo 29. Tratamiento de datos de naturaleza penal

    El tratamiento de datos personales relativos a condenas e infracciones penales, así como a procedimientos y medidas cautelares y de seguridad conexas, para fines distintos de los de prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, sólo podrá llevarse a cabo cuando se encuentre amparado en esta ley o en otras normas de rango legal.

    El registro completo de los datos referidos a condenas e infracciones penales, así como a procedimientos y medidas cautelares y de seguridad conexas, podrá realizarse conforme con lo establecido en la regulación del Sistema de Administración de Justicia.

    Fuera de los supuestos señalados en los apartados anteriores, los tratamientos de datos referidos a condenas e infracciones penales, así como a procedimientos y medidas cautelares y de seguridad conexas sólo serán posibles cuando sean llevados a cabo por abogados y procuradores y tengan por objeto recoger la información facilitada por sus clientes para el ejercicio de sus funciones.

    Artículo 30. Tratamiento de datos relativos a infracciones y sanciones administrativas.

    El tratamiento de datos relativos a infracciones y sanciones administrativas, incluido el mantenimiento de registros relacionados con las mismas, exigirá:

    1. Que los responsables de dichos tratamientos sean los órganos competentes para la instrucción del procedimiento sancionador, para la declaración de las infracciones o la imposición de las sanciones.

    2. Que el tratamiento se limite a los datos estrictamente necesarios para la finalidad perseguida por aquel.

    Cuando no se cumpla alguna de las condiciones previstas en el apartado anterior, los tratamientos de datos referidos a infracciones y sanciones administrativas habrán de contar con el consentimiento del titular del dato o estar autorizados por una norma con rango de ley, en la que se regularán, en su caso, garantías adicionales para los derechos y libertades de los afectados.

    Fuera de los supuestos señalados en los apartados anteriores, los tratamientos de datos referidos a infracciones y sanciones administrativas sólo serán posibles cuando sean llevados a cabo por abogados y procuradores y tengan por objeto recoger la información facilitada por sus clientes para el ejercicio de sus funciones.

    Artículo 31. Infracción del tratamiento de los datos personales por parte de las Instituciones públicas

    Cuando se produzca una infracción a esta ley como consecuencia del tratamiento de datos personales por parte de instituciones públicas. La autoridad de control dictará una resolución estableciendo las medidas que proceda adoptar para que cesen o se corrijan los efectos de la infracción. Esta resolución se notificará a la persona responsable de la base de datos, al órgano del que dependa jerárquicamente y a los afectados, si los hay. La resolución podrá dictarse de oficio o a petición de parte y sin perjuicio de la responsabilidad civil y penal en que haya incurrido.

    Artículo 32. Informes sobre el Impacto de la protección de datos personales

    La autoridad de control podrá solicitar a las Instituciones Públicas que elaboren y publiquen informes sobre el impacto de la protección de datos personales y sugerir la adopción de normas y buenas prácticas para el tratamiento de datos personales por parte de la Administración Pública.

    CAPÍTULO II. DISPOSICIONES APLICABLES A LAS FUERZAS ARMADAS, ORGANISMOS POLICIALES Y DE INTELIGENCIA

    Artículo 33. De los tratamientos de datos personales con fines de defensa nacional o seguridad pública

    El tratamiento de datos personales con fines de defensa nacional o seguridad pública por parte de las fuerzas armadas, organismos policiales e inteligencia, queda limitado a aquellos supuestos y categoría de datos que resulten necesarios y proporcionales para el estricto cumplimiento de las misiones legalmente asignadas a aquéllos para la defensa nacional, la seguridad pública o para la represión de los delitos. Las bases de datos, en tales casos, deberán ser específicas y establecidas al efecto, debiendo clasificarse por categorías, en función de su grado de fiabilidad.

    Los datos personales registrados con fines policiales se cancelarán cuando no sean necesarios para las averiguaciones que motivaron su almacenamiento.

    Los responsables de las bases de datos que contengan los datos a los que se refiere en el presente artículo podrán denegar el acceso, la rectificación o cancelación en función de los peligros que pudieran derivarse para la defensa del Estado o la seguridad pública, la protección de los derechos y libertades de terceros o las necesidades de las investigaciones que se estén realizando.

    La información sobre datos personales también puede ser denegada por los responsables del tratamiento de bases de datos públicas, cuando de tal modo se pudieran obstaculizar actuaciones judiciales o administrativas en curso vinculadas a la investigación sobre el cumplimiento de obligaciones tributarias o previsionales, el desarrollo de funciones de control de la salud y del medio ambiente, la investigación de delitos penales y la verificación de infracciones administrativas. La resolución que así lo disponga debe ser fundada y notificada al titular de los datos.

    En cualquier caso, el responsable del tratamiento debe brindar acceso a los datos en cuestión en la oportunidad en que el titular de los datos demuestre que son necesarios para ejercer su derecho de defensa.

    El titular del dato al que se deniegue total o parcialmente el ejercicio de los derechos podrá ponerlo en conocimiento de la Autoridad de Control, quien deberá asegurarse de la procedencia o improcedencia de la denegación.

    Artículo 34. De la seguridad de las bases de datos

    Los responsables de las bases de datos a que se refiere este Capítulo, deberán establecer medidas adicionales de seguridad, para garantizar la integridad, disponibilidad y confidencialidad de la información, que permitan proteger los datos personales contra daño, pérdida, alteración, destrucción o el uso, acceso o tratamiento no autorizado.

    TÍTULO V. DERECHO DE LOS TITULARES DE DATOS

    CAPÍTULO I. EJERCICIO DE LOS DERECHOS

    Artículo 35. Disposiciones Generales Sobre El Ejercicio De Los Derechos

    El titular de datos o su representante podrán, en cualquier momento, solicitar al responsable, el acceso, rectificación, supresión, oposición y portabilidad de los datos personales que le conciernen.

    El ejercicio de cualquiera de los derechos mencionados no es requisito previo ni impide el ejercicio de otro.

    El responsable deberá establecer medios y procedimientos sencillos, expeditos, accesibles y gratuitos que permitan al titular de datos ejercer sus derechos.

    El responsable tendrá un plazo de 30 (treinta) días corridos computados desde la presentación de la solicitud para dar respuesta a la solicitud del Titular.

    Vencido el plazo sin que se satisfaga el pedido, o si para el titular de los datos la respuesta fuera insuficiente, se podrá recurrir ante la autoridad de control o podrá interponer la acción de habeas data. En caso de optar por la acción de habeas data, o de haberla iniciado con anterioridad, no podrá iniciar el trámite ante la autoridad de control.

    El ejercicio de los derechos previstos en el presente capítulo en el caso de titulares de los datos de personas fallecidas les corresponde a sus sucesores universales.

    Artículo 36. Derecho a la Información

    El titular de datos debe recibir la información sobre cómo se lleva a cabo el tratamiento de sus datos personales, ya sea que lo haya proporcionado directamente a un responsable de tratamiento o que el responsable lo haya obtenido de otra fuente.

    El responsable proporcionará al titular, al menos, la información siguiente:

    a. Su identidad y datos de contacto que son el domicilio legal, número de teléfono y correo electrónico.

    b. Base legal y finalidades del tratamiento a que serán sometidos sus datos personales.

    c. Las comunicaciones o transferencias internacionales de datos personales que pretenda realizar, incluyendo los destinatarios y las finalidades que motivan la realización de las mismas.

    d. La existencia, forma y mecanismos o procedimientos a través de los cuales podrá ejercer los derechos de acceso, rectificación, cancelación, oposición y portabilidad.

    e. Tiempo de conservación de los datos personales.

    En su caso, el origen de los datos personales cuando el responsable no los hubiere obtenido directamente del titular.

    La información proporcionada al titular tendrá que ser suficiente y fácilmente accesible, así como redactarse y estructurarse en un lenguaje claro, sencillo y de fácil comprensión para los titulares a quienes va dirigida, especialmente si se trata de niñas, niños y adolescentes.

    Todo responsable contará con políticas transparentes de los tratamientos de datos personales que realice.

    Artículo 37. Derecho De Acceso

    El titular de datos tendrá el derecho a solicitar y obtener sus datos personales que obren en posesión del responsable. Previa acreditación de su identidad, la información deberá ser suministrada en forma clara, inteligible y exenta de codificaciones y, en su caso, acompañada de una explicación de los términos que se utilicen, en lenguaje accesible al conocimiento medio de la población, y debe versar sobre:

    1. Las finalidades del tratamiento de datos;

    2. Las categorías de datos personales de que se trate;

    3. Los destinatarios o las categorías de destinatarios a los que se cedieron o se prevean ceder los datos personales, en particular cuando se trate de una transferencia internacional;

    4. El plazo previsto de conservación de los datos personales o, de no ser ello posible, los criterios utilizados para determinar este plazo;

    5. La existencia del derecho a solicitar del responsable del tratamiento la rectificación, supresión de datos personales o a oponerse a dicho tratamiento;

    6. El derecho a iniciar un trámite de protección de datos personales ante la autoridad de control;

    7. Cuando los datos personales no se hayan obtenido del titular de los datos, cualquier información disponible sobre su origen;

    8. La existencia de decisiones automatizadas, incluida la elaboración de perfiles a que se refiere el artículo 22 y, al menos en tales casos, información significativa sobre la lógica aplicada, sin que ello afecte derechos intelectuales del responsable del tratamiento.

    En ningún caso el informe puede revelar datos pertenecientes a terceros, aun cuando se vinculen con el titular de los datos. La información, a opción del titular de los datos, puede suministrarse por escrito, por medios electrónicos, de imagen u otro idóneo a tal fin.

    Artículo 38. Derecho De Rectificación

    El titular de datos tendrá el derecho a obtener del responsable la rectificación o corrección de sus datos personales, cuando éstos resulten ser inexactos, incompletos o no se encuentren actualizados.

    En el supuesto de cesión o transferencia internacional de datos erróneos o desactualizados, el responsable del tratamiento debe notificar la rectificación al cesionario dentro del quinto (5°) día hábil de haber tomado conocimiento efectivo del error o la desactualización.

    Durante el proceso de verificación y rectificación del error o falsedad de la información que se trate, el

    responsable del tratamiento debe bloquear el dato, o bien consignar, al proveer información relativa a éste, la circunstancia de que se encuentra sometido a revisión.

    Artículo 39. Derecho De Oposición

    El titular de datos puede oponerse al tratamiento de sus datos personales, o de una finalidad específica de éste, cuando no haya prestado consentimiento. El responsable del tratamiento debe dejar de tratar los datos personales objeto de oposición, a menos que demuestre motivos legítimos imperiosos para el procesamiento que prevalezcan sobre los intereses, derechos y libertades del titular del dato o para el establecimiento, ejercicio o defensa de reclamaciones legales.

    Cuando el titular de datos se oponga al tratamiento con fines de mercadotecnia directa, sus datos personales dejarán de ser tratados para dichos fines en un plazo de 30 (treinta) días corridos desde el envío de la solicitud de oposición.

    Artículo 40. Derecho De Supresión

    El titular de datos tendrá derecho a solicitar la eliminación de sus datos personales de los archivos, registros y sistemas del responsable, a fin de que los mismos dejen de ser tratados por este último.

    Solo podrá requerirse en los siguientes casos:

    1. El tratamiento no cumpla con los principios de lealtad, transparencia y legitimidad;

    2. Los datos personales hayan cumplido con la finalidad para la cual fueron recogidos o tratados;

    3. Haya vencido el plazo de conservación de los datos personales;

    4. El titular de datos haya revocado o no haya otorgado el consentimiento para uno o varios fines específicos, sin necesidad de que medie justificación alguna o éste no se ampare en otro fundamento jurídico;

    5. El titular de los datos haya ejercido su derecho de oposición conforme al artículo 39, y no prevalezcan otros motivos legítimos para el tratamiento de sus datos;

    6. Los datos personales hayan sido tratados ilícitamente;

    7. Los datos personales que deban suprimirse para el cumplimiento de una obligación legal.

    La supresión no procederá cuando pudiese causar perjuicios a derechos o intereses legítimos de terceros, prevalezcan razones de interés público para el tratamiento de datos cuestionado, o los datos personales deban ser conservados durante los plazos previstos en las disposiciones aplicables o, en su caso, en las contractuales entre el responsable o encargado del tratamiento y el titular de los datos.

    La supresión tampoco procede cuando el tratamiento de datos sea necesario para ejercer el derecho a la libertad de expresión e información.

    Artículo 41. Derecho a la Portabilidad

    Cuando se traten datos personales por vía electrónica o medios automatizados, el titular de datos podrá solicitar que sus datos personales se transfieran directamente de responsable a responsable siempre y cuando sea técnicamente posible.

    No resultará procedente cuando se trate de información inferida, derivada, creada, generada u obtenida a partir del análisis o tratamiento efectuado por el responsable con base en los datos personales proporcionados por el titular de datos.

    Este derecho no procederá cuando:

    1. Su ejercicio imponga una carga financiera o técnica excesiva o irrazonable debidamente demostrada sobre el responsable o encargado del tratamiento;

    2. Vulnere la privacidad de otro titular de los datos;

    3. Vulnere las obligaciones legales del responsable o encargado del tratamiento,

    4. Impida que el responsable y/o encargado del tratamiento proteja sus derechos, su seguridad o sus bienes, o los del titular de los datos o tercero,

    5. Se trate de datos que ya hayan sido anonimizados por el responsable del tratamiento.

    Artículo 42. Derecho a no ser objeto de decisiones individuales automatizadas o semiautomatizadas.

    El titular de datos tendrá derecho a no ser objeto de decisiones que le produzcan efectos jurídicos o le afecten de manera significativa que se basen en tratamientos automatizados o semi automatizadas destinados a evaluar, sin intervención humana, determinados aspectos personales del mismo.

    No se aplica lo anterior cuando el tratamiento automatizado o semi automatizadas de datos personales sea necesario para la celebración o la ejecución de un contrato entre el titular de datos y el responsable; esté autorizado por ley, en la que se regularán, en su caso, garantías adicionales para los derechos, libertades y los intereses legítimos de los titulares, o bien, se base en el consentimiento expreso del titular de datos.

    No obstante, cuando sea necesario para la relación contractual o el titular de datos hubiere manifestado su consentimiento tendrá derecho a obtener la intervención humana; recibir una explicación sobre la decisión tomada; expresar su punto de vista e impugnar la decisión.

    El responsable no podrá llevar a cabo tratamientos automatizados o semi automatizados de datos personales sensibles.

    TÍTULO VI. RESPONSABLE Y ENCARGADO DEL TRATAMIENTO

    CAPÍTULO I. DISPOSICIONES GENERALES

    MEDIDAS DE RESPONSABILIDAD ACTIVA

    Artículo 43. Medidas para el cumplimiento de la responsabilidad activa

    Los responsables determinarán las medidas técnicas y organizativas adoptadas para el cumplimiento de las disposiciones de la presente ley.

    En particular valorarán si procede la realización de la evaluación de impacto en la protección de datos y en la consulta previa a que se refieren los artículos 49 y 50 de la presente ley.

    Las medidas deben ser proporcionales a las modalidades y finalidades del tratamiento de datos, su naturaleza, el ámbito, el contexto, el tipo y categoría de datos tratados, y el riesgo que el referido tratamiento pueda acarrear sobre los derechos de su titular.

    Deben contemplar, como mínimo:

    1. La adopción de procesos internos para llevar adelante de manera efectiva la responsabilidad activa, incluyendo las medidas de privacidad por diseño y por defecto;

    2. La implementación de procedimientos para atender el ejercicio de los derechos por parte de los titulares de los datos;

    3. La realización de supervisiones o auditorías, internas o externas, para controlar el cumplimiento de las medidas adoptadas.

    4. La revisión periódica de las políticas y programas de seguridad de datos personales para determinar las modificaciones que se requieran.

    5. La implementación de sistemas de administración de riesgos asociados al tratamiento de datos personales.

    Las medidas deben ser aplicadas de modo que permitan su demostración ante el requerimiento de la autoridad de control.

    Se debe adoptar una política de privacidad o adherirse a mecanismos de autorregulación vinculantes, que serán valorados por la autoridad de control para verificar el cumplimiento de las obligaciones por parte del responsable del tratamiento.

    Artículo 44. Protección de datos desde el diseño y por defecto

    El responsable del tratamiento debe aplicar, desde el diseño para el desarrollo de productos y servicios, medidas técnicas y organizativas apropiadas tanto con anterioridad como durante el tratamiento de datos a fin de cumplir los principios y los derechos de los titulares de los datos establecidos en la presente Ley. Las medidas deben ser adoptadas teniendo en cuenta el estado de la tecnología, los costos de la implementación y la naturaleza, ámbito, contexto y fines del tratamiento de datos, así como los riesgos que entraña el tratamiento para el derecho a la protección de los datos de sus titulares.

    El responsable del tratamiento debe aplicar las medidas técnicas y organizativas apropiadas con miras a garantizar que, por defecto, sólo sean objeto de tratamiento de datos aquellos datos personales que sean necesarios para cada uno de los fines del tratamiento. Esta obligación se aplica a la cantidad y calidad de datos personales recogidos, a la extensión de su tratamiento, a su plazo de conservación y a su accesibilidad. Tales medidas deben garantizar en particular que, por defecto, los datos personales no sean accesibles, sin la intervención del titular de los datos, a un número indeterminado de personas físicas.

    Artículo 45. Mecanismos de autorregulación vinculantes

    El responsable o encargado del tratamiento podrá adherirse, de manera voluntaria, a mecanismos de autorregulación vinculante, que tengan por objeto contribuir a la correcta aplicación de la presente ley, teniendo en cuenta las características específicas del tratamiento de datos que se realice, así como el efectivo ejercicio y respeto de los derechos del titular de los datos.

    Los mecanismos de autorregulación vinculantes se pueden traducir en códigos de conducta, de buenas prácticas, normas corporativas vinculantes, sellos de confianza, certificaciones u otros mecanismos que coadyuven a contribuir a los objetivos señalados. Dichos códigos pueden dotarse de mecanismos de resolución extrajudicial de conflictos. Las asociaciones u otras entidades representativas de categorías de responsables o encargados del tratamiento podrán adoptar mecanismos de autorregulación vinculantes que resulten obligatorios para todos sus miembros.

    Los mecanismos de autorregulación vinculantes serán presentados a la homologación de la autoridad de control, la cual dictaminará si los mecanismos se adecuan a las disposiciones de la presente ley y, en su caso, los aprobará o indicará las correcciones que estime necesarias para su aprobación.

    Los mecanismos de autorregulación vinculantes que resulten aprobados serán registrados y dados a publicidad por la autoridad de control.

    Artículo 46. Seguridad del tratamiento

    Teniendo en cuenta el estado de la técnica, los costes de aplicación, y la naturaleza, el alcance, el contexto y los fines del tratamiento, así como riesgos de probabilidad y gravedad variables para los derechos y libertades de las personas físicas, el responsable y el encargado del tratamiento aplicarán medidas técnicas y organizativas apropiadas para garantizar un nivel de seguridad adecuado al riesgo, que en su caso incluya, entre otros:

    1. la seudonimización y el cifrado de datos personales;

    2. la capacidad de garantizar la confidencialidad, integridad, disponibilidad y resiliencia permanentes de los sistemas y servicios de tratamiento;

    3. la capacidad de restaurar la disponibilidad y el acceso a los datos personales de forma rápida en caso de incidente físico o técnico;

    4. un proceso de verificación, evaluación y valoración regulares de la eficacia de las medidas técnicas y organizativas para garantizar la seguridad del tratamiento.

    Al evaluar la adecuación del nivel de seguridad se tendrán particularmente en cuenta los riesgos que presente el tratamiento de datos, en particular como consecuencia de la destrucción, pérdida o alteración

    accidental o ilícita de datos personales transmitidos, conservados o tratados de otra forma, o la comunicación o acceso no autorizados a dichos datos.

    La adhesión a un código de conducta o a un mecanismo de certificación aprobado por la autoridad de control podrá servir de elemento para demostrar el cumplimiento de los requisitos establecidos en el presente artículo.

    El responsable y el encargado del tratamiento tomarán medidas para garantizar que cualquier persona que actúe bajo la autoridad del responsable o del encargado y tenga acceso a datos personales sólo pueda tratar dichos datos siguiendo instrucciones del responsable, salvo que esté obligada a ello en virtud de la legislación nacional.

    Artículo 47. Notificación de una violación de la seguridad de los datos personales a la autoridad de control

    En caso de violación de la seguridad de los datos personales, el responsable del tratamiento la notificará a la autoridad de control sin dilación indebida y, de ser posible, a más tardar (72) setenta y dos horas después de que haya tenido constancia de ella. Si la notificación a la autoridad de control no tiene lugar en el plazo de (72) setenta y dos horas, deberá ir acompañada de indicación de los motivos de la dilación.

    El encargado del tratamiento notificará sin dilación indebida al responsable del tratamiento las violaciones de la seguridad de los datos personales de las que tenga conocimiento.

    La notificación deberá, como mínimo:

    1. Describir la naturaleza de la violación de la seguridad de los datos personales, las categorías y el número aproximado de titulares de datos afectados, y las categorías y el número aproximado de registros de datos personales afectados;

    2. Comunicar el nombre y los datos de contacto del delegado de protección de datos o de otro punto de contacto en el que pueda obtenerse más información;

    3. Describir las posibles consecuencias de la violación de la seguridad de los datos personales;

    4. Describir las medidas adoptadas y a adoptar por el responsable del tratamiento para poner remedio a la violación de la seguridad de los datos personales, incluyendo, si procede, las medidas adoptadas para mitigar los posibles efectos negativos.

    Si no fuera posible facilitar la información simultáneamente, y en la medida en que no lo sea, la información se facilitará de manera gradual sin dilación indebida.

    El responsable del tratamiento documentará cualquier violación de la seguridad de los datos personales, incluidos los hechos relacionados con ella, sus efectos y las medidas correctivas adoptadas. Dicha documentación permitirá a la autoridad de control verificar el cumplimiento de lo dispuesto en el presente artículo.

    Artículo 48. Comunicación de una violación de la seguridad de los datos personales al Titular

    Cuando sea probable que la violación de la seguridad de los datos personales entrañe un alto riesgo para los derechos y libertades de las personas físicas determinada por la autoridad, el responsable del tratamiento la comunicará al Titular sin dilación indebida.

    La comunicación al Titular contemplada en el presente artículo describirá en un lenguaje claro y sencillo la naturaleza de la violación de la seguridad de los datos personales y contendrá como mínimo la información y las medidas a que se refiere el artículo 47, numeral 2, 3 y 4.

    La comunicación al Titular a que se refiere el presente artículo no será necesaria si se cumple alguna de las condiciones siguientes:

    1. el responsable del tratamiento ha adoptado medidas de protección técnicas y organizativas apropiadas y estas medidas se han aplicado a los datos personales afectados por la violación de la seguridad de los datos personales, en particular aquellas que hagan ininteligibles los datos personales para cualquier persona que no esté autorizada a acceder a ellos, como el cifrado;

    2. el responsable del tratamiento ha tomado medidas ulteriores que garanticen que ya no exista la probabilidad de que se concretice el alto riesgo para los derechos y libertades del titular del dato a que se refiere el presente artículo;

    3. suponga un esfuerzo desproporcionado. En este caso, se optará en su lugar por una comunicación pública o una medida semejante por la que se informe de manera igualmente efectiva a los Titulares.

    Cuando el responsable todavía no haya comunicado al Titular la violación de la seguridad de los datos personales, la autoridad de control, una vez considerada la probabilidad de que tal violación entrañe un alto riesgo, podrá exigirle que lo haga o podrá que dicha comunicación no es necesaria si cumple alguna de las condiciones mencionadas en el tercer párrafo de este artículo.

    Artículo 49. Evaluación De Impacto

    Cuando el responsable del tratamiento prevea realizar algún tipo de tratamiento de datos que, por su naturaleza, alcance, contexto o finalidades, sea probable que entrañe un alto riesgo de afectación a los derechos de los titulares de los datos amparados en la presente Ley, deberá realizar, de manera previa a la implementación del tratamiento, una evaluación del impacto relativa a la protección de los datos personales. La evaluación de impacto relativa a la protección de los datos es obligatoria en los siguientes casos, sin perjuicio de otros que establezca la autoridad de control:

    a- Evaluación sistemática y exhaustiva de aspectos personales de personas físicas que se base en un tratamiento de datos automatizado, como la elaboración de perfiles, y sobre cuya base se tomen decisiones que produzcan efectos jurídicos para las personas físicas o que les afecten significativamente de modo similar;

    b- Tratamiento de datos sensibles a gran escala, o de datos relativos a condenas e infracciones penales o administrativas

    c- Observación sistemática a gran escala de una zona de acceso público.

    La autoridad de control establecerá y publicará una lista de los tipos de operaciones de tratamiento que requieran una evaluación de impacto relativa a la protección de datos.

    La evaluación debe incluir, como mínimo:

    1. Una descripción sistemática de las operaciones de tratamiento de datos previstas y de los fines del tratamiento, inclusive, cuando proceda, el interés legítimo perseguido por el responsable del tratamiento;

    2. Una evaluación de la necesidad y la proporcionalidad de las operaciones de tratamiento de datos con respecto a su finalidad;

    3. Una evaluación de los riesgos para la protección de los datos personales de los titulares de los datos a que se refiere el inciso 1.

    4. Las medidas previstas para afrontar los riesgos, incluidas garantías, medidas de seguridad y mecanismos que garanticen la protección de los datos personales, y para demostrar la conformidad con la presente Ley, teniendo en cuenta los derechos e intereses legítimos de los titulares de los datos y de otras personas que pudieran verse potencialmente afectadas.

    Artículo 50. Consulta Previa

    El responsable consultará a la autoridad de control antes de proceder al tratamiento cuando una evaluación de impacto relativa a la protección de los datos en virtud del artículo 49 muestre que el tratamiento entrañaría un alto riesgo si el responsable no toma medidas para para mitigarlo.

    Cuando consulte a la autoridad de control, el responsable del tratamiento le facilitará la información siguiente:

    1. Las responsabilidades respectivas del responsable del tratamiento y los encargados del tratamiento, en particular en caso de tratamiento de datos dentro de un mismo grupo económico;

    2. Los fines y medios del tratamiento previsto;

    3. Las medidas y garantías establecidas para proteger los datos personales de sus titulares de conformidad con la presente Ley;

    4. En su caso, los datos de contacto del delegado de protección de datos;

    5. La evaluación de impacto relativa a la protección de datos.

    6. Cualquier otra información que solicite la autoridad de control.

    Cuando la autoridad de control considere que el tratamiento previsto podría infringir la presente Ley, en particular cuando el responsable no haya identificado o mitigado suficientemente el riesgo, la autoridad de control deberá, en un plazo de 60 (sesenta) días corridos desde la consulta, asesorar por escrito al responsable, y en su caso al encargado, de conformidad con las funciones establecidas en el artículo 65 de la presente ley. Dicho plazo podrá prorrogarse por (45) cuarenta y cinco días corridos, en función de la complejidad del tratamiento previsto. La autoridad de control informará al responsable y, en su caso, al encargado de tal prórroga en el plazo de 30 (treinta) días corridos a partir de la recepción de la solicitud de consulta, indicando los motivos de la dilación. Estos plazos podrán suspenderse hasta que la autoridad de control haya obtenido la información solicitada a los fines de la consulta.

    Artículo 51. Posición del Delegado de protección de datos.

    El responsable y el encargado del tratamiento garantizarán que el delegado de protección de datos participe de forma adecuada y en tiempo oportuno en todas las cuestiones relativas a la protección de datos personales.

    El responsable y el encargado del tratamiento respaldarán al delegado de protección de datos en el desempeño de las funciones mencionadas en el artículo 53, facilitando los recursos necesarios para el desempeño de dichas funciones y el acceso a los datos personales y a las operaciones de tratamiento, y para el mantenimiento de sus conocimientos especializados.

    El responsable y el encargado del tratamiento garantizarán que el delegado de protección de datos no reciba ninguna instrucción en lo que respecta al desempeño de dichas funciones. No será destituido ni sancionado por el responsable o el encargado por desempeñar sus funciones. El delegado de protección de datos rendirá cuentas directamente al más alto nivel jerárquico del responsable o encargado.

    Los titulares de datos podrán ponerse en contacto con el delegado de protección de datos por lo que respecta a todas las cuestiones relativas al tratamiento de sus datos personales y al ejercicio de sus derechos al amparo de la presente Ley.

    El delegado de protección de datos estará obligado a mantener el secreto o la confidencialidad en lo que respecta al desempeño de sus funciones, de conformidad con la legislación nacional.

    El delegado de protección de datos podrá desempeñar otras funciones y cometidos. El responsable o encargado del tratamiento garantizará que dichas funciones y cometidos no den lugar a conflicto de intereses.

    Artículo 52. Delegado de Protección de Datos

    Los responsables y encargados del tratamiento deben designar un Delegado de Protección de Datos en cualquiera de los siguientes supuestos:

    1. Cuando revistan el carácter de autoridades u organismos públicos; excepto los tribunales que actúen en ejercicio de su función judicial;

    2. Se realice tratamiento a gran escala de datos sensibles o de datos personales relativos a condenas e infracciones penales como parte de la actividad principal del responsable o encargado del tratamiento;

    3. las actividades principales del responsable o del encargado consistan en operaciones de tratamiento que, en razón de su naturaleza, alcance y/o fines, requieran una observación habitual y sistemática de los titulares de datos a gran escala.

    Cuando los responsables y encargados del tratamiento no se encuentren obligados a la designación de un Delegado de Protección de Datos de acuerdo a lo previsto en este artículo, pero decidan designarlo de manera voluntaria o por orden expresa de la autoridad de control, el Delegado de Protección de Datos designado tendrá las funciones previstas en el artículo 53.

    Cuando se trate de una autoridad u organismo público con dependencias subordinadas, se puede designar un único Delegado de Protección de Datos, teniendo en consideración su tamaño y estructura organizativa.

    Un grupo económico puede nombrar un único Delegado de Protección de Datos siempre que esté en contacto permanente con cada establecimiento.

    El delegado de protección de datos será designado atendiendo a sus cualidades profesionales y, en particular, a sus conocimientos especializados del Derecho y la práctica en materia de protección de datos y a su capacidad para desempeñar las funciones indicadas en el artículo 53.

    El delegado de protección de datos podrá formar parte de la plantilla del responsable o del encargado del tratamiento o desempeñar sus funciones en el marco de un contrato de servicios.

    El responsable o el encargado del tratamiento publicarán los datos de contacto del delegado de protección de datos y los comunicarán a la autoridad de control.

    Artículo 53. Funciones del Delegado de Protección de Datos

    El Delegado de Protección de Datos tiene las siguientes funciones, sin perjuicio de otras que se le asignen especialmente:

    1. Actuar como interlocutor del responsable o encargado del tratamiento ante la autoridad de control.

    2. Informar y asesorar a los responsables y encargados del tratamiento, así como a sus empleados, de las obligaciones que tienen, derivadas de la normativa de protección de datos;

    3. Promover y participar en el diseño y aplicación de una política de protección de datos que contemple los tratamientos de datos que realice el responsable o encargado del tratamiento;

    4. Supervisar el cumplimiento de la presente Ley y de la política de protección de datos de un organismo público, empresa o entidad privada;

    5. Asignar responsabilidades, concientizar y formar al personal, y realizar las auditorías correspondientes;

    6. Brindar el asesoramiento que se le solicite para hacer una evaluación de impacto relativa a la protección de datos, cuando entrañe un alto riesgo de afectación para los derechos de los titulares de los datos, y supervisar luego su aplicación;

    7. Cooperar y actuar como referente ante la autoridad de control para cualquier consulta sobre el tratamiento de datos efectuado por el responsable o encargado del tratamiento.

    8. Aceptar reclamaciones y comunicaciones de los titulares, dar aclaraciones y adoptar providencias;

    9. Ejecutar las demás atribuciones determinadas por el responsable o encargado o establecidas en normas complementarias.

    El delegado de protección de datos desempeñará sus funciones prestando la debida atención a los riesgos asociados a las operaciones de tratamiento, teniendo en cuenta la naturaleza, el alcance, el contexto y fines del tratamiento.

    CAPÍTULO II. ENCARGADO DEL TRATAMIENTO

    Artículo 54. Funciones del Encargado del Tratamiento

    El encargado de tratamiento de los datos personales es la persona física o jurídica, autoridad pública u otro organismo que trate datos personales por cuenta del responsable del tratamiento.

    El encargado del tratamiento se encuentra limitado a llevar a cabo sólo aquellos tratamientos de datos encomendados por el responsable del tratamiento. Los datos personales objeto de tratamiento no pueden aplicarse o utilizarse con un fin distinto al que figure en el contrato ni ser cedidos a otras personas, ni aún para su conservación, salvo autorización expresa del responsable del tratamiento.

    El tratamiento por el encargado se regirá por un contrato u otro acto jurídico con arreglo a la legislación nacional, que vincule al encargado respecto del responsable y establezca el objeto, la duración, la naturaleza y la finalidad del tratamiento, el tipo de datos personales y categorías de titulares de datos, y las obligaciones y derechos del responsable. Dicho contrato o acto jurídico estipulará, en particular, que el encargado:

    1. tratará los datos personales únicamente siguiendo instrucciones documentadas del responsable, inclusive con respecto a las transferencias de datos personales a un tercer país o una organización internacional, salvo que esté obligado a ello en virtud de la ley que se aplique al encargado; en tal caso, el encargado informará al responsable de esa exigencia legal previa al tratamiento, salvo que tal Derecho lo prohíba por razones importantes de interés público;

    2. garantizará que las personas autorizadas para tratar datos personales se hayan comprometido a respetar la confidencialidad o estén sujetas a una obligación de confidencialidad de naturaleza estatutaria;

    3. tomará todas las medidas necesarias de conformidad con el artículo 46 de seguridad de tratamiento;

    4. respetará las condiciones indicadas en el presente artículo para recurrir a otro encargado del tratamiento;

    5. asistirá al responsable, teniendo cuenta la naturaleza del tratamiento, a través de medidas técnicas y organizativas apropiadas, siempre que sea posible, para que este pueda cumplir con su obligación de responder a las solicitudes que tengan por objeto el ejercicio de los derechos de los titulares establecidos en el Título V;

    6. ayudará al responsable a garantizar el cumplimiento de las obligaciones establecidas en el 46 de seguridad del tratamiento, teniendo en cuenta la naturaleza del tratamiento y la información a disposición del encargado;

    7. a elección del responsable, suprimirá o devolverá todos los datos personales una vez finalice la prestación de los servicios de tratamiento, y suprimirá las copias existentes a menos que se requiera la conservación de los datos personales en virtud de la ley;

    8. pondrá a disposición del responsable toda la información necesaria para demostrar el cumplimiento de las obligaciones establecidas en el presente artículo, así como para permitir y contribuir a la realización de auditorías, incluidas inspecciones, por parte del responsable o de otro auditor autorizado por dicho responsable. El encargado informará inmediatamente al responsable si, en su opinión, una instrucción infringe la presente Ley.

    Artículo 55. Sub Encargado de Tratamiento

    El encargado puede suscribir un contrato para subcontratar servicios que impliquen el tratamiento de datos solamente cuando exista una autorización expresa del responsable del tratamiento. En estos casos el subcontratado asume el carácter de encargado en los términos y condiciones previstos en esta Ley. Para el supuesto en que el subcontratado incumpla sus obligaciones y responsabilidades respecto al tratamiento de datos que lleve a cabo conforme a lo estipulado en el contrato, asumirá la calidad de responsable del tratamiento en los términos y condiciones previstos en la presente Ley. Los contratos previstos en este artículo deben estipular el objeto, alcance, contenido, duración, naturaleza y finalidad del tratamiento de datos, el tipo de datos personales, las categorías de titulares de los datos y las obligaciones y responsabilidades del responsable y encargado del tratamiento.

    Una vez cumplida la prestación contractual, los datos personales tratados deben ser destruidos, salvo que medie autorización expresa del responsable del tratamiento cuando razonablemente se pueda presumir la posibilidad de ulteriores encargos.

    Artículo 56. Representantes de responsables o encargados del tratamiento no establecidos en Paraguay

    Cuando sea de aplicación el artículo 2, inciso b) el responsable o el encargado del tratamiento designará por escrito un representante en la República del Paraguay.

    La obligación del presente artículo no será aplicable cuando:

    1. el tratamiento sea ocasional, que no incluyan el manejo a gran escala de datos sensibles o de datos personales relativos a condenas e infracciones penales y que sea improbable que entrañe un riesgo para los derechos y libertades de las personas físicas, teniendo en cuenta la naturaleza, contexto, alcance y objetivos del tratamiento, o

    2. el tratamiento sea realizado por las autoridades o instituciones públicas del extranjero.

    El representante estará establecido en el territorio nacional cuando los titulares cuyos datos personales se traten en el contexto de una oferta de bienes o servicios, o cuyo comportamiento esté siendo controlado estén en Paraguay. El responsable o encargado comunicará a la autoridad de control los datos de contacto de su representante. Las notificaciones o intimaciones serán realizadas en el domicilio del representante.

    La designación de un representante por el responsable o el encargado del tratamiento se entenderá sin perjuicio de las acciones que pudieran emprenderse contra el propio responsable o encargado.

    TÍTULO VII. TRANSFERENCIA INTERNACIONAL DE DATOS PERSONALES

    Artículo 57. Reglas generales para las transferencias internacionales de datos personales

    La transferencia internacional de datos personales se podrá realizar en cualquiera de los siguientes supuestos:

    1. El país u organización internacional o supranacional destinatario de los datos personales hubiere sido reconocido con un nivel adecuado de protección de datos personales;

    2. El exportador ofrezca garantías apropiadas al tratamiento de los datos personales, en cumplimiento de las condiciones mínimas y suficientes establecidas en esta ley.

    En ausencia de una decisión de adecuación o de garantías apropiadas establecidos en el inciso 2), la transferencia se podrá realizar si se cumple una de las condiciones siguientes:

    a) La transferencia sea necesaria para la cooperación jurídica internacional entre órganos de inteligencia pública, investigación y enjuiciamiento, de conformidad con los instrumentos del derecho internacional, con las debidas salvaguardas adicionales;

    b)  La transferencia se encuentre prevista en esta ley u otras leyes, convenios o tratados internacionales en los que Paraguay sea parte siempre y cuando no sean contrarias a las disposiciones de esta ley;

    c) La transferencia sea necesaria, para la prevención o el diagnóstico médico, la prestación de asistencia sanitaria, tratamiento médico o la gestión de servicios sanitarios, siempre y cuando dichos fines sean acreditados;

    d) La transferencia sea necesaria para proteger la vida o la seguridad física del titular o de un tercero,

    e) El titular del dato haya dado su consentimiento expreso, con información previa sobre el carácter internacional de la operación, distinguiéndose claramente de otros fines.

    El receptor de los datos personales asume las mismas obligaciones que corresponden al responsable del tratamiento que transfirió los datos personales.

     Artículo 58. Carácter adecuado del país u organismo receptor

    El nivel de protección de datos del país extranjero o de la organización internacional o supranacional a que se refiere el inciso 1 del art. 57 de esta Ley, será evaluada por la autoridad de control, a pedido de parte interesada o de oficio, la cual tendrá en cuenta:

    a) las normas generales y sectoriales de la legislación vigente en el país de destino o en la organización internacional;

    b) la naturaleza de los datos;

    c)  observancia de los principios generales de protección de datos personales y derechos de los titulares previstos en esta Ley;

    d) la adopción de las medidas de seguridad previstas en los reglamentos;

    e) la existencia de garantías judiciales e institucionales para el respeto de los derechos de protección de datos personales; y

    f) otras circunstancias específicas relacionadas con la transferencia.

    Artículo 59. Transferencias mediante garantías adecuadas

    Las garantías adecuadas de conformidad al numeral 2 del artículo 57 podrán ser aportadas, sin que se requiera ninguna autorización expresa de la autoridad de control, por:

    a. un instrumento jurídicamente vinculante y exigible entre las autoridades o instituciones públicos;

    b. mecanismos de autorregulación vinculantes de conformidad con el artículo 45;

    c. cláusulas tipo de protección de datos adoptadas por la autoridad de control

    d. un código de conducta aprobado con arreglo al artículo 65, junto con compromisos vinculantes y exigibles del responsable o el encargado del tratamiento en el tercer país de aplicar garantías adecuadas, incluidas la relativas a los derechos de los titulares de datos, o

    e. un mecanismo de certificación aprobado por la autoridad de control, junto con compromisos vinculantes y exigibles del responsable o el encargado del tratamiento en el tercer país de aplicar garantías adecuadas, incluidas las relativas a los derechos de los titulares de datos.

    Siempre que exista autorización de la autoridad de control competente, las garantías adecuadas contempladas en el inciso 2 del artículo 57, podrán igualmente ser aportadas, en particular, mediante:

    1. cláusulas contractuales entre el responsable o el encargado y el responsable, encargado o destinatario de los datos personales en el tercer país u organización internacional o supranacional, o

    2. disposiciones que se incorporen en acuerdos administrativos entre las autoridades o instituciones públicas que incluyan derechos efectivos y exigibles para los titulares de datos.

    Artículo 60. Cambios de las garantías

    Los cambios en las garantías que se presenten como suficientes para cumplir con los principios generales de protección y los derechos del titular a que se refiere el inciso 2 del art. 57 de esta Ley debe ser comunicada a la autoridad de control.

    Artículo 61. Prueba del cumplimiento de las obligaciones en materia de transferencias internacionales

    A efectos de demostrar que la transferencia internacional se ha realizado conforme a lo que establece la presente Ley, la carga de la prueba recae, en todos los casos, en el responsable del tratamiento que transfiere.

    TÍTULO VIII. AUTORIDAD DE PROTECCIÓN DE DATOS

    CAPÍTULO I. AUTORIDAD DE CONTROL

    Artículo 62. Naturaleza de la Autoridad de control y supervisión

    La Agencia de Protección de Datos Personales es un ente de derecho público y es el organismo encargado del control y cumplimiento de las leyes en materia de protección de datos personales con plena autonomía e independencia en el ejercicio de sus funciones.

    Compete a la Agencia de Protección de Datos Personales el ejercicio de acciones ante las autoridades nacionales e internacionales y organismos privados o personas vinculadas a la protección de los datos.

    Le corresponde así también la asistencia técnica a cualquier institución que lo solicite para la protección de datos personales.

    La autoridad de control deberá contar con los recursos humanos y materiales necesarios para el cumplimiento de sus funciones.

    Artículo 63. Nombramiento de Autoridades en materia de protección de datos personales

    La Agencia de Datos Personales estará conformada por un Director o una Directora y un Subdirector o una Subdirectora, quienes deberán ser de nacionalidad paraguaya, de 30 (treinta) años cumplidos y deberán contar con antecedentes personales, profesionales y de conocimiento, en particular respecto al ámbito de protección de datos personales, que aseguren independencia de criterio, eficiencia, objetividad e imparcialidad en el desempeño de sus cargos.

    No podrá ser nombrado director o directora nacional ninguna persona que sea propietaria, accionista, miembro de la junta directiva, gerente, asesora, representante legal o empleada de una empresa dedicada a la recolección, el almacenamiento y/o procesamiento de datos personales. Dicha prohibición persistirá hasta por dos años después de haber cesado sus funciones o vínculo empresarial. Estará igualmente impedido quien sea cónyuge de una persona que esté en alguno de los supuestos mencionados anteriormente.

    Para su elección, el Poder Ejecutivo remitirá a la Cámara de Senadores una lista de (3) tres candidatos a Director o Directora y tres candidatos a Subdirector o Subdirectora, de entre los cuales la Cámara de Senadores elegirá a uno para cada cargo por mayoría absoluta.

    Artículo 64. Duración del mandato y remoción de las autoridades

    El Director o la Directora y el Subdirector o la Subdirectora durarán 5 (cinco) años en sus cargos, pudiendo ser designados nuevamente. Sólo cesarán por la expiración de su mandato y designación de sus sucesores, o por su remoción en los casos de mal desempeño de sus funciones o la comisión de delitos. Ambos ejercerán sus funciones con plena independencia y objetividad y no estarán sujetos a instrucción alguna en su desempeño.

    El directora o la directora y el subdirector o subdirectora podrán ser removidos, por faltas graves e irregularidades cometidas en el ejercicio de sus funciones, por las causas siguientes:

     a) El mal desempeño de sus funciones;

    b) El desempeño de un empleo, cargo o comisión distinto de lo previsto en esta Ley, excepto la docencia a tiempo parcial.

    c) Utilizar en beneficio propio o de terceros la información confidencial de que disponga en razón de su cargo,

    d) incapacidad sobrevenida para el ejercicio de su función,

    e) condena firme por delito doloso.

    En caso de incurrir en las conductas descritas en el párrafo anterior, se aplicarán análogamente las mismas sanciones establecidas en la Ley No 1626/00 “DE LA FUNCIÓN PÚBLICA”.

    Artículo 65. Facultades de la Autoridad de Control

    La Agencia de Protección de Datos Personales cuenta con suficientes poderes de investigación, supervisión, resolución, promoción, sanción y otros que resulten necesarios para garantizar el efectivo cumplimiento de la presente ley, así como el ejercicio y respeto efectivo del derecho a la protección de datos personales.

    La autoridad de control tendrá las siguientes funciones y atribuciones:

    a. Asistir y asesorar a las personas que lo requieran acerca de los alcances de la presente Ley y de los medios legales de que disponen para la defensa de sus derechos;

    b. Dictar las normas y criterios orientadores que se deben observar en el desarrollo de las actividades comprendidas por esta Ley; específicamente, dictar normas administrativas y de procedimiento relativas a las funciones a su cargo, y las normas y procedimientos técnicos relativos al tratamiento de datos y condiciones de seguridad de las bases de datos;

    c. Atender los requerimientos y denuncias interpuestos en relación al tratamiento de datos en los términos de la presente Ley;

    d. Controlar el cumplimiento de los requisitos y garantías que deben reunir los tratamientos de datos de conformidad con la presente Ley y las normas que dicte la autoridad de control;

    e. Solicitar información a las instituciones públicas y privadas, las que deberán proporcionar los antecedentes, documentos, programas u otros elementos relativos al tratamiento de datos que se le requieran; en estos casos, la autoridad deberá garantizar la seguridad y confidencialidad de la información y elementos suministrados;

    f. Imponer las sanciones administrativas que, en su caso, correspondan por violación a las normas de la presente Ley y de las reglamentaciones que se dicten en su consecuencia;

    g. Constituirse en querellante en las acciones penales que se promovieran por violaciones a la presente Ley;

    h. Homologar los mecanismos de autorregulación vinculantes y supervisar su cumplimiento con lo dispuesto en el artículo 45;

    I.  Elaborar y mantener una lista relativa al requisito de la evaluación de impacto relativa a la protección de datos, en virtud del artículo 49,

    j.  Solicitar información a los Delegados de Protección de Datos, en los términos de lo previsto en la presente Ley.

    k. Promover acciones de cooperación con autoridades de protección de datos personales de otros países, de carácter internacional o transnacional, pudiendo suscribir acuerdos internacionales administrativos y no normativos en la materia;

    l. Preparar informes anuales de gestión sobre sus actividades;

    m. Asesorar en forma necesaria al Poder Ejecutivo en la consideración de los proyectos de ley que refieran total o parcialmente a la protección de datos personales.

    n. Colaborar con el Ministerio de Tecnologías de la Información y Comunicación en las políticas públicas, investigación y en la gestión de seguridad de la información y ciberseguridad sobre las infraestructuras de bases de datos que contengan datos personales para la adecuada protección de los mismos.

    Artículo 66:  De las funciones del Director o de la Directora

    Le corresponde al Director o la Directora:

    1. Representar a la Agencia de Protección de Datos en todos los actos en que ella intervenga,

    2. Dirigir las actividades de la institución de conformidad a lo establecido en esta Ley y su reglamentación.

    3. Controlar y hacer aplicar la presente ley.

    4. Promover la concienciación del público en general y su comprensión de los riesgos, normas, garantías y derechos en relación con el tratamiento de sus datos personales; y asesorar al Gobierno y a otras instituciones y organismos sobre las medidas legislativas y administrativas relativas a la protección de los derechos y libertades de las personas físicas con respecto al tratamiento.

    5. Brindar información y tratar las reclamaciones de cualquier titular en relación con el ejercicio de sus derechos en virtud de la presente ley.

    6. Desempeñar cualquier otra función relacionada con la protección de los datos personales.

    El Director o Directora se abstendrá de cualquier acción que sea incompatible con sus funciones y no participará, mientras dure su mandato, en ninguna actividad profesional que sea incompatible, remunerada o no.

    Artículo 67: De las funciones del Subdirector o de la Subdirectora

    Al Subdirector o la Subdirectora le corresponde sustituir al Director o Directora en caso de impedimento, ausencia temporal o vacancia definitiva, asumiendo de inmediato todas sus atribuciones, cooperar con la labor de conformidad a esta Ley; y supervisar el funcionamiento de las distintas dependencias de la Agencia de Protección de Datos Personales.

    Artículo 68. De los recursos de la Agencia de Protección de Datos Personales

    Los recursos financieros de la Agencia de Protección de Datos Personales estarán constituidos por:

    1. Los recursos que anualmente le sean destinados en el Presupuesto General de la Nación para el mantenimiento e incremento de sus funciones.

    2. Los ingresos provenientes de las multas aplicadas en ejercicio de sus potestades sancionadoras establecidas en esta Ley.

    3. Los fondos provenientes de convenios y/o acuerdos, créditos otorgados, préstamos, financiamientos, aportes, donaciones, legados, o de cualquier otro concepto, de origen nacional o internacional, siempre que no implique conflicto de interés.

    TÍTULO IX. RECLAMACIONES Y SANCIONES

    Artículo 69. Régimen de reclamaciones y de imposición de sanciones

    El titular de los datos o su representante legal puede iniciar una reclamación ante la autoridad de control para hacer efectivos sus derechos, así como recurrir a la tutela judicial para ser indemnizado cuando hubiere sufrido daños y perjuicios, como consecuencia de una violación de su derecho a la protección de datos personales conforme a las normas establecidas en la presente ley.

    Artículo 70. Procedimiento para la reclamación

    La reclamación será presentada por escrito o por medio electrónico, en la plataforma habilitada por la Autoridad de Control y deberá ser respondida por el medio elegido por el solicitante dentro del plazo de 15 (quince) días hábiles.

    La autoridad encargada podrá requerir las informaciones a instituciones públicas, privadas y a particulares, que deberán responder dentro del plazo de 15 (quince) días hábiles.

     La solicitud de informe o la realización de diligencias por parte de la Autoridad de Control citado interrumpe el plazo para resolver, que comenzará a correr nuevamente una vez contestado el informe o vencido el plazo para proveer la información.

    La solicitud deberá contener una explicación de los antecedentes y hechos que fundamentan el pedido, así como el ofrecimiento de la prueba documental y las demás pruebas necesarias. La Autoridad de Control reglamentará el procedimiento a seguirse.

    Artículo 71. Régimen de faltas y sanciones

    La Autoridad de Control se encuentra facultada a adoptar las medidas correctivas y sancionar las conductas de las personas físicas y jurídicas que contravengan lo dispuesto en la presente ley.

    Artículo 72. Prescripción de sanciones

    El plazo de prescripción de las sanciones comenzará a contarse desde el día siguiente a aquel en que sea ejecutable la resolución por la que se impone la sanción o haya transcurrido el plazo para recurrirla.

    La prescripción se interrumpirá por la iniciación, con conocimiento del interesado, del procedimiento de ejecución, volviendo a transcurrir el plazo si el mismo está paralizado durante más de seis meses por causa no imputable al infractor.

    Artículo 73. Faltas leves

    Se consideran faltas leves y prescribirán al año, las siguientes infracciones:

    1. Recolectar datos personales para su uso en base de datos sin que se le otorgue suficiente y amplia información a la persona interesada, de conformidad con las especificaciones técnicas establecidas en el reglamento de aplicación de la presente ley.

    2. Recolectar, almacenar y transmitir datos personales de terceros por medio de mecanismos inseguros o que de alguna forma no garanticen la seguridad e inalterabilidad de los datos.

    3. No atender los derechos de acceso, rectificación, supresión, limitación del tratamiento o a la portabilidad de los datos en tratamientos en los que no se requiere la identificación del afectado, cuando éste, para el ejercicio de esos derechos, haya facilitado información adicional que permita su identificación.

    4. El incumplimiento por el encargado de las estipulaciones impuestas en el contrato o acto jurídico que regula el tratamiento o las instrucciones del responsable del tratamiento, salvo que esté legalmente obligado a ello conforme a otras leyes de la República del Paraguay y la presente ley o en los supuestos en que fuese necesario para evitar la infracción de la legislación en materia de protección de datos y se hubiese advertido de ello al responsable o al encargado del tratamiento.

    5. La notificación incompleta, tardía o defectuosa a la autoridad de control de la información relacionada con una violación de seguridad de los datos personales de conformidad con lo previsto en el artículo 47 de la presente ley.

    6. Negarse injustificadamente a dar acceso a un titular del dato sobre sus datos que consten en archivos y bases de datos, a fin de verificar su calidad, recolección, almacenamiento y uso conforme a esta ley.

    7. La contratación por el responsable del tratamiento de un encargado de tratamiento que no ofrezca las garantías suficientes para aplicar las medidas técnicas y organizativas apropiadas conforme a lo establecido en el artículo 54 de esta ley.

    8. No mantener disponibles políticas de protección de datos personales afines al tratamiento de datos personales;

    Artículo 74. Faltas graves

    Se consideran graves y prescribirán a los dos años, las siguientes infracciones:

    1. Transferir datos personales a otras personas o empresas en contravención de las reglas establecidas en la presente ley.

    2. Reiteración en la negativa injustificada de dar acceso a un titular sobre sus datos que consten en archivos y bases de datos, a fin de verificar su calidad, recolección, almacenamiento y uso conforme a esta ley.

    3. Negarse injustificadamente a eliminar o rectificar los datos de una persona que así lo haya solicitado por medio claro e inequívoco.

    4. El tratamiento de datos personales de un menor de edad sin recabar su consentimiento, cuando tenga capacidad para ello, o el del titular de su patria potestad o tutela.

    5. No acreditar la realización de esfuerzos razonables para verificar la validez del consentimiento prestado por un menor de edad o por el titular de su patria potestad o tutela sobre el mismo.

    6. El impedimento o la obstaculización o la no atención reiterada de los derechos de acceso, rectificación, supresión o a la portabilidad de los datos en tratamientos en los que no se requiere la identificación del afectado, cuando éste, para el ejercicio de esos derechos, haya facilitado información adicional que permita su identificación.

    7. La falta de adopción de aquellas medidas técnicas y organizativas que resulten apropiadas para aplicar de forma efectiva los principios de protección de datos desde el diseño, así como la no integración de las garantías necesarias en el tratamiento.

    8. La falta de adopción de las medidas técnicas y organizativas apropiadas para garantizar que, por defecto, sólo se tratarán los datos personales necesarios para cada uno de los fines específicos del tratamiento.

    9. La falta de adopción de aquellas medidas técnicas y organizativas que resulten apropiadas para garantizar un nivel de seguridad adecuado al riesgo del tratamiento.

    10. El quebrantamiento, como consecuencia de la falta de la debida diligencia, de las medidas técnicas y organizativas que se hubiesen implantado, conforme a lo establecido en esta ley.

    11. El incumplimiento de la obligación de designar un representante del responsable o encargado del tratamiento no establecido en la República del Paraguay, conforme a lo establecido en el artículo 56 de la presente ley.

    12. Encargar el tratamiento de datos a un tercero sin la previa formalización de un contrato u otro acto jurídico escrito, según lo requerido en el artículo 5 de esta ley.

    13. La contratación por un encargado del tratamiento de otros encargados sin contar con la autorización previa del responsable, o sin haberle informado sobre los cambios producidos en la subcontratación cuando fueran legalmente exigibles.

    14. El incumplimiento del deber del encargado del tratamiento de notificar al responsable del tratamiento las violaciones de seguridad de las que tuviera conocimiento.

    15. El incumplimiento del deber de notificación a la autoridad de control de una violación de seguridad de los datos personales de conformidad con lo establecido en el artículo 47 de la presente ley.

    16. El incumplimiento del deber de comunicación al Titular de una violación de la seguridad de los datos de conformidad con lo previsto en el artículo 48 de la presente ley, si el responsable del tratamiento hubiera sido requerido por la autoridad de protección de datos para llevar a cabo dicha notificación.

    17. El tratamiento de datos personales sin haber llevado a cabo la evaluación del impacto de las operaciones de tratamiento en la protección de datos personales en los supuestos en que la misma sea exigible.

    18. El tratamiento de datos personales sin haber consultado previamente a la autoridad de control en los casos en que la ley establezca la obligación de llevar a cabo esa consulta.

    19. El incumplimiento de la obligación de designar un delegado de protección de datos cuando sea exigible su nombramiento de acuerdo con el artículo 52 de esta ley.

    20. No posibilitar la efectiva participación del delegado de protección de datos en todas las cuestiones relativas a la protección de datos personales, no respaldarlo o interferir en el desempeño de sus funciones.

    21. La utilización de un sello o certificación nacional o internacional falso en materia de protección de datos o en caso de que las vigencias de los mismos hubieran expirado.

    22. Recolectar, almacenar y transmitir datos personales de terceros por medio de mecanismos inseguros o que de alguna forma no garanticen la seguridad e inalterabilidad de los datos.

    23. El incumplimiento de la obligación de notificación por parte de los responsables o encargados relativa a la rectificación o supresión de datos personales exigida por los artículos 38 y 40 de esta ley.

    24. El incumplimiento de los requisitos exigidos por la presente ley en relación a la validez del consentimiento.

    25. La omisión del deber de informar al titular acerca del tratamiento de sus datos personales conforme a lo dispuesto en los artículos 36 de esta ley.

    26. La exigencia del pago de un canon para el ejercicio de cualquiera de los derechos establecidos en el Título V, Capítulo I de los derechos de los titulares de datos.

    Artículo 75. Faltas muy graves

    Se consideran muy graves y prescribirán a los tres años, las siguientes infracciones:

    1. Recolectar, almacenar, transmitir o de cualquier otra forma emplear, por parte de personas físicas o jurídicas privadas, datos sensibles, sin contar con una de las bases legales establecidas en la legislación vigente.

    2. Obtener, de los titulares o de terceros, datos personales de una persona por medio de engaño, violencia o amenaza.

    3. Revelar información registrada en una base de datos personales cuyo secreto esté obligado a guardar conforme a la ley.

    4. Proporcionar a un tercero información falsa o distinta contenida en un archivo de datos, con conocimiento de ello.

    5. Transferir, a las bases de datos de terceros países, información de carácter personal de los habitantes paraguayos o de los extranjeros radicados en el país, sin el consentimiento de sus titulares cuando el mismo sea requerido.

    6. La utilización de los datos para una finalidad que no sea compatible con la finalidad para la cual fueron recogidos, sin contar con el consentimiento del afectado o con una base legal para ello.

    7. El tratamiento de datos personales relativos a condenas e infracciones penales o medidas de seguridad conexas fuera de los supuestos permitidos en el artículo 29.

    8. La vulneración del principio de confidencialidad establecido en el artículo 15 de esta ley.

    9. La transferencia internacional de datos personales a un destinatario que se encuentre en un tercer país o a una organización internacional, cuando no concurran las garantías, requisitos y excepciones establecidos en los artículos 57 y 59 de esta ley.

    10.          No facilitar el acceso de la autoridad de control a los datos personales, información, locales, equipos y medios de tratamiento que sean requeridos por esta autoridad para el ejercicio de sus poderes de investigación.

    11. La resistencia u obstrucción del ejercicio de la función inspectora por la autoridad de control competente.

    12. La reversión deliberada de un procedimiento de anonimización o seudonimización a fin de permitir la re-identificación de los titulares.

    13. Recolectar, almacenar, transmitir o de cualquier otra forma emplear datos personales sin contar con una de las bases legales establecidas en esta ley.

    En el numeral 8, el titular del dato que se vea vulnerado por el principio de confidencialidad podrá además accionar en base al artículo 147 de la Ley 1160/97 “Código Penal”.

    Artículo 76. Incumplimiento por parte de instituciones públicas

    Las sanciones pecuniarias indicadas en este capítulo sólo se aplican a las personas de naturaleza privada. En caso de que la autoridad de control advierta un presunto incumplimiento de las disposiciones de la presente ley por parte de instituciones públicas, actuará de conformidad con el artículo 31.

    Artículo 77. Sanciones administrativas

    Si se ha incurrido en alguna de las faltas tipificadas en esta ley, se deberá imponer alguna de las siguientes sanciones administrativas, sin perjuicio de las sanciones penales correspondientes:

    1. Apercibimiento como primera instancia;

    2. Multas:

    a. Para las faltas leves, hasta 500 (quinientos) jornales mínimos para actividades diversas no especificadas en la República del Paraguay.

    b. Para las faltas graves, hasta 10.000 (diez mil) jornales mínimos para actividades diversas no especificadas en la República del Paraguay.

    c. Para las faltas muy graves, hasta 35.000 (treinta y cinco mil) jornales mínimos para actividades diversas no especificadas en la República del Paraguay y la suspensión para el funcionamiento de la base de datos de 1 (uno) a 6 (seis) meses. En caso de reincidencia, podrá decretarse la clausura de la base de datos, sin perjuicio de la aplicación de una nueva multa.

    3. Suspensión de las actividades relacionadas con el tratamiento de datos hasta por un término de 6 (seis) meses; en el acto de suspensión se indicarán las medidas correctivas que deberán adoptarse;

    4. Cierre temporal de las operaciones relacionadas con el tratamiento de datos una vez transcurrido el término de suspensión sin que se hubieren adoptado las medidas correctivas ordenadas por la autoridad de control;

    5. Cierre inmediato y definitivo de la operación que involucre el tratamiento de datos sensibles.

    Artículo 78: Criterios para las sanciones administrativas

    Las sanciones se aplicarán luego de un procedimiento administrativo que permita la oportunidad de una amplia defensa, de manera gradual, aislada o acumulativa, según las peculiaridades del caso específico y considerando los siguientes parámetros y criterios:

    A. la gravedad y naturaleza de las infracciones y los derechos personales afectados;

    B. la buena fe del infractor;

    C. la ventaja obtenida o pretendida por el infractor;

    D. el tamaño de la persona jurídica y la situación económica del infractor;

    E. reincidencia;

    F. el grado de daño;

    G. la cooperación del infractor;

    H. la adopción reiterada y demostrada de mecanismos y procedimientos internos capaces de minimizar el daño, encaminados al tratamiento seguro y adecuado de los datos;

    I. la adopción de una política de buenas prácticas o código de conductas;

    J. la pronta adopción de medidas correctivas;

    K. la proporcionalidad entre la gravedad de la falta y la intensidad de la sanción.

    Artículo 79.- Pago de multas

    El monto de las multas deberá ser pagado dentro del plazo de treinta días, contados desde la notificación.

    Artículo 80.- Falta de pago de multas

    Si la multa no fuera pagada y hubiera resolución firme, la Autoridad de control, podrá demandar judicialmente al infractor por medio de juicio ejecutivo ante el Juzgado de Primera Instancia en lo Civil y Comercial de la capital, acompañando copia de la resolución que aplicó la sanción o de la sentencia ejecutoriada en su caso, la que tendrá por sí sola fuerza ejecutiva.

    En este juicio, el demandado no podrá oponer otras excepciones que la de prescripción, la falta de acción, y la de pago total.

    Artículo 81.- Intereses por falta de pago de multas

    El retardo en el pago de toda multa que aplique la Autoridad de Control, en conformidad a la Ley, devengará los intereses de mercado correspondiente al promedio de la tasa activa.

    Si la multa no fuere procedente y no obstante hubiese sido pagada, la Autoridad de Control, o el juzgado respectivo, según corresponda, deberá ordenar se devuelvan las sumas pagadas, con los intereses establecidos por Ley.

    Artículo 82.- Prescripción de la acción de cobro de multa

    La acción de cobro de una multa prescribe en el plazo de 5 (cinco) años, contados desde que se hizo exigible.

    TÍTULO X. RECURSOS

    Artículo 83.- Recurso de reconsideración

    Todo recurso de reconsideración contra una resolución o acto administrativo de carácter no reglamentario por parte de la Autoridad de Control, deberá agotarse en la instancia administrativa. Posterior a esto, estará sujeto al control jurisdiccional ante el Tribunal de Cuentas.

    Artículo 84.- Contenido y forma de presentación

    La reconsideración se formulará por escrito y contendrá en forma clara y precisa los hechos y el derecho en que se fundamenta. El plazo para su interposición será de cinco días hábiles, contados a partir de la notificación de la resolución.

    La Autoridad de Control dispondrá de cinco días hábiles para resolver el recurso de reconsideración, transcurridos los cuales, sin que medie resolución, se entenderá que rechaza el recurso. La interposición del recurso de reconsideración suspenderá el plazo para recurrir ante el Tribunal de Cuentas.

    Artículo 85.- Acción contencioso-administrativo

    La acción contencioso-administrativo deberá interponerse ante el Tribunal de Cuentas, dentro del plazo de 18 (dieciocho) días hábiles, contados desde la notificación del acto recurrido.

    El recurso de reconsideración y la acción contencioso-administrativo, tendrán efecto suspensivo para la aplicación de multas.

    XI. DISPOSICIONES FINALES

    Artículo 86. Disposiciones finales

    La presente Ley entrará en vigencia luego de transcurridos 12 (doce) meses de su publicación oficial.

    Artículo 87. Reglamentación

    El Poder Ejecutivo reglamentará la presente Ley en un plazo máximo de 90 (noventa) días desde su publicación oficial.

    Artículo 88. Comuníquese al Poder Ejecutivo

    11May/21

    Proyecto de Ley Orgánica de 7 de mayo de 2021

    Proyecto de Ley Orgánica de 7 de mayo de 2021. Reformatoria del Código Orgánico Integral Penal para prevenir y combatir la violencia sexual digital y fortalecer la lucha contra los delitos informáticos.

    Exposición de Motivos

    La violencia manifestada en las relaciones humanas como forma de control y poder con el fin de desvalorizar a otros y especialmente contra las mujeres, así como ser puerta para el abuso de niños, niñas y adolescentes, es una práctica que se encuentra naturalizada en las relaciones humanas y especialmente en las sociales, que no distingue edad, etnia, raza, condición económica, condición física, estado integral de salud, condición migratoria e identidad sexo-genérica.

    Es necesario reformar y actualizar la Ley Orgánica Integral para Prevenir y Erradicar la Violencia contra las Mujeres, así como el Código Orgánico Integral Penal para combatir las malas prácticas en el uso de las redes sociales que actualmente son herramientas que ampliaron las posibilidades de expresión y difusión de ideas y contenidos. Sin embargo, con ello también se acrecentó la vulnerabilidad y el peligro de todas y todos los usuarios, ya sea por la difusión de información confidencial o por la comisión de diversos delitos que afecta la integridad de estos.

    Con profunda preocupación asistimos a la proliferación de conductas delictivas que vulneran el derecho a la privacidad de las personas y las exponen a situaciones de completa indefensión. Tales conductas tienen un efecto devastador sobre las mismas al lesionar gravemente su intimidad y su privacidad. Todas estas conductas son violatorias del derecho a la privacidad de las personas.

    La era de la conectividad en la que nos encontramos y cuyo antecedente exponencial se ubica en la última década del siglo pasado, viene vertiginosamente permeando todos los espacios de la vida. En algunos casos aquel fenómeno ha permitido superar las limitaciones del tiempo-espacio, pero a la vez ha generado fisuras que ponen en riesgo o relativizan la protección de algunos derechos fundamentales.

    Los niveles de conectividad, la internet, las aplicaciones P2P, los teléfonos inteligentes, las redes sociales, diferentes aplicaciones; y, la virtualización en general ha provocado y en la mayoría de los casos han acentuado fenómenos anclados en la virtualización, entre ellos el sexting o el stalking.

    El ciberacoso se define como la intimidación o agresión intencional y continua, a través de medios tecnológicos, electrónicos o digitales, como teléfonos móviles o internet que produce un desbalance entre acosado y acosador. Existen tres sujetos involucrados en este acto: el agresor, el agredido y el observador.

    Por otro lado, uno de esos riesgos del sexting (mensajes de textos de índole sexual) es la ‘porno venganza’ y la ‘extorsión sexual’, graves problemas que se han presentado en muchos países como Estados Unidos, México, Chile, Argentina, España, y demás países en el que el uso del internet no tiene restricciones, y entre esos, nuestro país, en el que hemos sido testigos de incontables casos de personas que han sido exhibidas y dañadas en su honor.

    Insistimos en que las tecnologías de la Información y la Comunicación (TIC) nos han dado muchos beneficios y a la vez han abierto la oportunidad a ciertas personas en la sociedad para actuar fuera de la ley, al tratar de perjudicar a otros a través de lo que se conoce como acoso por medios tecnológicos, electrónicos o digitales, en el que se ataca a las víctimas de forma encubierta a través de las redes sociales o de las TIC con el fin de infligir maltratos y denigraciones.

    En Ecuador, según datos del INEC se estima que 15.934.522 personas, es decir el 92 % de la población mayor a 5 años cuenta con celulares y redes sociales, el 41,4 % de la población cuenta con un teléfono inteligente de los cuales los picos más altos en la utilización, se encuentra entre en las edades comprendidas entre los 16 y 44 años de edad; y, de las cuales 6 240 889 personas utilizan redes sociales desde su smartphone. En el año 2018 según meta- análisis 1 de cada 7 adolescentes menores de 18 años había compartido material sensible y 1 de cada 4 lo había recibido. Es importante señalar, como dato adicional que, según estudios preliminares, la plataforma WhatsApp es la preferidas por comunidades digitales para compartir contenidos eróticos o sexuales mediante prácticas de sexting o sexteo.

    Ante la problemática señalada, en Europa, Estados Unidos y Latinoamérica, ha crecido la necesidad de modificar las legislaciones actuales para incluir las normativas necesarias para evitar la difusión de vídeos, audios, fotografías reales o simulados a sabiendas que no existe consentimiento, sean estos impresos, mensajes de texto, correo electrónico, internet, redes sociales o cualquier otro medio, para evitar vulneraciones al derecho a la integridad y a la intimidad personal; y, también para reducir los ejercicios de coerción que el sujeto activo de la infracción, ejerce mediante chantaje sobre el sujeto pasivo.

    Los indicadores demuestran de manera alarmante que aproximadamente el 80 % de las mujeres que viven algún tipo de violencia decide no tomar ninguna acción ante las autoridades y cuando lo hacen, no continúan con la denuncia. Frente a esto, para proteger a la mujer, niñas, niños y adolescentes, personas con discapacidad y a toda la ciudadanía en general, de todo tipo de violencia en el entorno digital, es necesario manejar una legislación adecuada y mejorar la cooperación internacional, por lo que se plantea un marco regulatorio capaz de crear condiciones pertinentes para la adhesión no solo al Convenio de Budapest, sino a cualquier otro instrumento o convenio internacional en materia de combate a la violencia digital y a los delitos informáticos o ciberdelincuencia.

    Los derechos de la mujer pueden ser regulados de manera adecuada, sancionando las formas de violencia contra el género o la mujer, que están consagradas en la Convención Interamericana de Belem Do Para y la Constitución de la República.

    Con las nuevas tecnologías han surgido nuevos tipos de violencia y delitos en el entorno digital, que requieren ser regulados, sancionados y prevenidos de manera oportuna y efectiva, por lo que, es nuestro deber, legislar para la protección de las y los ecuatorianos en todo tipo de espacios, adecuar las normas existentes para poder evolucionar casi a la misma velocidad que lo hace la sociedad, la tecnología o la web.

    Lo virtual es real, es una dimensión parte de nuestra cotidianidad, que puede traer consecuencias irreparables en las víctimas de todo tipo de violencia en el entorno digital. Entre los daños ocasionados en las víctimas de violencia digital, que pueden ser varios, están: daño emocional, reputacional, físico y sexual, invasión de la privacidad, censura, suicidio y muerte. Actuar a tiempo ayuda a detectar y prevenir oportunamente la violencia sexual digital. Por ello, como Asamblea Nacional del Ecuador, hemos trabajado inclaudicablemente y de la mano de quienes lamentablemente han sido víctimas y se han armado de valor, para que todas y todos estemos seguros en la red.

    REPÚBLICA DEL ECUADOR

    ASAMBLEA NACIONAL

    EL PLENO

    CONSIDERANDO:

    Que el Artículo 1 de la Constitución de la República del Ecuador al establecer que el Ecuador es un Estado constitucional de derechos y justicia, social, democrático, soberano, independiente, unitario, intercultural, plurinacional y laico, enmarca al ordenamiento jurídico nacional dentro de los lineamientos de un Estado constitucional de derechos y justicia y, por consiguiente, es necesario realizar cambios normativos que respondan coherentemente al espíritu de la Constitución;

    Que en el número 8 del Artículo 11 de la Constitución de la República del Ecuador, se determina que el contenido de los derechos se desarrollará de manera progresiva a través de las normas, la jurisprudencia y las políticas públicas. El Estado generará y garantizará las condiciones necesarias para su pleno reconocimiento y ejercicio;

    Que en el número 3, letra a) del Artículo 66 de la Constitución de la República del Ecuador se reconoce el derecho a la integridad personal que incluye, la integridad física, psíquica, moral y sexual;

    Que en el número 3, letra b) del Artículo 66 de la Constitución de la República del Ecuador se reconoce el derecho a la integridad personal que incluye, una vida libre de violencia en el ámbito público y privado; además de establecer que el Estado adoptará las medidas necesarias para prevenir, eliminar y sancionar toda forma de violencia, en especial la ejercida contra las mujeres, niñas, niños y adolescentes, personas adultas mayores, personas con discapacidad y contra toda persona en situación de desventaja o vulnerabilidad; idénticas medidas se tomarán contra la violencia, la esclavitud y la explotación sexual;

    Que en el número 20 del Artículo 66 de la Constitución de la República del Ecuador se reconoce el derecho a la intimidad personal y familiar;

    Que la Constitución, de conformidad con el Artículo 75, reconoce a las personas el derecho al acceso gratuito a la justicia y a la tutela efectiva, imparcial y expedita de sus derechos e intereses, con sujeción a los principios de inmediación y celeridad, y que en ningún caso quedarán en indefensión;

    Que el número 3 del Artículo 76 de la Constitución de la República del Ecuador, respecto a la garantía de estricta legalidad penal, establece que nadie podrá ser juzgado ni sancionado por un acto u omisión que, al momento de cometerse, no esté tipificado en la Ley como infracción penal, administrativa o de otra naturaleza; ni se le aplicará una sanción no prevista por la Constitución o la Ley. Sólo se podrá juzgar a una persona ante un juez o autoridad competente y con observancia del trámite propio de cada procedimiento;

    Que de conformidad con el número 6 del Artículo 76 de la Constitución se debe establecer la debida proporcionalidad entre las infracciones y las sanciones penales, deben existir sanciones no privativas de la libertad, las que tienen que respetar los derechos de las personas y ser impuestas mediante procedimientos adversariales, transparentes y justos;

    Que el Artículo 78 de la Constitución prescribe que las víctimas de infracciones penales tendrán derecho a una protección especial, a no ser revictimizadas y a que se adopten mecanismos para una reparación integral que incluya el conocimiento de la verdad, restitución, indemnizaciones, rehabilitación, garantía de no repetición y satisfacción del derecho violado;

    Que el Artículo 82 de la Constitución de la República del Ecuador establece que el derecho a la seguridad jurídica se fundamenta en el respeto a la Constitución y en la existencia de normas jurídicas previas, claras, públicas y aplicadas por las autoridades competentes;

    Que el Artículo 84 de la Constitución de la República del Ecuador señala como garantía normativa que la Asamblea Nacional y todo órgano con potestad normativa tendrá la obligación de adecuar, formal y materialmente, las leyes y demás normas jurídicas a los derechos previstos en la Constitución y los tratados internacionales, y los que sean necesarios para garantizar la dignidad del ser humano o de las comunidades, pueblos y nacionalidades. En ningún caso, la reforma de la Constitución, las leyes, otras normas jurídicas ni los actos del poder público atentarán contra los derechos que reconoce la Constitución;

    Que el número 6 del Artículo 120 de la Constitución de la República del Ecuador establece como atribución y deber de la Asamblea Nacional, expedir, codificar, reformar y derogar las leyes, e interpretarlas con carácter generalmente obligatorio;

    Que el número 2 del Artículo 132 de la Constitución de la República establece que se requerirá de Ley en los siguientes casos: Tipificar infracciones y establecer las sanciones correspondientes;

    Que el número 1 del Artículo 134 de la Constitución de la República del Ecuador establece que la facultad de presentar proyectos de ley, le corresponde a las asambleístas y los asambleístas, con el apoyo de una bancada legislativa o de al menos el cinco por ciento de los miembros de la Asamblea Nacional;

    Que en el inciso primero del Artículo 424 de la Constitución, se establece que la Constitución es la Norma Suprema del Estado y prevalece sobre cualquier otra del ordenamiento jurídico y, por lo tanto, las normas y los actos del poder público deben mantener conformidad con las disposiciones constitucionales; y,

    Que el sistema penal en su componente sustantivo mantiene tipos obsoletos, pues no responde a las necesidades actuales de la población; en su componente adjetivo es ineficiente y no ha logrado afianzar procesos justos, rápidos, sencillos, ni tampoco ha coordinado adecuadamente las acciones entre todos sus actores; y, en su componente ejecutivo no ha cumplido con sus objetivos y se ha convertido en un sistema poco eficaz, lo que justifica una reforma urgente al sistema penal en su conjunto.

    En ejercicio de las atribuciones establecidas en el Artículo 120, número 6 de la Constitución de la República y en el Artículo 9, número 6 de la Ley Orgánica de la Función Legislativa, expide la siguiente:

    LEY ORGÁNICA REFORMATORIA DEL CÓDIGO ORGÁNICO INTEGRAL PENAL PARA PREVENIR Y COMBATIR LA VIOLENCIA SEXUAL DIGITAL Y FORTALECER LA LUCHA CONTRA LOS DELITOS INFORMÁTICOS

    Artículo 1

    Sustitúyase el primer párrafo del Artículo 103 por el siguiente:

    “Art. 103.- Pornografía con utilización de niñas, niños o adolescentes.- La persona que fotografíe, filme, grabe, produzca, posea, transmita o edite materiales visuales, audiovisuales, informáticos, electrónicos o de cualquier otro soporte físico o formato que contenga la representación visual de desnudos o semidesnudos reales o simulados de niñas, niños o adolescentes en actitud sexual, aunque el material tenga su origen en el extranjero o sea desconocido, será sancionada con pena privativa de libertad de trece a dieciséis años.”

    Artículo 2

     A continuación del Artículo 154.1, agréguense los siguientes artículos:

    “Art. 154.2. – Acoso laboral. – Quien, en el ámbito de una relación laboral, de manera reiterada, persistente y demostrable, realice actos atentatorios a la dignidad de la persona trabajadora, por medio de cualquiera de las tecnologías de la información y comunicación o cualquier otro medio, causando graves daños a la persona afectada, ocasionando perjuicio en su estabilidad laboral o provocando la renuncia a su puesto de trabajo, será sancionada con pena privativa de libertad de uno a tres años.

    Con la misma pena se sancionará a la persona empleadora que por acción u omisión permita el cometimiento de la infracción.

    Art. 154.3.- Acoso escolar y académico. –

    1. Acoso académico: Se entiende por acoso académico a toda conducta negativa, intencional, metódica y sistemática de agresión, intimidación, ridiculización, difamación, coacción, aislamiento deliberado, amenaza, incitación a la violencia, hostigamiento o cualquier forma de maltrato psicológico, verbal, físico que, de forma directa o indirecta, dentro o fuera del establecimiento educativo, se dé por parte de un docente, autoridad o con quienes la víctima o víctimas mantiene una relación de poder asimétrica que, en forma individual o colectiva, atenten en contra de una o varias personas, por medio de cualquiera de las tecnologías de la información y comunicación u otro medio, será sancionado con pena privativa de libertad de uno a tres años. Si la conducta se realiza en contra de niñas, niños y adolescentes, la pena será de 3 a 5 años.

    2. Acoso escolar entre pares: Cuando las mismas conductas descritas en el párrafo anterior se produzcan entre estudiantes niñas, niños y adolescentes, se aplicarán las medidas socioeducativas correspondientes y el tratamiento especializado reconocido en la ley de la materia, garantizando los derechos y protección especial de niñas, niños y adolescentes.

    Art. 154.4.- Hostigamiento. – La persona natural o jurídica que, por sí misma o por terceros, moleste, perturbe o angustie de forma insistente o reiterada a otra, será sancionada con una pena privativa de la libertad de seis meses a un año, cuando concurra algunas de las siguientes circunstancias:

    1. El sujeto activo de la infracción busque cercanía con la víctima.

    2. El sujeto activo establezca o intente establecer contacto con la víctima a través de cualquier medio tecnológico, electrónico o digital, o por medio de terceras personas.

    3. El sujeto activo oferte productos o servicios que no fueron solicitados por el sujeto pasivo.

    Cuando la víctima sea mujer, o menor de dieciocho años de edad, o persona con discapacidad o cuando la persona no pueda comprender el significado del hecho o por cualquier causa no pueda resistirlo, será sancionada con pena privativa de libertad de uno a tres años.

    En los casos que no se configure el delito de instigación al suicidio tipificado en el artículo 154.1, se sancionará las conductas tipificadas en este artículo, con el máximo de la pena establecida cuando producto de la afectación a la salud emocional de la víctima de este delito, se deriven o hayan derivado sobre sí misma conductas autolesivas, siempre que para la o el juzgador resulte demostrable que la afectación sufrida por la víctima fue determinante en el resultado dañoso autolesivo.

    Cuando este ilícito sea cometido por miembros del núcleo familiar o personas con las que se determine que el procesado o la procesada mantenga o haya mantenido vínculos familiares, íntimos, afectivos, conyugales, de noviazgo, de cohabitación, o de convivencia o aún sin ella, se aplicará los presupuestos y la pena establecida en los artículos relativos a la violencia contra la mujer y miembros del núcleo familiar.”

    Artículo 3

    Refórmese el Artículo 157 con el siguiente texto:

    “Art. 157.- Violencia psicológica contra la mujer o miembros del núcleo familiar. – Comete delito de violencia psicológica la persona que busca degradar o controlar acciones, comportamientos, pensamientos, creencias y decisiones, mediante amenaza, manipulación, chantaje, hostigamiento, humillación, o aislamiento, o cualquier otra conducta que cause afectación psicológica, contra la mujer o miembros del núcleo familiar, y será sancionada con pena privativa de libertad de seis meses a un año.

    Si la infracción recae en personas de uno de los grupos de atención prioritaria, en situación de doble vulnerabilidad o con enfermedades catastróficas o de alta complejidad o, si con ocasión de la violencia psicológica se produce en la víctima, enfermedad o trastorno mental, la sanción será pena privativa de libertad de uno a tres años.”

    Artículo 4

    A continuación del Artículo 158, agréguense los siguientes artículos:

    “Art. 158.1. Violencia económica y patrimonial. – Será sancionada con pena privativa de libertad de uno a tres años, toda acción u omisión que se dirija a ocasionar un menoscabo en los recursos económicos y patrimoniales de las mujeres, incluidos aquellos de la sociedad conyugal y de la sociedad de bienes de las uniones de hecho, a través de:

    1. La perturbación de la posesión, tenencia o propiedad de sus bienes muebles o inmuebles;

    2. La pérdida, sustracción, destrucción, retención o apropiación indebida de objetos, instrumentos de trabajo, documentos personales, bienes, valores y derechos patrimoniales;

    3. La limitación de los recursos económicos destinados a satisfacer sus necesidades o la privación de los medios indispensables para vivir una vida digna; así como la evasión del cumplimiento de sus obligaciones alimentarias;

    4. La limitación o control de sus ingresos; y,

    5. Percibir un salario menor por igual tarea, dentro de un mismo lugar de trabajo.

    Art. 158.2. Violencia simbólica. – Será sancionada con pena privativa de libertad de uno a tres años, toda conducta que, a través de la producción o reproducción de mensajes, valores, símbolos, iconos, signos e imposiciones de género, sociales, económicas, políticas, culturales y de creencias religiosas, transmiten, reproducen y consolidan relaciones de dominación, exclusión, desigualdad y discriminación, naturalizando la subordinación de las mujeres.

    Art. 158.3. Violencia política. – La persona o grupo de personas, que en contra de mujeres candidatas, militantes, electas, designadas o en funciones, defensoras de derechos humanos, feministas, lideresas políticas, sociales o comunitarias, o en contra de su familia, directa o indirectamente, menoscaben, anulen, obstaculicen, suspendan, impidan o restrinjan la participación política de la mujer, su accionar o el ejercicio de su cargo, o para inducirla u obligarla a que efectúe en contra de su voluntad, una acción o incurra en una omisión, en el cumplimiento de sus funciones, incluida la falta de acceso a bienes públicos u otros recursos para el adecuado cumplimiento de sus funciones, será sancionada con pena privativa de libertad de uno a tres años.

    Art. 158.4. Violencia mediática. – Aquella violencia cometida por una persona o grupo de personas a través de la publicación o difusión de información o contenido audiovisual o digital estereotipado, a través de cualquier medio de comunicación público, privado o comunitario que, de manera directa o indirecta, legitime la desigualdad de trato o construya patrones socioculturales reproductores o generadores de desigualdad, discriminación, cosificación, estigmatización o violencia contra las mujeres o en sus relaciones sociales, normalizando así, la subordinación de estas en la sociedad, será sancionada con pena privativa de libertad de uno a tres años.

    Art. 158.5. Violencia gineco-obstétrica. – Toda acción, omisión, o patrón de conducta del personal de la salud, que limite el derecho de las mujeres embarazadas o no, a recibir servicios de salud gineco-obstétricos, expresada a través del maltrato, la imposición de creencias, prácticas culturales y científicas no consentidas, o la violación del secreto profesional, o la medicalización, y las no establecidas en protocolos, guías o normas; las acciones que consideren los procesos naturales de embarazo, parto y posparto como patologías, la esterilización forzada, la pérdida de autonomía y capacidad para decidir libremente sobre sus cuerpos y su sexualidad, que impacten negativamente en la calidad de vida y salud sexual y reproductiva de las mujeres en toda su diversidad y a lo largo de su vida, cuando estas se realizan con prácticas invasivas, maltrato físico o psicológico, será sancionada con pena privativa de libertad de tres a cinco años.”

    Artículo 5

    Sustitúyase el Artículo 166 por el siguiente:

    “Art. 166.- Acoso sexual.- La persona que solicite algún acto de naturaleza sexual, para sí o para un tercero, prevaliéndose de situación de autoridad laboral, docente, religiosa o similar, sea tutora o tutor, curadora o curador, ministros de culto, profesional de la educación o de la salud, personal responsable en la atención y cuidado del paciente o que mantenga vínculo familiar o cualquier otra forma que implique subordinación de la víctima, con la amenaza de causar a la víctima o a un tercero, un mal relacionado con las legítimas expectativas que pueda tener en el ámbito de dicha relación, será sancionada con pena privativa de libertad de tres a cinco años.

    Se considerará ciberacoso sexual, cuando se utilice cualquiera de las tecnologías de la información y comunicación, medios tecnológicos, electrónicos o digitales, para establecer contacto con la víctima, con fines de naturaleza sexual, en beneficio propio o de terceros, que será sancionado con una pena privativa de libertad de cinco a siete años.

    Cuando la víctima sea mujer, o menor de dieciocho años de edad, o persona con discapacidad o cuando la persona no pueda comprender el significado del hecho o por cualquier causa no pueda resistirlo, será sancionada con pena privativa de libertad de siete a diez años.

    Cuando este ilícito sea cometido por miembros del núcleo familiar o personas con las que se determine que el procesado o la procesada mantenga o haya mantenido vínculos familiares, íntimos, afectivos, conyugales, de noviazgo, de cohabitación, o de convivencia o aun sin ella, se aplicará el máximo de pena establecida en este Artículo, según el caso que corresponda.

    También se sancionará con el máximo de la pena establecida en este Artículo según el caso que corresponda, cuando producto de la afectación a la salud emocional de la víctima de este delito, se deriven o hayan derivado sobre sí misma, conductas autolesivas, siempre que para la o el juzgador resulte demostrable que la afectación sufrida por la víctima fue determinante en el resultado dañoso autolesivo.

    En todo momento la o el juzgador debe garantizar que ninguna actuación o diligencia implique una revictimización a la persona agredida, para lo cual, deberá contemplar métodos alternativos que le permitan avanzar sin dilaciones con la investigación.

    Los hechos descritos en este Artículo serán perseguibles mediante denuncia de la persona agraviada o por cualquier otra persona o entidad que tenga conocimiento del presunto cometimiento de este ilícito. Una vez iniciada la investigación, la autoridad competente impulsará la causa de oficio hasta obtener una resolución judicial ejecutoriada en que se pronuncie sobre este ilícito.

    La persona que solicite favores de naturaleza sexual que atenten contra la integridad sexual de otra persona, y que no se encuentre previsto en el inciso primero de este Artículo, será sancionada con pena privativa de libertad de seis meses a dos años.

    Las sanciones aumentarán en un tercio en los siguientes casos:

    a. Si el sujeto activo causa un daño personal, laboral, educativo, profesional o patrimonial; o,

    b. Si el sujeto activo es servidor público y utiliza los medios propios del cargo, además de la destitución e inhabilitación para ocupar empleo o cargo público, por un período igual al de la pena privativa de libertad impuesta.”

    Artículo 6

    – Sustitúyese el Artículo 169 por el siguiente:

    “Art. 169.- Corrupción de niñas, niños y adolescentes. –

    1. La persona que permita el acceso o exposición de niñas, niños o adolescentes de forma intencionada a contenido nocivo sexualizado, violento, o generador de odio, será sancionada con pena privativa de libertad de uno a tres años.

    2. La persona que incite, conduzca o permita la entrada de niñas, niños o adolescentes a prostíbulos o lugares en los que se exhibe pornografía, será sancionada con pena privativa de libertad de tres a cinco años.”

    Artículo 7

    Al final del Artículo 170, inclúyase lo siguiente:

    “Se sancionará con el máximo de las penas establecidas en los incisos precedentes, cuando dicho abuso sexual fuese grabado o transmitido en vivo de manera intencional por la persona agresora, por cualquier medio digital, dispositivo electrónico o a través de cualquiera de las tecnologías de la información y comunicación.

    Asimismo, el máximo de las penas establecidas en los incisos precedentes, cuando además de la grabación o transmisión de este abuso sexual con cualquier medio digital, dispositivo electrónico o a través de cualquiera de las tecnologías de la información y comunicación, se agreda físicamente a la víctima, y dicha agresión también sea grabada o transmitida.”

    Artículo 8.

    A continuación del número 5 del Artículo 171, inclúyanse los siguientes números:

    “6. Cuando dicha violación es grabada o transmitida en vivo de manera intencional por la persona agresora, por cualquier medio digital, dispositivo electrónico o a través de cualquiera de las tecnologías de la información y comunicación.

    7. Cuando además de la grabación o transmisión de esta violación con cualquier medio digital, dispositivo electrónico o a través de cualquiera de las tecnologías de la información y comunicación, se agreda físicamente a la víctima, y dicha agresión también sea grabada o transmitida.”

    Artículo 9

    Luego del Artículo 172, agréguese el siguiente artículo:

    “Art. 172.1. – Extorsión sexual. – La persona que, mediante el uso de violencia, amenazas, manipulación o chantaje, induzca, incite u obligue a otra a exhibir su cuerpo desnudo, semidesnudo, o en actitudes sexuales, con el propósito de obtener un provecho personal o para un tercero, ya sea de carácter sexual o de cualquier otro tipo, será sancionada con pena privativa de libertad de cinco a siete años.

    La sanción será de siete a diez años si se verifican alguna de las siguientes circunstancias:

    1. Si la víctima es una persona menor a dieciocho años, mayor a sesenta y cinco años, mujer, o persona con discapacidad, o una persona que padezca enfermedades que comprometan su vida.

    2. Si se ejecuta con la intervención de una persona con quien la víctima mantenga relación laboral, comercio u otra similar o con una persona de confianza o pariente dentro del cuarto grado de consanguinidad y segundo de afinidad.

    3. Si el constreñimiento se ejecuta con amenaza de muerte, lesión, secuestro o acto del cual pueda derivarse calamidad, infortunio o peligro común.

    4. Si se comete total o parcialmente desde un lugar de privación de libertad.

    5. Si se comete total o parcialmente desde el extranjero.”

    Artículo 10

    Al final del número 2 del Artículo 175, agréguese lo siguiente:

    “Una vez emitidas las medidas cautelares, la o el Juez de Garantías Penales también podrá ordenar se dispongan las medidas de protección necesarias, a las Juntas Cantonales y Metropolitanas de Protección de Derechos o a las o los Jueces de Familia, Mujer, Niñez y Adolescencia, o multicompetentes, con el fin de que se realice un abordaje integral para la protección y restitución de derechos de mujeres; niñas, niños o adolescentes; o, personas con discapacidad.”

    Artículo 11

    Sustitúyase el Artículo 178, por el siguiente:

    “Art. 178.- Violación a la intimidad. – La persona que, sin contar con el consentimiento o la autorización legal, acceda, intercepte, examine, grabe, revele, difunda, publique o dé algún tratamiento indebido o no autorizado a contenido de terceros, datos y documentos personales, mensajes de datos, voz, audio y vídeo, fotos personales, objetos postales, información contenida en soportes informáticos, contenidos digitales o comunicaciones privadas o reservadas, por cualquier medio o por intermedio de cualquiera de las tecnologías de la información y comunicación, será sancionada con pena privativa de libertad de uno a tres años.

    Se sancionará con la misma pena del primer párrafo, cuando:

    a. El contenido divulgado sea extraído de cualquier dispositivo electrónico que no sea de propiedad de la o del infractor, ya sea que este lo haya robado, hurtado o encontrado; o, este haya sido previamente extraviado por su legítima o legítimo propietario, lo que será debidamente comprobado por la autoridad competente.

    b. El contenido divulgado sea extraído de alguna plataforma digital a la cual la o el infractor tenga acceso, ya sea a gratuita o pagada; y extraiga sin consentimiento contenido de terceros, de carácter personal o íntimo, que contenga la representación visual de desnudos, semidesnudos, o actitudes sexuales.

    Se considerará como violencia sexual digital, cuando se trate de contenido de terceros, de carácter personal o íntimo, que contenga la representación visual de desnudos, semidesnudos, o actitudes sexuales que la persona afectada le haya confiado de su intimidad, reales, simuladas o alteradas, que será sancionada con una pena privativa de libertad de cinco a siete años.

    Cuando dicho contenido haya sido obtenido de manera clandestina o sin que el sujeto se dé cuenta, se impondrá una pena privativa de libertad de siete a diez años.

    Cuando la víctima sea mujer, o persona con discapacidad o cuando la persona no pueda comprender el significado del hecho o por cualquier causa no pueda resistirlo, será sancionada con pena privativa de libertad de siete a diez años.

    Asimismo, será sancionado con la misma pena del párrafo anterior, quien comercialice por correo electrónico, chat, mensajería instantánea, redes sociales, blogs, foto blogs, juegos en red o cualquier otro medio electrónico o telemático a través de cualquiera de las tecnologías de la información y comunicación, fotos, vídeos, sin consentimiento de la persona que aparece en estos medios.

    Cuando se cometa contra niñas, niños o adolescentes, se estará acorde con lo establecido en los artículos 103 y 104 de este Código, según corresponda.

    Cuando este ilícito sea cometido por miembros del núcleo familiar o personas con las que se determine que el procesado o la procesada mantenga o haya mantenido vínculos familiares, íntimos, afectivos, conyugales, de noviazgo, de cohabitación, o de convivencia o aun sin ella, se aplicará el máximo de pena establecida en este Artículo, según el caso que corresponda.

    Cuando producto de la afectación a la salud emocional de la víctima de este delito, se deriven o hayan derivado sobre sí misma conductas autolesivas, siempre que para la o el juzgador resulte demostrable que la afectación sufrida por la víctima fue determinante en el resultado dañoso autolesivo, se sancionará a la o al infractor con el máximo de la pena establecida en este Artículo, según el caso que corresponda.

    Una vez iniciadas las investigaciones, la autoridad competente deberá mantener el contenido digital en reserva y bajo la debida custodia; y, únicamente podrá ser dado de baja en el momento procesal oportuno, a petición de parte y previa autorización judicial. Se precautelará que antes de eliminar o bajar dicho contenido, se deje el rastro o resguardo suficiente para que no se pierda la cadena de custodia de elementos que pueden ser sustanciales en la investigación.

    En todo momento la o el juzgador debe garantizar que ninguna actuación o diligencia implique una revictimización a la persona agredida, para lo cual, deberá contemplar métodos alternativos que le permitan avanzar con la investigación.

    Los hechos descritos en este Artículo serán perseguibles mediante denuncia de la persona agraviada o por cualquier otra persona o entidad que tenga conocimiento del presunto cometimiento de este ilícito. Una vez iniciada la investigación, la autoridad competente impulsará la causa de oficio hasta obtener una resolución judicial ejecutoriada en que se pronuncie sobre este ilícito.

    Todas o todos quienes participen o contribuyan en el cometimiento de este ilícito, serán sancionados con una pena privativa de libertad de tres meses a un año. Esta participación deberá ser debidamente comprobada y determinada como tal, por la o el juzgador.

    No son aplicables estas normas para la persona que divulgue información pública de acuerdo con lo previsto en la Ley o cuando se traten de grabaciones de audio y video del proceder de servidores públicos en el ejercicio de sus funciones.”

    Artículo 12

    A continuación del Artículo 178, agréguese el siguiente artículo:

    “Art. 178.1.- Disposiciones especiales del delito de violación a la intimidad. – Para el delito de violación a la intimidad, se observarán las siguientes disposiciones especiales:

    1. En este delito, la o el juzgador, adicional a la pena privativa de libertad puede imponer una o varias penas no privativas de libertad.

    2. En los casos en los que la o el presunto agresor sea ascendiente o descendiente o colateral hasta el cuarto grado de consanguinidad o segundo de afinidad, cónyuge, excónyuge, conviviente, ex conviviente, pareja o ex pareja en unión de hecho, tutora o tutor, representante legal, curadora o curador o cualquier persona a cargo del cuidado o custodia de la víctima, la o el Juez de Garantías Penales como medida cautelar suspenderá la patria potestad, tutoría, curatela y cualquier otra modalidad de cuidado sobre la víctima a fin de proteger sus derechos. Esta medida también la podrá solicitar la o el Fiscal, de oficio o petición de parte la o el juez competente. Una vez emitidas las medidas cautelares, la o el Juez de Garantías Penales también podrá ordenar se dispongan las medidas de protección necesarias, a las Juntas Cantonales y Metropolitanas de Protección de Derechos o a las o los Jueces de Familia, Mujer, Niñez y Adolescencia, o multicompetentes, con el fin de que se realice un abordaje integral para la protección y restitución de derechos de mujeres; niñas, niños o adolescentes; o, personas con discapacidad.

    3. Para este delito no será aplicable la atenuante prevista en el número 2 del Artículo 45 de este Código.

    4. El comportamiento público o privado de la víctima, anterior a la comisión de la infracción, no es considerado dentro del proceso.

    5. En este delito el consentimiento dado por la víctima menor de dieciocho años de edad es irrelevante.

    6. Las víctimas en este delito pueden ingresar al programa de víctimas y testigos.”

    Artículo 13

    Sustitúyase el Artículo 179 por el siguiente:

    “Art. 179.- Revelación de secreto o información personal de terceros. – La persona que teniendo conocimiento de un secreto o información personal de terceros cuya divulgación pueda causar daño a otra persona y lo revele, será sancionada con pena privativa de libertad de seis meses a un año.

    Quien revele o divulgue contenido digital, mensajes, correos, imágenes, audios o vídeos o cualquier otro contenido personal o datos íntimos sobre la sexualidad de una persona sin su consentimiento, en virtud de que ha querido mantener esta información en secreto, será sancionada con pena privativa de libertad de uno a tres años.”

    Artículo 14

     Sustitúyase el Artículo 230, por el siguiente:

    “Art. 230.- Interceptación ilegal de datos. – Será sancionada con pena privativa de libertad de tres a cinco años:

    1. La persona que, sin orden judicial previa, en provecho propio o de un tercero, intercepte, escuche, desvíe, grabe u observe, en cualquier forma, contenido digital en su origen, destino o en el interior de un sistema informático o dispositivo electrónico, una señal o una transmisión de datos o señales.

    2. La persona que ilegítimamente diseñe, desarrolle, ejecute, produzca, programe o envié contenido digital, códigos de accesos o contraseñas, certificados de seguridad o páginas electrónicas, enlaces o ventanas emergentes o modifique el sistema de resolución de nombres de dominio de un servicio financiero o pago electrónico u otro sitio personal o de confianza, de tal manera que induzca a una persona a ingresar a una dirección o sitio de internet diferente al que quiere acceder.

    3. La persona que posea, venda, distribuya o, de cualquier otra forma, disemine o introduzca en uno o más sistemas informáticos, dispositivos electrónicos, programas u otros contenidos digitales destinados a causar lo descrito en el número anterior.

    4. La persona que a través de cualquier medio copie, clone o comercialice información contenida en las bandas magnéticas, chips u otro dispositivo electrónico que esté soportada en las tarjetas de crédito, débito, pago o similares.

    5. La persona que produzca, fabrique, distribuya, posea o facilite materiales, dispositivos electrónicos, o programas o sistemas informáticos destinados a la comisión del delito descrito en el inciso anterior.”

    Artículo 15

    Sustitúyase el Artículo 232, por el siguiente:

    “Art. 232.- Ataque a la integridad de sistemas informáticos. – La persona que destruya, dañe, borre, deteriore, altere, suspenda, trabe, cause mal funcionamiento o comportamiento no deseado, o suprima total o parcialmente contenido digital, sistemas informáticos, sistemas de tecnologías de la información y comunicación, dispositivos electrónicos o infraestructura tecnológica necesaria para la transmisión, recepción o procesamiento de información en general, con el propósito de obstaculizar de forma grave, deliberada e ilegítima el funcionamiento de un sistema informático, será sancionada con pena privativa de libertad de tres a cinco años.

    Con igual pena será sancionada la persona que diseñe, desarrolle, programe, adquiera, envíe, introduzca, ejecute, venda o distribuya de cualquier manera, dispositivos, programas o sistemas informáticos maliciosos o destinados a causar los efectos señalados en el primer inciso de este Artículo.

    Si la infracción se comete sobre bienes informáticos destinados a la prestación de un servicio público o vinculado con la seguridad ciudadana, la pena será de cinco a siete años de privación de libertad.”

    Artículo 16

    Sustitúyase el Artículo 234, por el siguiente:

    “Art. 234.- Acceso no consentido a un sistema informático, telemático o de telecomunicaciones.

    1. La persona que sin autorización acceda en todo o en parte a un sistema informático o sistema telemático o de telecomunicaciones o se mantenga dentro del mismo en contra de la voluntad de quien tenga el legítimo derecho, será sancionada con la pena privativa de la libertad de tres a cinco años.

    2. Si la persona que accede al sistema lo hace para explotar ilegítimamente el acceso logrado, modificar un portal web, desviar o re direccionar de tráfico de datos o voz u ofrecer servicios que estos sistemas proveen a terceros, sin pagarlos a las o los proveedores de servicios legítimos, será sancionada con la pena privativa de la libertad cinco a siete años.”

    Artículo 17

    A continuación del Artículo 234, agréguense los siguientes artículos:

    “Art. 234. 1. – Falsificación informática:

    1. La persona que, con intención de provocar un engaño en las relaciones jurídicas, introducir, modificar, eliminar o suprimir contenido digital, o interferir de cualquier otra forma en el tratamiento informático de datos, produzca datos o documentos no genuinos, será sancionada con pena privativa de libertad de tres a cinco años.

    2. Quien, actuando con intención de causar un perjuicio a otro o de obtener un beneficio ilegitimo para sí o para un tercero, use un documento producido a partir de contenido digital que sea objeto de los actos referidos en el número 1, será sancionado con la misma pena.”

    “Art. 234. 2. – Agravación de las penas. – La práctica de los hechos que se describen en los artículos 232, 234 y 234.1 será sancionada con pena agravada en un tercio de su pena máxima si logra perturbar de forma grave o duradera a un sistema informático que apoye una actividad destinada a asegurar funciones sociales críticas, como cadenas de abastecimiento, salud, seguridad y bienestar económico de las personas, o funcionamiento regular de los servicios públicos.”

    “Art. 234. 3. – Responsabilidad de personas jurídicas. – A los delitos de esta Sección es aplicable la responsabilidad prevista en los artículos 49 y 71 de este Código.”

    “Art. 234.4. – Definiciones. – Para los efectos del presente Código, se considera:

    a. Contenido digital. – El contenido digital es todo dato informático que representa hechos, información o conceptos de la realidad, almacenados, procesados o transmitidos por cualquier medio tecnológico o canal de comunicación que se preste a tratamiento informático, incluidos los programas diseñados para un equipo tecnológico aislado, interconectado o relacionados entre sí.

    b. Datos de tráfico. – Contenido digital relativo a una comunicación efectuada por medio de un sistema informático o canal de comunicación, generados por este sistema como elemento de una cadena de comunicación, indicando su origen, su destino, su trayecto, la hora, la fecha, el tamaño, la duración o el tipo de servicio subyacente.

    c. Proveedor de servicios. – Cualquier entidad, pública o privada, nacional o internacional, que proporciona a los usuarios de sus servicios la capacidad de comunicarse a través de un sistema informático, o de cualquiera de las tecnologías de la información y comunicación, así como cualquier otra entidad que procese o almacene contenido digital en nombre y por cuenta de aquella entidad proveedora o de sus usuarios.

    d. Sistema informático. – Cualquier dispositivo o conjunto de dispositivos interconectados o asociados, en que uno o varios de ellos desarrolla, ejecutando un programa, el tratamiento automatizado de contenido digital.”

    Artículo 18

    Reemplácese el número 1 del Artículo 396, por el siguiente:

    “1. La persona que, por cualquier medio, inclusive a través de cualquiera de las tecnologías de la información y comunicación, profiera expresiones en descrédito o deshonra en contra de otra, ya sea mediante lenguaje violento, agresivo, vulgar u hostil.”

    Artículo 19

    A continuación del Artículo 477, agréguese el siguiente artículo:

    “Art. 477. 1. – Interceptación de las comunicaciones en cooperación internacional. – En ejecución de una petición de una autoridad extranjera competente, puede ser ordenada la intercepción de transmisiones de contenido digital realizadas por medio de un sistema informático ubicado en el Ecuador, si así se prevé en algún acuerdo, tratado o convenio internacional vigente previamente reconocido por el Ecuador, que haya pasado en legal y debida forma por el respectivo control previo de constitucionalidad, y si se trata de situación en la que dicha interceptación está permitida en un caso nacional de características similares, respetándose el procedimiento y observándose los límites y garantías previstos en el derecho interno.”

    Artículo 20

    Después del Artículo 497, incorpórese la siguiente Sección:

    “SECCIÓN CUARTA. OBTENCIÓN DE PRUEBA POR MEDIO DE COOPERACIÓN INTERNACIONAL

    Art. 497. 1. – Cooperación internacional. – Las autoridades nacionales competentes cooperarán con las autoridades extranjeras competentes que así lo soliciten, en las investigaciones o procedimientos que sean necesarios para la obtención de indicios o pruebas en formato digital, relativos a delitos relacionados con las tecnologías de la información y comunicación, o; con sistemas informáticos o contenido digital.

    Art. 497. 2. – Preservación y divulgación expedita de contenido digital en la cooperación internacional.

    1. Se puede solicitar al Ecuador la preservación expedita de contenido digital almacenado en un sistema informático aquí ubicado, con el objetivo de presentar una solicitud de asistencia para la búsqueda, incautación y divulgación de los mismos.

    2. La solicitud especificará:

    a. La autoridad que solicita la preservación;

    b. El delito que está siendo investigado, así como un breve resumen de los hechos conexos;

    c. El contenido digital que debe conservarse y su relación con el delito;

    d. Toda la información disponible para identificar a la persona responsable del contenido digital o la ubicación del sistema informático;

    e. La necesidad de la preservación, y,

    f. La intención de presentar una solicitud de ayuda para la búsqueda, incautación y difusión de datos.

    3. En la ejecución de una solicitud de autoridad extranjera competente en virtud de los números anteriores, la o el juzgador, dará la orden a quién tenga el control o disponibilidad de estos datos, incluido la del proveedor de servicios, para que este los preserve.

    4. La orden de preservación especificará, bajo pena de nulidad:

    a. La naturaleza de los datos;

    b. Si se conocen, su origen y su destino, y,

    c. El período de tiempo durante el cual los datos deben conservarse, hasta un máximo de tres meses.

    5. En cumplimiento de la orden de preservación dirigida hacia él, quien tenga el control o la disponibilidad de estos datos, incluyendo la o el proveedor de servicios, preservará de inmediato los datos en cuestión por el período especificado, los protegerá y conservará su integridad.

    6. La o el juzgador, podrá ordenar la renovación de la medida por períodos sujetos al límite previsto en la letra c) del número 5, siempre que se verifiquen sus requisitos de admisibilidad, hasta un máximo un año.

    7. Cuando sea presentada la solicitud de ayuda contemplada en el número 1, la o el juzgador, determinará la preservación de los datos hasta la adopción de una decisión definitiva sobre la solicitud.

    8. Los datos preservados en virtud del presente Artículo se concederán únicamente a:

    a. Al solicitante de la ayuda contemplada en el número 1, de la misma manera que podría hacerse en un caso nacional de características similares;

    b. A la autoridad nacional que emitió la orden de preservación, en las mismas condiciones que podrían realizarse en un caso similar nacional.

    9. Las disposiciones de los apartados 1 y 2, se aplicarán, con las debidas adaptaciones, a las peticiones formuladas por las autoridades del Ecuador a autoridades extranjeras.

    Art. 497. 3. – Motivos de denegación.

    1. La solicitud de preservación o divulgación expedita de contenido digital será denegada cuando:

    a. El contenido digital en cuestión se refiera a un delito político o delito conexo de acuerdo con los conceptos del derecho del Ecuador; y,

    b. Atenten contra la soberanía, seguridad, orden público u otros intereses del Ecuador.

    2. La solicitud de preservación expedita de contenido digital podrá aún ser denegada si existen motivos razonables para creer que la ejecución de la subsecuente solicitud de ayuda para fines de búsqueda, incautación y divulgación de tales datos será rechazada por falta de comprobación del requisito de la doble incriminación.

    Art. 497. 4. – Acceso a contenido digital en la cooperación internacional.

    1. En ejecución de una solicitud de autoridad extranjera competente, y de acuerdo con las normas de derecho nacional, se procederá al registro e incautación y la divulgación de datos almacenados en un sistema informático ubicado en el Ecuador, cuando se trate de una situación en que el registro e incautación son admisibles en un caso nacional de características similares.

    2. Las autoridades nacionales actuarán, en el ámbito de sus competencias, tan pronto como sea posible, cuando existan razones para creer que el contenido digital en cuestión es especialmente vulnerable a su pérdida o modificación, o cuando la cooperación rápida esté prevista en un instrumento internacional aplicable.

    3. Las disposiciones del número 1 se aplicarán, con las debidas adaptaciones, a las peticiones formuladas por las autoridades del Ecuador a autoridades extranjeras.

    Art. 497. 5. – Acceso transfronterizo a contenido digital almacenado de acceso público o con consentimiento.

    1. Las autoridades extranjeras competentes, podrán:

    a. Acceder a contenido digital almacenado en un sistema informático ubicado en el Ecuador, cuando este se halle a disposición del público;

    b. Recibir o acceder, por medio de un sistema informático ubicado en su territorio, a contenido digital almacenado en el Ecuador, con el consentimiento legal y voluntario de la persona legalmente autorizada a revelarlos.

    2. Las mismas facultades tendrán las autoridades del Ecuador, con relación a contenido digital alojado en el extranjero.

    Art. 497. 6. – Punto permanente de contacto para la cooperación internacional.

    1. A los fines de la cooperación internacional, tanto la Policía Nacional, como la Fiscalía General del Estado y el Consejo de la Judicatura, mantendrán una estructura que garantice un punto de contacto disponible en todo momento, las veinticuatro horas del día, los siete días de la semana.

    2. Esta estructura podrá ser contactada por sus pares extranjeros, con arreglo a los acuerdos, tratados o convenios internacionales vigentes previamente reconocidos por el Ecuador, que hayan pasado en legal y debida forma por el respectivo control previo de constitucionalidad, o en ejecución de protocolos de cooperación internacional con organismos judiciales o policiales.

    3. La asistencia inmediata que ofrece este punto de contacto permanente incluye:

    a. La prestación de asesoramiento técnico a otros puntos de contacto;

    b. La preservación expedita de datos en casos de urgencia o peligro en el retraso, en conformidad con el articulo siguiente;

    c. La recopilación de pruebas para las que tiene jurisdicción en casos de urgencia o de peligro en el retraso;

    La localización de sospechosos y el suministro de información de carácter jurídico en casos de urgencia o de peligro en el retraso.”

    Artículo 21

    Después del artículo 499, incorpórese la siguiente Sección:

    “SECCIÓN SEGUNDA. PRUEBAS DIGITALES

    Art. 499. 1. – Aseguramiento de datos.

    1. La o el juzgador, de oficio o a petición de parte, podrá ordenar a una o varias personas naturales o jurídicas que aseguren o conserven contenido digital, almacenados en un sistema informático o en un dispositivo de almacenamiento informático, que estén bajo su disposición o control, cuando tenga motivos para sospechar que los datos pueden ser alterados o suprimidos. La orden deberá especificar los datos concretos que se pretende conservar y la medida ordenada no podrá exceder de noventa días, prorrogables por igual período si se mantienen los motivos que fundamentaron la orden.

    2. La persona requerida deberá procurar los medios necesarios para preservar de inmediato los datos en cuestión y queda obligado a mantener secreto de la orden recibida durante el tiempo que dure la medida, bajo el apercibimiento de incurrir en responsabilidad penal.

    3. La o el proveedor de servicios de una comunicación que haya recibido la orden de aseguramiento de datos relativos al tráfico de una comunicación informará de inmediato a la autoridad que emitió la orden cuando advierta que la comunicación bajo investigación ha sido efectuada con la participación de otras u otros proveedores de servicios a fin de que se puedan arbitrar las medidas necesarias para solicitar a dichos proveedores el aseguramiento de los datos. No obstante, la o el proveedor de servicios deberá conservar el contenido digital y los datos de tráfico que reposen en su poder, por al menos setenta y dos horas o hasta que la autoridad judicial así lo requiera.

    4. A fin de evitar que el contenido digital sea alterado o manipulado, se procederá conforme con las reglas de la investigación de contenido digital, establecidas en este Código.

    Art. 499. 2. – Orden de presentación.

    1. La o el juzgador, de oficio o a petición de parte, cuando la naturaleza del contenido digital así lo requiera, podrá ordenar a cualquier persona natural o jurídica, que presente, remita o entregue cualquier contenido digital alojado en un sistema informático que esté bajo su poder o control y que se vincule con la investigación de un delito concreto.

    2. Asimismo, la o el juzgador, de oficio o a petición de parte, podrá ordenar a toda persona natural o jurídica que preste un servicio relacionado con cualquiera de las tecnologías de la información y comunicación, o con proveedores de servicios o plataformas digitales que presten sus servicios en el territorio de Ecuador, la entrega del contenido digital que considere necesario, así como los datos de los usuarios o abonados o los datos de identificación y facturación con los que cuente. Para dicho efecto, estos proveedores de servicios o plataformas digitales, deberán designar inmediatamente una o un representante dentro del territorio ecuatoriano, que estará a cargo de brindar una comunicación más ágil entre las partes, así como todas las facilidades necesarias durante todo el proceso, hasta cuando así lo requiera la o el juzgador.

    3. Las ordenes podrán contener la indicación de que la medida deberá mantenerse en secreto bajo el apercibimiento de responsabilidad penal.

    Art. 499. 3. – Búsqueda e incautación de contenido digital.

    1. La o el juzgador, de oficio o a petición de parte, podrá ordenar el registro de un sistema informático o de una parte de este, o de un medio de almacenamiento de contenido digital, con el objeto de:

    a. Incautar los componentes físicos del sistema y, si fuera necesario, los dispositivos para su lectura;

    b. Obtener copia forense en legal y debida forma, de los datos en un soporte autónomo; o,

    c. Preservar por medios tecnológicos, electrónicos o digitales, los datos de interés para la investigación.

    Regirán en cuanto sean aplicables las normas generales y las mismas limitaciones dispuestas para el secuestro de documentos y correspondencia epistolar.

    2. En los supuestos en los que durante la ejecución de una medida de registro e incautación de datos de un sistema informático previstos en el párrafo anterior, surjan elementos que permitan considerar que los datos buscados se encuentran almacenados en otro dispositivo o sistema Informático al que se tiene acceso licito desde el dispositivo o sistema inicial, quienes llevan adelante la medida podrán extenderla o ampliar el registro al otro sistema. La ampliación del registro a los fines de la incautación de datos deberá ser autorizada por la o el juez salvo que esté prevista en la orden original.

    Art. 499. 4. – Investigación de contenido digital. – En la investigación de contenido digital se seguirán las siguientes reglas:

    1. El análisis, valoración, recuperación y presentación del contenido digital almacenado en dispositivos o sistemas informáticos se realizará a través de técnicas digitales forenses.

    2. Cuando el contenido digital se encuentre almacenado en sistemas y memorias volátiles o equipos tecnológicos que formen parte de la infraestructura critica del sector público o privado, se realizará su recolección, en el lugar y en tiempo real, con técnicas digitales forenses para preservar su integridad, se aplicará la cadena de custodia y se facilitará su posterior valoración y análisis de contenido.

    3. Cuando el contenido digital se encuentre almacenado en medios no volátiles, se realizará su recolección, con técnicas digitales forenses para preservar su integridad, se aplicará la cadena de custodia y se facilitará su posterior valoración y análisis de contenido.

    4. Cuando se recolecte cualquier medio físico que almacene, procese o transmita contenido digital durante una investigación, registro o allanamiento, se deberá identificar e inventariar cada objeto individualmente, fijará su ubicación física con fotografías y un plano del lugar, se protegerá a través de técnicas digitales forenses y se trasladará mediante cadena de custodia a un centro de acopio especializado para este efecto.”

    Artículo 22

    Suprímase el artículo 500.

    Artículo 23

    Sustitúyase en el Capítulo Tercero “Medios de prueba”, del Título IV “Prueba”, del Libro Segundo “Procedimiento”, lo siguiente:

    a. “Sección Segunda: El testimonio” por “Sección Tercera: El testimonio”.

    b. “Parágrafo Tercero: La pericia” por “Sección Cuarta: La pericia”.

    DISPOSICIONES TRANSITORIAS

    PRIMERA

    En un plazo de 30 días contados a partir de la publicación de la presente Ley en el Registro Oficial, la Policía Nacional del Ecuador, la Fiscalía General del Estado y el Consejo de la Judicatura, diseñarán e implementarán un Plan Nacional de Políticas Públicas encaminado a difundir, socializar y capacitar a la ciudadanía para utilizar las tecnologías de forma segura conociendo sus derechos frente a cualquier riesgo o acto de violencia y sobre las disposiciones contenidas en la presente Ley, que permitan promover el derecho a vivir una vida libre de violencia y auto determinada, tanto online como offline, prevenir y combatir efectivamente la violencia sexual digital, así como fortalecer la lucha contra los delitos informáticos.

    SEGUNDA

    En un plazo de 30 días contados a partir de la publicación de la presente Ley en el Registro Oficial, el Ministerio de Salud Pública diseñará e implementará campañas de sensibilización y concienciación dirigidas a la ciudadanía, sobre los peligros de la violencia sexual digital y todo tipo de violencia cometida en el entorno digital y el riesgo de los delitos informáticos, así como sobre los derechos vulnerados y sus consecuencias, en virtud de que estos factores acarrean graves repercusiones en la salud mental y terminan convirtiéndose en una alarma de salud pública.

    TERCERA

    En un plazo de 180 días contados a partir de la publicación de la presente Ley en el Registro Oficial, la Autoridad Educativa Nacional y la Autoridad rectora de la Educación Superior, deberán incluir en sus mallas curriculares o programas académicos, asignaturas que permitan promover una cultura saludable de consentimiento, el derecho a una vida libre de violencia y auto determinada, tanto online como offline, prevenir y combatir efectivamente la violencia sexual digital y todo tipo de estereotipos y tabús propios de la cultura de la violación, así como fortalecer la lucha contra los delitos informáticos, campañas de sensibilización y concienciación y materiales educativos dirigidos a la comunidad educativa, orientados no solo en riesgos para las mujeres, sino en el contraste de la cultura patriarcal en la producción de violencia, promoverán acciones educativas y culturales con enfoque de interseccionalidad, inclusivas, paritarias y correlativas, especialmente cuando sean cometidos contra mujeres, minorías y grupos de atención prioritaria.

    CUARTA

    En un plazo de 120 días contados a partir de la publicación de la presente Ley en el Registro Oficial, los miembros del Sistema de Protección Integral de niñas, niños y adolescentes a nivel nacional, bajo la coordinación de la Fiscalía General del Estado, deberán identificar la ruta para la implementación de una línea de reporte, preservación del contenido al momento de la denuncia y el bloqueo del mismo con fines de protección inmediata de niñas, niños y adolescentes, víctimas de abuso o explotación sexual en línea, aplicando las buenas prácticas internacionales, en coordinación con instituciones públicas, privadas y de la sociedad civil.

    DISPOSICIÓN REFORMATORIA

    ÚNICA

    En la Ley Orgánica Integral para Prevenir y Erradicar la Violencia Contra las Mujeres, realícense las siguientes reformas:

    1. En el artículo 10 “Tipos de violencia”, luego del literal g) agréguese lo siguiente:

    “h) Violencia Sexual Digital. – Es toda acción que implique principalmente la vulneración o restricción del derecho a la intimidad, realizada contra las mujeres en el entorno digital, a través de cualquiera de las tecnologías de la información y comunicación, mediante la utilización de contenido de carácter personal o íntimo, que contenga la representación visual de desnudos, semidesnudos, o actitudes sexuales que la mujer le haya confiado de su intimidad o que ha sido obtenido por cualquier otro medio.

    Se entenderá por Tecnologías de la Información y la Comunicación, al conjunto de recursos tecnológicos, utilizados de manera integrada, para el procesamiento, administración y difusión de la información a través de soportes diseñados para ello.

    i) Violencia mediática. – Aquella violencia cometida por una persona o grupo de personas a través de la publicación o difusión de información o contenido audiovisual o digital estereotipado, a través de cualquier medio de comunicación público, privado o comunitario que, de manera directa o indirecta, legitime la desigualdad de trato o construya patrones socioculturales reproductores o generadores de desigualdad, discriminación, cosificación, estigmatización o violencia contra las mujeres o en sus relaciones sociales, normalizando así, la subordinación de estas en la sociedad, será sancionada con pena privativa de libertad de uno a tres años.”

    2. En el Artículo 25, sustitúyase la letra s), por las siguientes:

    “s) Promover en todas las instituciones educativas, la implementación de campañas de educación y promoción de la igualdad de género y respeto hacia la libertad sexual de la mujer; educación sexual y socio-emotiva con expertos y expertas a partir de una edad joven; educación cívica digital para promover un uso más positivo y consciente de las plataformas digitales, considerando que estas últimas no son neutrales y requieren conocimiento cívico para ser utilizadas con respeto por parte de las y los ciudadanos.

    t) Las demás que establezca la normativa vigente.”

    3. Luego del Artículo 39, agréguese el siguiente artículo:

    “Art. 39.1.- Atribuciones especiales de las entidades nacionales y locales que integran el Sistema Nacional Integral para la Prevención y Erradicación de la Violencia Contra las Mujeres, respecto a la violencia sexual digital y otros tipos de violencia en el entorno digital:

    a. Establecer acciones para prevenir la violencia sexual digital y otros tipos de violencia en el entorno digital que se presenta a través de las tecnologías de la información y comunicación;

    b. Fortalecer las normativas penal y civil para asegurar la sanción a quienes realizan violencia sexual digital y otros tipos de violencia en el entorno digital;

    c. Promover y difundir en la sociedad información destinada a prevenir y combatir la violencia sexual digital y otros tipos de violencia en el entorno digital;

    d. Desarrollar acciones coordinadas de carácter interinstitucional y multidisciplinario, cuya visión y ejercicio se fundamente en la perspectiva de género, con miras a dar atención y seguimiento en la materia, a las víctimas de violencia sexual digital y otros tipos de violencia en el entorno digital;

    e. Suministrar atención psicológica y jurídica, gratuita y especializada a las víctimas de violencia sexual digital y otros tipos de violencia en el entorno digital.”

    DISPOSICIÓN FINAL

    Esta Ley entrará en vigencia a partir de su publicación en el Registro Oficial.

    Dado y suscrito en la sede de la Asamblea Nacional, ubicada en el Distrito Metropolitano de Quito, provincia de Pichincha, a los …

    11May/21

    Informe 9 de abril de 2021, Proyecto de Ley Orgánica de Protección de Datos Personales

    Informe 9 de abril de 2021, Para Segundo Debate del Proyecto de Ley Orgánica de Protección de Datos Personales

    PROYECTO DE LEY

    EXPOSICIÓN DE MOTIVOS

    Es de conocimiento general el espíritu cambiante de la sociedad en que vivimos; las nuevas tendencias y comportamientos componen un sinfín de mecanismos que enmarcan caminos y definen horizontes. El individuo en sí mismo pertenece a un conglomerado de oportunidades que siembra libertades, pero no siempre las materializa, esto en virtud de elementos que ajenos a los fines se apropia de ellos y los modifican.

    El legislador en esta posición y en términos aristotélicos vendría a ser la justicia animada, en donde el justo medio de un todo revelará una sociedad fructífera, que no esté viciada por extremos equiparables a una inequidad, que dista de lo justo que en sí mismo debe ser permanente y acceder a todos los espacios para adjudicarse como tal.

    En este contexto es imperante mencionar que el espacio en el que actualmente el individuo se desarrolla no se limita a sus expectativas, sino más bien, en sintonía con la evolución previamente mencionada, el sujeto es símbolo de conservación, labra estrategias que le permiten afianzarse a un terreno sólido y en el camino sobrevivir ante la vulneración de sus libertades, ya que como es conocido, todo aquel mecanismo que las genere será el mismo que las limitará.

    Trasladándose al escenario actual, la colectividad ha experimentado cambios que por su irrevocable importancia han dejado precedentes en la historia, esto es por ejemplo un relativismo ideológico, nuevas formas de agrupación familiar, aumento en la esperanza de vida y en paralelo disminución de la tasa de natalidad y en particular la omnipresencia de la tecnología.

    Es así que el individuo, aun víctima de las dificultades que con ello advienen, recolecta los aspectos positivos y disfruta de los avances en todo ámbito posible, en el caso puntual, la región digital que de la mano con el perfeccionamiento tecnológico extienden las posibilidades de un nuevo mundo, colaborando así no solo con la efectivización de procesos, sino también con el desarrollo económico, facilitando el vivir cotidiano creando redes de distribución de la información y generando en función a ello réditos económicos.

    Es de admitir que, las personas se desenvuelven en una sociedad altamente conectada, esto permite que la provisión de distintos servicios y la comunicación, se realicen desde cualquier parte del mundo y en tiempo real. Las tecnologías de la información y comunicación (TIC) han impactado sustancialmente en la vida de las personas, tanto es así, que se han convertido en herramientas y procesos indispensables e ineludibles para la satisfacción de necesidades básicas de los seres humanos.

    Su versatilidad permite que estas logren adaptarse a las necesidades y requerimientos de forma personalizada, es por eso que el ser humano las acopla en todas sus actividades manteniendo con ellas una relación incluso cercana a la dependencia. Como consecuencia de ello se ha generado la omnipresencia de las mismas, en la totalidad de las áreas en las que los individuos se desenvuelven (salud, comercio, educación, migración, cooperación internacional), respeto y garantía de derechos, cultura, entre otros).

    Es indudable que las TIC representan un sin número de beneficios que tienen como objetivo mejorar la calidad de vida de los seres humanos, sin embargo, también se ha de reconocer que el mismo potencial ha sido invertido para configurar un espacio lleno de múltiples riesgos para las personas.

    Esto en virtud de que los individuos no son conscientes del valor de sus datos, considerando que, usados de manera adecuada, pueden generar una serie de ventajas, no solo para tu titular, sino también para los proveedores de bienes o servicios públicos o privados que los procesan; pero cuando se tratan de forma irresponsable o abusiva pueden llegar a afectar gravemente la dignidad e integridad de los seres humanos, es así que, su recopilación, procesamiento y comunicación inadecuada puede significar una vulneración a derechos fundamentales como la vida, la salud, el acceso a servicios públicos, la integridad física, psicológica o sexual, entre muchos otros; lesiones que se han podido evidenciar a nivel mundial y que incluso ya se han familiarizado con la realidad ecuatoriana.

    La casi arbitraria libertad con la que se mueve la información acaece desconcierto social por la ausencia de mecanismos de protección que controlen su tratamiento, eso en virtud de que gran parte de esta sujeta datos personales, que utilizados o tratados inadecuadamente pueden por ejemplo, alterar elecciones presidenciales, determinar quién recibe servicios de salud o alimenticios, ser una herramienta para la delincuencia organizada (trata de personas, narcotráfico o terrorismo). Situaciones que parecen lejanas a nuestra realidad; sin embargo, estas circunstancias se evidencian actualmente incluso en nuestro país, donde se han evidenciado robos, ataques o exposiciones ilegítimas de bases de datos de carácter público o privado que han generado perjuicios sociales y económicos.

    En lo que respecta al siglo pasado la relación instituida entre el Estado y el individuo en cuanto a identificación mutua ha sido realmente escasa; el ambiente percibido en tal época se contenía en cajas de información registrada a mano que en virtud del tiempo se volvía frágil, quebrando consigo toda relación existente.

    Actualmente el Estado constituye en sí una de las mayores fuentes de información en razón de la posesión de grandes bases de datos necesarias para la consecución de sus fines administrativos, convirtiéndolo en un efectivizador de procesos que atraviesa la delgada línea entre su posición garantista de derechos humanos y la susceptibilidad de vulnerarlos.

    A lo largo de la historia, el ser humano ha sido testigo de grandes vulneraciones a la dignidad, debido al procesamiento de información con fines ajenos al interés general, eventos históricos como la Segunda Guerra Mundial no habrían dejado tantas víctimas, si aquellos que abusaron del poder no hubieran tenido en sus manos información que les permitiera aniquilar a millones de personas.

    Hito histórico que parece ajeno a nuestra realidad territorial y actual, pero ejemplos como el proyecto SAFARI en la Francia de 1974 o el Plan Cóndor cultivado por los regímenes dictatoriales del Cono Sur que desencadenaron los “Archivos del terror” de Paraguay en 1993, evidencian lo peligroso que puede ser para el ser humano, no ser consciente del valor de su información.

    Con la influencia actual de las tecnologías de la información y comunicación, y los procesos de analítica de datos, es cada vez más necesario entender su trascendencia; en el Ecuador, constantemente se suscitan circunstancias de afectación a derechos, debido al tratamiento inadecuado de datos personales, es muy común encontrar noticias que anuncian el robo de bases de datos, la modificación de las mismas para la obtención de beneficios ilegales, incluso, un intento de incidir en su derecho a elegir por la emisión de noticias falsas.

    Es imperante, denotar que las transgresiones no solo se suscitan en el ámbito público, sino que también ocurren a nivel privado, con mayor frecuencia de la que el individuo percibe; en el Ecuador, cualquier abonado a servicios móviles, recibe innumerables llamadas para el ofrecimiento de planes celulares, de seguros y tarjetas de crédito, sin conocer cómo empresas con las que nunca han tenido relaciones obtienen su información y que a pesar de su incomodidad no pueden dejar de ser parte de estas redes.

    Así mismo, son innumerables las denuncias por el inicio de procesos que tienen el objeto de deudas que en la mayoría de los casos son inexistentes o la denegación de acceso a servicios por criterios sin fundamento y en algunos casos discriminatorio.

    Los datos en la actualidad se consideran activos digitales con gran valor económico, incluso equiparable al del dinero; los sujetos se enfrentan a una realidad en donde su información forma parte de un mercado negro, del que nadie habla pero es innegable.

    Para enfrentar estas dificultades y aprovechar el potencial de las TIC para el desarrollo sostenible, generar confianza en línea y garantizar las oportunidades que brindan los adelantos tecnológicos, cada uno de los países, sobre la base de su estructura normativa propia, ha optado por desarrollar mecanismos de protección de las personas y sus datos.

    Hay pocos Estados que no han desarrollado normativa alguna sobre la materia, o la que tienen es incompleta, dispersa o contradictoria, estos son los que mayor desventaja presentan no solo frente a los riesgos y peligros que trae consigo el manejo de datos personales, sino ante la imposibilidad de usarlos como insumos clave para su desarrollo económico y social, lo cual evidencia la posibilidad real de quedar aún más rezagados.

    En ese contexto, es indispensable dar certidumbre a usuarios, empresas, organizaciones y Estados, sobre todo en este momento en el cual la economía mundial se desplaza más hacia un espacio de información masiva, hiper-conectada, en tiempo real, de flujo incesante proveniente de internet de las cosas, automatizada con algoritmos de inteligencia artificial cada vez más sofisticados, y de la réplica incesante mediante tecnologías de registros distribuidos. Todo esto, unido a que los datos no tienen fronteras y que las plataformas y servicios son de libre disposición y se almacenan en centros de datos de todo el mundo, obliga a los países a realizar marcos jurídicos compatibles en distintos niveles: nacional, regional y mundial que faciliten el intercambio y al mismo tiempo respeten y protejan los derechos humanos.

    Por otro lado, en lo que respecta al contexto internacional, el Consejo de Derechos Humanos de la Asamblea General de Naciones Unidas, en Resolución 28/16Profundamente preocupado por los efectos negativos que pueden tener para el ejercicio y el goce de los derechos humanos la vigilancia y la interceptación de las comunicaciones, incluidas la vigilancia y la interceptación extraterritoriales de las comunicaciones y la recopilación de datos personales, en particular cuando se llevan a cabo a gran escala” nombra por primera vez al Relator especial sobre el derecho a la privacidad en la era digital con la finalidad de que, entre otras, presente informes que incluya “observaciones importantes” sobre cómo garantizar este derecho fundamental, así como denuncias sobre posibles violaciones.

    En el mismo sentido, el 25 de mayo de 2018, entró en vigencia el Reglamento General Europeo de Protección de Datos Personales, su aplicación afecta a todos los países del mundo, ya que únicamente permite e incentiva que países que cuenten con niveles adecuados de protección puedan tratar datos de ciudadanos europeos.

    Adicionalmente, es importante mencionar que en el año 2016 se suscribió el Protocolo de Adhesión de Ecuador al Acuerdo Comercial Multipartes con la Unión Europea, con el objetivo de buscar mejores condiciones para el intercambio de bienes y servicios entre los países miembros de la UE y el Estado ecuatoriano; este acuerdo, sin embargo, se ha visto afectado dado que para el intercambio de bienes o servicios, en la mayoría de los casos, se requiere que exista el flujo transfronterizo de datos personales, y al no tener normativa amparada por un ente controlador especializado en la materia, no le es posible al país ofrecer un nivel adecuado de protección, lo que desalienta el comercio y genera que se prefieran destinos como Colombia, Perú y los demás países suscriptores del acuerdo, que si cuentan con Ley de Protección de Datos Personales.

    En virtud de estos antecedentes, y dada la urgencia de la legislación especializada que se encargue de regular el tratamiento de datos personales, es necesario contar con una Ley, que salvaguarde los derechos, promueva la actividad económica, comercial, de innovación tecnológica, social, cultural, entre otras y que delimite los parámetros para un tratamiento adecuado en el ámbito público y privado.

    ASAMBLEA NACIONAL DE LA REPÚBLICA DE ECUADOR

    EL PLENO

    CONSIDERANDO

    Que, el artículo 1 de la Constitución de la República dispone que el “Estado ecuatoriano es un Estado constitucional de derechos y justicia, social, democrático (…)”.

    Que, el artículo 3 en sus numerales 1, 5 y 8 de la Carta Magna determinan que son deberes primordiales del Estado “1 Garantizar sin discriminación alguna el efectivo goce de los derechos establecidos en la Constitución y en los instrumentos internacionales, en particular la educación, la salud, la alimentación, la seguridad social y el agua para sus habitantes. 5 Planificar el desarrollo nacional, erradicar la pobreza, promover el desarrollo sustentable y la redistribución equitativa de los recursos y la riqueza, para acceder al buen vivir. 8 Garantizar a sus habitantes el derecho a una cultura de paz, a la seguridad integral y a vivir en una sociedad democrática y libre de corrupción.”;

    Que, el numeral 1 del artículo 11 de la Norma Suprema establece que “Los derechos se podrán ejercer, promover y exigir de forma individual o colectiva ante las autoridades competentes, estas autoridades garantizarán su cumplimiento.”;

    Que el numeral 2 del artículo 11 de la Norma Suprema prescribe que “Todas las personas son iguales y gozarán de los mismos derechos y oportunidades”;

    Que, el numeral 3 del artículo 11 de la Constitución de la República preceptúa que “Los derechos y garantías establecidas en la Constitución y en los instrumentos internacionales de derechos humanos serán de directa e inmediata aplicación por y ante cualquier servidora o servidor público, administrativo o judicial, de oficio o a petición de parte”;

    Que, el numeral 8 del artículo 11 de la Norma Suprema dispone que “El contenido de los derechos y garantías establecidos en la Constitución y en los instrumentos internacionales de derechos humanos, no excluirá los demás derechos derivados de la dignidad de las personas, comunidades, pueblos y nacionalidades, que sean necesarios para su pleno desenvolvimiento. Será inconstitucional cualquier acción u omisión de carácter regresivo que disminuya, menoscabe o anule injustificadamente el ejercicio de los derechos”,

    Que, el artículo 16 numerales 1 y 2 de la Carta Magna determina que “Todas las personas, en forma individual o colectiva, tienen derecho a 1 Una comunicación libre, intercultural, incluyente, diversa y participativa, en todos los ámbitos de la interacción social, por cualquier medio y forma, en su propia lengua y con sus propios símbolos 2 El acceso universal a las tecnologías de información y comunicación”;

    Que, el artículo 17 numeral 2 de la Norma Suprema preceptúa que “El Estado fomentará pluralidad y la diversidad en la comunicación, y al efecto 2 Facilitará la creación y el fortalecimiento de medios de comunicación públicos, privados y comunitarios, así como el acceso universal a las tecnologías de la información y comunicación en especial para las personas y colectividades que carezcan de dicho acceso o lo tengan de forma limitada”;

    Que, el artículo 26 de la Constitución de la República reconoce que “La educación es un derecho de las personas a lo largo de su vida y un deber inexcusable el Estado. Constituye un área prioritaria de la política pública y de la inversión estatal, garantía de la igualdad e inclusión social v condición indispensable para el buen vivir. Las personas, las familias y la sociedad tienen el derecho y la responsabilidad de participar en el proceso educativo”;

    Que, el artículo 35 de la Carta Magna establece que “Las personas adultas mayores, niñas, niños y adolescentes, mujeres embarazadas, personas con discapacidad, personas privadas de libertad y quienes adolezcan de enfermedades catastróficas o de alta complejidad, recibirán atención prioritaria y especializada en los ámbitos públicos y privado. La misma atención prioritaria recibirán las personas en situación de riesgo, las víctimas de violencia doméstica y sexual, maltrato infantil, desastres naturales o antropogénicos. El Estado prestará especial protección a las personas en condición de doble vulnerabilidad.”,

    Que, el artículo 44 de la Norma Suprema dispone que “El Estado, la sociedad, y la familia promoverán de forma prioritaria el desarrollo integral de los niñas, niños y adolescentes, y asegurarán el ejercicio pleno de sus derechos, se atenderá al principio de su interés superior y sus derechos prevalecerán sobre los de las demás personas. Las niñas, niños y adolescentes tendrán derecho a su desarrollo integral, entendido como proceso de crecimiento, maduración y despliegue de su intelecto y de sus capacidades, potencialidades y aspiraciones, en un entorno familiar, escolar, social y comunitario de efectividad v seguridad. Este entorno permitirá la satisfacción de sus necesidades sociales, afectivo-emocionales y culturales, con el apoyo de políticas intersectoriales nacionales y locales.”,

    Que, el artículo 66 numeral 19 de la Constitución de la República reconoce y garantiza a las personas: “19 El derecho a la protección de datos carácter personal, que incluye el acceso y la decisión sobre información y datos de este carácter, así como su correspondiente protección. La recolección, archivo, procesamiento, distribución o difusión de estos datos personales requerirán la autorización del titular o el mandato de ley”,’

    Que, el numeral 6 del artículo 76 de la Carta Magna determina que “En todo proceso que se determinen derechos y obligaciones de cualquier orden, se asegurará el derecho al debido proceso que incluirá las siguientes garantías básicas 6 La ley establecerá la debida proporcionalidad entre las infracciones y las sanciones penales, administrativas o de otra naturaleza.”

    Que, el artículo 92 de la Norma Suprema prescribe que “Toda persona, por sus propios derechos o como representante legitimado para el efecto, tendrá derecho a conocer de la existencia y acceder a los documentos, datos genéticos, bancos o archivos de datos personales e informes que sobre sí misma, o sobre sus bienes, consten en entidades públicas o privadas, en soporte material o electrónico Asimismo tendrá derecho a conocer el uso que se haga de ellos, su finalidad, el origen y destino de información personal y el tiempo de vigencia del archivo o banco de datos. Las personas responsables de los bancos o archivos de datos personales podrán difundir la información archivada con autorización de su titular o de la ley. La persona titular de los datos podrá solicitar al responsable el acceso sin costo al archivo, así como la actualización de los datos, su rectificación, eliminación o anulación. En el caso de datos sensibles, cuyo archivo deberá estar autorizado por la ley o por la persona titular, se exigirá la adopción de las medidas de seguridad necesarias. Si no se atendiera su solicitud, ésta podrá acudir a la jueza o juez. La persona afectada podrá demandar por los perjuicios ocasionados”;

    Que, el artículo 227 de la Constitución de la República establece que “La administración pública constituye un servicio a la colectividad que se rige por los principios de eficacia, eficiencia, calidad, jerarquía, desconcentración, descentralización, coordinación, participación, planificación, transparencia y evaluación.”

    Que, el artículo 277 de la Constitución de la República determina que “Para la consecución del buen vivir, serán deberes generales del Estado 1 Garantizar los derechos de las personas, las colectividades y la naturaleza 2 Dirigir, planificar y regular el proceso de desarrollo 3 Generar y ejecutar las políticas públicas y controlar y sancionar su incumplimiento 4 Producir bienes, crear y mantener infraestructura y proveer servicios públicos 5 Impulsar el desarrollo de las actividades económicas mediante un orden jurídico e instituciones políticas que las promuevan, fomenten y defiendan mediante el cumplimiento de la Constitución y la ley 6 Promover e impulsar la ciencia, la tecnología, las artes, los saberes ancestrales y en general las actividades de la iniciativa creativa, comunitaria, asociativa, cooperativa y privada.”;

    Que, el artículo 417 de la Norma Suprema dispone que “Los tratados internacionales ratificados por el Ecuador se sujetarán a lo establecido en la Constitución. En el caso de los tratados y otros instrumentos internacionales de derechos humano se aplicarán los principios pro ser humano, de no restricción de derechos, de aplicabilidad directa y de cláusula abierta establecida en la Constitución”;

    Que, el numeral 3 del artículo 423 de la Constitución de la República prevé que “La integración en especial con los países de Latinoamérica y el Caribe será un objetivo estratégico del Estado. En todas las instancias y procesos de integración, el Estado ecuatoriano se comprometerá a 3 Fortalecer la armonización de las legislaciones nacionales con énfasis en los derechos (..), de acuerdo con los principios de progresividad y no regresividad.”;

    Que, el artículo 424 de la Carta Magna prescribe que “La Constitución es la norma suprema y prevalece e sobre cualquier otra del ordenamiento jurídico. Las normas y los actos del poder público deberán mantener conformidad con las disposiciones constitucionales, en caso contrario carecerán de eficacia jurídica. La Constitución y los tratados internacionales de derechos humanos ratificados por el Estado que reconozcan derechos más favorables a los contenidos en la Constitución, prevalecerán sobre cualquier otra norma jurídica o acto del poder público.”;

    Que, la Resolución 45/95 de 14 de diciembre de 1990 de la Organización de las Naciones Unidas adopta principios rectores para la reglamentación de los ficheros computarizados de datos personales, garantías mínimas que deberán preverse en legislaciones nacionales para efectivizar este derecho;

    Que, uno de los ejes de la Estrategia acordada en el año 2016 de la red Iberoamericana de Datos Personales 2020 consiste en “Impulsar y contribuir al fortalecimiento y adecuación de los procesos regulatorios en la región, mediante la elaboración de directrices que sirvan de parámetros para futuras regulaciones o para revisión de las existentes en materia de protección de datos personales”;

    Que, el 20 de junio de 2017 se aprobaron los Estándares de Protección de Datos Personales para los Estados Iberoamericanos;

    Que, el Comité Jurídico Interamericano de la Organización de Estados Americanos adoptó la propuesta de declaración de principios de privacidad y protección de datos personales en las Américas;

    Que, la Organización de Estados Americanos el 27 de marzo de 2015 desarrolló el Proyecto de Ley Modelo sobre Protección de datos Personales;

    Que, la protección de datos personales forma parte de los ejes estratégicos para la construcción de la sociedad de la información y el conocimiento en el Ecuador conforme el Libro Blanco de la Sociedad de la Información y del Conocimiento 2018;

    Que, la Acción Estratégica clave del enfoque para Gobierno de protección de datos personales del Eje 6 del Plan Nacional de la Sociedad de la Información y del Conocimiento 2018-2021, es “Promulgar una ley orgánica de protección de datos personales para garantizar el derecho constitucional.”;

    Que, el principio de Legalidad de la Carta Iberoamericana de Gobierno Electrónico del año 2007 establece que “(…) el uso de comunicaciones electrónicas promovidas por la Administración Pública deberá tener observancia de las normas en materia de protección de datos personales”, con el objetivo de precautelar el derecho que tienen los ciudadanos a relacionarse electrónicamente con el Estado;

    Que, la Estrategia 3 del Programa de Gobierno Abierto del Plan Nacional de Gobierno Electrónico apunta a “Impulsar la protección de la información y datos personales”; y,

    En uso de la atribución que le confiere el número 6 del artículo 120 de la Constitución de la República, expide lo siguiente:

    LEY ORGÁNICA DE PROTECCIÓN DE DATOS PERSONALES

    CAPÍTULO I. ÁMBITO DE APLICACIÓN INTEGRAL

    Artículo 1.- Objeto y finalidad

    El objeto y finalidad de la presente ley es garantizar el ejercicio del derecho a la protección de datos personales, que incluye el acceso y decisión sobre información y datos de este carácter, así como su correspondiente protección. Para dicho efecto regula, prevé y desarrolla principios, derechos, obligaciones y mecanismos de tutela.

    Artículo 2. Ámbito de aplicación material

    La presente ley se aplicará al tratamiento de datos personales contenidos en cualquier tipo de soporte, automatizados o no, así como a toda modalidad de uso posterior. La ley no será aplicable a:

    a) Personas naturales que utilicen estos datos en la realización de actividades familiares o domésticas;

    b) Personas fallecidas, sin perjuicio de lo establecido en el artículo 28 de la presente Ley;

    c) Datos anonimizados, en tanto no sea posible identificar a su titular. Tan pronto los datos dejen de estar disociados o de ser anónimos, su tratamiento estará sujeto al cumplimiento de las obligaciones de esta ley, especialmente la de contar con una base de licitud para continuar tratando los datos de manera no anonimizada o disociada;

    d) Actividades periodísticas y otros contenidos editoriales;

    e) Datos personales cuyo tratamiento se encuentre regulado en normativa especializada de igual o mayor jerarquía en materia de gestión de riesgos por desastres naturales; y, seguridad y defensa del Estado, en cualquiera de estos casos deberá darse cumplimiento a los estándares internacionales en la materia de derechos humanos y a los principios de esta ley, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad;

    f) Datos o bases de datos establecidos para la prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, llevado a cabo por los organismos estatales competentes en cumplimiento de sus funciones legales. En cualquiera de estos casos deberá darse cumplimiento a los estándares internacionales en la materia de derechos humanos y a los principios de esta ley, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad; y

    g) Datos que identifican o hacen identificable a personas jurídicas. Son accesibles al público y susceptibles de tratamiento los datos personales referentes al contacto de profesionales y los datos de comerciantes, representantes y socios y accionistas de personas jurídicas y servidores públicos, siempre y cuando se refieran al ejercicio de su profesión, oficio, giro de negocio, competencias, facultades, atribuciones o cargo y se trate de nombres y apellidos, funciones o puestos desempeñados, dirección postal o electrónica, y, número de teléfono profesional. En el caso de los servidores públicos, además serán de acceso público y susceptibles de tratamiento de datos, el histórico y vigente de la declaración patrimonial y de su remuneración

    Artículo 3.- Ámbito de aplicación territorial

    Sin perjuicio de la normativa establecida en los instrumentos internacionales ratificados por el Estado ecuatoriano que versen sobre esta materia, se aplicará la presente Ley cuando:

    1. El tratamiento de datos personales se realice en cualquier parte del territorio nacional;

    2. El responsable o encargado del tratamiento de datos personales se encuentre domiciliado en cualquier parte del territorio nacional;

    3. Se realice tratamiento de datos personales de titulares que residan en el Ecuador por parte de un responsable o encargado no establecido en el Ecuador, cuando las actividades del tratamiento estén relacionadas con: 1) La oferta de bienes o servicios a dichos titulares, independientemente de si a estos se les requiere su pago, o, 2) del control de su comportamiento, en la medida en que este tenga lugar en el Ecuador.; y

    4. Al responsable o encargado del tratamiento de datos personales, no domiciliado en el territorio nacional, le resulte aplicable la legislación nacional en virtud de un contrato o de las regulaciones vigentes del derecho internacional público.

    Artículo 4.- Términos y definiciones

    Para los efectos de la aplicación de la presente Ley se establecen las siguientes definiciones:

    Autoridad de Protección de Datos Personales: Autoridad pública independiente encargada de supervisar la aplicación de la presente ley, reglamento y resoluciones que ella dicte, con el fin de proteger los derechos y libertades fundamentales de las personas naturales, en cuanto al tratamiento de sus datos personales.

    Anonimización: La aplicación de medidas dirigidas a impedir la identificación o reidentificación de una persona natural, sin esfuerzos desproporcionados.

    Base de datos o fichero: Conjunto estructurado de datos cualquiera que fuera la forma, modalidad de creación, almacenamiento, organización, tipo de soporte, tratamiento, procesamiento, localización o acceso, centralizado, descentralizado o repartido de forma funcional o geográfica.

    Consentimiento: Manifestación de la voluntad libre, específica, informada e inequívoca, por el que el titular de los datos personales autoriza al responsable del tratamiento de los datos personales a tratar los mismos.

    Dato biométrico: Dato personal único, relativo a las características físicas o fisiológicas, o conductas de una persona natural que permita o confirme la identificación única de dicha persona, como imágenes faciales o datos dactiloscópicos, entre otros.

    Dato genético: Dato personal único relacionado a características genéticas heredadas o adquiridas de una persona natural que proporcionan información única sobre la fisiología o salud de un individuo.

    Dato personal: Dato que identifica o hace identificable a una persona natural, directa o indirectamente.

    Datos personales crediticios: Datos que integran el comportamiento económico de personas naturales, para analizar su capacidad financiera. Datos relativos a: etnia, identidad de género, identidad cultural, religión, ideología, filiación política, pasado judicial, condición migratoria, orientación sexual, salud, datos biométricos, datos genéticos, datos relativos a las personas apatridas y refugiados que requieren protección internacional, y aquellos cuyo tratamiento indebido pueda dar origen a discriminación, atenten o puedan atentar contra los derechos y libertades fundamentales.

    Datos relativos a la salud: datos personales relativos a la salud física o mental de una persona, incluida la prestación de servicios de atención sanitaria, que revelen información sobre su estado de salud.

    Datos sensibles: Datos relativos a: etnia, identidad de género, identidad cultural, religión, ideología, filiación política, pasado judicial, condición migratoria, orientación sexual, salud, datos biométricos, datos genéticos y aquellos cuyo tratamiento indebido pueda dar origen a discriminación, atenten o puedan atentar contra los derechos y libertades fundamentales.

    Delegado de protección de datos: Persona natural encargada de informar al responsable o al encargado del tratamiento sobre sus obligaciones legales en materia de protección de datos, así como de velar o supervisar el cumplimiento normativo al respecto, y de cooperar con la Autoridad de Protección de Datos Personales, sirviendo como punto de contacto entre esta y la entidad responsable del tratamiento de datos.

    Destinatario: Persona natural o jurídica que ha sido comunicada con datos personales. Elaboración de perfiles: Todo tratamiento de datos personales que permite evaluar, analizar o predecir aspectos de una persona natural para determinar comportamientos o estándares relativos a: rendimiento profesional, situación económica, salud, preferencias personales, intereses, fiabilidad, ubicación, movimiento físico de una persona, entre otros.

    Encargado del tratamiento de datos personales: Persona natural o jurídica, pública o privada, autoridad pública, u otro organismo que solo o conjuntamente con otros trate datos personales a nombre y por cuenta de un responsable de tratamiento de datos personales.

    Entidad Certificadora: Entidad reconocida por la Autoridad de Protección de Datos Personales, que podrá, de manera no exclusiva, proporcionar certificaciones en materia de protección de datos personales. Fuente accesible al público: Bases de datos que pueden ser consultadas por cualquier persona, cuyo acceso es público, incondicional y generalizado. Responsable de tratamiento de datos personales: persona natural o jurídica, pública o privada, autoridad pública, u otro organismo, que solo o conjuntamente con otrosdecide sobre la finalidad y el tratamiento de datos personales.

    Sellos de protección de datos personales: Acreditación que otorga la entidad certificadora al responsable o al encargado del tratamiento de datos personales, de haber implementado mejores prácticas en sus procesos, con el objetivo de promover la confianza del titular, de conformidad con la normativa técnica emitida por la Autoridad de Protección de Datos Personales.

    Seudonimización: Tratamiento de datos personales de manera tal que ya no puedan atribuirse a un titular sin utilizar información adicional, siempre que dicha información adicional, figure por separado y esté sujeta a medidas técnicas y organizativas destinadas a garantizar que los datos personales no se atribuyan a una persona física identificada o identificable.

    Titular: Persona natural cuyos datos son objeto de tratamiento.

    Transferencia o comunicación: Manifestación, declaración, entrega, consulta, interconexión, cesión, transmisión, difusión, divulgación o cualquier forma de revelación de datos personales realizada a una persona distinta al titular, responsable o encargado del tratamiento de datos personales. Los datos personales que comuniquen deben ser exactos, completos y actualizados.

    Tratamiento: Cualquier operación o conjunto de operaciones realizadas sobre datos personales, ya sea por procedimientos técnicos de carácter automatizado, parcialmente automatizado o no automatizado, tales como: la recogida, recopilación, obtención, registro, organización, estructuración, conservación, custodia, adaptación, modificación, eliminación, indexación, extracción, consulta, elaboración, utilización, posesión, aprovechamiento, distribución, cesión, comunicación o transferencia, o cualquier otra forma de habilitación de acceso, cotejo, interconexión, limitación, supresión, destrucción y, en general, cualquier uso de datos personales.

    Vulneración de la seguridad de los datos personales: Incidente de seguridad que afecta la confidencialidad, disponibilidad o integridad de los datos personales.

    Artículo 5.- Integrantes del sistema de protección de datos personales

    Son parte del sistema de protección de datos personales, los siguientes:

    1) Titular;

    2) Responsable del tratamiento;

    3) Encargado del tratamiento;

    4) Destinatario;

    5) Autoridad de Protección de Datos Personales; y,

    6) Delegado de protección de datos personales.

    Artículo 6.- Normas aplicables al ejercicio de derechos

    El ejercicio de los derechos previstos en esta Ley se canalizarán a través del responsable del tratamiento, Autoridad de Protección de Datos Personales o jueces competentes, de conformidad con el procedimiento establecido en la presente Ley y su respectivo Reglamento de aplicación. El Reglamento a esta Ley u otra norma secundaria no podrán limitar al ejercicio de los derechos.

    Artículo 7.- Tratamiento legítimo de datos personas

    El tratamiento será legítimo y lícito si se cumple con alguna de las siguientes condiciones:

    1) Por consentimiento del titular para el tratamiento de sus datos personales, para una o varias finalidades específicas;

    2) Que sea realizado por el responsable del tratamiento en cumplimiento de una obligación legal;

    3) Que sea realizado por el responsable del tratamiento, por orden judicial, debiendo observarse los principios de la presente ley;

    4) Que el tratamiento de datos personales se sustente en el cumplimiento de una misión realizada en interés público o en el ejercicio de poderes públicos conferidos al responsable, derivados de una competencia atribuida por una norma con rango de ley, sujeto al cumplimiento de los estándares internacionales de derechos humanos aplicables a la materia, al cumplimiento de los principios de esta ley y a los criterios de legalidad, proporcionalidad y necesidad;

    5) Para la ejecución de medidas precontractuales a petición del titular o para el cumplimiento de obligaciones contractuales perseguidas por el responsable del tratamiento de datos personales, encargado del tratamiento de datos personales o por un tercero legalmente habilitado;

    6) Para proteger intereses vitales, del interesado o de otra persona natural, como su vida, salud o integridad;

    7) Para tratamiento de datos personales que consten en bases de datos de acceso público; u,

    8) Para satisfacer un interés legítimo del responsable de tratamiento o de tercero, siempre que no prevalezca el interés o derechos fundamentales de los titulares al amparo de lo dispuesto en esta norma.

    Artículo 8.- Consentimiento

    Se podrán tratar y comunicar datos personales cuando se cuente con la manifestación de la voluntad del titular para hacerlo. El consentimiento será válido, cuando la manifestación de la voluntad sea: Libre, es decir, cuando se encuentre exenta de vicios del consentimiento; Específica, en cuanto a la determinación concreta de los medios y fines del tratamiento; Informada, de modo que cumpla con el principio de transparencia y efectivice el derecho a la transparencia; Inequívoca, de manera que no presente dudas sobre el alcance de la autorización otorgada por el titular; El consentimiento podrá revocarse en cualquier momento sin que sea necesaria una justificación, para lo cual el responsable del tratamiento de datos personales establecerá mecanismos que garanticen celeridad, eficiencia, eficacia y gratuidad, así como un procedimiento sencillo, similar al proceder con el cual recabó el consentimiento.

    El tratamiento realizado antes de revocar el consentimiento es lícito, en virtud de que este no tiene efectos retroactivos. Cuando se pretenda fundar el tratamiento de los datos en el consentimiento del afectado para una pluralidad de finalidades será preciso que conste que dicho consentimiento se otorga para todas ellas.

    Artículo 9.- Interés legítimo

    Cuando el tratamiento de datos personales tiene como fundamento el interés legítimo:

    a) únicamente podrán ser tratados los datos que sean estrictamente necesarios para la realización de la finalidad.

    b) el responsable debe garantizar que el tratamiento sea transparente para el titular.

    c) la Autoridad de Protección de Datos puede requerir al responsable un informe con de riesgo para la protección de datos, en el cual se verificará si no hay amenazas concretas a las expectativas legítimas de los titulares y a sus derechos fundamentales.

    CAPÍTULO II. PRINCIPIOS

    Artículo 10.- Principios

    Sin perjuicio de otros principios establecidos en la Constitución de la República, los instrumentos internacionales ratificados por el Estado u otras normas jurídicas, la presente Ley se regirá por los principios de:

    A. Juridicidad.- Los datos personales deben tratarse con estricto apego y cumplimiento a los principios, derechos y obligaciones establecidas en la Constitución, los instrumentos internacionales, la presente Ley, su Reglamento y la demás normativa y jurisprudencia aplicable.

    B. Lealtad.- El tratamiento de datos personales deberá ser leal, por lo que para los titulares debe quedar claro que se están recogiendo, utilizando, consultando o tratando de otra manera, datos personales que les conciernen, así como las formas en que dichos datos son o serán tratados. En ningún caso los datos personales podrán ser tratados a través de medios o para fines, ilícitos o desleales.

    C. Transparencia.- El tratamiento de datos personales deberá ser transparente, por lo que toda información o comunicación relativa a este tratamiento deberá ser fácilmente accesible y fácil de entender y se deberá utilizar un lenguaje sencillo y claro. Las relaciones derivadas del tratamiento de datos personales deben ser transparentes y se rigen en función de las disposiciones contenidas en la presente Ley, su reglamento y demás normativa atinente a la materia.

    D. Finalidad.- Las finalidades del tratamiento deberán ser determinadas, explícitas, legítimas y comunicadas al titular; no podrán tratarse datos personales con fines distintos para los cuales fueron recopilados, a menos que concurra una de las causales que habiliten un nuevo tratamiento conforme los supuestos de tratamiento legítimo señalados en esta ley. El tratamiento de datos personales con fines distintos de aquellos para los que hayan sido recogidos inicialmente solo debe permitirse cuando sea compatible con los fines de su recogida inicial. Para ello, habrá de considerarse el contexto en el que se recogieron los datos, la información facilitada al titular en ese proceso y, en particular, las expectativas razonables del titular basadas en su relación con el responsable en cuanto a su uso posterior, la naturaleza de los datos personales, las consecuencias para los titulares del tratamiento ulterior previsto y la existencia de garantías adecuadas tanto en la operación de tratamiento original como en la operación de tratamiento ulterior prevista.

    E. Pertinencia y minimización de datos personales.- Los datos personales deben ser pertinentes y estar limitados a lo estrictamente necesario para el cumplimiento de la finalidad del tratamiento.

    F. Proporcionalidad del tratamiento.- El tratamiento debe ser adecuado, necesario, oportuno, relevante y no excesivo con relación a las finalidades para las cuales hayan sido recogidos o a la naturaleza misma de las categorías especiales de datos.

    G. Confidencialidad.- El tratamiento de datos personales debe concebirse sobre la base del debido sigilo y secreto, es decir, no debe tratarse o comunicarse para un fin distinto para el cual fueron recogidos, a menos que concurra una de las causales que habiliten un nuevo tratamiento conforme los supuestos de tratamiento legítimo señalados en esta ley. Para tal efecto, el responsable del tratamiento deberá adecuar las medidas técnicas organizativas para cumplir con este principio.

    H. Calidad y exactitud.- Los datos personales que sean objeto de tratamiento deben ser exactos, íntegros, precisos, completos, comprobables, claros; y, de ser el caso, debidamente actualizados; de tal forma que no se altere su veracidad. Se adoptarán todas las medidas razonables para que se supriman o rectifiquen sin dilación los datos personales que sean inexactos con respecto a los fines para los que se tratan.

    En caso de tratamiento por parte de un encargado, la calidad y exactitud será obligación del responsable del tratamiento de datos personales.

    Siempre que el responsable del tratamiento haya adoptado todas las medidas razonables para que se supriman o rectifiquen sin dilación, no le será imputable la inexactitud de los datos personales, con respecto a los fines para los que se tratan, cuando los datos inexactos:

    a) Hubiesen sido obtenidos por el responsable directamente del titular.

    b) Hubiesen sido obtenidos por el responsable de un intermediario en caso de que las normas aplicables al sector de actividad al que pertenezca el responsable del tratamiento establecieran la posibilidad de intervención de un intermediario que recoja en nombre propio los datos de los afectados para su transmisión al responsable.

    c) Fuesen obtenidos de un registro público por el responsable.

    I. Conservación.- Los datos personales serán conservados durante un tiempo no mayor al necesario para cumplir con la finalidad de su tratamiento. Para garantizar que los datos personales no se conserven más tiempo del necesario, el responsable del tratamiento establecerá plazos para su supresión o revisión periódica. La conservación ampliada de tratamiento de datos personales únicamente se realizará con fines de archivo en interés público, fines de investigación científica, histórica o estadística, siempre y cuando se establezcan las garantías de seguridad y protección de datos personales, oportunas y necesarias, para salvaguardar los derechos previstos en esta norma.

    J. Seguridad de datos personales.- Los responsables y encargados de tratamiento de los datos personales deberán implementar todas las medidas de seguridad adecuadas y necesarias, entendiéndose por tales las aceptadas por el estado de la técnica, sean estas organizativas, técnicas o de cualquier otra índole, para proteger los datos personales frente a cualquier riesgo, amenaza, vulnerabilidad, atendiendo a la naturaleza de los datos de carácter personal, al ámbito y el contexto.

    K. Responsabilidad proactiva y demostrada.- El responsable del tratamiento de datos personales deberá acreditar el haber implementado mecanismos para la protección de datos personales; es decir, el cumplimiento de los principios, derechos y obligaciones establecidos en la presente Ley, para lo cual, además de lo establecido en la normativa aplicable, podrá valerse de estándares, mejores prácticas, esquemas de auto y coregulación, códigos de protección, sistemas de certificación, sellos de protección de datos personales o cualquier otro mecanismo que se determine adecuado a los fines, la naturaleza del dato personal o el riesgo del tratamiento. El responsable del tratamiento de datos personales está obligado a rendir cuentas sobre el tratamiento al titular y a la Autoridad de Protección de Datos Personales. El responsable del tratamiento de datos personales deberá evaluar y revisar los mecanismos que adopte para cumplir con el principio de responsabilidad de forma continua y permanente, con el objeto de mejorar su nivel de eficacia en cuanto a la aplicación de la presente Ley.

    L. Aplicación favorable al titular.- En caso de duda sobre el alcance de las disposiciones del ordenamiento jurídico o contractuales, aplicables a la protección de datos personales, los funcionarios judiciales y administrativos las interpretarán y aplicarán en el sentido más favorable al titular de dichos datos.

    M. Independencia del control.- Para el efectivo ejercicio del derecho a la protección de datos personales, y en cumplimiento de las obligaciones de protección de los derechos que tiene el Estado, la Autoridad de Protección de Datos deberá ejercer un control independiente, imparcial y autónomo, así como llevar a cabo las respectivas acciones de prevención, investigación y sanción.

    CAPÍTULO III. DERECHOS

    Artículo 11.- Normativa especializada

    Los datos personales cuyo tratamiento se encuentre regulado en normativa especializada en materia de ejercicio de la libertad de expresión, sectores regulados por normativa específica, gestión de riesgos, desastres naturales, seguridad nacional y defensa del Estado; y, los datos personales que deban proporcionarse a autoridades administrativas o judiciales en virtud de solicitudes y órdenes amparadas en competencias atribuidas en la normativa vigente, estarán sujetos a los principios establecidos en sus propias normas y los principios establecidos en esta Ley, en los casos que corresponda y sea de aplicación favorable. En todo caso deberá darse cumplimiento a los estándares internacionales en la materia de derechos humanos y a los principios de esta ley, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad.

    Artículo 12.- Derecho a la información

    El titular de datos personales tiene derecho a ser informado conforme los principios de lealtad y transparente por cualquier medio sobre:

    1) Los fines del tratamiento;

    2) La base legal para el tratamiento;

    3) Tipos de tratamiento;

    4) Tiempo de conservación;

    5) La existencia de una base de datos en la que constan sus datos personales;

    6) El origen de los datos personales cuando no se hayan obtenido directamente del titular;

    7) Otras finalidades y tratamientos ulteriores;

    8) Identidad y datos de contacto del responsable del tratamiento de datos personales, que incluirá: dirección del domicilio legal, número de teléfono y correo electrónico;

    9) Cuando sea del caso, identidad y datos de contacto del delegado de protección de datos personales, que incluirá: dirección domiciliaria, número de teléfono y correo electrónico;

    10) Las transferencias o comunicaciones, nacionales o internacionales, de datos personales que pretenda realizar, incluyendo los destinatarios y sus clases, así como las finalidades que motivan la realización de estas y las garantías de protección establecidas;

    11) Las consecuencias para el titular de los datos personales de su entrega o negativa a ello;

    12) El efecto de suministrar datos personales erróneos o inexactos;

    13) La posibilidad de revocar el consentimiento;

    14) La existencia y forma en que pueden hacerse efectivos sus derechos de acceso, eliminación, rectificación y actualización, oposición, anulación, limitación del tratamiento y a no ser objeto de una decisión basada únicamente en valoraciones automatizadas.

    15) Los mecanismos para hacer efectivo su derecho a la portabilidad, cuando el titular lo solicite;

    16) Dónde y cómo realizar sus reclamos ante el responsable del tratamiento de datos personales y la Autoridad de Protección de Datos Personales, y;

    17) La existencia de valoraciones y decisiones automatizadas, incluida la elaboración de perfiles.

    En el caso que los datos se obtengan directamente del titular, la información deberá ser comunicada de forma previa a este, es decir, en el momento mismo de la recogida del dato personal. Cuando los datos personales no se obtuvieren de forma directa del titular o fueren obtenidos de una fuente accesible al público, el titular deberá ser informado dentro de los siguientes treinta (30) días o al momento de la primera comunicación con el titular, cualquiera de las dos circunstancias que ocurra primero. Se le deberá proporcionar información expresa, inequívoca, transparente, inteligible, concisa, precisa y sin barreras técnicas.

    La información proporcionada al titular podrá transmitirse de cualquier modo comprobable en un lenguaje claro, sencillo y de fácil comprensión, de preferencia propendiendo a que pueda ser accesible en la lengua de su elección.

    En el caso de productos o servicios dirigidos, utilizados o que pudieran ser utilizados por niñas, niños y adolescentes, la información a la que hace referencia el presente artículo será proporcionada a su representante legal conforme a lo dispuesto en la presente Ley.

    Artículo 13.- Derecho de acceso

    El titular tiene derecho a conocer y a obtener, gratuitamente, del responsable de tratamiento acceso a todos sus datos personales y a la información detallada en el artículo precedente, sin necesidad de presentar justificación alguna. El responsable del tratamiento de datos personales deberá establecer métodos razonables que permitan el ejercicio de este derecho, el cual deberá ser atendido dentro del plazo de quince (15) días. El derecho de acceso no podrá ejercerse de forma tal que constituya abuso del derecho.

    Artículo 14.- Derecho de rectificación y actualización

    El titular tiene el derecho a obtener del responsable del tratamiento la rectificación y actualización de sus datos personales inexactos o incompletos.

    Para tal efecto, el titular deberá presentar los justificativos del caso, cuando sea pertinente. El responsable de tratamiento deberá atender el requerimiento en un plazo de quince (15) días y en este mismo plazo, deberá informar al destinatario de los datos, de ser el caso, sobre la rectificación, a fin de que lo actualice.

    Artículo 15.- Derecho de eliminación

    El titular tiene derecho a que el responsable del tratamiento suprima sus datos personales, cuando:

    1) El tratamiento no cumpla con los principios establecidos en la presente ley;

    2) El tratamiento no sea necesario o pertinente para el cumplimiento de la finalidad;

    3) Los datos personales hayan cumplido con la finalidad para la cual fueron recogidos o tratados;

    4) Haya vencido el plazo de conservación de los datos personales;

    5) El tratamiento afecte derechos fundamentales o libertades individuales;

    6) Revoque el consentimiento prestado o señale no haberlo otorgado para uno o varios fines específicos, sin necesidad de que medie justificación alguna; o,

    7) Exista obligación legal.

    El responsable del tratamiento de datos personales implementará métodos y técnicas orientadas a eliminar, hacer ilegible, o dejar irreconocibles de forma definitiva y segura los datos personales. Esta obligación la deberá cumplir en el plazo de quince (15) días de recibida la solicitud por parte del titular y será gratuito.

    Artículo 16.- Derecho de oposición

    El titular tiene el derecho a oponerse o negarse al tratamiento de sus datos personales, en los siguientes casos:

    1) No se afecten derechos y libertades fundamentales de terceros, la ley se lo permita y no se trate de información pública, de interés público o cuyo tratamiento está ordenado por la ley.

    2) El tratamiento de datos personales tenga por objeto la mercadotecnia directa; el interesado tendrá derecho a oponerse en todo momento al tratamiento de los datos personales que le conciernan, incluida la elaboración de perfiles; en cuyo caso los datos personales dejarán de ser tratados para dichos fines.

    3) Cuando no sea necesario su consentimiento para el tratamiento como consecuencia de la concurrencia de un interés legítimo, previsto en el artículo 7, y se justifique en una situación concreta personal del titular, siempre que una ley no disponga lo contrario.

    El responsable de tratamiento dejará de tratar los datos personales en estos casos, salvo que acredite motivos legítimos e imperiosos para el tratamiento que prevalezcan sobre los intereses, los derechos y las libertades del titular, o para la formulación, el ejercicio o la defensa de reclamaciones.

    Esta solicitud deberá ser atendida dentro del plazo de quince (15) días

    Artículo 17.- Derecho a la portabilidad

    El titular tiene el derecho a recibir del responsable del tratamiento, sus datos personales en un formato compatible, actualizado, estructurado, común, inter-operable y de lectura mecánica, preservando sus características; o a transmitirlos a otros responsables. La Autoridad de Protección de Datos Personales deberá dictar la normativa para el ejercicio del derecho a la portabilidad.

    El titular podrá solicitar que el responsable del tratamiento realice la transferencia o comunicación de sus datos personales a otro responsable del tratamiento en cuanto fuera técnicamente posible y sin que el responsable pueda aducir impedimento de cualquier orden con el fin de ralentizar el acceso, la transmisión o reutilización de datos por parte del titular o de otro responsable del tratamiento. Luego de completada la transferencia de datos, el responsable que lo haga procederá a su eliminación, salvo que el titular disponga su conservación. El responsable que ha recibido la información asumirá las responsabilidades contempladas en esta Ley. Para que proceda el derecho a la portabilidad de datos es necesario que se produzca al menos una de las siguientes condiciones:

    1) Que el titular haya otorgado su consentimiento para el tratamiento de sus datos personales para uno o varios fines específicos. La transferencia o comunicación se hará entre responsables del tratamiento de datos personales cuando la operación sea técnicamente posible; en caso contrario los datos deberán ser transmitidos directamente al titular.

    2) Que el tratamiento se efectúe por medios automatizados;

    3) Que se trate de un volumen relevante de datos personales, según los parámetros definidos en el reglamento de la presente ley; o,

    4) Que el tratamiento sea necesario para el cumplimiento de obligaciones y el ejercicio de derechos del responsable o encargado del tratamiento de datos personales, o del titular en el ámbito del derecho laboral y seguridad social.

    Esta transferencia o comunicación debe ser económica y financieramente eficiente, expedita y sin trabas.

    No procederá este derecho cuando se trate de información inferida, derivada, creada, generada u obtenida a partir del análisis o tratamiento efectuado por el responsable del tratamiento de datos personales con base en los datos personales proporcionados por el titular, como es el caso de los datos personales que hubieren sido sometidos a un proceso de personalización, recomendación, categorización o creación de perfiles.

    Artículo 18.- Excepciones a los derechos de rectificación, actualización, eliminación, oposición, anulación y portabilidad

    Excepciones a los derechos de rectificación, actualización, eliminación, oposición, anulación y portabilidad. No proceden los derechos de rectificación, actualización, eliminación, oposición, anulación y portabilidad, en los siguientes casos:

    1) Si el solicitante no es el titular de los datos personales o su representante legal no se encuentre debidamente acreditado;

    2) Cuando los datos son necesarios para el cumplimiento de una obligación legal o contractual;

    3) Cuando los datos son necesarios para el cumplimiento de una orden judicial, resolución o mandato motivado de autoridad pública competente;

    4) Cuando los datos son necesarios para la formulación, ejercicio o defensa de reclamos o recursos;

    5) Cuando se pueda causar perjuicios a derechos o afectación a intereses legítimos de terceros y ello sea acreditado por el Responsable de la base de datos al momento de dar respuesta al titular a su solicitud de ejercicio del derecho respectivo;

    6) Cuando se pueda obstaculizar actuaciones judiciales o administrativas en curso, debidamente notificadas;

    7) Cuando los datos son necesarios para ejercer el derecho a la libertad de expresión y opinión;

    8) Cuando los datos son necesarios para proteger el interés vital del interesado o de otra persona natural;

    9) En los casos en los que medie el interés público, sujeto al cumplimiento de los estándares internacionales de derechos humanos aplicables a la materia, al cumplimiento de los principios de esta ley y a los criterios de legalidad, proporcionalidad y necesidad;

    10) En el tratamiento de datos personales que sean necesarios para el archivo de información que constituya patrimonio del Estado, investigación científica, histórica o estadística.

    Artículo 19.- Derecho a la suspensión del tratamiento

    El titular tendrá derecho a obtener del responsable del tratamiento la suspensión del tratamiento de los datos, cuando se cumpla alguna de las condiciones siguientes:

    1) Cuando el titular impugne la exactitud de los datos personales, mientras el responsable de tratamiento verifica la exactitud de los mismos;

    2) El tratamiento sea ilícito y el interesado se oponga a la supresión de los datos personales y solicite en su lugar la limitación de su uso;

    3) El responsable ya no necesite los datos personales para los fines del tratamiento, pero el interesado los necesite para la formulación, el ejercicio o la defensa de reclamaciones; y,

    4) Cuando el interesado se haya opuesto al tratamiento en virtud del artículo 31 de la presente ley, mientras se verifica si los motivos legítimos del responsable prevalecen sobre los del interesado.

    De existir negativa por parte del responsable o encargado del tratamiento de datos personales, y el titular recurra por dicha decisión ante la Autoridad de Protección de Datos Personales, esta suspensión se extenderá hasta la resolución del procedimiento administrativo.

    Cuando el titular impugne la exactitud de los datos personales, mientras el responsable de tratamiento verifica la exactitud de los mismos, deberá colocarse en la base de datos, en donde conste la información impugnada, que ésta ha sido objeto de inconformidad por parte del titular. El responsable de tratamiento podrá tratar los datos personales, que han sido objeto del ejercicio del presente derecho por parte del titular, únicamente, en los siguientes supuestos: para la formulación, el ejercicio o la defensa de reclamaciones; con el objeto de proteger los derechos de otra persona natural o jurídica o por razones de interés público importante.

    Artículo 20.- Derecho a no ser objeto de una decisión basada única o parcialmente en valoraciones automatizadas

    El titular tiene derecho a no ser sometido a una decisión basada única o parcialmente en valoraciones que sean producto de procesos automatizados, incluida la elaboración de perfiles, que produzcan efectos jurídicos en él o que atenten contra sus derechos y libertades fundamentales, para lo cual podrá:

    a. Solicitar al responsable del tratamiento una explicación motivada sobre la decisión tomada por el responsable o encargado del tratamiento de datos personales;

    b. Presentar observaciones;

    c. Solicitar los criterios de valoración sobre el programa automatizado; o,

    d. Solicitar al responsable información sobre los tipos de datos utilizados y la fuente de la cual han sido obtenidos los mismos; e. Impugnar la decisión ante el responsable o encargado del tratamiento

    No se aplicará este derecho cuando:

    1. La decisión es necesaria para la celebración o ejecución de un contrato entre el titular y el responsable o encargado del tratamiento de datos personales;

    2. Está autorizada por la normativa aplicable, orden judicial, resolución o mandato motivado de autoridad técnica competente, para lo cual se deberá establecer medidas adecuadas para salvaguardar los derechos fundamentales y libertades del titular; o,

    3. Se base en el consentimiento explicito del titular.

    4. La decisión no conlleve impactos graves o riesgos verificables para el titular. No se podrá exigir la renuncia a este derecho en forma adelantada a través de contratos de adhesión masivos.

    A más tardar en el momento de la primera comunicación con el titular de los datos personales, para informar una decisión basada únicamente en valoraciones automatizadas, este derecho le será informado explícitamente por cualquier medio idóneo.

    Artículo 21.- Derecho de niñas, niños y adolescentes a no ser objeto de una decisión basada única o parcialmente en valoraciones automatizadas

    Además de los presupuestos establecidos en el derecho a no ser objeto de una decisión basada única o parcialmente en valoraciones automatizadas, no se podrán tratar datos sensibles o datos de niñas, niños y adolescentes a menos que se cuente con la autorización expresa del titular o de su representante legal; o, cuando dicho tratamiento esté destinado a salvaguardar un interés público esencial, el cual se evalúe en atención a los estándares internacionales de derechos humanos, y como mínimo satisfaga los criterios de legalidad, proporcionalidad y necesidad, y además incluya salvaguardas específicas para proteger los derechos fundamentales de los interesados. Los adolescentes, en ejercicio progresivo de sus derechos, a partir de los 15 años, podrán otorgar, en calidad de titulares, su consentimiento explícito para el tratamiento de sus datos personales, siempre que se les especifique con claridad sus fines.

    Artículo 22.- Derecho de consulta

    Las personas tienen derecho a la consulta pública y gratuita ante el Registro Nacional de Protección de Datos Personales, de conformidad con la presente Ley.

    Artículo 23. Derecho a la educación digital

    Las personas tienen derecho al acceso y disponibilidad del conocimiento, aprendizaje, preparación, estudio, formación, capacitación, enseñanza e instrucción relacionados con el uso y manejo adecuado, sano, constructivo, seguro y responsable de las tecnologías de la información y comunicación, en estricto apego a la dignidad e integridad humana, los derechos fundamentales y libertades individuales con especial énfasis en la intimidad, la vida privada, autodeterminación informativa, identidad y reputación en línea, ciudadanía digital y el derecho a la protección de datos personales, así como promover una cultura sensibilizada en el derecho de protección de datos personales.

    El derecho a la educación digital tendrá un carácter inclusivo sobre todo en lo que respecta a las personas con necesidades educativas especiales.

    El sistema educativo nacional, incluyendo el sistema de educación superior, garantizará la educación digital no solo a favor de los estudiantes de todos los niveles sino también de los docentes, debiendo incluir dicha temática en su proceso de formación.

    Artículo 24.- Ejercicio de derechos

    El Estado, entidades educativas, organizaciones de la sociedad civil, proveedores de servicios de la sociedad de la información y el conocimiento, y otros entes relacionados, dentro del ámbito de sus relaciones, están obligados a proveer información y capacitación relacionadas con el uso y tratamiento responsable, adecuado y seguro de datos personales de niñas, niños y adolescentes, tanto a sus titulares como a sus representantes legales, de conformidad con la normativa técnica emitida por la Autoridad de Protección de Datos Personales.

    Los adolescentes mayores de doce (12) años y menores de quince (15) años, así como las niñas y niños, para el ejercicio de sus derechos necesitarán de su representante legal. Los adolescentes mayores de quince (15) años y menores de dieciocho (18) años, podrán ejercitarlos de forma directa ante la Autoridad de Protección de Datos Personales o ante el responsable de la base de datos personales del tratamiento.

    Los derechos del titular son irrenunciables. Será nula toda estipulación en contrario.

    CAPÍTULO IV. CATEGORÍAS ESPECIALES DE DATOS

    Artículo 25.- Categorías especiales de datos personales

    Se considerarán categorías especiales de datos personales, los siguientes:

    a) Datos sensibles;

    b) Datos de niñas, niños y adolescentes;

    c) Datos de salud; y,

    d) Datos de personas con discapacidad y de sus sustitutos, relativos a la discapacidad.

    Artículo 26.- Tratamiento de datos sensibles

    Queda prohibido el tratamiento de datos personales sensibles salvo que concurra alguna de las siguientes circunstancias:

    a) El titular haya dado su consentimiento explícito para el tratamiento de sus datos personales, especificandose claramente sus fines.

    b) El tratamiento es necesario para el cumplimiento de obligaciones y el ejercicio de derechos específicos del responsable del tratamiento o del titular en el ámbito del Derecho laboral y de la seguridad y protección social.

    c) El tratamiento es necesario para proteger intereses vitales del titular o de otra persona natural, en el supuesto de que el titular no esté capacitado, física o jurídicamente, para dar su consentimiento.

    d) El tratamiento se refiere a datos personales que el titular ha hecho manifiestamente públicos.

    e) El tratamiento se lo realiza por orden de autoridad judicial.

    f) El tratamiento es necesario con fines de archivo en interés público, fines de investigación científica o histórica o fines estadísticos, que debe ser proporcional al objetivo perseguido, respetar en lo esencial el derecho a la protección de datos y establecer medidas adecuadas y específicas para proteger los intereses y derechos fundamentales del titular.

    g) Cuando el tratamiento de los datos de salud se sujete a las disposiciones contenidas en la presente ley.

    Artículo 27.- Datos personales de personas fallecidas

    Los titulares de derechos sucesorios de las personas fallecidas, podrán dirigirse al responsable del tratamiento de datos personales con el objeto de solicitar el acceso, rectificación y actualización o eliminación de los datos personales del causante, siempre que el titular de los datos no haya, en vida, indicado otra utilización o destino para sus datos.

    Las personas o instituciones que la o el fallecido haya designado expresamente para ello, podrán también solicitar con arreglo a las instrucciones recibidas, el acceso a los datos personales de éste; y, en su caso, su rectificación, actualización o eliminación.

    En caso de fallecimiento de niñas, niños, adolescentes o personas que la ley reconozca como incapaces, las facultades de acceso, rectificación, actualización o eliminación, podrán ser ejercidas por quien hubiese sido su último representante legal. El Reglamento a la presente ley establecerá los mecanismos para el ejercicio de las facultades enunciadas en el presente artículo.

    Artículo 28.- Datos crediticios

    Salvo prueba en contrario será legítimo y lícito el tratamiento de datos destinados a informar sobre la solvencia patrimonial o crediticia, incluyendo aquellos relativos al cumplimiento o incumplimiento de obligaciones de carácter comercial o crediticia que permitan evaluar la concertación de negocios en general, la conducta comercial o la capacidad de pago del titular de los datos, en aquellos casos en que los mismos sean obtenidos de fuentes de acceso público o procedentes de informaciones facilitadas por el acreedor. Tales datos pueden ser utilizados solamente para esa finalidad de análisis y no serán comunicados o difundidos, ni podrán tener cualquier finalidad secundaria.

    La protección de datos personales crediticios se sujetará a lo previsto en la presente ley, en la legislación especializada sobre la materia y demás normativa dictada por la Autoridad de Protección de Datos Personales.

    Sin perjuicio de lo anterior, en ningún caso podrán comunicarse los datos crediticios relativos a obligaciones de carácter económico, financiero, bancario o comercial una vez transcurridos cinco años desde que la obligación a la que se refieran se haya hecho exigible.

    Artículo 29- Derechos de los Titulares de Datos Crediticios

    1. Sin perjuicio de los derechos reconocidos en esta Ley, los Titulares de Datos Crediticios tienen los siguientes derechos:

    a) Acceder de forma personal a la información de la cual son titulares;

    b) Que el reporte de crédito permita conocer de manera clara y precisa la condición en que se encuentra su historial crediticio; y,

    c) Que las fuentes de información actualicen, rectifiquen o eliminen, según el caso, la información que fuese ilícita, falsa, inexacta, errónea, incompleta o caduca

    2. Sobre el derecho de acceso por el Titular del Dato Crediticio, éste será gratuito, cuantas veces lo requiera, respecto de la información que sobre sí mismos esté registrada ante los prestadores de servicios de referencia crediticia y a través de los siguientes mecanismos:

    a) Observación directa a través de pantallas que los prestadores del servicio de referencia crediticia pondrán a disposición de dichos titulares; y,

    b) Entrega de impresiones de los reportes que a fin de que el Titular del Dato Crediticio compruebe la veracidad y exactitud de su contenido, sin que pueda ser utilizado con fines crediticios o comerciales.

    3. Sobre los derechos de actualización, rectificación o eliminación, el Titular del Dato Crediticio podrá exigir estos derechos frente a las fuentes de información mediante solicitud escrita. Las fuentes de información, dentro del plazo de quince días de presentada la solicitud, deberán resolverla admitiéndola o rechazándola motivadamente. El Titular del Dato Crediticio tiene derecho a solicitar a los prestadores del servicio de referencias crediticias que, en tanto se sigue el proceso de revisión, señalen en los reportes de crédito que emitan, que la información materia de la solicitud está siendo revisada a pedido del titular.

    Artículo 30.- Datos relativos a la salud

    Las instituciones que conforman el Sistema Nacional de Salud y los profesionales de la salud pueden recolectar y tratar los datos relativos a la salud de sus pacientes que estén o hubiesen estado bajo tratamiento de aquellos, de acuerdo a lo previsto en la presente ley, en la legislación especializada sobre la materia y demás normativa dictada por la Autoridad de Protección de Datos Personales en coordinación con la autoridad sanitaria nacional. Los responsables y encargados del tratamiento de datos así como todas las personas que intervengan en cualquier fase de este, estarán sujetas al deber de confidencialidad, de tal manera que se garantice una seguridad adecuada de los datos personales, incluida la protección contra el tratamiento no autorizado o ilícito y contra su pérdida, destrucción o daño accidental, mediante la aplicación de medidas técnicas organizativas apropiadas. Esta obligación será complementaria del secreto profesional de conformidad con cada caso. Las obligaciones establecidas en los apartados anteriores se mantendrán aun cuando hubiese finalizado la relación del obligado con el responsable o encargado del tratamiento. No se requerirá el consentimiento del titular para el tratamiento de datos de salud cuando ello sea necesario por razones de interés público esencial en el ámbito de la salud, el que en todo caso deberá ser proporcional al objetivo perseguido, respetar en lo esencial el derecho a la protección de datos y establecer medidas adecuadas y específicas para proteger los intereses y derechos fundamentales del titular; Asimismo, tampoco se requerirá el consentimiento del titular cuando el tratamiento sea necesario por razones de interés público en el ámbito de la salud pública, como en el caso de amenazas transfronterizas graves para la salud, o para garantizar elevados niveles de calidad y de seguridad de la asistencia sanitaria y de los medicamentos o productos sanitarios, siempre y cuando se establezcan medidas adecuadas y específicas para proteger los derechos y libertades del titular y, en particular, el secreto profesional.

    Artículo 31.- Tratamiento de datos relativos a la salud

    Todo tratamiento de datos relativos a la salud deberán cumplir con los siguientes parámetros mínimos y aquellos que determine la Autoridad de Protección de Datos Personales en la normativa emitida para el efecto:

    1. Los datos relativos a la salud generados en establecimientos de salud públicos o privados, serán tratados cumpliendo los principios de confidencialidad y secreto profesional. El titular de la información deberá brindar su consentimiento previo conforme lo determina esta Ley, salvo en los casos en que el tratamiento sea necesario para proteger intereses vitales del interesado, en el supuesto de que el interesado no esté capacitado, física o jurídicamente, para dar su consentimiento; o sea necesario para fines de medicina preventiva o laboral, evaluación de la capacidad laboral del trabajador, diagnóstico médico, prestación de asistencia o tratamiento de tipo sanitario o social, o gestión de los sistemas y servicios de asistencia sanitaria y social, sobre la base de la legislación especializada sobre la materia o en virtud de un contrato con un profesional sanitario. En este último caso el tratamiento sólo podrá ser realizado por un profesional sujeto a la obligación de secreto profesional, o bajo su responsabilidad, de acuerdo con la legislación especializada sobre la materia o con las demás normas que al respecto pueda establecer la Autoridad.

    2. Los datos relativos a la salud que se traten, siempre que sea posible, deberán ser previamente anonimizados o seudonimizados, evitando la posibilidad de identificar a los titulares de los mismos.

    3. Todo tratamiento de datos de salud anonimizados deberá ser autorizado previamente por la Autoridad de Protección de Datos Personales. Para obtener la autorización mencionada, el interesado deberá presentar un protocolo técnico que contenga los parámetros necesarios que garanticen la protección de dichos datos y el informe previo favorable emitido por la Autoridad Sanitaria.

    Artículo 32.- Tratamiento de datos de salud por entes privados y públicos con fines de investigación

    Los datos relativos a salud que consten en las instituciones que conforman el Sistema Nacional de Salud, podrán ser tratados por personas naturales y jurídicas privadas y públicas con fines de investigación científica, siempre que según el caso encuentren anonimizados, o dicho tratamiento sea autorizado por la Autoridad de Protección de Datos Personales, previo informe de la Autoridad Sanitaria Nacional.

    CAPÍTULO V. TRANSFERENCIA O COMUNICACIÓN Y ACCESO A DATOS PERSONALES POR TERCEROS

    Artículo 33.- Transferencia o comunicación de datos personales

    Los datos personales podrán transferirse o comunicarse a terceros cuando se realice para el cumplimiento de fines directamente relacionados con las funciones legítimas del responsable y del destinatario, cuando la transferencia se encuentre configurada dentro de una de las causales de legitimidad establecidas en esta Ley, y se cuente, además, con el consentimiento del titular. Se entenderá que el consentimiento es informado cuando para la transferencia o comunicación de datos personales el Responsable del tratamiento haya entregado información suficiente al titular que le permita conocer la finalidad a que se destinarán sus datos y el tipo de actividad del tercero a quien se pretende transferir o comunicar dichos datos.

    Artículo 34.- Acceso a datos personales por parte del encargado

    No se considerará transferencia o comunicación en el caso de que el encargado acceda a datos personales para la prestación de un servicio al responsable del tratamiento de datos personales. El tercero que ha accedido legítimamente a datos personales en estas consideraciones, será considerado encargado del tratamiento.

    El tratamiento de datos personales realizado por el encargado deberá estar regulado por un contrato, en el que se establezca de manera clara y precisa que el encargado del tratamiento de datos personales tratará únicamente los mismos conforme las instrucciones del responsable y que no los utilizará para finalidades diferentes a las señaladas en el contrato, ni que los transferirá o comunicará ni siquiera para su conservación a otras personas.

    Una vez que se haya cumplido la prestación contractual, los datos personales deberán ser destruidos o devueltos al responsable del tratamiento de datos personales bajo la supervisión de la Autoridad de Protección de Datos Personales.

    El encargado será responsable de las infracciones derivadas del incumplimiento de las condiciones de tratamiento de datos personales establecidas en la presente ley.

    Artículo 35.- Acceso a datos personales por parte de terceros

    No se considerará transferencia o comunicación cuando el acceso a datos personales por un tercero sea necesario para la prestación de un servicio al responsable del tratamiento de datos personales. El tercero que ha accedido a datos personales en estas condiciones debió hacerlo legítimamente.

    El tratamiento de datos personales realizado por terceros deberá estar regulado por un contrato, en el que se establezca de manera clara y precisa que el encargado del

    tratamiento de datos personales tratará únicamente los mismos conforme las instrucciones del responsable y que no los utilizará para finalidades diferentes a las señaladas en el contrato, ni que los transferirá o comunicará ni siquiera para su conservación a otras personas.

    Una vez que se haya cumplido la prestación contractual, los datos personales deberán ser destruidos o devueltos al responsable del tratamiento de datos personales bajo la supervisión de la autoridad de protección de datos personales.

    El tercero será responsable de las infracciones derivadas del incumplimiento de las condiciones de tratamiento de datos personales establecidas en la presente ley.

    Artículo 36.- Excepciones de consentimiento para la transferencia o comunicación de datos personales

    No es necesario contar con el consentimiento del titular para la transferencia o comunicación de datos personales, en los siguientes supuestos:

    1) Cuando los datos han sido recogidos de fuentes accesibles al público;

    2) Cuando el tratamiento responda a la libre y legítima aceptación de una relación jurídica entre el responsable de tratamiento y el titular, cuyo desarrollo, cumplimiento y control implique necesariamente la conexión de dicho tratamiento con base de datos. En este caso la transferencia o comunicación sólo será legítima en cuanto se limite a la finalidad que la justifique;

    3) Cuando los datos personales deban proporcionarse a autoridades administrativas o judiciales en virtud de solicitudes y órdenes amparadas en competencias atribuidas en la norma vigente;

    4) Cuando la comunicación se produzca entre Administraciones Públicas y tenga por objeto el tratamiento posterior de datos con fines históricos, estadísticos o científicos, siempre y cuando dichos datos se encuentren debidamente disociados o a lo menos anonimizados, y,

    5) Cuando la comunicación de datos de carácter personal relativos a la salud sea necesaria para solucionar una urgencia que implique intereses vitales de su titular y este se encontrare impedido de otorgar su consentimiento.

    6) Cuando la comunicación de datos de carácter personal relativos a la salud sea necesaria para realizar los estudios epidemiológicos de interés público, dando cumplimiento a los estándares internacionales en la materia de derechos humanos, y como mínimo a los criterios de legalidad, proporcionalidad y necesidad. El tratamiento deberá ser de preferencia anonimizado, y en todo caso agregado, una vez pasada la urgencia de interés público. Cuando sea requerido el consentimiento del titular para que sus datos personales sean comunicados a un tercero, este puede revocarlo en cualquier momento, sin necesidad de que medie justificación alguna. La presente ley obligatoriamente debe ser aplicada por el destinatario, por el solo hecho de la comunicación de los datos; a menos que estos hayan sido anonimizados o sometidos a un proceso de

    CAPÍTULO VI. SEGURIDAD DE DATOS PERSONALES

    Artículo 37.- Seguridad de datos personales

    El responsable o encargado del tratamiento de datos personales según sea el caso, deberá sujetarse al principio de seguridad de datos personales, para lo cual deberá tomar en cuenta las categorías y volumen de datos personales, el estado de la técnica, mejores prácticas de seguridad integral y los costos de aplicación de acuerdo a la naturaleza, alcance, contexto y los fines del tratamiento, así como identificar la probabilidad de riesgos.

    El responsable o encargado del tratamiento de datos personales, deberá implementar un proceso de verificación, evaluación y valoración continua y permanente de la eficiencia, eficacia y efectividad de las medidas de carácter técnico, organizativo y de cualquier otra índole, implementadas con el objeto de garantizar y mejorar la seguridad del tratamiento de datos personales. El responsable o encargado del tratamiento de datos personales deberá evidenciar que las medidas adoptadas e implementadas mitiguen de forma adecuada los riesgos identificados. Entre otras medidas, se podrán incluir las siguientes:

    1) Medidas de anonimización, seudonomización o cifrado de datos personales;

    2) Medidas dirigidas a mantener la confidencialidad, integridad y disponibilidad permanentes de los sistemas y servicios del tratamiento de datos personales y el acceso a los datos personales, de forma rápida en caso de incidentes; y

    3) Medidas dirigidas a mejorar la resiliencia técnica, física, administrativa, y jurídica.

    4) Los responsables y encargados del tratamiento de datos personales, podrán acogerse a estándares internacionales para una adecuada gestión de riesgos enfocada a la protección de derechos y libertades, así como para la implementación y manejo de sistemas de seguridad de la información o a códigos de conducta reconocidos y autorizados por la Autoridad de Protección de Datos Personales.

    Artículo 38.- Medidas de seguridad en el ámbito del sector público

    El mecanismo gubernamental de seguridad de la información deberá incluir las medidas que deban implementarse en el caso de tratamiento de datos personales para hacer frente a cualquier riesgo, amenaza, vulnerabilidad, accesos no autorizados, pérdidas, alteraciones, destrucción o comunicación accidental o ilícita en el tratamiento de los datos conforme al principio de seguridad de datos personales.

    El mecanismo gubernamental de seguridad de la información abarcará y aplicará a todas las instituciones del sector público, contenidas en el artículo 225 de la Constitución de la República de Ecuador, así como a terceros que presten servicios públicos mediante concesión u otras figuras legalmente reconocidas. Estas, podrán incorporar medidas adicionales al mecanismo gubernamental de seguridad de la información.

    Artículo 39.- Protección de datos personales desde el diseño y por defecto

    Se entiende a la protección de datos desde el diseño como el deber del responsable del tratamiento de tener en cuenta, en las primeras fases de concepción y diseño del proyecto, que determinados tipos de tratamientos de datos personales entrañan una serie de riesgos para los derechos de los titulares en atención al estado de la técnica, naturaleza y fines del tratamiento, para lo cual, implementará las medidas técnicas, organizativas y de cualquier otra índole, con miras a garantizar el cumplimiento de las obligaciones en materia de protección de datos, en los términos del reglamento. La protección de datos por defecto hace referencia a que el responsable debe aplicar las medidas técnicas y organizativas adecuadas con miras a que, por defecto, solo sean objeto de tratamiento los datos personales que sean necesarios para cada uno de los fines del tratamiento, en los términos del reglamento.

    Artículo 40.- Análisis de riesgo, amenazas y vulnerabilidades

    Para el análisis de riesgos, amenazas y vulnerabilidades, el responsable y el encargado del tratamiento de los datos personales deberán utilizar una metodología que considere, entre otras:

    1) Las particularidades del tratamiento;

    2) Las particularidades de las partes involucradas; y,

    3) Las categorías y el volumen de datos personales objeto de tratamiento.

    Artículo 41.- Determinación de medidas de seguridad aplicables

    Para determinar las medidas de seguridad, aceptadas por el estado de la técnica, a las que están obligadas el responsable y el encargado del tratamiento de los datos personales, se deberán tomar en consideración, entre otros:

    1) Los resultados del análisis de riesgos, amenazas y vulnerabilidades;

    2) La naturaleza de los datos personales;

    3) Las características de las partes involucradas; y,

    4) Los antecedentes de destrucción de datos personales, la pérdida, alteración, divulgación o impedimento de acceso a los mismos por parte del titular, sean accidentales e intencionales, por acción u omisión, así como los antecedentes de transferencia, comunicación o de acceso no autorizado o exceso de autorización de tales datos.

    El responsable y el encargado del tratamiento de datos personales deberán tomar las medidas adecuadas y necesarias, de forma permanente y continua, para evaluar, prevenir, impedir, reducir, mitigar y controlar los riesgos, amenazas y vulnerabilidades, incluidas las que conlleven un alto riesgo para los derechos y libertades del titular, de conformidad con la normativa que emita la Autoridad de Protección de Datos Personales.

    Artículo 42.- Evaluación de impacto del tratamiento de datos personales

    El responsable realizará una evaluación de impacto del tratamiento de datos personales cuando se haya identificado la probabilidad de que dicho tratamiento, por su naturaleza, contexto o fines, conlleve un alto riesgo para los derechos y libertades del titular o cuando la Autoridad de Protección de Datos Personales lo requiera. La evaluación de impacto relativa a la protección de los datos será de carácter obligatoria en caso de:

    a) evaluación sistemática y exhaustiva de aspectos personales de personas físicas que se base en un tratamiento automatizado, como la elaboración de perfiles, y sobre cuya base se tomen decisiones que produzcan efectos jurídicos para las personas naturales;

    b) tratamiento a gran escala de las categorías especiales de datos, o de los datos personales relativos a condenas e infracciones penales, o

    c) observación sistemática a gran escala de una zona de acceso público.

    La Autoridad de Protección de Datos Personales establecerá otros tipos de operaciones de tratamiento que requieran una evaluación de impacto relativa a la protección de datos. La evaluación de impacto deberá efectuarse previo al inicio del tratamiento de datos personales.

    Artículo 43.- Notificación de vulneración de seguridad

    El responsable del tratamiento deberá notificar la vulneración de la seguridad de datos personales a la Autoridad de Protección de Datos Personales y la Agencia de Regulación y Control de las Telecomunicaciones, tan pronto sea posible, y a más tardar en el término de cinco (5) días después de que haya tenido constancia de ella, a menos que sea improbable que dicha violación de la seguridad constituya un riesgo para los derechos y las libertades de las personas físicas. Si la notificación a la Autoridad de Protección de Datos no tiene lugar en el término de cinco (5) días, deberá ir acompañada de indicación de los motivos de la dilación. El encargado del tratamiento deberá notificar al responsable cualquier vulneración de la seguridad de datos personales tan pronto sea posible, y a más tardar dentro del término de dos (2) días contados a partir de la fecha en la que tenga conocimiento de ella.

    Artículo 44.- Acceso a datos personales para atención a emergencias e incidentes informáticos

    Las autoridades públicas competentes, los equipos de respuesta de emergencias informáticas, los equipos de respuesta a incidentes de seguridad informática, los centros de operaciones de seguridad, los prestadores y proveedores de servicios de telecomunicaciones y los proveedores de tecnología y servicios de seguridad, nacionales e internacionales, podrán acceder y efectuar tratamientos sobre los datos personales contenidos en las notificaciones de vulneración a las seguridades, durante el tiempo necesario, exclusivamente para la detección, análisis, protección y respuesta ante cualquier tipo de incidentes así como para adoptar e implementar medidas de seguridad adecuadas y proporcionadas a los riesgos identificados.

    Artículo 45.- Garantía del secreto de las comunicaciones y seguridad de datos personales. –

    Para la correcta prestación de los servicios de telecomunicaciones y la apropiada operación de redes de telecomunicaciones, los prestadores de servicios de telecomunicaciones deben garantizar el secreto de las comunicaciones y seguridad de datos personales. Únicamente por orden judicial, los prestadores de servicios de telecomunicaciones podrán utilizar equipos, infraestructuras e instalaciones que permitan grabar los contenidos de las comunicaciones específicas dispuestas por los jueces competentes. Si se evidencia un tratamiento de grabación o interceptación de

    las comunicaciones no autorizadas por orden judicial, se aplicará lo dispuesto en la presente Ley.

    Artículo 46.- Notificación de vulneración de seguridad al titular

    El responsable del tratamiento deberá notificar sin dilación la vulneración de seguridad de datos personales al titular cuando conlleve un riesgo a sus derechos fundamentales y libertades individuales, dentro del término de tres días contados a partir de la fecha en la que tuvo conocimiento del riesgo. No se deberá notificar la vulneración de seguridad de datos personales al titular en los siguientes casos:

    1. Cuando el responsable del tratamiento haya adoptado medidas de protección técnicas organizativas o de cualquier otra índole apropiadas aplicadas a los datos personales afectados por la vulneración de seguridad que se pueda demostrar que son efectivas;

    2. Cuando el responsable del tratamiento haya tomado medidas que garanticen que el riesgo para los derechos fundamentales y las libertades individuales del titular, no ocurrirá; y,

    3. Cuando se requiera un esfuerzo desproporcionado para hacerlo; en cuyo caso, el responsable del tratamiento deberá realizar una comunicación pública a través de cualquier medio en la que se informe de la vulneración de seguridad de datos personales a los titulares. La procedencia de las excepciones de los numerales 1 y 2 deberá ser calificada por la Autoridad de Protección de Datos, una vez informada esta tan pronto sea posible, y en cualquier caso dentro de los plazos contemplados en el Artículo 43. La notificación al titular del dato objeto de la vulneración de seguridad contendrá lo señalado en el artículo 43 de esta ley.

    En caso de que el responsable del tratamiento de los datos personales no cumpliese oportunamente y de modo justificado con la notificación será sancionado conforme al régimen sancionatorio previsto en esta ley. La notificación oportuna de la violación por parte del responsable de tratamiento al titular y la ejecución oportuna de medidas de respuesta, serán consideradas atenuante de la infra

    CAPÍTULO VII. DEL RESPONSABLE, ENCARGO Y DELEGADO DE PROTECCIÓN DE DATOS PERSONALES

    Artículo 47.- Obligaciones del responsable y encargado del tratamiento de datos personales

    El responsable del tratamiento de datos personales está obligado a:

    1) Tratar datos personales en estricto apego a los principios y derechos desarrollados en la presente Ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales, o normativa sobre la materia;

    2) Aplicar e implementar requisitos y herramientas administrativas, técnicas, físicas, organizativas y jurídicas apropiadas, a fin de garantizar y demostrar que el tratamiento de datos personales se ha realizado conforme a lo previsto en la presente Ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales, o normativa sobre la materia;

    3) Aplicar e implementar procesos de verificación, evaluación, valoración periódica de la eficiencia, eficacia y efectividad de los requisitos y herramientas administrativas, técnicas, físicas, organizativas y jurídicas implementadas;

    4) Implementar políticas de protección de datos personales afines al tratamiento de datos personales en cada caso en particular;

    5) Utilizar metodologías de análisis y gestión de riesgos adaptadas a las particularidades del tratamiento y de las partes involucradas;

    6) Realizar evaluaciones de adecuación al nivel de seguridad previas al tratamiento de datos personales;

    7) Tomar medidas tecnológicas, físicas, administrativas, organizativas y jurídicas necesarias para prevenir, impedir, reducir, mitigar y controlar los riesgos y las vulneraciones identificadas;

    8) Notificar a la Autoridad de Protección de Datos Personales y al titular de los datos acerca de violaciones a las seguridades implementadas para el tratamiento de datos personales conforme a lo establecido en el procedimiento previsto para el efecto;

    9) Implementar la protección de datos personales desde el diseño y por defecto;

    10) Suscribir contratos de confidencialidad y manejo adecuado de datos personales con el encargado y el personal a cargo del tratamiento de datos personales o que tenga conocimiento de los datos personales;

    11) Asegurar que el encargado del tratamiento de datos personales ofrezca mecanismos suficientes para garantizar el derecho a la protección de datos personales conforme a lo establecido en la presente ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales, normativa sobre la materia y las mejores prácticas a nivel nacional o internacional;

    12) Registrar y mantener actualizado el Registro Nacional de Protección de Datos Personales, de conformidad a lo dispuesto en la presente Ley, en su reglamento, en directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales;

    13) Designar al Delegado de Protección de Datos Personales, en los casos que corresponda;

    14) Permitir y contribuir a la realización de auditorías o inspecciones, por parte de un auditor acreditado por la Autoridad de Protección de Datos Personales; y,

    15) Los demás establecidos en la presente Ley en su reglamento, en directrices, lineamientos, regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre la materia.

    El encargado de tratamiento de datos personales tendrá las mismas obligaciones que el responsable de tratamiento de datos personales, en lo que sea aplicable, de acuerdo a la presente ley y su reglamento.

    Artículo 48.- Delegado de protección de datos personales

    Se designará un delegado de protección de datos personales en los siguientes casos:

    1) Cuando el tratamiento se lleve a cabo por quienes conforman el sector público de acuerdo con lo establecido en el artículo 225 de la Constitución de la República;

    2) Cuando las actividades del responsable o encargado del tratamiento de datos personales requieran un control permanente y sistematizado por su volumen, naturaleza, alcance o finalidades del tratamiento, conforme se establezca en esta ley, el reglamento a ésta, o en la normativa que dicte al respecto la Autoridad de Protección de Datos Personales;

    3) Cuando se refiera al tratamiento a gran escala de categorías especiales de datos, de conformidad con lo establecido en el reglamento de esta ley; y,

    4) Cuando el tratamiento no se refiera a datos relacionados con la seguridad nacional y defensa del Estado que adolezcan de reserva ni fuesen secretos, de conformidad con lo establecido en la normativa especializada en la materia.

    La Autoridad de Protección de Datos Personales podrá definir nuevas condiciones en las que deba designarse un delegado de protección de datos personales y emitirá, a dicho efecto, las directrices suficientes para su designación.

    Artículo 49.- Funciones del delegado de protección de datos personales

    El delegado de protección de datos personales tendrá, entre otras, las siguientes funciones y atribuciones:

    1) Asesorar al responsable, al personal del responsable y al encargado del tratamiento de datos personales, sobre las disposiciones contenidas en esta ley, el reglamento, las directrices, lineamientos y demás regulaciones emitidas por la Autoridad de Protección de Datos Personales;

    2) Supervisar el cumplimiento de las disposiciones contenidas en esta ley, el reglamento, las directrices, lineamientos y demás regulaciones emitidas por la Autoridad de Protección de Datos Personales;

    3) Asesorar en el análisis de riesgo, evaluación de impacto y evaluación de medidas de seguridad, y supervisar su aplicación;

    4) Cooperar con la Autoridad de Protección de Datos Personales y actuar como punto de contacto con dicha entidad, con relación a las cuestiones referentes al tratamiento de datos personales; y,

    5) Las demás que llegase a establecer la Autoridad de Protección de Datos Personales con ocasión de las categorías especiales de datos personales.

    En caso de incumplimiento de sus funciones, el delegado de protección de datos personales responderá administrativa, civil y penalmente, de conformidad con la ley.

    Artículo 50.- Consideraciones especiales para el delegado de protección de datos personales

    Para la ejecución de las funciones del delegado de protección de datos, el responsable y el encargado de tratamiento de datos personales, deberán observar lo siguiente:

    1) Garantizar que la participación del delegado de protección de datos personales, en todas las cuestiones relativas a la protección de datos personales, sea apropiada y oportuna;

    2) Facilitar el acceso a los datos personales de las operaciones de tratamiento, así como todos los recursos y elementos necesarios para garantizar el correcto y libre desempeño de sus funciones;

    3) Capacitar y actualizar en la materia al delegado de protección de datos personales, de conformidad con la normativa técnica que emita la Autoridad de Protección de Datos Personales;

    4) No podrán destituir o sancionar al delegado de protección de datos personales por el correcto desempeño de sus funciones;

    5) El delegado de protección de datos personales mantendrá relación directa con el más alto nivel ejecutivo y de decisión del responsable y con el encargado;

    6) El titular de los datos personales podrá contactar al delegado de protección de datos personales con relación al tratamiento de sus datos personales a fin de ejercer sus derechos; y,

    7) El delegado de protección de datos personales estará obligado a mantener la más estricta confidencialidad respecto a la ejecución de sus funciones.

    Siempre que no exista conflicto con las responsabilidades establecidas en la presente ley, su reglamento, directrices, lineamientos y demás regulaciones emitidas por la Autoridad de Protección de Datos Personales, el delegado de protección de datos personales podrá desempeñar otras funciones dispuestas por el responsable o el encargado del tratamiento de datos personales.

    Artículo 51.- Registro Nacional de protección de datos personales

    El responsable del tratamiento de datos personales deberá reportar y mantener actualizada la información ante la Autoridad de Protección de Datos Personales, sobre lo siguiente:

    1) Identificación de la base de datos o del tratamiento;

    2) El nombre domicilio legal y datos de contacto del responsable y encargado del tratamiento de datos personales;

    3) Características y finalidad del tratamiento de datos personales;

    4) Naturaleza de los datos personales tratados;

    5) Identificación, nombre, domicilio legal y datos de contacto de los destinatarios de los datos personales, incluyendo encargados y terceros;

    6) Modo de interrelacionar la información registrada;

    7) Medios utilizados para implementar los principios, derechos y obligaciones contenidas en la presente ley y normativa especializada;

    8) Requisitos y herramientas administrativas técnicas y físicas, organizativas y jurídicas implementadas para garantizar la seguridad y protección de datos personales;

    9) Tiempo de conservación de los datos;

    CAPÍTULO VIII. DE LA RESPONSABILIDAD PROACTIVA

    Artículo 52.- Autorregulación

    Los responsables y encargados de tratamiento de datos personales podrán, de manera voluntaria, acogerse o adherirse a códigos de conducta, certificaciones, sellos y marcas de protección, cláusulas tipo, sin que esto constituya eximente de la responsabilidad de cumplir con las disposiciones de la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y demás normativa sobre la materia.

    Artículo 53.- Códigos de conducta

    La Autoridad de Regulación y Control promoverá la elaboración de códigos de conducta por sectores, industrias, empresas, organizaciones, que tengan como fin el cumplimiento de la normativa vigente en materia de protección de datos. Los códigos de conducta deberán tomar en cuenta las necesidades específicas de los sectores en los que se efectúe tratamiento de datos personales, así como cumplir con los requisitos que se determinen en la normativa secundaria y con las disposiciones previstas en la presente Ley, para su aprobación por la Autoridad de Regulación y Control.

    Los responsables o encargados de tratamiento de datos personales interesados podrán adherirse e implementar los códigos de conducta aprobados, para lo cual seguirán el procedimiento establecido en el Reglamento a la presente Ley.

    Artículo 54.- Entidades de Certificación

    En materia de protección de datos personales las Entidades de Certificación, de manera no exclusiva y en concordancia con el artículo 52, podrán:

    1) Emitir certificaciones de cumplimiento de la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y demás normativa sobre la materia;

    2) Emitir sellos de protección de datos personales;

    3) Llevar a cabo auditorías de protección de datos personales, y,

    4) Certificar los procesos de transferencias internacionales de datos personales. Los resultados de las auditorías podrán ser considerados como elementos probatorios dentro de los procesos sancionatorios.

    CAPÍTULO IX TRANSFERENCIA O COMUNICACIÓN INTERNACIONAL DE DATOS PERSONALES

    Artículo 55.- Transferencia o comunicación internacional de datos personales

    La transferencia o comunicación internacional de datos personales será posible si se sujeta a lo previsto en el presente capítulo, la presente Ley o la normativa especializada en la materia, propendiendo siempre al efectivo ejercicio del derecho a la protección de datos personales.

    Artículo 56.- Transferencia o comunicación internacional de datos personales a países declarados como nivel adecuado de protección

    Por principio general se podrán transferir o comunicar datos personales a países, organizaciones y personas jurídicas en general que brinden niveles adecuados de protección, y que se ajusten a la obligación de cumplimiento y garantía de estándares reconocidos internacionalmente conforme a los criterios establecidos en el Reglamento a la ley. Cuando resulte necesario por la naturaleza de la transferencia, la Autoridad de Protección de Datos Personales podrá implementar métodos de control ex post que serán definidos en el Reglamento a la Ley. También establecerá acciones conjuntas entre las autoridades de ambos países con el objeto de prevenir, corregir o mitigar el tratamiento indebido de datos en ambos países. Para declarar de nivel adecuado de protección a países u organizaciones, la Autoridad de Protección de Datos Personales emitirá resolución motivada, en la que se establezca que la transferencia o comunicación internacional de datos personales cumple niveles adecuados de protección o de garantías adecuadas de protección, conforme a lo establecido en esta ley y su reglamento.

    Artículo 57.- Transferencia o comunicación mediante garantías adecuadas

    En caso de realizar una transferencia internacional de datos a un país, organización o territorio económico internacional que no haya sido calificado por la Autoridad de Protección de Datos de tener un nivel adecuado de protección, se podrá realizar la referida transferencia internacional siempre que el responsable o encargado del tratamiento de datos personales ofrezca garantías adecuadas para el titular, para lo cual se deberá observar lo siguiente: a. Garantizar el cumplimiento de principios, derechos y obligaciones en el tratamiento de datos personales en un estándar igual o mayor a la normativa ecuatoriana vigente.

    b. Efectiva tutela del derecho a la protección de datos personales, a través de la disponibilidad permanente de acciones administrativas o judiciales; y, c. El derecho a solicitar la reparación integral, de ser el caso. Para que ello ocurra, la transferencia internacional de datos personales se sustentará en un instrumento jurídico que contemple los estándares antes determinados, así como aquellos que establezca la Autoridad de Protección de Datos Personales, el mismo que deberá ser vinculante.

    Artículo 58. Normas corporativas vinculantes

    Los responsables o encargados del tratamiento de datos personales podrán presentar a la Autoridad de Protección de Datos Personales, normas corporativas vinculantes, específicas y aplicadas al ámbito de su actividad, las cuales deberán cumplir las siguientes condiciones:

    1. Será de obligatorio cumplimiento para el responsable del tratamiento y para la empresa a la que eventualmente transfieran datos personales.

    2. Brindar a los titulares los mecanismos adecuados para el ejercicio de sus derechos relacionados al tratamiento de sus datos personales observando las disposiciones de la presente ley;

    3. Incluir una enunciación detallada de las empresas filiales que, además del responsable del tratamiento, pertenecen al mismo grupo empresarial. Además, se incluirá la estructura y los datos del contacto del grupo empresarial o joint venture, dedicadas a una actividad económica conjunta y de cada uno de sus miembros.

    4. Incluir el detalle de las empresas encargadas del tratamiento de datos personales, las categorías de datos personales a ser utilizados. así como el tipo de tratamiento a realizarse y su finalidad;

    5. Observar en su contenido todas las disposiciones de la presente ley referentes a principios de tratamiento de datos personales, medidas de seguridad de datos, requisitos respecto a transferencia o comunicación internacional y transferencia o comunicación ulterior a organismos no sujetos a normas corporativas vinculantes;

    6. Contener la aceptación por parte del responsable o del encargado del tratamiento de los datos personales, o de cualquier miembro de su grupo empresarial sobre su responsabilidad por cualquier violación de las normas corporativas vinculantes. El responsable o encargado del tratamiento de datos personales no será responsable si demuestra que el acto que originó la violación no le es imputable;

    7. Incluir los mecanismos en que se facilita al titular la información clara y completa, respecto a las normas corporativas vinculantes;

    8. Incluir las funciones de todo delegado de protección de datos designado de cualquier otra persona o entidad encargada de la supervisión del cumplimiento de las normas corporativas vinculantes dentro del grupo empresarial o del joint venture dedicadas a una actividad económica conjunta bajo un mismo control así como los mecanismos y procesos de supervisión y tramitación de reclamaciones;

    9. Enunciar de forma detallada los mecanismos establecidos en el grupo empresarial o empresas afiliadas que permitan al titular verificar efectivamente el cumplimiento de las normas corporativas vinculantes. Entre estos mecanismos se incluirán auditorías de protección de datos, y aquellos métodos técnicos que brinden acciones correctivas para proteger los derechos del titular. Los resultados de las auditorías serán comunicadas al delegado de protección de datos designado de conformidad con la presente ley, o cualquier otra entidad o persona encargada del cumplimiento de las normas corporativas vinculantes dentro del grupo empresarial o empresas afiliadas dedicadas a una actividad económica conjunta y al Directorio de la empresa que controla un grupo empresarial, y a disposición de la Autoridad de protección de datos personales;

    10. Incluir los mecanismos para cooperar de forma coordinada con la autoridad de protección de datos personales y el responsable del tratamiento de los datos personales; y,

    11. Incluir la declaración y compromiso del responsable del tratamiento de los datos personales de promover la protección de datos personales entre sus empleados con formación continua. La Autoridad de Protección de Datos Personales definirá el formato y los procedimientos para la transferencia o comunicación de datos realizada por parte de los responsables, los encargados y las autoridades de control en lo relativo a la aplicación de las normas corporativas vinculantes a las que se refiere este artículo. Cualquier cambio a ser realizado a estas normas deberá ser notificado a la autoridad de protección de datos personales y al titular conforme a los mecanismos señalados por el responsable de tratamiento en su solicitud.

    Artículo 59.- Autorización para transferencia internacional

    Para todos aquellos casos no contemplados en los artículos precedentes, en los que se pretenda realizar una transferencia internacional de datos personales, se requerirá la autorización de la Autoridad de Protección de Datos, para lo cual, se deberá garantizar documentadamente el cumplimiento de la normativa vigente sobre protección de datos de carácter personal, según lo determinado en el Reglamento de aplicación a la presente Ley. Sin perjuicio de lo anterior, la información sobre transferencias internacionales de datos personales deberá ser registradas previamente en el Registro Nacional de Protección de Datos Personales por parte del responsable del tratamiento o, en su caso, del encargado, según el procedimiento establecido en el Reglamento de aplicación a la presente Ley.

    Artículo 60. Casos excepcionales de transferencias o comunicaciones internacionales

    Sin perjuicio de lo establecido en los artículos precedentes se podrá realizar transferencias o comunicaciones internacionales de datos personales, en los siguientes casos:

    1. Cuando los datos personales sean requeridos para el cumplimiento de competencias institucionales, de conformidad con la normativa aplicable;

    2. Cuando el titular haya otorgado su consentimiento explícito a la transferencia o comunicación propuesta, tras haber sido informado de los posibles riesgos para él de dichas transferencias o comunicaciones internacionales, debido a la ausencia de una resolución de nivel adecuado de protección y de garantías adecuadas.

    3. Cuando la transferencia internacional tenga como finalidad el cumplimiento de una obligación legal o regulatoria;

    4. Cuando la transferencia internacional de datos personales sea necesaria para la ejecución de un contrato entre el titular y el responsable del tratamiento de datos personales, o para la ejecución de medidas de carácter precontractual adoptadas a solicitud del titular;

    5. Cuando la transferencia sea necesaria por razones de interés público.

    6. Cuando la transferencia internacional sea necesaria para la colaboración judicial internacional.

    7. Cuando la transferencia internacional sea necesaria para la cooperación dentro de la investigación de infracciones.

    8. Cuando la transferencia internacional es necesaria para el cumplimiento de compromisos adquiridos en procesos de cooperación internacional entre Estados;

    9. Cuando se realicen transferencias de datos en operaciones bancarias y bursátiles.

    10. Cuando la transferencia internacional de datos personales sea necesaria para la formulación, el ejercicio o la defensa de reclamaciones, acciones administrativas o jurisdiccionales y recursos; y,

    11. Cuando la transferencia internacional de datos personales sea necesaria para proteger los intereses vitales del interesado o de otras personas, cuando el interesado esté física o jurídicamente incapacitado para dar su consentimiento.

    Artículo 61.- Control continuo

    La Autoridad de Protección de Datos Personales en acciones conjuntas con la academia, realizará reportes continuos sobre la realidad internacional en materia de protección de datos personales. Dichos estudios servirán como elemento de control continuo del nivel adecuado de protección de datos personales de los países u organizaciones que ostenten tal reconocimiento. En caso de detectarse que un país u organización ya no cumple con un nivel adecuado de protección conforme los principios, derechos y obligaciones desarrollados en la presente Ley, la Autoridad de Protección de Datos Personales procederá a emitir la correspondiente resolución de no adecuación, a partir de la cual no procederán transferencias de datos personales, salvo que operen otros mecanismos de transferencia conforme lo dispuesto en el presente capítulo. La Autoridad de Protección de Datos Personales publicará en cualquier medio, de forma permanente y debidamente la lista de países, organizaciones, empresas o grupos económicos que garanticen niveles adecuados de protección de datos personales.

    CAPÍTULO X. DE LOS REQUERIMIENTOS DIRECTOS Y DE LA GESTIÓN DEL PROCEDIMIENTO ADMINISTRATIVO

    Artículo 62.- Requerimiento directo del titular del dato de carácter personal al responsable del tratamiento

    El titular podrá en cualquier momento, de forma gratuita, por medios físicos o digitales puestos a su disposición por parte del responsable del tratamiento de los datos personales, presentar requerimientos, peticiones, quejas o reclamaciones directamente al responsable del tratamiento, relacionadas con el ejercicio de sus derechos, la aplicación de principios y el cumplimiento de obligaciones por parte del responsable del tratamiento, que tengan relación con él.

    Presentado el requerimiento ante el responsable este contará con un término de diez (10) días para contestar afirmativa o negativamente, notificar y ejecutar lo que corresponda.

    Artículo 63.- Actuaciones previas

    La Autoridad de Protección de Datos Personales podrá iniciar, de oficio o a petición del titular, actuaciones previas con el fin de conocer las circunstancias del caso concreto o la conveniencia o no de iniciar el procedimiento, para lo cual se estará conforme a las disposiciones del Código Orgánico Administrativo.

    Artículo 64.- Procedimiento administrativo

    En el caso de que el responsable del tratamiento no conteste el requerimiento, en el término establecido en la presente ley, o éste fuere negado, el titular podrá presentar el correspondiente reclamo administrativo ante la Autoridad de Protección de Datos Personales, para lo cual se deberá estar conforme al procedimiento establecido en el Código Orgánico Administrativo, la presente ley y demás normativa emitida por la Autoridad de Protección de Datos Personales. Sin perjuicio, el titular podrá presentar acciones civiles, penales o constitucionales de las que se crea asistido.

    CAPÍTULO XI. MEDIDAS CORRECTIVAS, INFRACCIONES Y RÉGIMEN SANCIONATORIO

    Artículo 65.- Medidas correctivas

    En caso de incumplimiento de las disposiciones previstas en la presente Ley, su reglamento, directrices y lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia, o transgresión a los derechos y principios que componen al derecho a la protección de datos personales, la Autoridad de Protección de Datos Personales dictará medidas correctivas con el objeto de evitar que se siga cometiendo la infracción y que la conducta se produzca nuevamente, sin perjuicio de la aplicación de las correspondientes sanciones administrativas. Las medidas correctivas podrán consistir, entre otras, en:

    1) El cese del tratamiento, bajo determinadas condiciones o plazos;

    2) La eliminación de los datos; y

    3) La imposición de medidas técnicas, jurídicas, organizativas o administrativas a garantizar un tratamiento adecuado de datos personales.

    La Autoridad de Protección de Datos Personales, en el marco de esta Ley, dictará, para cada caso, las medidas correctivas, previo informe de la unidad técnica competente, que permitan corregir, revertir o eliminar las conductas contrarias a la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia.

    Artículo 66.- Aplicación de medidas correctivas

    La Autoridad de Protección de Datos Personales, en el marco de esta ley, previo informe de la unidad técnica competente, aplicará para cada caso las medidas correctivas citadas en el artículo anterior, que permitan corregir, revertir o eliminar las conductas contrarias a la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre la materia. Para la aplicación de las medidas correctivas se seguirán las siguientes reglas:

    1. En el caso de que los responsables, encargados de tratamiento de datos personales y organismos de certificación y de ser el caso, a terceros, se encuentran incursos en el presunto cometimiento de una infracción leve y estos consten dentro del Registro Único de responsables y encargados incumplidos; la Autoridad de Protección de Datos Personales activará directamente el procedimiento administrativo sancionatorio, haciendo constar dentro de la resolución tanto las medidas correctivas aplicables como la sanción correspondiente a la infracción cometida; y,

    2. En el caso de que los responsables, encargados del tratamiento de datos personales y organismos de certificación, se encuentren incursos en el presunto cometimiento de una infracción grave; la Autoridad de Protección de Datos Personales; aplicará en primera instancia medidas correctivas. Si las medidas correctivas fueren cumplidas de forma tardía, parcial o defectuosa, la Autoridad de Protección de Datos Personales, aplicará las sanciones que corresponden a las infracciones graves, activando para el efecto el procedimiento administrativo sancionatorio y haciendo constar dentro de la resolución tanto las medidas correctivas aplicables como la sanción correspondiente a la infracción cometida; y,

    3. En el caso de que los responsables, encargados del tratamiento de datos personales y organismos de certificación, se encuentren incursos en el presunto cometimiento de una infracción muy grave, la Autoridad de Protección de Datos Personales activará directamente el procedimiento administrativo sancionatorio haciendo constar dentro de la resolución tanto las medidas correctivas aplicables como la sanción correspondiente a la infracción cometida.

    Sección 1ª. De las infracciones del Responsable de protección de datos

    Artículo 67.- Infracciones leves del Responsable de protección de datos

    Se consideran infracciones leves las siguientes:

    1. No tramitar, tramitar fuera del término previsto o negar injustificadamente las peticiones o quejas realizadas por el titular;

    2. No implementar protección de datos desde el diseño y por defecto;

    3. No mantener disponibles políticas de protección de datos personales afines al tratamiento de datos personales;

    4. Elegir un encargado del tratamiento de datos personales que no ofrezca garantías suficientes para hacer efectivo el ejercicio del derecho a la protección de datos personales;

    5. Incumplir las medidas correctivas dispuestas por la Autoridad de Protección de Datos Personales.

    Artículo 68.- Infracciones graves del Responsable de protección de datos.- Se consideran infracciones graves las siguientes:

    1) No implementar medidas administrativas, técnicas y físicas, organizativas y jurídicas, a fin de garantizar el tratamiento de datos personales que realice conforme la presente ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    2) Utilizar información o datos para fines distintos a los declarados;

    3) Ceder o comunicar datos personales sin cumplir con los requisitos y procedimientos establecidos en la presente ley y su reglamento, directrices lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    4) No utilizar metodologías de análisis y gestión de riesgos adaptadas a la naturaleza de los datos personales ,las particularidades del tratamiento y de las partes involucradas;

    5) No realizar evaluaciones de impacto al tratamiento de datos en los casos en que era necesario realizarlas;

    6) No implementar medidas técnicas organizativas o de cualquier índole necesarias para prevenir, impedir, reducir, mitigar y controlar los riesgos y las vulneraciones a la seguridad de datos personales que hayan sido identificadas;

    7) No notificar a la Autoridad de Protección de Datos Personales y al titular, de vulneraciones a la seguridad y protección de datos personales, cuando afecte los derechos fundamentales y libertades individuales de los titulares;

    8) No notificar a la Autoridad de Protección de Datos Personales del titular las vulneraciones de seguridad y protección de datos personales, cuando exista afectación a los derechos fundamentales y libertades individuales de los titulares;

    9) No suscribir contratos que incluyan cláusulas de confidencialidad y tratamiento adecuado de datos personales con el encargado y el personal a cargo del tratamiento de datos personales o que tenga conocimiento de los datos personales;

    10) No mantener actualizado el Registro Nacional de protección de datos personales de conformidad a lo dispuesto en la presente ley su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    11) No consignar en el Registro Nacional de Protección de Datos Personales lo dispuesto en la presente ley y su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    12) No designar al delegado de protección de datos personales cuando corresponda;

    13) No permitir y no contribuir a la realización de auditorías o inspecciones por parte del auditor acreditado por la Autoridad de Protección de Datos Personales; y,

    14) Incumplir las medidas correctivas o cumplir de forma tardía, parcial o defectuosa, siempre y cuando hubiese precedido por dicha causa la aplicación de una sanción por infracción leve, o incurrir de forma reiterada en faltas leves.

    Sección 2ª. De las infracciones del Encargado de protección de datos

    Artículo 69.- Infracciones leves del Encargado de protección de datos

    Se consideran infracciones leves las siguientes:

    1) No colaborar con el responsable del tratamiento datos personales, para que este cumpla con su obligación de atender solicitudes que tengan por objeto el ejercicio de los derechos del titular frente al tratamiento de sus datos personales;

    2) No facilitar el acceso al responsable del tratamiento de datos personales a toda la información referente al cumplimiento de las obligaciones establecidas en la presente Ley, su reglamento, directrices, lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativa sobre la materia;

    3) No permitir o no contribuir a la realización de auditorías o inspecciones, por parte del responsable del tratamiento de datos personales o de otro auditor autorizado por la Autoridad de Protección de Datos Personales; y,

    4) Incumplir las medidas correctivas dispuestas por la Autoridad de Protección de Datos Personales.

    Artículo 70.- Infracciones graves del Encargado de protección de datos

    Se consideran infracciones graves las siguientes:

    1) Realizar tratamientos de datos personales sin observar los principios y derechos desarrollados en la presente Ley y su reglamento, directrices y lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    2) No tratar datos personales de conformidad con lo previsto en el contrato que mantenga con el responsable del tratamiento de datos personales inclusive en lo que respecta a la transferencia o comunicación internacional;

    3) No suscribir contratos que contengan cláusulas de confidencialidad y tratamiento adecuado de datos personales con el personal a cargo del tratamiento de datos personales o quien tenga conocimiento de los datos personales;

    4) No implementar mecanismos destinados a mantener la confidencialidad, integridad, disponibilidad y resiliencia de los datos personales;

    5) No implementar medidas preventivas y correctivas en la seguridad de los datos personales a fin de evitar vulneraciones;

    6) No suprimir los datos personales transferidos o comunicados al responsable del tratamiento de los datos personales, una vez haya culminado su encargo;

    7) Proceder a la comunicación de datos personales sin cumplir con los requisitos y procedimientos establecidos en la presente ley, su reglamento directrices lineamientos y regulaciones emitidas por la Autoridad de Protección de Datos Personales y normativas sobre la materia;

    8) Incumplir las medidas correctivas o cumplirlas de forma tardía parcial o defectuosa, siempre y cuando hubiese precedido por dicha causa la aplicación de una sanción por infracción leve; y,

    9) No notificar al responsable del tratamiento de datos personales sobre cualquier vulneración de la seguridad de datos personales conforme dispone esta ley o hacerlo con retraso injustificado.

    Artículo 71.- Sanciones por infracciones leves

    La Autoridad de Protección de Datos Personales impondrá las siguientes sanciones administrativas, en el caso de verificarse el cometimiento de una infracción leve, según las siguientes reglas:

    1. Servidores o funcionarios del sector público por cuya acción u omisión hayan incurrido en alguna de las infracciones leves establecidas en la presente ley, serán sancionados con una multa de uno (1) a diez (10) salarios básicos unificados del trabajador en general, sin perjuicio de la responsabilidad extracontractual del Estado, la cual se sujetará a las reglas establecidas en la normativa correspondiente;

    2. Si el responsable o el encargado del tratamiento de datos personales o de ser el caso un tercero es una entidad de derecho privado o una empresa pública, se aplicará una multa de entre el 0.1% y el 0.7% calculada sobre su volumen de negocio correspondiente al ejercicio económico inmediatamente anterior al de la imposición de la multa. La Autoridad de Protección de Datos Personales establecerá la multa aplicable en función del principio de proporcionalidad, para lo cual deberá verificar los siguientes presupuestos:

    a) La intencionalidad, misma que se establecerá en función a la conducta del infractor;

    b) Reiteración de la infracción, es decir cuando el responsable, el encargado del tratamiento de datos personales o de ser el caso un tercero, hubiese sido previamente sancionado por dos o más infracciones precedentes, que establezcan sanciones de menor gravedad a la que se pretende aplicar; o cuando hubiesen sido previamente sancionados por una infracción cuya sanción sea de igual o mayor gravedad a la que se pretende aplicar;

    c) La naturaleza del perjuicio ocasionado, es decir, las consecuencias lesivas para el ejercicio del derecho a la protección de datos personales; y,

    d) Reincidencia, es decir, cuando la infracción precedente sea de la misma naturaleza de aquella que se pretende sancionar.

    Artículo 72.- Sanciones por infracciones graves

    La Autoridad de Protección de Datos Personales impondrán las siguientes sanciones administrativas, en el caso de verificarse el cometimiento de una infracción grave, conforme a los presupuestos establecidos en el presente Capítulo: Los servidores o funcionarios del sector público por cuya acción u omisión hayan incurrido en alguna de las infracciones graves establecidas en la presente ley serán sancionados con una multa de entre 10 a 20 salarios básicos unificados del trabajador en general; sin perjuicio de la Responsabilidad Extracontractual del Estado, la cual se sujetará a las reglas establecidas en la normativa correspondiente;

    1) Si el responsable, encargado del tratamiento de datos personales o de ser el caso un tercero, es una entidad de derecho privado o una empresa pública se aplicará una multa de entre el 0.7% y el 1% calculada sobre su volumen de negocios, correspondiente al ejercicio económico inmediatamente anterior al de la imposición de la multa. La Autoridad de Protección de Datos Personales establecerá la multa aplicable en función del principio de proporcionalidad, para lo cual deberá verificar los siguientes presupuestos:

    a) La intencionalidad, misma que se establecerá en función a la conducta del infractor;

    b) Reiteración de la infracción, es decir, cuando el responsable, encargado del tratamiento de datos personales o de ser el caso, de un tercero hubiese sido previamente sancionado por dos o más infracciones precedentes que establezcan sanciones de menor gravedad a la que se pretende aplicar; o cuando hubiesen sido previamente sancionados por una infracción cuya sanción sea de igual o mayor gravedad a la que se pretende aplicar;

    c) La naturaleza del perjuicio ocasionado, es decir, las consecuencias lesivas para el ejercicio del derecho a la protección de datos personales; y,

    d) Reincidencia, es decir, cuando la infracción precedente sea de la misma naturaleza de aquella que se pretende sancionar.

    En el caso de que el responsable, encargado del tratamiento de datos personales a un tercero de ser el caso; sea una organización sin domicilio ni representación jurídica en el territorio ecuatoriano, se deberá notificar de la resolución con la cual se establezca la infracción cometida la Autoridad de Protección de Datos Personales, o quien hiciera sus veces, del lugar en donde dicha organización tiene su domicilio principal, a fin de que sea dicho organismo quien sustancia las acciones o procedimientos destinados al cumplimiento de las medidas correctivas y sanciones a las que hubiere lugar.

    Artículo 73.- Volumen de negocio

    A efectos del régimen sancionatorio de la presente ley, se entiende por volumen de negocio, a la cuantía resultante de la venta de productos y de la prestación de servicios realizados por operadores económicos, durante el último ejercicio que corresponda a sus actividades, previa deducción del Impuesto al Valor Agregado y de otros impuestos directamente relacionados con la operación económica.

    Artículo 74.- Medidas provisionales o cautelares

    La Autoridad de Protección de Datos Personales podrá aplicar medidas provisionales de protección o medidas cautelares contempladas en la norma procedimental administrativa.

    CAPÍTULO XII. AUTORIDAD DE PROTECCIÓN DE DATOS PERSONALES

    Artículo 75.- Autoridad de protección de datos personales

    La Autoridad de Protección de Datos Personales podrá iniciar, de oficio o a petición del titular, actuaciones previas con el fin de conocer las circunstancias del caso concreto o la conveniencia o no de iniciar el procedimiento, para lo cual se estará conforme a las disposiciones del Código Orgánico Administrativo.

    Artículo 76.- Funciones atribuciones y facultades

    La Autoridad de Protección de Datos Personales es el órgano de control y vigilancia encargado de garantizar a todos los ciudadanos la protección de sus datos personales, y de realizar todas las acciones necesarias para que se respeten los principios, derechos, garantías y procedimientos previstos en la presente Ley y en su reglamento de aplicación, para lo cual le corresponde las siguientes funciones, atribuciones y facultades:

    1) Ejercer la supervisión, control y evaluación de las actividades efectuadas por el responsable y encargado del tratamiento de datos personales;

    2) Ejercer la potestad sancionadora respecto de responsables, delegados, encargados y terceros, conforme a lo establecido en la presente Ley;

    3) Conocer, sustanciar y resolver los reclamos interpuestos por el titular o aquellos iniciados de oficio, así como aplicar las sanciones correspondientes;

    4) Realizar o delegar auditorías técnicas al tratamiento de datos personales;

    5) Emitir normativa general o técnica, criterios y demás actos que sean necesarios para el ejercicio de sus competencias y la garantía del ejercicio del derecho a la protección de datos personales;

    6) Crear, dirigir y administrar el Registro Nacional de Protección de Datos Personales, así como coordinar las acciones necesarias con entidades del sector público y privado para su efectivo funcionamiento;

    7) Promover una coordinación adecuada y eficaz con los encargados de la rendición de cuentas y participar en iniciativas internacionales y regionales para la protección de la protección de los datos personales;

    8) Dictar las cláusulas estándar de protección de datos, así como verificar el contenido de las cláusulas o garantías adicionales o específicas;

    9) Atender consultas en materia de protección de datos personales;

    10) Ejercer el control y emitir las resoluciones de autorización para la transferencia internacional de datos;

    11) Ejercer la representación internacional en materia de protección de datos personales;

    12) Emitir directrices para el diseño y contenido de la política de tratamiento de datos personales;

    13) Establecer directrices para el análisis evaluación y selección de medidas de seguridad de los datos personales;

    14) Llevar un registro estadístico sobre vulneraciones a la seguridad de datos personales e identificar posibles medidas de seguridad para cada una de ellas;

    15) Publicar periódicamente una guía de la normativa relativa a la protección de datos personales;

    16) Promover e incentivar el ejercicio del derecho a la protección de datos personales, así como la concientización en las personas y la comprensión de los riesgos, normas, garantías y derechos, en relación con el tratamiento y uso de sus datos personales, con especial énfasis en actividades dirigidas a grupos de atención prioritaria tales como niñas niños y adolescentes;

    17) Controlar y supervisar el ejercicio del derecho a la protección de datos personales dentro del tratamiento de datos llevado a cabo a través del Sistema Nacional de Registros Públicos; y,

    18) Las demás atribuciones establecidas en la normativa vigente.

    Artículo 77.- Del titular de la Autoridad de Protección de Datos

    El Superintendente de Protección de Datos será designado de acuerdo a lo establecido en la Constitución de la República, de la terna que remita la Presidente o Presidente de la República, siguiendo criterios de especialidad y méritos; se sujetará a escrutinio público y derecho de impugnación ciudadana.

    El Superintendente de Protección de Datos deberá ser un profesional del Derecho, de Sistemas de Información, de Comunicación o de Tecnologías, con título de cuarto nivel y experiencia de al menos 10 años con áreas afines a la materia objeto de regulación de esta ley.

    Ejercerá sus funciones por un período de 5 años y únicamente cesará en sus funciones por las causales establecidas en la ley que regula el servicio público que le sean aplicables o por destitución, luego de enjuiciamiento político realizado por la Asamblea Nacional.

    DISPOSICIONES GENERALES

    PRIMERA

    En lo dispuesto al procedimiento administrativo se estará a lo previsto en el Código Orgánico Administrativo.

    SEGUNDA

    En el ámbito del derecho de acceso a la información pública son aplicables las disposiciones de las leyes de la materia.

    TERCERA

    En el ámbito de los datos personales registrables, son aplicables las disposiciones de las leyes de la materia.

    CUARTA

    La Autoridad de Protección de Datos Personales será responsable de coordinar las acciones necesarias con entidades del sector público y privado para el efectivo funcionamiento del Registro Nacional de Protección de Datos Personales.

    QUINTA

    La Autoridad de Protección de Datos Personales será responsable de presentar informes anuales de evaluación y revisión de la presente Ley, a la ciudadanía.

    SEXTA

    Créase el Registro Único de Responsables y Encargados Incumplidos, en el cual se llevará un registro de los Responsables y Encargados del Tratamiento de Datos Personales, que hayan incurrido en una de las infracciones establecidas en la presente Ley; mismo que tendrá fines sociales, estadísticos, preventivos y de capacitación, cuyo funcionamiento estará establecido en el Reglamento de la Ley de Protección de Datos Personales.

    SÉPTIMA

    El ejercicio de los derechos reconocidos en la presente norma podrá ser exigido por el titular independientemente de la entrada en vigor del régimen sancionatorio.

    OCTAVA

    Ninguna entidad pública o privada, podrá cobrar valores por servicios de entrega de información sustentada en datos del solicitante de los mismos.

    NOVENA

    Se procurará que en lo referente a los pueblos y nacionalidades indígenas, el tratamiento de sus datos personales sea en sus idiomas y lenguas ancestrales.

    DISPOSICIONES TRANSITORIAS

    PRIMERA

    Las disposiciones relacionadas con las medidas correctivas y el régimen sancionatorio entrarán en vigencia en dos años contados a partir de la publicación de esta ley en el Registro Oficial, en el transcurso de este tiempo los responsables y encargados del tratamiento de datos personales se adecuarán a los preceptos establecidos dentro de esas disposiciones, su reglamento de aplicación y demás normativa emitida por la Autoridad de Protección de Datos Personales. El resto de disposiciones establecidas en esta ley entrarán en vigencia conforme se establece en la Disposición Final de esta Ley.

    SEGUNDA

    Todo tratamiento realizado previo a la entrada en vigencia de la presente Ley deberá adecuarse a lo previsto en la presente norma dentro del plazo de dos años contados a partir de su publicación en el Registro Oficial.

    El incumplimiento de la presente disposición dará lugar a la aplicación del régimen sancionatorio establecido en esta Ley.

    TERCERA

    Los responsables y encargados del tratamiento de datos personales que hayan implementado los preceptos recogidos dentro de esta Ley antes de plazo señalado en la Disposición Transitoria Primera obtendrán un reconocimiento por buenas prácticas por parte de la Autoridad de Protección de Datos Personales.

    CUARTA

    La transferencia internacional de datos personales que hubiere sido realizada antes de la entrada en vigencia de la presente Ley será legítima, sin perjuicio de que el responsable del tratamiento de datos personales deba aplicar lo dispuesto en esta norma para acreditar su responsabilidad proactiva y demostrada.

    El responsable de tratamiento deberá adecuar la transferencia internacional de datos personales a la presente norma en un plazo no mayor de dos años contados a partir de la publicación de la presente norma en el Registro Oficial.

    El incumplimiento de la presente disposición dará lugar a la aplicación del régimen sancionatorio establecido en esta Ley.

    DISPOSICIONES REFORMATORIAS

    PRIMERA

    De la Ley de Comercio Electrónico, Firmas Electrónicas y Mensajes de Datos, publicada en el Suplemento del Registro Oficial 557 del 17 de abril de 2002:

    1. Suprímese las definiciones de intimidad, datos personales, datos personales autorizados del glosario de términos establecido en la Disposición General Novena.

    SEGUNDA

    En la Ley Orgánica del Sistema Nacional de Registro de Datos Públicos publicada en el suplemento del Registro Oficial 162 del 31 de marzo del 2010:

    1.- Sustitúyese:

    a) El término Dirección Nacional de Registro de Datos Públicos por Dirección Nacional de Registros Públicos;

    b) El término Sistema Nacional de Registro de Datos Públicos por Sistema Nacional de Registros Públicos;

    c) El término Registro de Datos Públicos por Registros Públicos;

    d) El término datos de carácter personal por datos personales;

    e) El término datos públicos registrales por la expresión datos públicos y datos personales registrables;

    f) El artículo 6, por el siguiente: “Art. 6.- Accesibilidad y confidencialidad.- Son confidenciales los datos de carácter personal. El acceso a estos datos, solo será posible cuando quien los requiera se encuentre debidamente legitimado, conforme a los parámetros previstos en la Ley Orgánica de Protección de Datos Personales, su respectivo reglamento y demás normativa emitida por la Autoridad de Protección de Datos Personales.

    Al amparo de esta Ley, para acceder a la información sobre el patrimonio de las personas cualquier solicitante deberá justificar y motivar su requerimiento, declarar el uso que hará del mismo y consignar sus datos básicos de identidad, tales como nombres y apellidos completos, número del documento de identidad o ciudadanía, dirección domiciliaria y los demás datos que mediante el respectivo reglamento se determinen. Un uso distinto al declarado dará lugar a la determinación de responsabilidades, sin perjuicio de las acciones legales que el titular de la información pueda ejercer.

    La Directora o Director Nacional de Registros Públicos, definirá los demás datos que integran el sistema nacional y el tipo de reserva y accesibilidad.

    2.- Incorpórase:

    a) En el artículo 31 referente a las atribuciones y facultades de la Dirección Nacional de Registro Públicos antes del numeral 14 lo siguiente:

    “14. Controlar y supervisar que las entidades pertenecientes al Sistema Nacional de Registros Públicos incorporen mecanismos de protección de datos personales, así como dar cumplimiento a las disposiciones establecidas en la Ley Orgánica de Protección de Datos Personales, su reglamento de aplicación y demás normativa que la Autoridad de Protección de Datos Personales dicte para el efecto:

    15. Tratar datos procedentes del Sistema Nacional de Registros Públicos o de cualquier otra fuente, para realizar procesos de analítica de datos, con el objeto de prestar servicios al sector público, al sector privado y a personas en general, así como generar productos, reportes, informes o estudios, entre otros. Se utilizarán medidas adecuadas que garanticen el derecho a la protección de datos personales y su uso en todas las etapas del tratamiento, como por ejemplo, técnicas de disociación de datos, y,”

    3.- Suprímese del numeral 13 del artículo 31 lo siguiente: “y”;

    4.- Reenumerar el numeral 14 del artículo 31 por numeral “16”;

    TERCERA

    En el Código Orgánico de la Economía Social de los Conocimientos, Creatividad e Innovación publicado en el suplemento del Registro Oficial 899 del 09 de diciembre de 2016, sustitúyase la palabra confidencialidad por Protección en el numeral 5 del artículo 67.

    CUARTA

    En la Ley Orgánica de Telecomunicaciones, publicada en el tercer suplemento del Registro Oficial 439 del 18 de febrero de 2015:

    1.- Suprímese:

    a) El inciso segundo, tercer y cuarto del artículo 79;

    b) En el primer inciso del artículo 83 lo siguiente “(…) y seguridad de datos personales (.)”; y,

    c) En el inciso primero del artículo 85 lo siguiente “(…) como de seguridad de datos personal (…)”

    2.- Sustitúyese:

    a) El artículo 78 por el siguiente:

    “Art. 78.- Seguridad de los Datos Personales.- Las y los prestadores de servicios de telecomunicaciones deberán adoptar las medidas técnicas, organizativas y de cualquier otra índole adecuadas para preservar la seguridad de su red con el fin de garantizar la protección de los datos personales de conformidad con lo establecido en la Ley Orgánica de Protección de Datos Personales.”

    b) El artículo 81 por el siguiente:

    “Art. 81.- Guías telefónicas o de abonados en general.- Los abonados, clientes o usuarios tienen el derecho a no figurar en guías telefónicas o de abonados. Deberán ser informados, de conformidad con lo establecido en la Ley Orgánica de Protección de Datos Personales, de sus derechos con respecto a la utilización de sus datos personales en las guías telefónicas o de abonados y, en particular, sobre el fin o los fines de dichas guías, así como sobre el derecho que tienen, en forma gratuita, a no ser incluidos, en tales guías.”

    c) El artículo 82 por el siguiente:

    “Art. 82.- Uso comercial de datos personales.- Las y los prestadores de servicios no podrán usar datos personales, información del uso del servicio, información de tráfico o el patrón de consumo de sus abonados, clientes o usuarios para la promoción comercial de servicios o productos, a menos que el abonado o usuario al que se refieran los datos o tal información, haya dado su consentimiento conforme lo establecido en la Ley Orgánica de Protección de Datos Personales. Los usuarios o abonados dispondrán de la posibilidad clara y fácil de retirar su consentimiento para el uso de sus datos y de la información antes indicada. Tal consentimiento deberá especificar los datos personales o información cuyo uso se autorizan, el tiempo y su objetivo específico.

    Sin contar con tal consentimiento y con las mismas características, las y los prestadores de servicios de telecomunicaciones no podrán comercializar, ceder o transferir a terceros los datos personales de sus usuarios, clientes o abonados. Igual requisito se aplicará para la información del uso del servicio, información de tráfico o del patrón de consumo de sus usuarios, clientes y abonados.”

    d) El artículo 83 por el siguiente:

    “Art. 83.- Control técnico.- Cuando para la realización de las tareas de control técnico, ya sea para verificar el adecuado uso del espectro radioeléctrico, la correcta prestación de los servicios de telecomunicaciones, el apropiado uso y operación de redes de telecomunicaciones o para comprobar las medidas implementadas para garantizar el secreto de las comunicaciones y seguridad de datos personales, sea necesaria la utilización de equipos, infraestructuras e instalaciones que puedan vulnerar la seguridad e integridad de las redes. La Agencia de Regulación y Control de las Telecomunicaciones deberá diseñar y establecer procedimientos que reduzcan al mínimo el riesgo de afectar los contenidos de las comunicaciones.

    Cuando, como consecuencia de los controles técnicos efectuados, quede constancia de los contenidos, se deberá coordinar con la Autoridad de Protección de Datos Personales para que:

    a) Los soportes en los que éstos aparezcan no sean ni almacenados ni divulgados; y,

    b) Los soportes sean inmediatamente destruidos y desechados

    Si se evidencia un tratamiento ilegítimo o ilícito de datos personales, se aplicará lo dispuesto en la Ley Orgánica de Protección de Datos Personales.”

    DISPOSICIONES DEROGATORIAS

    PRIMERA

    Derógase el artículo 9 de la Ley de Comercio Electrónico, Firmas Electrónicas y Mensajes de Datos, publicada en el suplemento del Registro Oficial 557 del 17 de abril de 2002.

    SEGUNDA

    Derógase los artículos 80 y 84 de la Ley Orgánica de Telecomunicaciones, publicada en el tercer suplemento del Registro Oficial 439 del 18 de febrero de 2015.

    TERCERA

    Derógase el artículo 5 de la Ley Orgánica del Sistema Nacional de Registro de Datos Públicos publicada en el suplemento del Registro Oficial 162 de 3l de marzo de 2010.

    CUARTA

    Quedan así mismo derogadas todas aquellas disposiciones de igual o menor jerarquía que se contrapongan con la presente Ley Orgánica.

    DISPOSICIÓN FINAL

    La presente Ley entrará en vigencia una vez publicada en el Registro Oficial.

    Dado en la sede de la Asamblea Nacional, ubicada en el Distrito Metropolitano de Quito, provincia de Pichincha, a los … días del mes … de dos mil veinte.

    Memorando Nro. AN-VJPF-2021-0046-M

    Quito, D.M., 07 de abril de 2021

    PARA: Sr. Fernando Patricio Flores Vasquez, Presidente de la Comisión Especializada Permanente de Soberanía, Integración, Relaciones Internacionales y Seguridad Integral

    ASUNTO: Voto – “informe para segundo debate del “Proyecto de Ley Orgánica de Protección de Datos Personales”

    De mi consideración:

    Con relación al desarrollo de la continuación de la Sesión nº 147-2019-2021, modalidad virtual, celebrada el 7 de abril del presente año, la cual se refiere a la aprobación del “informe para segundo debate del “Proyecto de Ley Orgánica de Protección de Datos Personales“, votado y aprobado con 7 votos a favor; y, con la finalidad de dar cumplimiento a la solicitud emitida por la Secretaria General de la Asamblea Nacional mediante la “Guía para Procesos Legislativos durante la Emergencia Sanitaria” de 03 de abril de 2020, y al Memorando Nro.AN-SG-2020-0682-M de 22 de mayo de 2020, procedo a señalar que mi voto el mencionado informe fue A FAVOR.

    Atentamente,

    Documento firmado electrónicamente

    Sr. Pedro Fabricio Villamar Jácome, ASAMBLEÍSTA

    Señor Fernando Flores, PRESIDENTE DE LA COMISIÓN DE RELACIONES INTERNACIONALES. Quito

    De mi consideración:

    Por medio del presente tiene a bien confirmar la votación a favor del Informe para segundodebate del “Proyecto de Ley Orgánica de Protección de Datos Personales”,votado y aprobado con 7 votos a favor en la continuación de la Sesión nº 147-2019-2021,modalidad virtual, celebrada a partir de las 10h00 del 06 de abril del presente año.

    11May/21

    Resolución 28/16, 1 de abril de 2015

    Resolución 28/16. Resolución aprobada por la Asamblea General el 1 de abril de 2015. El derecho a la privacidad en la era digital.

    El Consejo de Derechos Humanos,

    Guiado por los propósitos y principios de la Carta de las Naciones Unidas,

    Reafirmando los derechos humanos y las libertades fundamentales consagrados en la Declaración Universal de Derechos Humanos y los tratados internacionales de derechos humanos pertinentes, entre ellos el Pacto Internacional de Derechos Civiles y Políticos y el Pacto Internacional de Derechos Económicos, Sociales y Culturales,

    Recordando la universalidad, indivisibilidad, interdependencia e interrelación de todos los derechos humanos y las libertades fundamentales,

    Reafirmando la Declaración y el Programa de Acción de Viena,

    Recordando sus resoluciones 5/1, sobre la construcción institucional del Consejo de Derechos Humanos, y 5/2, sobre el Código de Conducta para los Titulares de Mandatos de los Procedimientos Especiales del Consejo, de 18 de junio de 2007, y destacando que los titulares de mandatos desempeñarán sus funciones de conformidad con esas resoluciones y sus anexos,

    Recordando también las resoluciones de la Asamblea General 68/167, de 18 de diciembre de 2013, y 69/166, de 18 de diciembre de 2014, sobre el derecho a la privacidad en la era digital, y la decisión 25/117 del Consejo de Derechos Humanos, de 27 de marzo de 2014, relativa a la mesa redonda sobre el derecho a la privacidad en la era digital,

    Recordando además sus resoluciones 20/8, de 5 de julio de 2012, y 26/13, de 26 de junio de 2014, sobre la promoción, la protección y el disfrute de los derechos humanos en Internet,

    Acogiendo con beneplácito la labor de la Oficina del Alto Comisionado de las Naciones Unidas para los Derechos Humanos sobre el derecho a la privacidad en la era digital, haciendo notar con interés su informe sobre esa cuestión y recordando la mesa redonda sobre el derecho a la privacidad en la era digital celebrada durante el 27º período de sesiones del Consejo de Derechos Humanos,

    Tomando nota de los informes del Relator Especial sobre la promoción y protección de los derechos humanos y las libertades fundamentales en la lucha contra el terrorismo , y del Relator Especial sobre la promoción y protección del derecho a la libertad de opinión y de expresión ,

    Observando con aprecio la observación general nº 16 del Comité de Derechos Humanos, sobre el derecho al respeto de la vida privada, la familia, el domicilio y la correspondencia, y a la protección de la honra y la reputación, y observando también los grandes cambios tecnológicos que se han producido desde su aprobación,

    Recordando que la Asamblea General, en su resolución 69/166, alentó al Consejo de Derechos Humanos a que siguiera ocupándose activamente del debate sobre el derecho a la privacidad en la era digital, con el fin de determinar y aclarar los principios, normas y mejores prácticas relativos a la promoción y protección del derecho a la privacidad, y a que considerara la posibilidad de crear un procedimiento especial con ese fin,

    Reconociendo la necesidad de seguir debatiendo y analizando, sobre la base del derecho internacional de los derechos humanos, las cuestiones relativas a la promoción y protección del derecho a la privacidad en la era digital, las garantías procesales, la supervisión y los recursos nacionales efectivos, y el efecto de la vigilancia en el derecho a la privacidad y otros derechos humanos, así como la necesidad de examinar los principios de no arbitrariedad y legalidad y la pertinencia de las evaluaciones de la necesidad y la proporcionalidad en relación con las prácticas de vigilancia,

    Reafirmando el derecho humano a la privacidad, según el cual nadie debe ser objeto de injerencias arbitrarias o ilícitas en su vida privada, su familia, su domicilio o su correspondencia, y el derecho a la protección de la ley contra tales injerencias, y reconociendo que el ejercicio del derecho a la privacidad es importante para materializar el derecho a la libertad de expresión y a abrigar opiniones sin injerencias, y el derecho a la libertad de reunión y asociación pacíficas, y es una de las bases de una sociedad democrática,

    Observando que el rápido ritmo del desarrollo tecnológico permite a las personas de todo el mundo utilizar la nueva tecnología de la información y las comunicaciones y, al mismo tiempo, incrementa la capacidad de los gobiernos, las empresas y las personas de llevar a cabo actividades de vigilancia, interceptación y recopilación de datos, lo que podría constituir una violación o una transgresión de los derechos humanos, en particular del derecho a la privacidad, establecido en el artículo 12 de la Declaración Universal de Derechos Humanos y el artículo 17 del Pacto Internacional de Derechos Civiles y Políticos, y que, por lo tanto, esta cuestión suscita cada vez más preocupación,

    Observando también que, si bien los metadatos pueden aportar beneficios, algunos tipos de metadatos, tomados en conjunto, pueden revelar información personal y pueden dar indicación del comportamiento, las relaciones sociales, las preferencias privadas y la identidad de una persona,

    Poniendo de relieve que los Estados deben respetar las obligaciones internacionales de derechos humanos en lo referente al derecho a la privacidad cuando intercepten las comunicaciones digitales de las personas o reúnan datos personales y cuando exijan a terceros, incluidas las empresas privadas, la divulgación de datos personales,

    Recordando que las empresas comerciales tienen la responsabilidad de respetar los derechos humanos, tal como se estableció en los Principios Rectores sobre las Empresas y los Derechos Humanos: Puesta en Práctica del Marco de las Naciones Unidas para “Proteger, Respetar y Remediar”,

    Profundamente preocupado por los efectos negativos que pueden tener para el ejercicio y el goce de los derechos humanos la vigilancia y la interceptación de las comunicaciones, incluidas la vigilancia y la interceptación extraterritoriales de las comunicaciones y la recopilación de datos personales, en particular cuando se llevan a cabo a gran escala,

    Observando con profunda preocupación que, en muchos países, las personas y las organizaciones dedicadas a promover y defender los derechos humanos y las libertades fundamentales sufren con frecuencia amenazas, acoso e inseguridad, así como injerencias ilícitas o arbitrarias en su derecho a la privacidad, como resultado de sus actividades,

    Observando que, aun cuando las consideraciones relacionadas con la seguridad pública pueden justificar la reunión y la protección de determinada información delicada, los Estados deben garantizar el pleno cumplimiento de sus obligaciones en virtud del derecho internacional de los derechos humanos,

    Observando también, a ese respecto, que la prevención y represión del terrorismo redundan en interés público y tienen gran importancia, y reafirmando a la vez que los Estados deben cerciorarse de que toda medida que se adopte para luchar contra el terrorismo sea conforme con sus obligaciones con arreglo al derecho internacional, en particular el derecho internacional de los derechos humanos, el derecho internacional de los refugiados y el derecho internacional humanitario,

    1. Reafirma el derecho a la privacidad, según el cual nadie debe ser objeto de injerencias arbitrarias o ilícitas en su vida privada, su familia, su domicilio o su correspondencia, y el derecho a la protección de la ley contra tales injerencias, establecidos en el artículo 12 de la Declaración Universal de Derechos Humanos y el artículo 17 del Pacto Internacional de Derechos Civiles y Políticos;

    2. Reconoce la naturaleza global y abierta de Internet y el rápido avance de la tecnología de la información y las comunicaciones como fuerza impulsora de la aceleración de los progresos hacia el desarrollo en sus distintas formas;

    3. Afirma que los derechos de las personas, incluido el derecho a la privacidad, también deben estar protegidos en Internet;

    4. Decide nombrar, por un período de tres años, un Relator Especial sobre el derecho a la privacidad, con las siguientes funciones, entre otras:

    a) Reunir información pertinente, entre otras cosas sobre los marcos internacionales y nacionales y las prácticas y la experiencia nacionales, estudiar las tendencias, las novedades y los retos relacionados con el derecho a la privacidad, y formular recomendaciones para garantizar su promoción y protección, en particular en relación con los retos que plantean las nuevas tecnologías;

    b) Buscar, recibir y responder a información, evitando duplicaciones, de los Estados, las Naciones Unidas y sus organismos, programas y fondos, los mecanismos regionales de derechos humanos, las instituciones nacionales de derechos humanos, las organizaciones de la sociedad civil, el sector privado, incluidas las empresas comerciales, y otros interesados o partes pertinentes;

    c) Determinar posibles obstáculos a la promoción y protección del derecho a la privacidad, determinar, intercambiar y promover principios y mejores prácticas a nivel nacional, regional e internacional, y presentar propuestas y recomendaciones al Consejo de Derechos Humanos a ese respecto, entre otras cosas en relación con retos concretos de la era digital;

    d) Participar y hacer contribuciones en las conferencias y reuniones internacionales pertinentes, con el fin de promover un enfoque sistemático y coherente de las cuestiones inherentes al mandato;

    e) Concienciar acerca de la importancia de promover y proteger el derecho a la privacidad, entre otras cosas en relación con retos concretos de la era digital, así como acerca de la importancia de proporcionar a las personas cuyo derecho a la privacidad haya sido vulnerado un recurso efectivo acorde con las obligaciones internacionales de derechos humanos;

    f) Integrar una perspectiva de género en todas las actividades del mandato;

    g) Denunciar las presuntas violaciones, dondequiera que tengan lugar, del derecho a la privacidad establecido en el artículo 12 de la Declaración Universal de Derechos Humanos y el artículo 17 del Pacto Internacional de Derechos Civiles y Políticos, en particular en relación con los retos que plantean las nuevas tecnologías, y poner en conocimiento del Consejo y del Alto Comisionado de las Naciones Unidas para los Derechos Humanos las situaciones de especial gravedad;

    h) Presentar un informe anual al Consejo de Derechos Humanos y a la Asamblea General, a partir de sus períodos de sesiones 31º y septuagésimo primero, respectivamente;

    5. Invita al Relator Especial a que incluya en su primer informe observaciones que considere importantes para abordar el derecho a la privacidad en la era digital;

    6. Exhorta a los Estados a que cooperen plenamente con el Relator Especial y le presten asistencia en el desempeño de su mandato, entre otras cosas proporcionándole toda la información necesaria que solicite, a que respondan con prontitud a sus llamamientos urgentes y demás comunicaciones, y a que consideren la posibilidad de dar una respuesta favorable a las solicitudes que les dirija para visitar sus países y de aplicar las recomendaciones que formule en sus informes;

    7. Alienta a todos los interesados pertinentes, incluidas las Naciones Unidas y sus organismos, programas y fondos, los mecanismos regionales de derechos humanos, las instituciones nacionales de derechos humanos, la sociedad civil y el sector privado, a que cooperen plenamente con el Relator Especial para permitir al titular cumplir su mandato;

    8. Solicita al Secretario General y al Alto Comisionado que otorguen al Relator Especial todos los recursos humanos y financieros necesarios para el efectivo cumplimiento del mandato;

    9. Decide seguir examinando la cuestión en relación con el mismo tema de la agenda.

    56ª sesión, 26 de marzo de 2015

    09May/21

    Proyecto de Ley. Reforma integral a la Ley de Protección de la Personal frente al Tratamiento de su Datos Personales, 12 febrero 2021

    Proyecto de Ley. Reforma integral a la Ley de Protección de la Personal frente al Tratamiento de su Datos Personales. Expediente nº 22.388. (Diario Oficial La Gaceta, año CXLLL, nº 30 (alcance 33 a la Gaceta 30), San José, Costa Rica, viernes 12 de febrero de 2021).

    ASAMBLEA LEGISLATIVA. PROYECTO DE LEY COSTA RICA

    REFORMA INTEGRAL A LA LEY DE PROTECCIÓN DE LA PERSONA FRENTE AL TRATAMIENTO DE SUS DATOS PERSONALES. Expediente n° 22.388

    La “Era de los Datos” plantea un gran reto para los Derechos Humanos así como para los Congresos del mundo entero. La llegada de diversas innovaciones tecnológicas en el análisis, recopilación y procesamiento de datos, así como varias coyunturas globales de reciente data, han puesto en relieve la necesidad de crear marcos normativos mucho más robustos en lo que se refiere al tratamiento de datos personales.

    En 2016, Dominic Cummings, director de la campaña Leave EU -a favor de la salida de Reino Unido de la Unión Europea-, presentó al hoy Primer Ministro británico, Boris Johnson, una novedosa estrategia para ganar el referéndum conocido como Brexit. La estrategia consistía en usar los datos personales que los votantes entregan en sus redes sociales para crear perfiles psicosociales, y con ellos definir mensajes personalizados que permitieran inducir el voto.

    Esa propuesta llegó al director de campaña de manos de la empresa AggregateIQ, aliada de la mundialmente conocida Cambridge Analytica (CA). Como se demostró en el Parlamento Británico posteriormente, CA participó en la campaña, y aportó los datos de los votantes y el software que generó los perfiles y la campaña personalizada. Por medio de los perfiles psicosociales, se dividió a los votantes en descartables, seguros, y potenciales. Para este último grupo, se trabajaron mensajes altamente personalizados basados en sus preocupaciones, en gran medida noticias falsas que alimentaban sus temores y desinformación.

    Ese software también permitió identificar a aquellas personas desinteresadas en la política: quienes desde hace mucho tiempo no votaban o nunca habían votado en ningún proceso. Miles de estos votantes se encontraban en poblados alejados de los grandes centros de población, habiendo sido excluidos del proceso democrático, y también desplazados por los procesos de gentrificación (Harvey, 2013). Dicho grupo recibió por primera vez en mucho tiempo la visita de políticos que prometían empleo, seguridad social y vivienda… si el Reino Unido abandonaba la Unión Europea. Ese nivel de precisión -incluso fuera de las redes sociales- permiten las campañas de microtargeting basadas en datos personales.

    Cambridge Analytica estuvo en el centro del escándalo desde marzo de 2018, cuando los diarios The Guardian, The New York Times y The Observer, revelaron que la consultora política accedió a los datos personales de 50 millones de usuarios de Facebook sin su autorización, y que fueron usados por la campaña del expresidente de los Estados Unidos, Donald Trump, con una estrategia digital prácticamente idéntica a la ejecutada en el Brexit (Graham y Cadwalladr, 2019). En este caso el énfasis también estuvo en la política migratoria y en divulgar noticias falsas sobre la candidata demócrata, Hillary Clinton.

    La revelación la hizo uno de los creadores del sistema, Christopher Wylie, quien relató que los datos surgieron de un test de personalidad desarrollado por el profesor de la Universidad de Cambridge, Aleksandr Kogan, que, como muchas aplicaciones, requería a los usuarios iniciar sesión en Facebook y otorgar algunos permisos de acceso. 270 mil personas hicieron el test, sin saber que al hacerlo estaban autorizando a la aplicación recopilar toda su información y la de todos sus amigos de la red social, sumando alrededor de 87 millones de personas. Tampoco sabían que esa información iba a ser vendida a CA por 800 mil dólares.

    El ex empleado de CA también reveló que Facebook supo lo que estaba pasando con los datos de sus usuarios muchos meses antes de que fuera divulgado por los medios de comunicación. Fue hasta después del escándalo, y de que las acciones de la red social tuvieran una millonaria caída, que su fundador y CEO, Mark Zuckerberg, reconoció públicamente los fallos en la seguridad (BBC Mundo, 2018).

    Después de diversas investigaciones, Cambridge Analytica cerró, mientras Facebook siguió en el foco de atención por sus problemas de seguridad y el uso de los datos de sus usuarios. Tiempo después, la Comisión Federal de Comercio de Estados Unidos ordenó a la red social a pagar US$5.000 millones como sanción por las malas prácticas en el manejo de la seguridad de los datos de los usuarios. En Reino Unido, la red social fue condenada a pagar una multa de 500.000 libras (US $600.000) ante la Oficina del Comisionado de Información del Reino Unido por el mismo caso. La Resolución del Parlamento Europeo contra Facebook, del 25 de octubre de 2018, confirmó que se utilizaron datos personales de forma irregular por parte de Cambridge Analytica, dentro de los que se encontraban los datos de 2,7 millones de ciudadanos de la Unión.

    Una visión de derechos humanos y centrada en las personas

    Toda esta coyuntura profundizó las discusiones relacionadas al uso de los datos en el ámbito político-democrático, así como a los cambios que debían realizarse en las legislaciones del mundo. Como es evidente, las redes sociales están en el centro de tales debates.

    Ciertamente, cada vez cobra más relevancia este tema entre una mayoría de la población; prueba de ello es la reciente migración masiva de la red de mensajería WhatsApp hacia otros servicios como Signal o Telegram (en el caso de Telegram, llegando a reportar 8 millones de personas usuarias nuevas por día a mediados de enero), debido a cambios en los términos y las condiciones de uso de WhatsApp, vinculados a cómo se usarían los datos y metadatos de sus usuarios (Sanz, 2021).

    A pesar de esa creciente conciencia, coyunturas como las de Cambridge Analytica dejan claro que las empresas que lucran con los datos se aprovecharon de varios elementos claves: que las personas usuarias con su “permiso”, daban acceso a casi la totalidad de los datos colocados en sus perfiles así como a datos sobre su uso e interacción; que tales permisos acarreaban una falta de control sobre sus datos (una especie de “no retorno”) y que esencialmente las personas utilizan dichas redes para generar reacciones (likes) exponiendo su vida personal, y compartiendo información que provoque autosatisfacción, lo que permite conocer con gran precisión el perfil psicológico de esas personas de forma masiva.

    “El acto de compartir noticias e información en redes sociales tiene que ver con la emoción que nos genera el contenido y que queremos socializar con el resto de las personas. Así, nos damos cuenta de que las redes sociales más que ser espacios de aislamiento social, son todo lo contrario: una proyección de nosotros mismos y un lugar donde queremos compartir no solo información, sino también emociones” (Valenzuela y Arriagada, 2016).

    Este es precisamente el gran valor que hay en los datos personales en redes sociales: al haber tantísima información, tienen el potencial de identificar muy precisamente las necesidades, los miedos, los intereses de las personas y de incluso predecir los comportamientos, no solo en aspectos eminentemente comerciales o de consumo, sino en términos políticos. “La psicopolítica digital es capaz de llegar a procesos psíquicos de manera prospectiva. Es quizá mucho más rápida que la voluntad libre. Puede adelantarla. La capacidad de prospección de la psicopolítica digital significaría el fin de la libertad” (Hans y Bergés, 2014).

    En este sentido, el abordaje de este gran reto debe hacerse desde el enfoque de los derechos humanos y debe comprender el valor que tiene para la robustez de las sociedades democráticas. Los marcos normativos deben tener como prioridad y centro a la persona, de forma que se garantice su autonomía y su autodeterminación alrededor de cómo se usa la información y la data que genera su vida, su interacción social, su interacción digital.

    Estos marcos deben estar centrados en el usuario y enfocarse en amparar y fortalecer los derechos, al tiempo que proporcionen reglas claras y predecibles para que las cumplan las entidades públicas y privadas.” (AccessNow, 2018) Es decir, si bien los casos de mayor conocimiento público global -como los descritos arriba- han estado relacionados a empresas del sector privado, al enfocar la discusión sobre la actualización de la normativa desde las personas, les protege también ante los Estados y las instituciones públicas, evitando así usos abusivos de la información y brindando un marco de garantías más firme para la defensa de sus derechos.

    “Asimismo, y como se ha podido observar a partir de los escándalos recientes que involucran a empresas del sector privado intensivas en el uso de datos, es necesario evitar que, sin contar con la experiencia necesaria, los gobiernos caigan en la tentación de desarrollar sistemas que utilicen los datos de los ciudadanos sin que incorporen paralelamente un enfoque ético y responsable desde su diseño que asegure cuestiones básicas como la privacidad o el consentimiento. Lo que aquí está en juego no es otra cosa que sentar las bases para un nuevo contrato social que permita una utilización masiva y responsable de los datos por parte de las entidades gubernamentales para proporcionar mejores servicios sociales, al tiempo que se mantiene la confianza de los ciudadanos en que los gobiernos gestionen sus datos de manera responsable.” (BID, 2019)

    Datos sin protección: el reto de actualizar la normativa

    Si bien ya en la década de los noventa muchos países del mundo contaban con leyes para la protección de los datos personales de sus ciudadanos, esas normativas no contemplaron un contexto como el descrito anteriormente: la era del Big Data y el desarrollo de tecnologías que tienden a que las personas pierdan el control y algunas veces hasta prácticamente la propiedad, sobre sus datos.

    Costa Rica, en definitiva, no escapa a este panorama. El país cuenta con una Ley de Protección de la Persona Frente al Tratamiento de sus Datos Personales aprobada en 2011 -cuya discusión legislativa se remonta a inicios de los 2000-, que establece regulaciones para el manejo y procesamiento de datos sensibles en las bases de instituciones públicas y empresas, y que fue considerada de avanzada al momento de su creación. Sin embargo, carece de varios conceptos actuales, lo que le da un alcance relativamente limitado para tutelar correctamente los derechos de la ciudadanía en la era de la información y las nuevas tecnologías de recolección y procesamiento de datos.

    El informe “Cyber Troops Country Profile: Costa Rica”, de Simone Bunse (2021), ha dejado ver que si bien en la actualidad las tácticas digitales para esparcir desinformación y propaganda electoral carecen de alta sofisticación, el uso de redes sociales con estos fines se acrecienta, ya se ha probado la contratación y el uso de servicios en el extranjero con estos fines, y es probable que su uso pueda acrecentarse y normalizarse en un futuro no muy lejano.

    Por otro lado, también existen falencias y debilidades a nivel institucional -varias de ellas originadas en la ley- que no han permitido a la Autoridad Nacional de Protección de datos, la Prodhab, para hacer cumplir la ley actual y por tanto también deben subsanarse.

    El Reglamento General de Protección de Datos de la Unión Europea: un referente global

    El derecho a la protección de los datos personales está relacionado con el derecho a la privacidad, pero sus alcances son distintos. Más de 160 países consagran el derecho a la privacidad en sus constituciones, pero el entendimiento de lo que implica varía de un país a otro. Los estados miembros de la Unión Europea representan una excepción en este sentido, ya que reconocieron la protección de datos como un derecho fundamental en la Carta de 2001 de la UE.

    La normativa que ha desarrollado la Unión Europea en materia de protección de datos ha servido de referente en para el resto del mundo, aunque ciertamente desde su aprobación también se han encontrado diversas oportunidades de mejora. En 2016, entró en vigor el Reglamento General de Protección de Datos (RGPD) y fue de aplicación en 2018. Una de sus virtudes fue el desarrollo de principios claros bajo los cuales debe realizarse cualquier tratamiento de datos personales, comprendiendo así que más allá de la tecnología utilizada o los términos en que se acordó el tratamiento de los datos en particular, los fundamentos desde los que se realiza dicho tratamiento deberían ser siempre la mismos.

    Principio                                                             Resumen

    Limitación del fin                            El tratamiento debe estar limitado a los fines legítimos para los cuales los datos personales fueron recogidos originalmente.

    Minimización de datos                   Al momento de recoger datos, sólo se pueden solicitar los datos personales absolutamente necesarios para el fin legítimo acordado con la persona titular.

    Exactitud                                         Los datos personales de los interesados deben ser siempre precisos y estar actualizados.

    Integridad y confidencialidad       Los datos personales deben ser tratados de forma que se garantice la seguridad apropiada, incluyendo protección contra el tratamiento no autorizado o ilegal.

    Limitación del almacenamiento   Los datos solo deben ser conservados mientras sea necesario. Es decir, deben de ser eliminados una vez se haya cumplido el fin legítimo para se recogieron.

    Lealtad y transparencia               Las empresas no deben realizar tratamientos que no sean legítimos, es decir, deben ser leales hacia las personas titulares con respecto a la ley. Además, las empresas deben ser transparentes con respecto al tratamiento, e informar a la persona interesada de manera abierta y transparente.

    Cuadro 1. Principios para el tratamiento de datos personales en el RGPD. Basado en el RGPD de la Unión Europea y Bhatia, P. (2018).

    Asimismo, otro de los desarrollos conceptualmente interesantes del RGPD fueron las categorías de derechos, los cuales se plantearon bajo el mismo paradigma de procurar que, más allá de una tecnología o tipo de uso concreto, las personas usuarias puedan ejercer esos derechos en toda circunstancia, de manera que, además de ser derechos vinculantes para todo tratamiento de datos personales, deben ser de acceso gratuito y de aplicación permanente.

    Derecho                                                              Resumen

    Derecho de acceso                       Habilita a los usuarios a obtener confirmación de los servicios y compañías con respecto a la posible recopilación y procesamiento de sus datos personales. Los usuarios deben tener acceso a los datos y el propósito del procesamiento.

    Derecho de oposición                 Permite a los usuarios a rehusarse al procesamiento de su información personal cuando no hayan prestado su consentimiento o no hayan firmado un contrato.

    Derecho de supresión                 Permite que los usuarios soliciten la eliminación de todos sus datos personales cuando dejan un servicio o aplicación.

    Derecho de rectificación             Permite que los usuarios soliciten la modificación de información errónea.

    Derecho a la información            Garantiza que los usuarios reciban información clara y entendible por parte de las entidades que procesan sus datos, ya sea que estas entidades los recopilaron de manera directa o a través de terceros. Toda la información provista al usuario debe ser concisa, comprensible, y de fácil acceso.

    Derecho a la explicación             Motiva a los usuarios a obtener información sobre el tratamiento de datos personales automatizado y sus consecuencias. Este derecho es esencial para conocer el uso de algoritmos que tienen un impacto en la vida de los usuarios.

    Derecho a la portabilidad            Permite que los usuarios movilicen datos personales que han compartido de una plataforma a otra que ofrezca servicios similares.

    Cuadro 2. Derechos para el tratamiento de datos personales en el RGPD. Basado en el RGPD de la Unión Europea.

    La lista, que no es exhaustiva, permite ver las diversas dimensiones en que debe tutelarse la autodeterminación informativa de la ciudadanía y, además que estamos ante un ámbito que requiere de mucha precisión y visión al confeccionar normativa, al tratarse de conceptos jurídicos que aplican a situaciones altamente cambiantes, con muchas posibles vulnerabilidades para la integridad de las personas.

    Legislación consultada sobre protección de datos personales

    Como parte de la construcción de esta propuesta, se analizaron diferentes legislaciones, junto al RGPD, para incorporar otros aspectos en que había oportunidades de mejora. Entre las legislaciones consultadas están las siguientes:

    Jurisdicción                       Nombre de la norma                                                                    Año                  

    Argentina                           Proyecto de Ley de Protección de Datos  Personales                 Presentación: 2017

    Brasil                                 Ley General de Protección de Datos Personales (LGPD)           Aprobación: 2018 Vigencia: 2020

    Canadá                              Proyecto de Reforma a la Ley de Privacidad (Privacy Act)           Presentación: 2020

    Nueva Zelanda                  Privacy Act                                                                         Vigencia: 2020

    Ecuador                             Proyecto de Ley Orgánica de Protección de Datos                       Presentación: 2019

    Estado de California,

    Estados Unidos                 Ley de Privacidad para el Consumidor del Estado de California    Vigencia: 2018

    Estado de California,

    Estados Unidos                 Ley de Derechos de Privacidad

    del Estado de California                                                               Vigencia: 2020

    Unión Europea

    (Parlamento y Consejo

    Europeo)                            Reglamento General de Protección de Datos      Aprobación: 2016 Vigencia: 2018

    Protección de Datos en América Latina

    En cuanto a la legislación consultada en América Latina, conviene destacar, una legislación de reciente aprobación, la Ley General de Protección de Datos Personales de Brasil (LGPD), que entró en vigor en 2020, después de su aprobación en 2018 y dos años de vacancia. Si bien en términos de los principios y derechos que se explicaron, así como sus sanciones, usa un marco similar al RGPD, se encuentran algunas diferencias que son interesantes de destacar:

    – Incorporó medidas mucho más restrictivas para el tratamiento de datos de personas menores de edad, en particular para la obtención del consentimiento informado. La edad debajo de la cual aplican estas restricciones son los 18 años (en el RGPD, esto es hasta los 16) y la información que recibe la persona titular tiene requisitos más específicos sobre su claridad, explicación del tratamiento, e inclusive el formato.

    – Las sanciones a empresas fueron relativizadas al contexto brasileño, reduciendo los porcentajes a 2% de la facturación, mientras que en el RGPD este porcentaje llega hasta a 8% en algunos casos.

    – En el tema de notificación de brechas de seguridad, la LGPD tiene plazos de notificación menos severos y específicos que el RGPD.

    – En el tema de transferencia transfronteriza de datos, disminuyó las excepciones con las que cuenta el RGPD para validar la transferencia de un tercer país a la jurisdicción brasileña, dando como resultado un marco más estricto.

    Este marco jurídico de protección de datos personales se considera uno de los más de avanzada en la región, siendo que cumple con los estándares más innovadores e incorpora temas novedosos, como el marco de protección de derechos de personas menores de edad y se adapta a la realidad jurídica e institucional brasileña.

    Sin haber conseguido su aprobación aún, existen otros esfuerzos en América Latina orientados a actualizar las normas a estándares más innovadores de protección de datos personales. Uno de ellos es el proyecto de ley de protección de datos en Argentina, que, a grandes rasgos, utiliza la base de principios (en su capítulo 2) y derechos (en su capítulo 3) del RGPD de la UE. La iniciativa presentaba puntos de discusión álgidos como las excepciones al consentimiento por motivaciones de “seguridad nacional” muy abiertas o justificaciones difusas para evitar notificar a las personas usuarias sobre el tratamiento de sus datos, así como la poca independencia que tendría la autoridad de control de protección de datos personales (Pisanu, 2018), sin embargo, se ha procurado corregirlas en versiones recientes del proyecto de Ley.

    Otro proyecto que resulta de interés mencionar es el Proyecto de Ley de Orgánica de Protección de datos personales del Ecuador, que tiene como fin adecuar sus normas a los estándares europeos, motivados también por aspectos de comercio internacional, siendo que dicho país actualmente no cuenta con un marco regulatorio específico para la Protección de Datos Personales: “al no tener normativa amparada por un ente controlador especializado en la materia, no le es posible al país ofrecer un nivel adecuado de protección, lo que desalienta el comercio y genera que se prefieran destinos como Colombia, Perú y los demás países suscriptores del acuerdo, que sí cuentan con Ley de Protección de Datos Personales”.

    La orientación hacia la persona usuaria del proyecto de ley se puede observar en los principios que rigen el tratamiento (Capítulo II), los derechos que le asisten a las personas titulares de los datos (Capítulo III) y la especificidad de las normas de garantías para la seguridad y el tratamiento de los datos, así como las exigencias de responsabilidad proactiva que exigiría a las empresas y entidades que realicen algún tipo de tratamiento de datos personales.

    Estas son legislaciones e iniciativas de la región que buscan ubicarse a la vanguardia de los estándares de protección de datos a nivel global, partiendo de los principios y derechos protegidos por la normativa europea, pero adaptándola a los contextos latinoamericanos y solventando oportunidades de mejora detectadas en el propio RGPD. Es en esta línea que se ha trabajado la presente propuesta legislativa.

    La ley 8968: ¿cuáles son sus áreas de mejora?

    Como se ha señalado, la Ley de Protección de Datos Personales que esta propuesta pretende remozar fue una legislación de avanzada en el momento de su aprobación, en 2011. Sin embargo, las primeras discusiones legislativas (que dan base a dicha legislación) datan de 2003. Esto, sumado al vertiginoso cambio tecnológico alrededor del tratamiento de datos personales -el cual hemos buscado sintetizar a lo largo de esta exposición de motivos-, definitivamente ha modificado las bases sobre las cuales una legislación robusta debería estar asentada.

    Partiendo del contexto descrito, los referentes que se han analizado y la realidad institucional y nacional sobre protección de datos personales, se recogen a continuación los principales aspectos en los que se considera que la legislación costarricense tiene oportunidades de mejora.

    1) Actualización de conceptos base utilizados en la legislación. Las nociones básicas a las cuales hace referencia la Ley vigente han sido superados en muchos casos. En algunas ocasiones, esto implicaría remozar conceptos ya empleados; en otras, añadir concepciones inexistentes en la legislación. Buenos ejemplos de esto son conceptos como “datos biométricos”, “datos genéticos” o “seudonimización”.

    2) Desarrollo de los principios que rigen el tratamiento de datos personales, así como de los derechos que le asisten a las personas titulares. Teniendo como referente el RGPD de la Unión Europea, es evidente que los principios explicitados en la Ley nº 8968 son limitados y no generan un marco robusto para el tratamiento de datos en el país. Principios como la lealtad, la transparencia, la minimización de datos o la finalidad o conservación limitada son ejemplos de ello. Asimismo, los derechos que le asisten a la persona tienen múltiples áreas de mejora, en casos como el derecho de oposición, limitación del tratamiento, supresión, o la portabilidad.

    3) Limitación tajante de las excepciones a la autodeterminación informativa de la persona interesada, y clarificación de las excepciones al consentimiento informado. Una de las áreas más relevantes de mejorar. Las excepciones a la autodeterminación informativa en la Ley vigente son excesivamente amplias y riesgosas para la ciudadanía, pues abren muchísimas posibilidades de disminuir la totalidad de garantías (y no solo el consentimiento informado) establecidas en la Ley, lo cual es urgente de limitar únicamente a casos determinados por Ley o por vía judicial. Por otro lado, las excepciones al consentimiento informado de la persona interesada, deben ser clarificados y establecidos de manera específica, cerrando el lugar a interpretación en la normativa.

    4) Fortalecimiento institucional de la Autoridad Nacional, la Prodhab. Este fortalecimiento va en dos sentidos:

    a) Dotar de independencia de criterio al órgano, mediante su traslado a un ámbito de la administración pública menos sujeta a determinaciones políticas coyunturales y

    b) Robustecer presupuestariamente a la Prodhab a través de nuevos mecanismos de ingreso y una mayor flexibilidad en el uso de los recursos recaudados por cánones y multas.

    5) Fortalecimiento de las garantías para la seguridad y la confidencialidad.

    Implementar nuevas y mejores medidas preventivas, especialmente para tratamientos de datos de mayor riesgo. Entre los mecanismos que se podrían utilizar están robustecer los protocolos de actuación, los estudios de impacto o el requerimiento de una persona delegada de datos.

    6) Fortalecimiento del esquema de sanciones. Actualización del esquema de sanciones de manera que esté acorde con la realidad económica del mercado de datos en la actualidad, bajo la premisa de que no sea más “rentable” para un ente responsable de tratamiento de datos, pagar multas que cumplir la ley.

    7) Desarrollo de bases claras para la transferencia transfronteriza de datos. Establecer reglas nuevas bajo las cuales la Autoridad Nacional pueda determinar cuando es posible y válido realizar una transferencia de datos a otra jurisdicción, resguardando la integridad de los datos de las personas titulares de los mismos.

    Respondiendo a las consideraciones de fortalecimiento de la Ley nº 8968, Ley de Protección de la Persona Frente al Tratamiento de sus Datos Personales arriba detalladas y con base en las consideraciones previamente expuestas, sometemos a su consideración la presente iniciativa de ley.

    Bibliografía

    AccessNow.org. (2018). La Creación de un Marco para la Protección de Datos: una guía para los Legisladores sobre qué hacer y qué no. https://www.accessnow.org/cms/assets/uploads/2018/04/manual-de-proteccion-de-datos.pdf

    BBC Mundo. (2018, 21 marzo). Cambridge Analytica: Mark Zuckerberg reconoce que Facebook cometió errores en medio del peor escándalo que ha enfrentado la red social. de https://www.bbc.com/mundo/noticias-43484188

    Bunse, S. (2021) Global Cyber Troops Country Profile: Costa Rica. LEAD University& Georgetown University. https://comprop.oii.ox.ac.uk/wp-content/uploads/sites/127/2021/01/Cyber-Troop-Costa-Rica-2020.pdf

    Banco Interamericano de Desarrollo, BID. (2019). LA GESTIÓN ÉTICA DE LOS DATOS: Por qué importa y cómo hacer un uso justo de los datos en un mundo digital. https://publications.iadb.org/publications/spanish/document/La_Gesti%C3%B3n_%C3%89tica_de_los_Datos.pdf

    Hans, B. C., & Bergés, A. (2014). Psicopolítica: neoliberalismo y nuevas técnicas de poder. Barcelona, España: Herder.

    Harvey, D. (2013). Ciudades rebeldes. Tres Cantos: Akal.Graham-Harrison, E., & Cadwalladr, C. (2019, 21 junio). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election

    Presidência da República, Brasil. (2019). Lei Geral de Proteção de Dados Pessoais (LGPD). https://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/L13709compilado.htm

    Valenzuela, S. & Arriagada, A. (2016). Viralizando la emoción y por qué la compartimos online. En A. Arriagada (ed.). El mundo en mi mano: La revolución de los datos móviles. Santiago: Fundación País Digital.

    LA ASAMBLEA LEGISLATIVA DE LA REPÚBLICA DE COSTA RICA

    DECRETA:

    REFORMA INTEGRAL A LA LEY DE PROTECCIÓN DE LA PERSONA FRENTE AL TRATAMIENTO DE SUS DATOS PERSONALES

    ARTÍCULO ÚNICO- Se reforma integralmente la Ley n° 8968, Ley de Protección de la Persona frente al Tratamiento de sus Datos Personales del 5 de setiembre de 2011, que en lo sucesivo dirá:

    “LEY DE PROTECCIÓN DE LA PERSONA FRENTE AL TRATAMIENTO DE SUS DATOS PERSONALES

    CAPÍTULO I. DISPOSICIONES GENERALES

    SECCIÓN ÚNICA

    ARTÍCULO 1.- Objetivo y fin

    Esta ley es de orden público y tiene como objetivo garantizar a cualquier persona, independientemente de su nacionalidad, residencia o domicilio, el respeto a su derecho a la autodeterminación informativa en relación con su vida o actividad privada y demás derechos de la personalidad, así como la defensa de su autonomía personal con respecto al tratamiento automatizado o manual de los datos correspondientes a su persona.

    ARTÍCULO 2.- Ámbito de aplicación material

    Esta ley será de aplicación al tratamiento de los datos personales, incluyendo la recopilación, el uso, la retención y análisis, por organismos públicos o privados.

    El régimen de protección de los datos de carácter personal que se establece en esta ley no será de aplicación a las bases de datos mantenidas por personas físicas, siempre y cuando estas sean utilizadas con fines exclusivamente personales o domésticos y no sean vendidas o de cualquier otra manera comercializadas, incluyendo fines de prospección.

    ARTÍCULO 3.- Ámbito de aplicación territorial

    Esta ley se aplica en cualquiera de las siguientes circunstancias:

    a) Cuando haya tratamiento de datos personales recopilados en territorio costarricense en el contexto de las actividades propias del responsable de la base de datos, independientemente de que dicho tratamiento tenga lugar en Costa Rica o no.

    b) Cuando haya tratamiento de datos de personas que residan en la República de Costa Rica por parte de un responsable no establecido en el territorio costarricense, independientemente de si a las personas interesadas se les requiere su pago o no.

    ARTÍCULO 4.- Definiciones

    Para los efectos de la presente ley se define lo siguiente:

    a) Base de datos: cualquier clase de fichero, que sea objeto de tratamiento o procesamiento, automatizado o manuales, cualquiera que sea la modalidad de su elaboración, organización o acceso.

    b) Datos personales: toda información sobre una persona física identificada o identificable; se considerará persona física identificable toda persona cuya identidad pueda determinarse, directa o indirectamente, en particular mediante un identificador, como por ejemplo un nombre, un número de identificación, datos de localización, un identificador en línea o uno o varios elementos propios de la identidad física, fisiológica, genética, psíquica, económica, cultural o social de dicha persona.

    c) Datos genéticos: datos personales relativos a las características genéticas heredadas o adquiridas de una persona física que proporcionen una información única sobre la fisiología o la salud de esa persona, obtenidos en particular del análisis de una muestra biológica de tal persona.

    d) Datos biométricos: datos personales obtenidos a partir de un tratamiento técnico específico, relativos a las características físicas, fisiológicas o conductuales de una persona física que permitan o confirmen la identificación única de dicha persona, como imágenes faciales o datos dactiloscópicos.

    e) Datos relativos a la salud: datos personales relativos a la salud física o mental de una persona física, incluida la prestación de servicios de atención sanitaria, que revelen información sobre su estado de salud;

    f) Fuentes de acceso público: Bases de datos que pueden ser consultadas por cualquier persona física o jurídica, pública o privada, nacional o internacional cuyo acceso no se encuentre limitado por la normativa vigente o disposición de la Autoridad de Protección de Datos Personales

    g) Datos sensibles: Datos relativos a etnia, identidad cultural, religión, ideología, filiación política, pasado judicial, condición migratoria, orientación sexual, identidad de género, salud, datos biométricos, datos genéticos y aquellos cuyo tratamiento indebido pueda dar origen a discriminación, atenten o puedan atentar contra los derechos humanos o la dignidad e integridad de las personas. Los metadatos que identifiquen o hagan identificable a un ser humano, también formarán parte de este concepto, en la medida en que puedan dar origen a discriminaciones o vulneraciones de derechos humanos, y estarán definidos vía reglamentaria. Igualmente, por vía reglamentaria, la Autoridad de Protección de Datos Personales podrá determinar otras categorías de datos sensibles que no estén expresamente enumeradas en el listado de este inciso.

    h) Datos de acceso restringido: todos los datos personales privados que no se consideren sensibles. Son de interés únicamente para su titular o para la Administración Pública. No son de acceso irrestricto independientemente de si forman o no parte de fuentes de acceso público o se encuentran en bases de datos de la Administración Pública.

    i) Datos de acceso irrestricto: datos de acceso general, contenidos en bases de datos públicas, según dispongan leyes especiales y de conformidad con la finalidad para la cual estos datos fueron recabados.

    j) Deber de confidencialidad: obligación de los responsables del tratamiento de datos, personal a su cargo y del personal de la Agencia de Protección de Datos de los Habitantes (Prodhab), de guardar la confidencialidad con ocasión del ejercicio de las facultades dadas por esta ley, principalmente cuando se acceda a información sobre datos personales y sensibles. Esta obligación perdurará aún después de finalizada la relación con la base de datos.

    k) Encargado: la persona física o jurídica, autoridad pública, servicio u otro organismo que trate datos personales por cuenta del responsable del tratamiento;

    l) Fichero: todo conjunto estructurado de datos personales, manual o automatizado, accesible con arreglo a criterios determinados, ya sea centralizado, descentralizado o repartido de forma funcional o geográfica;

    m) Persona interesada: persona física titular de los datos que sean objeto del tratamiento, total o parcialmente automatizado o manual.

    n) Responsable: persona física o jurídica, sea pública o privada, que administre, gerencie o se encargue de una base de datos, quién es competente para señalar, con arreglo a la ley, cuál es la finalidad de la base de datos, cuáles categorías de datos de carácter personal deberán registrarse y qué tipo de tratamiento se les aplicarán.

    o) Seudonimización: Tratamiento de datos personales de manera tal que ya no puedan atribuirse a la persona interesada sin utilizar información adicional, siempre que dicha información adicional figure por separado y esté sujeta a medidas técnicas y organizativas destinadas a garantizar que los datos personales no se atribuyan a una persona física identificada o identificable.

    p) Tratamiento o procesamiento de datos personales: cualquier operación o conjunto de operaciones, efectuadas mediante procedimientos total o parcialmente automatizados o manuales y aplicadas a datos personales, tales como la recolección, el registro, la organización, la conservación, la modificación, la extracción, la consulta, la utilización, la comunicación por transmisión, difusión o cualquier otra forma que facilite el acceso a estos, el cotejo o la interconexión, así como su bloqueo, supresión o destrucción, entre otros.

    q) Grupo de interés económico: agrupación de sociedades que se manifiesta mediante una unidad de decisión, es decir, la reunión de todos los elementos de mando o dirección empresarial por medio de un centro de operaciones, y se exterioriza mediante dos movimientos básicos: el criterio de unidad de dirección, ya sea por subordinación o por colaboración entre empresas, o el criterio de dependencia económica de las sociedades que se agrupan, sin importar que la personalidad jurídica de las sociedades se vea afectada, o que su patrimonio sea objeto de transferencia, independientemente de su domicilio y razón social. Cuando la PRODHAB lo requiera la condición de grupo de interés económico podrá ser demostrada por medio de una declaración jurada protocolizada o documento legal equivalente de la jurisdicción del titular de la base de datos sin perjuicio de las facultades de investigación de la PRODHAB.

    CAPÍTULO II. PRINCIPIOS Y DERECHOS PARA LA PROTECCIÓN DE DATOS PERSONALES

    SECCIÓN I. PRINCIPIOS QUE RIGEN EL TRATAMIENTO DE DATOS PERSONALES

    ARTÍCULO 5.- Principio de lealtad y legalidad

    Los datos personales deben ser procesados de manera justa y en apego a los límites de esta ley y el marco normativo vigente. Toda información deberá ser procesada con una base jurídica lícita, con un propósito definido, y de una manera justa y transparente. Las personas usuarias deberán ser informadas pertinentemente sobre cómo se recopilarán, usarán o almacenarán sus datos y quién lo hará.

    ARTÍCULO 6- Principio de transparencia de la información

    El responsable del tratamiento tomará las medidas oportunas para facilitar a la persona interesada todas las informaciones indicadas en esta Ley, así como cualquier comunicación relativa al tratamiento de datos personales, en forma concisa, transparente, inteligible y de fácil acceso, con un lenguaje claro y sencillo, en particular cualquier información dirigida específicamente a la población infantil.

    La información será facilitada por escrito o por otros medios, inclusive, si procede, por medios electrónicos. Cuando lo solicite la persona interesada, la información podrá facilitarse verbalmente siempre que se demuestre la identidad del interesado por otros medios.

    ARTÍCULO 7.- Principio de finalidad y conservación limitadas

    Los datos personales deberán ser recopilados y procesados sólo para fines determinados, explícitos y legítimos. El propósito para el que se procesan dichos datos debe ser explícito y no deberán ser conservados por más tiempo que el necesario para cumplir con ese fin. Los datos no deben ser procesados de una manera que sea incompatible con dicho propósito.

    No se considerará incompatible el tratamiento posterior de datos con fines históricos, estadísticos o científicos, siempre y cuando se establezcan las garantías oportunas para salvaguardar los derechos contemplados en esta ley.

    ARTÍCULO 8.- Principio de minimización de datos

    Los datos personales procesados y recopilados deben limitarse a ser suficientes, pertinentes y no excesivos en relación con el propósito específico y definido previamente.

    ARTÍCULO 9.- Principio de calidad de la información

    Solo podrán ser recolectados, almacenados o empleados datos de carácter personal para su tratamiento total o parcialmente automatizado o manual, cuando tales datos sean actuales, veraces, exactos y adecuados al fin para el que fueron recolectados. Los usuarios deben tener el derecho a eliminar, rectificar, y corregir su información personal, la cual debe cumplir con las siguientes características:

    a) Actualidad: Los datos de carácter personal deberán ser actuales. El responsable de las bases de datos eliminará los datos que hayan dejado de ser pertinentes o necesarios, en razón de la finalidad para la cual fueron recibidos y registrados. En caso de que sea necesaria su conservación, más allá del plazo estipulado, deberán ser desasociados de su titular.

    b) Veracidad: Los datos de carácter personal deberán ser veraces. La persona responsable de la base de datos está obligada a modificar o suprimir los datos que falten a la verdad.

    c) Exactitud: Los datos de carácter personal deberán ser exactos. La persona responsable de la base de datos tomará las medidas necesarias para que los datos inexactos -del todo o en parte- o incompletos sean suprimidos de la base de datos o sustituidos por los correspondientes datos rectificados, actualizados o complementados, respetando los fines para los que fueron recogidos o tratados.

    ARTÍCULO 10.- Principio de integridad y confidencialidad

    Los datos personales deben ser procesados de manera que se garantice la seguridad e indemnidad de los mismos, así como la protección contra el tratamiento no autorizado o ilegítimo y contra la pérdida accidental, destrucción o daños de los datos. Para todo ello, se tomarán las medidas técnicas y organizacionales pertinentes que eviten vulnerabilidades en el acceso a dicha información.

    ARTÍCULO 11.- Principio de gratuidad

    Se establece el principio de gratuidad en el ejercicio de los derechos tutelados por la presente ley, para la persona que posea la titularidad de los datos personales o en el caso de la persona menor de edad, para su representante legal.

    SECCIÓN II. DERECHOS DE LA PERSONA ANTE EL TRATAMIENTO DE SUS DATOS PERSONALES

    ARTÍCULO 12.- Autodeterminación informativa

    Toda persona tiene derecho a la autodeterminación informativa, la cual abarca el conjunto de principios y garantías relativas al legítimo tratamiento de sus datos personales reconocidos en esta ley.

    Se reconoce la autodeterminación informativa como un derecho fundamental, con el objeto de controlar el flujo de informaciones y datos concernientes a cada persona, cuya titularidad sobre los datos es exclusiva e irrenunciable. Este derecho es la manifestación de la protección a la intimidad, en el ámbito del tratamiento de datos personales, evitando que se propicien acciones discriminatorias o usos inadecuados de los mismos.

    ARTÍCULO 13.- Consentimiento informado

    Cuando se soliciten datos de carácter personal, la persona titular de los datos tiene derecho a ser informada de modo expreso, preciso e inequívoco de la posible recopilación y procesamiento de sus datos personales, como mínimo sobre los siguientes aspectos:

    a) La existencia de una base de datos personales.

    b) Las categorías de datos personales contenidas en la base.

    c) Los fines que se persiguen con la recolección de estos datos y la base jurídica del tratamiento.

    d) Los destinatarios de la información, así como de quiénes podrán consultarla.

    e) El carácter obligatorio o facultativo de sus respuestas a las preguntas que se le formulen durante la recolección de los datos.

    f) El tratamiento que se dará a los datos solicitados.

    g) Las consecuencias de la negativa a suministrar los datos.

    h) La posibilidad de ejercer los derechos que le asisten.

    i) La identidad y datos de contacto del responsable de la base de datos.

    j) El plazo durante el cual se conservarán los datos personales.

    k) El derecho a presentar una reclamación ante las autoridades correspondientes.

    l) La existencia o no de decisiones automatizadas, incluida la elaboración de perfiles.

    Cuando se utilicen cuestionarios u otros medios para la recolección de datos personales figurarán estas advertencias en forma claramente legible. No obstante, dependiendo del mecanismo utilizado para la recolección del Consentimiento Informado, la Autoridad de Protección de Datos Personales podrá autorizar formas simplificadas respecto de los contenidos de los aspectos señalados, siempre cuando la información quede a disposición del interesado, en el momento que éste haga requerimiento de la misma.

    ARTÍCULO 14.- Otorgamiento del consentimiento

    Quien recopile datos personales deberá obtener el consentimiento expreso de la persona titular de los datos o de su representante. Este consentimiento deberá constar en forma expresa, ya sea en un medio físico o electrónico. El consentimiento podrá ser revocado en cualquier momento, sin efecto retroactivo.

    ARTÍCULO 15.- Excepciones al consentimiento informado

    No será necesario el consentimiento expreso:

    a) Cuando así lo disponga o habilite una norma de rango constitucional o legal, salvaguardando la integridad de los datos y restringiendo su uso estricto a los fines que persiga dicha norma.

    b) Cuando exista orden fundamentada, dictada por autoridad judicial competente.

    c) Para la prevención, persecución, investigación, detención y represión de las infracciones penales, o de las infracciones de la deontología en las profesiones.

    d) Para el funcionamiento de bases de datos que se utilicen con fines estadísticos, históricos o de investigación científica, o para la adecuada prestación de servicios públicos, siempre que los datos se hayan anonimizado previamente y no exista riesgo de que las personas sean identificadas.

    e) Cuando el tratamiento sea necesario para la ejecución de un contrato solicitado por la persona titular. O bien, para la aplicación de un contrato en el que el interesado es parte.

    f) Cuando es necesario el tratamiento para proteger intereses vitales de la persona interesada o de otra persona física, si la persona interesada no está capacitada, física o jurídicamente, para dar su consentimiento.

    g) Cuando el tratamiento es necesario para el cumplimiento de una finalidad realizada en interés público o en el ejercicio de poderes públicos conferidos al responsable del tratamiento.

    Se prohíbe en todo caso el acopio de datos sin el consentimiento informado de la persona, o bien, adquiridos por medios fraudulentos, desleales o ilícitos.

    ARTICULO 16. – Condiciones aplicables al consentimiento de la persona menor de edad en relación con los servicios de la sociedad de la información

    Cuando se apliquen los principios relativos al consentimiento informado en relación con la oferta directa a personas menores de edad de servicios de la sociedad de la información, el tratamiento de los datos personales de una persona menor de edad se considerará lícito cuando tenga como mínimo 15 años. Si es menor de 15 años, tal tratamiento únicamente se considerará lícito si el consentimiento lo autorizó el titular de la patria potestad o tutela sobre el niño o la niña, y solo en la medida en que se dio o autorizó.

    El responsable del tratamiento hará esfuerzos razonables para verificar en tales casos que el consentimiento fue dado o autorizado por el titular de la patria potestad o tutela sobre el niño o la niña, teniendo en cuenta la tecnología disponible.

    ARTÍCULO 17.- Excepciones a la Autodeterminación Informativa

    Los derechos y las garantías establecidos en esta ley podrán ser limitados en las siguientes circunstancias:

    a) Cuando así lo disponga o habilite una norma de rango constitucional o legal, salvaguardando la integridad de los datos y restringiendo su uso estricto a los fines que persiga dicha norma.

    b) Cuando exista orden fundamentada, dictada por autoridad judicial competente.

    ARTÍCULO 18.- Derecho de acceso a los datos personales

    Las personas usuarias deberán tener derecho de acceso a los datos recopilados, el propósito del procesamiento y a conocer quiénes los procesarán en cualquier momento. La información deberá ser almacenada en forma tal que se garantice plenamente el derecho de acceso por la persona interesada.

    La persona responsable del tratamiento de los datos debe facilitar la información que la persona solicite, de manera gratuita, y resolver en el sentido que corresponda en el plazo de cinco días hábiles, contado a partir de la recepción de la solicitud.

    Las entidades deben brindar su información de contacto y una dirección de correo electrónico a las personas usuarias para que estas puedan comunicarse con ellos en caso de que existan problemas.

    El derecho de acceso a la información personal garantiza las siguientes facultades de la persona interesada:

    a) Obtener en intervalos razonables, según se disponga por reglamento, sin demora y a título gratuito, lo siguiente: confirmación o no de la existencia de datos suyos en archivos o bases de datos, el propósito por el que se procesan, destinatarios o personas autorizadas, origen de la recolección de datos, categoría de datos procesados, plazo previsto de conservación, si los datos están siendo utilizados para la toma de decisiones automáticas o si los mismos están siendo transmitidos a terceros países.

    b) En caso de que existan datos o información relativa a su persona, estos le deberán ser comunicados y brindados en forma precisa, entendible, de fácil acceso y con lenguaje simple y claro. Además, la persona interesada también podrá saber la finalidad con que fueron recopilados los datos y el uso que se les ha dado, bien hayan sido recopilados de manera directa o a través de terceros. El informe deberá ser completo y exento de codificaciones. Deberá estar acompañado de una aclaración de los términos técnicos que se utilicen.

    c) Ser informado por escrito de manera amplia, por medios físicos o electrónicos, sobre la totalidad del registro perteneciente al titular, aun cuando el requerimiento sólo comprenda un aspecto de los datos personales. Este informe en ningún caso podrá revelar datos pertenecientes a terceros, aun cuando se vinculen con la persona interesada, excepto cuando con ellos se pretenda configurar un delito penal.

    El ejercicio del derecho al cual se refiere este artículo, en el caso de datos de personas fallecidas, le corresponderá a sus sucesores o herederos.

    ARTÍCULO 19.- Derecho a la explicación

    Las personas interesadas tienen derecho a una explicación sobre las lógicas y mecanismos empleados, además de los fines y las consecuencias, para el procesamiento automatizado de los datos personales que hayan sido recopilados.

    Dentro de esta explicación estará incluido todo algoritmo cuyo diseño o programación pueda tener un impacto en el destino o uso de los datos recopilados, y de ser solicitado será incluido dentro de los reportes requeridos por las personas usuarias sobre el tratamiento de sus datos.

    ARTÍCULO 20.- Derecho de oposición

    La persona usuaria podrá oponerse al procesamiento de sus datos personales, si no ha mediado su consentimiento para ello, o no lo ha expresado o aceptado por escrito de forma física o digital. En cualquier momento, el titular de los datos personales puede oponerse a la utilización de sus datos para la toma de decisiones automáticas, parcialmente automáticas o fines de mercadotecnia directa, incluido el análisis de perfiles.

    Todo interesado tendrá derecho a no ser objeto de una decisión basada únicamente en el tratamiento automatizado, incluida la elaboración de perfiles, que produzca efectos jurídicos en él o le afecte significativamente de modo similar, con la excepciones que por efecto de esta ley resulten de aplicación.

    ARTÍCULO 21. – Derecho a la limitación del tratamiento

    La persona interesada podrá solicitar del responsable la suspensión de todo tratamiento de sus datos personales, reservando los mismos en el estado que se encontraban al momento de surgir los hechos objeto de la solicitud, cuando se cumpla alguna de las siguientes condiciones:

    a) La persona interesada impugne la exactitud de los datos personales, durante un plazo que permita al responsable verificar la exactitud de los mismos.

    b) El tratamiento sea ilícito y el interesado se oponga a la supresión de los datos personales y solicite en su lugar la limitación de su uso.

    c) El responsable ya no necesita los datos personales para los fines del tratamiento, pero el interesado los necesita para la formulación, el ejercicio o la defensa de reclamaciones.

    ARTÍCULO 22.- Derecho de rectificación

    La persona interesada tendrá el derecho de obtener la rectificación o actualización de sus datos personales, cuando los datos en poder del responsable del tratamiento estén incompletos, desactualizados o sean inexactos.

    Dicha rectificación o actualización puede ser solicitada en cualquier momento por la persona titular de los datos, o por la persona encargada legal en el caso de las personas menores de edad, o las personas sin capacidad volitiva o cognoscitiva.

    En el caso de datos de personas fallecidas, les corresponderá este derecho a sus          sucesores o herederos.

    ARTÍCULO 23.- Derecho de supresión

    La persona interesada tiene derecho a la supresión de sus datos y cualquier información vinculada a su persona al momento en que suspenda el uso de un servicio o aplicación que haya originado la recopilación de los datos. El responsable del tratamiento deberá garantizar la confidencialidad respecto a esa información posterior a la eliminación. Igual derecho tendrá, cuando hayan sido recopilados sin su autorización.

    El derecho de supresión no podrá ser ejercido cuando el tratamiento de los datos sea necesario para ejercer el derecho a la libertad de expresión, la libertad de prensa e información, lo cual incluye las expresiones periodísticas, académicas, artísticas o literarias, de archivo o de investigación científica.

    Dicha supresión puede ser solicitada por la persona titular de los datos, o por la persona encargada legal en el caso de las personas menores de edad, o sin capacidad volitiva o cognoscitiva. En el caso de datos de personas fallecidas, les corresponderá este derecho a sus sucesores o herederos.

    Igualmente, la persona interesada podrá solicitar la supresión de sus datos personales, cuando medie y legalmente proceda, el retiro del consentimiento informado otorgado al efecto del tratamiento.

    ARTÍCULO 24.- Derecho a la portabilidad

    Las personas titulares de los datos podrán solicitar el traslado de sus datos personales, o parte de ellos, hacia la base de otra empresa, plataforma o ente prestador de servicios cuando sea técnicamente posible, posibilidad que determinará la autoridad competente. Para ello se deberán salvaguardar los principios y derechos reconocidos en esta ley.

    ARTÍCULO 25.- Autorización para la transferencia de datos

    Los responsables de las bases de datos, públicas o privadas, solo podrán transferir datos contenidos en ellas cuando el titular del derecho haya autorizado expresa y válidamente tal transferencia y se haga sin vulnerar los principios y derechos reconocidos en esta ley.

    SECCIÓN III. CATEGORÍAS PARTICULARES DE DATOS PERSONALES

    ARTÍCULO 26.- Prohibición del tratamiento de datos sensibles

    Queda prohibido el tratamiento de datos personales que revelen el origen étnico o racial, las opiniones políticas, las convicciones religiosas o filosóficas, o la afiliación sindical, y el tratamiento de datos genéticos, datos biométricos, datos relativos a la salud o datos relativos a la vida sexual de una persona física o cualquier otro dato sensible.

    ARTÍCULO 27.- Circunstancias de no aplicabilidad de la prohibición de tratamiento de datos sensibles

    El artículo anterior no será de aplicación cuando concurra una de las circunstancias siguientes:

    a) El interesado dio su consentimiento explícito para el tratamiento de dichos datos personales con uno o más de los fines especificados, excepto cuando en la legislación costarricense se establezca que la prohibición mencionada no puede ser levantada por el interesado;

    b) El tratamiento es necesario para el cumplimiento de obligaciones y el ejercicio de derechos específicos del responsable del tratamiento o del interesado en el ámbito del derecho laboral, de la seguridad social o ayudas sociales, en la medida en que así lo autorice el marco normativo costarricense y establezca garantías adecuadas del respeto de los derechos fundamentales y de los intereses del interesado;

    c) El tratamiento es necesario para proteger intereses vitales del interesado o de otra persona física, en el supuesto de que el interesado no esté capacitado, física o jurídicamente, para dar su consentimiento;

    d) El tratamiento es efectuado, en el ámbito de sus actividades legítimas y con las debidas garantías, por una fundación, una asociación o cualquier otro organismo sin ánimo de lucro, cuya finalidad sea política, filosófica, religiosa o sindical, siempre que el tratamiento se refiera exclusivamente a los miembros actuales o antiguos de tales organismos o a personas que mantengan contactos regulares con ellos en relación con sus fines y siempre que los datos personales no se comuniquen fuera de ellos sin el consentimiento de los interesados;

    e) El tratamiento es necesario para la formulación, el ejercicio o la defensa de reclamaciones o cuando los tribunales actúen en ejercicio de su función judicial;

    f) El tratamiento es necesario para fines de medicina preventiva o laboral, evaluación de la capacidad laboral del trabajador, diagnóstico médico, prestación de asistencia o tratamiento de tipo sanitario o social, o gestión de los sistemas y servicios de asistencia sanitaria y social, en virtud de un contrato con un profesional sanitario;

    g) El tratamiento es necesario por razones de interés público en el ámbito de la salud pública, como la protección frente a amenazas transfronterizas graves para la salud, o para garantizar elevados niveles de calidad y de seguridad de la asistencia sanitaria y de los medicamentos o productos sanitarios, sobre la base de la legislación costarricense, que establezca medidas adecuadas y específicas para proteger los derechos y libertades del interesado, en particular el secreto profesional.

    h) El tratamiento es necesario con fines de archivo en interés público, fines de investigación científica o histórica o fines estadísticos, que debe ser proporcional al objetivo perseguido, respetar en lo esencial el derecho a la protección de datos y establecer medidas adecuadas y específicas para proteger los intereses y derechos fundamentales del interesado.

    ARTÍCULO 28.- Datos personales de acceso restringido

    Los datos de acceso restringido son todos aquellos datos personales de índole privado que no sean considerados sensibles. Son susceptibles de ser tratados en los términos que esta ley especifica. Si bien estos datos podrían formar parte de bases datos de la Administración Pública o de fuentes de acceso público, no por ello son considerados de acceso irrestricto, debido a que son de interés únicamente para su titular o para la Administración Pública.

    SECCIÓN IV. SEGURIDAD Y CONFIDENCIALIDAD DEL TRATAMIENTO DE LOS DATOS

    ARTÍCULO 29.- Seguridad de los datos por diseño y por defecto

    La persona responsable de la base de datos deberá adoptar las políticas internas y tomar las medidas de índole técnica y de organización necesarias para garantizar la seguridad de los datos de carácter personal y evitar su alteración, destrucción accidental o ilícita, pérdida, tratamiento o acceso no autorizado, así como cumplir con los principios de esta ley y evitar cualquier acción contraria a la misma.

    Dichas políticas y medidas se tomarán desde el diseño y el desarrollo de cualquier aplicación, servicio o producto basado en el tratamiento de datos personales o que tratan datos personales para cumplir su función, y deberán incluir, al menos, los mecanismos de seguridad física y lógica más adecuados de acuerdo con el desarrollo tecnológico actual para garantizar la protección de la información almacenada.

    Además, deberán reducir al máximo el tratamiento de datos personales, seudonimizar lo antes posible los datos personales, dar transparencia a las funciones y el tratamiento y permitir a los interesados supervisar el tratamiento de datos y al responsable del tratamiento crear y mejorar elementos de seguridad.

    No se registrarán datos personales en bases que no reúnan las condiciones que garanticen plenamente su seguridad e integridad, así como la de los centros de tratamiento, equipos, sistemas y programas. Por vía de reglamento se establecerán los requisitos y las condiciones que deban reunir las bases de datos, y de las personas que intervengan en el acopio, almacenamiento y uso de los datos. Estos principios se tendrán en cuenta para el tratamiento de datos tanto a nivel privado como público, sea o no con fines de lucro.

    ARTÍCULO 30.- Deber de confidencialidad

    La persona responsable y quienes intervengan en cualquier fase del tratamiento de datos personales están obligadas al secreto profesional o funcional, aun después de finalizada su relación con la base de datos. La persona obligada podrá ser relevada del deber de secreto por decisión judicial en lo estrictamente necesario y dentro de la causa que conoce.

    ARTÍCULO 31.- Estudios de impacto

    Para aquellas operaciones de tratamiento de datos que persiguen tratar una cantidad considerable de datos personales a nivel regional, nacional o supranacional, que podrían afectar a un gran número de interesados o podrían entrañar un alto riesgo, sea por su alcance, por la sensibilidad de los datos a tratar o por la dificultad para los interesados de hacer cumplir sus derechos, deberá realizarse previamente un estudio de impacto del tratamiento de datos por parte de la persona responsable del tratamiento.

    El estudio de impacto deberá valorar la probabilidad y alcance de los riesgos, teniendo en cuenta la naturaleza, ámbito, contexto y fines del tratamiento y los orígenes del riesgo. Además debe incluir las medidas, garantías y mecanismos previstos para mitigar dichos riesgos, garantizar la protección de los datos personales y demostrar la conformidad con la presente ley.

    Las características específicas de dichos estudios serán determinadas vía reglamento. La Autoridad de Protección de Datos determinará cuáles operaciones de tratamiento de datos requerirán dichos estudios al momento de su registro.

    ARTÍCULO 32.- Protocolos de actuación

    Las personas físicas y jurídicas, públicas y privadas, que tengan entre sus funciones la recolección, el almacenamiento y el uso de datos personales, deberán emitir un protocolo de actuación en el cual establecerán los pasos que deberán seguir en la recolección, el almacenamiento y el manejo de los datos personales, de conformidad con las reglas previstas en esta ley.

    Los protocolos de actuación deberán ser inscritos, así como sus posteriores modificaciones, ante la Prodhab. La Prodhab podrá verificar, en cualquier momento, que la base de datos esté cumpliendo cabalmente con los términos de su protocolo.

    La manipulación de datos con base en un protocolo de actuación inscrito ante la Prodhab hará presumir, “iuris tantum”, el cumplimiento de las disposiciones contenidas en esta ley, para los efectos de autorizar la cesión de los datos contenidos en una base.

    ARTÍCULO 33.- Vulneración de Datos Personales.

    El responsable deberá informar tanto al titular como a la PRODHAB, sobre cualquier irregularidad en el tratamiento o almacenamiento de sus datos, pérdida de los mismos, destrucción, extravío, alteración o similares, como consecuencia de una vulnerabilidad de la seguridad de la cual entrará en conocimiento, para lo cual tendrá cinco días hábiles a partir del momento en que se conoció la vulnerabilidad, a fin de que los titulares de estos datos personales afectados puedan tomar las medidas correspondientes.

    La información mínima que deberá proveerse será:

    a) La naturaleza del incidente;

    b) Los datos personales comprometidos;

    c) Las acciones correctivas realizadas de forma inmediata y las que serán tomadas;

    d) Los medios o el lugar, donde puede obtener más información al respecto.

    ARTÍCULO 34.- Persona Delegada de Protección de Datos

    Si la Autoridad de Protección de Datos determina que la operación de tratamiento presenta altos riesgos para la integridad de los datos personales, el responsable del tratamiento deberá designar a una persona delegada de protección de datos.

    Dicha persona delegada velará por el cumplimiento legal de la normativa atinente y deberá contar con capacidades y competencias profesionales para responder ante las autoridades. El rol podrá ser asumido por una persona a lo interno de la institución u organización, o por un tercero.

    Reglamentariamente se establecerán los requisitos para las personas delegadas, así como los criterios para definir en qué operaciones de tratamiento será necesaria su existencia.

    ARTÍCULO 35.- Códigos de conducta

    La Agencia de Protección de Datos de los Habitantes, el gobierno central, las instituciones públicas, entes gremiales, asociaciones y empresas privadas, deberán promover la elaboración de códigos de conducta destinados a contribuir a la correcta aplicación de la presente Ley, teniendo en cuenta las características específicas de los distintos sectores de tratamiento y las necesidades específicas de las microempresas, las pequeñas y medianas empresas.

    ARTÍCULO 36.- Garantías efectivas

    Toda persona interesada tiene derecho a un procedimiento administrativo sencillo y rápido ante la Prodhab, con el fin de ser protegido contra actos que violen sus derechos fundamentales reconocidos por esta ley. Lo anterior sin perjuicio de las garantías jurisdiccionales generales o específicas que la ley establezca para este mismo fin.

    CAPÍTULO III. AGENCIA DE PROTECCIÓN DE DATOS DE LOS HABITANTES (PRODHAB)

    SECCIÓN I. DISPOSICIONES GENERALES

    ARTÍCULO 37.- Agencia de Protección de Datos de los Habitantes (Prodhab)

    Se crea la Agencia de Protección de Datos de los Habitantes (PRODHAB), como un órgano adscrito al Poder Legislativo de la República y que desempeñará sus funciones con absoluta independencia funcional, administrativa, técnica, presupuestaria y de criterio. Tendrá personalidad jurídica propia en el desempeño de las funciones que le asigna esta ley.

    ARTÍCULO 38.- Atribuciones

    Son atribuciones de la Prodhab, además de las otras que le impongan esta u otras normas, las siguientes:

    a) Velar por el cumplimiento de la normativa en materia de protección de datos, tanto por parte de personas físicas o jurídicas privadas, como por entes y órganos públicos.

    b) Llevar un registro de las bases de datos reguladas por esta ley.

    c) Requerir, de quienes administren bases de datos, las informaciones necesarias para el ejercicio de su cargo.

    d) Acceder a las bases de datos reguladas por esta ley, a efectos de hacer cumplir efectivamente las normas sobre protección de datos personales.

    Esta atribución se aplicará para los casos concretos presentados ante la Agencia y cuando se tenga evidencia de un mal manejo generalizado de la base de datos o sistema de información y, para la realización de investigaciones sobre la aplicación de la presente ley.

    e) Resolver sobre los reclamos por infracción a las normas sobre protección de los datos personales.

    f) Ordenar, de oficio o a petición de parte, el acceso, rectificación, supresión, explicación, portabilidad, olvido u oposición, en el tratamiento de las informaciones contenidas en los archivos y las bases de datos, cuando éstas contravengan las normas sobre protección de los datos personales.

    g) Imponer las sanciones establecidas, en esta ley, a las personas físicas o jurídicas, públicas o privadas, que infrinjan las normas sobre protección de los datos personales, y dar traslado al Ministerio Público de las que puedan configurar delito.

    h) Promover y contribuir en la redacción de normativa tendiente a implementar las normas sobre protección de los datos personales.

    i) Dictar las directrices necesarias, las cuales deberán ser publicadas en el diario oficial La Gaceta, a efectos de que las instituciones públicas implementen los procedimientos adecuados respecto del manejo de los datos personales, respetando los diversos grados de autonomía administrativa e independencia funcional.

    j) Fomentar entre los habitantes el conocimiento de los derechos concernientes al acopio, el almacenamiento, la transferencia y el uso de sus datos personales.

    k) Brindar asesoría, capacitación técnica y certificaciones en materia de privacidad, manejo de bases de datos, cumplimiento de estándares de seguridad, entre otros temas relativos a la protección de datos personales y la materia de esta ley, tanto a entes del sector público como el privado, para lo cual quedará habilitada a la venta de servicios, cuyo costo se establecerá mediante un tarifario de publicación y actualización periódica. Los precios de dicho tarifario deberán demostradamente estar acordes con los valores del mercado.

    En el ejercicio de sus atribuciones, la Prodhab podrá emplear procedimientos automatizados, de acuerdo con las mejores herramientas tecnológicas a su alcance.

    ARTÍCULO 39.- Dirección de la Agencia

    La Dirección de la Prodhab estará a cargo de un director o una directora nacional, quien deberá contar, al menos, con el grado académico de licenciatura en una materia afín al objeto de su función, ser de reconocida solvencia profesional y moral, y tener comprobada experiencia y conocimiento en la materia de protección de datos personales.

    El término de su nombramiento será por un período de hasta 4 años. En caso de declararse la vacancia, según lo dispuesto en este capítulo, la designación de la persona sustituta no podrá hacerse por un término mayor al que faltare para completar el período respectivo. Podrá ser reelecta por una única ocasión de forma continua.

    No podrá ser nombrado director o directora nacional ninguna persona que sea propietaria, accionista, miembro de la junta directiva, gerente, asesora, representante legal o empleada de una empresa dedicada a la recolección, el almacenamiento y/o procesamiento de datos personales. Dicha prohibición persistirá hasta por dos años después de haber cesado sus funciones o vínculo empresarial. Estará igualmente impedido quien sea cónyuge o pariente hasta el tercer grado de consanguinidad o afinidad de una persona que esté en alguno de los supuestos mencionados anteriormente.

    ARTÍCULO 40.- Proceso de nombramiento de la Dirección

    La persona directora será nombrada por la Asamblea Legislativa. Para dicho nombramiento, la Asamblea anunciará el concurso de forma pública y podrá recibir postulaciones de cualquier persona que cumpla con los requisitos establecidos en esta Ley. La Comisión de Nombramientos definirá un procedimiento para estudiar dichas postulaciones, el cual deberá garantizar el cumplimiento de dichos requisitos, además de determinar mediante calificaciones objetivas la idoneidad y conocimiento de las diferentes personas candidatas. Al concluir dicho procedimiento, recomendará una terna de personas postulantes al Plenario.

    El Plenario Legislativa elegirá, mediante votación pública y con mayoría absoluta, a la persona que dirigirá a la Prodhab. El Plenario podrá no apegarse a la recomendación emitida por la Comisión solamente de entre las personas postulantes.

    ARTICULO 41.- Juramentación.

    La persona directora de la Prodhab debe rendir el juramento previsto en el artículo 194 de la Constitución Política ante el Plenario de la Asamblea antes de iniciar sus labores en el cargo.

    ARTICULO 42.- Causas de cesación.

    La persona directora de la Prodhab de la República cesará en sus funciones, por cualquiera de las siguientes causales:

    a) Renuncia a su cargo.

    b) Muerte o incapacidad sobreviniente

    c) Negligencia notoria o por violaciones graves al ordenamiento jurídico en el cumplimiento de los deberes de su cargo

    d) Incurrimiento en cualquiera de las incompatibilidades previstas en esta Ley

    e) Haber sido condenado, en sentencia firme, por delito cometido en forma dolosa.

    La Asamblea Legislativa debe declarar vacante el cargo de la Dirección Nacional de la Prodhab, cuando se presente una de las causales previstas en los incisos a), b), d) y e) del presente artículo.

    En el caso del inciso c), la Presidencia Legislativa nombrará una Comisión que le dará audiencia a la persona directora e informará a la Asamblea Legislativa, el resultado de la investigación, en el término de quince días hábiles.

    ARTÍCULO 43.- Dirección Adjunta

    La Asamblea Legislativa nombrará una persona como Director o Directora Adjunta, de una lista de tres candidatos propuestos por la persona Directora Nacional, a más tardar un mes después de su nombramiento. Quien ocupe la Dirección Adjunta deberá reunir los mismos requisitos exigidos para el cargo titular y estará sometido a las mismas prohibiciones y disposiciones que esta ley impone a ese cargo.

    La personas elegida en este cargo será colaborador directo del Director Nacional de la PRODHAB; cumplirá las funciones que éste le asigne y lo sustituirá en sus ausencias temporales.

    ARTÍCULO 44.- Personal de la Agencia

    La Prodhab contará con el personal técnico y administrativo necesario para el buen ejercicio de sus funciones, designado mediante concurso por idoneidad, según el Estatuto de Servicio Civil o bien como se disponga reglamentariamente. El personal está obligado a guardar secreto profesional y deber de confidencialidad de los datos de carácter personal que conozca en el ejercicio de sus funciones.

    ARTÍCULO 45.- Prohibiciones para las personas funcionarias

    Todas las personas funcionarias de la Prodhab tendrán las siguientes prohibiciones:

    a) Prestar servicios a las personas o empresas que se dediquen al acopio, el almacenamiento, o el manejo de datos personales. Dicha prohibición persistirá hasta dos años después de haber cesado sus funciones.

    b) Involucrarse, personal e indebidamente, en asuntos conocidos en el marco de las funciones de la Agencia.

    c) Revelar o de cualquier forma propalar los datos personales a que ha tenido acceso con ocasión de su cargo. Esta prohibición persistirá indefinidamente aun después de haber cesado en su cargo.

    d) En el caso de los funcionarios y las funcionarias nombrados en plazas de profesional, ejercer externamente su profesión. Lo anterior tiene como excepción el ejercicio de la actividad docente en centros de educación superior o la práctica liberal a favor de parientes por consanguinidad o afinidad hasta el tercer grado, siempre que no se esté ante el supuesto del inciso a).

    La inobservancia de cualquiera de las anteriores prohibiciones será considerada falta gravísima, para efectos de aplicación del régimen disciplinario, sin perjuicio de las otras formas de responsabilidad que tales conductas pudieran acarrear.

    ARTÍCULO 46.- Presupuesto

    El presupuesto de la Prodhab estará constituido por lo siguiente:

    a) Los cánones, las tasas y los derechos obtenidos en el ejercicio de sus funciones.

    b) Las transferencias que el Estado realice a favor de la Agencia.

    c) Las donaciones y subvenciones provenientes de otros Estados, instituciones públicas nacionales u organismos internacionales, siempre que no comprometan la independencia, transparencia y autonomía de la Agencia.

    d) Lo generado por sus recursos financieros.

    e) Lo generado por la venta de servicios de asesoría, capacitación técnica y certificaciones en materia de privacidad, manejo de bases de datos, cumplimiento de estándares de seguridad, entre otros temas relativos a la protección de datos personales y la materia de esta ley.

    Los montos provenientes del cobro de las multas señaladas en esta ley serán destinados a gastos de capital de la Prodhab.

    La Agencia estará sujeta al cumplimiento de los principios y al régimen de responsabilidad establecidos en los títulos II y X de la Ley n.° 8131, Administración Financiera de la República y Presupuestos Públicos, de 18 de septiembre de 2001.

    Además, deberá proporcionar la información requerida por el Ministerio de Hacienda para sus estudios. En lo demás, se exceptúa a la Agencia de los alcances y la aplicación de esa ley. En la fiscalización, la Agencia estará sujeta, únicamente, a las disposiciones de la Contraloría General de la República.

    SECCIÓN II. REGISTRO DE ARCHIVOS Y BASES DE DATOS

    ARTÍCULO 47.- Registro de archivos y bases de datos

    Toda base de datos, pública o privada, debe inscribirse en el registro que al efecto habilite la Prodhab, exceptuando aquellas sin fines comerciales administradas por personas físicas. La inscripción no implica el traspaso o la transferencia de los datos.

    La Prodhab definirá, al momento del registro y de acuerdo a la envergadura, características y riesgos del tratamiento de datos que se realizará, si la persona responsable de la base de datos deberá cumplir, y en qué medida, con lo dispuesto en el capítulo II, Sección IV de esta Ley, respecto a Estudios de impacto, Protocolo de Actuación y la Persona Delegada de protección de datos. Los criterios y plazos para dicho cumplimiento se establecerán en lineamientos que al respecto confeccionará y revisará periódicamente la Prodhab.

    CAPÍTULO V. PROCEDIMIENTOS

    SECCIÓN I. NORMAS DE PROCEDIMIENTO

    ARTÍCULO 48.- Legitimación para denunciar

    Cualquier persona, grupo de personas u organismos debidamente habilitados para representar personas que ostente un derecho subjetivo o un interés legítimo puede denunciar, ante la Prodhab, que una base de datos pública o privada se encuentra en contravención de las reglas o los principios básicos para la protección de los datos y la autodeterminación informativa establecidas en esta ley.

    ARTÍCULO 49.- Trámite de las denuncias

    Todo procedimiento ordinario se regirá por el Libro Segundo de la Ley General de la Administración Pública, sin perjuicio de las regulaciones específicas que se puedan establecer vía el reglamento.

    En cualquier momento, la Prodhab podrá ordenar a la persona denunciada la presentación de la información necesaria. Asimismo, podrá efectuar inspecciones in situ en sus archivos o bases de datos. Para salvaguardar los derechos de la persona o del grupo de personas interesadas, puede dictar, mediante acto fundado, las medidas cautelares que aseguren el efectivo resultado del procedimiento.

    ARTÍCULO 50.- Efectos de la resolución estimatoria

    Si se determina que la información del interesado es falsa, incompleta, inexacta, o bien, que de acuerdo con las normas sobre protección de datos personales esta fue indebidamente recolectada, almacenada o difundida, deberá ordenarse su inmediata supresión, rectificación, adición o aclaración, o bien, impedimento respecto de su transferencia o difusión. Si la persona denunciada no cumple íntegramente lo ordenado, estará sujeta a las sanciones previstas en esta y otras leyes.

    SECCIÓN II. RÉGIMEN SANCIONATORIO

    ARTÍCULO 51.- Procedimiento sancionatorio

    De oficio o a instancia de parte, la Prodhab podrá iniciar un procedimiento tendiente a demostrar si un tratamiento de datos personales regulado por esta ley está siendo empleado de conformidad con sus principios; para ello, deberán seguirse los trámites previstos en la Ley General de la Administración Pública para el procedimiento ordinario.

    ARTÍCULO 52.- Faltas leves

    Las faltas leves, señaladas en este artículo, se sancionarán con multas administrativas de hasta de diez salarios base del cargo de auxiliar judicial I, según la Ley de Presupuesto de la República como máximo o, si se trata de una empresa, con una multa equivalente al 2% del volumen de negocio total anual global del ejercicio financiero anterior como máximo, optándose por la multa de mayor cuantía.

    Serán consideradas faltas leves, para los efectos de esta ley:

    a) Recolectar datos personales para su uso en base de datos sin que se le otorgue suficiente y amplia información a la persona interesada, de conformidad con las especificaciones indicadas en esta ley.

    b) Recolectar, almacenar y transmitir datos personales de terceros por medio de mecanismos inseguros o que de alguna forma no garanticen la seguridad e inalterabilidad de los datos.

    ARTÍCULO 53.- Faltas graves

    Las faltas graves, señaladas en este artículo, se sancionarán con multas administrativas de entre diez y cuarenta salarios base del cargo de auxiliar judicial I, según la Ley de Presupuesto de la República o, si se trata de una empresa, con una multa equivalente al 4% del volumen de negocio total anual global del ejercicio financiero anterior como máximo, optándose por la multa de mayor cuantía.

    Serán consideradas faltas graves, para los efectos de esta ley:

    a) Recolectar, almacenar, transmitir o de cualquier otra forma emplear datos personales sin el consentimiento informado y expreso del titular de los datos, con arreglo a las disposiciones de esta ley.

    b) Transferir datos personales a otras personas o empresas en contravención de las reglas establecidas en el capítulo III de esta ley.

    c) Recolectar, almacenar, transmitir o de cualquier otro modo emplear datos personales para una finalidad distinta de la autorizada por el titular de la información.

    d) Negarse injustificadamente a dar acceso a un interesado sobre los datos que consten en archivos y bases de datos, a fin de verificar su calidad, recolección, almacenamiento y uso conforme a esta ley.

    e) Negarse injustificadamente a eliminar o rectificar los datos de una persona que así lo haya solicitado por medio claro e inequívoco.

    Artículo 54. – Faltas gravísimas

    Las faltas gravísimas, señaladas en este artículo, se sancionarán con multas administrativas de entre treinta y sesenta salarios base del cargo de auxiliar judicial I, según la Ley de Presupuesto de la República o, si se trata de una empresa, con una multa equivalente al 6% del volumen de negocio total anual global del ejercicio financiero anterior como máximo, optándose por la multa de mayor cuantía.

    Serán consideradas faltas gravísimas, para los efectos de esta ley:

    a) Recolectar, almacenar, transmitir o de cualquier otra forma emplear, por parte de personas físicas o jurídicas privadas, datos sensibles, según la definición prevista en el artículo 3 de esta ley.

    b) Obtener, de los titulares o de terceros, datos personales de una persona por medio de engaño, violencia o amenaza.

    c) Revelar información registrada en una base de datos personales cuyo secreto esté obligado a guardar conforme la ley.

    d) Proporcionar a un tercero información falsa o distinta contenida en un archivo de datos, con conocimiento de ello.

    e) Realizar tratamiento de datos personales sin encontrarse debidamente inscrito ante la Prodhab, en el caso de los responsables de bases de datos cubiertos por el artículo 21 de esta ley.

    f) Transferir, a las bases de datos de terceros países, información de carácter personal de los costarricenses o de los extranjeros radicados en el país, sin el consentimiento de sus titulares.

    Artículo 55.- Criterios para establecer la sanción

    Para tomar una determinación sancionatoria, el tipo de sanción y su cuantía, la Prodhab deberá considerar los siguientes criterios, sin perjuicio de valorar las infracciones de manera acumulativa:

    a. Naturaleza de la infracción: número de personas afectadas, daños sufridos, duración de la infracción y propósito del procesamiento, infracción leve, grave o gravísima.

    b. Intención: si la infracción es intencional o debido a negligencia

    c. Mitigación: acciones tomadas para mitigar el daño a las personas interesadas

    d. Medidas preventivas: cuánta preparación técnica y organizativa había implementado previamente la empresa para evitar el incumplimiento

    e. Reincidencia: Posibles infracciones anteriores, incluido advertencias y multas relacionadas a similares u otras infracciones en área de seguridad digital, privacidad y protección de datos.

    f. Cooperación: cuán cooperativa ha sido la empresa con la autoridad supervisora para remediar la infracción.

    g. Tipo de datos afectados: qué tipos de datos impactado por la infracción.

    h. Notificación: si la infracción fue notificada proactivamente a la autoridad supervisora por la propia empresa o un tercero.

    SECCIÓN III. PROCEDIMIENTOS INTERNOS

    ARTÍCULO 56.- Régimen sancionatorio para bases de datos públicas

    Cuando la persona responsable de una base de datos pública cometa alguna de las faltas anteriores, la Prodhab dictará una resolución estableciendo las medidas que proceda adoptar para que cesen o se corrijan los efectos de la falta. Esta resolución se notificará a la persona responsable de la base de datos, al órgano del que dependa jerárquicamente y a los afectados, si los hay. La resolución podrá dictarse de oficio o a petición de parte. Lo anterior sin perjuicio de la responsabilidad penal en que haya incurrido.

    CAPÍTULO VI. CÁNONES

    ARTÍCULO 57.- Canon por regulación y administración de bases de datos

    Las bases de datos que deban inscribirse ante la Prodhab, de conformidad con el artículo 41 de esta ley, estarán sujetas a un canon de regulación y administración de bases de datos que deberá ser cancelado anualmente, con un monto de trescientos dólares ($300), moneda de curso legal de los Estados Unidos de América, canon que se actualizará anualmente con base en el índice de valuación determinado por el comportamiento de la tasa de inflación (índice de precios al consumidor que calcula la Dirección General de Estadística y Censos).

    Podrán eximirse del pago de este canon aquellas bases de datos utilizadas a lo interno de empresas o instituciones públicas, cuando sean utilizadas con fines exclusivamente administrativos y sin fines de comercialización, y así se demuestre ante la Prodhab.

    También podrán eximirse de dicho pago las bases de datos utilizadas por organizaciones sin fines de lucro (como fundaciones, sindicatos, asociaciones, organizaciones religiosas, entre otras), cuando demuestren que la finalidad de la base no es de ninguna índole comercial o de lucro.

    La exención de este pago no les excluye del cumplimiento de esta ley en todos sus alcances, incluidos los pagos producto de infracciones a la Ley. Quedan a salvo aquellas excepciones que se puedan aplicar puntualmente. El procedimiento para realizar el cobro del presente canon será detallado en el reglamento que a los efectos deberá emitir la Prodhab.

    ARTÍCULO 58.- Canon por comercialización de consulta

    La persona responsable de la base de datos deberá cancelar a la Prodhab un canon por cada venta de los datos de ficheros definidos en el inciso l) del artículo 4 de esta ley, de personas individualizables registradas legítimamente y siempre que sea comercializado con fines de lucro, el cual oscilará entre los veinticinco centavos de dólar ($0,25) y un dólar ($1), moneda de curso legal de los Estados Unidos de América, monto que podrá ser fijado dentro de dicho rango vía reglamento. En caso de contratos globales de bajo, medio y alto consumo de consultas, o modalidades contractuales de servicio en línea por número de aplicaciones, será el reglamento de la ley el que fije el detalle del cobro del canon que no podrá ser superior al diez por ciento (10%) del precio contractual.

    CAPÍTULO VI. TRANSFERENCIA TRANSFRONTERIZA DE DATOS PERSONALES

    SECCIÓN ÚNICA. DE LAS TRANSFERENCIAS

    ARTÍCULO 59.- Principio general de las transferencias

    Solo se realizarán transferencias de datos personales que sean objeto de tratamiento o vayan a serlo tras su transferencia a un tercer país u organización internacional si, a reserva de las demás disposiciones de la presente Ley, el responsable y el encargado del tratamiento cumplen las condiciones establecidas en el presente capítulo, incluidas las relativas a las transferencias ulteriores de datos personales desde el tercer país u organización internacional a otro tercer país u otra organización internacional.

    ARTÍCULO 60.- Transferencias basadas en un procedimiento de adecuación

    Podrá realizarse una transferencia de datos personales a un tercer país u                     organización internacional cuando la PRODHAB, haya decidido que el tercer país, un territorio o uno o varios sectores específicos de ese tercer país, o la organización internacional de que se trate garantizan un nivel de protección adecuado. Dicha transferencia no requerirá ninguna autorización específica.

    Al evaluar la adecuación del nivel de protección, la PRODHAB tendrá en cuenta, en particular, los siguientes elementos:

    a) El Estado de Derecho, el respeto de los derechos humanos y las libertades fundamentales, la legislación pertinente, tanto general como sectorial, incluida la relativa a la seguridad pública, la defensa, la seguridad nacional y la legislación penal, y el acceso de las autoridades públicas a los datos personales, así como la aplicación de dicha legislación, las normas de protección de datos, las normas profesionales y las medidas de seguridad, incluidas las normas sobre transferencias ulteriores de datos personales a otro tercer país u organización internacional observadas en ese país u organización internacional, la jurisprudencia, así como el reconocimiento a los interesados cuyos datos personales estén siendo transferidos de derechos efectivos y exigibles y de recursos administrativos y acciones judiciales que sean efectivos; y,

    b) La existencia y el funcionamiento efectivo de una o varias autoridades de control independientes en el tercer país o a las cuales esté sujeta una organización internacional, con la responsabilidad de garantizar y hacer cumplir las normas en materia de protección de datos, incluidos poderes de ejecución adecuados, de asistir y asesorar a los interesados en el ejercicio de sus derechos, y de cooperar con las autoridades de control de la Unión y de los Estados miembros,

    ARTÍCULO 61.- Transferencias mediante garantías adecuadas

    A falta de una autorización de la PRODHAB, por vía de un Procedimiento de Adecuación, el responsable o el encargado del tratamiento sólo podrá transmitir datos personales a un tercer país u organización internacional si hubiera ofrecido garantías adecuadas y a condición de que los interesados cuenten con derechos exigibles y acciones legales efectivas.

    Las garantías adecuadas podrán ser aportadas, por:

    a) Un instrumento jurídicamente vinculante y exigible entre las autoridades u organismos públicos;

    b) Convenios empresariales suscritos que expresamente reconozcan todos los derechos y obligaciones establecidos en la presente Ley, y se sujeten a la competencia de la Agencia de Protección de Datos de los Habitantes, para la debida protección de los datos personales en todos los alcances previstos por la presente normativa, respecto del tratamiento realizado fuera del ámbito de competencia territorial.

    Esta norma aplicará en igual sentido, bajo el concepto de Grupo de Interés Económico, en los términos que establece la presente Ley.

    ARTÍCULO 62.- Excepciones para situaciones específicas

    En ausencia de una autorización producto de un Procedimiento de Adecuación o de Garantías Adecuadas, incluidas las normas corporativas vinculantes, una transferencia o un conjunto de transferencias de datos personales a un tercer país u organización internacional únicamente se realizará si se cumple alguna de las condiciones siguientes:

    a) El interesado haya dado explícitamente su consentimiento a la transferencia propuesta, tras haber sido informado de los posibles riesgos para él de dichas transferencias debido a la ausencia de una decisión de adecuación y de garantías adecuadas;

    b) La transferencia sea necesaria para la ejecución de un contrato entre el interesado y el responsable del tratamiento o para la ejecución de medidas precontractuales adoptadas a solicitud del interesado;

    c) La transferencia sea necesaria para la celebración o ejecución de un contrato, en interés del interesado, entre el responsable del tratamiento y otra persona física o jurídica;

    d) La transferencia sea necesaria por razones de interés público comprobado consistentemente;

    e) La transferencia sea necesaria para la formulación, el ejercicio o la defensa de reclamaciones;

    f) La transferencia sea necesaria para proteger los intereses vitales del interesado o de otras personas, cuando el interesado esté física o jurídicamente incapacitado para dar su consentimiento

    TRANSITORIOS

    TRANSITORIO I.

    Las personas físicas o jurídicas, públicas o privadas, propietarias o administradoras de las bases de datos objeto de esta ley, deberán adecuar sus procedimientos, protocolos, contenidos de bases de datos y reglas de actuación a lo estipulado en la presente reforma, en un plazo máximo de un año.

    TRANSITORIO II.

    El Poder Ejecutivo adecuará el reglamento a la Ley nº 8968 previamente existente de acuerdo a los lineamientos establecidos en la presente reforma, en un plazo máximo de seis meses después de su entrada en vigencia, recogiendo las recomendaciones técnicas y legales que la Prodhab le proporcione.

    TRANSITORIO III.-

    Por un período de 8 años a partir de la entrada en vigencia de esta Ley, la Asamblea Legislativa dispondrá que se otorgue al menos un 5% de crecimiento anual a las transferencias que realiza el Estado a la Agencia, con el objetivo de fortalecer su labor de fiscalización, de realización de auditorías de oficio y de cobro de multas por infracciones a Ley nº 8968.

    Rige a partir de su publicación.

    ENRIQUE SÁNCHEZ CARBALLO

    CATALINA MONTERO GÓMEZ

    WELMER RAMOS GONZÁLEZ

    LUIS RAMÓN CARRANZA CASCANTE

    PAOLA VIVIANA VEGA RODRÍGUEZ

    CAROLINA HIDALGO HERRERA

    NIELSEN PÉREZ PÉREZ

    LAURA GUIDO PÉREZ

    MARIO CASTILLO MÉNDEZ

    VICTOR MANUEL MORALES MORA

    08May/21

    Anteproyecto de la Ley de Protección de Datos Personales de 2017.

    Anteproyecto de la Ley de Protección de Datos Personales de 2017.

    El Senado y Cámara de Diputados de la Nación Argentina reunidos en Congreso, …

    Sancionan con fuerza de Ley

    LEY DE PROTECCIÓN DE LOS DATOS PERSONALES

    Capítulo 1. Disposiciones generales

    ARTÍCULO 1°

    Objeto. La presente ley tiene por objeto la protección integral de los datos personales a fin de garantizar el ejercicio pleno de los derechos de sus titulares, de conformidad a lo establecido en el artículo 43, párrafo tercero, de la CONSTITUCIÓN NACIONAL y los tratados de derechos humanos en los que la REPÚBLICA ARGENTINA sea parte.

    ARTÍCULO 2°

    Definiciones. A los fines de la presente ley se entiende por:

    Autoridad de control: órgano que debe velar por el cumplimiento de los principios y procedimientos de la presente ley de acuerdo a lo establecido en el Capítulo 7.

    – Base de datos: conjunto organizado de datos personales que sean objeto de tratamiento, electrónico o no, cualquiera que fuere la modalidad de su formación, almacenamiento, organización o acceso. Indistintamente se la puede denominar también archivo, registro, fichero o banco de datos.

    – Datos personales: información de cualquier tipo referida a personas humanas determinadas o determinables, inclusive los datos biométricos. Se entenderá por determinable la persona que pueda ser identificada mediante algún identificador o por uno o varios elementos característicos de la identidad física, fisiológica, genética (datos genéticos), psíquica, económica, cultural o social de dicha persona. No será considerada persona determinable cuando, para lograr su identificación, se requiera la aplicación de medidas o plazos desproporcionados o inviables. Se entenderá por datos biométricos aquellos datos obtenidos a partir de un tratamiento técnico específico, relativos a las características físicas, fisiológicas o conductuales de una persona humana, que permitan o confirmen su identificación única. Se entenderá por datos genéticos los relativos a las características genéticas heredadas o adquiridas de una persona humana que proporcionen una información sobre su fisiología o salud, obtenidos en particular del análisis de una muestra biológica.

    Datos sensibles: datos personales que afectan la esfera íntima de su titular con potencialidad de originar una discriminación ilícita o arbitraria, en particular, los que revelan origen racial o étnico, opiniones políticas, convicciones religiosas, filosóficas o morales, participación o afiliación en una organización sindical o política, información referente a la salud, preferencia o vida sexual.

    Disociación de datos: el procedimiento que se aplica sobre los datos personales de manera que la información obtenida no pueda asociarse a persona determinada o determinable. No será considerada persona determinable cuando el procedimiento que deba aplicarse para lograr su identificación requiera la aplicación de medidas o plazos desproporcionados o inviables.

    Encargado del tratamiento: persona humana o jurídica, pública o privada, que trate datos personales por cuenta del responsable del tratamiento.

    – Fuente de acceso público irrestricto: la que contiene información destinada a ser difundida al público, de libre acceso e intercambio por razones de interés general, accesible ya sea en forma gratuita o mediante una contraprestación.

    Fuente de acceso público restricto: la que contiene información que no está sujeta a confidencialidad ni tampoco está destinada a ser difundida irrestrictamente al público y cuyo acceso a terceros resulta generalmente condicionado al cumplimiento de ciertos requisitos.

    – Grupo económico: sociedades controlantes, controladas y aquellas vinculadas en las cuales se tenga influencia significativa en las decisiones, denominación, domicilio, actividad principal, participación patrimonial, porcentaje de votos y, para las controlantes, principales accionistas.

    Incidente de seguridad de datos personales: hecho ocurrido en cualquier fase del tratamiento que implique la pérdida o destrucción no autorizado, el robo, extravío o copia no autorizada, el uso, acceso o tratamiento de datos no autorizado, o el daño, alteración o modificación no autorizada.

    Responsable del tratamiento: persona humana o jurídica, pública o privada, titular de la base de datos, que decide sobre el tratamiento de datos, sus finalidades y medios.

    Tercero: la persona humana o jurídica, pública o privada, distinta del titular de los datos, del responsable del tratamiento, del encargado del tratamiento o de las personas autorizadas para tratar los datos personales bajo la autoridad directa del responsable o del encargado.

    Titular de los datos: la persona humana cuyos datos sean objeto del tratamiento al que se refiere la presente ley.

    Transferencia internacional: la transmisión de datos personales fuera del territorio nacional.

    Tratamiento de datos: cualquier operación o procedimiento organizado, electrónico o no, que permita la recolección, conservación, ordenación, almacenamiento, modificación, relacionamiento, evaluación, bloqueo o destrucción y, en general, el procesamiento de datos personales, así como también su cesión a través de comunicaciones, consultas, interconexiones o transferencias.

    ARTÍCULO 3°

    Excepciones a la aplicación de la ley. Queda exceptuado de los alcances de la presente ley el tratamiento de datos que efectúe una persona humana para su uso exclusivamente privado o de su grupo familiar.

    La aplicación de la presente ley en ningún caso podrá afectar el secreto de las fuentes de información periodísticas. Tampoco podrá afectar al tratamiento de datos que realicen los medios de comunicación en el ejercicio de la libertad de expresión.

    ARTÍCULO 4°

    Ámbito de aplicación. Las normas de la presente ley serán de aplicación cuando:

    a) el responsable del tratamiento se encuentre establecido en el territorio nacional, aun cuando el tratamiento de datos tenga lugar fuera de dicho territorio;

    b) el responsable del tratamiento no se encuentre establecido en el territorio nacional, sino en un lugar en que se aplica la legislación nacional en virtud del derecho internacional;

    c) el tratamiento de datos de titulares que residan en la REPÚBLICA ARGENTINA sea realizado por un responsable del tratamiento que no se encuentre establecido en el territorio nacional y las actividades de dicho tratamiento se encuentren relacionadas con la oferta de bienes o servicios a dichos titulares de los datos en la REPÚBLICA ARGENTINA, o con el seguimiento de sus actos, comportamientos o intereses.

    Capítulo 2. Principios relativos al tratamiento de datos

    ARTÍCULO 5º

    Principio de licitud, lealtad y transparencia. Los datos personales deben ser tratados de manera lícita, leal y transparente. El tratamiento se considera leal cuando el responsable se abstenga de tratar los datos personales a través de medios engañosos o fraudulentos.

    ARTÍCULO 6º

    Principio de finalidad. Los datos personales deben ser recogidos con fines determinados, explícitos y legítimos, y no deben ser tratados de manera incompatible con dichos fines.

    No se considerarán incompatibles con los fines iniciales tanto el tratamiento ulterior de los datos personales con fines de archivo en interés público, fines de investigación científica e histórica o fines estadísticos, como tampoco el tratamiento de datos con fines que pudieron ser, de acuerdo al contexto, razonablemente presumidos por el titular de los datos.

    ARTÍCULO 7º

    Principio de minimización de datos. Los datos personales deben ser tratados de manera que sean adecuados, pertinentes y limitados a lo necesario en relación con los fines para los que fueron recolectados.

    ARTÍCULO 8º

    Principio de exactitud. Los datos personales deben ser tratados de modo que sean exactos y completos. Si fuera necesario adecuarlos, se adoptarán todas las medidas razonables para que se supriman o rectifiquen.

    ARTÍCULO 9º

    Limitación del plazo de conservación. Los datos personales no deben ser mantenidos más allá del tiempo estrictamente necesario para el cumplimiento de la finalidad del tratamiento. Los datos personales pueden conservarse durante períodos más largos siempre que se traten exclusivamente con fines de archivo en interés público, fines de investigación científica o histórica o fines estadísticos, sin perjuicio de la aplicación de las medidas técnicas y organizativas apropiadas que impone la presente ley a fin de proteger los derechos del titular de los datos.

    ARTÍCULO 10.- Principio de responsabilidad proactiva. El responsable o encargado del tratamiento debe adoptar las medidas técnicas y organizativas apropiadas a fin de garantizar un tratamiento adecuado de los datos personales y el cumplimiento de las obligaciones dispuestas por la presente ley, y que le permitan demostrar a la autoridad de control su efectiva implementación.

    ARTÍCULO 11.- Licitud del tratamiento de datos. El tratamiento de datos es lícito sólo si se cumple al menos UNA (1) de las siguientes condiciones:

    a) el titular de los datos dio su consentimiento para el tratamiento de sus datos para uno o varios fines específicos conforme lo dispuesto en los artículos 12, 13 y 14;

    b) el tratamiento de datos se realice sobre datos que figuren en fuentes de acceso público irrestricto;

    c) el tratamiento de datos se realice en ejercicio de funciones propias de los poderes del Estado y sean necesarios para el cumplimiento estricto de sus competencias;

    d) el tratamiento de datos sea necesario para el cumplimiento de una obligación legal aplicable al responsable del tratamiento;

    e) el tratamiento de datos derive de una relación jurídica entre el titular de los datos y

    el responsable del tratamiento, y resulte necesario para su desarrollo o cumplimiento;

    f) el tratamiento de datos resulte necesario para salvaguardar el interés vital del titular de los datos o de terceros, y el titular de los datos esté física o jurídicamente incapacitado para dar su consentimiento;

    g) el tratamiento de datos sea necesario para la satisfacción de intereses legítimos perseguidos por el responsable del tratamiento o por un tercero, siempre que sobre dichos intereses no prevalezcan los intereses o los derechos del titular de los datos, en particular cuando el titular sea un niño, niña o adolescente.

    Lo dispuesto en el inciso g) no será de aplicación al tratamiento de datos realizado por las autoridades públicas en el ejercicio de sus funciones.

    ARTÍCULO 12

    Consentimiento. El tratamiento de datos, en cualquiera de sus formas, requiere del consentimiento libre e informado de su titular para una o varias finalidades específicas.

    El consentimiento puede ser obtenido de forma expresa o tácita.

    La forma del consentimiento depende de las circunstancias, el tipo de dato personal y las expectativas razonables del titular de los datos.

    El consentimiento expreso, de acuerdo a las circunstancias particulares del tratamiento de datos del que se trate, puede ser obtenido por escrito, verbalmente, por medios electrónicos, así como por cualquier forma similar que la tecnología permita brindar. Para el tratamiento de datos sensibles se requiere el consentimiento expreso, salvo las excepciones establecidas por ley.

    El consentimiento tácito es admitido cuando surja de manera manifiesta del contexto

    del tratamiento de datos y la conducta del titular de los datos sea suficiente para demostrar la existencia de su autorización. Es admisible únicamente cuando los datos requeridos sean necesarios para la finalidad que motiva la recolección y se haya puesto a disposición del titular de los datos la información prevista en el artículo 15, sin que éste manifieste su oposición. El tratamiento de datos ulterior debe ser compatible con las finalidades manifiestas que surgen del contexto que originó la recolección. En ningún caso procede para el tratamiento de datos sensibles.

    En todos los casos, el responsable del tratamiento tiene la carga de demostrar que el titular de los datos consintió el uso de sus datos personales.

    ARTÍCULO 13

    Revocación del consentimiento. El consentimiento puede ser revocado en cualquier momento. Dicha revocación no tiene efectos retroactivos. El responsable del tratamiento está obligado a facilitar la revocación mediante mecanismos sencillos, gratuitos y, al menos, de la misma forma por la que obtuvo el consentimiento.

    ARTÍCULO 14

    Excepciones al consentimiento previo. No es necesario el consentimiento para el tratamiento de datos cuando se trate de listados cuyos datos se limiten a nombre, documento nacional de identidad, identificación tributaria o previsional, ocupación, fecha de nacimiento, domicilio y correo electrónico.

    El titular de los datos podrá oponerse a dicho tratamiento conforme el artículo 30 de la presente ley.

    ARTÍCULO 15

    Información al titular de los datos. El responsable del tratamiento debe brindar al titular de los datos, antes de la recolección, al menos, la siguiente información:

    a) las finalidades del tratamiento de datos a las que se destinarán los datos personales recolectados;

    b) la identidad y los datos de contacto del responsable del tratamiento;

    c) los medios para ejercer los derechos previstos en esta ley;

    d) en su caso, las cesiones o transferencias internacionales de datos que se efectúen o se prevea efectuar;

    e) el carácter obligatorio o facultativo de proporcionar los datos personales y las consecuencias de proporcionarlos, o de la negativa a hacerlo, o de hacerlo en forma incompleta o defectuosa;

    f) el derecho del titular de los datos a revocar el consentimiento;

    g) el derecho a presentar una denuncia, a iniciar el trámite de protección de datos personales ante la autoridad de control, o a ejercer la acción de habeas data en caso de que el responsable o el encargado del tratamiento incumpla con la presente ley.

    ARTÍCULO 16

    Tratamiento de datos sensibles. Se prohíbe el tratamiento de datos sensibles, excepto cuando:

    a) el titular de los datos haya dado su consentimiento expreso a dicho tratamiento, salvo en los casos en que por ley no sea requerido el otorgamiento de dicha autorización;

    b) sea necesario para salvaguardar el interés vital del titular de los datos y éste se encuentre física o legalmente incapacitado para prestar el consentimiento y sus representantes legales no lo puedan realizar en tiempo oportuno;

    c) sea efectuado por establecimientos sanitarios públicos o privados o por profesionales vinculados a la ciencia de la salud en el marco de un tratamiento médico específico de acuerdo a lo establecido por la Ley de Derechos del Paciente en su Relación con los Profesionales e Instituciones de la Salud nº 26.529;

    d) se realice en el marco de las actividades legítimas que realice una fundación, asociación o cualquier otro organismo sin fines de lucro, cuyo objeto principal sea una actividad política, filosófica, religiosa o sindical, siempre que se refieran exclusivamente a sus miembros o beneficiarios o a las personas que mantengan un contacto regular por razón de su objeto principal;

    e) se refiera a datos que sean necesarios para el reconocimiento, ejercicio o defensa de un derecho en un proceso judicial;

    f) tenga una finalidad histórica, estadística o científica. En estos dos últimos casos, debe adoptarse un procedimiento de disociación de datos;

    g) se refiera a datos personales que el interesado haya hecho manifiestamente públicos;

    h) sea necesario para el cumplimiento de obligaciones y el ejercicio de derechos específicos del responsable del tratamiento o del titular de los datos en el ámbito del Derecho laboral y de la seguridad y protección social;

    i) sea necesario por razones de interés público en el ámbito de la salud pública, como la protección frente a amenazas transfronterizas graves para la salud, o para garantizar elevados niveles de calidad y de seguridad de la asistencia sanitaria y de los medicamentos o productos sanitarios;

    j) se realice en el marco de asistencia humanitaria en casos de desastres naturales.

    ARTÍCULO 17

    Tratamiento de antecedentes penales y contravencionales. El tratamiento de datos relativos a antecedentes penales o contravencionales con el objeto de brindar informes a terceros sólo puede ser realizado por parte de las autoridades públicas competentes o bajo su supervisión.

    El empleador que conserve un certificado, documento o información de antecedentes penales o contravencionales de sus empleados no puede cederlo a terceros, salvo con el consentimiento expreso del titular de los datos.

    ARTÍCULO 18

    Tratamiento de datos de niños, niñas y adolescentes. En el tratamiento de datos personales de un niño, niña o adolescente, se debe privilegiar la protección del interés superior de éstos, conforme a la CONVENCIÓN SOBRE LOS DERECHOS DEL NIÑO y demás instrumentos internacionales que busquen su bienestar y protección integral.

    Es válido el consentimiento de un niño, niña o adolescente cuando se aplique al tratamiento de datos vinculados a la utilización de servicios de la sociedad de la información específicamente diseñados o aptos para ellos. En estos casos, el consentimiento es lícito si el niño, niña o adolescente tiene como mínimo TRECE (13) años. Si el niño es menor de TRECE (13) años, tal tratamiento únicamente se considera lícito si el consentimiento fue otorgado por el titular de la responsabilidad parental o tutela sobre el niño, y sólo en la medida en que se dio o autorizó.

    El responsable del tratamiento debe realizar esfuerzos razonables para verificar, en tales casos, que el consentimiento haya sido otorgado por el titular de la responsabilidad parental o tutela sobre el niño, niña o adolescente, teniendo en cuenta sus posibilidades para hacerlo.

    ARTÍCULO 19

    Principio de seguridad de los datos personales. El responsable del tratamiento y, en su caso, el encargado, deben adoptar las medidas técnicas y organizativas que resulten necesarias para garantizar la seguridad y confidencialidad de los datos personales, de modo de evitar su adulteración, pérdida, consulta o tratamiento no autorizado, y que permitan detectar desviaciones, intencionales o no, de información, ya sea que los riesgos provengan de la acción humana o del medio técnico utilizado.

    El responsable del tratamiento debe adoptar las medidas de seguridad aplicables a los datos personales que trate, considerando, al menos, los siguientes factores:

    a) el riesgo inherente por el tipo de dato personal;

    b) el carácter sensible de los datos personales tratados;

    c) el desarrollo tecnológico;

    d) las posibles consecuencias de un incidente de seguridad para los titulares de los datos;

    e) los incidentes de seguridad previos ocurridos en los sistemas de tratamiento.

    ARTÍCULO 20

    Notificación de incidentes de seguridad. En caso de que ocurra un incidente de seguridad de datos personales, el responsable del tratamiento debe notificarlo a la autoridad de control sin dilación indebida y, de ser posible, a más tardar SETENTA Y DOS (72) horas después de que haya tenido constancia del incidente, a menos que sea improbable que dicho incidente de seguridad constituya un riesgo para los derechos de los titulares de los datos. Si la notificación a la autoridad de control no tiene lugar en el plazo de SETENTA Y DOS (72) horas, deberá ir acompañada de indicación de los motivos de la dilación.

    De igual manera, el responsable del tratamiento también debe informar al titular de los datos sobre el incidente de seguridad ocurrido, en un lenguaje claro y sencillo,

    cuando sea probable que entrañe altos riesgos a sus derechos.

    La notificación debe contener, al menos, la siguiente información:

    a) la naturaleza del incidente;

    b) los datos personales que pueden estimarse comprometidos;

    c) las acciones correctivas realizadas de forma inmediata;

    d) las recomendaciones al titular de los datos acerca de las medidas que éste pueda adoptar para proteger sus intereses;

    e) los medios a disposición del titular de los datos para obtener mayor información al respecto.

    El responsable del tratamiento debe documentar todo incidente de seguridad que ponga en alto riesgo los derechos de los titulares de los datos personales ocurrido en cualquier fase del tratamiento de datos e identificar, de manera enunciativa pero no limitativa, la fecha en que ocurrió, el motivo del incidente, los hechos relacionados con éste y sus efectos y las medidas correctivas implementadas de forma inmediata y definitiva.

    ARTÍCULO 21

    Deber de confidencialidad. El responsable del tratamiento, el encargado y las demás personas que intervengan en cualquier fase del tratamiento de datos están obligados a la confidencialidad respecto de los datos personales. Tal obligación subsiste aun después de finalizada su relación con el titular de los datos, el responsable o el encargado del tratamiento, según corresponda.

    El obligado puede ser relevado del deber de confidencialidad por resolución judicial.

    ARTÍCULO 22

    Cesión. Cuando el tratamiento de datos consiste en una cesión, el responsable del tratamiento a quien se ceden los datos personales queda sujeto a las mismas obligaciones legales y reglamentarias que el responsable cedente. Ambos responden por la observancia de aquéllas ante la autoridad de control y el titular de los datos de que se trate. En cualquier caso, podrán ser eximidos total o parcialmente de responsabilidad si demuestran que no se les puede imputar el hecho que ha producido el daño.

    ARTÍCULO 23

    Transferencia internacional. Toda transferencia internacional de datos personales es lícita si se cumple al menos UNA (1) de las siguientes condiciones:

    a) cuente con el consentimiento expreso del titular de los datos;

    b) el país u organismo internacional o supranacional receptor proporcione un nivel de protección adecuado;

    c) se encuentre prevista en una ley o tratado en los que la REPÚBLICA ARGENTINA sea parte;

    d) sea necesaria para la prevención o el diagnóstico médico, la prestación de asistencia sanitaria, tratamiento médico o la gestión de servicios sanitarios;

    e) sea efectuada a cualquier sociedad del mismo grupo económico del responsable del tratamiento, en tanto los datos personales sean utilizados para finalidades que no sean incompatibles con las que originaron su recolección;

    f) sea necesaria en virtud de un contrato celebrado o por celebrar en interés inequívoco del titular de los datos, por el responsable del tratamiento y un tercero;

    g) sea necesaria o legalmente exigida para la salvaguarda de un interés público, o para la procuración o administración de justicia;

    h) sea necesaria para el reconocimiento, ejercicio o defensa de un derecho en un proceso judicial;

    i) sea necesaria para el mantenimiento o cumplimiento de una relación jurídica entre el responsable del tratamiento y el titular de los datos;

    j) sea efectuada en los casos de colaboración judicial internacional;

    k) sea requerida para concretar transferencias bancarias o bursátiles, en lo relativo a las transacciones respectivas y conforme la legislación que les resulte aplicable;

    l) tenga por objeto la cooperación internacional entre organismos de inteligencia para la lucha contra el crimen organizado, el terrorismo, el lavado de activos, los delitos informáticos y el narcotráfico;

    m) el responsable del tratamiento transferente y el destinatario adopten mecanismos de autorregulación vinculante, siempre y cuando éstos sean acorde a las disposiciones previstas en esta ley;

    n) se realice en el marco de cláusulas contractuales que contengan mecanismos de protección de los datos personales acordes con las disposiciones previstas en la presente ley.

    El receptor de los datos personales asume las mismas obligaciones que corresponden al responsable del tratamiento que transfirió los datos personales.

    ARTÍCULO 24

    Carácter adecuado del país u organismo receptor. Se entiende que un país u organismo internacional o supranacional proporciona un nivel adecuado de protección cuando dicha tutela se deriva directamente del ordenamiento jurídico vigente.

    El nivel de protección proporcionado por un país u organismo internacional o supranacional será evaluado por la autoridad de control, a pedido de parte interesada o de oficio y atendiendo a todas las circunstancias que concurran en una transferencia internacional; en particular, las normas de derecho, generales o especiales, vigentes en el país u organismo internacional o supranacional de que se trate, así como las normas profesionales, códigos de conducta y las medidas de seguridad que resulten aplicables.

    ARTÍCULO 25

    Prueba del cumplimiento de las obligaciones en materia de transferencias internacionales. A efectos de demostrar que la transferencia internacional se ha realizado conforme a lo que establece la presente ley, la carga de la prueba recae, en todos los casos, en el responsable del tratamiento que transfiere.

    ARTÍCULO 26

    Servicio de tratamiento de datos personales por medios tecnológicos tercerizados. El servicio de tratamiento de datos personales por medios tecnológicos tercerizados está permitido cuando se garantice el cumplimiento de los principios y obligaciones establecidos en la presente ley.

    El responsable del tratamiento debe realizar esfuerzos razonables para elegir un proveedor de servicios que garantice el cumplimiento de la presente ley. El responsable del tratamiento responderá ante el titular de los datos y ante la autoridad de control por incumplimientos del proveedor.

    En especial, el responsable del tratamiento debe realizar esfuerzos razonables para controlar que el proveedor del servicio de tratamiento de datos personales por medios tecnológicos tercerizados:

    a) cuente con una política de protección de datos personales o condiciones de

    servicio que no sean incompatibles con las disposiciones previstas en la presente ley, y que su aplicación sea efectiva, y además verificar que se prevean mecanismos para notificar los cambios que se produzcan sobre la política de protección de datos personales o condiciones de servicio;

    b) informe los tipos de subcontrataciones que involucren los datos personales objeto del tratamiento sobre el que se presta el servicio, notificando al responsable del tratamiento de cualquier cambio que se produzca;

    c) no incluya condiciones en la prestación del servicio que lo autoricen o permitan asumir la titularidad sobre las bases de datos tratados bajo esta modalidad.

    Capítulo 3. Derechos de los titulares de los datos

    ARTÍCULO 27

    Derecho de acceso. El titular de los datos, previa acreditación de su identidad, tiene el derecho de solicitar y obtener el acceso a sus datos personales que sean objeto del tratamiento.

    ARTÍCULO 28

    Contenido de la información. La información debe ser suministrada en forma clara, exenta de codificaciones y, en su caso, acompañada de una explicación de los términos que se utilicen, en lenguaje accesible al conocimiento medio de la población, y debe versar sobre:

    a) las finalidades del tratamiento de datos;

    b) las categorías de datos personales de que se trate;

    c) los destinatarios o las categorías de destinatarios a los que se cedieron o se prevean ceder los datos personales, en particular cuando se trate de una transferencia internacional;

    d) el plazo previsto de conservación de los datos personales o, de no ser ello posible, los criterios utilizados para determinar este plazo;

    e) la existencia del derecho a solicitar del responsable del tratamiento la rectificación, supresión de datos personales o a oponerse a dicho tratamiento;

    f) el derecho a iniciar un trámite de protección de datos personales ante la autoridad de control;

    g) cuando los datos personales no se hayan obtenido del titular de los datos, cualquier información disponible sobre su origen;

    h) la existencia de decisiones automatizadas, incluida la elaboración de perfiles a que se refiere el artículo 32 y, al menos en tales casos, información significativa sobre la lógica aplicada, sin que ello afecte derechos intelectuales del responsable del tratamiento.

    En ningún caso el informe puede revelar datos pertenecientes a terceros, aun cuando se vinculen con el titular de los datos.

    La información, a opción del titular de los datos, puede suministrarse por escrito, por medios electrónicos, telefónicos, de imagen, u otro idóneo a tal fin.

    ARTÍCULO 29

    Derecho de rectificación. El titular de los datos tiene el derecho a obtener del responsable del tratamiento la rectificación de sus datos personales, cuando éstos resulten ser inexactos, incompletos o no se encuentren actualizados.

    En el supuesto de cesión o transferencia internacional de datos erróneos o desactualizados, el responsable del tratamiento debe notificar la rectificación al cesionario dentro del quinto día hábil de haber tomado conocimiento efectivo del error o la desactualización.

    Durante el proceso de verificación y rectificación del error o falsedad de la información que se trate, el responsable del tratamiento debe bloquear el dato, o bien consignar, al proveer información relativa a éste, la circunstancia de que se encuentra sometido a revisión.

    ARTÍCULO 30

    Derecho de oposición. El titular de los datos puede oponerse al tratamiento de sus datos, o de una finalidad específica de éste, cuando no haya prestado consentimiento. El responsable del tratamiento debe dejar de tratar los datos personales objeto de oposición, salvo que existan motivos legítimos para el tratamiento que prevalezcan sobre los derechos del titular de los datos.

    ARTÍCULO 31

    Derecho de supresión. El titular de los datos tiene derecho a solicitar la supresión de sus datos personales de las bases de datos del responsable del tratamiento cuando el tratamiento no tenga un fin público, a fin de que los datos ya no estén en su posesión y dejen de ser tratados por este último.

    La supresión procede cuando:

    a) los datos personales ya no sean necesarios en relación con los fines para los que fueron recolectados;

    b) el titular de los datos revoque el consentimiento en que se basa el tratamiento de datos y éste no se ampare en otro fundamento jurídico;

    c) el titular de los datos haya ejercido su derecho de oposición conforme al artículo 30, y no prevalezcan otros motivos legítimos para el tratamiento de sus datos;

    d) los datos personales hayan sido tratados ilícitamente;

    e) los datos personales deban suprimirse para el cumplimiento de una obligación legal.

    La supresión no procederá cuando pudiese causar perjuicios a derechos o intereses legítimos de terceros, prevalezcan razones de interés público para el tratamiento de datos cuestionado, o los datos personales deban ser conservados durante los plazos previstos en las disposiciones aplicables o, en su caso, en las contractuales entre el responsable o encargado del tratamiento y el titular de los datos.

    La supresión tampoco procede cuando el tratamiento de datos sea necesario para ejercer el derecho a la libertad de expresión e información.

    ARTÍCULO 32

    Valoraciones personales automatizadas. El titular de los datos tiene derecho a oponerse a ser objeto de una decisión basada únicamente en el tratamiento automatizado de datos, incluida la elaboración de perfiles, que le produzca efectos jurídicos perniciosos o lo afecte significativamente de forma negativa.

    El titular de los datos no podrá ejercer este derecho si la decisión:

    a) es necesaria para la celebración o la ejecución de un contrato entre el titular de los datos y el responsable del tratamiento;

    b) está autorizada por ley;

    c) se basa en su consentimiento expreso.

    En los casos a que se refieren los incisos a) y c), el responsable del tratamiento debe adoptar las medidas adecuadas para salvaguardar los derechos del titular de los datos; como mínimo, el derecho a obtener intervención humana por parte del responsable del tratamiento, a expresar su punto de vista y a impugnar la decisión.

    ARTÍCULO 33

    Derecho a la portabilidad de datos personales. Si se brindan servicios en forma electrónica que incluyan el tratamiento de datos personales, el titular de los datos tiene derecho a obtener del responsable del tratamiento una copia de los datos personales objeto de tratamiento en un formato estructurado y comúnmente utilizado que le permita su ulterior utilización. El titular de los datos puede solicitar que sus datos personales se transfieran directamente de responsable a responsable cuando sea técnicamente posible.

    Este derecho no procederá cuando:

    a) su ejercicio imponga una carga financiera o técnica excesiva o irrazonable sobre el responsable o encargado del tratamiento;

    b) vulnere la privacidad de otro titular de los datos;

    c) vulnere las obligaciones legales del responsable o encargado del tratamiento;

    d) impida que el responsable del tratamiento proteja sus derechos, su seguridad o sus bienes, o los derechos, seguridad y bienes del encargado del tratamiento, o del titular de los datos o de un tercero.

    ARTÍCULO 34

    Ejercicio de los derechos. El ejercicio de cualquiera de los derechos del titular de los datos no es requisito previo, ni impide el ejercicio de otro.

    El responsable del tratamiento debe responder y, en su caso, satisfacer los derechos del titular de los datos dentro de los DIEZ (10) días hábiles de haber sido intimado fehacientemente.

    Vencido el plazo sin que se satisfaga el pedido, o si a juicio del titular de los datos, la respuesta se estimara insuficiente, quedará expedito el trámite de protección de los datos personales ante la autoridad de control en los términos del artículo 72 o, a elección del titular de los datos, podrá interponer la acción de habeas data prevista en el artículo 78 de la presente ley. En caso de optar por la acción de habeas data, o de haberla iniciado con anterioridad, no podrá iniciar el trámite de protección ante la autoridad de control.

    El ejercicio de los derechos previstos en los artículos 27, 29, 30, 31, 32 y 33 en el caso de titulares de los datos de personas fallecidas les corresponde a sus sucesores universales.

    El responsable del tratamiento debe establecer medios y procedimientos sencillos, expeditos, accesibles y gratuitos que permitan al titular de los datos ejercer los derechos previstos en esta ley.

    El derecho de acceso a que se refiere el artículo 27 sólo puede ser ejercido en forma gratuita a intervalos no inferiores a SEIS (6) meses, salvo que se acredite la existencia de nuevas razones que justifiquen el pedido antes del vencimiento del plazo.

    ARTÍCULO 35

    Abuso de derecho. El ejercicio abusivo de los derechos enumerados en este capítulo no se encuentra amparado. Se considera tal el que contraría los fines de la presente ley, el que excede los límites impuestos por la buena fe o el que imponga sobre el obligado una carga técnica o financiera irrazonable.

    ARTÍCULO 36

    Excepciones al ejercicio de los derechos. Los responsables del tratamiento de bases de datos públicas pueden, mediante decisión fundada, denegar los derechos enumerados en los artículos 27, 29, 30, 31, 32 y 33 en función de la protección de la defensa de la Nación, del orden y la seguridad públicos, o de la protección de los derechos e intereses de terceros.

    La información sobre datos personales también puede ser denegada por los responsables del tratamiento de bases de datos públicas, cuando de tal modo se pudieran obstaculizar actuaciones judiciales o administrativas en curso vinculadas a la investigación sobre el cumplimiento de obligaciones tributarias o previsionales, el desarrollo de funciones de control de la salud y del medio ambiente, la investigación de delitos penales y la verificación de infracciones administrativas. La resolución que así lo disponga debe ser fundada y notificada al titular de los datos.

    En cualquier caso, el responsable del tratamiento debe brindar acceso a los datos en cuestión en la oportunidad en que el titular de los datos demuestre que son necesarios para ejercer su derecho de defensa.

    Capítulo 4. Obligaciones de los responsables y encargados del tratamiento

    ARTÍCULO 37

    Medidas para el cumplimiento de la responsabilidad proactiva. Las medidas adoptadas para el cumplimiento de las disposiciones de la presente ley deben ser proporcionales a las modalidades y finalidades del tratamiento de datos, su contexto, el tipo y categoría de datos tratados, y el riesgo que el referido tratamiento pueda acarrear sobre los derechos de su titular.

    Deben contemplar, como mínimo:

    a) la adopción de procesos internos para llevar adelante de manera efectiva las medidas de responsabilidad;

    b) la implementación de procedimientos para atender el ejercicio de los derechos por parte de los titulares de los datos;

    c) la realización de supervisiones o auditorías, internas o externas, para controlar el cumplimiento de las medidas adoptadas.

    Las medidas deben ser aplicadas de modo que permitan su demostración ante el requerimiento de la autoridad de control.

    Se debe adoptar una política de privacidad o adherirse a mecanismos de autorregulación vinculantes, que serán valorados por la autoridad de control para verificar el cumplimiento de las obligaciones por parte del responsable del tratamiento.

    ARTÍCULO 38

    Protección de datos desde el diseño y por defecto. El responsable del tratamiento debe aplicar medidas tecnológicas y organizativas apropiadas tanto con anterioridad como durante el tratamiento de datos a fin de cumplir los principios y los derechos de los titulares de los datos establecidos en la presente ley. Las medidas deben ser adoptadas teniendo en cuenta el estado de la tecnología, los costos de la implementación y la naturaleza, ámbito, contexto y fines del tratamiento de datos, así como los riesgos que entraña el tratamiento para el derecho a la protección de los datos de sus titulares.

    El responsable del tratamiento debe aplicar las medidas tecnológicas y organizativas apropiadas con miras a garantizar que, por defecto, sólo sean objeto de tratamiento de datos aquellos datos personales que sean necesarios para cada uno de los fines del tratamiento. Esta obligación se aplica a la cantidad y calidad de datos personales recogidos, a la extensión de su tratamiento, a su plazo de conservación y a su accesibilidad. Tales medidas deben garantizar en particular que, por defecto, los datos personales no sean accesibles, sin la intervención del titular de los datos, a un número indeterminado de personas humanas.

    ARTÍCULO 39

    Tratamiento de datos por cuenta de terceros. La prestación de servicios de tratamiento de datos por cuenta de terceros entre un responsable y un encargado del tratamiento debe quedar formalizada mediante un contrato y no requiere del consentimiento del titular de los datos. El encargado del tratamiento se encuentra limitado a llevar a cabo sólo aquellos tratamientos de datos encomendados por el responsable del tratamiento. Los datos personales objeto de tratamiento no pueden aplicarse o utilizarse con un fin distinto al que figure en el contrato ni ser cedidos a otras personas, ni aun para su conservación, salvo autorización expresa del responsable del tratamiento.

    Una vez cumplida la prestación contractual, los datos personales tratados deben ser destruidos, salvo que medie autorización expresa del responsable del tratamiento cuando razonablemente se pueda presumir la posibilidad de ulteriores encargos, en cuyo caso sólo podrán conservarse por un máximo de DOS (2) años.

    El encargado puede suscribir un contrato para subcontratar servicios que impliquen el tratamiento de datos solamente cuando exista una autorización expresa del responsable del tratamiento. En estos casos el subcontratado asume el carácter de encargado en los términos y condiciones previstos en esta ley. Para el supuesto en que el subcontratado incumpla sus obligaciones y responsabilidades respecto al tratamiento de datos que lleve a cabo conforme a lo estipulado en el contrato, asumirá la calidad de responsable del tratamiento en los términos y condiciones previstos en la presente ley.

    Los contratos previstos en este artículo deben estipular el objeto, alcance, contenido, duración, naturaleza y finalidad del tratamiento de datos, el tipo de datos personales, las categorías de titulares de los datos y las obligaciones y responsabilidades del responsable y encargado del tratamiento.

    ARTÍCULO 40

    Evaluación de impacto relativa a la protección de datos personales. Cuando el responsable del tratamiento prevea realizar algún tipo de tratamiento de datos que por su naturaleza, alcance, contexto o finalidades, sea probable que entrañe un alto riesgo de afectación a los derechos de los titulares de los datos amparados en la presente ley, deberá realizar, de manera previa a la implementación del tratamiento, una evaluación del impacto relativa a la protección de los datos personales.

    La evaluación de impacto relativa a la protección de los datos es obligatoria en los siguientes casos, sin perjuicio de otros que establezca la autoridad de control:

    a) evaluación sistemática y exhaustiva de aspectos personales de personas humanas que se base en un tratamiento de datos automatizado, como la elaboración de perfiles, y sobre cuya base se tomen decisiones que produzcan efectos jurídicos para las personas humanas o que les afecten significativamente de modo similar;

    b) tratamiento de datos sensibles a gran escala, o de datos relativos a antecedentes penales o contravencionales.

    ARTÍCULO 41

    Contenido de la evaluación de impacto. La evaluación debe incluir, como mínimo:

    a) una descripción sistemática de las operaciones de tratamiento de datos previstas y de los fines del tratamiento, inclusive, cuando proceda, el interés legítimo perseguido por el responsable del tratamiento;

    b) una evaluación de la necesidad y la proporcionalidad de las operaciones de tratamiento de datos con respecto a su finalidad;

    c) una evaluación de los riesgos para la protección de los datos personales de los titulares de los datos a que se refiere el inciso a);

    d) las medidas previstas para afrontar los riesgos, incluidas garantías, medidas de seguridad y mecanismos que garanticen la protección de los datos personales, y para demostrar la conformidad con la presente ley, teniendo en cuenta los derechos e intereses legítimos de los titulares de los datos y de otras personas que pudieran verse potencialmente afectadas.

    ARTÍCULO 42

    Informe previo. El responsable del tratamiento debe informar a la autoridad de control antes de proceder al tratamiento de datos cuando una evaluación de impacto relativa a la protección de los datos muestre que el tratamiento de datos entrañaría un alto riesgo.

    El informe a la autoridad de control debe incluir, como mínimo, la siguiente información:

    a) las responsabilidades respectivas del responsable del tratamiento y los encargados del tratamiento, en particular en caso de tratamiento de datos dentro de un mismo grupo económico;

    b) los fines y medios del tratamiento previsto;

    c) las medidas y garantías establecidas para proteger los datos personales de sus titulares de conformidad con la presente ley;

    d) en su caso, los datos de contacto del delegado de protección de datos;

    e) la evaluación de impacto relativa a la protección de datos.

    Cuando la autoridad de control considere que el tratamiento de datos previsto pueda infringir la presente ley, iniciará el procedimiento de verificación de oficio establecido en el artículo 73.

    ARTÍCULO 43

    Delegado de protección de datos. Los responsables y encargados del tratamiento deben designar un delegado de protección de datos en cualquiera de los siguientes supuestos:

    a) cuando revistan el carácter de autoridades u organismos públicos;

    b) se realice tratamiento de datos sensibles como parte de la actividad principal del responsable o encargado del tratamiento;

    c) se realice tratamiento de datos a gran escala.

    Cuando los responsables y encargados del tratamiento no se encuentren obligados a la designación de un delegado de protección de datos de acuerdo a lo previsto en este artículo, pero decidan designarlo de manera voluntaria o por orden expresa de la autoridad de control, el delegado de protección de datos designado tendrá las funciones previstas en el artículo 44.

    Cuando se trate de una autoridad u organismo público con dependencias subordinadas, se puede designar un único delegado de protección de datos, teniendo en consideración su tamaño y estructura organizativa.

    Un grupo económico puede nombrar un único delegado de protección de datos siempre que esté en contacto permanente con cada establecimiento.

    La designación del delegado de protección de datos debe recaer en una persona que reúna los requisitos de idoneidad, capacidad y conocimientos específicos para el ejercicio de sus funciones.

    Las funciones del delegado de protección de datos pueden ser desempeñadas por un empleado del responsable o encargado del tratamiento o en el marco de un contrato de locación de servicios. El delegado de protección de datos puede ejercer otras funciones siempre que no den lugar a conflictos de intereses.

    En cualquier caso, el delegado debe ejercer sus funciones sin recibir instrucciones y sólo responde ante el más alto nivel jerárquico de la organización.

    ARTÍCULO 44

    Funciones del delegado de protección de datos. El delegado de protección de datos tiene las siguientes funciones, sin perjuicio de otras que se le asignen especialmente:

    a) informar y asesorar a los responsables y encargados del tratamiento, así como a sus empleados, de las obligaciones que tienen, derivadas de la normativa de protección de datos;

    b) promover y participar en el diseño y aplicación de una política de protección de datos que contemple los tratamientos de datos que realice el responsable o encargado del tratamiento;

    c) supervisar el cumplimiento de la presente ley y de la política de protección de datos de un organismo público, empresa o entidad privada;

    d) asignar responsabilidades, concientizar y formar al personal, y realizar las auditorías correspondientes;

    e) ofrecer el asesoramiento que se le solicite para hacer una evaluación de impacto relativa a la protección de datos, cuando entrañe un alto riesgo de afectación para los derechos de los titulares de los datos, y supervisar luego su aplicación;

    f) cooperar y actuar como referente ante la autoridad de control para cualquier consulta sobre el tratamiento de datos efectuado por el responsable o encargado del tratamiento.

    ARTÍCULO 45

    Mecanismos de autorregulación vinculantes. La autoridad de control alentará la elaboración de mecanismos de autorregulación vinculantes que tengan por objeto contribuir a la correcta aplicación de la presente ley, teniendo en cuenta las características específicas del tratamiento de datos que se realice, así como el efectivo ejercicio y respeto de los derechos del titular de los datos.

    Los mecanismos de autorregulación vinculantes se pueden traducir en códigos de conducta, de buenas prácticas, normas corporativas vinculantes, sellos de confianza, certificaciones u otros mecanismos que coadyuven a contribuir los objetivos señalados.

    Los responsables o encargados del tratamiento pueden adherirse, de manera voluntaria, a mecanismos de autorregulación vinculantes.

    Las asociaciones u otras entidades representativas de categorías de responsables o encargados del tratamiento podrán adoptar mecanismos de autorregulación vinculantes que resulten obligatorios para todos sus miembros.

    Los mecanismos de autorregulación vinculantes serán presentados a la homologación de la autoridad de control, la cual dictaminará si los mecanismos se adecuan a las disposiciones de la presente ley y, en su caso, los aprobará o indicará las correcciones que estime necesarias para su aprobación.

    Los mecanismos de autorregulación vinculantes que resulten aprobados serán registrados y dados a publicidad por la autoridad de control.

    Capítulo 5. Registro Nacional “No Llame

    ARTÍCULO 46

    Registro Nacional “No Llame”. Créase, en el ámbito de la autoridad de control de la presente ley, el Registro Nacional “No Llame”.

    ARTÍCULO 47

    Objeto y principio rector. El objeto del registro establecido por el artículo 46 es proteger los datos personales de los titulares o usuarios autorizados de los servicios de telefonía, en cualquiera de sus modalidades, del contacto, publicidad, oferta, venta y regalo de bienes o servicios no solicitados.

    Las situaciones contempladas y reguladas en el presente capítulo se deben interpretar en todos los casos teniendo en cuenta el requerimiento del titular o usuario.

    ARTÍCULO 48

    Servicios de telefonía. A los efectos del presente capítulo, se entenderá por “servicios de telefonía” los servicios de telefonía básica, telefonía móvil, servicios de radiocomunicaciones móvil celular, de comunicaciones móviles y de voz IP, así como cualquier otro tipo de servicio similar que la tecnología permita brindar en el futuro.

    ARTÍCULO 49

    Inscripción. Puede inscribirse en el Registro Nacional “No Llame” toda persona humana titular o usuaria autorizada del servicio de telefonía en cualquiera de sus modalidades que manifieste su voluntad de no ser contactada por quien publicite, oferte, venda o regale bienes o servicios, sin perjuicio de lo dispuesto en el artículo 61 de la presente ley.

    ARTÍCULO 50

    Gratuidad y simplicidad. La inscripción y baja en el Registro Nacional “No Llame” es gratuita y debe ser implementada por medios eficaces y sencillos. Los trámites de inscripción y baja sólo pueden ser realizados por el titular o usuario de la línea telefónica.

    La baja puede ser solicitada en cualquier momento y debe tener efectos inmediatos.

    ARTÍCULO 51

    Sujetos obligados e inscripción. Quienes publiciten, oferten, vendan o regalen bienes o servicios mediante recursos propios o a través de empresas tercerizadas o subcontratadas, utilizando como medio de contacto los servicios de telefonía en cualquiera de sus modalidades, son considerados responsables del tratamiento de datos y sujetos obligados al cumplimiento de lo previsto en el presente capítulo.

    También son sujetos obligados aquellos que por cuenta de terceros realicen el contacto telefónico, sin perjuicio de la responsabilidad de quien resulte el contratante de la campaña o beneficiario directo de ésta, resultando aplicables, en el caso de corresponder, las previsiones del artículo 22.

    Los sujetos obligados que contraten campañas en el exterior con efectos en el país deben adoptar las medidas apropiadas para que quien lleve a cabo la campaña publicitaria desde el extranjero dé cumplimiento a las disposiciones de la presente. Cualquier incumplimiento será atribuido al contratante o beneficiario directo de la campaña.

    Es responsable solidario el titular de la línea telefónica de la que provenga el contacto de publicidad, oferta, venta y regalo de bienes o servicios no solicitados si se tratara de persona distinta a las indicadas en los párrafos precedentes. El titular de la línea telefónica podrá ser eximido total o parcialmente de responsabilidad si demuestra que no se le puede imputar el hecho que ha producido el daño.

    Los sujetos obligados no pueden dirigirse a ninguno de los inscriptos en el Registro Nacional “No Llame”.

    Quienes realicen efectivamente el contacto telefónico deben:

    a) consultar las inscripciones vigentes que figuren en el Registro Nacional “No Llame” con una periodicidad de no más de TREINTA (30) días, en la forma que disponga la autoridad de control;

    b) estar inscriptos en un registro habilitado por la autoridad de control para la consulta en el Registro Nacional “No Llame” prevista en el inciso a); la autoridad de control establecerá el procedimiento para esa inscripción.

    En caso de duda, debe interpretarse que no corresponde el contacto telefónico con quien se hubiera inscripto en el Registro Nacional “No Llame”.

    ARTÍCULO 52

    Excepciones. Quedan exceptuadas de las disposiciones del presente capítulo:

    a) las llamadas de quienes tienen una relación contractual vigente, siempre que se refieran al bien o servicio específico objeto del vínculo contractual;

    b) las llamadas de quienes hayan sido expresamente permitidos por el titular o usuario autorizado de los servicios de telefonía en cualquiera de sus modalidades, inscripto en el Registro Nacional “No Llame”.

    ARTÍCULO 53

    Condiciones de contacto. Los contactos telefónicos de publicidad, oferta, venta y regalo de bienes o servicios no solicitados deben realizarse desde un número visible por el identificador de llamadas u otra tecnología que posea el titular o usuario de la línea telefónica.

    En todos los casos, los contactos telefónicos, incluso a personas no inscriptas en el Registro Nacional “No Llame” o bajo el amparo de alguna de las excepciones previstas en el artículo 52, deben ser realizadas en forma y horario razonables y de acuerdo a la reglamentación.

    ARTÍCULO 54

    Denuncias. El titular o usuario autorizado del servicio de telefonía en cualquiera de sus modalidades puede realizar la denuncia por incumplimiento del presente capítulo ante la autoridad de control dentro del plazo de UN (1) mes contado desde el momento del contacto.

    ARTÍCULO 55

    Incumplimientos. La autoridad de control iniciará actuaciones administrativas en caso de presuntas infracciones a las disposiciones del presente capítulo, aplicando el procedimiento previsto en el artículo 72, párrafos tercero y cuarto. Verificada la existencia de la infracción, quienes la hayan cometido serán pasibles de las sanciones previstas en el artículo 76.

    ARTÍCULO 56

    Recepción de prueba. La autoridad de control, a los fines probatorios, tendrá en cuenta los elementos de hecho e indicios de carácter objetivos aportados por el denunciante que sustenten la situación fáctica debatida, quedando a cargo del denunciado acreditar que ha dado cumplimiento con las obligaciones establecidas en el presente capítulo.

    A requerimiento de la autoridad de control, los sujetos obligados deberán brindar el registro de sus llamadas salientes provisto por la empresa prestadora del servicio de telecomunicaciones de la que fueran usuarios, quien lo debe proveer en un plazo máximo de DIEZ (10) días y en las condiciones que la autoridad de control disponga.

    En el marco de un sumario administrativo por incumplimientos al presente capítulo, la autoridad de control podrá requerir en un plazo razonable informes a las empresas prestadoras del servicio de telecomunicaciones sobre:

    a) la existencia del contacto telefónico cuestionado;

    b) la información de la titularidad de una línea telefónica.

    El incumplimiento de la requisitoria a que se refieren los párrafos segundo y tercero hará pasibles a las empresas prestadoras del servicio de telecomunicaciones de las sanciones previstas en el artículo 76, inciso b).

    ARTÍCULO 57

    Resolución. La autoridad de control dictará la resolución que corresponda dentro de los TREINTA (30) días de recibida la prueba y producidos los alegatos si corresponden. La autoridad de control podrá prorrogar este plazo cuando la complejidad del tema a resolver sea fundamento suficiente para esa prórroga.

    La resolución de la autoridad de control podrá:

    a) archivar la denuncia;

    b) imponer una sanción en caso de que se hubiera verificado un incumplimiento al presente capítulo.

    La resolución de la autoridad de control mencionada en el inciso b) agotará la vía administrativa a los efectos de lo previsto en la Ley Nacional de Procedimientos Administrativos nº 19.549. No procederá el recurso de alzada. Agotada la vía administrativa, la resolución será recurrible por ante la CÁMARA NACIONAL DE APELACIONES EN LO CONTENCIOSO ADMINISTRATIVO FEDERAL de la CAPITAL FEDERAL.

    Capítulo 6. Supuestos especiales

    ARTÍCULO 58

    Bases de datos públicas. La creación, modificación o supresión de bases de datos pertenecientes a autoridades u organismos públicos debe hacerse por medio de norma de alcance general, publicada en el Boletín Oficial o diario oficial.

    Las normas respectivas, deben indicar:

    a) órganos responsables de la base de datos, precisando dependencia jerárquica en su caso;

    b) características y finalidad de los tratamientos de datos que se efectúen;

    c) personas respecto de las cuales se pretenda obtener datos y el carácter facultativo u obligatorio de su suministro por parte de aquéllas;

    d) procedimiento de obtención y actualización de los datos;

    e) estructura básica de la base y la descripción de la naturaleza de los datos personales que contendrán;

    f) las cesiones, transferencias o interconexiones previstas;

    g) las oficinas ante las que se pudiesen efectuar el ejercicio de los derechos previstos en la presente ley.

    En las normas que se dicten para la supresión de las bases de datos se debe establecer el destino de éstas o las medidas que se adopten para su destrucción.

    ARTÍCULO 59

    Tratamiento de datos por organismos de seguridad e inteligencia. Las bases de datos de las fuerzas armadas, fuerzas de seguridad, organismos policiales o de inteligencia quedan sujetos a las disposiciones de la presente ley. Las Comisiones Bicamerales de FISCALIZACIÓN DE ORGANISMOS Y ACTIVIDADES DE INTELIGENCIA y de FISCALIZACIÓN DE ÓRGANOS Y ACTIVIDADES DE SEGURIDAD INTERIOR del CONGRESO DE LA NACIÓN y la COMISIÓN DE DEFENSA NACIONAL de la CÁMARA DE SENADORES DE LA NACIÓN, o las que las sustituyan, tienen acceso a las bases de datos mencionadas por razones fundadas y en aquellos aspectos que constituyan materia de competencia de tales comisiones.

    El tratamiento de datos personales con fines de defensa nacional o seguridad pública por parte de las fuerzas armadas, fuerzas de seguridad, organismos policiales o de inteligencia, cuando sea necesario realizar sin el consentimiento del titular, queda limitado a aquellos supuestos y categorías de datos que resulten necesarios para el estricto cumplimiento de las misiones legalmente asignadas a aquéllos para la defensa nacional, la seguridad pública o para la represión de los delitos.

    Se deben suprimir, aun si no medie solicitud del titular, los datos personales de las bases de datos mencionadas en el primer párrafo cuando no sean necesarios para los fines que motivaron su recolección.

    ARTÍCULO 60

    Prestación de servicios de información crediticia.

    1. En la prestación de servicios de información crediticia sólo pueden tratarse datos personales de carácter patrimonial relativos a la solvencia económica y al crédito, obtenidos de fuentes de acceso público irrestricto o restricto, o procedentes de informaciones facilitadas por el titular de los datos o con su consentimiento.

    2. Pueden tratarse igualmente datos personales relativos al cumplimiento o incumplimiento de obligaciones de contenido patrimonial, facilitados por el acreedor o por quien actúe por su cuenta o interés.

    3. A solicitud del titular de los datos, el responsable o encargado del tratamiento debe comunicar a aquél en forma gratuita las informaciones, evaluaciones y apreciaciones que sobre él hayan sido comunicadas durante los últimos DOCE (12) meses y la fuente de la información, incluyendo nombre y domicilio, en caso de corresponder.

    4. Sólo se pueden archivar, registrar o ceder los datos personales que sean significativos para evaluar la solvencia económico-financiera de los afectados durante los últimos CINCO (5) años a contar desde la última información significativa. El plazo se reduce a UN (1) año cuando el deudor cancele o extinga la obligación, y a CUATRO (4) meses cuando la deuda sea igual o menor a UN (1) Salario Mínimo Vital y Móvil, a contar en ambos casos a partir de la fecha precisa en que se extingue la deuda.

    5. Se considera información significativa:

    a) el momento en que se produce la mora del deudor;

    b) las distintas calificaciones que le otorgan al deudor las entidades financieras según normativa del BANCO CENTRAL DE LA REPÚBLICA ARGENTINA;

    c) el inicio de la acción judicial de cobro;

    d) la sentencia judicial que dispone el pago de la deuda;

    e) la fecha de la apertura del concurso de acreedores o de la declaración de quiebra, en caso de deudas verificadas o en trámite de verificación en los procesos de concursos preventivos y quiebras respectivamente;

    f) aquella otra información que defina el órgano de control.

    6. No se considera última información significativa la asentada en una base de datos por el sólo hecho de ser la constancia final de una serie o sucesión de datos si se trata de una mera repetición de la misma información que, sin novedad o aditamento alguno, ha sido archivada durante los meses anteriores.

    7. La prestación de servicios de información crediticia no requiere el previo consentimiento del titular de los datos a los efectos de su cesión, ni la ulterior comunicación de ésta, o de su transferencia internacional, cuando estén relacionados con el giro de las actividades comerciales o crediticias de los cesionarios.

    8. Las entidades financieras que obligatoriamente cedan información relativa al cumplimiento de obligaciones de contenido patrimonial al BANCO CENTRAL DE LA REPÚBLICA ARGENTINA, deben comunicar al titular de los datos la información a ceder al último domicilio por él denunciado o por un canal de comunicación habitual entre las partes que permita acreditar la recepción y su fecha. A tales fines, dicha comunicación puede remitirse por medio postal o electrónico y junto con otras comunicaciones, como ser la de sus consumos, movimientos de cuenta, recibos o facturas. En cualquier caso, el cedente tiene la carga de acreditar el cumplimiento de la comunicación aquí dispuesta. Esta comunicación se debe efectuar cuando las obligaciones pasen de cumplimiento normal a incumplimiento, sin que se deba comunicar al deudor la continuidad de tal incumplimiento y/o el agravamiento de la calificación, y dentro de los DIEZ (10) días hábiles de producida la nueva calificación.

    9. Esta obligación no afectará el cumplimiento del régimen informativo del BANCO CENTRAL DE LA REPÚBLICA ARGENTINA, en su carácter de autoridad de aplicación de la Ley de Entidades Financieras nº 21.526.

    10. En caso de disconformidad con el contenido de la información comunicada conforme al párrafo precedente, el titular de los datos puede ejercer cualquiera de los derechos que le otorga esta ley. Si el titular de los datos cumple con su obligación dentro de los DIEZ (10) días hábiles de notificado, las entidades financieras no podrán ceder la información del titular al BANCO CENTRAL DE LA REPÚBLICA ARGENTINA, quien no podrá difundirla al público.

    11. Previo a ceder datos personales relativos al incumplimiento de obligaciones patrimoniales a responsables o encargados del tratamiento que prestan servicios de información crediticia, los cedentes deben comunicar al titular de los datos la información a ceder y sus cesionarios al último domicilio por él denunciado o por un canal de comunicación habitual entre las partes que permita acreditar la recepción y su fecha. A tales fines, dicha comunicación puede remitirse por medio postal o electrónico y junto con otras comunicaciones, como ser la de sus consumos, movimientos de cuenta, recibos o facturas. En cualquier caso, el cedente tiene la carga de acreditar el cumplimiento de la comunicación aquí dispuesta. Los tratamientos de datos efectuados por el Estado quedan exceptuados de la notificación dispuesta en el presente apartado.

    12. En caso de disconformidad con el contenido de la información a ceder conforme al apartado precedente, el titular de los datos puede ejercer cualquiera de los derechos que le otorga esta ley. Una vez cursada dicha comunicación al titular de los datos, no se requiere una nueva para realizar otras cesiones referidas a la misma obligación. La información puede ser difundida por las empresas que prestan servicios de informes crediticios luego de transcurridos DIEZ (10) días hábiles de recibida la comunicación. Si el titular de los datos cumple con su obligación dentro de dicho plazo, no podrán cederse tales datos a las empresas que prestan servicios de información crediticia.

    13. Las entidades financieras no están alcanzadas por la obligación dispuesta en los dos apartados precedentes en la medida en que hayan cumplido con lo previsto en los apartados 8 y 9 del presente artículo.

    Cuando se deniegue al titular de los datos la celebración de un contrato, solicitud de trabajo, servicio, crédito comercial o financiero, sustentado en un informe crediticio, deberá informársele tal circunstancia, así como la empresa que proveyó dicho informe y hacerle entrega de una copia de éste.

    14. Se debe suprimir la información relativa a los fiadores o avalistas cuando se haya cancelado o extinguido la obligación, previo pedido por parte del deudor, fiador o avalista ante la empresa de información crediticia, en la modalidad y plazos dispuestos por el artículo 34 de la presente ley.

    ARTÍCULO 61

    Bases destinadas a la publicidad. Pueden tratarse sin consentimiento de su titular datos personales con fines de publicidad, venta directa y otras actividades análogas, cuando estén destinados a la formación de perfiles determinados o que permitan establecer hábitos de consumo que categoricen preferencias y comportamientos similares de las personas, siempre que los titulares de los datos sólo se identifiquen por su pertenencia a tales grupos genéricos, con más los datos individuales estrictamente necesarios para formular la oferta a los destinatarios.

    En toda comunicación con fines de publicidad que se realice por correo, teléfono, correo electrónico, Internet u otro medio que permita la tecnología en el futuro, el responsable o encargado del tratamiento debe implementar medidas razonables que informen al titular de los datos la posibilidad de ejercer los derechos previstos en la presente ley.

    Los datos referentes a la salud sólo pueden ser tratados, a fin de realizar ofertas de bienes y servicios, cuando hubieran sido obtenidos de acuerdo con la presente ley y siempre que no causen discriminación, en el contexto de una relación entre el consumidor o usuario y los proveedores de servicios o tratamientos médicos y entidades sin fines de lucro. Estos datos no pueden cederse a terceros sin el consentimiento previo, expreso e informado del titular de los datos. A dicho fin, este último debe recibir una noticia clara del carácter sensible de los datos que proporciona y de que no está obligado a suministrarlos, junto con la información de los artículos 15 y la mención de su derecho a oponerse al tratamiento de sus datos.

    En los supuestos contemplados en el presente artículo, el titular de los datos puede ejercer el derecho de acceso sin cargo ni limitación temporal alguna. La información a suministrársele debe incluir la fuente de la que se obtuvieron sus datos, indicando, en su caso, el nombre del responsable o encargado del tratamiento que proveyó la información.

    Capítulo 7. Autoridad de control

    ARTÍCULO 62

    Autoridad de control. Créase la AGENCIA NACIONAL DE PROTECCIÓN DE DATOS PERSONALES (ANPDP) como órgano de control que debe velar por el cumplimiento de los principios y procedimientos establecidos en la presente ley.

    La ANPDP será un ente descentralizado en el ámbito del MINISTERIO DE JUSTICIA Y DERECHOS HUMANOS DE LA NACIÓN, con autarquía económica financiera, personería jurídica propia y capacidad de actuación en el ámbito del derecho público y privado.

    La ANPDP será dirigida, administrada y representada por un Director Ejecutivo designado por el término de CUATRO (4) años, por el PODER EJECUTIVO NACIONAL con posibilidad de ser reelegido por una única vez. El Director Ejecutivo a cargo de la ANPDP tendrá rango y jerarquía de secretario de Estado. El Director Ejecutivo tendrá dedicación exclusiva en su función, encontrándose alcanzado por las incompatibilidades fijadas por ley para los funcionarios públicos.

    ARTÍCULO 63

    Selección del Director Ejecutivo. El procedimiento de selección del Director Ejecutivo de la ANPDP se llevará a cabo de conformidad con lo dispuesto a continuación:

    a) el PODER EJECUTIVO NACIONAL propondrá UNA (1) persona y publicará el nombre, apellido y sus antecedentes curriculares en el Boletín Oficial y en DOS (2) diarios de circulación nacional, durante TRES (3) días;

    b) el candidato deberá presentar una declaración jurada, conforme la normativa prevista en la Ley de Ética en el Ejercicio de la Función Pública nº 25.188, y su reglamentación;

    c) se requerirá a la ADMINISTRACIÓN FEDERAL DE INGRESOS PÚBLICOS (AFIP) un informe relativo al cumplimiento de las obligaciones impositivas del candidato;

    d) los ciudadanos, las organizaciones no gubernamentales, los colegios, las asociaciones profesionales y las entidades académicas podrán, en el plazo de QUINCE (15) días contados desde la última publicación en el Boletín Oficial prevista en el inciso a) del presente artículo, presentar al organismo a cargo de la organización de la audiencia pública observaciones respecto del candidato, por escrito y de modo fundado y documentado.. Sin perjuicio de las presentaciones que se realicen, en el mismo plazo podrá requerirse opinión a organizaciones de relevancia en el ámbito profesional, judicial y académico a los fines de su valoración;

    e) dentro de los QUINCE (15) días, contados desde el vencimiento del plazo establecido en el inciso d) del presente artículo, se deberá celebrar una audiencia pública para la evaluación de las observaciones presentadas. Con posterioridad y en un plazo de SIETE (7) días de celebrada la audiencia, el PODER EJECUTIVO NACIONAL tomará la decisión de confirmar o retirar la candidatura de la persona propuesta, debiendo en este último caso proponer a un nuevo candidato y reiniciar el procedimiento de selección.

    ARTÍCULO 64

    Cese de pleno derecho del Director Ejecutivo. El Director Ejecutivo cesará de pleno derecho en sus funciones de mediar alguna de las siguientes circunstancias:

    a) aceptación de la renuncia;

    b) expiración del plazo de designación;

    c) fallecimiento.

    ARTÍCULO 65

    Remoción del Director Ejecutivo. El Director Ejecutivo podrá ser removido por estar comprendido en alguna situación que le genere incompatibilidad o inhabilidad, mal desempeño, por delito en el ejercicio de sus funciones o por crímenes comunes. El PODER EJECUTIVO NACIONAL llevará adelante el procedimiento de remoción del Director Ejecutivo de la ANPDP, dándole intervención a una comisión bicameral del HONORABLE CONGRESO DE LA NACIÓN, que será presidida por el presidente del SENADO y estará integrada por los presidentes de las Comisiones de ASUNTOS CONSTITUCIONALES y de DERECHOS Y GARANTÍAS de la HONORABLE CÁMARA DE SENADORES DE LA NACIÓN y las de ASUNTOS CONSTITUCIONALES y de DERECHOS HUMANOS Y GARANTÍAS de la HONORABLE CÁMARA DE DIPUTADOS DE LA NACIÓN, la cual emitirá un dictamen vinculante.

    Producida la vacante, deberá seguirse el procedimiento de selección establecido en el artículo 63 para elegir a un nuevo Director en un plazo no mayor a TREINTA (30) días.

    ARTÍCULO 66

    Deberes y funciones del Director Ejecutivo. El Director Ejecutivo tendrá los siguientes deberes y funciones:

    a) ejercer la representación, dirección y administración general de la ANPDP, suscribiendo a tal fin los actos administrativos pertinentes;

    b) representar al Estado nacional o designar personal idóneo para su representación, en todos aquellos procesos que se desarrollen ante tribunales judiciales o arbitrales, o ante organismos con facultades jurisdiccionales en los que se debatan asuntos de competencia de la ANPDP;

    c) dictar las normas reglamentarias necesarias para el funcionamiento operativo del organismo;

    d) toda otra atribución necesaria para el cumplimiento de las funciones del organismo.

    ARTÍCULO 67

    Personal de la autoridad de control. La ANPDP deberá contar con el personal técnico y administrativo que establezca la Ley de Presupuesto General de la Administración Nacional. El personal estará obligado a guardar secreto respecto de los datos de carácter personal de los que tome conocimiento en el desarrollo de sus funciones.

    ARTÍCULO 68

    Financiación. LA ANPDP se financiará a través de:

    a) lo que recaude en concepto de tasas que se fijen por ley por los servicios que preste;

    b) el producido de las multas referidas en esta ley;

    c) las asignaciones presupuestarias que se incluyan en la Ley de Presupuesto General de la Administración Nacional.

    ARTÍCULO 69

    Patrimonio. La ANPDP tendrá un patrimonio integrado con los siguientes bienes:

    a) los adquiridos hasta la fecha de la sanción de la presente ley, que se encuentran incorporados al Estado nacional con afectación a la DIRECCIÓN NACIONAL DE PROTECCIÓN DE DATOS PERSONALES;

    b) los que adquiera la ANPDP posteriormente conforme a las disposiciones y leyes que le fueran aplicables.

    ARTÍCULO 70

    Facultades de la autoridad de control. La ANPDP deberá realizar todas las acciones necesarias para el cumplimiento de los objetivos y demás disposiciones de la presente ley. A tales efectos tendrá las siguientes funciones y atribuciones:

    a) asistir y asesorar a las personas que lo requieran acerca de los alcances de la presente ley y de los medios legales de que disponen para la defensa de sus derechos;

    b) dictar las normas y reglamentaciones que se deben observar en el desarrollo de las actividades comprendidas por esta ley; específicamente, dictar normas administrativas y de procedimiento relativas a las funciones a su cargo, y las normas y procedimientos técnicos relativos al tratamiento de datos y condiciones de seguridad de las bases de datos;

    c) atender los requerimientos y denuncias interpuestos en relación al tratamiento de datos en los términos de la presente ley;

    d) controlar el cumplimiento de los requisitos y garantías que deben reunir los tratamientos de datos de conformidad con la presente ley y las reglamentaciones que dicte la autoridad de control; a tal efecto, podrá solicitar autorización judicial para acceder a locales, equipos, o programas de tratamiento de datos a fin de verificar infracciones al cumplimiento de esta ley;

    e) solicitar información a las entidades públicas y privadas, las que deberán proporcionar los antecedentes, documentos, programas u otros elementos relativos al tratamiento de datos que se le requieran; en estos casos, la autoridad deberá garantizar la seguridad y confidencialidad de la información y elementos suministrados;

    f) imponer las sanciones administrativas que, en su caso, correspondan por violación a las normas de la presente ley y de las reglamentaciones que se dicten en su consecuencia;

    g) percibir las tasas que se fijen por ley por los servicios de inscripción y otros que preste;

    h) constituirse en querellante en las acciones penales que se promovieran por violaciones a la presente ley;

    i) homologar los mecanismos de autorregulación vinculantes y supervisar su cumplimiento;

    j) diseñar su estructura orgánica de funcionamiento y designar a su planta de agentes;

    k) elaborar su presupuesto anual;

    l) solicitar información a los delegados de protección de datos, en los términos de lo previsto en la presente ley;

    m) publicar un informe anual de rendición de cuentas de gestión;

    n) elaborar y presentar ante el HONORABLE CONGRESO DE LA NACIÓN propuestas de reforma legislativa respecto de su área de competencia;

    ñ) celebrar convenios de cooperación y contratos con organizaciones públicas o privadas, nacionales o extranjeras, en el ámbito de su competencia, para el cumplimiento de sus funciones.

    Capítulo 8. Procedimientos y sanciones

    ARTÍCULO 71

    Procedimiento. A los efectos de constatar el cumplimiento de las disposiciones de la presente ley, la autoridad de control podrá iniciar procedimientos:

    a) a instancias del titular de los datos o de su representante legal;

    b) de verificación de oficio;

    c) de verificación por denuncia de un tercero.

    La autoridad de control podrá en cualquier momento del procedimiento buscar una conciliación entre el titular de los datos y el responsable del tratamiento.

    De llegarse a un acuerdo de conciliación entre ambos, esté se hará constar por escrito y tendrá efectos vinculantes.

    La autoridad de control determinará el procedimiento que se aplicará a la conciliación.

    ARTÍCULO 72

    Trámite de protección de los datos personales. El titular de los datos o su representante legal puede iniciar un trámite de protección de los datos personales presentando ante la autoridad de control una solicitud, de manera escrita y por cualquier medio habilitado por la autoridad de control, expresando con claridad el contenido de su requerimiento y de los preceptos de esta ley que se consideran vulnerados. La presentación debe realizarse ante la autoridad de control dentro de los TREINTA (30) días siguientes a la fecha en que se comunique la respuesta al titular de los datos por parte del responsable del tratamiento, de acuerdo a lo previsto en el artículo 34, párrafos segundo y tercero, de la presente ley.

    En el caso de que el titular de los datos no reciba respuesta por parte del responsable del tratamiento dentro de los DIEZ (10) días hábiles de haberlo intimado fehacientemente, basta que el titular de los datos acredite la fecha en que presentó la solicitud ante el responsable del tratamiento.

    Iniciado el trámite de protección de los datos personales previsto en este artículo ante la autoridad de control, se dará traslado de aquél al responsable del tratamiento, para que en el plazo de DIEZ (10) días hábiles, emita respuesta, ofrezca las pruebas que estime pertinentes y manifieste por escrito lo que a su derecho convenga.

    La autoridad de control admitirá las pruebas que estime pertinentes. Asimismo, podrá solicitar del responsable del tratamiento las demás pruebas que considere necesarias. Concluida la recepción de pruebas, la autoridad de control notificará al responsable del tratamiento el derecho que le asiste para que, de considerarlo necesario, presente sus alegatos dentro de los CINCO (5) días hábiles siguientes a su notificación.

    ARTÍCULO 73

    Trámite de verificación de oficio o por denuncia de un tercero. La autoridad de control verificará el cumplimiento de la presente ley y de la normativa que de ésta derive. La verificación podrá iniciarse de oficio o por denuncia de un tercero.

    A efectos de practicar la verificación, la autoridad de control tendrá acceso a la información y documentación que considere necesarias, de acuerdo a lo previsto en la presente ley y a la reglamentación correspondiente.

    En caso de que corresponda, se aplicará al trámite lo previsto en el artículo 72, párrafos tercero y cuarto, de la presente ley.

    ARTÍCULO 74

    Resolución. La resolución de la autoridad de control podrá:

    a) archivar los trámites mencionados en los artículos 72 y 73 de la presente ley;

    b) en caso de considerar que asiste derecho al titular de los datos, requerirle al responsable del tratamiento que haga efectivo el ejercicio de los derechos objeto de protección, debiendo dar cuenta por escrito de dicho cumplimiento a la autoridad de control dentro de los QUINCE (15) días hábiles de efectuado;

    c) de verificarse incumplimientos a la presente ley, imponer una sanción de las previstas en el artículo 76.

    d) La autoridad de control dictará la resolución que corresponda dentro de un plazo razonable, atendiendo a la complejidad del tema a resolver.

    ARTÍCULO 75

    Recursos. Las resoluciones de la autoridad de control agotarán la vía administrativa a los efectos de lo previsto en la Ley Nacional de Procedimientos Administrativos nº 19.549. No procederá el recurso de alzada. Agotada la vía administrativa, las resoluciones previstas en el artículo 76 serán recurribles por ante la CÁMARA NACIONAL DE APELACIONES EN LO CONTENCIOSO ADMINISTRATIVO FEDERAL de la CAPITAL FEDERAL.

    ARTÍCULO 76

    Sanciones. Una vez establecido el incumplimiento de las disposiciones de la presente ley por parte del responsable del tratamiento o del encargado del tratamiento, la autoridad de control impondrá las medidas o las sanciones correspondientes.

    La autoridad de control podrá imponer a los responsables y encargados del tratamiento las siguientes sanciones:

    a) apercibimiento;

    b) multa que podrá alcanzar el equivalente a QUINIENTOS (500) Salarios Mínimo Vital y Móvil vigentes al momento de la imposición de la sanción;

    c) suspensión de las actividades relacionadas con el tratamiento de datos hasta por un término de SEIS (6) meses; en el acto de suspensión se indicarán los correctivos que se deberán adoptar;

    d) cierre temporal de las operaciones relacionadas con el tratamiento de datos una vez transcurrido el término de suspensión sin que se hubieren adoptado los correctivos ordenados por la autoridad de control;

    e) cierre inmediato y definitivo de la operación que involucre el tratamiento de datos sensibles.

    Al ordenar la suspensión o cierres previstos en los incisos c), d) y e) la autoridad de control podrá ordenar que, de manera temporal o definitiva, se retire, bloquee, suspenda y/o inhabilite el acceso a los datos personales a los que los responsables del tratamiento den acceso, interconecten, transmitan o direccionen, almacenen, alojen, intermedien, enlacen o busquen, que lesionen derechos legalmente reconocidos. A tal efecto, la autoridad de control deberá precisar, de acuerdo a lo informado por el titular de los datos, el enlace en el que se encuentren alojados los datos personales o los procedimientos para acceder a aquél. En ningún caso, estas medidas podrán afectar el derecho a la libertad de expresión e información.

    Las sanciones indicadas en el presente artículo sólo se aplican para las personas de naturaleza privada. En el caso en el cual la autoridad de control advierta un presunto incumplimiento de una autoridad pública a las disposiciones de la presente ley, remitirá la actuación a la autoridad que corresponda para que inicie la investigación respectiva.

    En todos los casos, la autoridad de control podrá disponer, a costa del responsable, la publicación de la resolución en el diario de mayor circulación de la jurisdicción donde se encuentre establecido el responsable.

    ARTÍCULO 77

    Gradación. Las sanciones por infracciones a las que se refiere el artículo 76 se graduarán atendiendo los siguientes criterios, en cuanto resulten aplicables:

    a) la dimensión del daño o peligro a los intereses jurídicos tutelados por la presente ley;

    b) el beneficio económico obtenido por el infractor o terceros, en virtud de la comisión de la infracción;

    c) la reincidencia en la comisión de la infracción;

    d) la resistencia, negativa u obstrucción a la acción investigadora o de vigilancia de la autoridad de control;

    e) el incumplimiento de los requerimientos u órdenes impartidas por la autoridad de control;

    f) el reconocimiento o aceptación expreso que haga el investigado sobre la comisión de la infracción antes de la imposición de la sanción a que hubiere lugar.

    La designación voluntaria de un delegado de protección de datos, la adopción de mecanismos de autorregulación vinculantes, la realización de una evaluación de impacto en los términos del artículo 40 y la notificación oportuna de incidentes de seguridad, serán merituados como atenuantes de la sanción que corresponda, sin perjuicio de otros que pueda considerar la autoridad de control.

    Capítulo 9. Acción de habeas data

    ARTÍCULO 78

    Procedencia. La acción de habeas data procede para tutelar los derechos que resulten restringidos, alterados, lesionados o amenazados por un tratamiento de datos personales contrario a la presente ley por parte de las autoridades públicas o por particulares. Esta acción procederá especialmente para ejercer los derechos de acceso, rectificación, oposición, cancelación y portabilidad de los datos previstos en la presente ley.

    En los casos en que se presuma o se hubiera verificado la falsedad, inexactitud, desactualización de la información de que se trata, o se hubiera realizado un tratamiento de datos ilícito o prohibido, la acción de habeas data procederá para ejercer los derechos de rectificación, de oposición, o de supresión previstos en los artículos 29, 30 y 31; el derecho de oposición también podrá ser ejercido en los supuestos del artículo 32 de la presente ley.

    ARTÍCULO 79

    Legitimación activa y pasiva. La acción de habeas data podrá ser ejercida por el titular de los datos afectado, sus tutores, curadores o por el titular de la responsabilidad parental o tutela en caso de niños, niñas o adolescentes. En el caso de las personas humanas fallecidas, la acción podrá ser ejercida por sus sucesores universales.

    La acción podrá ser también intentada en representación plural, sectorial o colectiva, siempre que su objeto se limite a la impugnación de tratamientos que conlleven violaciones generalizadas, pero en tal caso los promotores de tales acciones no podrán tener acceso a los datos de las demás personas que integran el colectivo por ellas representados, sino sólo a los datos propios. Tendrán legitimación para interponer esta acción el titular de los datos, el Defensor del Pueblo, las asociaciones sectoriales, la autoridad de control y el Ministerio Público.

    En el proceso podrá intervenir, en forma coadyuvante y cuando corresponda, la autoridad de control, quien será notificada del inicio de la acción de habeas data.

    La acción procede respecto de los responsables del tratamiento. Excepcionalmente los responsables del tratamiento podrán interponer la acción contra otros responsables o encargados del tratamiento cuando éstos últimos incumplan con sus obligaciones legales o convencionales y esto pueda acarrearles perjuicio.

    ARTÍCULO 80

    Competencia. Será competente para entender en esta acción el juez del domicilio del actor o del demandado, a elección del actor.

    Procederá la competencia federal cuando la acción:

    a) se interponga en contra de los responsables del tratamiento que sean parte de la Administración Pública Nacional;

    b) se interponga en contra del responsable del tratamiento de datos accesibles en redes interjurisdiccionales, nacionales o internacionales.

    ARTÍCULO 81

    Procedimiento aplicable. La acción de habeas data tramitará según las disposiciones de la presente ley y, supletoriamente, según el procedimiento que corresponde a la acción de amparo común y según las normas del CÓDIGO PROCESAL CIVIL Y COMERCIAL DE LA NACIÓN, en lo atinente al juicio sumarísimo.

    El juez dispondrá de amplias facultades para adaptar los procedimientos de acuerdo a las circunstancias particulares del caso y a fin de dar mayor eficacia tuitiva al proceso.

    ARTÍCULO 82

    Requisitos de la demanda. La demanda deberá interponerse por escrito, individualizando con la mayor precisión posible el nombre y domicilio del responsable del tratamiento y, en su caso, el nombre de la base de datos o cualquier otra información que pudiera ser útil a efectos de identificarla. En el caso de bases de datos públicas, se procurará establecer autoridad u organismo público del cual dependan el responsable o el encargado del tratamiento.

    El accionante deberá alegar las razones por las cuales entienda que se esté

    efectuando tratamiento de datos referido a su persona y los motivos por los cuales considere que procede el ejercicio de los derechos que le reconoce la presente ley. Deberá asimismo justificar el cumplimiento de los recaudos que hacen al ejercicio de tales derechos.

    El accionante podrá solicitar al Juez que, mientras dure el procedimiento, el responsable o el encargado del tratamiento informe que la información cuestionada está sometida a un proceso judicial.

    El juez podrá disponer el bloqueo provisional del acceso a la base de datos en lo referente a los datos personales motivo del juicio cuando sea manifiesto el carácter ilícito del tratamiento de esos datos o ellos sean inequívocamente falsos o inexactos.

    ARTÍCULO 83

    Trámite. Admitida la acción, el juez requerirá al responsable del tratamiento la remisión de la información concerniente al accionante y el ofrecimiento de la prueba pertinente. Podrá asimismo solicitar, en caso que corresponda, esa información al encargado del tratamiento o al delegado de protección de datos. También podrá requerir informes sobre el soporte técnico de datos, documentación de base relativa a la recolección y cualquier otro aspecto que resulte conducente a la resolución de la causa que estime procedente.

    El plazo para contestar el informe no podrá ser mayor de CINCO (5) días hábiles, el que podrá ser ampliado prudencialmente por el juez.

    Los responsables o encargados del tratamiento o delegados de protección de datos no podrán alegar la confidencialidad de la información que se les requiere, salvo el caso en que se afecten las fuentes de información periodística.

    Cuando un responsable o encargado del tratamiento o delegado de protección de datos se oponga a la remisión del informe solicitado, con invocación de las excepciones autorizadas por la presente ley o por una ley específica, deberá acreditar los extremos que hacen aplicable la excepción legal. En tales casos, el juez podrá tomar conocimiento personal y directo de la información requerida manteniendo su confidencialidad.

    ARTÍCULO 84

    Contestación del informe. Al contestar el informe, el responsable o encargado del tratamiento o el delegado de protección de datos deberá expresar las razones por las cuales efectuó el tratamiento cuestionado y, en su caso, aquellas razones por las que no evacuó el pedido efectuado por el accionante.

    ARTÍCULO 85

    Ampliación de la demanda. Contestado el informe, el actor podrá, en el término de TRES (3) días, ampliar el objeto de la demanda, ofreciendo en el mismo acto la prueba pertinente. De esta presentación se dará traslado al demandado por igual término para que conteste y ofrezca prueba.

    ARTÍCULO 86

    Sentencia. Vencido el plazo para la contestación del informe o contestado éste, y en el supuesto del artículo 85, luego de contestada la ampliación y en su caso, habiendo sido producida la prueba, el juez dictará sentencia.

    En el caso de estimarse procedente la acción, se especificará si la información debe ser bloqueada, suprimida, rectificada, o actualizada, estableciendo un plazo para su cumplimiento. En ningún caso, la sentencia podrá afectar el derecho a la libertad de expresión e información.

    El rechazo de la acción no constituye presunción respecto de la responsabilidad en que hubiera podido incurrir el demandado.

    En cualquier caso, la sentencia deberá ser comunicada a la autoridad de control.

    Contra la sentencia procede el recurso de apelación.

    Capítulo 10. Disposiciones transitorias

    ARTÍCULO 87

    Estructura organizativa. En el plazo de CIENTO OCHENTA (180) días hábiles posteriores a la asunción de su cargo, el Director Ejecutivo de la ANPDP presentará un proyecto de estructura organizativa y reglamentación interna, para su aprobación por el PODER EJECUTIVO NACIONAL y publicación en el Boletín Oficial.

    Incorpórese a la planta de personal de la ANPDP a quienes, a la fecha de entrada en vigencia de la presente ley, cumplan funciones en la DIRECCIÓN NACIONAL DE PROTECCIÓN DE DATOS PERSONALES y hayan sido contratados en el marco de las Leyes nros. 23.283 y 25.164. A dicho personal se le respetarán los beneficios y condiciones laborales actuales. El personal contratado en el marco de la Ley nº 23.283, que a la fecha de entrada en vigencia de la presente ley, se encuentre cumpliendo funciones en la DIRECCIÓN NACIONAL DE PROTECCIÓN DE DATOS PERSONALES y no acepte ser incorporado a la planta de la ANPDP, tendrá derecho a percibir la indemnización correspondiente por cese laboral en los términos de lo previsto por la Ley nº 20.744, la que será solventada por el Fondo de Cooperación Técnica y Financiera previsto en el artículo 8° de la Ley nº 23.283.

    ARTÍCULO 88

    Presupuesto. Instrúyase al Jefe de Gabinete de Ministros para que, en uso de sus facultades, efectúe las reestructuraciones presupuestarias que fueren necesarias a los efectos de asignar los créditos, cargos y cualquier otra adecuación necesaria para el financiamiento de la ANPDP.

    Deberá preverse en el presupuesto correspondiente la incorporación de los recursos necesarios para el correcto cumplimiento de las funciones de la ANPDP.

    Transfiérase la totalidad de los bienes, presupuesto vigente, activos, patrimonio y personal de la actual DIRECCIÓN NACIONAL DE PROTECCIÓN DE DATOS PERSONALES.

    Una vez canceladas las deudas que en la actualidad mantenga el ente cooperador que hubieran sido autorizadas conforme la normativa vigente, los saldos resultantes del fondo de cooperación técnica y financiera serán ingresados a la cuenta de Rentas Generales del Tesoro de la Nación, la cual generará las correspondientes partidas presupuestarias con afectación específica a la ANPDP.

    ARTÍCULO 89

    Reglamentación. El PODER EJECUTIVO NACIONAL reglamentará la presente ley dentro de los CIENTO OCHENTA (180) días desde su promulgación.

    ARTÍCULO 90

    Vigencia. Las disposiciones de la presente ley entrarán en vigencia a los DOS (2) años de su publicación en el Boletín Oficial.

    Los responsables y encargados del tratamiento contarán con el plazo máximo de DOS (2) años desde la publicación de la presente ley en el Boletín Oficial, para adaptarse a las obligaciones contenidas en ella. En dicho plazo, conservarán plena vigencia las Leyes nros. 25.326, 26.343 y 26.951, sus normas reglamentarias y las demás disposiciones de la DIRECCIÓN NACIONAL DE PROTECCIÓN DE DATOS PERSONALES.

    El Registro Nacional “No Llame”, creado por la Ley nº 26.951, será transferido al nuevo registro creado por el artículo 46 de la presente ley de acuerdo a lo que prevea su reglamentación.

    Capítulo 11. Disposiciones finales

    ARTÍCULO 91

    Orden público y jurisdicción federal. Las normas de la presente ley contenidas en los Capítulos 1, 2, 3, 4, y 6 son de orden público y de aplicación en lo pertinente en todo el territorio nacional.

    Se invita a las provincias a adherir a las normas de esta ley que fueren de aplicación exclusiva en jurisdicción nacional.

    La competencia federal regirá respecto de:

    a) los tratamientos de datos efectuados por las autoridades u organismos públicos pertenecientes a la Administración Pública Nacional;

    b) los tratamientos de datos efectuados por el sector privado, cuando los datos se encuentren accesibles en redes interjurisdiccionales, nacionales o internacionales.

    ARTÍCULO 92

    Referencias. Las referencias de aquellas normas que hagan mención a la DIRECCIÓN NACIONAL DE PROTECCIÓN DE DATOS PERSONALES, su competencia o sus autoridades, se considerarán hechas a la ANPDP, su competencia o sus autoridades, respectivamente.

    ARTÍCULO 93

    Derogación. Deróganse las Leyes nros 25.326, 26.343 y 26.951.

    ARTÍCULO 94

    Comuníquese al PODER EJECUTIVO NACIONAL.

    07May/21

    Resolución del Parlamento Europeo, de 25 de octubre de 2018

    Resolución del Parlamento Europeo, de 25 de octubre de 2018, sobre la utilización de los datos de los usuarios de Facebook por parte de Cambridge Analytica y el impacto en la protección de los datos. 

    El Parlamento Europeo,

    –  Vistos el Tratado de la Unión Europea (TUE), el Tratado de Funcionamiento de la Unión Europea (TFUE), la Carta de los Derechos Fundamentales de la Unión Europea, en particular sus artículos 7, 8, 11, 12, 39, 40, 47 y 52, el Convenio Europeo para la Protección de los Derechos Humanos y de las Libertades Fundamentales, en particular sus artículos 8, 9, 10, 11, 13, 16, 17, y el protocolo adicional al Convenio para la Protección de los Derechos Humanos y de las Libertades Fundamentales, en particular su artículo 3,

    –  Visto el Pacto Internacional de Derechos Civiles y Políticos y, en particular, sus artículos 2, 17, 19, 20 y 25,

    –  Vistos el Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos y por el que se deroga la Directiva 95/46/CE (Reglamento general de protección de datos) (1), y la Directiva (UE) 2016/680 del Parlamento Europeo y del Consejo, de 27 de abril de 2016, relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales por parte de las autoridades competentes para fines de prevención, investigación, detección o enjuiciamiento de infracciones penales o de ejecución de sanciones penales, y a la libre circulación de dichos datos y por la que se deroga la Decisión Marco 2008/977/JAI del Consejo (2),

    –  Vistos el Convenio del Consejo de Europa para la protección de las personas con respecto al tratamiento automatizado de datos de carácter personal y su Protocolo adicional,

    –  Vistos la investigación de la Cámara de los Comunes sobre las noticias falsas y el 5.º Informe provisional de su Comisión de Asuntos Digitales, Cultura, Medios de Comunicación y Deporte sobre desinformación y «noticias falsas»,

    –  Vistas las audiencias celebradas en la Comisión de Energía y Comercio de la Cámara de Representantes de los Estados Unidos,

    –  Vista la Decisión de Ejecución (UE) 2016/1250 de la Comisión, de 12 de julio de 2016, con arreglo a la Directiva 95/46/CE del Parlamento Europeo y del Consejo, sobre la adecuación de la protección conferida por el Escudo de la privacidad UE-EE.UU. (3),

    –  Vista la Resolución del Parlamento Europeo, de 5 de julio de 2018, sobre la adecuación de la protección conferida por el Escudo de la privacidad UE-EE. UU. (4),

    –  Vista la sentencia del Tribunal de Justicia de la Unión Europea, de 6 de octubre de 2015, en el asunto C-362/14 Maximilian Schrems / Data Protection Commissioner (5),

    –  Vista la sentencia del Tribunal de Justicia de la Unión Europea, de 25 de enero de 2018, en el asunto C-498/16 Maximilian Schrems v. Facebook Ireland Limited (6),

    –  Vista la sentencia del Tribunal de Justicia de la Unión Europea, de 5 de junio de 2018, en el asunto C-210/16 Unabhängiges Landeszentrum für Datenschutz Schleswig-Holstein v Wirtschaftsakademie Schleswig-Holstein GmbH (7),

    –  Vista la solicitud formal de David Caroll en la que solicita a Cambridge Analytica que recupere su información personal y que revele su fuente,

    –  Visto el Dictamen 3/2018 del Supervisor Europeo de Protección de Datos (SEPD), de19 de marzo de 2018 sobre la manipulación en línea y los datos personales (8),

    –  Vistas las Directrices del Grupo de Trabajo del artículo 29 de 3 de octubre de 2017 sobre decisiones individuales automatizadas y elaboración de perfiles a los efectos del Reglamento (UE) 2016/679 (9),

    –  Vistas las dos series de respuestas escritas a preguntas que se dejaron sin responder en la reunión entre los líderes de los grupos políticos del Parlamento Europeo y el director ejecutivo de Facebook, Mark Zuckerberg, publicadas por Facebook el 23 de mayo de 2018( 10) y el 4 de junio de 2018 respectivamente (11),

    –  Vistas la Recomendación (UE) 2018/234 de la Comisión, de 14 de febrero de 2018, con vistas a reforzar el carácter europeo y el desarrollo eficiente de las elecciones de 2019 al Parlamento Europeo (12), la Recomendación de la Comisión, de 12 de septiembre de 2018, relativa a las redes de cooperación electoral, la transparencia en línea, la protección contra los incidentes de ciberseguridad y la lucha contra las campañas de desinformación en el contexto de las elecciones al Parlamento Europeo (C(2018)5949), y la Comunicación de la Comisión, de 12 de septiembre de 2018, titulada «Garantizar unas elecciones europeas libres y justas» (COM(2018)0637),

    –  Vista la propuesta de la Comisión, de 12 de septiembre de 2018, de Reglamento del Parlamento Europeo y del Consejo por el que se modifica el Reglamento (UE, Euratom) n.º 1141/2014 sobre un procedimiento de verificación relativo a las infracciones a las normas relativas a la protección de los datos personales en el contexto de las elecciones al Parlamento Europeo (COM(2018)0636),

    –  Visto el Documento de orientación de la Comisión, de 12 de septiembre de 2018, relativo a la aplicación de la legislación sobre protección de datos de la Unión en el contexto electoral (COM(2018)0638),

    –  Vistas las audiencias exhaustivas realizadas por la Comisión de Libertades Civiles, Justicia y Asuntos de Interior encomendadas por el Parlamento Europeo sobre la utilización de los datos de usuarios de Facebook por parte de Cambridge Analytica y su impacto en la protección de datos,

    –  Vistos los informes de la Oficina del Comisionado de Información del Reino Unido sobre la investigación del uso de análisis de datos en campañas políticas, y el informe titulado «Democracy Disrupted?» (¿Funciona aún la democracia?) (13),

    –  Vistas las declaraciones de la Oficina Europea de las Uniones de Consumidores (BEUC), de 25 de junio de 2018 (14),

    –  Vista la declaración de la Comisión, de 23 de octubre de 2018,

    –  Vista la propuesta de Resolución de la Comisión de Libertades Civiles, Justicia y Asuntos de Interior,

    –  Visto el artículo 123, apartado 2, de su Reglamento interno,

    A.  Considerando que el periodismo de investigación puso al descubierto e hizo públicas importantes fugas de datos de usuarios de Facebook en relación con el acceso concedido por Facebook a aplicaciones de terceros, y el subsiguiente uso indebido de estos datos para campañas electorales, así como otras violaciones de datos personales en poder y recogidos por las principales empresas de redes sociales descubiertas posteriormente;

    B.  Considerando que esas violaciones de datos personales afectaron a ciudadanos del todo el mundo, incluidos los ciudadanos europeos y no europeos residentes en el territorio de la Unión Europea; que varios Parlamentos nacionales han realizado audiencias e investigaciones sobre el asunto y han publicado sus conclusiones;

    C.  Considerando que estos casos de violación de datos personales se produjeron durante un período prolongado; que, sin embargo, las empresas afectadas incumplían la legislación de la UE sobre protección de datos aplicable en ese momento, en particular la Directiva 95/46/CE y la Directiva 2002/58/CE;

    D.  Considerando que el uso indebido de datos que se reveló en el contexto del escándalo de Cambridge Analytica ocurrió antes de la aplicación del Reglamento general de protección de datos;

    E.  Considerando que Facebook ha afirmado que no se ha compartido con Cambridge Analytica información alguna sobre cuentas bancarias, tarjetas de crédito o datos nacionales de identidad;

    F.  Considerando que Cambridge Analytica afirmó haber realizado el tratamiento de los datos oficialmente con fines de investigación, pero que posteriormente transfirió los datos recopilados para fines políticos y comerciales;

    G.  Considerando que la reacción inicial de las empresas afectadas no se ajustó a lo que cabía esperar y no permitió una investigación y un control completos e independientes por parte de las autoridades correspondientes ni a escala nacional ni europea;

    H.  Considerando que el Parlamento Europeo celebró un primer intercambio de puntos de vista a puerta cerrada con el director ejecutivo y fundador de Facebook, Mark Zuckerberg, el 22 de mayo de 2018, y que esta reunión dio lugar a la solicitud de la Conferencia de Presidentes de la Comisión de Libertades Civiles, Justicia y Asuntos de Interior, junto con las Comisiones de Asuntos Constitucionales, Asuntos Jurídicos e Industria, Investigación y Energía, de celebrar exhaustivas audiencias de seguimiento;

    I.  Considerando que, el 4 y el 25 de junio y el 2 de julio de 2018, se celebraron tres audiencias sobre el impacto del caso Facebook / Cambridge Analytica en las cuestiones relacionadas con la protección de datos, los procesos electorales, noticias falsas y la posición de las redes sociales en el mercado, con la participación de los correspondientes comisarios europeos, el director ejecutivo de la Agencia de Seguridad de las Redes de la Información de la Unión Europea (ENISA), el Supervisor Europeo de Protección de Datos (SEPD), el presidente del Comité Europeo de Protección de Datos (CEPD), la Oficina del Comisionado de Información del Reino Unido, el director ejecutivo de la Comisión Electoral del Reino Unido, ciudadanos afectados y Facebook;

    J.  Considerando que Facebook se negó a delegar a miembros del personal con el nivel técnico y de responsabilidad adecuado y que disponen de los conocimientos técnicos requeridos por los presidentes de las comisiones en cuestión y, en su lugar, envió a las tres audiencias a miembros del equipo responsable de la política pública; que la información facilitada por los representantes de Facebook durante las audiencias carecía de precisión por lo que respecta a las medidas concretas y específicas adoptadas para garantizar el pleno cumplimiento de la legislación de la UE en materia de protección de datos y tuvo un carácter más general;

    K.  Considerando que, en su dictamen 3/2018, el SEPD indica que existen varios motivos de preocupación por cuestiones relativas a la manipulación en línea de datos personales, si bien afirma también que la legislación en materia de competencia desempeña un papel fundamental a la hora de garantizar la rendición de cuentas de los actores dominantes en el mercado y de proteger la democracia contra un excesivo poder de mercado; que conviene reflejar mejor los intereses de las personas a la hora de evaluar el posible abuso de posición dominante o las fusiones de las empresas, que pueden haber acumulado un importante poder de información:

    L.  Considerando que, en su dictamen de 3 de octubre de 2017, el Grupo de Trabajo del artículo 29 declaraba que la elaboración de perfiles y la toma de decisiones automatizada pueden plantear riesgos significativos para los derechos y las libertades de las personas que requieren salvaguardias adecuadas;

    M.  Considerando que el presidente del CEPD destacó que el caso Facebook / Cambridge Analytica ocurrió antes de la entrada en vigor del Reglamento general de protección de datos, por lo que no se aplica el sistema de la autoridad de control principal en virtud del Reglamento general de protección de datos; que las investigaciones fueron dirigidas por la Oficina del Comisionado de Información del Reino Unido;

    N.  Considerando que Facebook ha admitido que celebró un contrato con un desarrollador de aplicaciones sin haber llevado a cabo una verificación previa de sus términos y condiciones, que estipulaban el derecho de este último a revelar datos personales a terceros; que esta negligencia tuvo graves consecuencias y que esta práctica ya era ilegal con arreglo a la legislación en materia de protección de datos aplicable en aquel momento;

    O.  Considerando que están en curso las negociaciones sobre el Reglamento relativo a la privacidad electrónica;

    P.  Considerando que el CEPD indicó que alrededor de 100 casos transfronterizos ya están siendo tratados con el mecanismo de coherencia del Reglamento general de protección de datos; que este mecanismo coordina las acciones de las autoridades nacionales de protección de datos con el fin de garantizar un enfoque común en la aplicación de la legislación de la UE en materia de protección de datos;

    Q.  Considerando que Facebook, uno de los firmantes del Escudo de la privacidad, ha confirmado que, entre los datos personales utilizados de forma irregular por la consultoría política Cambridge Analytica, se encontraban los datos de 2,7 millones de ciudadanos de la Unión;

    R.  Considerando que el 28 de septiembre de 2018, Facebook hizo público que un agente externo había atacado sus sistemas y se había aprovechado de una vulnerabilidad que permitía acceder a los códigos de seguridad de Facebook de 50 millones de cuentas, y que la Comisión de Protección de Datos irlandesa y otras autoridades de protección de datos han iniciado investigaciones de estos hechos a fin de comprobar el cumplimiento de la legislación de la Unión en materia de protección de datos;

    S.  Considerando que la Comisión Federal de Comercio de los Estados Unidos está investigando si Facebook ha incumplido sus promesas de privacidad, incluido el cumplimiento del Escudo de la privacidad, o si ejerce actividades desleales que hayan causado un grave perjuicio a los consumidores, infringiendo la Ley de la Comisión Federal de Comercio y la solución anterior alcanzada en 2011 entre la Comisión Federal de Comercio y Facebook;

    T.  Considerando que cuatro organizaciones de consumidores de Bélgica, Italia, España y Portugal han presentado una demanda colectiva contra Facebook, solicitando una compensación para los usuarios de Facebook afectados en sus respectivos países;

    U.  Considerando que la Oficina Europea de Uniones de Consumidores (BEUC) señaló, en su testimonio presentado el 25 de junio de 2018, la necesidad de garantizar la rendición de cuentas de las plataformas para el acceso de terceros a los datos personales; que, en el mismo testimonio, la BEUC sostiene igualmente que las empresas deberían hacer más para garantizar unas sólidas estructuras de rendición de cuentas para el acceso de los socios a los datos personales y la ulterior explotación de los mismos;

    V.  Considerando que la investigación llevada a cabo por la Oficina del Comisionado de Información del Reino Unido cubría también el vínculo entre Cambridge Analytica, su sociedad matriz SCL Elections Limited y Aggregate IQ e incluye presunciones de que los datos personales, obtenidos de Facebook, pueden haber sido objeto de un uso indebido por ambas partes en el referéndum del Reino Unido sobre la pertenencia a la UE y utilizado para orientar a los electores durante el proceso electoral presidencial de 2016; que la investigación de la Oficina del Comisionado de Información del Reino Unido se llevó a cabo principalmente con arreglo a la Ley de Protección de Datos de 1998 y a los Reglamentos sobre la privacidad y las comunicaciones electrónicas de 2003, teniendo también en cuenta, en su caso, el Reglamento general de protección de datos;

    W.  Considerando que la Comisión Especial de Cultura, Medios de Comunicación y Deporte de la Cámara de los Comunes ha oído testimonios relativos a presuntas injerencias rusas en los procesos electorales en la UE y ha instado a las autoridades nacionales competentes a que investiguen esas denuncias; que, en mayo de 2017, se nombró en los Estados Unidos a un abogado especial para investigar las injerencias rusas en las elecciones presidenciales de 2016 y asuntos relacionados y que esta investigación sigue en curso;

    X.  Considerando que la Oficina del Comisionado de Información del Reino Unido transmitió a Facebook una notificación de su intención de imponerle una sanción pecuniaria de 500 000 libras esterlinas por falta de transparencia y por cuestiones de seguridad relacionadas con la recogida de datos que constituyen violación de los principios primero y séptimo de la Ley de Protección de Datos de 1998;

    Y.  Considerando que la Oficina del Comisionado de Información del Reino Unido ya emitió 23 comunicaciones de información destinadas a 17 diferentes organizaciones y particulares, incluido Facebook el 23 de febrero de 2018, solicitándoles información de manera estructurada; que, el 18 de mayo de 2018, Facebook confirmó que Aggregate IQ había creado y, en algunos casos, insertado mensajes publicitarios de la campaña del Partido Democrático Unionista (DUP) a favor de la retirada, y de Vote Leave, BeLeave y Veterans for Britain;

    Z.  Considerando que la Oficina del Comisionado de Información del Reino Unido ha expresado su preocupación por lo que respecta a las condiciones en las que se ha facilitado la información de que disponen los usuarios sobre las fuentes de los datos, y a la disponibilidad y transparencia de los controles ofrecidos a los usuarios; que la Oficina del Comisionado de Información del Reino Unido ha declarado igualmente que la información general sobre la privacidad y los controles puestos a disposición en Facebook no informaba realmente a los usuarios de los posibles usos de su información personal; que la Oficina del Comisionado de Información del Reino Unido manifiesta su preocupación por el hecho de que se haya accedido a los datos a través de la plataforma de Facebook y que estos se hayan utilizado para fines distintos a los previstos o para fines que los interesados no podían haber previsto razonablemente;

    AA.  Considerando que las cifras de la Comisión Electoral del Reino Unido revelan que los partidos políticos del Reino Unido gastaron 3,2 millones de libras esterlinas en publicidad directa en Facebook durante las elecciones generales de 2017;

    AB.  Considerando que las redes sociales constituyen una plataforma importante para los partidos políticos y las instituciones públicas, al permitirles conectar con los ciudadanos;

    AC.  Considerando que las plataformas en línea a nivel mundial se enfrentan a dificultades para hacer frente a las noticias falsas de manera eficaz, debido a las diferentes amenazas y panoramas mediáticos en los diferentes países y regiones;

    AD.  Considerando que el análisis de datos y los algoritmos tienen un impacto cada vez mayor en la información que se facilita a los ciudadanos; que dichas técnicas, en caso de utilizarse indebidamente, podrían poner en peligro los derechos fundamentales a la información, así como la libertad de los medios de comunicación y el pluralismo;

    AE.  Considerando que la responsabilidad y la transparencia algorítmica son esenciales para garantizar una información adecuada y una clara comprensión por parte de los ciudadanos del tratamiento de sus datos personales; que esto debe implicar la aplicación de medidas técnicas y operativas que garanticen la transparencia y el carácter no discriminatorio de la toma de decisiones automatizada y la prohibición del cálculo de probabilidades del comportamiento individual; que la transparencia debe facilitar a las personas información fiable sobre la lógica aplicada, el significado y las consecuencias previstas; y que debe incluir información sobre los datos utilizados para la formación en materia de análisis de macrodatos y permitir a las personas comprender y controlar las decisiones que los afectan;

    AF.  Considerando que, en la reunión con los comisarios europeos del 2 de julio de 2018, Facebook prometió cooperar y permitir el acceso de académicos independientes a los datos sobre la presunta manipulación de votos;

    1.  Espera que todas las plataformas en línea garanticen el pleno cumplimiento de la legislación de la Unión en materia de protección de datos, concretamente el Reglamento general de protección de datos y la Directiva 2002/58/CE (privacidad electrónica), y que estas ayuden a los usuarios a comprender cómo se tratan sus datos personales en la publicidad dirigida a grupos específicos de usuarios, y que se disponga de controles eficaces, lo cual incluye la garantía de que se utilizan consensos diferentes para diferentes finalidades de tratamiento y que existe una mayor transparencia en relación con los parámetros de privacidad, el diseño y la visibilidad de las declaraciones de confidencialidad;

    2.  Subraya que en ningún caso se podrá recurrir al argumento de la excepción con fines de investigación previsto en la legislación de la Unión en materia de protección de datos como coladero para un uso indebido de los datos;

    3.  Toma nota de la declaración de Facebook, según la cual, utiliza los datos de usuarios ajenos a Facebook exclusivamente para crear conjuntos de datos agregados de los que extrae conclusiones sobre la manera en que se utiliza el servicio;

    4.  Hace hincapié en la necesidad de un grado de transparencia y de una responsabilidad algorítmica mucho mayor por lo que respecta al tratamiento y la analítica de datos por los sectores público y privado y cualquier otro agente que utilice la analítica de datos como herramienta de base para garantizar que los ciudadanos estén informados adecuadamente sobre el tratamiento de sus datos personales;

    5.  Opina que la era digital exige que se adapten las leyes electorales a esta nueva realidad digital y sugiere que las salvaguardias electorales convencionales («fuera de línea»), tales como unas normas aplicables a las comunicaciones políticas durante los períodos electorales, la transparencia y los límites de los gastos electorales, el respeto de los períodos de reflexión electoral y la igualdad de trato de los candidatos también deben aplicarse en línea; considera que los Estados miembros deben introducir un sistema obligatorio de impresiones digitales para la campaña y la publicidad electrónicas y aplicar la Recomendación de la Comisión destinada a aumentar la transparencia de la publicidad y las comunicaciones políticas pagadas en línea; considera que cualquier tipo de publicidad política debe incluir información fácilmente accesible y comprensible sobre la organización que la pública y que esta deberá ser jurídicamente responsable del gasto, de modo que esté claro quién patrocina las campañas, de manera similar a los requisitos actualmente vigentes en diversos Estados miembros relativos al material impreso utilizado en las campañas; insiste en que los ciudadanos de la Unión deben poder reconocer fácilmente la publicidad y las comunicaciones políticas pagadas en línea, así como el partido, la fundación o la organización que las promueva; insiste, igualmente, en que la transparencia debe incluir también información completa sobre los criterios de selección del grupo destinatario de la publicidad política específica y el tamaño previsto del grupo destinatario;

    6.  Toma nota de que Facebook ha actualizado su configuración de privacidad para permitir a los usuarios acogerse a la exclusión voluntaria de la publicidad específica, incluidos la presentación de anuncios basados en la información obtenida de terceros y el uso de su información personal recogida por Facebook para mostrar anuncios en otros sitios web o plataformas;

    7.  Recomienda que todas las plataformas en línea establezcan una distinción entre el uso político de sus productos publicitarios en línea y su uso para fines comerciales; recuerda que el tratamiento de datos personales para la publicidad política requiere una base jurídica distinta a la de la publicidad comercial;

    8.  Considera que el requisito de verificar la identidad, la ubicación y el patrocinador de la publicidad política recientemente introducida por Facebook en los Estados Unidos es una buena iniciativa que aumentará la transparencia y contribuirá a la lucha contra la intromisión electoral por parte de agentes extranjeros; insta a Facebook a que introduzca los mismos requisitos para la publicidad política en Europa; pide a los Estados miembros que ajusten sus leyes electorales a tal efecto;

    9.  Considera que debe prohibirse la elaboración de perfiles para fines políticos y electorales, y la elaboración de perfiles sobre la base de comportamientos en línea que puedan revelar preferencias políticas, como la interacción con contenidos políticos, en la medida en que, con arreglo a la legislación de la Unión en materia de protección de datos, se hace referencia a opiniones políticas o filosóficas, y opina que las plataformas de redes sociales deben supervisar e informar activamente a las autoridades si se produce tal comportamiento; considera que, igualmente, debe prohibirse la elaboración de perfiles sobre la base de otros datos, como factores socioeconómicos o demográficos, para fines políticos o electorales; pide a los partidos políticos y a otros actores que participen en las elecciones que se abstengan de utilizar perfiles para fines políticos y electorales; pide a los partidos políticos que sean transparentes en lo que respecta a su utilización de las plataformas y los datos en línea;

    10.  Recuerda las medidas propuestas por la Comisión para garantizar unas elecciones europeas libres y justas, en particular la enmienda legislativa destinada a endurecer las normas sobre la financiación de los partidos políticos europeos, que establece la posibilidad de imponer sanciones financieras por infringir las normas de protección de datos con el fin de influir deliberadamente en los resultados de las elecciones europeas; recuerda que el tratamiento de datos personales por parte de partidos políticos en la UE está sujeto al Reglamento general de protección de datos, y que la violación de los principios, los derechos y las obligaciones previstos en él daría lugar a multas y sanciones adicionales;

    11.  Considera que la injerencia en las elecciones constituye un importante reto para la democracia, y para combatirla se requiere el esfuerzo conjunto de los proveedores de servicios, los reguladores y los agentes y partidos políticos;

    12.  Celebra el paquete presentado por la Comisión el 12 de septiembre de 2018 relativo a los preparativos para las elecciones europeas;

    13.  Recuerda la promesa hecha por Facebook sobre la concesión de acceso a los datos sobre la supuesta manipulación de votos a académicos independientes y espera que se le informe antes de finales de 2018 de las principales conclusiones y de las soluciones propuestas;

    14.  Toma nota de las acciones emprendidas por Facebook para luchar contra el uso indebido de datos, incluidas la desactivación o la prohibición de aplicaciones sospechosas de utilizar indebidamente los datos de los usuarios; espera que Facebook actúe con rapidez en cuanto a los informes relativos a solicitudes sospechosas o abusivas y que impida la presencia de dichas solicitudes en la plataforma;

    15.  Hace hincapié en que las plataformas de redes sociales no son solo plataformas pasivas que agrupan exclusivamente contenidos generados por los usuarios, subraya que, por el contrario, la evolución tecnológica ha ampliado el alcance y el papel de estas empresas mediante la introducción de publicidad basada en algoritmos y la publicación de contenidos; concluye que esta nueva función debe reflejarse en el ámbito normativo;

    16.  Observa con pesar que Facebook no ha querido enviar a las audiencias a agentes con las cualificaciones técnicas y el nivel de responsabilidad empresarial adecuados, y señala que este enfoque es perjudicial para la confianza de los ciudadanos europeos en las plataformas sociales; lamenta que Mark Zuckerberg no deseara participar en una audiencia pública con los diputados;

    17.  Considera que Facebook no solo ha defraudado la confianza de los ciudadanos europeos, sino que también ha violado el Derecho de la UE, y recuerda que, durante las audiencias, un representante de Facebook confirmó que Facebook era consciente de que los términos y las condiciones de la aplicación «This is Your Digital Life» (Esta es tu vida digital) preveían que los datos recogidos por la aplicación pudieran enviarse a terceros; concluye que Facebook firmó un contrato con un desarrollador de aplicaciones sabiendo que este había anunciado abiertamente que se reservaba el derecho a revelar datos personales a terceros; concluye, además, que Facebook es el responsable del tratamiento de datos personales y que, por consiguiente, es jurídicamente responsable cuando celebra un contrato con un procesador que viola la legislación de la UE en materia de protección de datos;

    18.  Toma nota de las mejoras en materia de privacidad introducidas por Facebook después del escándalo Facebook / Cambridge Analytica, pero recuerda que Facebook prometió realizar una auditoría interna completa de la que el Parlamento Europeo todavía no ha sido informado, y recomienda a Facebook que introduzca modificaciones sustanciales en su plataforma para asegurar su conformidad con la legislación de la Unión en materia de protección de datos;

    19.  Insta a Facebook a que permita y posibilite a ENISA y al CEPD, dentro de los límites de sus respectivos mandatos, llevar a cabo una auditoría completa e independiente de su plataforma y presentar los resultados de dicha auditoría a la Comisión Europea, al Parlamento Europeo y a los parlamentos nacionales; opina que este ejercicio debe llevarse a cabo también en otras plataformas importantes;

    20.  Destaca la urgencia de contrarrestar cualquier intento de manipular las elecciones de la UE y de reforzar las normas aplicables a las plataformas en línea con respecto a la interrupción de los ingresos publicitarios de las cuentas y sitios web que difunden información falsa; acoge con satisfacción los planes de trabajo individuales que establecen acciones concretas para luchar contra la desinformación en todos los Estados miembros de la UE que las plataformas en línea y la industria de la publicidad presentaron a la Comisión el 16 de octubre de 2018; insta a las plataformas en línea a que etiqueten los contenidos compartidos por bots mediante la aplicación de normas de transparencia para acelerar la eliminación de cuentas falsas para cumplir las órdenes judiciales de proporcionar información sobre las personas que crean contenido ilegal y a trabajar con verificadores independientes de hechos y con el mundo académico para informar a los usuarios sobre información falsa con alcance significativo y para ofrecer correcciones cuando sea posible.

    21.  Pide a todas las plataformas en línea que presten servicios publicitarios a partidos políticos y a campañas electorales que incluyan en el equipo de ventas a personal experto que pueda prestar a los partidos políticos y las campañas un asesoramiento específico sobre transparencia y responsabilidad en relación con la manera de evitar que se utilicen los datos para los usuarios destinatarios; pide a todas las plataformas en línea que permitan a los compradores de publicidad realizar determinadas selecciones para proporcionar asesoramiento jurídico sobre las responsabilidades de dichos compradores en calidad de corresponsables de los datos, a raíz de una sentencia del TJUE en el asunto C-210/16;

    22.  Pide a todas las plataformas en línea que desplieguen con carácter de urgencia las medidas de transparencia previstas en relación con la publicidad política, que deberán incluir la consulta y la evaluación de estas herramientas por parte de las autoridades nacionales encargadas de la observación y el control electorales; insiste en que dicha publicidad política y electoral no debe realizarse sobre la base de perfiles de usuarios individuales;

    23.  Pide a los Estados miembros que adapten las normas electorales a las campañas en línea, incluidas las relativas a la transparencia sobre la financiación, los periodos de reflexión electoral y el papel de los medios de comunicación y de la desinformación;

    24.  Recomienda que se exija la realización de auditorías por terceros una vez concluidas las campañas de referéndum con el fin de garantizar la eliminación de los datos personales recogidos en el marco de la campaña o, en caso de haberse compartido, que estos se han obtenido con el correspondiente consentimiento;

    25.  Pide a Facebook que mejore la transparencia con el fin de permitir a los usuarios comprender el modo y el motivo por el que un partido político o una campaña pueden dirigirse a ellos;

    26.  Opina que debe dotarse a las autoridades de protección de datos de financiación adecuada para desarrollar unos conocimientos técnicos equivalentes a los que poseen las organizaciones sujetas al control; pide a los Estados miembros que garanticen que las autoridades responsables de la protección de datos dispongan de los recursos humanos, técnicos y financieros necesarios para el desempeño eficaz de sus tareas y el ejercicio de sus competencias, de conformidad con el artículo 52 del Reglamento general de protección de datos; insta a la Comisión a que controle estrechamente a los Estados miembros por lo que respecta a su obligación de poner estos recursos a disposición y, en caso necesario, a que inicie procedimientos de infracción;

    27.  Recuerda que Facebook es una organización autocertificada en el marco del Escudo de la privacidad UE-Estados Unidos y, como tal, se ha beneficiado de la decisión de adecuación como fundamento jurídico para la transferencia y posterior tratamiento de datos personales de la Unión Europea a los Estados Unidos;

    28.  Recuerda su Resolución, de 5 de julio de 2018, sobre la adecuación de la protección conferida por el Escudo de la privacidad UE-EE.UU. y, a la luz de la confirmación por parte de Facebook de que se han producido graves violaciones de la privacidad, pide a las autoridades de los Estados Unidos responsables de la aplicación del Escudo de la privacidad que reaccionen a tales revelaciones sin demora en pleno cumplimiento de las garantías y los compromisos hechos para mantener el actual acuerdo del Escudo de la privacidad y, en caso necesario, para retirar a dichas empresas de la lista del Escudo de la privacidad; celebra, en este contexto, la supresión de Cambridge Analytica del escudo de la privacidad en junio de 2018; pide también a las autoridades de la Unión competentes para la protección de datos que investiguen esas revelaciones y, si fuera necesario, suspendan y prohíban la transferencia de datos en el marco del Escudo de la privacidad; espera que la Comisión Federal de Comercio, como autoridad estadounidense responsable, facilite a la Comisión un resumen detallado de sus conclusiones una vez concluida su investigación sobre la violación de datos en la que están involucrados Facebook y Cambridge Analytica y que adopte las medidas coercitivas oportunas contra las empresas implicadas que tengan un efecto disuasorio eficaz;

    29.  Lamenta que no se haya respetado el plazo del 1 de septiembre de 2018 para que los Estados Unidos cumplan plenamente lo dispuesto en el Escudo de la privacidad; considera, por consiguiente, que la Comisión no ha actuado de conformidad con el artículo 45, apartado 5, del Reglamento general de protección de datos; insta, por lo tanto, a la Comisión a que, de acuerdo con la Resolución del Parlamento, de 5 de julio de 2018, sobre la adecuación de la protección conferida por el Escudo de la privacidad UE-EE.UU., suspenda el Escudo de privacidad hasta que las autoridades de los Estados Unidos cumplan las condiciones de este acuerdo;

    30.  Señala que el uso indebido de datos personales afecta a los derechos fundamentales de miles de millones de personas en todo el mundo; considera que el Reglamento general de protección de datos y la Directiva sobre la privacidad electrónica prevén las normas de protección más estrictas; lamenta que Facebook decidiera excluir a 1 500 millones de usuarios no pertenecientes a la UE del ámbito de protección del Reglamento general de protección de datos y de la Directiva sobre la privacidad electrónica; pone en tela de juicio la legalidad de esta medida; insta a todas las plataformas en línea a que apliquen las normas del Reglamento general de protección de datos (y la privacidad electrónica) a todos sus servicios, independientemente del lugar en el que se ofrezcan, ya que un elevado nivel de protección de los datos personales se considera cada vez más una ventaja competitiva importante;

    31.  Pide a la Comisión que mejore las normas de competencia para reflejar la realidad digital y que examine el modelo empresarial de las plataformas de redes sociales y su posible situación de monopolio, teniendo debidamente en cuenta el hecho de que tal monopolio puede estar presente debido al carácter específico de la marca y a la cantidad de datos personales de que dispone más que a una situación de monopolio tradicional, y que adopte las medidas necesarias para remediar esta situación; pide a la Comisión que proponga modificaciones del Código Europeo de las Comunicaciones Electrónicas con el fin de exigir igualmente a los proveedores de comunicaciones de transmisión libre que se interconecten entre ellos, con el fin de evitar el efecto de bloqueo para sus usuarios;

    32.  Solicita que el Parlamento Europeo, la Comisión, el Consejo y todas las demás instituciones, agencias y organismos de la Unión Europea verifiquen que las páginas de redes sociales y los instrumentos analíticos y de comercialización en sus respectivos sitios web no ponen en modo alguno en riesgo los datos personales de los ciudadanos; sugiere que evalúen sus actuales políticas de comunicación desde esta perspectiva, lo que podría implicar la posibilidad de cerrar sus cuentas de Facebook como condición necesaria para proteger los datos personales de todas las personas que se pongan en contacto con ellos; encarga a su propio servicio de comunicaciones que se adhiera estrictamente a las directrices del SEPD relativas a la protección de datos personales a través de servicios web prestados por las instituciones de la UE (15);

    33.  Considera que la próxima Comisión Europea debe asignar específicamente a uno de sus miembros la cartera de protección de datos y protección de la privacidad, con vistas a comprometer proactivamente a socios, dentro y fuera de la Unión, a velar por que todas las propuestas legislativas cumplan plenamente el acervo jurídico de la Unión en materia de protección de datos y protección de la privacidad;

    34.  Insta al Consejo a que ponga fin al bloqueo con respecto al Reglamento sobre la privacidad electrónica y a que alcance por fin un acuerdo con el Parlamento sin rebajar el nivel de protección actual con el fin de garantizar la protección que ofrece en la actualidad la Directiva relativa a la privacidad electrónica, de modo que se garanticen los derechos de los ciudadanos, en particular los relativos a la protección de los usuarios contra el «targeting» (clasificación del público objetivo);

    35.  Solicita que la Comisión lleve a cabo una auditoría de las actividades del sector publicitario en los medios sociales y que presente propuestas legislativas en el caso de que el sector y las partes interesadas no puedan llegar a un acuerdo sobre códigos de conducta voluntarios con medidas disuasorias;

    36.  Pide a las autoridades responsables de la protección de datos a escala nacional y europea que lleven a cabo una investigación a fondo de Facebook y sus actuales prácticas de modo que el nuevo mecanismo de coherencia del Reglamento general de protección de datos sirva para garantizar una respuesta adecuada y eficaz a escala de la Unión;

    37.  Pide a los Estados miembros que adopten medidas para hacer frente a los riesgos para la seguridad de las redes y los sistemas de información utilizados para la organización de elecciones;

    38.  Opina que los Estados miembros deben colaborar con terceras partes, incluidos los medios de comunicación, plataformas en línea y proveedores de tecnología de la información, en actividades de sensibilización destinadas a aumentar la transparencia de las elecciones y crear la confianza en el proceso electoral;

    39.  Considera que los Estados miembros deben iniciar urgentemente, con el apoyo de Eurojust, si fuera necesario, una investigación sobre el supuesto uso indebido del espacio político en línea por las potencias extranjeras;

    40.  Encarga a su presidente que transmita la presente Resolución al Consejo, a la Comisión, a los Gobiernos y los Parlamentos de los Estados miembros y de los Estados Unidos de América, al Consejo de Europa y al director ejecutivo de Facebook.

    —————————————————————————–

    (1) DO L 119 de 4.5.2016, p. 1.

    (2) DO L 119 de 4.5.2016, p. 89.

    (3) DO L 207 de 1.8.2016, p. 1.

    (4) Textos Aprobados, P8_TA(2018)0315.

    (5) ECLI:EU:C:2015:650.

    (6) ECLI:EU:C:2018:37.

    (7) ECLI:EU:C:2018:388.

    (8) https://edps.europa.eu/sites/edp/files/publication/18-03-19_online_manipulation_en.pdf

    (9) http://ec.europa.eu/newsroom/article29/item-detail.cfm?item_id=612053

    (10) http://www.europarl.europa.eu/the-president/en/newsroom/answers-from-facebook-to-questions-asked-during-mark-zuckerberg-meeting

    (11)http://www.europarl.europa.eu/resources/library/media/20180604RES04911/20180604RES04911.pdf

    (12) DO L 45 de 17.2.2018, p. 40.

    (13) https://ico.org.uk/media/action-weve-taken/2259369/democracy-disrupted-110718.pdf https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2018/07/findings-recommendations-and-actions-from-ico-investigation-into-data-analytics-in-political-campaigns/

    (14) https://www.beuc.eu/publications/beuc-x-2018-067_ep_hearing_facebook-cambridge_analytica.pdfhttp

    (15) https://edps.europa.eu/sites/edp/files/publication/16-11-07_guidelines_web_services_en.pdf

    07May/21

    Ley nº 6534/20 de 27 de octubre de 2020

    Ley nº 6534/20 de 27 de octubre de 2020. Ley de Protección de Datos Personales Crediticios. (Deroga la ley 1682/01,de 28 de diciembre de 2000).

    LEY N° 6534 DE PROTECCIÓN DE DATOS PERSONALES CREDITICIOS

    EL CONGRESO DE LA NACIÓN PARAGUAYA SANCIONA CON FUERZA DE LEY:

    CAPÍTULO I. DISPOSICIONES GENERALES.

    Artículo 1°.- OBJETO.

    La presente Ley tiene por objeto garantizar la protección de datos crediticios de toda persona, cualquiera sea su nacionalidad, residencia o domicilio.

    También se busca regular la actividad de recolección y el acceso a datos de información crediticia, así como la constitución, organización, funcionamiento, derechos, obligaciones y extinción de las personas jurídicas que se dediquen a la obtención y provisión de información crediticia, con el fin de preservar los derechos fundamentales, la intimidad, la autodeterminación informativa, la libertad, la seguridad y el trato justo de las personas, de conformidad con lo establecido en la Constitución Nacional, la presente Ley y los Tratados suscritos y ratificados por la República del Paraguay.

    Artículo 2°.- ÁMBITO DE APLICACIÓN.

    Esta Ley es de aplicación obligatoria al tratamiento de datos personales en registros públicos o privados recopilados o almacenados en el territorio nacional en sistemas de información, archivos, registros o bases de datos físicos, electrónicos o digitales a través de mecanismos manuales, automatizados o parcialmente automatizados de recolección de datos.

    Artículo 3°.- DEFINICIONES.

    A los efectos de la presente Ley, se entiende por:

    Datos Personales: Información de cualquier tipo, referida a personas jurídicas o personas físicas determinadas o determinables. Se entenderá por determinable la persona que pueda ser identificada mediante algún identificador o por uno o varios elementos característicos de la identidad física, fisiológica, genética, psíquica, económica, cultural o social de dicha persona. Los derechos y garantías de protección de datos personales serán extendidos a personas jurídicas en cuanto le sean aplicables.

    Datos personales sensibles: Aquellos que se refieran a la esfera íntima de su titular, o cuya utilización indebida puedan dar origen a discriminación o conlleve un riesgo grave para éste. Se consideran sensibles los datos personales que puedan revelar aspectos como origen racial o étnico; creencias o convicciones religiosas, filosóficas y morales; afiliación sindical; opiniones políticas; datos relativos a la salud, a la vida, preferencia u orientación sexual, datos genéticos o datos biométricos dirigidos a identificar de manera unívoca a una persona física.

    Titular de Datos: Persona física o jurídica, cuyos datos son objeto de tratamiento.

    Base de datos: Cualquier plataforma, archivo, registro o banco de información que contenga de manera manual o electrónica, o de cualquier otra índole que pudiera surgir, información referida a las personas.

    Tratamiento: Cualquier operación o conjunto de operaciones efectuadas mediante procedimientos manuales o automatizados realizadas sobre datos personales, relacionadas de manera enunciativa más no limitativa, con la obtención, acceso, registro, organización, estructuración, adaptación, indexación, modificación, extracción, consulta, almacenamiento, conservación, elaboración, transferencia, cesión, difusión, posesión, aprovechamiento y en general cualquier uso o disposición de datos personales.

    Responsable del Tratamiento: La persona física o jurídica, autoridad pública u otro organismo que, solo o junto con otros, determine los fines y medios del tratamiento de los datos.

    Encargado del Tratamiento: La persona física o jurídica, autoridad pública, u otro organismo que trate datos personales por cuenta del responsable del tratamiento.

    Información crediticia: Es aquella información, positiva y negativa, relacionada con el historial crediticio de personas físicas y jurídicas, acerca de actividades crediticias, comerciales y otras de naturaleza análoga, que sirva para identificar correcta e inequívocamente a la persona, su domicilio, actividad comercial, determinar su nivel de endeudamiento, de cumplimiento de sus obligaciones y, en general, de riesgos crediticios en un determinado momento.

    Fuentes de información: Cualquier persona o entidad pública o privada que en el ejercicio de sus funciones o actividades, gestionen una base de datos personales o crediticios.

    Fuentes de información crediticia: Son las personas públicas y privadas que, debido a sus actividades, poseen información crediticia. A los efectos de esta Ley, serán consideradas fuentes de información los Organismos y Entidades del Estado, y Entidades Administradoras de Fondos Previsionales que, por su naturaleza y funciones, posean información relevante para el análisis del riesgo crediticio.

    Sociedad de información crediticia: Conocida también como Buró de Información Crediticia. Es la sociedad cuyo objeto social es la prestación de servicios de referencias crediticias sobre el titular de la información crediticia, que se adecuen a los requisitos establecidos en esta Ley.

    Usuario de información crediticia: Toda persona, física o jurídica, con interés legítimo que contrata la prestación de servicios de referencias crediticias. El interés legítimo está configurado por el empleo del crédito bajo sus diversas modalidades o la intermediación para el perfeccionamiento de este tipo de operaciones, como herramienta habitual de gestión en la actividad económica desarrollada, incluidos los contratos con prestaciones diferidas que impliquen pagos periódicos de sumas de dinero por plazos determinados, así como relaciones comerciales que pudieran existir entre los usuarios y titular del derecho.

    Consentimiento: Toda manifestación de voluntad libre, específica, informada e inequívoca por la que el titular de datos acepta, ya sea mediante una declaración o una clara acción afirmativa, el tratamiento de sus datos personales.

    Artículo 4°.- PROHIBICIÓN.

    Se prohíbe dar a publicidad o difundir datos sensibles de personas que sean explícitamente individualizadas o individualizables.

    Artículo 5°.- DERECHO A LA AUTODETERMINACIÓN INFORMATIVA.

    Se garantiza a toda persona el acceso a la información y a los datos sobre sí misma, sobre quienes se hallen bajo su patria potestad y sobre personas que acredite se hallen bajo su tutela o curatela, así como sobre sus bienes, que obren en registros oficiales o privados de carácter público o en entidades que suministren información sobre solvencia económica y situación patrimonial, así como conocer el uso que se haga de los mismos o su finalidad y a requerir su acceso, rectificación, cancelación y oposición.

    Artículo 6°.- DEL CONSENTIMIENTO INFORMADO.

    Toda persona tiene derecho a ser informada en forma expresa y clara sobre la finalidad que se dará a los datos personales requeridos sobre ella, a fin de manifestar expresamente su consentimiento para la obtención y utilización de sus datos personales, el cual deberá ser expreso e inequívoco, en condiciones que no admitan dudas de su otorgamiento y deberá constar de manera escrita, electrónica, digital u otro mecanismo fehaciente. El consentimiento podrá ser revocado de forma expresa en las mismas condiciones y a título gratuito. Este acto no generará efecto retroactivo.

    El tratamiento y la cesión de datos personales son ilícitos cuando el titular de los datos no hubiere prestado su consentimiento libre, expreso y consciente.

    En todos los casos, el responsable del tratamiento tiene la carga de demostrar que el titular de los datos consintió el uso de sus datos personales.

    Artículo 7°.- CALIDAD DE LA INFORMACIÓN.

    Los datos personales recolectados o almacenados deberán ser lícitos, exactos, completos, veraces y actualizados para el fin específico para los que fueron recolectados.

    Artículo 8°.- EJERCICIOS DE LOS DERECHO DEL TITULAR DE DATOS.

    El titular de datos o su representante tiene derecho a acceder a los datos personales que de ella consten en registros mantenidos por personas físicas o jurídicas, públicas o privadas, así como a conocer cualquier información relacionada con las condiciones generales y específicas de su tratamiento.

    Éste podrá solicitar, en cualquier momento al responsable, el acceso, actualización, rectificación, la supresión, oposición y portabilidad de los datos personales que le conciernen.

    El responsable deberá establecer medios y procedimientos sencillos, expeditos, accesibles y gratuitos que permitan al titular de datos ejercer sus derechos.

    En caso de personas fallecidas, el ejercicio de los derechos establecidos en la presente Ley corresponderá a sus herederos o legatarios.

    Artículo 9°.- DERECHO AL OLVIDO DE DATOS CREDITICIOS.

    La conservación de los datos personales, que puedan afectar a su titular, no deberá exceder el plazo de 5 (cinco) años, desde la fecha de ocurrencia de los hechos registrados, salvo disposición normativa especial que establezca otro plazo o porque el acuerdo de las partes haya establecido un plazo menor. En caso que sea necesaria su conservación, más allá del plazo estipulado, deberán ser desasociados los datos personales de su titular.

    Artículo 10.- SEGURIDAD DE LOS DATOS.

    El responsable del tratamiento de los datos personales crediticios deberá garantizar la adopción e implementación de medidas técnicas, organizativas y de seguridad necesarias para salvaguardar el acceso y la integridad de los datos personales, a fin de evitar su alteración, pérdida, consulta, comercialización o acceso no autorizado.

    Artículo 11.- DEBER DE SECRETO.

    Las personas responsables, encargadas del tratamiento de datos crediticios y quienes intervengan en cualquier fase de la recolección, procesamiento, almacenamiento, utilización o circulación de datos con fines crediticios están obligados a guardar el secreto respecto de los mismos, salvo que requiera ser revelado por autoridad competente mediando orden judicial.

    El deber de secreto se mantiene aun cuando la persona responsable cese en sus funciones.

    Esta obligación es extensible a las personas debidamente reconocidas como usuarios o suscriptores de una Empresa de Información Crediticia, que tengan acceso, de conformidad con lo establecido en la Ley, al historial de datos de un titular; pues deberán guardar absoluta reserva y cuidado sobre la información obtenida.

    El deber de secreto no regirá cuando la información sea requerida por:

    El Banco Central del Paraguay y sus órganos de supervisión, en ejercicio de sus facultades legales.

    La autoridad judicial competente, en virtud de resolución dictada en juicio en el que el afectado sea parte. En tal caso, deberán adoptarse las medidas pertinentes que garanticen la reserva.

    El Contralor General de la República, en el marco de sus atribuciones, sobre la base de las siguientes condiciones:

     Debe referirse a una persona física o jurídica determinada.

    Debe encontrarse en curso una auditoría o verificación patrimonial con respecto a esa persona.

    La misma deberá ser solicitada formalmente.

    La máxima autoridad de la Subsecretaría de Estado de Tributación y de la Dirección Nacional de Aduanas, en el marco de sus atribuciones, sobre la base de las siguientes condiciones:

    Debe referirse a un responsable o contribuyente determinado.

    La información deberá ser solicitada formalmente.

    Debe encontrarse en curso una verificación con respecto a ese responsable o contribuyente.

    La Fiscalía General del Estado y los agentes fiscales que conforman el Ministerio Público, en el marco de las atribuciones que le son legalmente conferidas por la legislación.

    La Secretaría de Prevención de Lavado de Dinero o Bienes, en el marco de las atribuciones que le son legalmente conferidas por la legislación.

    CAPÍTULO II. DE LOS SERVICIOS DE INFORMACIÓN CREDITICIA.

    Artículo 12.- PRESTACIÓN DE SERVICIOS DE INFORMACIÓN CREDITICIA.

    Las personas jurídicas que presten servicios de información crediticia tanto del sector financiero como del no financiero, podrán tratar datos personales de carácter patrimonial relativos a la solvencia económica y al crédito, obtenidos de fuentes públicas o que procedan de informaciones facilitadas por el titular de los datos o con su consentimiento, que permitan conocer el cumplimiento de sus obligaciones y todo aquel que contribuya al análisis de su perfil crediticio y determinar su capacidad de pago.

    Igualmente se incluirán las morosidades de prestación alimenticia, desde el momento de la iniciación de la demanda.

    Artículo 13.- BURÓS DE INFORMACIÓN CREDITICIA.

    Los servicios de referencias crediticias sólo podrán ser prestados por las sociedades de información crediticia, las que serán conocidas como Burós de Información Crediticia y autorizadas para operar como tales por el Banco Central del Paraguay.

    La supervisión estará a cargo del Banco Central del Paraguay, de acuerdo a la reglamentación que éste determine por resolución de carácter general. Los requisitos que deberán contener las solicitudes de apertura de sociedades de información crediticia, las inhabilidades, incompatibilidades de sus directores o gerentes, así como los requisitos que deben reunir estas sociedades y sus accionistas, serán reglamentados por el Directorio del Banco Central del Paraguay.

    El capital social mínimo requerido para la constitución de las sociedades de información crediticia será determinado por el Banco Central del Paraguay y deberá estar íntegramente suscripto e integrado al momento de su constitución.

    Artículo 14.- DE LOS USUARIOS.

    Las sociedades de información crediticia sólo podrán prestar servicios de referencias crediticias a usuarios de información crediticia debidamente identificados.

    Sólo podrán ser usuarios de información crediticia:

    a) Las entidades de intermediación financiera y de crédito, supervisadas por el Banco Central del Paraguay.

    b) Las entidades controladas por el Instituto Nacional de Cooperativismo (INCOOP).

    c) Las personas físicas o jurídicas que en forma empresarial otorguen crédito.

    d) Las mutuales, casas de préstamos y casas de empeño.

    e) Las personas físicas y jurídicas que cuenten con el Registro Único de Contribuyentes y la patente (licencia) comercial actualizados, que se dediquen de manera habitual a la venta a crédito de productos, así como aquellas que presten servicios instrumentados en contratos de ejecución diferida, que impliquen pagos periódicos de sumas de dinero por plazos determinados, o que requieran analizar información crediticia para la toma de decisiones de negocio.

    f) Las personas físicas y jurídicas que cuenten con el Registro Único del Contribuyentes y la patente (licencia) comercial actualizados y que mediante el uso de plataformas tecnológicas, funcionen como un canal o medio para facilitar la intermediación o la conexión de los créditos ofrecidos por los demás usuarios a los titulares de datos, permitiendo que éste pueda acceder a la oferta de crédito que se ajuste a su perfil crediticio de forma eficiente.

    Para el eficaz funcionamiento del sistema de información crediticia, los usuarios de información crediticia estarán obligados a proveer regularmente a las sociedades de información crediticia los datos actualizados de los clientes de su cartera crediticia, en especial la información de cumplimiento de obligaciones crediticias, las que deberán ser notificadas en el plazo máximo de veinticuatro horas de cancelación.

    Artículo 15.- PROHIBICIONES.

    Está expresamente prohibido a los usuarios de Información crediticia utilizar o proveer a terceros datos crediticios para que éstos sean utilizados para la toma de decisiones laborales, acceso al empleo, promoción, traslado o despido de personal.

    Asimismo, queda expresamente prohibido el uso de la información crediticia para negar o restringir el acceso a la medicina prepaga, así como negar o restringir al acceso a la atención médica de urgencia a cualquier persona.

    Artículo 16.- DERECHOS DE LOS TITULARES DE LA INFORMACIÓN CREDITICIA.

    Los titulares de la información tendrán derecho a:

    a) Conocer si en la base de datos de una sociedad de información crediticia existe información sobre sí mismo y, si así fuere, acceder de forma personal a ella sin restricción alguna.

    b) Conocer de manera clara y precisa la condición en que se encuentra su historial crediticio, a través de los reportes emitidos.

    c) Exigir de la fuente de información crediticia, la actualización, rectificación o eliminación de la información ilegal, inexacta, incompleta, que afecte sus derechos constitucionales y comunicarla a la sociedad de información crediticia para que ésta la rectifique.

    La información debe ser suministrada en forma clara, exenta de codificaciones y, en su caso, acompañada de una explicación, en lenguaje accesible. Además de ello, la información debe versar sobre la totalidad del registro perteneciente al titular, aun cuando el requerimiento sólo comprenda un aspecto de los datos personales.

    El acceso, la rectificación, actualización o supresión de datos personales inexactos o incompletos que obren en registros públicos o privados se efectuará sin cargo alguno para el titular del dato o la información.

    Artículo 17.- OBLIGACIONES DE LOS BURÓS DE INFORMACION CREDITICIA.

    Son obligaciones de las sociedades de información crediticia, enunciativa y no limitativamente, las siguientes:

    a) Manejar la información con altos estándares de ética, confidencialidad y seguridad.

    b) Contar con medidas eficientes que impidan que la información crediticia pueda perderse o ser alterada.

    c) Reportar la información crediticia sin alteración o modificación alguna.

    d) Rectificar la información crediticia, a pedido de la fuente o del titular de la información. Las sociedades de información crediticia no pueden rectificar de oficio la información que les ha sido transmitida, salvo que el error pueda ser atribuido a las sociedades de información crediticia.

    e) Canalizar hacia las fuentes de la información, los reclamos de los titulares en relación a información ilegal, inexacta, errónea, cuando la ilegalidad, inexactitud o error no sea atribuible a la sociedad de información crediticia.

    f) Mantener actualizados los datos del registro que gestiona, referidos tanto a información positiva o negativa.

    g) Eliminar la información que hubiese caducado conforme a los términos de la presente Ley.

    h) Informar, a solicitud del titular de los datos, de manera verbal o escrita, sobre el historial completo de datos personales crediticios. La información deberá ser entregada dentro del plazo máximo de veinticuatro horas si no estuviese disponible de manera inmediata.

    i) No tramitarán ni divulgarán:

    Los datos crediticios de deudas vencidas no reclamadas judicialmente que hayan superado 3 (tres) años de inscripción.

    Las deudas canceladas de manera inmediata, una vez recibida la notificación de la fuente de información.

    Sobre juicios de convocatoria de acreedores después de 5 (cinco) años de la resolución judicial que la admita.

    El Banco Central del Paraguay podrá imponer otras obligaciones a través de resoluciones generales.

    Artículo 18.- OBLIGACIONES DE LOS USUARIOS.

    Son obligaciones de los usuarios de los servicios de información crediticia, enunciativa y no limitativamente, las siguientes:

    Entregar a las sociedades de información crediticia la información positiva y negativa de sus propios clientes.

    Utilizar la información crediticia consultada a las sociedades de información crediticia en forma confidencial y destinarla solo a la evaluación de riesgos crediticios.

    Informar sobre la venta o cesión de carteras de crédito a empresas especializadas en la adquisición de deudas o a otros adquirentes o cesionarios a las sociedades de información crediticia, con las cuales tenga celebrado un contrato de prestación de servicios de información crediticia, dentro de los 20 (veinte) días hábiles siguientes a la citada notificación, debiendo mencionar el nombre, domicilio, Registro Único del Contribuyente y cualquier otro dato que permita identificar plenamente al comprador o cesionario, así como la fecha en que se celebró la cesión o venta.

    En caso de denegación al titular de los datos de la celebración de un contrato, solicitud de trabajo, servicio, crédito comercial o financiero, basado en un informe crediticio, el usuario deberá informar tal circunstancia, así como la de proveer el informe accedido, entregando copia de éste.

    Los usuarios de la información de crédito, deberán informar al titular de los datos personales sobre la consulta a realizarse sobre su información crediticia, la empresa que proveerá los datos, el uso que se dará a los datos accedidos, copia del informe accedido en caso de que el titular de los datos lo requiera y los derechos que le asisten.

    El Banco Central del Paraguay podrá imponer otras obligaciones a través de resoluciones de carácter general.

    Artículo 19.- PLAZO DE CONSERVACIÓN DE LA INFORMACIÓN CREDITICIA. La información crediticia podrá publicarse por un tiempo máximo de 5 (cinco) años, a contar desde la última información significativa, o desde el vencimiento del plazo original de la operación de crédito de que se trate, el que fuera mayor.

    Se considera información significativa:

    El momento en que se produce la mora del deudor.

    Las modificaciones en las clasificaciones que otorgan al deudor las entidades crediticias.

    El inicio de la acción judicial de cobro.

    La sentencia judicial que dispone el pago de la deuda.

    La fecha de la apertura del concurso de acreedores o de la declaración de quiebra, en caso de deudas verificadas o en trámite de verificación en los procesos de concursos preventivos y quiebras respectivamente.

    Aquella otra información que defina el órgano de control.

    CAPÍTULO III. DISPOSICIONES ORGÁNICAS.

    ÓRGANOS DE CONTROL.

    Artículo 20.- AUTORIDADES DE APLICACIÓN.

    Serán autoridades de aplicación, en el ámbito de su competencia:

    BANCO CENTRAL DEL PARAGUAY. El Banco Central del Paraguay, a través de la Superintendencia de Bancos; tendrá las siguientes atribuciones y funciones:

    Registrar a las Sociedades de Información Crediticia.

    Reglamentar, interpretar y ejecutar la presente ley, en cuanto atañe a información crediticia, así como aprobar el protocolo de actuación de los Burós de Crédito.

    Supervisar los mecanismos de guarda y utilización de los datos de información crediticia por parte de los Burós de Crédito y entidades reguladas por el Banco Central del Paraguay.

    Sancionar a los Burós de Crédito.

    La Central de Información de la Superintendencia de Bancos del Banco Central del Paraguay es regida por la legislación y su reglamentación específica.

    SECRETARÍA DE DEFENSA DEL CONSUMIDOR Y EL USUARIO. En lo que atañe a la presente Ley:

    Velar por el cumplimiento de las disposiciones de la presente Ley, y demás normas que rijan y tengan relación en materia de protección al consumidor y el usuario.

    Difundir los derechos y deberes como también realizar acciones de información y educación al consumidor.

    Promover la formalización del mercado, evitando la desprotección del titular de los datos.

    Formular, realizar y fomentar programas de educación e información al consumidor, a través de medios masivos de comunicación, y de otros mecanismos disponibles.

    Recibir y dar curso a las inquietudes, reclamos y denuncias de los consumidores, para canalizarlas a través del Banco Central del Paraguay.

    Disponer la realización de inspecciones y pericias vinculadas con la aplicación de esta ley.

    Solicitar informes y opiniones a entidades públicas y privadas con relación a las normas de protección del consumidor y el usuario.

    Mantener un Registro Nacional de Denuncias, Inspecciones y de Infractores, a los efectos estadísticos y para detectar posibles casos de reincidencia por parte de los proveedores, en coordinación con el Banco Central del Paraguay.

    Promover el trabajo conjunto con las Autoridades de Aplicación a nivel local en materia de protección al consumidor.

    Recopilar, elaborar, procesar, divulgar y publicar información para facilitar al consumidor un mejor conocimiento de las características de la comercialización de bienes o servicios que se ofrezcan en el mercado.

    Realizar y promover investigaciones en el área de consumo.

    Solicitar, a través de la justicia, el auxilio de la fuerza pública, la intervención del Ministerio Público o cuantas diligencias fueran necesarias para el cumplimiento de sus funciones.

    Las demás atribuciones que compete a la Secretaría de Defensa del Consumidor y el Usuario (SEDECO) por su ley orgánica y que aplicarían al presente ámbito.

    En cuanto sea pertinente, ambas autoridades deberán coordinar esfuerzos para el cumplimiento de los postulados de la presente Ley.

    CAPÍTULO IV. INFRACCIONES Y SANCIONES.

    Artículo 21.- INFRACCIONES.

    El Banco Central del Paraguay y la Secretaría de Defensa del Consumidor y el Usuario serán competentes, cada uno dentro de su ámbito de competencia, para sancionar las infracciones administrativas a la presente Ley y sus reglamentaciones.

    Serán consideradas infracciones las siguientes:

    El ejercicio de actividades establecidas en la presente Ley, sin la autorización previa del Banco Central del Paraguay.

    El ejercicio de actividades no contenidas en la autorización para operar o en los estatutos sociales.

    Recolectar datos personales para su uso en base de datos sin que se le otorgue suficiente y amplia información a la persona interesada, de conformidad con las especificaciones técnicas establecidas en el reglamento de aplicación de la presente Ley.

    Omitir información obligatoria o suministrar información incompleta o falsa a la Central de Información de la Superintendencia de Bancos del Banco Central del Paraguay.

    Omitir información obligatoria o suministrar información total o parcialmente falsa al Banco Central del Paraguay.

    La excusa, negativa o resistencia a la actuación, y a las instrucciones o requerimientos de obligada observancia de la Superintendencia de Bancos, de los supervisores o inspectores, o la falta de provisión de la documentación solicitada por estos en forma expresa y fehaciente.

    Incumplir las limitaciones o prohibiciones temporales impuestas a la entidad.

    El incumplimiento de las medidas correctivas, obligaciones legales o reglamentarias exigidas por la Superintendencia de Bancos o el Directorio del Banco Central del Paraguay.

    Recolectar, almacenar y transmitir datos personales de terceros por medio de mecanismos inseguros o que de alguna forma no garanticen la seguridad e inalterabilidad de los datos.

    No atender los derechos de acceso, rectificación, supresión, limitación del tratamiento o a la portabilidad de los datos en tratamientos en los que no se requiere la identificación del afectado, cuando éste, para el ejercicio de esos derechos, haya facilitado información adicional que permita su identificación.

    El incumplimiento de la obligación de notificación relativa a la rectificación o supresión de datos personales o la limitación del tratamiento.

    El incumplimiento de la obligación de informar al afectado, cuando así lo haya solicitado, de los destinatarios a los que se hayan comunicado los datos personales rectificados, suprimidos o respecto de los que se ha limitado el tratamiento.

    El incumplimiento de la obligación de suprimir los datos referidos a una persona fallecida cuando ello fuera exigible.

    La falta de formalización por los corresponsables del tratamiento del acuerdo que determine las obligaciones, funciones y responsabilidades respectivas, con respecto al tratamiento de datos personales y sus relaciones con los afectados o la inexactitud en la determinación de las mismas.

    ñ. No poner a disposición de los afectados los aspectos esenciales del acuerdo formalizado entre los corresponsables del tratamiento.

    o. El incumplimiento por el encargado de las estipulaciones impuestas en el contrato o acto jurídico que regula el tratamiento o las instrucciones del responsable del tratamiento, salvo que esté legalmente obligado a ello conforme a la legislación vigente o en los supuestos en que fuese necesario para evitar la infracción de la legislación en materia de protección de datos y se hubiese advertido de ello al responsable o al encargado del tratamiento.

    La notificación incompleta, tardía o defectuosa a la autoridad de protección de datos de la información relacionada con una violación de seguridad de los datos personales.

    Recolectar, almacenar, transmitir o de cualquier otra forma emplear datos personales sin el consentimiento informado y expreso del titular de los datos, con arreglo a las disposiciones de esta Ley. Transferir datos personales a otras personas o empresas en contravención de las reglas establecidas en la presente Ley.

    Recolectar, almacenar, transmitir o de cualquier otro modo emplear datos personales para una finalidad distinta de la autorizada por el titular de la información.

    Negarse injustificadamente a dar acceso a un interesado sobre los datos que consten en archivos y bases de datos, a fin de verificar su calidad, recolección, almacenamiento y uso conforme a esta Ley.

    Negarse injustificadamente a eliminar o rectificar los datos de una persona que así lo haya solicitado por medio claro e inequívoco.

    El tratamiento de datos personales de un menor de edad sin recabar su consentimiento, cuando tenga capacidad para ello, o el del titular de su patria potestad o tutela. No acreditar la realización de esfuerzos razonables para verificar la validez del consentimiento prestado por un menor de edad o por el titular de su patria potestad o tutela sobre el mismo.

    La falta de adopción de aquellas medidas técnicas y organizativas que resulten apropiadas para aplicar de forma efectiva los principios de protección de datos desde el diseño, así como la no integración de las garantías necesarias en el tratamiento.

    La vulneración del deber de confidencialidad establecido en esta Ley.

    La transferencia internacional de datos personales a un destinatario que se encuentre en un tercer país o a una organización internacional, cuando no concurran las garantías, requisitos o excepciones establecidos en esta Ley.

    Artículo 22.-

    Son responsables de las faltas tipificadas en la presente Ley y su reglamentación, tanto la persona física como la persona jurídica que cometió la falta, como todos los miembros de los órganos de administración de la entidad en cuestión y quienes ejerzan o realicen funciones asimilables a dichos cargos, salvo que:

    No hayan tenido conocimiento del hecho u omisión que se les impute, ni directa ni indirectamente; así como que no pudieron llegar a tener indicios o información del acto u omisión que suponga el incumplimiento de normas de obligada observancia; o,

    Que, habiendo tenido conocimiento de la supuesta falta, se hayan opuesto por escrito a la actuación u omisión.

    Artículo 23.- SANCIONES.

    La autoridad de control podrá imponer a los responsables y encargados del tratamiento las siguientes sanciones:

    Apercibimiento.

    Multa de hasta 15.000 (quince mil) Jornales Mínimos vigentes al momento de la imposición de la sanción.

    En caso de reincidencia de una misma infracción, la multa será el doble de la multa inicial aplicada, la que podrá elevarse hasta 50.000 (cincuenta mil) Jornales Mínimos vigentes al momento de la imposición de la sanción para la persona física o jurídica que registre una facturación anual superior a G. 6.000.000.000 (Guaraníes seis mil millones).

    Suspensión de las actividades relacionadas con el tratamiento de datos hasta por un término de 6 (seis) meses; en el acto de suspensión se indicarán las medidas correctivas que deberán adoptarse.

    Inhabilitación para desempeñar un empleo, cargo o comisión dentro del sistema financiero, crediticio y en sociedades de información de datos personales, por un período de 6 (seis) meses hasta 5 (cinco) años.

    Cierre temporal de las operaciones relacionadas con el tratamiento de datos una vez transcurrido el término de suspensión sin que se hubieren adoptado las medidas correctivas ordenadas por la autoridad de control.

    Cierre inmediato y definitivo de la operación que involucre el tratamiento de datos sensibles.

    Las sanciones administrativas son independientes de las medidas correctivas o cautelares que dicten las autoridades de aplicación para salvaguardar el interés público protegido por la presente Ley y la sana gestión de las sociedades dedicadas al manejo de informaciones personales y crediticias.

    Artículo 24.- PRESCRIPCIÓN.

    Las infracciones a la presente Ley prescriben a los 5 (cinco) años de la fecha en que se cometieron. En el caso de consistir la falta en una actividad continuada, la fecha inicial del cómputo del plazo de prescripción será la de la última actuación.

    La prescripción se interrumpe, además de las causas previstas en el Código Civil, por el inicio del sumario administrativo.

    Artículo 25.- GRADACIÓN DE LAS SANCIONES.

    Las sanciones a ser impuestas se determinarán según los siguientes criterios:

    Naturaleza de la falta.

    Gravedad del peligro o perjuicio causado.

    Beneficio o ganancia, obtenidos como consecuencia de la falta.

    El reconocimiento oportuno de los hechos que hayan configurado la falta.

    Subsanación de la falta por iniciativa propia.

    Conducta anterior de la entidad o del infractor, considerando las sanciones que le hubieran sido impuestos durante los últimos 5 (cinco) años. Al efecto, las autoridades competentes establecerán el registro público de sanciones.

    Las autoridades competentes podrán establecer descuentos o reducir las multas en función de parámetros generales que se determinen a través de reglamentos dictados al efecto.

    Artículo 26.- PROCEDIMIENTO SUMARIAL.

    Para todo lo relativo a la investigación, trámite del sumario administrativo, medidas, recursos y atribuciones de las autoridades de aplicación de la presente Ley, en materia de infracciones a las disposiciones previstas en la presente Ley y su reglamentación, serán aplicables las disposiciones legales y reglamentarias que las respectivas instituciones tengan establecidos o dicten al efecto.

    Artículo 27.- RECURSOS CONTRA LAS RESOLUCIONES ADMINISTRATIVAS.

    Contra las resoluciones y sanciones recaídas se podrá interponer la acción contencioso-administrativa.

    La interposición de la acción contencioso-administrativa no tendrá efectos suspensivos, salvo disposición expresa de la autoridad recurrida o del Tribunal competente y bajo caución suficiente de los interesados, o cuando la resolución apelada imponga multas.

    Artículo 28.-

    El titular de los datos personales tiene derecho a un procedimiento administrativo rápido y sencillo en los casos que representen una violación a los derechos garantizados en la presente Ley y la Constitución Nacional, sin perjuicio a los reclamos judiciales específicos que pudieran surgir.

    CAPÍTULO V. DISPOSICIONES TRANSITORIAS Y FINALES.

    Artículo 29.- DISPOSICIONES TRANSITORIAS.

    Todo ente público y privado, responsable o encargado de los servicios de información crediticia y los de información de datos personales creados con anterioridad a la vigencia de la presente Ley, deberán ajustar sus estatutos sociales, su organización y funcionamiento a lo previsto en esta Ley, en el plazo de 24 (veinte y cuatro) meses, contados a partir de su publicación.

    Artículo 30.- DEROGACIONES.

    Queda derogada la Ley n° 1682/2001 “QUE REGLAMENTA LA INFORMACIÓN DE CARÁCTER PRIVADO” y sus respectivas Leyes modificatorias.

    Artículo 31.-

    Comuníquese al Poder Ejecutivo.

    Aprobado el Proyecto de Ley por la Honorable Cámara de Senadores, a los veinticuatro días del mes de octubre del año dos mil diecinueve, quedando sancionado el mismo por la Honorable Cámara de Diputados, a los veintiocho días del mes de abril del año dos mil veinte, de conformidad con lo dispuesto en el Artículo 204 de la Constitución Nacional.

    Objetado Parcialmente por Decreto del Poder Ejecutivo nº 3652, de fecha 1 de junio de 2020.

    Rechazada la Objeción Parcial por la Honorable Cámara de Senadores en fecha 23 de julio de 2020 y por la Honorable Cámara de Diputados en fecha 23 de setiembre de 2020, de conformidad con lo establecido en el Artículo 208 de la Constitución Nacional.

    07May/21

    Decreto 1154 del 20 de agosto de 2020,

    Decreto 1154 del 20 de agosto de 2020, “por el cual se modifica el Capítulo 53 del Título 2 de la Parte 2 del Libro 2 del Decreto 1074 de 2015, Decreto Único Reglamentario del Sector Comercio, Industria y Turismo, referente a la circulación de la factura electrónica de venta como título valor y se dictan otras disposiciones”.

    MINISTERIO DE COMERCIO, INDUSTRIA Y TURISMO

    DECRETO NÚMERO 1154 DE 20 AGO 2020

    Por el cual se modifica el Capítulo 53 del Título 2 de la Parte 2 del Libro 2 del Decreto 1074 de 2015, Decreto Único Reglamentario del Sector Comercio, Industria y Turismo, referente a la circulación de la factura electrónica de venta como título valor y se dictan otras disposiciones”

    EL PRESIDENTE DE LA REPÚBLICA DE COLOMBIA

    En ejercicio de sus facultades constitucionales y legales, en especial las conferidas por el numeral 11 del artículo 189 de la Constitución Política, el parágrafo del artículo 772 del Código de Comercio, modificado por el artículo 1 de la Ley 1231 de 2008, y el parágrafo 5 del artículo 616-1 del Estatuto Tributario, modificado por el artículo 18 de la Ley 2010 de 2019, y

    CONSIDERANDO

    Que el parágrafo del artículo 772 del Código de Comercio, modificado por el artículo 1 de la Ley 1231 de 2008, establece que: “para la puesta en circulación de la factura electrónica como título valor, el Gobierno Nacional se encargará de su reglamentación”,

    Que concordante con lo indicado en el considerando anterior, el inciso tercero del parágrafo 5 del artículo 18 de la Ley 2010 de 2019, que adiciona el artículo 616-1 del Estatuto Tributario, dispuso que el Gobierno nacional reglamentará la circulación de las facturas electrónicas.

    Que adicionalmente, el precitado artículo señala que la plataforma de factura electrónica de la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales ­DIAN incluirá el registro de las facturas electrónicas consideradas como título valor que circulen en el territorio nacional y permitirá su consulta y trazabilidad. De otra parte, indica que las entidades autorizadas para realizar actividades de factoraje tendrán que desarrollar y adaptar sus sistemas tecnológicos a aquellos de la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN.

    Que de acuerdo con lo estipulado en el artículo 1.6.1.4.25 del Decreto 1625 de 2016, Decreto Único Reglamentario en Materia Tributaria, “La Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN, mediante resolución de carácter general, señalará las condiciones, términos, mecanismos técnicos y tecnológicos que garanticen la implementación del registro de la factura electrónica de venta como título valor que circule en territorio nacional y permitirá su consulta y trazabilidad’.

    Que el inciso tercero del artículo 773 del Código de Comercio, modificado por el artículo 86 de la Ley 1676 de 2013, establece que: “la factura se considera irrevocablemente aceptada por el comprador o beneficiario del servicio si no reclamare en contra de su contenido, bien sea mediante devolución de esta y de los documentos de despacho, según el caso, o bien mediante reclamo escrito dirigido al emisor o tenedor del título, dentro de los tres (3) días hábiles siguientes a su recepción”, El parágrafo del citado artículo complementa lo anterior en los siguientes términos: “la factura podrá transferirse después de haber sido aceptada por el comprador o beneficiario del bien o servicio.”

    Que es necesario adoptar medidas que permitan la circulación de la factura electrónica de venta como título valor, garantizando los principios propios de los títulos valores, tales como literalidad, incorporación, legitimación y autonomía, así como la confidencialidad, integridad, disponibilidad y seguridad en la gestión de la información.

    Que el artículo 660 del Código de Comercio dispone que el endoso posterior al vencimiento del título producirá los efectos de una cesión ordinaria.

    Que conforme a lo establecido en la Ley 527 de 1999, y en desarrollo del principio de equivalencia funcional, no se negarán efectos jurídicos a los mensajes de datos siempre y cuando se pueda garantizar la accesibilidad para su posterior consulta.

    Que el entorno informático y las prácticas de procesamiento electrónico de datos de las empresas autorizadas para reportar eventos en el Registro de la factura electrónica de venta considerada título valor, son susceptibles de acciones de fraude, suplantación, extorsión por ciframiento de datos almacenados (ransonware), robo de identidades (phishing) y de otras muchas prácticas perjudiciales en los ambientes informáticos, razón por la cual se hace necesario contar con mecanismos de auto regulación que detecten, prevengan y mitiguen estas prácticas, evitando de esta forma fraudes relacionados con la circulación de la factura electrónica de venta como título valor.

    Que la norma internacional estándar NTC ISO ¡lEC 27001, emitida por la Organización Internacional de Normalización sobre seguridad de la información en los sistemas de gestión, ha normalizado prácticas empresariales y técnicas para el mercado y la sociedad colombiana.

    Que las Superintendencias Financiera, de Economía Solidaria y de Sociedades, de acuerdo con sus competencias, ejercen la supervisión sobre las entidades que presten sus servicios de factoring o compra de cartera al descuento.

    Que la Superintendencia de Industria y Comercio, en el marco de las facultades establecidas en el parágrafo 1 del artículo 7 de la Ley 1231 de 2008, adicionado por el artículo 87 de la Ley 1676 de 2013 y los artículos 44,47,48 Y 50 del Decreto 2153 de 1992, es la encargada de investigar todas aquellas prácticas restrictivas a la libre competencia, acuerdos anticompetitivos, abusos de posición dominante, y está llamada a aplicar las sanciones a que haya lugar. Así mismo, ejerce la vigilancia para garantizar que, en el tratamiento de datos personales, se respeten los principios, derechos, garantías y procedimientos previstos en la Ley 1581 de 2012 y las normas que la modifiquen, adicionen o sustituyan.

    Que el Ministerio de Comercio, Industria y Turismo, dando cumplimiento a lo establecido en el artículo 7 de la Ley 1340 de 2009, reglamentado por el Capítulo 30 del Título 2 de la Parte 2 del Libro 2 del Decreto 1074 de 2015, Decreto Único Reglamentario del Sector Comercio, Industria y Turismo, remitió el proyecto de decreto a la Superintendencia de Industria y Comercio, para efecto de que esta Entidad rindiera el concepto de abogacía de la competencia.

    Que en cumplimiento de lo establecido en numeral 8 del artículo 8 de la Ley 1437 de 2011, en concordancia con el artículo 2.1.2.1.14 del Decreto 1081 de 2015, Decreto Reglamentario Único del Sector Presidencia de la República, el Ministerio de Comercio, Industria y Turismo publicó la iniciativa reglamentaria que por medio del presente Decreto se adopta.

    En mérito de lo expuesto,

    DECRETA

    Artículo 1.

    Modifíquese el Capítulo 53 del Título 2 de la Parte 2 del Libro 2 del Decreto 1074 de 2015, Decreto Único Reglamentario del Sector Comercio, Industria y Turismo, el cual quedará así:

    “CAPíTULO 53. De la circulación de la factura electrónica de venta como título valor

    Artículo 2.2.2.53.1. Objeto. El presente capítulo tiene por objeto reglamentar la circulación electrónica de la factura electrónica de venta como título valor.

    Artículo 2.2.2.53.2. Definiciones. Para efectos de la aplicación del presente capítulo se tendrán en cuenta las siguientes definiciones:

    1. Adquirente/deudor/aceptante: Es la persona, natural o jurídica, en la que confluyen los roles de adquirente, por haber comprado un bien y/o ser beneficiario de un servicio; de deudor, por ser el sujeto obligado al pago; y de aceptante, por obligarse con el contenido del título, mediante aceptación expresa o tácita, en los términos del artículo 773 del Código de Comercio.

    2. Aval: Es la garantía, en todo o en parte, del pago de un título valor, de conformidad con lo establecido en el artículo 633 del Código de Comercio.

    3. Circulación: Es la transferencia de la factura electrónica de venta como título valor aceptada por el adquirente/deudor/aceptante, que se realiza mediante el endoso electrónico del tenedor legítimo.

    4. Emisor o facturador electrónico de la factura electrónica de venta como título valor: Es el vendedor del bien o prestador del servicio que expide la factura electrónica de venta como título valor y demás documentos e instrumentos electrónicos que se deriven de la misma.

    5. Endoso electrónico: Es un mensaje de datos que hace parte integral de la factura electrónica de venta como título valor, mediante el cual el tenedor legítimo o su(s) representante(s) realiza la transferencia electrónica de los derechos contenidos en la misma, al endosatario.

    6. Evento: Es un mensaje de datos que se registra en el Registro de factura electrónica de venta considerada título valor – RADIAN, asociado a una factura electrónica de venta como título valor, que da cuenta ya sea de su aceptación, el derecho incorporado en ella o su circulación.

    7. Factor: Es la persona jurídica que preste los servicios de compra de cartera al descuento, a la cual no le son aplicables las disposiciones vigentes sobre preposición, contenidas en el Código de Comercio.

    8. Expedición de la factura electrónica de venta: En los términos del numeral 5 del artículo 1.6.1.4.1 del Decreto 1625 de 2016, Decreto Único Reglamentario en Materia Tributaria o la norma que lo regule, adicione, modifique, sustituya o derogue, la expedición de la factura electrónica de venta comprende la generación y transmisión por el emisor o facturador, la validación por la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN, Y la entrega al adquirente/deudor/aceptante.

    9. Factura electrónica de venta como título valor: Es un título valor en mensaje de datos, expedido por el emisor o facturador electrónico, que evidencia una transacción de compraventa de un bien o prestación de un servicio, entregada y aceptada, tácita o expresamente, por el adquirente/deudor/aceptante, y que cumple con los requisitos establecidos en el Código de Comercio y en el Estatuto Tributario, y las normas que los reglamenten, modifiquen, adicionen o sustituyan.

    10. Proveedores tecnológicos: Entiendase como Proveedores Tecnológicos aquellos definidos en los términos del numeral 10 del artículo 1.6.1.4.1 del Decreto 1625 de 2016, Decreto Único Reglamentario en Materia Tributaria o la norma que lo regule, adicione, modifique, sustituya o derogue.

    11. Recepción: Es el día, mes y año en el que el adquirente/deudor/aceptante recibe la factura electrónica de venta y, cuando sea del caso, el documento de despacho.

    12. Registro de factura electrónica de venta considerada título valor – RADIAN (en adelante, RADIAN): Es el definido por la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN de conformidad con lo establecido en el parágrafo 5 del artículo 616-1 del Estatuto Tributario.

    13. Sistemas de negociación electrónica: Son las plataformas electrónicas administradas por personas jurídicas que, mediante la provisión de infraestructura, servicios, sistemas, mecanismos y/o procedimientos electrónicos, realizan actividades de intermediación entre los tenedores legítimos y los potenciales compradores de la factura electrónica de venta como título valor.

    14. Tenedor legítimo de la factura electrónica de venta como título valor: Se considera tenedor legítimo al emisor o a quien tenga el derecho sobre la factura electrónica de venta como título valor, conforme a su ley de circulación, siempre que así esté registrado en el RADIAN.

    15. Usuario del RADIAN: Son los sujetos que intervienen, directa o indirectamente, en la circulación de la factura electrónica de venta como título valor y que, de acuerdo con su rol, interactúan con el RADIAN para consultar o registrar eventos relacionados con la trazabilidad de dichas facturas, conforme a las condiciones técnicas establecidas por la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN.

    16. Representante: Es la persona natural o jurídica que, en virtud de un contrato de representación, mandato u otra calidad similar, está autorizada por un usuario del RADIAN para consultar la trazabilidad y registrar eventos relacionados con la circulación de la factura electrónica de venta como título valor, siempre que se acredite dicha situación, conforme a lo dispuesto por el artículo 640 del Código de Comercio. los representantes legales de sociedades y los factores se reputarán autorizados, por el solo hecho de su nombramiento, para suscribir títulos valores a nombre de las entidades que administren, de conformidad con lo dispuesto en el artículo 941 del Código de Comercio.

    Artículo 2.2.2.53.3. Ámbito de aplicación. El presente capítulo le será aplicable a las facturas electrónicas de venta como título valor, que sean registradas en el RADIAN y que tengan vocación de circulación, y a todos los sujetos involucrados o relacionados con la misma.

    Artículo 2.2.2.53.4. Aceptación de la factura electrónica de venta como título valor. Atendiendo a lo indicado en los artículos 772, 773 Y 774 del Código de Comercio, la factura electrónica de venta como título valor, una vez recibida, se entiende irrevocablemente aceptada por el adquirente/deudor/aceptante en los siguientes casos:

    1. Aceptación expresa: Cuando, por medios electrónicos, acepte de manera expresa el contenido de ésta, dentro de los tres (3) días hábiles siguientes al recibo de la mercancía o del servicio.

    2. Aceptación tácita: Cuando no reclamare al emisor en contra de su contenido, dentro de los tres (3) días hábiles siguientes a la fecha de recepción de la mercancía o del servicio. El reclamo se hará por escrito en documento electrónico.

    Parágrafo 1. Se entenderá recibida la mercancía o prestado el servicio con la constancia de recibo electrónica, emitida por el adquirente/deudor/aceptante, que hace parte integral de la factura, indicando el nombre, identificación o la firma de quien recibe, y la fecha de recibo

    Parágrafo 2. El emisor o facturador electrónico deberá dejar constancia electrónica de los hechos que dan lugar a la aceptación tácita del título en el RADIAN, lo que se entenderá hecho bajo la gravedad de juramento,

    Parágrafo 3. Una vez la factura electrónica de venta como título valor sea aceptada, no se podrá efectuar inscripciones de notas débito o notas crédito, asociadas a dicha factura.

    Artículo 2.2.2.53.5. Usuarios autorizados del RADIAN. Además de los sujetos determinados por la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN, serán sujetos autorizados para participar e interactuar con el RADIAN, en el rol de consulta y registro, los proveedores tecnológicos, los sistemas de negociación electrónica y las autoridades administrativas con funciones jurisdiccionales, en los términos y condiciones establecidos en este decreto.

    Artículo 2.2.2.53.6. Circulación de la factura electrónica de venta como título valor. La circulación de la factura electrónica de venta como título valor se hará según la voluntad del emisor o del tenedor legítimo, a través del endoso electrónico, ya sea en propiedad (con responsabilidad o sin responsabilidad), en procuración o en garantía, según corresponda.

    La factura electrónica de venta como título valor sólo podrá circular una vez haya sido aceptada, expresa o tácitamente, por el adquirente/deudor/aceptante.

    Parágrafo 1. Para efectos de la circulación de la factura electrónica de venta como título valor deberá consultarse su estado y trazabilidad en el RADIAN.

    Parágrafo 2. La circulación de la factura electrónica de venta como título valor, cuyo plazo para el pago se encuentre vencido, deberá registrarse en el RADIAN como un endoso con efectos de cesión ordinaria, conforme a lo establecido en el inciso segundo del artículo 660 del Código de Comercio.

    Artículo 2.2.2.53.7. Registro de eventos asociados a la factura electrónica de venta como título valor en el RADIAN. Las facturas electrónicas de venta aceptadas y que tengan vocación de Circulación, deberán ser registradas en el RADIAN por el emisor o facturador electrónico. Así mismo, deberán registrarse todos los eventos asociados con la factura electrónica de venta como título valor.

    Los usuarios del RADIAN podrán registrar eventos directamente, o a través de sus representantes, siempre que se cuente con la infraestructura, servicios, sistemas y/o procedimientos que se ajusten a las condiciones, términos y mecanismos técnicos y tecnológicos señalados por la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN, Y se ofrezcan plenas garantías de seguridad en la gestión de la información.

    En los casos en los que el usuario no cuente con los medios para garantizar lo dispuesto en el inciso anterior, podrá registrar eventos a través de intermediarios, tales como proveedores tecnológicos, sistemas de negociación electrónica o factores, según lo permita la normativa vigente.

    Artículo 2.2.2.53.8. Requisitos comunes a los usuarios que registran eventos en el RADIAN. La Unidad Administrativa Dirección de Impuestos y Aduanas Nacionales ­DIAN, además del rol de consulta, le otorgará el rol de registro a los usuarios que cumplan, como mínimo, los siguientes requisitos:

    1. Desarrollar y adaptar sus sistemas tecnológicos al RADIAN y a aquellos otros sistemas de los que disponga la Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN para el registro de la factura electrónica de venta como título valor, garantizando, en todo caso, la autenticidad, disponibilidad, integridad y trazabilidad de la información.

    2. Estar certificado con la norma técnica de normalización NTC- ISO/lEC 27001, en su última versión vigente, considerando su propósito de proteger la confidencialidad y seguridad en la gestión de la información.

    3. Adoptar procedimientos orientados a consultar, documentar, prevenir y alertar a las autoridades competentes sobre la posible utilización, directa o indirecta, de las operaciones que registren en el RADIAN como instrumento para el ocultamiento, manejo, inversión o aprovechamiento de dinero u otros bienes provenientes de actividades delictivas o destinados a su financiación; o para dar apariencia de legalidad a las actividades delictivas o a las transacciones y fondos vinculados con las mismas; o para el lavado de activos y/o la canalización de recursos hacia la realización de actividades terroristas; o para buscar el ocultamiento de activos provenientes de dichas actividades.

    Parágrafo transitorio. Para efectos del cumplimiento de lo dispuesto en el numeral 2 del presente artículo, los usuarios que soliciten el rol de registro, tendrán plazo hasta el 31 de diciembre de 2021.

    Artículo 2.2.2.53.9. Registro de eventos por parte de proveedores tecnológicos. El administrador del RADIAN le reconocerá el rol de registro de eventos a los proveedores tecnológicos habilitados por la Unidad Administrativa Especial Dirección de Impuestos y Aduanas nacionales – PIAN, siempre que cumplan los requisitos establecidos en el artículo 2.2.2.53.8.

    Artículo 2.2.2.53.10. Reglas particulares de los sistemas de negociación electrónica. Los sistemas de negociación electrónica deberán dar aplicación a las siguientes disposiciones:

    1. Estar constituido como persona jurídica y dar cumplimiento a la ley colombiana.

    2. Establecer políticas y procedimientos adecuados y suficientes para garantizar que los miembros de su junta directiva y sus representantes legales cumplan los deberes de los administradores previstos en la ley y en los estatutos sociales, en particular los establecidos en el artículo 23 de la Ley 222 de 1995, no solo en interés de la sociedad sino teniendo en cuenta los intereses de los asociados y de los usuarios de sus servicios.

    3. Establecer medidas administrativas y de organización efectivas con el propósito de prevenir, administrar y revelar conflictos de intereses.

    4. Disponer de procedimientos administrativos y contables adecuados, mecanismos de control interno y técnicas de administración y control de riesgos.

    5. Establecer los mecanismos de pago por la prestación de sus servicios, los cuales se apoyarán en el sistema financiero.

    6. Expedir un manual de usuario para la operación y un reglamento para el funcionamiento del sistema de negociación electrónica, el cual deberá contener, como mínimo los siguientes, aspectos:

    6.1. Procedimientos internos para la aprobación y modificación del reglamento por parte del administrador del respectivo sistema.

    6.2. Criterios para la vinculación y desvinculación de usuarios.

    6.3. Derechos y obligaciones de los usuarios del sistema de negociación electrónica.

    6.4. Derechos, facultades y obligaciones del administrador del sistema de negociación electrónica.

    6.5. Reglas para el funcionamiento y operación del sistema de negociación electrónica.

    6.6. Reglas que permitan el acceso y la identificación de los usuarios.

    6.7. Mecanismos electrónicos a través de los cuales se solucionarán las controversias o conflictos que se presenten con los usuarios que soliciten el registro de eventos en el RADIAN.

    6.8. Política general en materia de tarifas y expensas a cargo de los usuarios por la utilización de los servicios ofrecidos. Las tarifas y expensas deberán ser publicadas en el sitio web del sistema de negociación electrónica, así como los criterios o circunstancias para su modificación.

    6.9. Las reglas de auditoría a las cuales se someterá el sistema de negociación electrónica.

    7. Cumplir continuamente con las normas referentes a los derechos de hábeas data, estableciendo y haciendo públicas las políticas y mecanismos necesarios para ello.

    8. Asegurarse que la información que se registre en el RADIAN, haciendo uso de su plataforma electrónica, corresponda a la realidad económica del negocio, transferencia, transacciones y/o circulación. Lo anterior incluye la verificación del valor negociado de las facturas electrónicas de venta como título valor, previo a cualquier registro de los endosos electrónicos que se hagan a través de sus sistemas.

    9. Garantizar en todo momento la continuidad y regularidad del servicio, la conservación de la información y la trazabilidad de las actividades de intermediación entre los tenedores legítimos y los potenciales compradores de la factura electrónica de venta como título valor, mediante la adopción de mecanismos eficaces de control y salvaguardia de sus sistemas informáticos y la implementación de planes de contingencia o sistemas de respaldo que mitiguen la ocurrencia de fallas operativas o tecnológicas.

    10. Asegurarse de que permanezca la trazabílidad de las actividades de intermediación entre los tenedores legítimos y los potencia/es compradores de la factura electrónica de venta como título valor, realizadas en su plataforma electrónica y los eventos que se generen con ocasión de ésta.

    11. Incluir reglas de transparencia en las operaciones y garantizar la diseminación de la información respecto de las mismas. Dichos sistemas se deben diseñar para operar de manera organizada, eficiente, segura, transparente y para garantizar un tratamiento equitativo a todos los participantes.

    Parágrafo 1. Dentro de los seis (6) meses siguientes a la entrada en vigor del presente Decreto, deberán contar con una política de tarifas y/o comisiones pública y no discriminatoria.

    Parágrafo 2. Los usuarios de los sistemas de negociación electrónica podrán elegir aquél que les brinde el portafolio de servicios que se ajuste a sus necesidades y podrán cambiarse cuando así lo consideren, sin limitación alguna.

    Artículo 2.2.2.53.11. Limitaciones a la circulación de la factura electrónica de venta como título valor. Serán limitaciones a la circulación de la factura electrónica de venta como título valor las medidas ordenadas por autoridades competentes y que se encuentren registradas en el RADIAN.

    La Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN· establecerá los requisitos técnicos y tecnológicos necesarios para registrar las limitaciones a la circulación de la factura electrónica de venta como título valor.

    Artículo 2.2.2.53.12. Informe para el pago. El tenedor legítimo informará al adquirente/deudor/aceptante, a través del RADIAN, de la tenencia de la factura electrónica de venta como título valor, tres (3) días antes de su vencimiento para el pago.

    A partir de la información anterior, el título valor sólo podrá ser transferido nuevamente previa notificación, en el RADIAN, al adquirente/deudor/aceptante.

    Parágrafo. En todo caso, al vencimiento para el pago, el adquirente/deudor/aceptante pagará la factura electrónica de venta como título valor al tenedor legítimo que se encuentre registrado en el RADIAN.

    Artículo 2.2.2.53.13. Pago de la factura electrónica de venta como título valor. Si la factura es pagada en su integridad el adquirente/deudor/aceptante deberá registrar inmediatamente la ocurrencia de dicho evento en el RADIAN.

    Si el pago es parcial, el tenedor legítimo es quien deberá registrarlo especificando el monto recibido y la factura conservará su eficacia por la parte no pagada.

    Parágrafo. El tenedor legítimo podrá registrar en el RADIAN los pagos totales en los casos en que el adquirente/deudor/aceptante no lo haga. Igual derecho tendrá el adquirente/deudor/aceptante respecto de los pagos parciales.

    Artículo 2.2.2.53.14. Exigibilidad de pago de la factura electrónica de venta como título valor. La Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN establecerá, en el sistema informático electrónico que disponga, los requisitos técnicos y tecnológicos necesarios para obtener en forma electrónica, la factura electrónica de venta como título valor para hacer exigible su pago.

    Parágrafo 1. Las facturas electrónicas de venta como título valor podrán ser consultadas por las autoridades competentes en el RADIAN.

    Parágrafo 2. La Unidad Administrativa Especial Dirección de Impuestos y Aduanas Nacionales – DIAN, en su calidad de administrador del RADIAN certificará a solicitud de las autoridades competentes o de los tenedores legítimos, la existencia de la factura electrónica de venta como título valor y su trazabilidad.

    Artículo 2.2.2.53.15. Garantías. El emisor o facturador electrónico, o el tenedor legítimo de la factura electrónica de venta como título valor, debe registrar en el RADIAN las garantías constituidas sobre el título, proveyendo la información completa del beneficiario del acto y las condiciones de esta.

    Parágrafo. El beneficiario del acto podrá registrar en el RADIAN la garantía constituida sobre el título en los casos en que el tenedor legítimo no lo haya hecho.

    Artículo 2.

    Vigencia y derogatorias. El presente Decreto entrará en vigencia a partir de la fecha de su publicación en el Diario Oficial, sustituye el Capítulo 53 del Título 2 de la Parte 2 del Libro 2 del Decreto 1074 de 2015, Decreto Único Reglamentario del Sector Comercio, Industria y Turismo y deroga el Decreto 1349 de 2016-

    PUBLÍQUESE Y CÚMPLASE

    Dado en Bogotá D.C., a los 20 de Agosto de 2020

    EL MINISTRO DE HACIENDA Y CRÉDITO PÚBLICO, ALBERTO CARRASQUILLA BARRERA

    EL MINISTRO DE COMERCIO, INDUSTRIA Y TURISMO, JOSÉ MANUEL RESTREPO ABONDANO

    04May/21

    Decreto de 8 de Diciembre de 2020

    Decreto de 8 de Diciembre de 2020 (Diario Oficial, Lunes 11 de enero de 2021)

    DECRETO por el que se adiciona una fracción IV al inciso A) y se deroga la fracción IV del inciso B) del artículo 298 de la Ley Federal de Telecomunicaciones y Radiodifusión.

    ANDRÉS MANUEL LÓPEZ OBRADOR, Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, D E C R E T A :

    SE ADICIONA UNA FRACCIÓN IV AL INCISO A) Y SE DEROGA LA FRACCIÓN IV DEL INCISO B) DEL ARTÍCULO 298 DE LA LEY FEDERAL DE TELECOMUNICACIONES Y RADIODIFUSIÓN.

    Artículo Único.

    Se adiciona una fracción IV al inciso A) y se deroga la fracción IV del inciso B) del artículo 298 de la Ley Federal de Telecomunicaciones y Radiodifusión, para quedar como sigue:

    Artículo 298.- …

    A) …

    I. a III. …

    IV. Otras violaciones a esta Ley, a los Reglamentos, a las disposiciones administrativas, planes técnicos fundamentales y demás disposiciones emitidas por el Instituto; así como a las concesiones o autorizaciones que no estén expresamente contempladas en el presente Capítulo.

    B) …

    I. a III. …

    IV. Se deroga.

    C) a E) …

    Transitorio

    Único.

    El presente Decreto entrará en vigor el día siguiente de su publicación en el Diario Oficial de la Federación.

    Ciudad de México, a 8 de diciembre de 2020.

    Sen. Eduardo Ramírez Aguilar, Presidente.- Dip.

    Dulce María Sauri Riancho, Presidenta.

    Sen. Lilia Margarita Valdez Martínez, Secretaria.-

    Dip. Julieta Macías Rábago, Secretaria.-

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia del Poder Ejecutivo Federal, en la Ciudad de México, a 6 de enero de 2021.-

    Andrés Manuel López Obrador.-

    La Secretaria de Gobernación, Dra. Olga María del Carmen Sánchez Cordero Dávila

    04May/21

    Decreto de 11 de diciembre de 2019

    Decreto de 11 de diciembre de 2019 (Diario Oficial, Viernes, 24 de enero de 2020)

     DECRETO por el que se adicionan un artículo 190 Bis a la Ley Federal de Telecomunicaciones y Radiodifusión, y un artículo 168 ter al Código Penal Federal.

    ANDRÉS MANUEL LÓPEZ OBRADOR, Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, DECRETA:

    SE ADICIONAN UN ARTÍCULO 190 BIS A LA LEY FEDERAL DE TELECOMUNICACIONES Y RADIODIFUSIÓN, Y UN ARTÍCULO 168 TER AL CÓDIGO PENAL FEDERAL.

    Artículo Primero.

    Se adiciona un artículo 190 Bis a la Ley Federal de Telecomunicaciones y                   Radiodifusión, para quedar como sigue:

    Artículo 190 Bis. Queda prohibida la fabricación, comercialización, adquisición, así como la instalación, portación, uso y operación de equipos que bloqueen, cancelen o anulen las señales de telefonía celular, de radiocomunicación o de transmisión de datos o imagen.

    Con excepción de lo dispuesto en el párrafo anterior, se podrá instruir la fabricación, comercialización, adquisición, instalación, portación para el uso y operación por parte de las autoridades encargadas de los centros de reinserción social, establecimientos penitenciarios o centro de internamiento para menores, para efectos de lo dispuesto por la fracción VIII del artículo 190 de esta Ley, así como para el uso y operación de los mismos por parte de las instancias de seguridad pública federales y de seguridad nacional en cumplimiento de sus atribuciones.

    Artículo Segundo.

    Se adiciona un artículo 168 ter al Código Penal Federal, para quedar como sigue:

    Artículo 168 ter. Se sancionará con pena de doce a quince años de prisión, a quien fabrique, comercialice, adquiera, instale, porte, use u opere equipos que bloqueen, cancelen o anulen las señales de telefonía celular, de radiocomunicación o de transmisión de datos o imagen con excepción de lo establecido en el segundo párrafo del artículo 190 Bis de la Ley Federal de Telecomunicaciones y Radiodifusión.

    Los equipos a que hace referencia el primer párrafo del artículo 190 Bis de la Ley Federal de Telecomunicaciones y Radiodifusión, serán asegurados en términos de lo que establece el Código Nacional de Procedimientos Penales y posteriormente deberán ser destruidos en su totalidad.

    Si el delito al que se refiere el primer párrafo de este artículo, fuera cometido por servidores públicos, y sin autorización expresa escrita debidamente acreditada por su superior inmediato, se le impondrá la pena de quince a dieciocho años de prisión.

    Transitorios

    Primero.

    El presente Decreto entrará en vigor el día siguiente al de su publicación en el Diario Oficial de la Federación.

    Segundo.

    Los particulares que posean aparatos o equipos que sirvan para bloquear, cancelar o anular las señales de telefonía celular, de radiocomunicación o de transmisión de datos o imagen, deberán de entregar los mismos a la Secretaría de Seguridad y Protección Ciudadana, destruir o en su caso excluir del país, en un plazo de 30 días a partir de la entrada en vigor del presente Decreto.

    Tercero.

    La Secretaría de Seguridad y Protección Ciudadana, coordinará y supervisará la entregarecepción por parte de particulares de todos los aparatos que tengan como finalidad bloquear, cancelar o anular las señales de telefonía celular, de radiocomunicación o de transmisión de datos o imagen y procederá a su inutilización bajo los métodos que considere convenientes.

    Cuarto.

    Las autoridades correspondientes contarán con un término no mayor a 180 días naturales, para realizar las modificaciones a la Norma Oficial Mexicana 220-SCFI-2017, a fin de armonizarla a los contenidos del presente Decreto.

    Quinto.

    La Secretaría de Seguridad y Protección Ciudadana, informará anualmente del cumplimiento de las disposiciones expresas en este Decreto, a las Comisiones de Seguridad Pública del Senado de la República y de la Cámara de Diputados federales.

    Ciudad de México, a 11 de diciembre de 2019.

    Dip. Laura Angélica Rojas Hernández, Presidenta.-

    Sen. Mónica Fernández Balboa, Presidenta.-

    Dip. Lizbeth Mata Lozano, Secretaria.-

    Sen. Primo Dothé Mata, Secretario.-

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados

    Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia

    del Poder Ejecutivo Federal, en la Ciudad de México, a 21 de enero de 2020.- Andrés Manuel López

    Obrador.- Rúbrica.- La Secretaria de Gobernación, Dra. Olga María del Carmen Sánchez Cordero Dávila.-

    Rúbrica.

    04May/21

    Decreto de 26 de abril de 2018

    Decreto de 26 de abril de 2018 (Diario Oficial, Viernes 15 de junio de 2018)

     DECRETO por el que se adiciona un tercer párrafo al Artículo Séptimo Transitorio del “Decreto por el que se expiden la Ley Federal de Telecomunicaciones y Radiodifusión, y la Ley del Sistema Público de Radiodifusión del Estado Mexicano; y se reforman, adicionan y derogan diversas disposiciones en materia de telecomunicaciones y radiodifusión”, publicado en el Diario Oficial de la Federación el 14 de julio de 2014.

    ENRIQUE PEÑA NIETO, Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, D E C R E T A :

    SE ADICIONA UN TERCER PÁRRAFO AL ARTÍCULO SÉPTIMO TRANSITORIO DEL “DECRETO POR EL QUE SE EXPIDEN LA LEY FEDERAL DE TELECOMUNICACIONES Y RADIODIFUSIÓN, Y LA LEY DEL SISTEMA PÚBLICO DE RADIODIFUSIÓN DEL ESTADO MEXICANO; Y SE REFORMAN, ADICIONAN Y DEROGAN DIVERSAS DISPOSICIONES EN MATERIA DE TELECOMUNICACIONES Y RADIODIFUSIÓN”, PUBLICADO EN EL DIARIO OFICIAL DE LA FEDERACIÓN EL 14 DE JULIO DE 2014.

    Artículo Único.-

    Se adiciona un tercer párrafo al Artículo Séptimo Transitorio del “Decreto por el que se expiden la Ley Federal de Telecomunicaciones y Radiodifusión, y la Ley del Sistema Público de Radiodifusión del Estado Mexicano; y se reforman, adicionan y derogan diversas disposiciones en materia de telecomunicaciones y radiodifusión”, publicado en el Diario Oficial de la Federación el 14 de julio de 2014, para quedar como sigue:

    SÉPTIMO. …

    Las solicitudes de prórroga de concesiones de radiodifusión sonora presentadas con anterioridad a la fecha de terminación de la vigencia original establecida en los títulos correspondientes se resolverán en términos de lo dispuesto en el artículo 114 de la Ley Federal de Telecomunicaciones y Radiodifusión, sin que resulte aplicable el plazo previsto para la solicitud de prórroga de que se trate.

    Transitorios

    Primero.

    El presente Decreto entrará en vigor al día siguiente de su publicación en el Diario Oficial de la Federación.

    Segundo.

    Lo dispuesto en el tercer párrafo del Artículo Séptimo Transitorio del “Decreto por el que se expiden la Ley Federal de Telecomunicaciones y Radiodifusión, y la Ley del Sistema Público de Radiodifusión del Estado Mexicano; y se reforman, adicionan y derogan diversas disposiciones en materia de telecomunicaciones y radiodifusión”, publicado en el Diario Oficial de la Federación el 14 de julio de 2014, que se adiciona, será aplicable únicamente a las solicitudes de prórroga presentadas con anterioridad a la entrada en vigor del presente Decreto.

    Ciudad de México, a 26 de abril de 2018.-

    Sen. Ernesto Cordero Arroyo, Presidente.-

    Dip. Edgar Romo García, Presidente.-

    Sen. Juan Gerardo Flores Ramírez,

    Secretario.- Dip. Mariana Arámbula Meléndez, Secretaria

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia del Poder Ejecutivo Federal, en la Ciudad de México, a trece de junio de dos mil dieciocho.-

    Enrique Peña Nieto.

    El Secretario de Gobernación, Dr. Jesús Alfonso Navarrete Prida.-

    04May/21

    Decreto de 15 de diciembre de 2016 (Diario Oficial, Viernes 27 de enero de 2017)

    Decreto de 15 de diciembre de 2016 (Diario Oficial, Viernes 27 de enero de 2017)

    DECRETO por el que se reforman, adicionan y derogan diversas disposiciones de la Ley Federal de Competencia Económica, de la Ley de la Comisión Nacional de los Derechos Humanos, de la Ley Federal de Telecomunicaciones y Radiodifusión, de la Ley del Sistema Nacional de Información Estadística y Geográfica, de la Ley General de Instituciones y Procedimientos Electorales, de la Ley del Instituto Nacional para la Evaluación de la Educación, de la Ley Federal de Transparencia y Acceso a la Información Pública, y de la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    ENRIQUE PEÑA NIETO, Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, DECRETA:

    SE REFORMAN, ADICIONAN Y DEROGAN DIVERSAS DISPOSICIONES DE LA LEY FEDERAL DE COMPETENCIA ECONÓMICA, DE LA LEY DE LA COMISIÓN NACIONAL DE LOS DERECHOS HUMANOS, DE LA LEY FEDERAL DE TELECOMUNICACIONES Y RADIODIFUSIÓN, DE LA LEY DEL SISTEMA NACIONAL DE INFORMACIÓN ESTADÍSTICA Y GEOGRÁFICA, DE LA LEY GENERAL DE INSTITUCIONES Y PROCEDIMIENTOS ELECTORALES, DE LA LEY DEL INSTITUTO NACIONAL PARA LA EVALUACIÓN DE LA EDUCACIÓN, DE LA LEY FEDERAL DE TRANSPARENCIA Y ACCESO A LA INFORMACIÓN PÚBLICA, Y DE LA LEY ORGÁNICA DEL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS.

    Artículo Primero.

    Se reforman los artículos 3, fracción VII; 20, fracciones VII y X; 23, párrafo segundo; 25, párrafo quinto; 34; la denominación del Título IV para quedar como “Del Órgano Interno de Control de la Comisión Federal de Competencia Económica”; 37; 38; 39, primer párrafo, fracciones I, VIII, X, XIV, XVII, XXIV y XXVI; 40; 41, primer párrafo, fracciones I, III, IV, V, VI, VII, VIII y IX; 42; 43; la denominación del Capítulo IV del Título IV “De la Responsabilidad del Titular del Órgano Interno de Control”; 44; 45; 46; 49, fracción IV; y se derogan las fracciones III, XI, XII, XV, XVIII, XIX, XX y XXI del artículo 39 de la Ley Federal de Competencia Económica, para quedar como sigue:

    Artículo 3. …

    I. a VI. …

    VII. Órgano Interno de Control: El Órgano Interno de Control de la Comisión;

    VIII. a XV. …

    Artículo 20. …

    I. a VI. …

    VII. Dar cuenta al Comité de Evaluación previsto en el artículo 28 de la Constitución Política de los Estados Unidos Mexicanos y a la Cámara de Diputados, de las vacantes que se produzcan en el Pleno o en el Órgano Interno de Control, según corresponda, a efectos de su nombramiento;

    VIII. a IX. …

    X. Recibir del titular del Órgano Interno de Control los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes de la Comisión y hacerlos del conocimiento del Pleno;

    XI. a XII. …

    Artículo 23. …

    I. a VIII. …

    El Órgano Interno de Control, cuando tenga conocimiento de los hechos que actualicen alguna de las causas de procedencia de la remoción y considere que existen elementos de prueba, notificará inmediatamente y sin demora a la Cámara de Senadores del Congreso de la Unión.

    Artículo 25. …

    Las entrevistas serán grabadas y almacenadas en medios electrónicos, ópticos o de cualquier otra tecnología, manteniéndose como información reservada, salvo para las otras partes en el procedimiento en forma de juicio, los demás Comisionados, el titular del Órgano Interno de Control y el Senado de la República en caso de que esté sustanciando un procedimiento de remoción de un Comisionado. La grabación de cada entrevista deberá estar a disposición de los demás Comisionados.

    Artículo 34. Cuando las quejas o denuncias se presenten en contra del titular de la Autoridad Investigadora, el Órgano Interno de Control resolverá lo conducente únicamente cuando el trámite de los casos a los que se refieran las denuncias haya finalizado.

    TÍTULO IV. DEL ÓRGANO INTERNO DE CONTROL DE LA COMISIÓN FEDERAL DE COMPETENCIA ECONÓMICA

    Artículo 37. El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos de la Comisión y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción.

    El Órgano Interno de Control, su titular y el personal adscrito al mismo, estarán impedidos de intervenir o interferir en forma alguna en el desempeño de las facultades y ejercicio de atribuciones en materia de libre concurrencia y competencia económica que esta Ley y las demás disposiciones aplicables confieren a los servidores públicos de la Comisión.

    Artículo 38. El Órgano Interno de Control tendrá un titular que lo representará y contará con la estructura orgánica, personal y recursos necesarios para el cumplimiento de su objeto, el que se determinará en el estatuto orgánico de la Comisión.

    Artículo 39. El Órgano Interno de Control tendrá las siguientes atribuciones:

    I. Las que contempla la Ley General de Responsabilidades Administrativas;

    II. …

    III. Se deroga.

    IV. a VII. …

    VIII. Evaluar los informes de avance de la gestión financiera respecto de los programas autorizados y los relativos a procesos concluidos, empleando la metodología que determine el Órgano Interno de Control;

    IX. …

    X. Recibir quejas y denuncias conforme a las leyes aplicables;

    XI. Se deroga

    XII. Se deroga

    XIII. …

    XIV. Recibir, tramitar y resolver las inconformidades, procedimientos y recursos administrativos que se promuevan en materia de adquisiciones, arrendamientos, servicios y obras públicas;

    XV. Se deroga.

    XVI. …

    XVII. Participar, conforme a las disposiciones vigentes, en los comités y subcomités de los que el Órgano Interno de Control forme parte, e intervenir en los actos que se deriven de los mismos;

    XVIII. Se deroga.

    XIX. Se deroga

    XX. Se deroga

    XXI. Se deroga

    XXII. a XXIII. …

    XXIV. Formular el anteproyecto de presupuesto del Órgano Interno de Control;

    XXV. …

    XXVI. Presentar al Pleno de la Comisión los informes respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre la imposición de sanciones en materia de responsabilidades administrativas, y

    XXVII. …

    Artículo 40. El titular del Órgano Interno de Control será designado por la Cámara de Diputados del Congreso de la Unión, con el voto de las dos terceras partes de sus miembros presentes, conforme al procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Artículo 41. El titular del Órgano Interno de Control deberá reunir los siguientes requisitos:

    I. Ser ciudadano mexicano en pleno goce de sus derechos civiles y políticos, y tener treinta y cinco años cumplidos el día de la designación;

    II. …

    III. Contar al momento de su designación con una experiencia de al menos cinco años en el control, manejo o fiscalización de recursos, responsabilidades administrativas, contabilidad gubernamental, auditoría gubernamental, obra pública, adquisiciones, arrendamientos y servicios del sector público;

    IV. Contar al día de su designación, con antigüedad mínima de cinco años, con título profesional relacionado con las actividades a que se refiere la fracción anterior, expedido por autoridad o institución legalmente facultada para ello;

    V. Contar con reconocida solvencia moral;

    VI. No pertenecer o haber pertenecido en los cuatro años anteriores a su designación, a despachos de consultoría o auditoría que hubieren prestado sus servicios a la Comisión, o haber fungido como consultor o auditor externo de la Comisión en lo individual durante ese periodo o haber prestado los servicios referidos a un agente regulado por la legislación correspondiente a la Comisión;

    VII. No haber ocupado ningún cargo directivo o haber representado de cualquier forma los intereses regulados por la legislación correspondiente a la Comisión, durante los cuatro años previos a su nombramiento;

    VIII. No estar inhabilitado para desempeñar un empleo, cargo o comisión en el servicio público, y

    IX. No haber sido Secretario de Estado, Procurador General de la República o de Justicia de alguna de las entidades federativas, Oficial Mayor de un ente público, Senador, Diputado Federal, Gobernador de algún Estado o Jefe de Gobierno de la Ciudad de México, dirigente, miembro de órgano rector, alto ejecutivo o responsable del manejo de los recursos públicos de algún partido político, ni haber sido postulado para cargo de elección popular en los cuatro años anteriores a la propia designación.

    Artículo 42. El titular del Órgano Interno de Control durará en su encargo cuatro años y podrá ser designado por un periodo inmediato posterior al que se haya desempeñado, previa postulación y cumpliendo los requisitos previstos en esta Ley y el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Tendrá un nivel jerárquico igual al de un Director General o su equivalente en la estructura orgánica de la Comisión, y mantendrá la coordinación técnica necesaria con la Entidad de Fiscalización Superior de la Federación a que se refiere el artículo 79 de la Constitución Política de los Estados Unidos Mexicanos.

    Concluido su encargo, por un plazo equivalente a una tercera parte del tiempo en que haya ejercido su función, el titular del Órgano Interno de Control no podrá desempeñarse como consejero, administrador, director, gerente, directivo, ejecutivo, agente, representante o apoderado de un Agente Económico que haya estado sujeto a alguno de los procedimientos sancionatorios previstos en esta Ley en el tiempo en que duró su encargo.

    El titular del Órgano Interno de Control deberá rendir informe semestral y anual de actividades a la Comisión, del cual marcará copia a la Cámara de Diputados.

    Artículo 43. En el desempeño de su cargo, el titular del Órgano Interno de Control se sujetará a los principios previstos en la Ley General de Responsabilidades Administrativas.

    Capítulo IV. De la Responsabilidad del Titular del Órgano Interno de Control

    Artículo 44. El titular del Órgano Interno de Control de la Comisión será sujeto de responsabilidad en términos de la Ley General de Responsabilidades Administrativas y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control de la Comisión, serán sancionados por el titular del Órgano Interno de Control o el servidor público en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    Artículo 45. El titular del Órgano Interno de Control deberá inscribir y mantener actualizada la información correspondiente del Sistema de evolución patrimonial, de declaración de intereses y constancia de presentación de declaración fiscal; de todos los servidores públicos de la Comisión, de conformidad con la Ley General del Sistema Nacional Anticorrupción y la Ley General de Responsabilidades Administrativas.

    Artículo 46. El titular del Órgano Interno de Control se abstendrá de desempeñar cualquier otro empleo, trabajo o comisión públicos o privados, con excepción de los cargos docentes.

    Para efectos de lo anterior, el titular del Órgano Interno de Control estará impedido para conocer de un asunto cuando se actualice alguno de los casos de impedimento previstos en esta Ley para los Comisionados.

    En caso de impedimento del titular del Órgano Interno de Control para conocer de un asunto, dicho titular será suplido por el servidor público con el segundo nivel de mayor jerarquía del Órgano Interno de Control, de conformidad con lo establecido en el estatuto orgánico de la Comisión.

    Artículo 49. …

    I. a III. …

    IV. Reporte del gasto correspondiente al ejercicio inmediato anterior, incluyendo las observaciones relevantes que, en su caso, haya formulado el Órgano Interno de Control, y

    V. …

    Artículo Segundo.

    Se reforma el artículo 72, segundo párrafo, se adicionan un Capítulo VI denominado “Del Órgano Interno de Control” al Título II, que comprende los artículos 24 Bis, 24 Ter, 24 Quáter y 24 Quinquies; 72 Bis; 72 Ter y 72 Quáter a la Ley de la Comisión Nacional de los Derechos Humanos, para quedar como sigue:

    CAPÍTULO VI. DEL ÓRGANO INTERNO DE CONTROL

    Artículo 24 Bis.- El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos de la Comisión Nacional y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción.

    El Órgano Interno de Control tendrá un titular que lo representará y contará con la estructura orgánica, personal y recursos necesarios para el cumplimiento de su objeto.

    En el desempeño de su cargo, el titular del Órgano Interno de Control se sujetará a los principios previstos en la Ley General de Responsabilidades Administrativas.

    Artículo 24 Ter.- El Órgano Interno de Control tendrá las siguientes atribuciones:

    I. Las que contempla la Ley General de Responsabilidades Administrativas;

    II. Verificar que el ejercicio de gasto de la Comisión Nacional se realice conforme a la normatividad aplicable, los programas aprobados y montos autorizados;

    III. Presentar a la Comisión Nacional los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes de la Comisión Nacional;

    IV. Revisar que las operaciones presupuestales que realice la Comisión Nacional, se hagan con apego a las disposiciones legales y administrativas aplicables y, en su caso, determinar las desviaciones de las mismas y las causas que les dieron origen;

    V. Promover ante las instancias correspondientes, las acciones administrativas y legales que se deriven de los resultados de las auditorías;

    VI. Investigar, en el ámbito de su competencia, los actos u omisiones que impliquen alguna irregularidad o conducta ilícita en el ingreso, egreso, manejo, custodia y aplicación de fondos y recursos de la Comisión Nacional;

    VII. Evaluar los informes de avance de la gestión financiera respecto de los programas autorizados y los relativos a procesos concluidos, empleando la metodología que determine el Órgano Interno de Control;

    VIII. Evaluar el cumplimiento de los objetivos y metas fijadas en los programas de naturaleza administrativa contenidos en el presupuesto de egresos de la Comisión Nacional, empleando la metodología que determine;

    IX. Recibir quejas y denuncias conforme a las leyes aplicables;

    X. Solicitar la información y efectuar visitas a las áreas y órganos de la Comisión Nacional para el cumplimento de sus funciones;

    XI. Recibir, tramitar y resolver las inconformidades, procedimientos y recursos administrativos que se promuevan en términos de la Ley de Adquisiciones, Arrendamientos y Servicios del Sector Público y de la Ley de Obras Públicas y Servicios Relacionados con las Mismas, y sus Reglamentos;

    XII. Intervenir en los actos de entrega-recepción de los servidores públicos de la Comisión Nacional de mandos medios y superiores, en los términos de la normativa aplicable;

    XIII. Participar, conforme a las disposiciones vigentes, en los comités y subcomités de los que el Órgano Interno de Control forme parte, e intervenir en los actos que se deriven de los mismos;

    XIV. Atender las solicitudes de los diferentes órganos de la Comisión Nacional en los asuntos de su competencia;

    XV. Proponer los proyectos de modificación o actualización de su estructura orgánica, personal y/o recursos;

    XVI. Formular el anteproyecto de presupuesto del Órgano Interno de Control;

    XVII. Presentar a la Comisión Nacional los informes previo y anual de resultados de su gestión, y comparecer ante el mismo, cuando así lo requiera el Presidente;

    XVIII. Presentar a la Comisión Nacional los informes respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre la imposición de sanciones en materia de  responsabilidades administrativas, y

    XIX. Las demás que le confieran otros ordenamientos.

    Artículo 24 Quáter. El Titular del Órgano Interno de Control será designado por la Cámara de Diputados del Congreso de la Unión, con el voto de las dos terceras partes de sus miembros presentes, conforme al procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Artículo 24 Quinquies. El titular del Órgano Interno de Control deberá reunir los siguientes requisitos:

    I. Ser ciudadano mexicano en pleno goce de sus derechos civiles y políticos, y tener treinta y cinco años cumplidos el día de la designación;

    II. Gozar de buena reputación y no haber sido condenado por delito doloso que amerite pena de prisión por más de un año;

    III. Contar al momento de su designación con una experiencia de al menos cinco años en el control, manejo o fiscalización de recursos, responsabilidades administrativas, contabilidad gubernamental, auditoría gubernamental, obra pública, adquisiciones, arrendamientos y servicios del sector público;

    IV. Contar al día de su designación, con antigüedad mínima de cinco años, con título profesional relacionado con las actividades a que se refiere la fracción anterior, expedido por autoridad o institución legalmente facultada para ello;

    V. Contar con reconocida solvencia moral;

    VI. No pertenecer o haber pertenecido en los cinco años anteriores a su designación, a despachos de consultoría o auditoría que hubieren prestado sus servicios a la Comisión Nacional o haber fungido como consultor o auditor externo de la Comisión Nacional, en lo individual durante ese periodo;

    VII. No estar inhabilitado para desempeñar un empleo, cargo o comisión en el servicio público, y

    VIII. No haber sido Secretario de Estado, Procurador General de la República o de Justicia de alguna de las entidades federativas, Oficial Mayor de un ente público, Senador, Diputado Federal, Gobernador de algún Estado o Jefe de Gobierno de la Ciudad de México, dirigente, miembro de órgano rector, alto ejecutivo o responsable del manejo de los recursos públicos de algún partido político, ni haber sido postulado para cargo de elección popular en los cuatro años anteriores a la propia designación.

    Artículo 72.- …

    La Comisión Nacional solicitará al Órgano Interno de Control correspondiente, en cualquier caso, el inicio del procedimiento de responsabilidades que de conformidad con lo previsto en la Ley General de Responsabilidades Administrativas deba instruirse en contra del servidor público respectivo.

    Artículo 72 Bis.- El titular del Órgano Interno de Control durará en su encargo cuatro años y podrá ser designado por un periodo inmediato posterior al que se haya desempeñado, previa postulación y cumpliendo los requisitos previstos en esta Ley y el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Tendrá un nivel jerárquico igual al de un Director General o su equivalente en la estructura orgánica de la Comisión Nacional, y mantendrá la coordinación técnica necesaria con la Entidad de Fiscalización Superior de la Federación a que se refiere el artículo 79 de la Constitución Política de los Estados Unidos Mexicanos.

    El titular del Órgano Interno de Control deberá rendir informe semestral y anual de actividades a la Comisión Nacional, del cual marcará copia a la Cámara de Diputados.

    Artículo 72 Ter.- El titular del Órgano Interno de Control de la Comisión Nacional será sujeto de responsabilidad en términos de la Ley General de Responsabilidades Administrativas; y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control de la Comisión Nacional serán sancionados por el titular del Órgano Interno de Control, o el servidor público en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    Artículo 72 Quáter.- El Órgano Interno de Control deberá inscribir y mantener actualizada la información correspondiente del Sistema de evolución patrimonial, de declaración de intereses y constancia de presentación de declaración fiscal; de todos los servidores públicos de la Comisión Nacional, de conformidad con la Ley General del Sistema Nacional Anticorrupción y la Ley General de Responsabilidades Administrativas.

    El titular del Órgano Interno de Control se abstendrá de desempeñar cualquier otro empleo, trabajo o comisión públicos o privados, con excepción de los cargos docentes.

    Artículo Tercero. Se reforman los artículos 17, fracción IX; 20, fracciones IX y XII; 29, fracción II y párrafo tercero; 30, párrafo quinto; 31, fracción IX; 32, párrafos primero y tercero; la denominación del Capítulo III “Del Órgano Interno de Control del Instituto“; 35; 36, fracción IV; 37; 38; 39 y 40 de la Ley Federal de Telecomunicaciones y Radiodifusión, para quedar como sigue:

    Artículo 17. …

    I. a VIII. …

    IX. Conocer los informes que deba rendir el titular del Órgano Interno de Control del Instituto;

    X. a XV. …

    Artículo 20. …

    I. a VIII.

    IX. Dar cuenta al Comité de Evaluación previsto en el artículo 28 de la Constitución de las vacantes que se produzcan en el Pleno del Instituto, y a la Cámara de Diputados de la vacante que se produzca respecto del titular del Órgano Interno de Control, a efecto de su nombramiento;

    X. y XI. …

    XII. Recibir del titular del Órgano Interno de Control del Instituto los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto y hacerlos del conocimiento del Pleno;

    XIII. a XV. …

    Artículo 29. …

    I. …

    II. Denunciar, ante el titular del Órgano Interno de Control del Instituto, cualquier acto que pretenda deliberadamente vulnerar su autonomía e imparcialidad;

    III. a V. …

    Los comisionados estarán sujetos al régimen de responsabilidades de los servidores públicos previsto en el Título Cuarto de la Constitución. El Órgano Interno de Control del Instituto será el órgano facultado para conocer de las infracciones administrativas e imponer, en su caso, las sanciones aplicables conforme a lo dispuesto en esta Ley y en la Ley General de Responsabilidades Administrativas.

    Artículo 30. …

    Las entrevistas serán grabadas y almacenadas en medios electrónicos, ópticos o de cualquier otra tecnología, manteniéndose como información reservada, salvo para las otras partes en los procedimientos seguidos en forma de juicio, los demás comisionados, el titular del Órgano Interno de Control y el Senado de la República en caso de que esté sustanciando un procedimiento de remoción de un comisionado. La grabación de cada entrevista deberá estar a disposición de los demás comisionados. Las entrevistas deberán realizarse en las instalaciones del Instituto.

    Artículo 31. …

    I. a VIII. …

    IX. Incurrir en responsabilidad administrativa grave en términos de la Ley General de Responsabilidades Administrativas, o

    X. …

    Artículo 32. En caso de actualizarse alguno de los supuestos señalados en el artículo anterior, el titular del Órgano Interno de Control del Instituto, cuando tenga conocimiento de los hechos que actualicen alguna de las causas de procedencia de la remoción y considere que existen elementos de prueba, notificará inmediatamente al presidente de la Mesa Directiva de la Cámara de Senadores, acompañando el expediente del asunto fundado y motivado, a fin de que dicha Cámara resuelva lo conducente.

    I. a V. …

    La remoción requerirá del voto de las dos terceras partes de los miembros presentes en la sesión.

    Aprobada la remoción, ésta quedará firme y será notificada tanto al infractor como al titular del Órgano Interno de Control del Instituto para su inmediato cumplimiento.

    Capítulo III. Del Órgano Interno de Control del Instituto

    Artículo 35. El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos del Instituto y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción.

    El Órgano Interno de Control del Instituto, su titular y el personal adscrito a la misma, cualquiera que sea su nivel, estarán impedidos de intervenir o interferir en forma alguna en el desempeño de las facultades y ejercicio de atribuciones que esta Ley y las demás disposiciones aplicables confieren a los servidores públicos del Instituto.

    El Órgano Interno de Control tendrá las siguientes atribuciones:

    I. Las que contempla la Ley General de Responsabilidades Administrativas;

    II. Verificar que el ejercicio de gasto del Instituto se realice conforme a la normatividad aplicable, los programas aprobados y montos autorizados;

    III. Presentar al Pleno del Instituto los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto;

    IV. Revisar que las operaciones presupuestales que realice el Instituto, se hagan con apego a las disposiciones legales y administrativas aplicables y, en su caso, determinar las desviaciones de las mismas y las causas que les dieron origen;

    V. Promover ante las instancias correspondientes, las acciones administrativas y legales que se deriven de los resultados de las auditorías;

    VI. Investigar, en el ámbito de su competencia, los actos u omisiones que impliquen alguna irregularidad o conducta ilícita en el ingreso, egreso, manejo, custodia y aplicación de fondos y recursos del Instituto;

    VII. Evaluar los informes de avance de la gestión financiera respecto de los programas autorizados y los relativos a procesos concluidos, empleando la metodología que determine el Órgano Interno de Control;

    VIII. Evaluar el cumplimiento de los objetivos y metas fijadas en los programas de naturaleza administrativa contenidos en el presupuesto de egresos del Instituto, empleando la metodología que determine;

    IX. Recibir quejas y denuncias conforme a las leyes aplicables;

    X. Solicitar la información y efectuar visitas a las áreas y órganos del Instituto para el cumplimento de sus funciones;

    XI. Recibir, tramitar y resolver las inconformidades, procedimientos y recursos administrativos que se promuevan en materia de adquisiciones, arrendamientos, servicio y obras públicas;

    XII. Intervenir en los actos de entrega-recepción de los servidores públicos del Instituto de mandos medios y superiores, en los términos de la normativa aplicable;

    XIII. Participar, conforme a las disposiciones vigentes, en los comités y subcomités de los que éste Órgano Interno de Control forme parte, e intervenir en los actos que se deriven de los mismos;

    XIV. Atender las solicitudes de los diferentes órganos del Instituto en los asuntos de su competencia;

    XV. Proponer los proyectos de modificación o actualización de su estructura orgánica, personal y/o recursos;

    XVI. Formular su anteproyecto de presupuesto del Órgano Interno de Control;

    XVII. Presentar al Pleno del Instituto los informes previo y anual de resultados de su gestión, y comparecer ante el mismo, cuando así lo requiera el Comisionado Presidente;

    XVIII. Presentar al Pleno del Instituto los informes respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre la imposición de sanciones en materia de responsabilidades administrativas en el ámbito de su competencia, y

    XIX. Las demás que le confieran otros ordenamientos.

    En el desempeño de su cargo, el titular del Órgano Interno de Control se sujetará a los principios previstos en la Ley General de Responsabilidades Administrativas.

    Para la determinación de las responsabilidades y aplicación de sanciones a las que se refiere este artículo deberá seguirse el procedimiento previsto en la Ley General de Responsabilidades Administrativas.

    Artículo 36. El titular del Órgano Interno de Control deberá reunir los siguientes requisitos:

    I. a III. …

    IV. No haber sido Secretario de Estado, Procurador General de la República o de Justicia de alguna de las entidades federativas, Oficial Mayor de un ente público, Senador, Diputado Federal, Gobernador de algún Estado o Jefe de Gobierno de la Ciudad de México, dirigente, miembro de órgano rector, alto ejecutivo o responsable del manejo de los recursos públicos de algún partido político, ni haber sido postulado para cargo de elección popular en los cuatro años anteriores a la propia designación;

    V. a X. …

    Artículo 37. El titular del Órgano Interno de Control será designado por la Cámara de Diputados con el voto de las dos terceras partes de sus miembros presentes, conforme al procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    El titular del Órgano Interno de Control durará en su encargo cuatro años y podrá ser designado por un período inmediato posterior al que se haya desempeñado, previa postulación y cumpliendo los requisitos previstos en esta Ley y el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Tendrá un nivel jerárquico igual al de un Director General o su equivalente en la estructura orgánica del Instituto, y mantendrá la coordinación técnica necesaria con la Entidad de Fiscalización Superior de la Federación a que se refiere el artículo 79 de la Constitución Política de los Estados Unidos Mexicanos.

    Artículo 38. El titular del Órgano Interno de Control del Instituto será sujeto de responsabilidad administrativa en términos de la Ley General de Responsabilidades Administrativas y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    El titular del Órgano Interno de Control se abstendrá de desempeñar cualquier otro empleo, trabajo o comisión públicos o privados, con excepción de los cargos docentes.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control del Instituto serán sancionados por el titular del Órgano Interno de Control o el servidor público en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    Artículo 39. El titular del Órgano Interno de Control del Instituto será suplido en sus ausencias por los servidores públicos correspondientes en el orden que señale el estatuto orgánico del Instituto.

    Artículo 40. El titular del Órgano Interno de Control del Instituto será auxiliado en sus funciones por el personal que al efecto señale el estatuto orgánico del Instituto, de conformidad con el presupuesto autorizado.

    El titular del Órgano Interno de Control del Instituto estará sujeto a las mismas reglas de contacto establecidas en esta Ley para los comisionados.

    El titular del Órgano Interno de Control deberá rendir informe semestral y anual de actividades a la Comisión, del cual marcará copia a la Cámara de Diputados.

    El Órgano Interno de Control deberá inscribir y mantener actualizada la información correspondiente del Sistema de evolución patrimonial, de declaración de intereses y constancia de presentación de declaración fiscal, de todos los servidores públicos del Instituto, de conformidad con la Ley General del Sistema Nacional Anticorrupción y la Ley General de Responsabilidades Administrativas.

    Artículo Cuarto. Se reforman los artículos 81, primer párrafo y 91; se adicionan los artículos 91 Bis; 91 Ter; 91 Quáter y 91 Quinquies a la Ley del Sistema Nacional de Información Estadística y Geográfica, para quedar como sigue:

    ARTÍCULO 81.- El Presidente del Instituto tendrá la facultad de determinar el sector que, de entre los cuatro señalados en el artículo 79 de esta Ley, deberá atender y coordinar cada uno de los vicepresidentes de la Junta de Gobierno como parte de su labor ordinaria y cotidiana dentro del Instituto.

    ARTÍCULO 91.- El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos del Instituto y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción.

    El Órgano Interno de Control tendrá un titular que lo representará y contará con la estructura orgánica, personal y recursos necesarios para el cumplimiento de su objeto.

    En el desempeño de su cargo, el titular del Órgano Interno de Control se sujetará a los principios previstos en la Ley General de Responsabilidades Administrativas.

    El Órgano Interno de Control tendrá las siguientes atribuciones:

    I. Las que contempla la Ley General de Responsabilidades Administrativas;

    II. Verificar que el ejercicio de gasto del Instituto se realice conforme a la normatividad aplicable, los programas aprobados y montos autorizados;

    III. Presentar a la Junta de Gobierno del Instituto los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto;

    IV. Revisar que las operaciones presupuestales que realice el Instituto, se hagan con apego a las disposiciones legales y administrativas aplicables y, en su caso, determinar las desviaciones de las mismas y las causas que les dieron origen;

    V. Promover ante las instancias correspondientes, las acciones administrativas y legales que se deriven de los resultados de las auditorías;

    VI. Investigar, en el ámbito de su competencia, los actos u omisiones que impliquen alguna irregularidad o conducta ilícita en el ingreso, egreso, manejo, custodia y aplicación de fondos y recursos del Instituto;

    VII. Evaluar los informes de avance de la gestión financiera respecto de los programas autorizados y los relativos a procesos concluidos, empleando la metodología que determine el Órgano Interno de Control;

    VIII. Evaluar el cumplimiento de los objetivos y metas fijadas en los programas de naturaleza administrativa contenidos en el presupuesto de egresos del Instituto, empleando la metodología que determine;

    IX. Recibir quejas y denuncias conforme a las leyes aplicables;

    X. Solicitar la información y efectuar visitas a las áreas y órganos del Instituto para el cumplimento de sus funciones;

    XI. Recibir, tramitar y resolver las inconformidades, procedimientos y recursos administrativos que se promuevan en materia de adquisiciones, arrendamientos, servicio y obras públicas;

    XII. Intervenir en los actos de entrega-recepción de los servidores públicos del Instituto de mandos medios y superiores, en los términos de la normativa aplicable;

    XIII. Participar, conforme a las disposiciones vigentes, en los comités y subcomités de los que el Órgano Interno de Control forme parte, e intervenir en los actos que se deriven de los mismos;

    XIV. Atender las solicitudes de los diferentes órganos del Instituto en los asuntos de su competencia;

    XV. Proponer los proyectos de modificación o actualización de su estructura orgánica, personal y/o recursos;

    XVI. Formular el anteproyecto de presupuesto del Órgano Interno de Control;

    XVII. Presentar a la Junta de Gobierno del Instituto los informes previo y anual de resultados de su gestión, y comparecer ante el mismo, cuando así lo requiera el Presidente del Instituto;

    XVIII. Presentar a la Junta de Gobierno del Instituto los informes respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre la imposición de sanciones en materia de responsabilidades administrativas, y

    XIX. Las demás que le confieran otros ordenamientos.

    ARTÍCULO 91 BIS.- El titular del Órgano Interno de Control será designado por la Cámara de Diputados del Congreso de la Unión, con el voto de las dos terceras partes de sus miembros presentes, conforme al procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    ARTÍCULO 91 TER.- El titular del Órgano Interno de Control durará en su encargo cuatro años y podrá ser designado por un periodo inmediato posterior al que se haya desempeñado, previa postulación y cumpliendo los requisitos previstos en esta Ley y el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Tendrá un nivel jerárquico igual al de un Director General o su equivalente en la estructura orgánica del Instituto y mantendrá la coordinación técnica necesaria con la Entidad de Fiscalización Superior de la Federación a que se refiere el artículo 79 de la Constitución Política de los Estados Unidos Mexicanos.

    El titular del Órgano Interno de Control deberá rendir informe semestral y anual de actividades al Instituto, del cual marcará copia a la Cámara de Diputados.

    El titular del Órgano Interno de Control se abstendrá de desempeñar cualquier otro empleo, trabajo o comisión públicos o privados, con excepción de los cargos docentes.

    ARTÍCULO 91 QUÁTER.- El Titular del Órgano Interno de Control deberá reunir los siguientes requisitos:

    I. Ser ciudadano mexicano en pleno goce de sus derechos civiles y políticos, y tener treinta y cinco años cumplidos el día de la designación;

    II. Gozar de buena reputación y no haber sido condenado por delito doloso que amerite pena de prisión por más de un año;

    III. Contar al momento de su designación con una experiencia de al menos cinco años en el control, manejo o fiscalización de recursos, responsabilidades administrativas, contabilidad gubernamental, auditoría gubernamental, obra pública, adquisiciones, arrendamientos y servicios del sector público;

    IV. Contar al día de su designación, con antigüedad mínima de cinco años, con título profesional relacionado con las actividades a que se refiere la fracción anterior, expedido por autoridad o institución legalmente facultada para ello;

    V. Contar con reconocida solvencia moral;

    VI. No pertenecer o haber pertenecido en los cuatro años anteriores a su designación, a despachos de consultoría o auditoría que hubieren prestado sus servicios al Instituto, o haber fungido como consultor o auditor externo del Instituto, en lo individual durante ese periodo;

    VII. No estar inhabilitado para desempeñar un empleo, cargo o comisión en el servicio público, y VIII. No haber sido Secretario de Estado, Procurador General de la República o de Justicia de alguna de las entidades federativas, Oficial Mayor de un ente público, Senador, Diputado Federal, Gobernador de algún Estado o Jefe de Gobierno de la Ciudad de México, dirigente, miembro de órgano rector, alto ejecutivo o responsable del manejo de los recursos públicos de algún partido político, ni haber sido postulado para cargo de elección popular en los cuatro años anteriores a la propia designación.

    ARTÍCULO 91 QUINQUIES.- El Titular del Órgano Interno de Control del Instituto será sujeto de responsabilidad administrativa en términos de la Ley General de Responsabilidades Administrativas; y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control del Instituto serán sancionados por el Titular del Órgano Interno de Control, o por la persona en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    Artículo Quinto. Se reforman los artículos 39, numerales 4, 5, 6 y 7; 44, numeral 1, inciso w); 45, numeral 1, inciso g); 47, numeral 2; 48, numeral 1, inciso m); 51, numeral 1, inciso i); 198, numeral 1; 478, numerales 1 y 2; la denominación del Capítulo II del Título Segundo para quedar como “Del Régimen de Responsabilidades Administrativas”; 480, numeral 1; la denominación del Capítulo III del Título Segundo para quedar como “Del Órgano Interno de Control”; 487, numerales 1, 2, 3, 5 y 6; 488, numeral 1; 489; numerales 1 y 2; 490, numeral 1, incisos i), j), k), l) y v); 491, numeral 1; 492, numeral 1, y 493, numerales 1 y 3; se adiciona un párrafo segundo al numeral 3 del artículo 487; se derogan los artículos 481; 482; 483; 484; 485; 486; y los incisos ñ), o), p) y t) del artículo 490 de la Ley General de Instituciones y Procedimientos Electorales, para quedar como sigue:

    Artículo 39.

    1. a 3. …

    4. El Órgano Interno de Control del Instituto será el órgano facultado para conocer de las infracciones administrativas cometidas por el Consejero Presidente, los Consejeros Electorales y el Secretario Ejecutivo del Consejo General e imponer, en su caso, las sanciones aplicables conforme a lo dispuesto en el Libro Octavo de esta Ley.

    5. El titular del Órgano Interno de Control del Instituto será designado por la Cámara de Diputados con el voto de las dos terceras partes de sus miembros presentes a propuesta de instituciones públicas de educación superior.

    6. Durará seis años en el cargo y podrá ser reelecto por una sola vez. Estará adscrito administrativamente a la presidencia del Consejo General y mantendrá la coordinación técnica necesaria con la Auditoria Superior de la Federación.

    7. Para la elección del titular del Órgano Interno de Control, además de lo dispuesto por la Constitución, se observará el procedimiento previsto en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Artículo 44.

    1. …

    a) a v) …

    w) Conocer los informes, trimestrales y anual, que la Junta General Ejecutiva rinda por conducto del Secretario Ejecutivo del Instituto, así como los que, en su caso, deba rendir el titular del Órgano Interno de Control;

    x) a jj) …

    2. …

    3. …

    Artículo 45.

    1. …

    a) a f) …

    g) Recibir del titular del Órgano Interno de Control los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto, así como hacerlos del conocimiento del Consejo General;

    h) a p) …

    Artículo 47.

    1. …

    2. El titular del Órgano Interno de Control podrá participar, a convocatoria del Consejero Presidente, en las sesiones de la Junta General Ejecutiva.

    Artículo 48.

    1. …

    a) a l) …

    m) Recibir informes del titular del Órgano Interno de Control respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre imposición de sanciones a los servidores públicos del Instituto;

    n) a o) …

    Artículo 51.

    1. …

    a) a h) …

    i) Coadyuvar con el titular del Órgano Interno de Control en los procedimientos que éste acuerde para la vigilancia de los recursos y bienes del Instituto y, en su caso, en los procedimientos para la determinación de responsabilidades e imposición de sanciones a los servidores públicos del Instituto;

    j) a w) …

    2. …

    3. …

    Artículo 198.

    1. El personal de la Comisión de Fiscalización y la Unidad Técnica de Fiscalización de la misma está obligado a guardar reserva sobre el curso de las revisiones y auditorías en las que tenga participación o sobre las que disponga de información. El Órgano Interno de Control del Instituto conocerá de las violaciones a esta norma y en su caso impondrá las sanciones que correspondan de acuerdo a esta Ley.

    Artículo 478.

    1. Para los efectos del presente Capítulo, serán considerados como servidores públicos del Instituto: el Consejero Presidente, los Consejeros Electorales del Consejo General y de los consejos locales y distritales, el Secretario Ejecutivo, el titular del Órgano Interno de Control, los directores ejecutivos, el titular del Unidad Técnica de Fiscalización de la Comisión de Fiscalización, los jefes de unidades administrativas, los vocales ejecutivos de los órganos desconcentrados, los funcionarios y empleados y, en general, toda persona que desempeñe un empleo, cargo o comisión de cualquier naturaleza en el Instituto, quienes serán responsables por los actos u omisiones en que incurran en el desempeño de sus respectivas funciones.

    2. El Órgano Interno de Control del Instituto, su titular y el personal adscrito a la misma, cualquiera que sea su nivel, están impedidos de intervenir o interferir en forma alguna en el desempeño de las facultades y ejercicio de atribuciones de naturaleza electoral que la Constitución y esta Ley confieren a los funcionarios del Instituto.

    CAPÍTULO II. Del Régimen de Responsabilidades Administrativas

    Artículo 480.

    1. Para la determinación de las responsabilidades administrativas de los servidores públicos del Instituto por la comisión de faltas administrativas graves o no graves, o de los particulares vinculados con faltas administrativas graves, el Órgano Interno de Control se sujetará al régimen y procedimientos establecidos en la Ley General de Responsabilidades Administrativas.

    Artículo 481. Se deroga.

    Artículo 482. Se deroga.

    Artículo 483. Se deroga.

    Artículo 484. Se deroga.

    Artículo 485. Se deroga.

    Artículo 486. Se deroga.

    CAPÍTULO III. Del Órgano Interno de Control

    Artículo 487.

    1. El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos del Instituto y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción; tendrá además a su cargo la fiscalización de los ingresos y egresos del Instituto.

    2. El titular del Órgano Interno de Control tendrá un nivel jerárquico equivalente a Director Ejecutivo.

    3. El titular del Órgano Interno de Control será designado por la Cámara de Diputados, con el voto de las dos terceras partes de sus miembros presentes, a propuesta de instituciones públicas de educación superior, mediante los procedimientos y en los plazos que fije la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    El titular del Órgano Interno de Control durará en su encargo seis años, y podrá ser reelecto para un solo periodo inmediato posterior al que se haya desempeñado, si cumple con los requisitos previstos en esta Ley y en el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    4. …

    5. El Órgano Interno de Control contará con la estructura orgánica, personal y recursos que apruebe el Consejo General a propuesta de su titular, de conformidad con las reglas previstas en este Capítulo.

    6. En su desempeño, el Órgano Interno de Control se sujetará a los principios de certeza, legalidad, independencia, imparcialidad, máxima publicidad y objetividad.

    Artículo 488.

    1. El titular del Órgano Interno de Control deberá reunir los mismos requisitos que esta Ley establece para los directores ejecutivos del Instituto, y los siguientes:

    a) a e) …

    Artículo 489.

    1. El titular del Órgano Interno de Control del Instituto será sujeto de responsabilidad en términos de la Ley General de Responsabilidades Administrativas, y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control del Instituto serán sancionados por el titular del Órgano Interno de Control, o por el servidor público en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    El titular del Órgano Interno de Control deberá rendir informe semestral y anual de actividades al Consejo General del Instituto, del cual marcará copia a la Cámara de Diputados.

    2. El Órgano Interno de Control deberá inscribir y mantener actualizada la información correspondiente del Sistema de evolución patrimonial, de declaración de intereses y constancia de presentación de declaración fiscal; de todos los servidores públicos del Instituto, de conformidad con la Ley General del Sistema Nacional Anticorrupción y la Ley General de Responsabilidades Administrativas.

    Artículo 490.

    1. El Órgano Interno de Control tendrá las facultades siguientes:

    a) a h) …

    i) Solicitar y obtener la información necesaria para el cumplimiento de sus funciones. Por lo que hace a la información relativa a las operaciones de cualquier tipo proporcionada por las instituciones de crédito, les será aplicable a todos los servidores públicos del Órgano Interno de Control del Instituto, así como a los profesionales contratados para la práctica de auditorías, la obligación de guardar la reserva a que aluden las disposiciones normativas en materia de transparencia y acceso a la información pública;

    j) Investigar, calificar, y en su caso, substanciar, resolver y sancionar de conformidad con el procedimiento establecido en la Ley General de Responsabilidades Administrativas e integrar el expediente de presunta responsabilidad administrativa respecto de las denuncias que se presenten en contra de los servidores públicos del Instituto;

    k) Investigar, en el ámbito de su competencia, los actos u omisiones que impliquen alguna irregularidad o conducta ilícita en el ingreso, egreso, manejo, custodia y aplicación de fondos y recursos del Instituto, así como en el caso de cualquier irregularidad en el ejercicio del empleo, cargo o comisión de los servidores públicos del Instituto;

    I) Recibir denuncias o quejas directamente relacionadas con el uso y disposición de los ingresos y recursos del Instituto, así como con el desempeño en sus funciones por parte de los servidores públicos del mismo y desahogar los procedimientos a que haya lugar;

    m) a n) …

    ñ) Se deroga.

    o) Se deroga.

    p) Se deroga.

    q) a s) …

    t) Se deroga.

    u) …

    v) Las demás que le otorgue esta Ley, la Ley General de Responsabilidades Administrativas, o las leyes aplicables en la materia.

    Artículo 491.

    1. Los servidores públicos adscritos al Órgano Interno de Control del Instituto y, en su caso, los profesionales contratados para la práctica de auditorías, deberán guardar estricta reserva sobre la información y documentos que conozcan con motivo del desempeño de sus facultades así como de sus actuaciones y observaciones.

    Artículo 492.

    1. Los órganos, áreas ejecutivas y servidores públicos del Instituto estarán obligados a proporcionar la información, permitir la revisión y atender los requerimientos que les presente el Órgano Interno de Control, sin que dicha revisión interfiera u obstaculice el ejercicio de las funciones o atribuciones que esta Ley o las leyes aplicables les confieren.

    Artículo 493.

    1. Si transcurrido el plazo establecido por el Órgano Interno de Control, el órgano o área fiscalizada, sin causa justificada, no presenta el informe o documentos que se le soliciten, el Órgano Interno de Control procederá a fincar las responsabilidades que correspondan conforme a derecho.

    2. …

    3. El Órgano Interno de Control, además de imponer la sanción respectiva, requerirá al infractor para que dentro del plazo determinado, que nunca será mayor a cuarenta y cinco días, cumpla con la obligación omitida motivo de la sanción; y si aquél incumple, será sancionado.

    4. …

    Artículo Sexto. Se reforman los artículos 30, fracción V; 38, párrafo primero y fracciones XVI y XIX; 44, fracciones VII y XIV; 60, párrafo primero; 61; 62 y 63, fracción II; se adicionan los artículos 60, con un segundo y tercer párrafos; 62 Bis; 62 Ter; 62 Quáter y 62 Quinquies a la Ley del Instituto Nacional para la Evaluación de la Educación, para quedar como sigue:

    Artículo 30. …

    I. a IV. …

    V. El Órgano Interno de Control

    Artículo 38. Son facultades de la Junta:

    I. a XV. …

    XVI. Designar, a propuesta del Presidente, a los titulares de las unidades administrativas previstas en el Estatuto;

    XVII. y XVIII. …

    XIX. Conocer y aprobar, en su caso, los estados financieros respecto del ejercicio fiscal del Instituto; autorizar su publicación, así como conocer y publicar el dictamen del titular del Órgano Interno de Control;

    XX. a XXII. …

    Artículo 44. …

    I. a VI. …

    VII. Proponer a la Junta, para su designación, a los titulares de las unidades administrativas previstas en el Estatuto;

    VIII. a XIII. …

    XIV. Recibir del titular del Órgano Interno de Control los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto, así como hacerlos del conocimiento a la Junta, y

    XV. …

    Artículo 60. El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos del Instituto y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción.

    El Órgano Interno de Control tendrá un titular que lo representará y contará con la estructura orgánica, personal y recursos necesarios para el cumplimiento de su objeto.

    En el desempeño de su cargo, el Titular del Órgano Interno de Control se sujetará a los principios previstos en la Ley General de Responsabilidades Administrativas.

    Artículo 61. El Órgano Interno de Control tendrá las siguientes atribuciones:

    I. Las que contempla la Ley General de Responsabilidades Administrativas;

    II. Verificar que el ejercicio de gasto del Instituto se realice conforme a la normatividad aplicable, los programas aprobados y montos autorizados;

    III. Presentar a la Junta de Gobierno del Instituto los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto;

    IV. Revisar que las operaciones presupuestales que realice el Instituto, se hagan con apego a las disposiciones legales y administrativas aplicables y, en su caso, determinar las desviaciones de las mismas y las causas que les dieron origen;

    V. Promover ante las instancias correspondientes, las acciones administrativas y legales que se deriven de los resultados de las auditorías;

    VI. Investigar, en el ámbito de su competencia, los actos u omisiones que impliquen alguna irregularidad o conducta ilícita en el ingreso, egreso, manejo, custodia y aplicación de fondos y recursos del Instituto;

    VII. Evaluar los informes de avance de la gestión financiera respecto de los programas autorizados y los relativos a procesos concluidos, empleando la metodología que éste determine;

    VIII. Evaluar el cumplimiento de los objetivos y metas fijadas en los programas de naturaleza administrativa contenidos en el presupuesto de egresos del Instituto, empleando la metodología que determine;

    IX. Recibir quejas y denuncias conforme a las leyes aplicables;

    X. Solicitar la información y efectuar visitas a las áreas y órganos del Instituto para el cumplimento de sus funciones;

    XI. Recibir, tramitar y resolver las inconformidades, procedimientos y recursos administrativos que se promuevan en materia de adquisiciones, arrendamientos, servicio y obras públicas;

    XII. Intervenir en los actos de entrega-recepción de los servidores públicos del Instituto de mandos medios y superiores, en los términos de la normativa aplicable;

    XIII. Participar, conforme a las disposiciones vigentes, en los comités y subcomités del que éste Órgano Interno de Control forme parte, e intervenir en los actos que se deriven de los mismos;

    XIV. Atender las solicitudes de los diferentes órganos del Instituto en los asuntos de su competencia;

    XV. Proponer los proyectos de modificación o actualización de su estructura orgánica, personal y/o recursos;

    XVI. Formular su anteproyecto de presupuesto;

    XVII. Presentar a la Junta de Gobierno del Instituto los informes previo y anual de resultados de su gestión, y comparecer ante el mismo, cuando así lo requiera el Presidente;

    XVIII. Presentar a la Junta de Gobierno del Instituto los informes respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre la imposición de sanciones en materia de responsabilidades administrativas, y

    XIX. Las demás que le confieran otros ordenamientos.

    Artículo 62. El titular del Órgano Interno de Control será designado por la Cámara de Diputados, con el voto de las dos terceras partes de sus miembros presentes, conforme al procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Artículo 62 Bis. El titular del Órgano Interno de Control deberá reunir los siguientes requisitos:

    I. Ser ciudadano mexicano en pleno goce de sus derechos civiles y políticos, y tener treinta y cinco años cumplidos el día de la designación;

    II. Gozar de buena reputación y no haber sido condenado por delito doloso que amerite pena de prisión por más de un año;

    III. Contar al momento de su designación con una experiencia de al menos cinco años en el control, manejo o fiscalización de recursos, responsabilidades administrativas, contabilidad gubernamental, auditoría gubernamental, obra pública, adquisiciones, arrendamientos y servicios del sector público;

    IV. Contar al día de su designación, con antigüedad mínima de cinco años, con título profesional relacionado con las actividades a que se refiere la fracción anterior, expedido por autoridad o institución legalmente facultada para ello;

    V. Contar con reconocida solvencia moral;

    VI. No pertenecer o haber pertenecido en los cuatro años anteriores a su designación a despachos de consultoría o auditoría que hubieren prestado sus servicios al Instituto o haber fungido como consultor o auditor externo del Instituto, en lo individual durante ese periodo;

    VII. No estar inhabilitado para desempeñar un empleo, cargo o comisión en el servicio público, y VIII. No haber sido Secretario de Estado, Procurador General de la República o de Justicia de alguna de las entidades federativas, Oficial Mayor de un ente público, Senador, Diputado Federal, Gobernador de algún Estado o Jefe de Gobierno de la Ciudad de México, dirigente, miembro de órgano rector, alto ejecutivo o responsable del manejo de los recursos públicos de algún partido político, ni haber sido postulado para cargo de elección popular en los cuatro años anteriores a la propia designación.

    Artículo 62 Ter. El titular del Órgano Interno de Control durará en su encargo cuatro años y podrá ser designado por un periodo inmediato posterior al que se haya desempeñado, previa postulación y cumpliendo los requisitos previstos en esta Ley y el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    Tendrá un nivel jerárquico igual al de un Director General o su equivalente en la estructura orgánica del Instituto y mantendrá la coordinación técnica necesaria con la Entidad de Fiscalización Superior de la Federación a que se refiere el artículo 79 de la Constitución Política de los Estados Unidos Mexicanos.

    El titular del Órgano Interno de Control se abstendrá de desempeñar cualquier otro empleo, trabajo o comisión públicos o privados con excepción de los cargos docentes.

    Artículo 62 Quáter. El titular del Órgano Interno de Control del Instituto será sujeto de responsabilidad en términos de la Ley General de Responsabilidades Administrativas; y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control del Instituto serán sancionados por el Titular del Órgano Interno de Control, o el servidor público en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    Artículo 62 Quinquies. El Órgano Interno de Control deberá inscribir y mantener actualizada la información correspondiente del Sistema de evolución patrimonial, de declaración de intereses y constancia de presentación de declaración fiscal; de todos los servidores públicos del Instituto, de conformidad con la Ley General del Sistema Nacional Anticorrupción y la Ley General de Responsabilidades Administrativas.

    Artículo 63. …

    I. …

    II. Un informe por escrito de las actividades y del ejercicio del gasto del año inmediato anterior, incluyendo las observaciones relevantes que, en su caso, haya formulado el titular del Órgano Interno de Control.

    Artículo Séptimo. Se reforman los artículos 51 y 52, fracción IV; se adicionan los artículos 52 Bis, 52 Ter, 52 Quáter y 52 Quinquies a la Ley Federal de Transparencia y Acceso a la Información Pública, para quedar como sigue:

    Artículo 51. El Órgano Interno de Control es un órgano dotado de autonomía técnica y de gestión para decidir sobre su funcionamiento y resoluciones. Tendrá a su cargo prevenir, corregir, investigar y calificar actos u omisiones que pudieran constituir responsabilidades administrativas de servidores públicos del Instituto y de particulares vinculados con faltas graves; para sancionar aquellas distintas a las que son competencia del Tribunal Federal de Justicia Administrativa; revisar el ingreso, egreso, manejo, custodia, aplicación de recursos públicos federales; así como presentar las denuncias por hechos u omisiones que pudieran ser constitutivos de delito ante la Fiscalía Especializada en Combate a la Corrupción.

    Artículo 52. …

    I. a III. …

    IV. No haber sido Secretario de Estado, Procurador General de la República o de Justicia de la Ciudad de México o de alguna de las entidades federativas, Oficial Mayor de un ente público, Senador, Diputado Federal, Gobernador de algún Estado o Jefe de Gobierno de la Ciudad de México, dirigente, miembro de órgano rector, alto ejecutivo o responsable del manejo de los recursos públicos de algún partido político, ni haber sido postulado para cargo de elección popular en los cuatro años anteriores a la propia designación;

    V. a IX. …

    Artículo 52 Bis. El nombramiento y rendición de cuentas del titular del Órgano Interno de Control se regirá conforme a lo siguiente:

    I. El titular del Órgano Interno de Control será designado por la Cámara de Diputados del Congreso de la Unión, con el voto de las dos terceras partes de sus miembros presentes, conforme al procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    II. El titular del Órgano Interno de Control durará en su encargo cuatro años y podrá ser designado por un periodo inmediato posterior al que se haya desempeñado, previa postulación y cumpliendo los requisitos previstos en esta Ley y el procedimiento establecido en la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos.

    III. Tendrá un nivel jerárquico igual al de un Director General o su equivalente y mantendrá la coordinación técnica necesaria con la Entidad de Fiscalización Superior de la Federación a que se refiere el artículo 79 de la Constitución Política de los Estados Unidos Mexicanos.

    Artículo 52 Ter. En el desempeño de su cargo, el titular del Órgano Interno de Control se sujetará a los principios previstos en la Ley General de Responsabilidades Administrativas.

    El Órgano Interno de Control tendrá las siguientes atribuciones:

    I. Las que contempla la Ley General de Responsabilidades Administrativas;

    II. Verificar que el ejercicio de gasto del Instituto se realice conforme a la normatividad aplicable, los programas aprobados y montos autorizados;

    III. Presentar al Pleno del Instituto los informes de las revisiones y auditorías que se realicen para verificar la correcta y legal aplicación de los recursos y bienes del Instituto;

    IV. Revisar que las operaciones presupuestales que realice el Instituto, se hagan con apego a las disposiciones legales y administrativas aplicables y, en su caso, determinar las desviaciones de las mismas y las causas que les dieron origen;

    V. Promover ante las instancias correspondientes, las acciones administrativas y legales que se deriven de los resultados de las auditorías;

    VI. Investigar, en el ámbito de su competencia, los actos u omisiones que impliquen alguna irregularidad o conducta ilícita en el ingreso, egreso, manejo, custodia y aplicación de fondos y recursos del Instituto;

    VII. Evaluar los informes de avance de la gestión financiera respecto de los programas autorizados y los relativos a procesos concluidos, empleando la metodología que determine el mismo;

    VIII. Evaluar el cumplimiento de los objetivos y metas fijadas en los programas de naturaleza administrativa contenidos en el presupuesto de egresos del Instituto, empleando la metodología que determine;

    IX. Recibir quejas y denuncias conforme a las leyes aplicables;

    X. Solicitar la información y efectuar visitas a las áreas y órganos del Instituto para el cumplimento de sus funciones;

    XI. Recibir, tramitar y resolver las inconformidades, procedimientos y recursos administrativos que se promuevan en materia de adquisiciones, arrendamientos, servicio y obras públicas;

    XII. Intervenir en los actos de entrega-recepción de los servidores públicos del Instituto de mandos medios y superiores, en los términos de la normativa aplicable;

    XIII. Participar, conforme a las disposiciones vigentes, en los comités y subcomités de los que éste forme parte;

    XIV. Atender las solicitudes de los diferentes órganos del Instituto en los asuntos de su competencia;

    XV. Proponer los proyectos de modificación o actualización de su estructura orgánica, personal y/o recursos;

    XVI. Formular su anteproyecto de presupuesto;

    XVII. Presentar al Pleno del Instituto los informes previo y anual de resultados de su gestión, y comparecer ante el mismo, cuando así lo requiera el Comisionado Presidente;

    XVIII. Presentar al Pleno del Instituto los informes respecto de los expedientes relativos a las faltas administrativas y, en su caso, sobre la imposición de sanciones en materia de responsabilidades administrativas, y

    XIX. Las demás que le confieran otros ordenamientos.

    El titular del Órgano Interno de Control deberá rendir informe semestral y anual de actividades del Instituto, del cual marcará copia a la Cámara de Diputados.

    El titular del Órgano Interno de Control se abstendrá de desempeñar cualquier otro empleo, trabajo o comisión públicos y privados, con excepción de los cargos docentes.

    Artículo 52 Quáter. El titular del Órgano Interno de Control del Instituto será sujeto de responsabilidad en términos de la Ley General de Responsabilidades Administrativas; y podrá ser sancionado de conformidad con el procedimiento previsto en la normatividad aplicable.

    Tratándose de los demás servidores públicos adscritos al Órgano Interno de Control del Instituto serán sancionados por el Titular del Órgano Interno de Control, o el servidor público en quien delegue la facultad, en términos de la Ley General de Responsabilidades Administrativas.

    Artículo 52 Quinquies. El Órgano Interno de Control deberá inscribir y mantener actualizada la

    información correspondiente del Sistema de evolución patrimonial, de declaración de intereses y constancia de presentación de declaración fiscal; de todos los servidores públicos del Instituto, de conformidad con la Ley General del Sistema Nacional Anticorrupción y la Ley General de Responsabilidades Administrativas.

    Artículo Octavo. Se reforman los artículos 20, numeral 2, inciso j); 34, numeral 1, inciso i) y 34 Bis, numerales 1 y 2; se adicionan un Capítulo Octavo denominado “De la Designación de los Titulares de los Órganos Internos de Control de los Órganos Constitucionales Autónomos”, conformado de una Sección Primera, denominada “De su Naturaleza Constitucional”, una Sección Segunda denominada “Del Proceso para su Designación” y una Sección Tercera denominada “De la Responsabilidad de los Titulares de los Órganos Internos de Control”, que comprende los artículos 57 Bis; 57 Ter y 57 Quáter a la Ley Orgánica del Congreso General de los Estados Unidos Mexicanos, para quedar como sigue:

    ARTICULO 20.

    1. …

    2. …

    a) a i) …

    j) Expedir la convocatoria aprobada por el Pleno a propuesta de la Junta de Coordinación Política para la designación del Consejero Presidente y de los consejeros electorales del Instituto Nacional Electoral, así como de los titulares de los Órganos Internos de Control de los órganos a los que la Constitución Política de los Estados Unidos Mexicanos les reconoce autonomía y que ejerzan recursos del Presupuesto de Egresos de la Federación; y

    k)…

    ARTICULO 34.

    1. …

    a) a h) …

    i) Proponer al Pleno la convocatoria para la designación del Consejero Presidente, de los consejeros electorales y de los titulares de los Órganos Internos de Control de los organismos con autonomía reconocida en la Constitución que ejerzan recursos del Presupuesto de Egresos de la Federación, en los términos establecidos en la Constitución Política de los Estados Unidos Mexicanos, las leyes que regulan dichos organismos, la presente ley y el Reglamento de la Cámara de Diputados, así como los procedimientos que de ellas se deriven, con el consenso de los respectivos grupos parlamentarios; y

    j) …

    ARTICULO 34 Bis.

    1. La convocatoria para la designación del Consejero Presidente, de los consejeros electorales y del titular del Órgano Interno de Control del Instituto Nacional Electoral, por lo menos, deberá contener:

    a) a f) …

    2. En el proceso de designación de los consejeros electorales del Instituto Nacional Electoral, se procurará la inclusión paritaria de hombres y mujeres.

    CAPITULO OCTAVO. De la Designación de los Titulares de los Órganos Internos de Control de los Órganos Constitucionales Autónomos

    Sección Primera. De su Naturaleza Constitucional

    ARTICULO 57 BIS.

    1. Conforme a lo previsto en el artículo 74, fracción VIII de la Constitución Política de los Estados Unidos Mexicanos, corresponde a la Cámara de Diputados designar, por el voto de las dos terceras partes de sus miembros presentes a los titulares de los Órganos Internos de Control de los organismos con autonomía reconocida en la Constitución que ejerzan recursos del Presupuesto de Egresos de la Federación.

    Sección Segunda. Del Proceso para su Designación

    ARTICULO 57 TER.

    1. La designación de los titulares de los Órganos Internos de Control se llevará a cabo de conformidad con el procedimiento siguiente:

    a) La Junta de Coordinación Política de la Cámara de Diputados propondrá al Pleno la convocatoria para la designación del titular del Órgano Interno de Control correspondiente, la que deberá contemplar que los aspirantes acompañen su declaración de intereses, de conformidad con las disposiciones aplicables;

    b) Esta convocatoria será abierta para todas las personas, contendrá las etapas completas para el procedimiento, las fechas límite y los plazos improrrogables, así como los requisitos legales que deben satisfacer los aspirantes y los documentos que deben presentar para acreditarlos;

    c) Para ser titular del Órgano Interno de Control de alguno de los organismos con autonomía reconocida en la Constitución y que ejerzan recursos del Presupuesto de Egresos de la Federación, se deberán cumplir los requisitos que establezcan las leyes de dichos organismos autónomos;

    d) La Mesa Directiva expedirá la convocatoria pública aprobada por el Pleno para la elección del titular del Órgano Interno de Control, misma que deberá publicarse en el Diario Oficial de la Federación, en la Gaceta Parlamentaria de la Cámara de Diputados, en la página web de dicha Cámara y, preferentemente, en periódicos de circulación nacional;

    e) Una vez abierto el periodo a que se refiera la convocatoria correspondiente, se recibirán las solicitudes de los aspirantes, por duplicado, y la documentación a que se refiere el inciso a) del numeral 1 del presente artículo, el Presidente de la Mesa Directiva turnará los expedientes a las Comisiones Unidas de Transparencia y Anticorrupción y de Vigilancia de la Auditoría Superior de la Federación, mismas que se encargarán de realizar la revisión correspondiente a efecto de determinar aquellos aspirantes que acreditan el cumplimiento de los requisitos exigidos para el cargo por la Constitución y las leyes correspondientes;

    f) En caso de que las Comisiones Unidas de Transparencia y Anticorrupción y de Vigilancia de la Auditoría Superior de la Federación determinen que alguno de los aspirantes no cumple con alguno de los requisitos, procederá a desechar la solicitud;

    g) Las Comisiones Unidas de Transparencia y Anticorrupción y de Vigilancia de la Auditoría Superior de la Federación elaborarán un acuerdo que deberá publicarse en el Diario Oficial de la Federación, en la Gaceta Parlamentaria de la Cámara de Diputados y en la página web de dicha Cámara, y contendrá lo siguiente:

    I. El listado con los aspirantes que hayan cumplido con los requisitos exigidos por la Constitución y las leyes correspondientes;

    II. El plazo con que cuentan los aspirantes, cuya solicitud haya sido desechada, para recoger su documentación y fecha límite para ello;

    III. El día y hora en donde tendrán verificativo las comparecencias ante las Comisiones Unidas de Transparencia y Anticorrupción; y de Vigilancia de la Auditoría Superior de la Federación, de los aspirantes que hayan cumplido con los requisitos exigidos, a efecto de garantizar su garantía de audiencia y conocer su interés y razones respecto a su posible designación en el cargo;

    h) Una vez que se hayan desahogado las comparecencias, las Comisiones Unidas de Transparencia y Anticorrupción; y de Vigilancia de la Auditoría Superior de la Federación, sesionarán de manera conjunta con la finalidad de integrar y revisar los expedientes y entrevistas para la formulación del dictamen que contenga la lista de candidatos aptos para ser votados por la Cámara, y que se hará llegar a la Junta de Coordinación Política;

    i) Los Grupos Parlamentarios, a través de la Junta de Coordinación Política determinarán por el más amplio consenso posible y atendiendo a las consideraciones y recomendaciones que establezca el dictamen de las Comisiones Unidas de Transparencia y Anticorrupción; y de Vigilancia de la Auditoría Superior de la Federación, la propuesta del nombre del candidato a titular del Órgano Interno de Control que corresponda;

    j) En la sesión correspondiente de la Cámara de Diputados, se dará a conocer al Pleno la propuesta a que se refiere el inciso anterior, y se procederá a su discusión y votación en los términos que establezca la presente Ley y el Reglamento de la Cámara de Diputados;

    k) Aprobado el dictamen, cuando así lo acuerde el Presidente, el candidato cuyo nombramiento se apruebe en los términos del presente Capítulo, rendirá la protesta constitucional ante el Pleno de la Cámara de Diputados en la misma sesión.

    Sección Tercera. De la Responsabilidad de los Titulares de los Órganos Internos de Control

    ARTICULO 57 QUÁTER.

    1. La Cámara de Diputados a través de la instancia que determine la ley, podrá investigar, sustanciar, y resolver sobre las faltas administrativas no graves de los titulares de los Órganos Internos de Control de los organismos con autonomía reconocida en la Constitución y que ejerzan recursos del Presupuesto de Egresos de la Federación.

    2. Asimismo será competente para investigar y sustanciar las faltas administrativas graves cuya sanción corresponde al Tribunal Federal de Justicia Administrativa, de conformidad con lo dispuesto por la Ley General de Responsabilidades Administrativas y demás normas jurídicas aplicables.

    3. En el ejercicio de sus funciones, dicha instancia deberá garantizar la separación entre las áreas encargadas de la investigación, sustanciación y resolución de los procedimientos, en los términos previstos por la Ley General de Responsabilidades Administrativas.

    ARTICULO 57 QUINQUIES.

    1. Cualquier persona, cuando presuma que los titulares de los Órganos Internos de Control de cualquiera de los organismos constitucionales autónomos, haya incurrido en los supuestos previstos en el Título Cuarto de la Constitución Política de los Estados Unidos Mexicanos, podrá presentar denuncias ante las autoridades correspondientes, acompañándola de los documentos y evidencias en las cuales se sustente.

    Transitorios

    Primero. El presente Decreto entrará en vigor al día siguiente de su publicación en el Diario Oficial de la Federación.

    Segundo.

    La Cámara de Diputados del H. Congreso de la Unión, dentro de los 180 días siguientes a la publicación de este Decreto, iniciará los procesos de designación de los titulares de los Órganos Internos de Control de los organismos a los que la Constitución Política de los Estados Unidos Mexicanos les otorga autonomía y que ejerzan recursos públicos del Presupuesto de Egresos de la Federación previstos en este Decreto.

    Lo anterior, con excepción de aquellos titulares de los órganos internos de control de los organismos a los que la Constitución Política de los Estados Unidos Mexicanos les otorga autonomía y que ejercen recursos públicos del Presupuesto de Egresos de la Federación que se encontraban en funciones a la entrada en vigor del Decreto por el que se reforman, adicionan, y derogan diversas disposiciones de la Constitución Política de los Estados Unidos Mexicanos, en materia de combate a la corrupción, publicado en el Diario Oficial de la Federación el 27 de mayo de 2015, los cuales continuarán en su encargo en los términos en los que fueron nombrados.

    Tercero.

    Los órganos de gobierno de los organismos a los que la Constitución Política de los Estados Unidos Mexicanos les otorga autonomía y que ejercen recursos públicos del Presupuesto de Egresos de la Federación, tendrán un plazo de ciento ochenta días, a partir de la publicación del presente Decreto, para armonizar su normatividad interna en los términos del presente Decreto.

    Cuarto.

    Los recursos humanos, financieros y materiales que actualmente se encuentran asignados a las Contralorías, se entenderán asignados a los Órganos Internos de Control a que se refiere el presente Decreto.

    Quinto.

    Las referencias relativas a la Ley General de Responsabilidades Administrativas se entenderán a la Ley Federal de Responsabilidades Administrativas de los Servidores Públicos hasta que este ordenamiento legal se abrogue el 17 de julio de 2017.

    Sexto.

    Los procedimientos administrativos iniciados por las autoridades federales correspondientes con la anterioridad a la entrada en vigor del presente Decreto, serán concluidos conforme a las disposiciones aplicables vigentes a su inicio.

    Séptimo.

    El Congreso de la Unión, en un plazo no mayor a ciento ochenta días, deberá armonizar su legislación conforme al presente Decreto.

    Ciudad de México, a 15 de diciembre de 2016.-

    Dip. Edmundo Javier Bolaños Aguilar, Presidente.-

    Sen. Pablo Escudero Morales, Presidente.-

    Dip. Ernestina Godoy Ramos, Secretaria.-

    Sen. María Elena Barrera Tapia, Secretaria

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia del Poder Ejecutivo Federal, en la Ciudad de México, a veinticuatro de enero de dos mil diecisiete.-

    Enrique Peña Nieto.-

    El Secretario de Gobernación, Miguel Ángel Osorio Chong.-

    04May/21

    Decreto de 26 de abril de 2016

    Decreto de 26 de abril de 2016 (Diario Oficial, Miércoles 1 de junio de 2016)

    ENRIQUE PEÑA NIETO, Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    “EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, DECRETA:

    SE REFORMA EL ARTÍCULO 230 DE LA LEY FEDERAL DE TELECOMUNICACIONES Y RADIODIFUSIÓN.

    Artículo Único.

    Se reforma el párrafo primero del artículo 230 de la Ley Federal de Telecomunicaciones y Radiodifusión, para quedar como sigue:

    Artículo 230. En sus transmisiones, las estaciones radiodifusoras de los concesionarios podrán hacer uso de cualquiera de las leguas nacionales de conformidad con las disposiciones legales aplicables. Las concesiones de uso social indígena podrán hacer uso de la lengua del pueblo originario que corresponda.

    Transitorio

    Único.

    El presente Decreto entrará en vigor al día siguiente de su publicación en el Diario Oficial de la Federación.

    Ciudad de México, a 26 de abril de 2016.-

    Dip. José de Jesús Zambrano Grijalva, Presidente.-

    Sen. Roberto Gil Zuarth, Presidente.-

    Dip. Ramón Bañales Arambula, Secretario.-

    Sen. César Octavio Pedroza Gaitán, Secretario.-

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia del Poder Ejecutivo Federal, en la Ciudad de México, a veintisiete de mayo de dos mil dieciséis.-

    Enrique Peña Nieto.

    El Secretario de Gobernación, Miguel Ángel Osorio Chong

    04May/21

    Decreto de 15 de diciembre de 2015

    Decreto de 15 de diciembre de 2015 (Diario Oficial, Jueves 17 de diciembre de 2015)

    DECRETO por el que se reforman, adicionan y derogan diversas disposiciones de la Ley Orgánica de la Administración Pública Federal, así como de otras leyes para crear la Secretaría de Cultura.

    ENRIQUE PEÑA NIETO, Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    “EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, DECRETA:

    SE REFORMAN, ADICIONAN Y DEROGAN DIVERSAS DISPOSICIONES DE LA LEY ORGÁNICA DE LA

    ADMINISTRACIÓN PÚBLICA FEDERAL, ASÍ COMO DE OTRAS LEYES PARA CREAR LA SECRETARÍA DE CULTURA

    ARTÍCULO PRIMERO

    Se REFORMAN los artículos 26; 38, fracciones II, IX, XXVIII, XXIX y XXX Bis; se ADICIONA el artículo 41 Bis, y se DEROGAN las fracciones X, XII, XIV, XVII, XVIII, XIX, XX, XXI y XXII del artículo 38 de la Ley Orgánica de la Administración Pública Federal, para quedar como sigue:

    Artículo 26.- Para el despacho de los asuntos del orden administrativo, el Poder Ejecutivo de la Unión

    contará con las siguientes dependencias:

    Secretaría de Gobernación;

    Secretaría de Relaciones Exteriores;

    Secretaría de la Defensa Nacional;

    Secretaría de Marina;

    Secretaría de Hacienda y Crédito Público;

    Secretaría de Desarrollo Social;

    Secretaría de Medio Ambiente y Recursos Naturales;

    Secretaría de Energía;

    Secretaría de Economía;

    Secretaría de Agricultura, Ganadería, Desarrollo Rural, Pesca y Alimentación;

    Secretaría de Comunicaciones y Transportes;

    Secretaría de Educación Pública;

    Secretaría de Salud;

    Secretaría del Trabajo y Previsión Social;

    Secretaría de Desarrollo Agrario, Territorial y Urbano;

    Secretaría de Cultura;

    Secretaría de Turismo, y

    Consejería Jurídica del Ejecutivo Federal.

    Artículo 38.- …

    I. …

    II. Organizar y desarrollar la educación artística, en coordinación con la Secretaría de Cultura, que se imparta en las escuelas e institutos oficiales, incorporados o reconocidos para la enseñanza y difusión de las bellas artes y de las artes populares;

    III. a VIII. …

    IX. Patrocinar la realización de congresos, asambleas y reuniones, eventos, competencias y concursos de carácter científico, técnico y educativo;

    X. Derogada.

    XI. …

    XII. Derogada.

    XIII. …

    XIV. Derogada.

    XV. y XVI. …

    XVII. Derogada.

    XVIII. Derogada.

    XIX. Derogada.

    XX. Derogada.

    XXI. Derogada.

    XXII. Derogada.

    XXIII. a XXVII. …

    XXVIII. Orientar las actividades recreativas y deportivas que realice el sector público federal;

    XXIX. Establecer los criterios educativos en la producción cinematográfica, de radio y televisión y en la industria editorial;

    XXX. …

    XXX Bis. Promover la producción cinematográfica, de radio y televisión y de la industria editorial, con apego a lo dispuesto por el artículo 3o. constitucional cuando se trate de cuestiones educativas y dirigir y coordinar la administración de las estaciones radiodifusoras y televisoras pertenecientes al Ejecutivo Federal, con exclusión de las que dependan de otras Secretarías de Estado. Aquellas estaciones de radio que incorporen en su programación contenido cultural deberán tomar en consideración las directrices que en esta materia le proponga la Secretaría de Cultura, y

    XXXI. …

    Artículo 41 Bis.- A la Secretaría de Cultura corresponde el despacho de los siguientes asuntos:

    I. Elaborar y conducir la política nacional en materia de cultura con la participación que corresponda a otras dependencias y entidades de la Administración Pública Federal;

    II. Conservar, proteger y mantener los monumentos arqueológicos, históricos y artísticos que conforman el patrimonio cultural de la Nación;

    III. Conducir la elaboración del Programa Nacional de Cultura, de conformidad con las disposiciones jurídicas aplicables, así como su implementación y evaluación;

    IV. Coordinar, conforme a las disposiciones jurídicas aplicables, las acciones que realizan las unidades administrativas e instituciones públicas pertenecientes a la Administración Pública Federal centralizada y paraestatal en materias de:

    a) Investigación científica sobre Antropología e Historia relacionada principalmente con la población del país y con la conservación y restauración del patrimonio cultural, arqueológico e histórico, así como el paleontológico; la protección, conservación, restauración y recuperación de ese patrimonio y la promoción y difusión de dichas materias, y

    b) Cultivo, fomento, estímulo, creación, educación profesional, artística y literaria, investigación y difusión de las bellas artes en las ramas de la música, las artes plásticas, las artes dramáticas y la danza, las bellas letras en todos sus géneros y la arquitectura;

    V. Organizar y administrar bibliotecas públicas y museos, exposiciones artísticas, congresos y otros eventos de interés cultural;

    VI. Proponer programas de educación artística a la Secretaría de Educación Pública, que se impartan en las escuelas e institutos oficiales, incorporados o reconocidos para la enseñanza y difusión de las bellas artes y de las artes populares;

    VII. Diseñar estrategias, mecanismos e instrumentos, así como fomentar la elaboración de programas, proyectos y acciones para promover y difundir la cultura, la historia y las artes, así como impulsar la formación de nuevos públicos, en un marco de participación corresponsable de los sectores público, social y privado;

    VIII. Promover los medios para la difusión y desarrollo de la cultura, atendiendo la diversidad cultural en todas sus manifestaciones y expresiones;

    IX. Planear, dirigir y coordinar las tareas relacionadas con las lenguas indígenas, así como fomentar su conservación;

    X. Promover e impulsar la investigación, conservación y promoción de la historia, las tradiciones y el arte popular;

    XI. Fomentar las relaciones de orden cultural con otros países; facilitar la celebración de convenios de intercambio de educandos en las especialidades de las artes y la cultura universal; y definir la proyección de la cultura mexicana en el ámbito internacional, tanto bilateral como multilateral, con la colaboración de la Secretaría de Relaciones Exteriores;

    XII. Promover la producción cinematográfica, de radio y televisión y en la industria editorial temas de interés cultural y artístico y de aquéllas tendientes al mejoramiento cultural y la propiedad del idioma nacional, así como diseñar, promover y proponer directrices culturales y artísticos en dichas producciones;

    XIII. Dirigir y coordinar la administración de las estaciones radiodifusoras y televisoras pertenecientes al Ejecutivo Federal, que transmitan programación con contenido preponderantemente cultural, con exclusión de las que dependan de otras dependencias;

    XIV. Estimular el desarrollo y mejoramiento del teatro en el país, así como organizar concursos para autores, actores y escenógrafos;

    XV. Otorgar becas para que los estudiantes de nacionalidad mexicana puedan realizar investigaciones o completar ciclos de estudios relacionados con las artes en el extranjero;

    XVI. Promover e impulsar, en coordinación con otras dependencias, el uso de las tecnologías de la información y comunicación para la difusión y desarrollo de la cultura, así como de los bienes y servicios culturales que presta el Estado, atendiendo a la diversidad cultural en todas sus manifestaciones y expresiones con pleno respeto a la libertad creativa, conforme a las disposiciones aplicables;

    XVII. Ejercer todas las atribuciones que la Ley General de Bienes Nacionales y la Ley Federal sobre Monumentos Arqueológicos, Artísticos e Históricos establecen respecto de monumentos arqueológicos, artísticos e históricos, así como respecto de las zonas de monumentos arqueológicos, artísticos e históricos;

    XVIII. Organizar, controlar y mantener actualizado el registro de la propiedad literaria y artística, así como ejercer las facultades en materia de derechos de autor y conexos de conformidad con lo dispuesto en la Ley Federal del Derecho de Autor;

    XIX. Formular el catálogo del patrimonio histórico nacional;

    XX. Formular y manejar el catálogo de los monumentos nacionales;

    XXI. Organizar, sostener y administrar museos históricos, arqueológicos y artísticos, pinacotecas y galerías, a efecto de cuidar la integridad, mantenimiento y conservación de tesoros históricos y artísticos del patrimonio cultural del país;

    XXII Establecer Consejos Asesores, de carácter interinstitucional, en los que también podrán participar especialistas en las materias competencia de la Secretaría;

    XXIII. Elaborar y suscribir convenios, acuerdos, bases de coordinación y demás instrumentos jurídicos con órganos públicos o privados, nacionales e internacionales, en asuntos de su competencia, y

    XXIV. Los demás que le fijen expresamente las leyes y reglamentos.

    ARTÍCULO SEGUNDO

    Se REFORMAN los artículos 2, párrafo décimo cuarto; 5, apartados A y B; 6, párrafo primero; 11, párrafo primero; 12; 14, fracciones I, II, IX y X; 19 y 20, párrafo primero, y se ADICIONAN un segundo párrafo al artículo 6 y una fracción II Bis al artículo 14 de la Ley de Fomento para la Lectura y el Libro, para quedar como sigue:

    Artículo 2.- …

    Bibliotecas escolares y de aula: Acervos bibliográficos que la Secretaría de Educación Pública y la Secretaría de Cultura, con la concurrencia de las autoridades locales, selecciona, adquiere y distribuye para su uso durante los procesos de enseñanza y aprendizaje en las aulas y las escuelas públicas de educación básica.

    Artículo 5.- …

    A. La Secretaría de Cultura;

    B. La Secretaría de Educación Pública;

    C. y D. …

    Artículo 6.- Corresponde a la Secretaría de Cultura y a la Secretaría de Educación Pública, de manera concurrente y considerando la opinión y propuestas del Consejo Nacional de Fomento para el Libro y la Lectura:

    I. y II. …

    El Programa de Fomento para el Libro y la Lectura será expedido por el Secretario de Cultura.

    Artículo 11.- Corresponde a la Secretaría de Cultura:

    I. a VI. …

    Artículo 12.- Se crea el Consejo Nacional de Fomento para el Libro y la Lectura como un órgano consultivo de la Secretaría de Cultura y espacio de concertación y asesoría entre todas las instancias públicas, sociales y privadas vinculadas al libro y la lectura.

    Artículo 14.- …

    I. Un presidente, que será el titular de la Secretaría de Cultura. En su ausencia será suplido por quien éste designe;

    II. Un secretario ejecutivo que designe el presidente del Consejo. En ausencia del secretario ejecutivo será suplido por quien éste designe;

    II Bis. Un represente de la Secretaría de Educación Pública que designe su titular;

    III. a VIII. …

    IX. El Director General de Publicaciones de la Secretaría de Cultura;

    X. El Director General de Bibliotecas de la Secretaría de Cultura;

    XI. a XV. …

    Artículo 19.- La Secretaría de Cultura y la Secretaría de Educación Pública, son las instancias responsables de incentivar y promover la concurrencia, vinculación y congruencia de los programas y acciones de los distintos órdenes de gobierno, con base en los objetivos, estrategias y prioridades de la política nacional de fomento a la lectura y el libro.

    Artículo 20.- Para impulsar la coordinación interinstitucional e intergubernamental en la aplicación de la presente Ley, la Secretaría de Cultura deberá:

    I. a III. …

    ARTÍCULO TERCERO

    Se REFORMA el artículo 15, inciso r) de la Ley de Cooperación Internacional para el Desarrollo, para quedar como sigue:

    Artículo 15. …

    a) a q) …

    r) Secretaría de Cultura, y

    s) …

    ARTÍCULO CUARTO

    Se REFORMAN los artículos 14, párrafo primero y 16, párrafo segundo, numerales 1 y 5 de la Ley General de Derechos Lingüísticos de los Pueblos Indígenas, para quedar como sigue:

    ARTÍCULO 14. Se crea el Instituto Nacional de Lenguas Indígenas, como organismo descentralizado de la Administración Pública Federal, de servicio público y social, con personalidad jurídica y patrimonio propio, sectorizado en la Secretaría de Cultura, cuyo objeto es promover el fortalecimiento, preservación y desarrollo de las lenguas indígenas que se hablan en el territorio nacional, el conocimiento y disfrute de la riqueza cultural de la Nación, y asesorar a los tres órdenes de gobierno para articular las políticas públicas necesarias en la materia. Para el cumplimiento de este objeto, el Instituto tendrá las siguientes características y atribuciones:

    a) a l) …

    ARTÍCULO 16. …

    1).- El Secretario de Cultura, quien lo presidirá en su carácter de titular de la coordinadora de sector, con fundamento en lo establecido en la Ley Federal de Entidades Paraestatales.

    2).- a 4).- …

    5).- Un representante de la Secretaría de Educación Pública.

    6).- y 7).- …

    ARTÍCULO QUINTO

    Se REFORMAN los artículos 36, párrafo primero y 45, fracción VII, y se ADICIONA la fracción V Bis al artículo 36 de la Ley General de Acceso de las Mujeres a una Vida Libre de Violencia, para quedar como sigue:

    ARTÍCULO 36.- El Sistema se conformará por los titulares de:

    I. a V. …

    V Bis. La Secretaría de Cultura;

    VI. a XII. …

    ARTÍCULO 45.- …

    I. a VI. …

    VII. Incorporar, con la opinión de la Secretaría de Cultura, en los programas educativos, en todos los niveles de la instrucción, el respeto a los derechos humanos de las mujeres, así como contenidos educativos tendientes a modificar los modelos de conducta sociales y culturales que impliquen prejuicios y que estén basados en la idea de la inferioridad o superioridad de uno de los sexos y en funciones estereotipadas asignadas a las mujeres y a los hombres;

    VIII. a XVI. …

    ARTÍCULO SEXTO

    Se REFORMAN los artículos 25, párrafo primero; 26, párrafo primero, y 44, párrafo primero y se ADICIONA la fracción III Bis al segundo párrafo del artículo 44 de la Ley General para la Inclusión de las Personas con Discapacidad, para quedar como sigue:

    Artículo 25. La Secretaría de Cultura promoverá el derecho de las personas con discapacidad a la cultura, el desarrollo de sus capacidades artísticas y la protección de sus derechos de propiedad intelectual. Para tales efectos, realizará las siguientes acciones:

    I. a III. …

    Artículo 26. La Secretaría de Cultura, diseñará y ejecutará políticas y programas orientados a:

    I. a VIII. …

    Artículo 44. La Junta de Gobierno del Consejo estará integrada por diez representantes del Poder Ejecutivo Federal, uno de la Comisión Nacional de los Derechos Humanos y cinco representantes de la Asamblea Consultiva.

    I. a III. …

    III Bis. Secretaría de Cultura;

    IV. a IX. …

    ARTÍCULO SÉPTIMO

    Se REFORMAN los artículos 7, fracción XIII y 21 de la Ley General de Turismo, para quedar como sigue:

    Artículo 7.- …

    I. a XII. …

    XIII. Promover con la Secretaría de Cultura, incluyendo a sus órganos administrativos desconcentrados, Instituto Nacional de Bellas Artes y Literatura e Instituto Nacional de Antropología e Historia, el patrimonio histórico, artístico, arqueológico y cultural del país, de acuerdo con el marco jurídico vigente;

    XIV. a XVIII. …

    Artículo 21. La Secretaría en conjunto con la Secretaría de Cultura, promoverá programas que difundan la importancia de respetar y conservar el patrimonio histórico, artístico, arqueológico y cultural, así como mostrar un espíritu de servicio y hospitalidad hacia el turista nacional y extranjero.

    ARTÍCULO OCTAVO

    Se REFORMAN los artículos 6, fracción III; 35; 44; 45; 48; 108 y 123, así como la denominación del Capítulo VII; se ADICIONAN la fracción II Bis al artículo 6, y un Capítulo VII Bis denominado “Premio Nacional de Artes y Literatura” que comprende los artículos 51-A a 51-H, y se DEROGA el segundo párrafo del artículo 46 de la Ley de Premios, Estímulos y Recompensas Civiles, para quedar como sigue:

    Artículo 6.- …

    I. y II. …

    II Bis. De Ciencias;

    III. De Artes y Literatura;

    III Bis. a XVIII. …

    Artículo 35.- La Condecoración se tramitará en la Secretaría de Gobernación, por conducto de un Consejo de Premiación compuesto por los Secretarios de Gobernación, de Educación Pública y de Cultura, y por un representante de cada una de las Cámaras del Congreso de la Unión. El Consejo será presidido por el Secretario de Gobernación.

    CAPÍTULO VII

    Premio Nacional de Ciencias

    Artículo 44.- Habrá Premio Nacional de Ciencias en cada uno de los siguientes campos:

    I. Ciencias Físico-Matemáticas y Naturales, y

    II. Tecnología, Innovación y Diseño.

    Artículo 45. Merecerán estos premios quienes, por sus producciones o trabajos docentes de investigación o de divulgación, hayan contribuido al progreso de la ciencia, de la tecnología y de la innovación.

    Artículo 46.- …

    Derogado.

    Artículo 48.- Solamente las personas físicas podrán ser beneficiarias de los premios de Ciencias. Por cada año habrá una asignación de premios, pero no será necesario que las obras o actos que acrediten su merecimiento, se hayan realizado dentro de ese lapso.

    CAPÍTULO VII BIS

    Premio Nacional de Artes y Literatura

    Artículo 51-A. Habrá Premio Nacional de Artes y Literatura en cada uno de los siguientes campos:

    I. Lingüística y Literatura;

    II. Bellas Artes;

    III. Historia, Ciencias Sociales y Filosofía, y

    IV. Artes y Tradiciones Populares.

    Artículo 51-B. Merecerán estos premios quienes, por sus producciones o trabajos docentes de investigación o de divulgación, hayan contribuido a enriquecer el acervo cultural del país o el progreso del arte o de la filosofía.

    Artículo 51-C. El premio se tramitará en la Secretaría de Cultura, cuyo titular presidirá el Consejo de Premiación. Este se integrará, además, con el Rector de la Universidad Nacional Autónoma de México, el de la Universidad Autónoma Metropolitana, los Directores Generales del Instituto Politécnico Nacional y del Consejo Nacional de Ciencia y Tecnología y por sendos representantes de la Asociación Nacional de Universidades e Institutos de Enseñanza Superior y del Colegio Nacional.

    Para el otorgamiento del premio en el campo de Artes y Tradiciones Populares, el Consejo se integrará, aparte de los representantes de las instituciones señaladas en el párrafo anterior, con los directores generales de Culturas Populares de la Secretaría de Cultura, del Instituto Nacional Indigenista y del Fondo Nacional para el Fomento de las Artesanías.

    Artículo 51-D. Los premios consistirán en venera y mención honorífica y se acompañarán de una entrega en numerario por 100 mil pesos. Podrán concurrir hasta tres personas para el premio del mismo campo, y cuando haya concurrencia, la entrega en numerario será por 50 mil pesos para cada concurrente. Si llegare a haber más de tres concurrentes, los excedentes de este número serán premiados hasta el siguiente año.

    Artículo 51-E. Solamente las personas físicas podrán ser beneficiarias de los premios de Artes y Literatura, salvo en el campo de Artes y Tradiciones Populares que podrán también otorgarse a comunidades y grupos. Por cada año habrá una asignación de premios, pero no será necesario que las obras o actos que acrediten su merecimiento, se hayan realizado dentro de ese lapso.

    Artículo 51-F. Para conceder estos premios debe mediar convocatoria y que el beneficiario haya sido propuesto conforme a ésta. Al efecto, dentro de los tres primeros meses del año, el Consejo de Premiación formulará y dará publicidad a la lista de las instituciones o agrupaciones a las que habrá de dirigirse para invitarlas a que propongan candidatos y éstas serán las únicas con facultad para hacerlo. A su vez toda institución o agrupación tienen derecho de dirigirse al Consejo para solicitar ser incluidas en dicha lista, a lo que se accederá si a juicio del propio Consejo se justifica la pretensión. El propio Consejo fijará los términos de la convocatoria y de su distribución.

    Artículo 5I-G. El Consejo integrará un Jurado por cada campo de premiación. A tal fin dará preferencia a quienes con anterioridad hayan obtenido el premio y podrá solicitar proposiciones de las mismas instituciones o agrupaciones incluidas en la lista a que se refiere el artículo anterior.

    Artículo 51-H. La convocatoria fijará plazos dentro de los cuales las instituciones y agrupaciones incluidas en la lista que prevé el artículo 51-F de esta Ley, podrán ampliar informaciones ante el Consejo.

    Artículo 108.- Para la entrega anual del Premio Nacional de Trabajo y Cultura Indígena, su Consejo de Premiación se integrará de la siguiente manera: un representante de la Secretaría de Desarrollo Social, un representante de la Secretaría de Cultura, un representante de la Cámara de Senadores, un representante de la Cámara de Diputados, el titular de la Comisión Nacional para el Desarrollo de los Pueblos Indígenas, el titular del Instituto Nacional de Antropología e Historia y un representante de la Comisión Nacional para el Desarrollo de los Pueblos Indígenas que estará a cargo de la Secretaría Técnica del Consejo de Premiación.

    Artículo 123.- Para la entrega del Premio Nacional de la Cerámica, el Consejo de Premiación se integrará por el Presidente de la República, el Secretario de Cultura, el titular del Fondo Nacional para el Fomento de las Artesanías, el Gobernador del Estado de Jalisco y el Presidente municipal de Tlaquepaque, localidad que será sede oficial del concurso.

    ARTÍCULO NOVENO

    Se REFORMAN los artículos 41, párrafo primero, fracción I y sus incisos g) y h); 52, y 53, párrafo primero de la Ley Federal de Cinematografía, para quedar como sigue:

    ARTÍCULO 41.- La Secretaría de Cultura tendrá las atribuciones siguientes:

    I. A través de las unidades administrativas que determine su Reglamento Interior:

    a) a f) …

    g) Procurar la difusión de la producción del cine nacional en los diversos niveles del sistema educativo, en coordinación con la Secretaría de Educación Pública.

    h) Proponer a la Secretaría de Educación Pública, el uso del cine como medio de instrucción escolar y difusión cultural extraescolar.

    i) …

    II. y III. …

    ARTÍCULO 52. La facultad de imponer las sanciones establecidas en esta Ley compete a la Secretaría de Cultura y a la Secretaría de Gobernación, sin perjuicio de aquéllas que corresponda imponer a las demás dependencias de la Administración Pública Federal.

    ARTÍCULO 53. Los infractores de los artículos 27, 39 y 40 de la presente Ley, serán sancionados por la Secretaría de Cultura, según la gravedad de la falta, la intención o dolo existente, con las sanciones siguientes:

    I. y II. …

    ARTÍCULO DÉCIMO

    Se REFORMAN los artículos 12, fracción XIII; 14, fracciones VI y IX, y 48, párrafo tercero y se ADICIONA un párrafo tercero al artículo 48, recorriéndose los actuales párrafos tercero, cuarto y quinto para ser párrafos cuarto, quinto y sexto, respectivamente de la Ley General de Educación, para quedar como sigue:

    Artículo 12.- …

    I. a XII Bis. …

    XIII.- Intervenir en la formulación de programas de cooperación internacional en materia educativa, científica, tecnológica y de educación física y deporte, así como participar con la Secretaría de Cultura en el fomento de las relaciones de orden cultural con otros países y en la formulación de programas de cooperación internacional en materia artística y cultural, y

    XIV. …

    Artículo 14.- …

    I. a V. …

    VI.- Fomentar la prestación de servicios bibliotecarios a través de las bibliotecas públicas a cargo de la Secretaría de Cultura y demás autoridades competentes, a fin de apoyar al sistema educativo nacional, a la innovación educativa y a la investigación científica, tecnológica y humanística;

    VII. y VIII. …

    IX.- Fomentar y difundir las actividades físico-deportivas, así como participar en el fomento y difusión de actividades artísticas, y culturales en todas sus manifestaciones;

    X. a XIII. …

    Artículo 48.- …

    Cuando los planes y programas de estudio se refieran a aspectos culturales, históricos, artísticos y literarios, la Secretaría de Cultura propondrá el contenido de dichos planes y programas a la Secretaría a efecto de que ésta determine lo conducente, conforme al párrafo primero de este artículo.

    Las autoridades educativas locales, previa consulta al Consejo Estatal Técnico de Educación correspondiente, propondrán para consideración y, en su caso, autorización de la Secretaría, previa opinión de la Secretaría de Cultura, contenidos regionales que -sin mengua del carácter nacional de los planes y programas citados- permitan que los educandos adquieran un mejor conocimiento de la historia, la geografía, las costumbres, las tradiciones, los ecosistemas y demás aspectos propios de la entidad y municipios respectivos.

    ARTÍCULO DÉCIMO PRIMERO

    Se REFORMA el artículo 20, párrafo primero de la Ley de Asociaciones Religiosas y Culto Público, para quedar como sigue:

    ARTÍCULO 20.- Las asociaciones religiosas nombrarán y registrarán ante las Secretarías de Gobernación y de Cultura, a los representantes responsables de los templos y de los bienes que sean monumentos arqueológicos, artísticos o históricos propiedad de la nación. Las mismas estarán obligadas a preservar en su integridad dichos bienes y a cuidar de su salvaguarda y restauración, en los términos previstos por las leyes.

    ARTÍCULO DÉCIMO SEGUNDO

    Se REFORMA el artículo 7º.-D, párrafo primero de la Ley del Servicio de Administración Tributaria, para quedar como sigue:

    Artículo 7º.-D. El Comité a que se refiere el artículo 7o.-B se integrará por ocho personas expertas en artes plásticas, que serán nombrados por la Junta de Gobierno, un representante del Servicio de Administración Tributaria y un representante de la Secretaría de Cultura. Los dos representantes mencionados en último término tendrán voz pero no voto.

    ARTÍCULO DÉCIMO TERCERO

    Se REFORMAN los artículos 147, 208 y 211 de la Ley Federal del Derecho de Autor, para quedar como sigue:

    Artículo 147.- Se considera de utilidad pública la publicación o traducción de obras literarias o artísticas necesarias para el adelanto de la ciencia, la cultura y la educación nacionales. Cuando no sea posible obtener el consentimiento del titular de los derechos patrimoniales correspondientes, y mediante el pago de una remuneración compensatoria, el Ejecutivo Federal, por conducto de la Secretaría de Cultura, de oficio o a petición de parte, podrá autorizar la publicación o traducción mencionada. Lo anterior será sin perjuicio de los tratados internacionales sobre derechos de autor y derechos conexos suscritos y aprobados por México.

    Artículo 208.- El Instituto Nacional del Derecho de Autor es un órgano administrativo desconcentrado de la Secretaría de Cultura y será la autoridad administrativa en materia de derechos de autor y derechos conexos.

    Artículo 211.- El Instituto estará a cargo de un Director General que será nombrado y removido por el Secretario de Cultura, con las facultades previstas en la presente Ley, en sus reglamentos y demás disposiciones jurídicas aplicables.

    ARTÍCULO DÉCIMO CUARTO

    Se REFORMAN los artículos 3º.; 5º.; 7º., párrafo primero; 10, fracciones I, II y III en su inciso c); 11; 12, párrafos segundo y tercero; 15 y 16 de la Ley General de Bibliotecas, para quedar como sigue:

    ARTÍCULO 3º.- Corresponde a la Secretaría de Cultura proponer, ejecutar y evaluar la política nacional de bibliotecas atendiendo al Plan Nacional de Desarrollo y demás programas correspondientes.

    ARTÍCULO 5º.- Se integra la Red Nacional de Bibliotecas Públicas con todas aquéllas constituidas y en operación dependientes de la Secretaría de Educación Pública y de la Secretaría de Cultura, así como aquéllas creadas conforme a los acuerdos o convenios de coordinación celebrados por el Ejecutivo Federal, a través de la Secretaría de Cultura con los gobiernos de los entidades federativas.

    Para la expansión de la Red el Ejecutivo Federal, por conducto de la Secretaría de Cultura, celebrará con los gobiernos de las entidades federativas y los ayuntamientos, los acuerdos de coordinación necesarios.

    ARTÍCULO 7º.- Corresponde a la Secretaría de Cultura:

    I. a XVI. …

    ARTÍCULO 10.- …

    I. Un presidente que será el titular de la Secretaría de Cultura o quien éste designe;

    II. Un Secretario Ejecutivo que recaerá en el titular de la unidad administrativa de la Secretaría de Cultura que tenga a su cargo ejecutar los programas en materia de bibliotecas, y

    III. …

    a) y b) …

    c) Los titulares de las unidades administrativas vinculadas con la labor editorial y de desarrollo tecnológico de materiales educativos de la Secretaría de Educación Pública, y

    d) …

    ARTÍCULO 11.- Las bibliotecas pertenecientes a los sectores social y privado que presten servicios con características de biblioteca pública en los términos de la presente Ley y que manifiesten su disposición a incorporarse a la Red Nacional de Bibliotecas Públicas, celebrarán con la Secretaría de Cultura o con los gobiernos de las entidades federativas, según sea el caso, el correspondiente compromiso de adhesión.

    ARTÍCULO 12.- …

    La responsabilidad de coordinar el Sistema Nacional de Bibliotecas recaerá en la Secretaría de Cultura.

    La Secretaría de Cultura organizará la Biblioteca de México con el carácter de biblioteca central para todos los efectos de la Red Nacional de Bibliotecas.

    ARTÍCULO 15.- El Sistema Nacional de Bibliotecas contará con un consejo de carácter consultivo, el que se integrará y funcionará de manera participativa conforme a las normas que emita la Secretaría de Cultura.

    ARTÍCULO 16.- Las bibliotecas cuyas características sean diferentes a las de biblioteca pública señalada en esta Ley, podrán ser incorporadas al Sistema Nacional de Bibliotecas mediante el correspondiente compromiso de integración que celebren sus titulares con la Secretaría de Cultura.

    ARTÍCULO DÉCIMO QUINTO

    Se REFORMAN los artículos 23, fracción III y 30, incisos i. y j., se ADICIONAN el artículo 17 Bis, y el inciso k del artículo 30, y se DEROGAN las fracciones IV, V, VI y VII del artículo 17 de la Ley de los Derechos de las Personas Adultas Mayores, para quedar como sigue:

    Artículo 17.- …

    I. a III. …

    IV. Derogada.

    V. Derogada.

    VI. Derogada.

    VII. Derogada.

    Artículo 17 Bis.- Corresponde a la Secretaría de Cultura, garantizar a las personas adultas mayores:

    I. El acceso a la cultura, promoviendo su expresión a través de talleres, exposiciones, concursos y eventos comunitarios, nacionales e internacionales;

    II. El acceso gratuito o con descuentos especiales a eventos culturales que promuevan las instituciones públicas o privadas, previa acreditación de edad;

    III. Programas culturales y concursos en los que participen exclusivamente personas adultas mayores, otorgando a los ganadores los reconocimientos y premios correspondientes, y

    IV. El derecho de hacer uso de las bibliotecas públicas que facilitarán el préstamo a domicilio del material de las mismas, con la presentación de su identificación personal, credencial de jubilado o pensionado y/o credencial de persona adulta mayor.

    Artículo 23. …

    I. y II. …

    III. Promover y, en su caso suscribir, en coordinación con la secretarías de Comunicaciones y Transportes, de Educación Pública y de Cultura, convenios con las empresas del ramo turístico para ofrecer tarifas especiales o gratuitas en los centros públicos o privados de entretenimiento, recreación, cultura y deporte, hospedajes en hoteles y centros turísticos.

    Artículo 30. …

    a. a h. …

    i. Instituto de Seguridad y Servicios Sociales de los Trabajadores del Estado;

    j. Secretaría de Comunicaciones y Transportes, y

    k. Secretaría de Cultura.

    ARTÍCULO DÉCIMO SEXTO

    Se REFORMAN los artículos 2, fracción II; 23, último párrafo; 30, párrafos

    primero y tercero; 62, fracción V; 64, párrafo tercero; 79, fracción VIII; 81, párrafo primero; 83, fracciones III, VI, segundo párrafo y VII; 103; 104, párrafo segundo, y 105 de la Ley General de Bienes Nacionales, para quedar como sigue:

    ARTÍCULO 2.- …

    I. …

    II. Dependencias administradoras de inmuebles: la Secretaría y las secretarías de Gobernación; Medio Ambiente y Recursos Naturales; Comunicaciones y Transportes; Cultura, y Desarrollo Agrario, Territorial y Urbano, mismas que, en relación a los inmuebles federales de su competencia, ejercerán las facultades que esta Ley y las demás leyes les confieran. Las dependencias que tengan destinados a su servicio inmuebles federales no se considerarán como dependencias administradoras de inmuebles; III. a IX. …

    ARTÍCULO 23.- …

    I. a V. …

    Tratándose de inmuebles considerados como monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, darán la intervención que corresponda conforme a la legislación aplicable, a la Secretaría de Cultura.

    ARTÍCULO 30.- La Secretaría de Cultura será competente para poseer, vigilar, conservar, administrar y controlar los inmuebles federales considerados como monumentos arqueológicos conforme a la ley de la materia, así como las zonas de monumentos arqueológicos.

    En las zonas de monumentos arqueológicos, la Secretaría de Cultura a través del Instituto Nacional de Antropología e Historia podrá otorgar permisos o autorizaciones únicamente para la realización de actividades cívicas y culturales, conforme a lo que disponga el reglamento que para tal efecto se expida, siempre y cuando no se afecte la integridad, estructura y dignidad cultural de dichas zonas y monumentos, ni se contravenga su uso común.

    ARTÍCULO 62.- …

    I. a IV. …

    V.- El dictamen de la Secretaría de Cultura que emita, a través del Instituto Nacional de Antropología e Historia o del Instituto Nacional de Bellas Artes y Literatura, según corresponda, tratándose de inmuebles federales considerados Monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente.

    ARTÍCULO 64.- …

    La Secretaría de Cultura, a través del Instituto Nacional de Antropología e Historia o del Instituto Nacional

    de Bellas Artes y Literatura, según corresponda de acuerdo a la materia, podrá asignar o reasignar a título gratuito a favor de particulares, espacios de inmuebles federales considerados monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, que tenga destinados a su servicio, únicamente cuando se trate de cumplir convenios de colaboración institucional relacionados con actividades académicas y de investigación.

    ARTÍCULO 79.- …

    I. a VII. …

    VIII. Comunicar a la Secretaría de Gobernación las personas nombradas y registradas por las asociaciones religiosas como responsables de los templos y de los bienes que estén considerados como monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, así como a la Secretaría de Cultura respecto de los responsables de estos últimos.

    ARTÍCULO 81.- Si los muebles e inmuebles federales utilizados para fines religiosos y sus anexidades están considerados como monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria

    correspondiente, a la Secretaría de Cultura le corresponderá respecto de estos bienes:

    I. a X. …

    ARTÍCULO 83.- …

    I. y II. …

    III.- Presentar las denuncias que correspondan e informar de ello inmediatamente a la Secretaría y, tratándose de inmuebles federales considerados como monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, a la Secretaría de Cultura;

    IV. a V. …

    VI. …

    En el caso de inmuebles federales considerados monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, las asociaciones religiosas deberán obtener las autorizaciones procedentes de la Secretaría de Cultura, por conducto del Instituto Nacional de Antropología e Historia o del Instituto Nacional de Bellas Artes y Literatura, según corresponda, así como sujetarse a los requisitos que éstos señalen para la conservación y protección del valor artístico o histórico del inmueble de que se trate, atendiendo a lo que se refiere la fracción IV del artículo 81, así como al artículo 105 de esta Ley;

    VII. Construir con sus propios recursos, cuando las características del inmueble lo permitan, columbarios para el depósito de restos humanos áridos y cenizas, debiendo obtener previamente la autorización de la Secretaría y, en su caso, de la Secretaría de Cultura, así como cubrir los derechos que por este concepto establece la Ley Federal de Derechos;

    VIII. a X. …

    ARTÍCULO 103.- La Secretaría de Cultura, a través del Instituto Nacional de Antropología e Historia y del Instituto Nacional de Bellas Artes y Literatura, según corresponda, determinará las normas y criterios técnicos para la restauración, reconstrucción, adaptación, conservación, preservación, mantenimiento y aprovechamiento de los inmuebles federales considerados como monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, que estén destinados al servicio de las instituciones públicas.

    ARTÍCULO 104.- …

    Para la realización de obras en inmuebles federales considerados como monumentos históricos o artísticos conforme a la ley de la materia o la declaratoria correspondiente, que estén destinados al servicio de las instituciones públicas, se requerirá de la autorización previa de la Secretaría de Cultura.

    ARTÍCULO 105.- Las instituciones destinatarias realizarán las obras de construcción, reconstrucción, restauración, modificación, adaptación y de aprovechamiento de espacios de los inmuebles destinados, de acuerdo con los proyectos que formulen y, en su caso, las normas y criterios técnicos que emita la Secretaría o la Secretaría de Cultura, según corresponda. La institución destinataria interesada, podrá tramitar la adecuación presupuestaria respectiva para que, en su caso, la Secretaría o la Secretaría de Cultura en el caso de los monumentos históricos o artísticos, a través de sus órganos competentes, realicen tales obras, conforme al convenio que al efecto suscriban con sujeción a las disposiciones jurídicas aplicables.

    ARTÍCULO DÉCIMO SÉPTIMO

    Se REFORMAN los artículos 39 Bis y 40 de la Ley sobre el Escudo, la Bandera y el Himno Nacionales, para quedar como sigue:

    ARTÍCULO 39 Bis.- Los pueblos y las comunidades indígenas podrán ejecutar el Himno Nacional, traducido a la lengua que en cada caso corresponda. Para tales efectos, se faculta al Instituto Nacional de Lenguas Indígenas para realizar las traducciones correspondientes, las cuales deberán contar con la autorización de la Secretaría de Gobernación y de la Secretaría de Cultura.

    Los pueblos y comunidades indígenas podrán solicitar a las secretarías de Gobernación y de Cultura la autorización de sus propias traducciones del Himno Nacional. La Secretaría de Gobernación llevará el registro de las traducciones autorizadas.

    ARTÍCULO 40.- Todas las ediciones o reproducciones del Himno Nacional requerirán autorización de las secretarías de Gobernación y de Cultura. Los espectáculos de teatro, cine, radio y televisión, que versen sobre el Himno Nacional y sus autores, o que contengan motivos de aquél, necesitarán de la aprobación de las Secretarías de Gobernación y Cultura, según sus respectivas competencias. Las estaciones de radio y de televisión podrán transmitir el Himno Nacional íntegro o fragmentariamente, previa autorización de la Secretaría de Gobernación, salvo las transmisiones de ceremonias oficiales.

    ARTÍCULO DÉCIMO OCTAVO

    Se REFORMA el artículo 218 y se ADICIONA el artículo 218 Bis de la Ley Federal de Telecomunicaciones y Radiodifusión, para quedar como sigue:

    Artículo 218. Corresponde a la Secretaría de Educación Pública:

    I. En los términos establecidos en las disposiciones que en materia de Estrategia Digital emita el Ejecutivo Federal, promover en coordinación con la Secretaría, el uso de las tecnologías de la información y la comunicación en el sector de educación;

    II. Elaborar y difundir programas de carácter educativo y recreativo para la población infantil, y

    III. Las demás que le confieran esta Ley y otras disposiciones legales.

    Artículo 218 Bis. Corresponde a la Secretaría de Cultura:

    I. Promover la transmisión de programas de interés cultural y cívico;

    II. Intervenir en materia de radiodifusión para proteger los derechos de autor, en los términos establecidos en la Ley Federal del Derecho de Autor, y

    III. Las demás que le confieran esta Ley y otras disposiciones legales.

    ARTÍCULO DÉCIMO NOVENO

    Se REFORMAN los artículos 1º.; 2º., segundo párrafo, fracciones V, XI y XVII; 6º. y 7º., fracciones III, VII, IX, X y XII de la Ley Orgánica del Instituto Nacional de Antropología e

    Historia, para quedar como sigue:

    ARTÍCULO 1º.- El Instituto Nacional de Antropología e Historia tiene personalidad jurídica propia y depende de la Secretaría de Cultura.

    ARTÍCULO 2º.- …

    I. a IV. …

    V. Proponer al Secretario de Cultura la celebración de acuerdos de coordinación con las autoridades federales, estatales y municipales, tendientes a la mejor protección y conservación del patrimonio histórico, arqueológico y paleontológico de la nación y del carácter típico y tradicional de las ciudades y poblaciones.

    VI. a X. …

    XI. Proponer al Secretario de Cultura las declaratorias de zonas y monumentos arqueológicos e históricos y de restos paleontológicos, sin perjuicio de la facultad del ejecutivo para expedirlas directamente;

    XII. a XVI. …

    XVII. Impulsar, previo acuerdo del Secretario de Cultura, la formación de Consejos consultivos estatales para la protección y conservación del patrimonio arqueológico, histórico y paleontológico, conformados por instancias estatales y municipales, así como por representantes de organizaciones sociales, académicas y culturales que se interesen en la defensa de este patrimonio.

    XVIII. a XXI. …

    ARTÍCULO 6º.- El Instituto estará a cargo de un Director General, nombrado y removido libremente por el Secretario de Cultura.

    Para ser Director General del Instituto Nacional de Antropología e Historia se requiere ser mexicano por nacimiento, estar en pleno goce y ejercicio de sus derechos civiles y políticos, mayor de 30 años de edad, con grado académico y méritos reconocidos en alguna de las materias de competencia del Instituto.

    ARTÍCULO 7º.- …

    I. y II. …

    III. Acordar con el Secretario de Cultura los asuntos de su competencia.

    IV. a VI. …

    VII. Proponer al Secretario de Cultura los proyectos de reglamentos y aprobar los manuales internos necesarios para el funcionamiento y operación del Instituto.

    VIII. a IX. …

    X. Presentar al Secretario de Cultura un informe anual de actividades del Instituto y el programa de trabajo anual a desarrollar.

    XI. …

    XII. Las demás que le confieran otras leyes, los reglamentos y el Secretario de Cultura.

    ARTÍCULO VIGÉSIMO

    Se REFORMAN los artículos 2º., primer párrafo y su fracción II; 7º.; 8º.; 10; 12; 15 y 16 de la Ley que Crea el Instituto Nacional de Bellas Artes y Literatura, para quedar como sigue:

    ARTÍCULO 2º.- El Instituto Nacional de Bellas Artes y Literatura dependerá de la Secretaría de Cultura y tendrá las funciones siguientes:

    I. …

    II. La organización y desarrollo de la educación profesional en todas las ramas de las Bellas Artes; así como participar en la implementación de los programas y planes en materia artística y literaria que establezca la Secretaría de Educación Pública para la educación inicial, básica y normal.

    Para la coordinación, planeación, organización y funcionamiento a que se refiere esta fracción, se creará un Consejo Técnico Pedagógico como órgano del Instituto Nacional de Bellas Artes y Literatura, que bajo la presidencia de su director se integrará con representantes de las unidades administrativas de la Secretaría de Cultura y de la Secretaría de Educación Pública, así como de las unidades administrativas del propio Instituto.

    III. a V. …

    ARTÍCULO 7º.- El Instituto estará regido por un Director y un Subdirector Generales nombrados por el C. Secretario de Cultura, sus funciones serán las que señale el Reglamento correspondiente y serán designados escogiéndose entre personas que hayan realizado en la rama artística de su especialidad obra de notoria importancia y de mérito superior. Los directores, jefes de departamento y en general los técnicos del Instituto deberán tener la misma calidad y serán designados por el C. Secretario de Cultura, a propuesta del Director General del Instituto, debiendo tener en todo caso el carácter de empleados de confianza.

    ARTÍCULO 8º.- El personal que no esté considerado en el artículo anterior y que no forme parte del que la Secretaría de Cultura con cargo a su propio presupuesto destine al Instituto, será designado por el Director General del mismo, quien tendrá facultad para delegar esta función y sólo para determinada clase de empleados en los directores técnicos o administrativos competentes.

    ARTÍCULO 10.- El Consejo del Instituto funcionará como Cuerpo Consultivo en asuntos técnicos que no sean por su naturaleza de la exclusiva competencia del Consejo Técnico Pedagógico y en materia administrativa tendrá, además de las funciones que deriven de los términos de la presente Ley, específicamente la de formular y proponer a la Secretaría de Cultura los presupuestos anuales del propio Instituto.

    ARTÍCULO 12.- La administración interna del Instituto, la vigilancia de su marcha y el manejo de las erogaciones aprobadas por la Secretaría de Cultura estarán a cargo de un Jefe de Departamento Administrativo, subordinado jerárquicamente al Director General y realizará sus labores en los términos que al efecto prevenga el reglamento respectivo. El Jefe del Departamento Administrativo será designado por el Secretario de Cultura a propuesta del Director General y será en todo caso considerado como empleado de confianza que deba rendir fianza.

    ARTÍCULO 15.- El Gobierno Federal, por conducto de su Secretaría de Cultura, asignará anualmente al Instituto el subsidio y las partidas presupuestales necesarias para su funcionamiento.

    ARTÍCULO 16.- Corresponderá a la Secretaría de Cultura, a través del Instituto otorgar el premio nacional de Arte y Literatura, en términos de la Ley de Premios, Estímulos y Recompensas Civiles.

    TRANSITORIOS

    PRIMERO.

    El presente Decreto entrará en vigor el día siguiente al de su publicación en el Diario Oficial de la Federación.

    SEGUNDO.

    El Consejo Nacional para la Cultura y las Artes se transforma en la Secretaría de Cultura, por lo que todos sus bienes y recursos materiales, financieros y humanos se transferirán a la mencionada Secretaría, junto con los expedientes, archivos, acervos y demás documentación, en cualquier formato, que se encuentre bajo su resguardo.

    A partir de la entrada en vigor del presente Decreto, las menciones contenidas en leyes, reglamentos y disposiciones de cualquier naturaleza, respecto del Consejo Nacional para la Cultura y las Artes, se entenderán referidas a la Secretaría de Cultura.

    TERCERO.

    Los derechos laborales de los trabajadores que presten sus servicios en el Consejo Nacional para la Cultura y las Artes, en la Secretaría de Educación Pública, en los órganos administrativos desconcentrados y en las entidades paraestatales que, con motivo de la entrada en vigor del presente Decreto, queden adscritos o coordinados a la Secretaría de Cultura, respectivamente, serán respetados en todo momento, de conformidad con lo dispuesto en las leyes y demás disposiciones aplicables.

    CUARTO.

    El Instituto Nacional de Antropología e Historia y el Instituto Nacional de Bellas Artes y Literatura, continuarán rigiéndose por sus respectivas leyes y demás disposiciones aplicables y dependerán de la Secretaría de Cultura, misma que ejercerá las atribuciones que en dichos ordenamientos se otorgaban a la Secretaría de Educación Pública.

    Los órganos administrativos desconcentrados denominados Radio Educación e Instituto Nacional de Estudios Históricos de las Revoluciones de México, se adscribirán a la Secretaría de Cultura y mantendrán su naturaleza jurídica.

    QUINTO.

    La Secretaría de Cultura integrará los diversos consejos, comisiones intersecretariales y órganos colegiados previstos en las disposiciones jurídicas aplicables, según el ámbito de sus atribuciones.

    SEXTO.

    Los asuntos que se encuentren en trámite a la entrada en vigor del presente Decreto y sean competencia de la Secretaría de Cultura conforme a dicho Decreto, continuarán su despacho por esta dependencia, conforme a las disposiciones jurídicas aplicables.

    SÉPTIMO.

    Todas las disposiciones, normas, lineamientos, criterios y demás normativa emitida por el Consejo Nacional para la Cultura y las Artes continuará en vigor hasta en tanto las unidades administrativas competentes de la Secretaría de Cultura determinen su modificación o abrogación.

    Asimismo, todas las disposiciones, lineamientos, criterios y demás normativa emitida por el Secretario de Educación Pública que contengan disposiciones concernientes al Consejo Nacional para la Cultura y las Artes o los órganos administrativos desconcentrados que éste coordina, continuará en vigor en lo que no se opongan al presente Decreto, en tanto las unidades administrativas competentes de la Secretaría de Cultura determinen su modificación o abrogación.

    OCTAVO.

    Las atribuciones y referencias que se hagan a la Secretaría de Educación Pública o al Secretario de Educación Pública que en virtud del presente Decreto no fueron modificadas, y cuyas disposiciones prevén atribuciones y competencias en las materias de cultura y arte que son reguladas en este Decreto se entenderán referidas a la Secretaría de Cultura o Secretario de Cultura.

    NOVENO.

    Las erogaciones que se generen con motivo de la entrada en vigor de este Decreto, se cubrirán con cargo al presupuesto aprobado al Consejo Nacional para la Cultura y las Artes, así como a las entidades paraestatales y órganos administrativos desconcentrados que quedan agrupados en el sector coordinado por la Secretaría de Cultura, por lo que no se autorizarán recursos adicionales para tal efecto durante el ejercicio fiscal que corresponda, sin perjuicio de aquellos recursos económicos que, en su caso, puedan destinarse a los programas o proyectos que esa dependencia del Ejecutivo Federal considere prioritarios, con cargo al presupuesto autorizado para tales efectos y en términos de las disposiciones aplicables.

    DÉCIMO.

    Se derogan todas las disposiciones que se opongan a lo dispuesto en el presente Decreto.

    México, D.F., a 15 de diciembre de 2015.

    Dip. José de Jesús Zambrano Grijalva, Presidente.-

    Sen. Roberto Gil Zuarth, Presidente.-

    Dip. Verónica Delgadillo García, Secretaria.-

    Sen. María Elena Barrera Tapia, Secretaria.-

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia del Poder Ejecutivo Federal, en la Ciudad de México, Distrito Federal, a dieciséis de diciembre de dos mil quince.-

    Enrique Peña Nieto.-

    El Secretario de Gobernación, Miguel Ángel Osorio Chong.-

    04May/21

    Decreto de 26 de abril de 2016 (Diario Oficial, Miércoles 1 de junio de 2016)

    Decreto de 26 de abril de 2016 (Diario Oficial, Miércoles 1 de junio de 2016). Decreto por el que se reforma el artículo 230 de la Ley Federal de Telecomunicaciones y Radiodifusión.

    SECRETARIA DE COMUNICACIONES Y TRANSPORTES

    DECRETO por el que se reforma el artículo 230 de la Ley Federal de Telecomunicaciones y Radiodifusión.

    ENRIQUE PEÑA NIETO,

    Presidente de los Estados Unidos Mexicanos, a sus habitantes sabed:

    Que el Honorable Congreso de la Unión, se ha servido dirigirme el siguiente

    DECRETO

    “EL CONGRESO GENERAL DE LOS ESTADOS UNIDOS MEXICANOS, DECRETA:

    SE REFORMA EL ARTÍCULO 230 DE LA LEY FEDERAL DE TELECOMUNICACIONES Y RADIODIFUSIÓN.

    Artículo Único.

    Se reforma el párrafo primero del artículo 230 de la Ley Federal de Telecomunicaciones y Radiodifusión, para quedar como sigue:

    Artículo 230.

    En sus transmisiones, las estaciones radiodifusoras de los concesionarios podrán hacer uso de cualquiera de las leguas nacionales de conformidad con las disposiciones legales aplicables. Las concesiones de uso social indígena podrán hacer uso de la lengua del pueblo originario que corresponda.

    Transitorio

    Único.

    El presente Decreto entrará en vigor al día siguiente de su publicación en el Diario Oficial de la Federación.

    Ciudad de México, a 26 de abril de 2016.

    Dip. José de Jesús Zambrano Grijalva,

    Presidente.- Sen. Roberto Gil Zuarth,

    Presidente.- Dip. Ramón Bañales Arambula,

    Secretario.- Sen. César Octavio Pedroza Gaitán,

    Secretario.- Rúbricas.”

    En cumplimiento de lo dispuesto por la fracción I del Artículo 89 de la Constitución Política de los Estados Unidos Mexicanos, y para su debida publicación y observancia, expido el presente Decreto en la Residencia del Poder Ejecutivo Federal, en la Ciudad de México, a veintisiete de mayo de dos mil dieciséis.-

    Enrique Peña Nieto.-

    El Secretario de Gobernación, Miguel Ángel Osorio Chong.-

    03May/21

    Access to Information Act nº 31 of 2016.

    Access to Information Act nº 31 of 2016. [Kenya Gazette Supplement nº 152 (Acts nº 31) NAIROBI, 7th September, 2016]

    Nº 31 OF 2016

    ACCESS TO INFORMATION ACT

    (Date of assent: 31st August, 2016.)

    (Date of commencement: 21st September, 2016.)

    AN ACT of Parliament to give effect to Article 35 of the Constitution; to confer on the Commission on Administrative Justice the oversight and enforcement functions and powers and for connected purposes

    PART I. PRELIMINARY

    1. Short title

    This Act may be cited as the Access to Information Act, 2016.

    2. Interpretation

    In this Act, unless the context otherwise requires:

    Cabinet Secretary” means the Cabinet Secretary for the time being responsible for matters relating to information;

    chief executive officer” of a public body or private body means the Principal Secretary in the case of a Government Ministry or Department, managing director in the case of a corporate body, or the person assigned the principal administrative responsibility in any body by whatever title; and

    citizen” means any individual who has Kenyan citizenship, and any private entity that is controlled by one or more Kenyan citizens.

    Commission” means the Commission on Administrative Justice established by section 3 of the Commission on Administrative Justice Act, nº 23 of 2011;

    edited copy” in relation to a document, means a copy of a document from which exempt information has been deleted;

    electronic record” means a record generated in digital form by an information system, which can be transmitted within an information system or from one information system to another and stored in an information system or other medium;

    exempt information” means information that may be withheld by a public entity or private body in accordance with section 6;

    information” includes all records held by a public entity or a private body, regardless of the form in which the information is stored, its source or the date of production;

    information access officer” means any officer of a public entity or private body designated under section 7 as such for purposes of this Act;

    interested party” means a person who has an identifiable stake or legal interest in the proceedings before the court but is not a party to the proceedings or may not be directly involved in the litigation;

    national security” has the same meaning assigned to it by Article 238(1) of the Constitution;

    person” has the meaning assigned to it in Article 260 of the Constitution;

    personal information” means information about an identifiable individual, including, but not limited to:

    (a) information relating to the race, gender, sex, pregnancy, marital status, national, ethnic or social origin, colour, age, physical, psychological or mental health, well-being, disability, religion, conscience, belief, culture, language and birth of the individual;

    (b) information relating to the education or the medical, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved;

    (c) any identifying number, symbol or other particular assigned to the individual;

    (d) the fingerprints, blood type, address, telephone or other contact details of the individual;

    (e) a person’s opinion or views over another person;

    (f) correspondence sent by the individual that is implicitly or explicitly of a private or confidential nature or further correspondence that would reveal the contents of the original correspondence;

    (g) any information given in support or in relation to an award or grant proposed to be given to another person;

    (h) contact details of an individual.

    private body” means any private entity or non-state actor that:

    (a) receives public resources and benefits, utilizes public funds, engages in public functions, provides public services, has exclusive contracts to exploit natural resources (with regard to said funds, functions, services or resources); or

    (b) is in possession of information which is of significant public interest due to its relation to the protection of human rights, the environment or public health and safety, or to exposure of corruption or illegal actions or where the release of the information may assist in exercising or protecting any right;

    public entity” means:

    (a) any public office, as defined in Article 260 of the Constitution; or

    (b) any entity performing a function within a commission, office, agency or other body established under the Constitution;

    public officer” has the same meaning assigned to it by Article 260 of the Constitution;

    public record” includes any record in written or any other form containing information relating to the conduct of the public entity’s business, prepared, owned, used or retained by a public entity regardless of physical form or characteristics;

    secretary” has the meaning assigned to it by section 2 of the Commission on Administrative Justice Act, 2011;

    State” has the meaning assigned to it under Article 260 of the Constitution.

    3. Object and purpose of the Act

    The object and purpose of this Act is to:

    (a) give effect to the right of access to information by citizens as provided under Article 35 of the Constitution;

    (b) provide a framework for public entities and private bodies to proactively disclose information that they hold and to provide information on request in line with the constitutional principles;

    (c) provide a framework to facilitate access to information held by private bodies in compliance with any right protected by the Constitution and any other law;

    (d) promote routine and systematic information disclosure by public entities and private bodies on constitutional principles relating to accountability, transparency and public participation and access to information;

    (e) provide for the protection of persons who disclose information of public interest in good faith; and

    (f) provide a framework to facilitate public education on the right to access information under this Act.

    PART II. RIGHT TO INFORMATION

    4. Right to information

    (1) Subject to this Act and any other written law, every citizen has the right of access to information held by:

    (a) the State; and

    (b) another person and where that information is required for the exercise or protection of any right or fundamental freedom.

    (2) Subject to this Act, every citizen’s right to access information is not affected by:

    (a) any reason the person gives for seeking access; or

    (b) the public entity’s belief as to what are the person’s reasons for seeking access.

    (3) Access to information held by a public entity or a private body shall be provided expeditiously at a reasonable cost.

    (4) This Act shall be interpreted and applied on the basis of a duty to disclose and non-disclosure shall be permitted only in circumstances exempted under section 6.

    (5) Nothing in this Act shall limit the requirement imposed under this Act or any other written law on a public entity or a private body to disclose information.

    5. Disclosure of information by public entities

    (1) Subject to section 6, a public entity shall:

    (a) facilitate access to information held by such entity and which information may include:

    (i) the particulars of its organization, functions and duties;

    (ii) the powers and duties of its officers and employees;

    (iii) the procedure followed in the decision making process, including channels of supervision and accountability;

    (iv) salary scales of its officers by grade;

    (v) the norms set by it for the discharge of its functions;

    (vi) guidelines used by the entity in its dealings with the public or with corporate bodies, including the rules, regulations, instructions, manuals and records, held by it or under its control or used by its employees for discharging its functions; and

    (vii) a guide sufficient to enable any person wishing to apply for information under this Act to identify the classes of information held by it, the subjects to which they relate, the location of any indexes to be inspected by any person;

    (b) during the year commencing on first January next following the first publication of information under paragraph (a), and during each succeeding year, cause to be published statements updating the information contained in the previous statement or statements published under that paragraph;

    (c) publish all relevant facts while formulating important policies or announcing the decisions which affect the public, and before initiating any project, or formulating any policy, scheme, programme or law, publish or communicate to the public in general or to the persons likely to be affected thereby in particular, the facts available to it or to which it has reasonable access which in its opinion should be known to them in the best interests of natural justice and promotion of democratic principles;

    (d) provide to any person the reasons for any decision taken by it in relation to that person;

    (e) upon signing any contract, publish on its website or through other suitable media the following particulars in respect of the contract entered into:

    (i) the public works, goods acquired or rented, and the contracted service, including any sketches, scopes of service and terms of reference;

    (ii) the contract sum;

    (iii) the name of the service provider, contractor or individual to whom the contract has been granted; and

    (iv) the periods within which the contract shall be completed.

    (2) Information shall be disseminated taking into consideration the need to reach persons with disabilities, the cost, local language, the most effective method of communication in that local area, and the information shall be easily accesible and available free or at cost taking into account the medium used.

    (3) At a minimum, the material referred to in subsection (1) shall be made available:

    (a) for inspection by any person without charge;

    (b) by supplying a copy to any person on request for which a reasonable charge to cover the costs of copying and supplying them may be made; and

    (c) on the internet, provided that the materials are held by the authority in electronic form.

    (4) Subsection (1)(a) shall come into operation twelve months after the commencement of this Act.

    6. Limitation of right of access to information

    (1) Pursuant to Article 24 of the Constitution, the right of access to information under Article 35 of the Constitution shall be limited in respect of information whose disclosure is likely to:

    (a) undermine the national security of Kenya;

    (b) impede the due process of law;

    (c) endanger the safety, health or life of any person;

    (d) involve the unwarranted invasion of the privacy of an individual, other than the applicant or the person on whose behalf an application has, with proper authority, been made;

    (e) substantially prejudice the commercial interests, including intelectual property rights, of that entity or third party from whom information was obtained;

    (f) cause substantial harm to the ability of the Government to manage the economy of Kenya;

    (g) significantly undermine a public or private entity’s ability to give adequate and judicious consideration to a matter concerning which no final decision has been taken and which remains the subject of active consideration;

    (h) damage a public entity’s position in any actual or contemplated legal proceedings; or

    (i) infringe professional confidentiality as recognized in law or by the rules of a registered association of a profession.

    (2) For purposes of subsection (1)(a), information relating to national security includes:

    (a) military strategy, covert operations, doctrine, capability, capacity or deployment;

    (b) foreign government information with implications on national security;

    (c) intelligence activities, sources, capabilities, methods or cryptology;

    (d) foreign relations;

    (e) scientific, technology or economic matters relating to national security;

    (f) vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans or protection services relating to national security;

    (g) information obtained or prepared by any government institution that is an investigative body in the course of lawful investigations relating to the detection, prevention or suppression of crime, enforcement of any law and activities suspected of constituting threats to national security;

    (h) information between the national and county governments deemed to be injurious to the conduct of affairs of the two levels of government;

    (i) cabinet deliberations and records;

    (j) information that should be provided to a State organ, independent office or a constitutional commission when conducting investigations, examinations, audits or reviews in the performance of its functions;

    (k) information that is referred to as classified information in the Kenya Defence Forces Act; and

    (l) any other information whose unauthorized disclosure would prejudice national security.

    (3) Subsection (1)(d) and (e) shall not apply if a request for information relates to the results of any product or environmental testing, and the information concerned reveals a serious public safety or environmental risk.

    (4) Despite anything contained in subsections (1) and (2), a public entity or private body may be required to disclose information where the public interest in disclosure outweighs the harm to protected interests as shall be determined by a Court.

    (5) A public entity is not obliged to supply information to a requester if that information is reasonably accessible by other means.

    (6) In considering the public interest referred in subsection (4), particular regard shall be had to the constitutional principles on the need to:

    (a) promote accountability of public entities to the public;

    (b) ensure that the expenditure of public funds is subject to effective oversight;

    (c) promote informed debate on issues of public interest;

    (d) keep the public adequately informed about the existence of any danger to public health or safety or to the environment; and

    (e) ensure that any statutory authority with regulatory responsibilities is adequately discharging its functions.

    (7) Unless the contrary is proved by the public entity or private body, information is presumed not to be exempt if the information has been held for a period exceeding thirty years.

    PART III. ACCESS TO INFORMATION

    7. Designation of information access officer

    (1) A chief executive officer of a public entity shall be an information Access officer for purposes of this Act.

    (2) A chief executive officer of a public entity may delegate the performance of his or her duties as an information access officer under this Act to any officer of the public entity.

    8. Application for access

    (1) An application to access information shall be made in writing in English or Kiswahili and the applicant shall provide details and sufficient particulars for the public officer or any other official to understand what information is being requested.

    (2) Where an applicant is unable to make a written request for access to information in accordance with subsection (1) because of illiteracy or disability, the information officer shall take the necessary steps to ensure that the applicant makes a request in manner that meets their needs.

    (3) The information officer shall reduce to writing, in a prescribed form the request made under subsection (2) and the information officer shall then furnish the applicant with a copy of the written request.

    (4) A public entity may prescribe a form for making an application to Access information, but any such form shall not be such as to unreasonably delay requests or place an undue burden upon applicants and no application may be rejected on the ground only that the applicant has not used the prescribed form.

    9. Processing of application

    (1) Subject to section 10, a public officer shall make a decision on an application as soon as possible, but in any event, within twenty one days of receipt of the application

    (2) Where the information sought concerns the life or liberty of a person, the information officer shall provide the information within forty-eight hours of the receipt of the application.

    (3) The information officer to whom a request is made under subsection (2) may extend the period for response on a single occasion for a period of not more than fourteen days if:

    (a) the request is for a large amount of information or requires a search through a large amount of information and meeting the stipulated time would unreasonably interfere with the activities of the information holder; or

    (b) consultations are necessary so as to comply with the request and the consultations cannot be reasonably completed within the stipulated time.

    (4) As soon as the information access officer has made a decision as to whether to provide access to information, he or she shall immediately communicate the decision to the requester, indicating:

    (a) whether or not the public entity or private body holds the information sought;

    (b) whether the request for information is approved:

    (c) if the request is declined the reasons for making that decision, including the basis for deciding that the information sought is exempt, unless the reasons themselves would be exempt information; and

    (d) if the request is declined, a statement about how the requester may appeal to the Commission;

    (5) A public officer referred to in subsection (1) may seek the assistance of any other public officer as the first mentioned public officer considers necessary for the proper discharge of his or her duties and such other public officer shall render the required assistance.

    (6) Where the applicant does not receive a response to an application within the period stated in subsection (1), the application shall be deemed to have been rejected.

    10. Transfer of application

    (1) An information access officer may, not later than five days from the date of receipt of an application, transfer the application or any relevant part of it, to another public entity, if the information requested is held by that other public entity.

    (2) Where an application is transferred under subsection (1), an information access officer shall inform the applicant immediately but in any event not later tan seven days from the date of receipt of the application, about such transfer.

    (3) A public entity to which an application is referred by an information Access officer under subsection (1) shall make a decision on the application within twentyone days from the date that the application was first made.

    (4) The provisions of this section shall apply with the necessary modification to an application for access to information that is made to a private body to which this Act applies.

    11. Providing access to information

    (1) Where a decision is taken to provide the information applied for, an information access officer shall send to the applicant a written response within fifteen working days of receipt of the application, advising:

    (a) that the application has been granted;

    (b) that the information will be contained in an edited copy, where applicable;

    (c) the details of any fees or further fees to be paid for access, together with the calculations made to arrive at the amount of the fee;

    (d) the method of payment of such fees, if any;

    (e) the proposed process of accessing the information once the payment if any is made; and

    (f) that an appeal may be made to the Commission in respect of the amount of fees required or the form of access proposed to be provided.

    (2) Subject to subsection (3), upon receipt of the fee payable, an information access officer shall provide the information to the applicant or permit the relevant inspection immediately but in any event not later than two working days from the date of receipt of the payment.

    (3) Any information to be made accessible to an applicant shall be produced forthwith at the place where it is kept, for inspection in the form in which it is held unless the applicant requests that it be made available in another form and, if it is practicable to do so, such information may be copied, reproduced or used for conversion to a sound transmission at the expense of the applicant.

    (4) Where a request for information is to a private body, subsections (1), (2), and (3) shall apply with necessary changes made.

    12. Fees

    (1) No fee may be levied in relation to the submission of an application.

    (2) A public entity or private body from which an application for access to information has been made may charge a prescribed fee for the provision of the information and the fee shall not exceed the actual costs of making copies of such information and if applicable, supplying them to the applicant.

    (3) Subject to subsection (2), the Cabinet Secretary shall make regulations prescribing the fees payable for expenses incurred in providing information to an applicant.

    13. Correction of information

    (1) At the request of the applicant, a public entity or private body shall within reasonable time, at its own expense, correct, update or annotate any personal information held by it relating to the applicant, which is out of date, inaccurate or incomplete.

    (2) A request under this section shall be made in writing to the public entity responsible for the maintenance of the record system containing the out of date, inaccurate or incomplete information and shall:

    (a) state that it is a request to amend certain personal information relating to the applicant;

    (b) specify the personal information that is to be amended indicating how such information is out of date, inaccurate or incomplete; and

    (c) specify the remedy sought by the applicant.

    PART IV. REVIEW OF DECISIONS BY THE COMMISSION

    14. Review of decisions by the Commission

    (1) Subject to subsection (2), an applicant may apply in writing to the Commission requesting a review of any of the following decisions of a public entity or private body in relation to a request for access to information:

    (a) a decision refusing to grant access to the information applied for;

    (b) a decision granting access to information in edited form;

    (c) a decision purporting to grant access, but not actually granting the access in accordance with an application;

    (d) a decision to defer providing the access to information;

    (e) a decision relating to imposition of a fee or the amount of the fee;

    (f) a decision relating to the remission of a prescribed application fee;

    (g) a decision to grant access to information only to a specified person; or

    (h) a decision refusing to correct, update or annotate a record of personal information in accordance with an application made under section 13.

    (2) An application under subsection (1) shall be made within thirty days, or such further period as the Commission may allow, from the day on which the decisión is notified to the applicant.

    (3) The Commission may, on its own initiative or upon request by any person, review a decision by a public entity refusing to publish information that it is required to publish under this Act.

    (4) The procedure for submitting a request for a review by the Commission shall be the same as the procedure for lodging complaints with the Commission stipulated under section 22 of this Act or as prescribed by the Commission.

    15. Notice to interested party

    In reviewing a decision in terms of this Act, the Commission may, where necessary, give notice to any third party to whom the information relates unless the necessary steps to locate the third party have been unsuccessful.

    16. Protection of person making disclosure

    (1) A person shall not be penalized in relation to any employment, profession, voluntary work, contract, membership of an organization, the holding of an office or in any other way, as a result of having made or proposed to make a disclosure of information which the person obtained in confidence in the course of that activity, if the disclosure is of public interest.

    (2) For purposes of subsection (1), a disclosure which is made to a law enforcement agency or to an appropriate public entity shall be deemed to be made in the public interest.

    (3) A person shall make a disclosure under subsection (1) or (2) where such person has reasonable belief in the veracity of the information.

    (4) Any person who provides false information maliciously intended to injure another person commits an offence and is liable, on conviction, to a fine not exceeding five hundred thousand shillings or to imprisonment for a term not exceeding three years, or to both.

    (5) Disclosure of information under subsection (1) and (2) includes information on:

    (a) violations of the law, including human rights violations;

    (b) mismanagement of funds;

    (c) conflict of interest;

    (d) corruption;

    (e) abuse of public office; and

    (f) dangers of public health, safety and the environment.

    (6) For the purpose of this section, a person is penalized if the person is dismissed, discriminated against, made the subject of reprisal or other form of adverse treatment or is denied any appointment, promotion or advantage that otherwise would have been provided or any other personnel action provided under the law relating to whistle blower, and the imposition of any such penalty in contravention of this section shall be actionable as a tort.

    (7) Any term of any settlement arising from a claim under this section, insofar as it purports to impose an obligation of confidentiality on any party to the settlement in respect of information which is accurate and which was or was proposed to be disclosed, shall be unenforceable.

    (8) In any proceedings for an offence for contravention of any statutory prohibition or restriction on the disclosure of information, it shall be a defence to show that:

    (a) in the circumstances, the disclosure was in the public interest; and

    (b) where the offence is alleged to have been committed by a public officer or Government contractor and involves the disclosure of information obtained by the person in the person’s position as such, the defendant had, before making the disclosure, complied with the provisions of subsection (3).

    17. Management of records

    (1) In this section, “records” means documents or other sources of information compiled, recorded or stored in written form or in any other manner and includes electronic records.

    (2) Every public entity shall keep and maintain:

    (a) records that are accurate, authentic, have integrity and useable; and

    (b) its records in a manner which facilitates the right of access to information as provided for in this Act.

    (3) At a minimum, to qualify to have complied with the duty to keep and maintain records under subsection (2), every public entity shall:

    (a) create and preserve such records as are necessary to document adequately its policies, decisions, procedures, transactions and other activities it undertakes pertinent to the implementation of its mandate;

    (b) ensure that records in its custody, including those held in electronic form, are maintained in good order and condition; and

    (c) not later than three years from the date from which this Act begins to apply to it, computerize its records and information management systems in order to facilitate more efficient access to information.

    18. Offence of alteration, defacement, blocking, erasure, etc

    (1) Where an application to access information has been made to a public entity under section 8 and the applicant would have been entitled, subject to payment of any fee, to provision of any information in accordance with that section, any person to whom this section applies commits an offence if he alters, defaces, blocks, erases, destroys or conceals any record held by the public entity, with the intention of preventing the disclosure by that entity of all, or any part, of the information provision of which the applicant would have been entitled.

    (2) Subsection (1) applies to the public entity and to any person who, is employed by, is an officer of, or is subject to the direction of, the public entity.

    (3) A person convicted of an offence under subsection (1) shall be liable to a fine not exceeding five hundred thousand shillings or to imprisonment for a term not exceeding one year, or to both.

    19. Defamatory matter in information released

    Where any information provided by a public entity or private body to an applicant under section 11 was supplied to the public entity or private body by a third person, the publication to the applicant of any defamatory matter contained in the information shall be privileged unless the publication is shown to have been made with malice.

    PART V. CONFERMENT ON THE COMMISSION OF OVERSIGHT AND ENFORCEMENT FUNCTIONS AND POWERS

    20. Role of the Commission

    (1) The Commission is hereby granted the powers of oversight and enforcement of this Act.

    (2) In the performance of its functions under this Act, the Commission shall be guided by the national values and principles of the Constitution.

    (3) The Commission shall designate one of the Commissioners as “Access to Information Commissioner” with specific responsibility of performing the functions assigned to the Commission under this Act.

    21. Functions of the Commission

    (1) The functions of the Commission shall be to:

    (a) investigate, on its initiative or upon complaint made by any person or group of persons, violation of the provisions of this Act;

    (b) request for and receive reports from public entities with respect to the implementation of this Act and of the Act relating to data protection and to assess and act on those reports with a view to assessing and evaluating the use and disclosure of information and the protection of personal data;

    (c) develop and facilitate public education awareness and develop programmes on right to access to information and right to protection of personal data;

    (d) work with public entities to promote the right to access to information and work with other regulatory bodies on promotion and compliance with data protection measures in terms of legislation;

    (e) monitor state compliance with international treaty obligations relating to freedom of and right of access to information and protection of personal data;

    (f) hear and determine complaints and review decisions arising from violations of the right to access to information;

    (g) promote protection of data as provided for under this Act or the Constitution; and

    (h) perform such other functions as the Commission may consider necessary for the promotion of access to information and promotion of data protection.

    (2) The Commission shall have all the powers as are provided for under this Act, its constitutive Act and the Constitution as are necessary for the performance of its functions under this Act.

    (3) The decisions of the Commission shall be binding on the national and county governments.

    22. Inquiry into complaints

    (1) A person wishing to lodge a complaint under this Act shall do so orally or in writing to the secretary or such other person as may be duly authorized by the Commission for that purpose.

    (2) A complaint lodged under subsection (1) shall be in such form and contain such particulars as the Commission may, from time to time, prescribe.

    (3) Upon receipt of a complaint under subsection (1), the Commission may:

    (a) call for information or a report regarding such complaint from the public entity or any other body within such reasonable time as may be specified by the Commission and:

    (i) if the information or report called for is not received within the time stipulated by the Commission, the Commission may proceed to inquire into the complaint without such information or report; and

    (ii) if on receipt of the information or report the Commission is satisfied either that no further action is required or that the required action has been initiated by the public entity, the Commission shall, in writing, inform the complainant accordingly and take no further action; or

    (b) without prejudice to paragraph (a), initiate such inquiry as it considers necessary, having regard to the nature of the complaint.

    23. Powers of the Commission

    (1) In the performance of its functions under this Act, the Commission shall have the power to:

    (a) issue summonses or other orders requiring the attendance of any person before the Commission and the production of any document or record relevant to any investigation by the Commission;

    (b) question any person in respect of any subject matter under investigation before the Commission; and

    (c) require any person to disclose any information within such person’s knowledge relevant to any investigation by the Commission.

    (2) The Commission may, if satisfied that there has been an infringement of the provisions of this Act, order:

    (a) the release of any information withheld unlawfully;

    (b) a recommendation for the payment of compensation; or

    (c) any other lawful remedy or redress.

    (3) A person who is not satisfied with an order made by the Commission under subsection (2) may appeal to the High Court within twenty-one days from the date the order was made.

    (4) An order of the Commission under subsection (2) may be filed in the High Court by any party thereto in such manner as the Commission may, in regulations made in consultation with the Chief Justice, prescribe and such party shall give written notice of the filing of the order to all other parties within thirty days of the date of the filing of the order.

    (5) If no appeal is filed under subsection (3), the party in favour of whom the order is made by the Commission may apply ex-parte by summons for leave to enforce such order as a decree, and the order may be executed in the same manner as an order of the High Court to the like effect.

    (6) Public entities and relevant private bodies shall provide to the Commission such reports as required by the Act.

    (7) The Commission shall, in consultation with the public, develop and publicize guidelines detailing the reporting requirements including the manner, means and timeframes that apply to public entities and relevant private bodies.

    (8) The Commission may request any further information from the public entity or the relevant private body to facilitate and enhance monitoring at any time and may issue an order compelling the provision of such further information.

    24. Powers relating to investigation

    (1) The Commission may, for the purpose of conducting any investigation pertaining to an inquiry, utilize the services of any public officer or investigation agency of the Government and where a public officer is so utilized under this subsection, the Commission shall pay such expenses as may be incurred by the public officer or agency for the service rendered.

    (2) For the purpose of investigating any matter pertaining to an inquiry, a public servant or agency whose services are utilized under subsection (1) may, subject to the direction and control of the Commission:

    (a) summon and enforce the attendance of any person for examination;

    (b) require the discovery and production of any information;

    (c) subject to the provisions of this Act, requisition any public records or copy thereof from any public officer; and

    (d) take a statement under oath in relation to any investigation it is undertaking.

    (3) The provisions of section 23 shall apply in relation to any statement made by a person before any public officer or agency whose services are utilized under subsection (1) as they apply in relation to any statement made by a person in the course of giving evidence before the Commission.

    (4) The public officer or agency whose services are utilized under subsection (1) shall investigate into any matter pertaining to the inquiry and submit a report thereon to the Commission in that behalf.

    (5) The Commission shall satisfy itself on the correctness of the facts stated and the conclusion, if any, arrived at in the report submitted to it under subsection (4) and for that purpose, the Commission may make such inquiry, including the examination of any person who conducts or assists in the investigation, as it considers necessary.

    PART VI. PROVISIONS ON DELEGATED POWERS

    25. Regulations

    (1) The Cabinet Secretary may, in consultation with the Commission, make regulations, prescribing anything required by this Act to be prescribed or generally for the better carrying into effect the provisions of this Act.

    (2) Without prejudice to the generality of subsection (1), the regulations may provide for—

    (a) the manner in which applications under this Act shall be made;

    (b) the form in which information requested under this Act shall be supplied;

    (c) the making of an application for personal information by representatives of the person to whom the information relates;

    (d) the measures to be taken by public entities to facilitate the exercise by persons of their rights under this Act;

    (e) the measures to be taken by public entities to ensure that adequate records are created and maintained by the entities;

    (f) the procedures for the making of an application by a complainant for the review by the Commission, of a decision made by a public entity relating to access to information;

    (g) the procedure to be followed by a public entity in consulting with a third party before giving access to information obtained by it from that party;

    (h) the procedures requiring a public entity to ensure that personal information is accurate;

    (i) compensation to be sought by an individual who has suffered damage as a result of the holding of inaccurate information about the individual’s personal affairs by a public entity;

    (j) the records that public entities shall be required to keep; or

    (k) such matters as are contemplated by or necessary for giving full effect to this Act and for its due administration.

    (3) For the purposes of Article 94 (6) of the Constitution:

    (a) the purpose and objective of the delegation under this section is to enable the Cabinet Secretary to make regulations for better carrying into effect the provisions of this Act;

    (b) the authority of the Cabinet Secretary to make regulations under this Act shall be limited to bringing into effect the provisions of this Act and fulfilment of the objectives specified under this section;

    (c) the principles and standards applicable to the delegated power referred to under this section are those found in:

    (i) the Statutory Instruments Act, nº 23 of 2013;

    (ii) the Interpretation and General Provisions Act, Cap 2.

    (iii) the general rules of international law as specified under Article 2(5) of the Constitution; and

    (iv) any treaty and convention ratified by Kenya under Article 2(6) of the Constitution.

    PART VII. MISCELLANEOUS PROVISIONS

    26. Annual reports

    (1) The Commission shall submit an annual report to Parliament and may, at any time, submit special reports to the Cabinet Secretary on any matter relating to any of its functions.

    (2) The annual report submitted by the Commission under subsection (1) shall include an overall assessment by the Commission of the performance of the Government with regard to access to information during the period under review.

    (3) The Cabinet Secretary shall lay the annual report of the Commission before Parliament within two months of receipt thereof, with any comments thereon which the Cabinet Secretary considers necessary.

    (4) The Cabinet Secretary shall be required, in every year, to report to Parliament the steps which the Government has taken in implementing recommendations made in the Commission’s reports.

    27. Reports by public entities

    On or before the 30th day of June of each year, every public entity shall submit to the Commission a report covering the preceding year, which shall include:

    (a) the number of requests for information received by the entity and the number of requests processed;

    (b) the number of determinations made by the authority not to comply with the requests for information under section 8, and the main grounds for such determinations;

    (c) the average number of days taken by the entity to process different types of requests;

    (d) the total amount of fees collected by the public entity while processing requests; and

    (e) the number of full-time staff of the public entity devoted to processing requests for information and the total amount expended by the entity for processing such requests.

    28. Offences and penalties

    (1) Any person who knowingly discloses exempt information in contravention of this Act commits an offence and is liable, on conviction, to a fine not exceeding one million shillings, or to imprisonment for a term not exceeding three years, or both.

    (2) It shall be a defence to a charge under subsection (1) that the exempt information disclosed was already in the public domain at the time of disclosure.

    (3) An information access officer who:

    (a) refuses to assist a requester who is unable to write to reduce the oral request to writing in the prescribed form and provide a copy to the applicant in accordance with section 8(2);

    (b) refuses to accept a request for information;

    (c) fails to respond to a request for information within the prescribed time; or

    (d) fails to comply with the duty to take reasonable steps to make information available in a form that is capable of being read, viewed or heard by a requester with disability in accordance with section 11 (3), commits an offence and is liable, on conviction, to a fine not exceeding fifty thousand shillings, or to imprisonment for a term not exceeding three months, or both.

    (4) Any person who:

    (a) charges a fee exceeding the actual costs of making copies of such information and supplying them to the applicant;

    (b) fails to respond to a request for information required for the exercise or protection of a right in accordance with the requirements of this Act;

    (c) fails to respond to a request to correct personal information; or

    (d) it having been ascertained that information held is out of date, inaccurate or incomplete, fails within the prescribed time, or within a reasonable time if no time is prescribed, to correct, destroy or delete the information, or to attach a statement to the information in accordance with section 13, commits an offence and is liable, on conviction, to a fine not exceeding one hundred thousand shillings, or imprisonment for a term not exceeding six months, or both.

    (5) Any person who is convicted of an offence under section 18(3) after a request has been made for disclosure of the information in question, with the intention of preventing the disclosure of that information in response to that request is liable to a fine not exceeding five hundred thousand shillings or to imprisonment for a term not exceeding two years, or to both.

    (6) Any relevant private body that fails to make publicly available the name and contact details of its information access officer or officers commits and offence and is liable on conviction to a fine not exceeding five hundred thousand shillings.

    (7) Any relevant private body that is convicted, or any officer of which is convicted of an offence under this Act, or which, although not convicted is in serious breach of this Act may, after a fair hearing, be debarred from entering into any future contract with government under the laws relating to matters of procurement and disposal.

    (8) A person who:

    (a) fails to attend before the Commission in accordance with any           summons or order issued under subsection 23(1)(a);

    (b) knowingly gives any false or misleading statement of information to the Commission; or

    (c) causes an obstruction or disturbance in the course of any proceedings before the Commission, commits an offence and shall be liable, on conviction, to a fine not exceeding three hundred thousand shillings, or to imprisonment for a term not exceeding six months, or to both.

    (9) A person shall not be criminally liable for the disclosure or authorisation of the disclosure made in good faith in reliance on this Act.

    (10) A person to whom information is disclosed under this Act, conveys that information to others but who alters the information, or conceals part of the information or misrepresents the information, with intent to deceive, commits an offence, and is liable on conviction to fine not exceeding two hundred thousand shillings or to imprisonment for a term not exceeding one year, or to both.

    29. Consequential amendments

    The written laws identified in the Schedule are amended in the manner identified therein.

    SCHEDULE

    [Section 29]

    CONSEQUENTIAL AMENDMENTS

    1. Records Disposal Act

    (1) This paragraph amends the Records Disposal Act, Cap 14.

    (2) Section 2 of the Act is amended by deleting the words “Chief Archivist” wherever they appear and substituting therefor the expression “Kenya National Archives and Documentation Service and the Commission on Administrative Justice.

    2. Public Archives and Documentation Service Act

    (1) This paragraph amends the Public Archives and Documentation Service Act, Cap 19.

    (2) Section 5A of the Act is amended by inserting the following new proviso immediately after the word “public” appearing in the last line of subsection (1):

    Provided that the restriction from circulation shall only related to exempt information provided for in section 6

    (3) The Act is amended in section 6 by deleting subsections (2) and (3).

    (4) Section 7 of the Act is amended by inserting the expression “in consultation with the Commission on Administrative Justice and” immediately before the words “with the approval of the Minister”.

    3. Public Officer Ethics Act, 2003

    (1) This paragraph amends the Public Officer Ethics Act, nº 4 of 2003.

    (2) Section 41 of the Act is amended by inserting the following proviso immediately after the word “both” appearing in the last line:

    “Provided that the provision of this section as to divulging of information without lawful excuse shall only apply to exempt information provided for in section 6.”

    4. Official Secrets Act

    (1) This paragraph amends the Official Secrets Act, Cap. 187.

    (2) Section 3 of the Official Secrets Act is amended by inserting the following new subsection immediately after subsection (7)

    (8) The provisions of this section shall apply subject to Article 35 of the Constitution and the law relating to access to information.

    5. Statistics Act, 2006

    (1) This paragraph amends the Statistics Act, nº 4 of 2006.

    (2) Section 11 of the Act be amended by inserting the following new proviso           immediately after the word “Act” appearing in the last line:

    “Provided that the provision of this section as to secrecy shall only apply to exempt information provided for in section 6 of the Freedom of Information Act, 2012.”

    03May/21

    Dahir nº 1-18-15 du 5 joumada  II 1439 (22 février 2018)

    Dahir nº 1-18-15 du 5 joumada  II 1439 (22 février 2018) portant promulgation de la loi nº 31-13 relative au droit d’acces a l’information. (Bulletin Officiel nº 6670, 16 chaabane 1439 (3-5-2018).

    LOUANGE A DIEU SEUL !

    (Grand Sceau de Sa Majesté Mohammed VI)

    Que l’on sache par les présentes – puisse Dieu en élever et en fortifier la teneur !

    Que Notre Majesté Chérifienne,

    Vu la Constitution, notamment ses articles 42 et 50,

    A DÉCIDÉ CE QUI SUIT :

    Est  promulguée  et  sera  publiée  au  Bulletin  officiel, a la suite du présent dahir, la loi nº 31-13 relative au droit d’acces a l’information, telle qu’adoptée par la Chambre des représentants et la Chambre des conseillers,

    Fait a Rabat, le 5 joumada II 1439 (22février 2018).

    Pour contreseing:

    Le Chef du gouvernement,

    SAAD DINE EL ÜTMANI.

    Loi nº 31-13 relative au droit d’acces a l’information

    Chapitre premier. Dispositions générales

    Article premier

    Conformément aux dispositions de la Constitution, notamment son article 27, la présente loi fixe le champ d’application  du droit d’acces  a l’information  détenue par les administrations publiques, les institutions élues et les organismes investis de mission de service public, ainsi que les conditions et les modalités d’exercice de ce droit.

    Article 2

    Au sens de la présente loi, on entend par:

    a) l’information : les données et statistiques exprimées sous forme de chiffres, de lettres, de dessins, d’images d’enregistrement audiovisuel, ou toute autre forme contenues dans des documents, pieces, rapports, études, décisions, périodiques, circulaires, notes, bases de données et autres documents a caractere général, produits ou rec;:us par les institutions ou les organismes concernés dans le cadre des missions de service public, quel que soit le support, papier, électronique ou autre.

    b) les institutions et les organismes concernés sont :

    -la Chambre des représentants;

    – la Chambre des conseillers;

    -les administrations publiques;

    -les tribunaux ;

    -les collectivités territoriales ;

    -les établissements publics et toute personne morale de droit public ;

    – tout autre institution ou organisme de droit public ou privé investi de mission de service public ;

    -les institutions et les instances prévues au Titre XII de la Constitution.

    Article 3

    Les citoyennes et les citoyens ont le droit d’accéder a l’information visée a l’article 2 ci-dessus, sous réserve des exceptions prévues par la présente loi.

    Article 4

    En application des dispositions des conventions internationales afférentes que le Royaume du Maroc a ratifiées ou auxquelles i1a adhéré, toute personne étrangere résidant au Maroc de fac;:on légale a droit d’accéder a l’information visée a l’article 2 ci-dessus, selon les conditions et les procédures prévues par la présente loi.

    Article 5

    A l’exception des services rémunérés conformément aux textes réglementaires en vigueur, l’acces a l’information est gratuit.

    Toutefois, le demandeur de l’information prend en charge, le cas échéant, le cofü de reproduction ou de traitement des informations demandées et le cofü de leur envoijusqu’a lui.

    Article 6

    Les informations ayant été publiées, mises a la disposition du public, ou délivrées a leur demandeur, par les institutions ou les organismes concernés, peuvent etre utilisées ou réutilisées a condition que cela soit fait a des fins légitimes sans altération du contenu desdites informations, que leur source et la date de leur émission soient indiquées et qu’il n’y ait pas atteinte ou préjudice a l’intéret général ou atteinte aux droits d’autrui.

    Chapitre II. Exceptions au droit d’acces a l’ information

    Article 7

    En vue de préserver les intérets supérieurs de la Patrie et conformément aux dispositions du deuxieme paragraphe de l’article 27 de la Constitution et sous réserve des délais prévus aux articles 16 et 17 de la loi nº 69-99 relative aux archives, font objet d’exception au droit d’acces a l’information toutes les informations relatives a la défense nationale, a la sécurité intérieure et extérieure de l’Etat, a la vie privée des personnes ou celles ayant le caractere de données personnelles ainsi que les informations dont la divulgation est susceptible de porter atteinte  aux libertés et droits fondamentaux  prévus  par la Constitution et a la protection des sources des informations.

    Les dispositions de l’alinéa précédent sont applicables aux informations dont la divulgation est préjudiciable :

    l. aux relations avec un autre pays ou organisation internationale gouvernementale;

    2. a la politique monétaire, économique ou financiere de l’Etat;

    3. aux droits de propriété industrielle, droits d’auteur ou droits connexes;

    4. aux droits et intérets des victimes, témoins, experts et dénonciateurs, concernant les infractions  de corruption, de détournement, de trafic d’influence et autres, régies par la loi nº 37-10 modifiant et complétant la loi nº 22-01 relative a la procédure pénale.

    Font également  objet d’exception  du droit d’acces a l’information, les informations revetant un caractere confidentiel en vertu des textes législatifs particuliers en vigueur et celles dont la divulgation porte atteinte a:

    a) la confidentialité des délibérations du Conseil des ministres et du Conseil du gouvernement ;

    b) la confidentialité des investigations et enquetes administ ratives, sauf autorisation par les autorités administratives compétentes;

    e) au déroulement des procédures juridiques et des procédures introductives y afférentes, sauf autorisation par les autorités judiciaires compétentes;

    d) aux principes de la concurrence libre, légale et loyale et de l’initiative privée.

    Article 8

    S’il s’avere qu’une partie des informations demandées entre dans le cadre des exceptions prévues par l’article 7 ci-dessus, ilsera procédé a la suppression de cette partie et a la délivrance du reste des informations au demandeur.

    Article 9

    Sous réserve des dispositions de l’article 7 ci-dessus, si la demande porte sur des informations déposées par un tiers aupres d’une institution ou d’un organisme concerné, a condition de maintenir leur confidentialité, l’institution ou l’organisme en question est tenu, avant de fournir les informations demandées, d’obtenir le consentement dudit tiers quant a leur délivrance.

    En cas de réponse négative du tiers, l’institution ou l’organisme concerné décide de la divulgation ou du refus de divulgation des informations, en prenant en considération les arguments présentés par ce tiers.

    Chapitre III. Mesures de publication proactive

    Article 10

    Les institutions et les organismes concernés doivent, chacun dans la limite de ses attributions et autant que possible, publier le maximum d’informations qu’ils détiennent et qui ne font l’objet des exceptions prévues par la présente loi, et ce par tout moyen de publication possible, en particulier les moyens électroniques y compris les portails nationaux des données publiques. 11 s’agit notamment des informations relatives:

    –  aux conventions dont la procédure de ratification ou d’adhésion est en cours;

    –  aux textes législatifs et réglementaires;

    –  aux projets de loi;

    – aux projets de lois de finances et documents y annexés;

    – aux propositions de lois présentées par les membres du Parlement;

    – aux budgets des collectivités territoriales et des états comptables et financiers relatifs a leur gestion et leur situation financiere;

    – aux missions et structures administratives de l’institution ou de l’organisme concerné ainsi qu’aux informations nécessaires pour les contacter;

    -aux régimes, procédures, circulaires et guides utilisés par les fonctionnaires ou les employés de l’institution ou de l’organisme aux fins de l’accomplissement de leurs fonctions;

    – a la liste des services fournis par l’institution ou l’organisme aux usagers y compris les listes des documents, des données et des informations demandées en vue de l’obtention d’un service, d’un document ou d’une carte administrative officielle ainsi que les services électroniques qui y sont liés;

    – aux droits et obligations de l’usager vis-a-vis de l’institution ou de l’organisme concerné et aux voies de recours possibles;

    – aux conditions d’octroi des autorisations, des licences et des permis d’exploitation;

    – aux résultats détaillés des différentes élections;

    – aux programmes prévisionnels des marchés publics, a leurs résultats lorsqu’ils sont exécutés, a leurs titulaires et a leurs montants;

    – aux programmes de concours de recrutement, des examens professionnels et les annonces relatives a leurs résultats;

    – aux annonces d’appel a candidature aux postes de responsabilité et aux emplois supérieurs et de la liste des candidats admis a passer le concours et aux résultats y afférents;

     – aux rapports, programmes, communiqués et études dont dispose l’institution ou l’organisme;

    – aux statistiques économiques et sociales;

    – aux informations relatives aux sociétés, notamment celles détenues par les services du registre central du commerce;

    – aux informations garantissant une concurrence libre, loyale et légale.

    Article 11

    Tout  institution  ou  organisme   concerné   est  tenu de prendre les  mesures  nécessaires  permettant  d’assurer la gestion, la mise a jour, le classement et la conservation des informations dont i1 dispose, selon les normes adoptées en la matiere, afin de faciliter la délivrance de ses informations a  leurs  demandeurs  conformément   aux  dispositions  de la présente loi.

    Article 12

    Tout institution ou organisme concerné doit désigner une ou plusieurs personnes qui seront chargées de la mission de recevoir les demandes d’accéder a l’information, de les étudier et de fournir les informations demandées, ainsi que d’apporter l’assistance nécessaire, le cas échéant, au demandeur de l’information dans l’établissement de sa demande.

    La personne ou les personnes en charge sont dispensées de l’obligation du secret professionnel prévu par la législation en vigueur dans la limite des missions qui lui ou leur sont confiées en vertu de la présente loi, sous réserve des dispositions de l’article 7 ci-dessus.

    L’institution ou l’organisme concerné doit mettre a la disposition de toute personne en charge une base de données qu’il détient afin de lui permettre d’accomplir ses missions conformément a la présente loi.

    Article 13

    Tout institution ou organisme concerné est tenu de fixer par des circulaires internes les modalités d’exercice de la personne ou des personnes en charge de leurs fonctions, ainsi que les instructions a respecter afin de se conformer aux dispositions de la présente foi aux fins de faciliter l’acces a l’information aux demandeurs.

    Chapitre IV. Procédure d’acces a l’information

    Article 14

    Les informations sont obtenues sur la base d’une demande formulée par l’intéressé selon un modele établi par la commission visée a l’article 22 ci-dessous. La demande doit mentionner le nom, prénom du demandeur, son adresse postale, le numéro de sa carte nationale d’identité ou, lorsqu’il s’agit d’un étranger,  le  numéro  du  docunÍent  attestant de la régularité de son séjour sur le territoire marocain conformément a la législation en vigueur et, le cas échéant, son adresse électronique, ainsi que les informations qu’il souhaite obtenir.

    La demande est adressée au président de l’institution ou de l’organisme concerné par dépot direct contre récépissé, par courrier normal ou par courrier électronique contre accusé de réception.

    Article 15

    L’acces aux informations s’effectue soit en les consultant directement au siege de l’institution ou de l’organisme concerné pendant les heures officielles de travail, soit en recevant par courrier électronique le document contenant les informations demandées lorsque ce dernier est disponible sous format électronique ou sur tout autre support a la disposition de l’institution ou de l’organisme concerné.

    Dans tous les cas, l’institution ou l’organisme concerné veille a assurer la préservation des documents et des pieces contenant les informations demandées et leur protection contre toute altération et ce conformément aux textes législatifs et réglementaires en vigueur en la matiere.

    Article 16

    L’institution ou l’organisme concerné doit répondre a la demande d’accéder a l’information dans un délai ne dépassant pas vingt (20) jours ouvrables a compter de la date de réception de la demande. Ce délai peut etre prolongé d’une durée similaire, si l’institution ou l’organisme concerné n’est pas en mesure de donner suite, en tout ou en partie, a la demande de l’intéressé dans le délai précité, ou si la demande porte sur un grand nombre d’informations, ou s’il était impossible de fournir les informations durant le délai précité ou si leur délivrance nécessite la consultation préalable de tiers.

    L’institution ou l’organisme concerné est tenu d’aviser l’intéressé au préalable de ladite prolongation, par écrit ou par courrier électronique, tout en précisant les raisons.

    Article 17

    L’institution ou l’organisme concerné est tenu de donner suite a la demande d’accéder a l’information dans un délai de trois (3) jours en cas d’urgence lorsque l’obtention des informations est nécessaire pour protéger la vie ou la sécurité ou la liberté des personnes, sous réserve des cas de prolongation indiqués dans l’article 16 ci-dessus.

    Article 18

    En cas de refus, en tout ou en partie, de la demande d’acces  a l’information,  les institutions  ou les organismos concernés doivent motiver leur réponse par écrit, notamment dans les cas suivants:

    – les informations demandées ne sont pas disponibles;

    – les exceptions prévues a l’article 7 de la présente loi. Dans ce cas, la réponse doit préciser la ou les exceptions en question;

    – siles informations demandées sontpubliées et mises a la disposition du public. Dans ce cas, la réponse doit mentionner la référence et le lieu ou le demandeur peut accéder aux informations demandées;

    – le cas ou la demande d’information a étéprésentée par le meme demandeur plus qu’une seule fois, au cours de la meme année, concernant des informations qui lui ont été déja fournies;

     – si la demande d’information n’est pas claire;

    – si les informations  demandées  sont en cours de préparation ou d’élaboration ;

    – si les informations demandées sont déposées auprés de l’institution «Archives du Maroc».

    La réponse doit inclure le droit de l’intéressé a déposer une plainte au sujet du refus de sa demande.

    Article 19

    Si le demandeur d’informations n’a pas rec;:u de réponse a sa demande ou s’il a rec;:u une réponse négative, ila le droit de déposer une plainte auprés du président  de l’institution ou de l’organisme concerné dans un délai de vingt (20) jours ouvrables suivant l’expiration du délai réglementaire imparti pour répondre a sa demande ou a compter de la date de réception de la réponse.

    Le président de ladite institution ou organisme doit étudier la plainte et informer l’intéressé de la décision prise a son égard dans un délai de quinze (15) jours a compter de la date de sa réception.

    Article 20

    Le demandeur d’informations a le droit de déposer une plainte  auprés de la commission  visée  a l’article 22 ci-dessous, dans un délai ne dépassant pas trente (30) jours aprés  l’expiration  du  délai  réglementaire  impartí pour répondre a la plainte adressée au président de l’institution ou de l’organisme ou a compter de la date de réception de la réponse a cette plainte. La commission est tenue d’étudier la plainte et d’informer l’intéressé de la suite qui lui a été réservée dans un délai de trente (30) jours a compter de la date de sa réception.

    La plainte peut etre adressée par courrier recommandé ou par courrier électronique contre accusé de réception.

    Article 21

    Le demandeur d’informations peut introduire un recours devant le tribunal administratif compétent contre la déqision du président de l’institution ou de l’organisme concerné visé a l’article 19 ci-dessus, dans un délai de soixante (60) jours, a compter de la date de réception de la réponse de la commission visée a l’article 22 ci-aprés au sujet de sa plainte ou de la date d’expiration du délai légal imparti pour répondre a cette plainte.

    Chapitre V. Commission du droit d’acces a l’ information

    Article 22

    Il est créé, auprés du Chef du gouvernement, une commission du droit d’acces a l’information et de veiller a sa mise en application. Cette commission est chargée des missions suivantes :

    – assurer   le  bon   exercice   du   droit  d’acces  a l’information;

    – apporter  conseil  et  expertise  aux  institutions ou organismes concernés sur les mécanismes d’application des dispositions de la présente loi ainsi que sur la publication proactive des informations détenues par lesdits institutions ou organismes;

    – recevoir les plaintes déposées par les demandeurs d’informations et faire tout le nécessaire aux fins d’y statuer, en procédant aux enquetes et aux investigations et en formulant des recommandations a cet égard;

    – sensibiliser a l’impor tance de fournir les informations et d’y faciliter l’accés par toutes les voies et les moyens disponibles, notamment a Travers l’organisation de cycles de formation au profit des cadres des institutions ou organismes concernés;

    – émettre des recommandations et des propositions afin d’améliorer la qualité des procédures d’accés a l’information;

    – présenter au gouvernement toute proposition en vue d’adapter les textes législatifs et réglementaires en vigueur au principe du droit d’accés a l’information;

    – donner son avis sur les projets de textes législatifs et réglementaires qui lui sont soumis par le gouvernement ;

    – établir un rapport annuel sur le bilan de ses activités en   matiére   de   droit   d’accés   a  l’information comportant en par ticulier une évaluation du processus de la mise en  reuvre  dudit  principe. Ce rapport est rendu public par tous les moyens disponibles.

    Article 23

    La commission visée a l’article 22 ci-dessus est présidée par le président de la Commission nationale de contrüle de la protection des données a caractére personnel, instituée en vertu de l’article 27 de la loi nº 09-08. Elle est composée de:

    –  deux représentants des administrations publiques nommés par le Chef du gouvernement;

    –  un membre nommé par le président de la Chambre des représentants;

    – un membre nommé par le président de la Chambre des conseillers;

    – un représentant de l’Instance nationale de la probité, de la prévention et de la lutte contre la corruption;

    – un représentant de l’institution «Archives du Maroc»;

    – un représentant du Conseil national des droits de l’Homme;

    – un représentant du Médiateur;

    – un représentant del’une des associations reuvrant dans le domaine du droit d’accés a l’information, désigné par le Chef du gouvernement.

    Le président de la commission peut inviter a ses réunions, a titre consultatif, toute personne, organisme ou représentant d’une administration ou faire appel a son expertise.

    Les membres de la commission sont désignés pour une durée de cinq (5) ans, renouvelable une seule fois.

    Article 24

    La commission se réunit chaque fois que le besoin l’exige, sur convocation de son président, agissant de sa propre initiative ou a la demande de la moitié au moins de ses membres et ce, sur un ordre du jour déterminé.

    Les réunions de la commission se tiennent valablement lorsque les deux tiers au moins de ses membres sont présents. Ses décisions sont prises a l’unanimité des membres présents ou, a défaut, a la majorité des voix de ses membres. En cas de partage égal des voix, celle du président est prépondérante.

    Article 25

    La commission  est assistée, dans l’exercice de ses fonctions, par l’organe administratif prévu aux articles 40 et 41 de la loi nº 09-08 précitée.

    Article 26

    Les regles de fonctionnement de la commission sont fixées en vertu d’un reglement intérieur élaboré par son président qui le soumet a l’approbation de la commission Avant son entrée en vigueur. Ce reglement intérieur est publié au «Bulletin officiel».

    Chapitre VI. Sanctions

    Article 27

    La personne en charge visée a l’article 12 ci-dessus será passible de poursuite disciplinaire, conformément aux textes législatifs en vigueur, s’il s’abstient de fournir les informations demandées conformément aux dispositions de la présente loi, sauf si sa bonne foi est prouvée.

    Article 28

    Est considérée coupable de l’infraction de divulgation du secret professionnel aux termes de l’article 446 du Code pénal quiconque aura enfreint les dispositions de l’article 7 de la présente loi, sauf qualification plus sévere des faits.

    Article 29

    Toute altération du contenu des informations obtenues ayant porté  préjudice  a l’institution  ou l’organisme  concerné ou utilisation ou réutilisation de ces informations ayant porté atteinte ou préjudice a l’intéret général ou atteinte aux droits d’autrui en court pour la personne qui a obtenu ou utilisé lesdites informations, selon le cas, des sanctions prévues a l’article 360 du Code pénal.

    Chapitre VII- Dispositionsfinales

    Article 30

    La présente loi entre en vigueur apres un an a compter de la date de sa publication au Bulletin officiel sous réserve des dispositions  de l’alinéa ci-apres.

    Les institutions ou organismes concernés sont tenus de prendre les mesures prévues aux articles 10 a 13 ci-dessus dans un délai ne dépassant pas un an a compter de la date d’entrée en vigueur de la présente loi.

    02May/21

    Dahir n° 1-07-167 du 19 kaadaDahir n° 1-07-167 du 19 kaada 1428 portant promulgation de la loi n° 69-99

    Dahir n° 1-07-167 du 19 kaada 1428 portant promulgation de la loi n° 69-99 relative aux archives. (B.O. n° 5588 du 20 décembre 2007).

    Vu la Constitution, notamment ses articles 26 et 58,

    Est promulguée et sera publiée au Bulletin officiel, à la suite du présent dahir, la loi n° 69-99 relative aux archives, telle qu’adoptée par la Chambre des représentants et la Chambre des conseillers.

    Loi n° 69-99 relative aux archives

    Titre premier. De l’organisation des archives

    Chapitre premier. Dispositions générales

    Article premier

    Les archives sont l’ensemble des documents, quels que soient leur date, leur forme et leur support matériel, produits ou reçus par toute personne physique ou morale et par tout service ou organisme public ou privé, dans l’exercice de leur activité.

    La constitution et la conservation de ces documents sont organisées dans l’intérêt public tant pour les besoins de la gestion et de la justification des droits des personnes physiques ou morales, publiques ou privées que pour la recherche scientifique et la sauvegarde du patrimoine national.

    Les fonds d’archives constitués par les personnes et les organismes visés au présent article doivent être conservés dans le respect de leur intégrité et structure interne.

    Article 2

    Tout fonctionnaire ou employé relevant des personnes physiques ou morales visées à l’article 3 ciaprès est responsable des documents produits ou reçus dans l’exercice de sa fonction.

    Chapitre II. Les archives publiques

    Article 3

    Les archives publiques sont:

    – les documents qui procèdent de l’activité de l’Etat, des collectivités locales, des établissements et des entreprises publics, dans l’exercice de leurs activités;

    – les documents qui procèdent de l’activité des organismes privés chargés de la gestion d’un service public pour la partie de leurs archives découlant de l’exercice de ce service public;

    – les minutes et répertoires des notaires et adouls, les registres de l’état civil et de l’enregistrement.

    Les archives publiques sont imprescriptibles et inaliénables.

    Toute personne privée, physique ou morale détentrice d’archives publiques à quelque titre que ce soit, est tenue de les restituer, pour conservation, à l’organisme qui les a produit ou aux «Archives du Maroc» prévu à l’article 26 ci-dessous.

    Article 4

    Lorsqu’il est mis fin à l’exercice d’une administration, organisme ou établissement visé à l’article 3 de la présente loi, ses archives doivent être versées à « Archives du Maroc » à moins que ses attributions n’aient été confiées à un organisme successeur.

    Article 5

    Les personnes, organismes et établissements visés à l’article 3 de la présente loi sont tenus, en collaboration avec «Archives du Maroc» et conformément à ses missions, d’élaborer et de mettre en application un programme de gestion de leurs archives courantes et des archives intermédiaires, visées aux articles 6, 7 et 8 ci-dessous, ce programme désigne les structures, les moyens et les procédures qui permettent la gestion de ces documents depuis leur création jusqu’à leur archivage définitif dans un service d’archives public ou leur élimination.

    Section première. De l’organisation des archives publiques

    Article 6

    Les archives publiques sont des archives courantes, intermédiaires ou définitives.

    Article 7

    Les archives courantes sont les documents visés à l’article 3 ci-dessus qui sont couramment utilisés pour une période déterminée, dans le cadre de l’exercice de leurs activités, par les personnes, les organismes et les établissements visés audit article 3.

    La conservation des archives courantes incombe aux organismes qui les ont produits ou reçus.

    Article 8

    Les archives intermédiaires sont les documents qui ont cessé d’être considérés comme archives courantes, qui peuvent être utilisés occasionnellement par les organismes qui les ont constitués alors que leur sort final n’est pas encore fixé.

    La conservation et la gestion des archives intermédiaires doivent être assurées par les organismes qui les ont constituées dans des locaux aménagés à cette fin et qui doivent en assurer la protection et les conserver progressivement sous forme d’archive électronique.

    Article 9

    Les personnes, établissements et organismes visés à l’article 3 de la présente loi sont tenus d’établir et de tenir à jour un calendrier de conservation qui détermine les délais de conservation des archives courantes et intermédiaires et leur sort final.

    Les modalités de conservation des archives courantes et intermédiaires ainsi que celles de l’élaboration et de l’approbation du calendrier de conservation de ces dernières sont définies par voie réglementaire.

    Article 10

    A l’expiration des délais de conservation prévus par le calendrier visé à l’article 9 ci-dessus, ces archives font l’objet d’un tri pour déterminer les documents destinés à être conservés de manière définitive et ceux dépourvus de tout intérêt scientifique, statistique ou historique destinés à être détruits.

    Les documents qui, après tri, sont destinés à la conservation, sont considérés comme des archives. Une liste des documents destinés à l’élimination ainsi que les conditions de leur élimination sont fixées d’un commun Accord entre l’organisme qui les a produit ou reçu et       «Archives du Maroc».

    Les procédures de tri, d’élimination et de versement des archives à « Archives du Maroc » sont fixées par voie réglementaire.

    Article 11

    Les archives définitives doivent être versées à «Archives du Maroc». Les organismes ayant constitué ces archives doivent en assurer progressivement la conservation sous forme d’archive électronique.

    Les cas où «Archives du Maroc» laisse le soin de la conservation des archives définitives produites ou reçues par certaines administrations, organismes ou établissements aux services compétents de ces administrations, organismes ou établissements ainsi que les conditions de coopération entre «Archives du Maroc» et ces administrations, organismes ou établissements sont fixé par voie réglementaire.

    Article 12

    Les services d’«Archives du Maroc» et les autres services d’archives publics sont tenus de collecter, d’inventorier, de classer et de mettre à la disposition du public les archives définitives.

    Ils sont également, tenus de les conserver et de les préserver.

    Section II. De la communication des archives publiques

    Article 13

    Tout fonctionnaire ou employé chargé de la collecte ou de la conservation d’archives est tenu du secret professionnel en ce qui concerne tout document qui ne peut être légalement mis à la disposition du public.

    Article 14

    Non obstant les dispositions des articles 16 et 17 ci-dessous, les documents versés à «Archives du Maroc» et aux autres services d’archives publics demeurent à la disposition des personnes, administrations, organismes et établissements qui en ont effectué le versement.

    Article 15

    Les documents qui, de par leur nature, ont vocation à être communiqués au public ou ceux qu’une loi spéciale rend communicables dans les conditions qu’elle fixe peuvent être consultés, sans délai, par toute personne qui en fait la demande.

    Article 16

    Sous réserve des dispositions de l’article 15 ci-dessus, les archives publiques sont libremente communicables au public à l’expiration d’un délai de trente ans à compter de la date de leur création, à l’exception des cas prévus à l’article 17 ci-après.

    Article 17

    Le délai de trente ans au terme duquel les archives publiques sont librement communicables est porté à :

    1. Cent ans:

    a) à compter de la date de naissance de l’intéressé pour les documents comportant des renseignements individuels à caractère médical et pour les dossiers de personnel;

    b) pour les minutes et répertoires des notaires et des adouls, les registres de l’état civil et de l’enregistrement.

    2. Soixante ans :

    a) à compter de la date de l’acte pour les documents dont la communication porterait atteinte:

    – au secret de la défense nationale;

    – à la continuité de la politique extérieure du Maroc;

    – à la sûreté de l’Etat, à la sécurité publique ou la sécurité des personnes;

    – aux procédures juridictionnelles et aux opérations préliminaires à de telles procédures;

    – à l’intimité de la vie privée.

    b) à compter de la date de recensement ou de l’enquête pour les documents contenant des renseignements individuels ayant trait à la vie personnelle et familiale et, d’une manière générale, aux faits et comportements d’ordre privé, collectés dans le cadre des enquêtes statistiques des services publics.

    Article 18

    Par dérogation aux dispositions des articles 16 et 17 de la présente loi, «Archives du Maroc» peuvent autoriser, à des fins de recherches scientifiques et après accord de l’administration d’origine, la consultation d’archives publiques sans toutefois porter atteinte au secret de la défense nationale, de sûreté de l’Etat ou de la vie privée.

    Article 19

    Sous réserve des textes législatifs et réglementaires régissant la propriété industrielle ou les droits d’auteurs et les droits voisins, toute personne autorisée à consulter les archives publiques peut en faire établir à ses frais des reproductions ou extraits.

    Article 20

    Sous réserve des dispositions des articles 16 et 17 de la présente loi, «Archives du Maroc» est habilité à délivrer des copies et extraits certifiés conformes des documents d’archives qu’il conserve.

    Les demandeurs desdits documents doivent prendre à leur charge les frais de ces copies et extraits et de leur certification.

    Article 21

    Les modalités de communication des archives publiques aux usagers et de délivrance des copies et extraits certifiés conformes sont fixées par voie réglementaire.

    Article 22

    Les dispositions de ce présent chapitre ne s’appliquent pas aux archives publiques relatives à l’histoire militaire qui demeurent régies, quant à leur identification, classement, conservation et communication, par les dispositions du dahir n° 1-99-266 du 28 moharrem 1424 (3 mai 2000) portant création de la commission marocaine d’histoire militaire.

    Chapitre III. Les archives privées

    Article 23

    Les archives privées sont l’ensemble des documents définis à l’article premier ci-dessus qui n’entrent pas dans le champ d’application de l’article 3 de la présente loi.

    Article 24

    Afin de sauvegarder le patrimoine archivistique national, «Archives du Maroc» est habilité à acquérir par voie d’achat et à recevoir à titre de don, de legs, ou de dépôt révocable, des archives privées dont il assure la conservation, le traitement et la communication.

    Toute acquisition d’archives privées par voie d’achat, ou leur réception à titre de don, de legs ou de dépôt révocable est effectuée par «Archives du Maroc» au nom et pour le compte de l’Etat.

    Les conditions et les modalités d’acquisition et de communication desdites archives sont fixées d’un commun accord entre les parties concernées et «Archives du Maroc».

    Article 25

    Les archives privées présentant pour des raisons historiques un intérêt public peuvent être classées comme archives historiques par «Archives du Maroc» dans les conditions et formes prévues par la loi n° 22-80 relative à la conservation des monuments historiques et des sites, des inscriptions des objets d’art et d’antiquité telle que modifiée et complétée par la loi n° 19-05 notamment les dispositions relatives aux effets du classement à la cession des archives classées, au droit de préemption et à l’exportation illégale ainsi que les sanctions applicables aux infractions auxdites dispositions.

    Titre II. «Archives du Maroc»

    Chapitre premier. Définition et missions

    Article 26

    Il est créé un établissement public dénommé : «Archives du Maroc», doté de la personnalité morale et de l’autonomie financière.

    L’établissement est soumis à la tutelle de l’Etat, laquelle a pour objet d’assurer le respect par les organes compétents de l’établissement des dispositions de la présente loi, en particulier celles relatives aux missions qui lui sont imparties et de veiller, en ce qui le concerne, à l’application des textes législatifs et réglementaires relatifs aux établissements publics.

    L’établissement est également soumis au contrôle financier de l’Etat applicable aux entreprises publiques et autres organismes conformément à la législation en vigueur.

    Son siège est fixé à Rabat.

    Article 27

    «Archives du Maroc» est chargé principalement de sauvegarder le patrimoine archivistique national, d’assurer la constitution, la conservation, l’organisation et la communication des archives publiques à des fins administratives, scientifiques, sociales ou culturelles.

    A cet effet, «Archives du Maroc» exerce les missions suivantes:

    1. Promouvoir et coordonner le programme de gestion des archives courantes et intermédiaires des personnes physiques et morales visées à l’article 3 de la présente loi et donner des directives en la matière.

    A ce titre, «Archives du Maroc» est chargé de:

    – fournir auxdites personnes physiques et morales l’assistance technique nécessaire en matière d’archives;

    – assister ces personnes physiques et morales en matière d’élaboration des calendriers de conservation et assurer leur approbation;

    – contrôler les conditions de conservation des archives courantes et intermédiaires desdites personnes physiques et morales.

    2. Sauvegarder et promouvoir la mise en valeur du patrimoine archivistique national.

    A ce titre, «Archives du Maroc» est chargé:

    – d’assurer la collecte, la conservation et le traitement des archives définitives des personnes physiques et morales visées à l’article 3 de la présente loi dans les services d’archives publics gérés par lui ou placés sous son contrôle;

    – de veiller à la sauvegarde des archives privées d’intérêt public;

    – d’établir et publier les instruments de recherche en vue de faciliter l’accès aux archives;

    – d’assurer par les moyens appropriés la communication des archives et promouvoir leurs valeurs scientifique, culturelle et éducative conformément aux dispositions de la section II du chapitre premier du titre premier de la présente loi;

    – d’assurer la préservation et la restauration des fonds d’archives qu’il conserve;

    3.  établir la normalisation des pratiques de collecte, de tri, d’élimination, de classement, de description, de conservation préventive, de restauration et de substitution des supports d’archives ;

    4. promouvoir le domaine des archives par la recherche scientifique, la formation professionnelle et la coopération internationale.

    «Archives du Maroc» est chargé de collecter, traiter, conserver et communiquer les sources archivistiques se rapportant au Maroc et qui se trouvent à l’étranger.

    Chapitre II. Des organes d’administration et de gestion

    Article 28

    «Archives du Maroc» est administré par un conseil d’administration et géré par un directeur.

    Le conseil d’administration de l’établissement se compose outre son président, des représentants de l’Etat et de personnalités nommées par le Premier ministre, choisies dans le secteur public ou privé pour leur compétence, en matière de conservation des archives pour une période de cinq ans renouvelable une seule fois.

    Article 29

    Le conseil d’administration dispose de tous les pouvoirs et attributions nécessaires à l’administration de l’établissement. A cet effet, il règle par ses délibérations les questions générales intéressant l’établissement et notamment:

    – arrête le programme des opérations techniques et financières de l’établissement;

    – arrête le budget ainsi que les modalités de financement des programmes d’activité de l’établissement et le régimen des amortissements;

    – arrête les comptes et décide de l’affectation des résultats s’il y a lieu;

    – fixe le statut du personnel de l’établissement;

    – élabore l’organigramme de l’établissement fixant les structures organisationnelles et leurs attributions;

    – élabore le règlement fixant les règles et modes de passation des marchés;

    – arrête les conditions d’émission des emprunts et de recours aux autres formes de crédits bancaires, telles qu’avances ou découverts;

    – fixe les prix des services rendus aux tiers.

    Le conseil d’administration peut déléguer des pouvoirs spéciaux au directeur de l’établissement pour le règlement d’affaires déterminées.

    Article 30

    Le conseil d’administration se réunit sur convocation de son président aussi souvent que les besoins l’exigent et au moins deux fois par an:

    – avant le 30 juin pour arrêter les états de synthèses de l’exercice clos;

    – avant le 15 octobre pour examiner et arrêter le budget et le programme prévisionnel de l’exercice suivant.

    Le conseil d’administration délibère valablement lorsque les deux tiers au moins de ses membres sont présents ou représentés.

    Les décisions du conseil d’administration sont prises à la majorité des voix des membres présents ou représentés.

    En cas de partage égal des voix, celle du président est prépondérante.

    Article 31

    Le conseil d’administration peut décider la création en son sein de tout comité ou commission, dont il fixe la composition et les modalités de fonctionnement et auxquels il peut déléguer une partie de ses pouvoirs et attributions, notamment une commission consultative qui donne son avis sur toutes les questions qui sont dévolues à l’établissement par la présente loi ainsi que sur les projets de textes législatifs et réglementaires relatifs aux archives.

    La commission consultative donne également son avis sur toute question soumise à son examen par «archives du Maroc».

    Article 32

    «Archives du Maroc» est géré par un directeur nommé conformément à l’article 30 de la constitution.

    Il détient tous les pouvoirs et attributions nécessaires à la gestion de l’établissement. A cet effet:

    – il exécute les décisions du conseil d’administration;

    – il gère l’établissement et agit en son nom, assure la gestion de l’ensemble des services et coordonne leurs activités, nomme aux emplois de l’établissement conformément au statut de son personnel;

    – il accomplit ou autorise tous actes ou opérations relatifs à l’objet de l’établissement. Il le représente vis-à-vis de l’Etat, de toute administration publique ou privée et de tous tiers, fait tous actes conservatoires;

    – il représente l’établissement en justice et peut intenter toute action judiciaire ayant pour objet la défense de ses intérêts mais doit, toutefois, en aviser immédiatement le président du conseil d’administration;

    – il assiste avec voix consultative aux réunions du conseil d’administration, en prépare les travaux et établit le procès-verbal des questions qui y sont examinées;

    – il peut déléguer, sous sa responsabilité, tout ou partie de ses pouvoirs et attributions au personnel placé sous son autorité;

    – il prépare à la fin de chaque exercice un rapport sur les activités de l’établissement. Ce rapport est adressé au Premier ministre.

    Chapitre III. Organisation financière et administrative

    Article 33

    Le budget d’«Archives du Maroc» comprend:

    En recettes:

    – les produits et les revenus provenant de ses biens mobiliers ou immobiliers;

    – le produit des rémunérations pour services rendus;

    – le produit des taxes parafiscales instituées à son profit;

    – les emprunts autorisés conformément à la réglementation en vigueur;

    – les subventions de l’Etat ou d’autres personnes morales de droit public ou privé ainsi que les dons et legs et les produits divers;

    – toutes autres recettes en rapport avec son activité.

    En dépenses:

    – les charges d’exploitation et d’investissement;

    – le remboursement des avances et prêts;

    – toute autre dépense en rapport avec son activité.

    Article 34

    Le personnel d’«Archives du Maroc» est constitué:

    – des agents recrutés conformément à son statut particulier du personnel ;

    – des fonctionnaires détachés des administrations publiques conformément à la législation en vigueur.

    Titre III. Dispositions pénales

    Chapitre premier. Constatation des infractions et sanctions

    Article 35

    Toute personne qui, aura même sans intention frauduleuse, détruit, détourné ou soustrait des archives publiques dont elle est détentrice à raison de ses fonctions, sera punie d’un  emprisonnement de trois à six ans.

    Article 36

    Toute infraction aux dispositions de l’article 13 ci-dessus est passible de la peine prévue à l’article 446 du code pénal.

    Article 37

    Le vol, la destruction ou la dégradation d’un document d’archives publiques ou d’un document d’archives privées conservé par un service public d’archives est puni d’un emprisonnement de deux à dix ans.

    Article 38

    Sont habilités à constater les infractions aux dispositions de la présente loi et des textes pris pour son application, outre les officiers de la police judiciaire, les agents assermentés dûment habilités à cet effet par l’«Archives du Maroc».

    Chapitre II. Conclusion des transactions

    Article 39

    «Archives du Maroc» a le droit de transiger en matière d’infractions aux dispositions de la presente loi et des textes pris pour son application, soit avant ou après le jugement, s’il est avéré que cela constituait un intérêt pour la sauvegarde d’une archive publique ou que celle-ci représentait un intérêt historique, scientifique ou civilisationnel.

    La transaction passée par écrit, sans réserve, éteint l’action du ministère public aussi bien que celle de l’administration.

    Chapitre III. Dispositions diverses

    Article 40

    Les fonds d’archives conservés à la bibliothèque nationale du Royaume du Maroc sont transférés, après inventaire, aux archives du Maroc, conformément aux conditions et formes fixées par voie réglementaire.

    Article 41

    «Archives du Maroc» est subrogé dans les droits et obligations de la bibliothèque nationale du Royaume pour tous les marchés d’étude, de travaux, de fournitures et de transport ainsi que tous autres contrats et conventions notamment financiers conclus avant la date d’entrée en vigueur de la présente loi et relatifs aux activités de la bibliothèque nationale du Royaume ans le secteur des archives.

    02May/21

    Loi organique n° 2016-22 du 24 mars 2016

    Loi organique n° 2016-22 du 24 mars 2016, relative au droit d’accès à l’information. (Journal officiel, 2016-03-29, n° 26, pp. 949-956). (Se substitue au décret-loi n° 2011-41 du 26 mai 2011, relatif à l’accès aux documents administratifs des organismes publics, tel que modifié et complété par le décret-loi n° 2011-54 du 11 juin 2011).

    Loi organique n° 2016-22 du 24 mars 2016, relative au droit d’accès à l’information

    Au nom du peuple,

    L’assemblée des représentants du peuple ayant adopté,

    Le Président de la République promulgue la loi organique dont la teneur suit :

    Chapitre Premier. Dispositions générales

    Article premier

    La présent loi a pour objet de garantir le droit de toute personne physique ou morale à l’accès à l’information afin de permettre :

    – l’obtention de l’information,

    – le renforcement des principes de transparence et de reddition des comptes et surtout en ce qui concerne la gestion des services publics,

    – l’amélioration de la qualité du service public et le renforcement de la confiance dans les organismos soumis aux dispositions de la présente loi,

    – le renforcement de la participation du public dans l’élaboration, le suivi de la mise en œuvre et l’évaluation des politiques publiques,

    – le renforcement de recherche scientifique.

    Article 2

    La présente loi s’applique aux organismos suivants :

    – la Présidence de la République et ses organismes,

    – la Présidence du gouvernement et ses organismes,

    – l’assemblée des représentants du peuple,

    – les ministères et les différents organismes soustutelle à l’intérieur ou à l’étranger,

    – la banque centrale,

    – les entreprises et les établissements publics et leurs représentations à l’étranger,

    – les organismes publics locaux et régionaux,

    – les collectivités locales,

    – les instances judiciaires, le conseil supérieur de magistrature, la cour constitutionnelle, la cour des comptes,

    – les instances constitutionnelles,

    – les instances publiques indépendantes,

    – les instances de régulation,

    – les personnes de droit privé chargées de gestión d’un service public,

    – les organisations et les associations et tous les organismes bénéficiant d’un financement public.

    Ils sont dénommés ci-après «les organismos soumis aux dispositions de la présente loi».

    Article 3

    Au sens de la présente loi, on entend par les termes suivants :

    – l’accès à l’information : la publication proactive de l’information par l’organisme concerné et le droit d’y accéder sur demande,

    – information : toute information enregistrée quelque soit sa date, sa forme et son support, produite ou obtenue par les organismes soumis aux dispositions de la présente loi dans le cadre de l’exercice de leurs activités,

    – le tiers : toute personne physique ou morale autre que l’organisme concerné détenteur de l’information et le demandeur d’accès à l’information.

    Article 4

    Sous réserve des articles 24 et 25 de la presente loi, le dépôt aux archives des documents contenants l’information accessible au sens de la présente loi, ne fait pas obstacle au droit d’y accéder.

    Article 5

    Tous les organismes soumis aux dispositions de la présente loi, sont tenus de prévoir les crédits nécessaires aux programmes et activités relatifs à l’accès à l’information.

    Chapitre 2. De l’obligation de publication proactive de  l’information par l’organisme concerné

    Article 6

    Les organismes assujettis aux dispositions de la présente loi, sont tenus de publier, d’actualiser, de mettre périodiquement à la disposition du public, dans une forme utilisable, les informations suivantes :

    – les politiques et les programmes qui concernent le public,

    – la liste détaillée des prestations fournies au public, les certificats qu’il délivre aux citoyens et les pièces nécessaires pour leurs obtentions, les conditions, les délais, les procédures, les parties et les étapes de leurs prestations,

    – les textes juridiques, réglementaires et explicatifs régissant son activité,

    – les fonctions qui lui sont assignées, son organigramme, l’adresse de son siège principal et de tous ses sièges secondaires, la voie d’accès et de communication avec lui et le budget qui lui a été alloué détaillé,

    – les informations relatives à ses programmes et surtout les réalisations en relation avec son activité,

    – la liste nominative des chargés d’accès à l’information, comportant les données prévues au paragraphe premier de l’article 32 de la présente loi et leurs adresses électroniques professionnelles,

    – la liste des documents disponibles en versión électronique ou papier relatives aux prestations fournies et les ressources qui leurs ont été prévues,

    – les conditions d’octroi des autorisations fournies par l’organisme,

    – les marchés publics programmés ayant engagement de leur budget, que l’organisme compte contracter et les résultats escomptés de leur mise en œuvre,

    – les rapports des instances de contrôle conformément aux standards professionnels internationaux,

    – les conventions que l’Etat compte y adhérer ou ratifier,

    – les informations statistiques, économiques et sociales y compris les résultats et les rapports des recensements statistiques détaillés conformément aux exigences de la loi relative au recensement,

    – toute information relative aux finances publiques y compris les données détaillées liées au budget au niveau central, régional et local, les données relatives à l’endettement public et les comptes nationaux, la répartition des dépenses publiques et les principaux indicateurs des finances publiques,

    – les informations disponibles relativement aux programmes et services sociaux.

    Article 7

    Compte tenu des moyens disponibles pour les organismes prévus par le dernier tiret de l’article 2 de cette loi, les informations prévues par l’article 6 de la présente loi, doivent être publiées sur un site web et mises à jour au moins une fois tous les trois (3) mois et suite à tout changement les affectant, avec mention obligatoire de la date de la dernière mise à jour.

    Ce site doit comporter en plus des informations précitées, ce qui suit :

    – le cadre juridique et réglementaire régissant l’accès à l’information,

    – les formulaires des demandes d’accès à l’information, les procédures du recours gracieux et le service chargé de leur réception auprès de l’organisme concerné,

    – les rapports produits par l’organisme concerné, relatifs à la mise en œuvre des dispositions de cette loi, y compris les rapports trimestriels et annuels mentionnés aux points 3 et 4 de l’article 34 de la présente loi.

    Article 8

    Les organismes soumis aux dispositions de la présente loi, doivent, d’une manière proactive, publier les informations ayant fait l’objet d’au moins deux demandes répétitives, pourvu qu’elles ne soient pas couvertes par les exceptions prévues par les articles 24 et 25 de la présente loi.

    Chapitre 3. De l’accès à l’information sur demande

    Section première. Des procédures de présentation de la demande d’accès à l’information

    Article 9

    Toute personne physique ou morale peut présenter une demande écrite d’accès à l’information conformément à un modèle préétabli, mis à la disposition du public par l’organisme concerné ou sur papier libre contenant les mentions obligatoires prévues aux articles 10 et 12 de la présente loi.

    Le chargé d’accès à l’information est tenu de fournir l’assistance nécessaire au demandeur d’accès à l’information, dans le cas d’handicape ou d’incapacité de lecture ou d’écriture ou encore lorsque le demandeur serait atteint d’une incapacité auditive ou visuelle.

    Le dépôt de la demande se fait, soit directement auprès de l’organisme concerné contre la délivrance obligatoire d’un récépissé, soit par lettre recommandée ou par fax ou par courrier électronique avec accusé de réception.

    Article 10

    La demande d’accès à l’information doit obligatoirement comporter le nom, le prénom et l’adresse s’il s’agit d’une personne physique, la dénomination sociale et le siège social s’il s’agit d’une personne morale ainsi que les précisions nécessaires relatives à l’information demandée et l’organisme concerné.

    Article 11

    Le demandeur d’accès à l’information n’est pas tenu de mentionner dans la demande d’accès, les motifs ou l’intérêt justifiant sa demande.

    Article 12

    Lors de la formulation de la demande, il est impératif de préciser la modalité d’accès à l’information parmi les modalités suivantes :

    – la consultation de l’information sur place si celleci ne lui cause aucun dommage,

    – l’obtention d’une copie papier de l’information,

    – l’obtention d’une copie électronique de l’information, autant que c’est possible,

    – l’obtention d’extraits de l’information.

    L’organisme concerné doit fournir l’information suivant la forme demandée.

    A défaut, l’organisme concerné doit fournir l’information dans la forme disponible.

    Article 13

    Dans le cas où la demande d’information ne comporte pas toutes les mentions prévues aux articles 10 et 12 de la présente loi, le chargé d’accès à l’information doit en aviser le demandeur d’accès à l’information, par tout moyen laissant une trace écrite, dans un délai ne dépassant pas quinze (15) jours à compter de la date de sa réception de la demande.

    Section 2. De la réponse aux demandes d’accès à l’information

    Article 14

    L’organisme concerné doit répondre à toute demande d’accès à l’information dans un délai ne dépassant pas vingt (20) jours, à compter de la date de réception de la demande ou de celle de sa correction.

    Si la demande a pour objet, la consultation de l’information sur les lieux, l’organisme concerné doit en répondre dans un délai de dix (10) jours, à compter de la date de réception de la demande ou de celle de sa correction.

    En cas de rejet de la demande, la décision de refus doit être écrite et motivée avec mention des délais, des modalités de recours et des structures competentes pour en statuer conformément aux articles 30 et 31 de la présente loi.

    Article 15

    Le silence de l’organisme concerné à l’issue du délai légal prévu par les dispositions de la présente loi, vaut refus implicite, ouvrant pour le demandeur d’accès à l’information, les voies de recours conformément aux procédures prévues aux articles 30 et 31 de la présente loi.

    Article 16

    L’organisme concerné n’est pas tenu de répondre plus d’une fois au demandeur en cas de demandes répétitives portant sur la même information sans motif valable.

    Article 17

    Si la demande d’accès à l’information aurait des conséquences sur la vie ou la liberté d’une personne, l’organisme concerné est tenu de veiller à y répondre, par tout moyen laissant une trace écrite et immédiatement, à condition de ne pas dépasser le délai de quarante huit (48) heures à compter de la date de présentation de la demande et de motiver le rejet conformément aux dispositions du troisième paragraphe de l’article 14 de la présente loi.

    Article 18

    Dans le cas où l’information objet de demande est détenue par un organisme autre que celui auprès duquel la demande a été déposée, le chargé d’accès doit informer le demandeur de son incompétence ou du transfert de sa demande à l’organisme concerné, et ce, dans un délai máximum de cinq (5) jours à compter de la date de réception de la demande.

    Article 19

    Le délai prévu à l’article 14 de la presente loi, peut être prolongé de dix (10) jours avec notification au demandeur d’accès, lorsque la demande porte sur l’obtention ou la consultation de plusieurs informations détenues par le même organisme.

    Article 20

    Lorsque l’information demandée a été fournie, à titre confidentiel, par un tiers à l’organisme, ce dernier est tenu, après information du demandeur, de consulter le tiers en vue d’obtenir son avis motivé, quant à la diffusion partielle ou totale de l’information, et ce, dans un délai maximum de trente (30) jours à compter de la date de réception de la demande d’accès par lettre recommandée avec accusé de réception. L’avis du tiers est contraignant pour l’organisme concerné.

    Le tiers doit présenter sa réponse dans un délai de quinze (15) jours à compter de la date de réception de la demande de consultation.

    Le défaut de réponse dans les délais précités, vaut accord tacite du tiers.

    Article 21

    Dans le cas où la demande d’accès porte sur une information déjà publiée, le chargé d’accès doit en informer le demandeur et lui préciser le site de publication.

    Article 22

    S’il est prouvé que l’information obtenue par le demandeur d’accès, est incomplète, les organismes soumis aux dispositions de la présente loi, doivent mettre à sa disposition, toutes les données supplémentaires et explicatives nécessaires.

    Section 3. Des frais exigés

    Article 23

    Toute personne a gratuitement droit d’accès à l’information. Toutefois, si la fourniture de l’information nécessite des frais supportés par l’organisme concerné, le demandeur sera pré-informé de la nécessité de payer un montant à condition qu’il ne dépasse pas les coûts réels supportés par l’organisme concerné.

    L’information demandée ne sera fournie qu’après justification du paiement du montant dû.

    Chapitre 4. Des exceptions au droit d’accès à l’information

    Article 24

    L’organisme concerné ne peut refuser l’accès à l’information que lorsque ceci entraînerait un préjudice à la sécurité ou la défense nationale ou les relations internationales y liées ou les droits du tiers quant à la protection de sa vie privée, ses données personnelles et sa propriété intellectuelle.

    Ces domaines ne sont pas considérés comme des exceptions absolues au droit d’accès à l’information.

    Ils sont soumis au test de préjudice à condition que ce dernier soit grave quel qu’il soit concomitant ou postérieur. Ils sont aussi soumis au test de l’intérêt public de l’accessibilité ou l’inaccessibilité à l’information quant à chaque demande. La proportionnalité entre les intérêts voulant les protégés et la raison de la demande d’accès, sera prise en compte.

    En cas de refus, le demandeur d’accès sera informé par une lettre motivée. L’effet de refus prend fin avec l’expiration des motifs exprimés par la réponse à la demande d’accès.

    Article 25

    Le droit d’accès à l’information ne comprend pas les données relatives à l’identité des personnes ayant présenté des informations pour dénoncer des abus ou des cas de corruption.

    Article 26

    Les exceptions prévues à l’article 24 de la présente loi, ne s’appliquent pas :

    – aux informations dont la divulgation est nécessaire en vue de dévoiler des violations graves aux droits de l’Homme ou des crimes de guerre ou les investigations y liées ou la poursuite de ses auteurs, à condition de ne pas porter atteinte à l’intérêt suprême de l’Etat,

    – en cas d’obligation de faire prévaloir l’intérêt public sur le préjudice pouvant toucher l’intérêt à protéger, en raison d’une menace grave pour la santé ou la sécurité ou l’environnement ou par conséquent à la commission d’un acte criminel.

    Article 27

    Si l’information demandée est partiellement couverte par l’une des exceptions prévues aux articles 24 et 25 de la présente loi, l’accès à cette information n’est permis qu’après occultation de la partie concernée par l’exception, autant que cela est possible.

    Article 28

    L’information inaccessible au sens de l’article 24 de la présente loi, devient accesible conformément aux délais et conditions prévus par la législation en vigueur relative aux archives.

    Chapitre 5. Des recours contre les décisions de l’organisme relatives au droit d’accès à l’information

    Article 29

    Le demandeur d’accès à l’information insatisfait de la décision prise au sujet de sa demande, peut faire un recours gracieux auprès du chef de l’organisme concerné, dans un délai ne dépassant pas les vingt (20) jours suivants la notification de la décision.

    Le chef de l’organisme est tenu de lui répondre dans les plus brefs délais possibles à condition de ne pas dépasser un délai maximum de dix (10) jours à compter de la date du dépôt de la demande en révision.

    Le silence du chef de l’organisme concerné, pendant ce délai, vaut refus tacite.

    Le demandeur d’accès à l’information peut faire un recours directement auprès de l’instance d’accès à l’information mentionnée à l’article 37 de la presente loi.

    Article 30

    En cas de refus de la demande par le chef de l’organisme concerné ou en cas de défaut de réponse de sa part à l’expiration du délai de dix (10) jours à compter de la date de réception de la demande de révision, le demandeur d’accès peut interjeter appel devant l’instance d’accès à l’information mentionnée à l’article 37 de la présente loi, et ce, dans un délai ne dépassant pas les vingt (20) jours à compter de la réception de la décision du refus du chef de l’organisme ou de la date du refus tacite.

    L’instance statue sur le recours dans les plus brefs délais à condition de ne pas dépasser les quarante cinq (45) jours à compter de la réception de la demande de recours, sa décision est contraignante pour l’organisme concerné.

    Article 31

    Le demandeur d’accès ou l’organisme concerné peuvent interjeter appel contre la décision de l’instance chargée d’accès à l’information, auprès du tribunal administratif, dans un délai de trente (30) jours à compter de la date de notification de cette décision.

    Chapitre 6. Du chargé d’accès à l’information

    Article 32

    Tout organisme assujetti aux dispositions de la présente loi, doit désigner un chargé d’accès à l’information et son suppléant par décision prise à cet effet, comportant les principales données permettant d’identifier leurs identités, leurs grades et leurs emplois fonctionnels.

    L’instance d’accès à l’information mentionnée à l’article 37 de la présente loi, doit en être avisée dans un délai de quinze (15) jours à compter de la date de sa signature et cette décision doit être publiée sur le site web de l’organisme concerné.

    Article 33

    Les organismes soumis aux dispositions de la présente loi, peuvent organiser les différentes activités relatives à l’accès à l’information dans le cadre d’un organisme interne créé à cet effet, présidé par le chargé d’accès à l’information et rattaché directement au chef de l’organisme.

    Les conditions de création de cet organismo interne, sont fixées par décret gouvernemental.

    Article 34

    Le chargé d’accès à l’information est tenu notamment de :

    1. Réceptionner les demandes d’accès à l’information, les traiter et en répondre.

    2. Assurer la coordination entre l’organisme concerné auquel il est rattaché et l’instance d’accès à l’information mentionnée à l’article 37 de la presente loi.

    3. Préparer un plan d’action pour la consécration du droit d’accès à l’information en coordination avec les premiers responsables de l’organisme concerné, comportant des objectifs clairs et un calendrier à cet effet, fixant les étapes, les délais et le rôle de chaque intervenant, et ce, sous la tutelle du chef de l’organisme concerné.

    Les premiers responsables de l’organisme concerné, doivent faciliter la tâche du chargé d’accès à l’information, coordonner avec lui et lui fournir les données nécessaires pour l’élaboration du plan d’action.

    Le chargé d’accès prépare à cet effet, un rapport trimestriel qu’il transmet dans les quinze (15) jours suivants chaque trimestre, au chef de l’organisme concerné.

    4. Préparer un rapport d’activité annuel relatif à l’accès à l’information dans le premier mois de l’année suivant l’année de l’exercice et le transmettre après sa validation par le chef de l’organisme, à l’instance d’accès à l’information. Ce rapport comporte les suggestions, les recommandations nécessaires pour renforcer la consécration du droit d’accès à l’information ainsi que des données statistiques sur le nombre des demandes d’accès déposées, les demandes objet de réponse, les refus, les demandes de recours gracieux, les réponses et délais y afférents, en plus des mesures prises en matière d’accès à l’information sur initiative de l’organisme concerné, la gestion des documents et la formation des agents.

    5. Suivre la mise en œuvre du plan d’action et l’actualiser, sous la tutelle du chef de l’organisme concerné.

    Article 35

    Les responsables des départements administratifs au sein des organismes soumis aux dispositions de la présente loi, doivent mettre à la disposition du chargé d’accès, l’information demandée, lui fournir l’assistance nécessaire et lui permettre les facilitations nécessaires et possibles.

    Article 36

    Les organismes soumis aux dispositions de la présente loi, peuvent sur propre initiative ou suite à la proposition du chargé de l’accès à l’information, creer des commissions consultatives chargées de l’accès à l’information qui donne consultation au chargé d’accès et leurs agents, sur toutes les questions relatives à la mise en œuvre de la présente loi.

    Les commissions consultatives chargées d’accès à l’information mentionnées au paragraphe premier du présent article, sont créées par décision du chef de l’organisme concerné.

    Chapitre 7. De l’instance d’accès à l’information

    Article 37

    Est créée une instance publique autonome, dénommée «Instance d’accès à l’information», dotée de la personnalité morale et dont le siège est à Tunis. Elle est mentionnée, ci-après, «l’Instance».

    Section première. Des missions et attributions de l’Instance

    Article 38

    L’Instance est notamment chargée, de :

    – statuer sur les recours qui lui sont soumis en matière d’accès à l’information. Elle peut  cet effet et en cas de besoin, mener les investigations nécessaires sur place auprès de l’organisme concerné, accomplir toutes les procédures d’instruction et auditionner toute personne dont l’audition est jugée utile,

    – informer tous les organismes concernés et le demandeur d’accès personnellement, de ses décisions, – publier ses décisions sur son propre site web,

    – suivre l’engagement en matière de difusión proactive, sur initiative de l’organisme concerné, des informations mentionnées aux articles 6, 7 et 8 de la présente loi, et ce, par auto saisine de la part de l’instance ou suite à des requêtes émanant d’un tiers,

    – émettre obligatoirement un avis sur les projets de lois et les textes réglementaires ayant lien avec le domaine d’accès à l’information,

    – promouvoir la culture d’accès à l’information en coordination avec les organismes soumis aux dispositions de la présente loi et la société civile, à travers des actions de sensibilisation et de formation destinées au public,

    – évaluer périodiquement la consécration du droit d’accès à l’information par les organismes soumis aux dispositions de la présente loi,

    – préparer un rapport d’activité annuel contenant les suggestions et les recommandations nécessaires à la consécration du droit d’accès à l’information, ainsi que des données statistiques concernant le nombre des demandes d’accès à l’information, le nombre des recours, les réponses et les délais y afférents, ses décisions prises et le suivi annuel de leurs mises en œuvre par les organismos soumis aux dispositions de la présente loi,

    – échanger les expériences et l’expertise avec ses homologues étrangères et les organisations internationales spécialisées et conclure des conventions de coopération dans ce domaine.

    L’instance soumet le rapport annuel au Président de la République, au président de l’assemblée des représentants du peuple et au chef du gouvernement. Ce rapport será publié au public sur le site web de l’instance.

    Article 39

    Les responsables des organismes soumis aux dispositions de la présente loi, doivent fournir à l’Instance d’accès à l’information, toutes les facilitations possibles et indispensables à l’exercice de ses fonctions.

    Section 2. De la composition de l’Instance

    Article 40

    L’Instance se compose d’un conseil et d’un secrétariat permanent.

    Article 41

    Le conseil de l’Instance se compose de neuf (9) membres, comme suit :

    – un juge administratif, Président,

    – un juge judiciaire, vice-président,

    – un membre du conseil national des statistiques, membre,

    – un professeur universitaire spécialisé en technologie de l’information, ayant un grade de professeur d’enseignement supérieur ou de maître de conférence, membre,

    – un expert en documents administratifs et en archives, membre,

    – un avocat, membre,

    – un journaliste, membre.

    Ils doivent impérativement justifier d’une expérience d’au moins dix (10) ans de travail effectif, à la date de présentation de la candidature.

    – un représentant de l’Instance de protection des données personnelles, y ayant assumé une responsabilité pour une période d’au moins deux (2) ans, membre,

    – un représentant des associations actives dans les domaines ayant lien avec l’accès à l’information, membre.

    Il doit avoir occupé un poste de responsabilité pour une période d’au moins deux (2) ans, au sein de l’une de ces associations.

    Article 42

    Le candidat au poste de membre du conseil de l’instance, doit satisfaire les conditions suivantes :

    – être de nationalité tunisienne,

    – ne doit pas avoir d’antécédents judiciaires pour crimes intentionnels,

    – doté de l’autonomie, la transparence et l’impartialité,

    – doté de l’expérience et la compétence dans les domaines liés au sujet d’accès à l’information.

    Est déchu de son mandat, tout membre ayant présenté des données erronées et sera inéligible pour les deux mandats suivants.

    Article 43

    Le chef du gouvernement nomme les membres de l’instance suivant les modalités et procédures suivantes :

    – L’appel à candidature est ouvert sur décision du président de la commission spécialisée au sein de l’assemblée des représentants du peuple qui será publiée au Journal Officiel de la République Tunisienne, fixant le délai et les modalités de dépôt des candidatures ainsi que les conditions à remplir,

    – La commission spécialisée au sein de l’assemblée des représentants du peuple choisit et classe les trois (3) meilleurs candidats, pour chaque poste, à la majorité de trois cinquième 3/5 de ses membres par vote secret sur les noms.

    – Les candidats ayant obtenu le plus grand nombre de voix, sont retenus selon leur classement. En cas d’égalité des voix entre un homme et une femme, cette dernière sera retenue et en cas d’égalité des voix entre deux hommes, le plus jeune sera retenu.

    – Le président de l’assemblée des représentant du peuple transmet à l’assemblée générale une liste comportant le classement des trois (3) meilleurs candidats pour chaque poste, afin de choisir les membres de l’instance.

    – L’assemblée générale de l’assemblée des représentants du peuple vote pour choisir un candidat pour chaque poste, par majorité absolue de ses membres et par vote secret.

    – Le président de l’assemblée des représentants du peuple transmet la liste des membres de l’instance votés par l’assemblée générale, au chef du gouvernement qui procède à leur nomination par décret gouvernemental.

    Article 44

    Les membres de l’instance, mentionnés à l’article 41 de la présente loi, sont nommés pour un mandat de six (6) ans non renouvelable.

    Avant l’exercice de leurs fonctions, le président et les membres de l’instance prêtent, devant le Président de la République, le serment suivant : «Je jure par Dieu, le tout-puissant, d’accomplir mes fonctions avec loyauté, honneur, indépendance et de préserver le secret professionnel».

    Article 45

    Le renouvellement de la composition de l’instance se fait par moitié tous les trois (3) ans, conformément aux procédures prévues par la présente loi.

     Le président de l’instance notifie à la commission spécialisée au sein de l’assemblée des représentants du peuple, la liste des membres concernés par le renouvellement et la date de fin de leur mandat, et ce, trois (3) mois avant l’expiration de leur mandat.

    Les membres dont le mandat est expiré, continuent à exercer leurs fonctions au sein de l’Instance, jusqu’à la prise de fonctions des membres nouveaux.

    Article 46

    Contrairement aux dispositifs de l’article 45 de la présente loi, la moitié des membres de l’instance sera renouvelée au cours du premier mandat suite à la fin de la troisième année de ce mandat, et ce, par tirage au sort selon les modalités et les conditions prévues par la présente loi. Le président de l’Instance n’est pas concerné par le renouvellement par moitié.

    Son mandat est de six (6) ans.

    Article 47

    Le conseil de l’instance exerce les attributions suivantes, objet du premier, deuxième et sixième tirets de la présente loi. Il assure également:

    – la tutelle sur le fonctionnement du travail de l’instance,

    – le choix du secrétaire général de l’instance hors de ses membres. Il doit répondre aux conditions de nomination d’un directeur général d’une administration générale,

    – la désignation d’un cadre administratif parmi les agents de l’instance, qui sera chargé de rapporter ses délibérations,

    – la proposition de l’organigramme de l’instance,

    – l’adoption du règlement intérieur de l’instance,

    – la proposition du projet de budget de l’instance,

    – l’adoption du rapport annuel de l’instance.

    Article 48

    L’instance est pourvue de services administratifs composés d’agents détachés des administrations publiques et d’agents recrutés conformément au statut particulier des agents de l’instance.

    Le statut particulier des agents de l’instance, mentionné au premier alinéa, est fixé par décret gouvernemental.

    L’organigramme de l’instance est approuvé par décret gouvernemental conformément à une proposition du conseil de l’instance.

    Article 49

    Les indemnités et les privilèges du président de l’instance, du vice-président ainsi que ceux de ses membres, sont fixés par décret gouvernemental.

    Le président de l’instance et son vice-président sont tenus obligatoirement d’exercer leurs fonctions à plein temps.

    Section 3. Du fonctionnement de l’Instance

    Article 50

    L’instance se réunit suite à une convocation de son président, et ce, une fois tous les quinze (15) jours et chaque fois en cas de besoin.

    Les réunions de l’instance sont présidées par le président ou par le vice-président, si nécessaire. Le président de l’instance propose et fixe l’ordre du jour des réunions.

    Le président de l’instance peut inviter toute personne dont sa présence aux réunions est jugée utile vu sa compétence se rapportant aux questions présentées à l’ordre du jour, et ce, sans participer au vote.

    Les délibérations de l’instance se déroulent à huis clos en présence de la majorité de ses membres, au minimum.

    En l’absence du quorum, une réunion será correctement tenue après une demi-heure de son rendezvous quelque soit le nombre des membres présents.

    L’instance prend ses décisions par vote à la majorité des voix des membres présents.

    Les délibérations de l’instance et ses décisions sont consignées dans un procès-verbal signé par le président de l’instance et par tous les membres présents.

    Article 51

    Il est interdit aux membres de l’instance de participer à ses délibérations, et ce, dans les cas suivants:

    – s’ils ont un intérêt direct ou indirect lié à l’objet de la délibération,

    – s’ils ont participé directement ou indirectement dans la prise de décision objet de la réunion.

    Article 52

    Tout membre de l’instance est tenu de sauvegarder le secret professionnel dans tout ce qui est porté à sa connaissance des documents ou données ou renseignements concernant les affaires du ressort de l’instance et de ne pas les exploiter à des fins autres que celles requises par les attributions qui lui sont confiées, même après l’expiration de ses fonctions.

    Article 53

    Il est possible de mettre fin aux fonctions des membres de l’instance avant la fin de leur mandat par décret gouvernemental sur proposition du président de l’instance sur la base du vote par la majorité des voix des membres et après audition du membre concerné, et ce, dans les cas suivants:

    – faute grave relative au non-respect des obligations professionnelles ou l’absence non justifiée pendant trois (3) réunions consécutives ou pendant six (6) réunions non consécutives pendant douze (12) mois,

    – la participation dans les délibérations de l’instance dans les cas mentionnés à l’article 51 de la présente loi,

    – la divulgation ou la confession des informations ou des documents obtenus lors de l’exercice des fonctions au sein de l’instance.

    – la perte de l’une des conditions de candidature à l’instance.

    Article 54

    Les vacances pour cause de décès, de démission, de révocation ou d’handicape absolu sont constatées et consignées par l’instance dans un procès-verbal spécial qui sera transmis à l’assemblée des représentants du peuple pour les remplir.

    Section 4. Des fonctions du président de l’instance

    Article 55

    Le président de l’instance est son représentant légal. Il veille au déroulement de ses travaux et il exerce, dans le cadre des attributions qui lui sont confiées, les prérogatives suivantes:

    – la supervision administrative et financière de l’instance ainsi que ses agents,

    – la supervision de l’élaboration du projet du budget annuel de l’instance,

    – la supervision de l’élaboration du rapport annuel de l’instance.

    Le président de l’instance peut aussi déléguer certaines de ses prérogatives à son viceprésident ou à tout membre de l’instance.

    Section 5. Des ressources de l’Instance

    Article 56

    Les ressources financières de l’instance sont composées de:

    – subventions allouées par l’Etat,

    – recettes provenant des activités et services de l’instance,

    – dons fournis à l’instance conformément à la législation et aux réglementations en vigueur,

    – autres recettes attribuées à l’instance par la loi ou par un texte réglementaire.

    Les règles d’ordonnancement et de la tenue des comptes de l’instance sont soumises au code de la comptabilité publique.

    Chapitre 8. Des sanctions

    Article 57

    Est puni d’une amende allant de cinq cents (500) dinars jusqu’aux cinq mille (5.000) dinars, quiconque qui entrave intentionnellement l’accès à l’information au sein des organismes soumis aux dispositions de la présente loi.

    Est puni de la sanction prévue par l’article 163 du code pénal, quiconque qui endommage intentionnellement l’information d’une manière illégale ou qui incite une autre personne pour le commettre.

    Article 58

    Hormis les sanctions prévues par l’article 57 de la présente loi, tout agent public ne respectant pas les dispositions de cette loi organique, sera objet de poursuites disciplinaires conformément à la législation en vigueur.

    Chapitre 9. Dispositions transitoires et finales

    Article 59

    Sous réserve de l’alinéa 2 de l’article 61, la présente loi entre en vigueur dans un délai d’une année à compter de la date de sa publication au Journal Officiel et elle annule et substitue, à compter de cette date, le décret-loi n° 2011-41 daté du 26 mai 2011, relatif à l’accès aux documents administratifs des organismes publics, tel que modifié et complété par le décret-loi n° 2011-54 du 11 juin 2011.

    Article 60

    Les organismes publics soumis aux dispositions de la présente loi, doivent :

    – réaliser un site web officiel et publier les guides mentionnés au septième tiret de l’article 38 de la présente loi, dans un délai de six (6) mois à compter de la date de publication de la présente loi,

    – finaliser l’organisation de leurs archives dans un délai ne dépassant pas une année au maximum, à compter de la date de publication de la présente loi,

    – mettre en place et exploiter un système de classification des documents administratifs qu’ils détiennent, afin de faciliter le droit à l’accès à l’information, et ce, dans un délai ne dépassant pas une année à compter de la date de publication de la présente loi,

    Assurer la formation nécessaire en matière d’accès à l’information, à leurs agents.

    Article 61

    L’instance commence l’exercice de ses fonctions au plus tard dans un délai d’une année à compter de la date de publication de la présente loi.

    Le tribunal administratif continue à statuer sur les demandes de recours contre les décisions de refus d’accès à l’information sous son regard avant le commencement de l’instance de son exercice, et ce, conformément aux règles et procédures prévues par le décret-loi n° 2011-41 daté du 26 mai 2011, relatif à l’accès aux documents administratifs des organismos publics tel que modifié et complété par le décret-loi n° 2011-54 du 11 juin 2011.

    La présente loi organique sera publiée au Journal Officiel de la République Tunisienne et exécuté en tant que loi de l’Etat.

    Tunis le 24 mars 2016.

    Le Président de la République, Mohamed Béji Caïd Essebsi

    02May/21

    Décret‐loi n° 2011‐54 du 11 juin 2011

    Décret‐loi n° 2011‐54 du 11 juin 2011, modifiant et complétant le décret‐loi n° 2011‐41 du 26 mai 2011 relatif à l’accès aux documents administratifs des organismes publics.

    Le Président de la République par intérim,

    Sur proposition du Premier ministre, 

    Vu la loi organique n° 2004‐63 du 27 juillet 2004, portant sur la protection des données à caractère personnel, 

    Vu la loi n° 88‐95 du 2 août 1988, relative aux archives, 

    Vu la loi n° 99‐32 du 13 avril 1999, relative au système national des statistiques, 

    Vu le décret‐loi n° 2011‐14 du 23 mars 2011, portant organisation provisoire des pouvoirs publics, 

    Vu le décret‐loi n° 2011‐41 du 26 mai 2011 relatif à l’accès aux documents administratifs des organismes publics, 

    Vu le décret n° 93‐1880 du 13 septembre 1993, relatif au système d’information et de communication administrative, 

    Vu l’avis de l’instance nationale indépendante pour la réforme du secteur de l’information et de la communication, 

    Vu la délibération du conseil des ministres. 

    Prend le décret‐loi dont la teneur suit : 

    Article premier

    Sont abrogées les dispositions de l’article 16 et du paragraphe premier de l’article 22 du décret‐loi n° 2011‐41 du 26 mai 2011, relatif à l’accès aux documents administratifs des organismes publics, et remplacées comme suit : 

    «Article 16 (nouveau). Un organisme public peut refuser de communiquer un document administratif protégé par la législation relative à la protection des données à caractère personnel et celle relative à la protection de la propriété littéraire et artistique, ou par une décision juridictionnelle ou quand il s’agit de document fourni à l’organisme public concerné à titre confidentiel. 

    Article 22 (paragraphe premier nouveau). Sans préjudice au droit d’accès aux documents administratifs prévu par l’article 3 du présent décret‐loi qui s’applique immédiatement, les organismes publics doivent se mettre en pleine conformité avec les dispositions du présent décret‐loi, dans un délai de deux ans à compter de l’entrée en vigueur du présent décret‐loi». 

    Article 2

    Est ajouté à l’article 22 du décret‐loi n° 2011‐41 du 26 mai 2011, relatif à l’accès aux documents administratifs des organismes publics un paragraphe troisième dont la tener suit : 

    «Article 22 (paragraphe troisième). Les rapports susvisés sont publiés aux sites web des organismes publics concernés». 

    Article 3

    Sont abrogées les dispositions de l’article 23 du décret‐loi n° 2011‐41 du 26 mai 2011, relatif à l’accès aux documents administratifs des organismes publics. 

    Article 4

    Le présent décret‐loi sera publié au Journal Officiel de la République Tunisienne.

    Tunis, le 11 juin 2011.

    Le Président de la République par intérim Fouad Mebazaâ

    01May/21

    Algeria’s Constitution of 1989, Reinstated in 1996, with Amendments through 2016.

    Algeria’s Constitution of 1989, Reinstated in 1996, with Amendments through 2016.

    Preamble

    The Algerian people are a free people; and they are resolved to remain so.

    Stretching back over thousands of years, their history is marked by a progression of exertion and struggle that has turned Algeria into an everlasting seedbed of freedom and a land of glory and dignity.

    Ever since the Numidian era and the Islamic Conquest, and up until the wars of liberation against colonialism, Algeria has always known at the epic moments witnessed in the Mediterranean basin how to find amongst her children pioneers of freedom, unity and progress, as well as builders of prosperous democratic states throughout the epochs of grandeur and peace.

    The 1st November 1954 was a turning point in determining her future and a tremendous crowning of a ferocious resistance during which she withstood the diverse onslaughts on her culture and values, as well as the fundamental constituents of her identity, namely Islam, Arabism and Amazighism that the State has been relentlessly endeavouring to promote and develop each one of them; the roots of her current exertion in the various domains stretch back to the glorious past of her Nation.

    The Algerian people rallied round the national movement and subsequently the National Liberation Front, and made the ultimate sacrifice in order to assume their collective destiny under the banner of their recovered freedom and national cultural identity and to build their authentic people’s constitutional institutions.

    Under the leadership of the National Liberation Front and the National Liberation Army, the Algerian people crowned what their preeminent children made in terms of ultimate sacrifices during the people’s war of liberation with independence, and built a modern and fully sovereign state.

    The belief in the collective choices has enabled the people to achieve a host of momentous victories marked by the reclaiming of national riches and the making of a state devoted exclusively to serving the masses and exercising its powers in total independence and free of any foreign pressure.

    However, the Algerian people had experienced a genuine national tragedy that jeopardised the very existence of the homeland. Hence, they decided, armed with their unwavering belief and integrity, and in full sovereignty, to effectuate the Peace and National Reconciliation policy, which has eventually blossomed and which they are determined to preserve.

    The Algerian people shall be determined to keep Algeria immune from Fitna, violence and all forms of extremism by establishing their spiritual and civilisational values which call for dialogue, reconciliation and fraternity within the framework of respect for the Constitution and the laws of the Republic.

    The Algerian people have always been struggling for freedom and democracy and they are resolved to uphold their national sovereignty and independence. With this Constitution, they are determined to establish a host of institutions based on the participation of every single Algerian man and woman in conducting public affairs and the capacity to achieve social justice, equality and freedom for everyone within the framework of a democratic and republican state.

    By approving this Constitution, which is the manifestation of their proper genius, the reflection of their aspirations, the fruit of their determination and the outcome of the profound social mutations they have occasioned, the Algerian people shall substantiate with full appreciation and resoluteness more than ever before the ascendancy of the law.

    The Constitution stands above all; it shall be the fundamental law safeguarding the individual and collective rights and freedoms. It shall protect the principle of the people’s freedom of choice, lend legitimacy to the exercise of powers and consecrate the democratic alternation of power through free and fair elections.

    The Constitution shall ensure the separation of powers, the independence of the judiciary, the legal protection and the monitoring of public authorities’ performance in a society where legitimacy shall be prevalent and man shall prosper in all aspects of life.

    The Algerian people shall remain committed to their choices in order to restrain class differences and abolish all aspects of regional disparities. They shall work towards building a productive and competitive economy within the framework of sustainable development and environmental protection.

    The youth shall be at the heArticle of national commitment by rising to the economic, social and cultural challenges. They shall, together with future generations, be the main beneficiaries of such a commitment.

    The People’s National Army, successor of the National Liberation Army, shall asume its constitutional duties with utmost commitment and valiant preparedness to sacrifice whenever national duty demands. The Algerian people are proud of their National Army and grateful for all the efforts it has exhausted to protect the country from any foreign threat and for its quintessential role in protecting the citizens, institutions and properties from the plague of terrorism; those efforts have contributed to strengthening the nationalistic bond and consecrating the spirit of solidarity between the people and their army.

    The State shall attend to the professionalism of the People’s National Army and to its modernisation in the manner that enables it to acquire the requisite capabilities to preserve national independence, defend Algeria’s national sovereignty, her unity and territorial integrity and protect her land, sea and air boundaries.

    Armed with their deeply-ingrained spiritual values and loyal to their traditions of solidarity and justice, the people are confident in their ability to contribute effectively to the cultural, social and economic progress in the world of today and tomorrow.

    Algeria, land of Islam, an integral pArticle of the Great Arab Maghreb and an Arab, Mediterranean and African country is proud of her radiant Revolution of November 1 and is honoured by the respect she has gained and known how to preserve owing to its commitment to all the just causes of the world.

    The Algerian diplomacy shall endeavour to consolidate its presence and influence on the international scene through partnerships based upon the balanced interests that are totally concordant with Algeria’s political, economic, social and cultural national choices.

    The pride of the Algerian people, their sacrifices, sense of responsibility and inveterate adherence to freedom and social justice reflect the optimum guarantees of their respect for the principles of this Constitution which they shall adopt and bequeath to the future generations, the successors of the pioneers of freedom and the founders of the free society.

    This preamble shall be part and parcel of this Constitution.

    Title 1.THE GENERAL PRINCIPLES GOVERNING THE ALGERIAN SOCIETY

    CHAPTER I. Algeria

    Article 1

    Algeria shall be a People’s Democratic Republic. It shall be one and indivisible.

    Article 2

    Islam shall be the religion of the State.

    Article 3

    Arabic shall be the national and official language.

    Arabic shall remain the official language of the State.

    A High Council for the Arabic Language shall be established under the auspices of the President of the Republic.

    The High Council for the Arabic Language shall be assigned the special task of working towards the affluence of the Arabic language, the generalisation of its use in scientific and technological fields and promoting the translation into it for this purpose.

    Article 4

    Tamazight shall also be a national and an official language.

    The State shall endeavour to promote and develop it in all its linguistic varieties in use throughout the national territory.

    An Algerian academy for the Tamazight language shall be established under the authority of the President of the Republic.

    It shall be supported by the work of the experts and assigned the task of providing the necessary requirements to develop the Tamazight language in order to integrate it as an official language in the future.

    The modalities of implementing this Article  shall be stipulated by an organic law.

    Article 5

    The capital of the Republic shall be Algiers.

    Article 6

    The national emblem and the national anthem are conquests of the Revolution of November 1, 1954. They shall be unalterable.

    These two symbols of the Revolution, having become those of the Republic, shall have the following features:

    1. The national emblem shall be green and white with a red star and crescent moon placed at the centre.

    2. The national anthem shall be «Qassaman» with all its stanzas.

    The seal of the State shall be determined by law.

    CHAPTER II. The People

    Article 7

    The people shall be the source of all powers.

    National sovereignty shall belong exclusively to the people.

    Article 8

    The constituent power shall belong to the people.

    The people shall exercise their sovereignty through the institutions they establish.

    The people shall exercise this sovereignty by means of referenda and through their elected representatives.

    The President of the Republic may have direct recourse to the expression of the Will of the people.

    Article 9

    The people shall establish institutions with the objective of:

    • safeguarding and consolidating national sovereignty and independence;

    • safeguarding and consolidating the national identity and unity;

    • protecting the basic freedoms of the citizens and the social and cultural flourishing of the Nation;

    • promoting social justice;

    • eradicating regional disparities in the domain of development;

    • encouraging the building of a diversified economy that appreciates all the country’s faculties, be they natural, human or scientific.

    • protecting the national economy against all forms of misappropriation, speculation, bribery, illegal trading, abuse, unlawful acquisition and arbitrary confiscation.

    Article 10

    The institutions shall not indulge in:

    • feudal, regionalist and nepotistic practices;

    • establishing relations of exploitation and bonds of dependency;

    • infringing the Islamic morals and the values of the November Revolution.

    Article 11

    The people shall be free to choose their representatives.

    The representation of the people shall have no restrictions save for those specified in the Constitution and the electoral law.

    CHAPTER III: The State

    Article 12

    The State shall derive its legitimacy and raison d’être from the volition of the people.

    «By the people and for the people» shall be the motto of the State.

    The State shall exclusively be in the service of the people.

    Article 13

    The sovereignty of the State shall extend to its territory, airspace and territorial waters.

    The State shall also exercise its sovereign right, established by international law,

    over each of its different zones of maritime space belonging to it.

    Article 14

    It shall be emphatically prohibited to relinquish or forsake any pArticle of the national territory.

    Article 15

    The State shall be founded on the principles of organisational democracy, the separation of powers and social justice.

    The elected Assembly shall constitute the framework within which the people shall express their volition and monitor the action of public authorities.

    The State shall promote participatory democracy at local governments’ level.

    Article 16

    The local authorities of the State shall be the Municipality and the Wilaya.

    The Municipality shall be the basic authority.

    Article 17

    The elected Assembly shall epitomise the basis of decentralisation and the setting where citizens partake in running public affairs.

    Article 18

    Public property shall be an asset of the national community.

    It shall encompass the subsoil, mines and quarries, natural energy sources, and the mineral, natural and living resources in the various areas of the national maritime properties, waters and forests.

    It shall also encompass the railways, maritime and air transports, the post and telecommunications, as well as all other assets stipulated by the law.

    Article 19

    The State shall ensure the rational use of natural resources and their preservation for the benefit of future generations.

    The State shall protect agricultural lands.

    The State shall also conserve public water domain.

    The law shall determine the modalities of implementing this provision.

    Article 20

    The national domain shall be defined by the law.

    It shall comprise the public and private domains of the State, the Wilaya and the Municipality.

    The management of the national domain shall be in conformity with law.

    Article 21

    The organisation of foreign trade shall be the competency of the State.

    The law shall determine the stipulations pertaining to foreign trade practice and control.

    Article 22

    Expropriation shall only be effectuated within the framework of the law.

    It shall give rise to a fair and equitable compensation.

    Article 23

    Positions and tenures in the civil service shall not constitute a source of enrichment or a means to serve private interests.

    Any person appointed to a senior government position, elected to a local assembly, appointed or elected to a national assembly or a national institution, shall disclose their assets before assuming office and at the end of their tenure.

    The modalities of implementing these provisions shall be stipulated by the law.

    Article 24

    Abuse of authority shall be punishable by law.

    Article 25

    The impartiality of the administration shall be guaranteed by law.

    Article 26

    The State shall be responsible for the security of people and properties.

    Article 27

    The State shall endeavour to protect the rights and the interests of its citizens abroad in compliance with international law, the conventions concluded with the host countries, national legislation and the legislation of the countries of residence.

    The State shall attend to preserving the identity of its citizens residing abroad, consolidating their ties with the Nation and mobilising their contribution to the development of their motherland.

    Article 28

    The consolidation and development of the Nation’s defensive potential shall be regulated by the National People’s Army.

    The National People’s Army shall assume the permanent task of preserving national independence and defending national sovereignty.

    It shall also assume the task of protecting the unity of the country and the integrity of its land, as well as defending its land, airspace and the various zones of its maritime domain.

    Article 29

    Algeria shall not resort to war to impinge on the legitimate sovereignty and the freedom of other peoples.

    She shall endeavour to settle international differences through peaceful means.

    Article 30

    Algeria shall extend her solidarity to all the peoples struggling for political and economic liberation, for the right of self-determination and against all forms of racial discrimination.

    Article 31

    Algeria shall work towards strengthening international cooperation and promoting amicable relations between the states on the basis of equality, mutual interest and non-interference in domestic affairs. She shall adopt the principles and objectives of the United Nations’ Charter.

    CHAPTER IV. Rights and Freedoms

    Article 32

    All citizens shall be equal before the law. No pretext for discrimination on the basis of birth, race, gender, opinion or any other personal or social condition or situation shall be admissible.

    Article 33

    Algerian nationality shall be defined by the law.

    The conditions for the acquisition and retention of the Algerian nationality, its loss, or revocation shall be determined by law.

    Article 34

    The institutions shall seek to ensure equality of rights and duties of all citizens by removing the obstacles impeding the development of the human personality and preventing the effectual participation of all in the political, economic, social and cultural life.

    Article 35

    The State shall work towards promoting the political rights of women by increasing their chances of access to representation in elected assemblies.

    The modalities of implementing this Article  shall be determined by an organic law.

    Article 36

    The State shall work towards promoting equity in terms of opportunities between men and women in the job market.

    The State shall encourage the promotion of women to positions of responsibility in public institutions and administrations, as well as in the enterprises.

    Article 37

    Youth shall be a living force in building the country.

    The State shall attend to generating all the conditions that guarantee the development of their capabilities and stimulate their energies.

    Article 38

    Fundamental freedoms, human rights and rights of the citizen shall be guaranteed.

    They shall constitute the common heritage of all Algerian men and women, who shall assume the task of transmitting it from generation to generation so that they may preserve its integrity and inviolability.

    Article 39

    Individual and associative defence of the fundamental Human Rights and the individual and collective freedoms shall be guaranteed.

    Article 40

    The State shall guarantee the inviolability of the human person.

    Any form of physical or moral violence or infringement of dignity shall be prohibited.

    Brutal, inhumane or degrading treatment shall be punishable by law.

    Article 41

    Infringements of rights and freedoms as well as any physical or moral attack on the integrity of the human being shall be punishable by law.

    Article 42

    Freedom of conscience and freedom of opinion shall be inviolable.

    Freedom of worship shall be guaranteed in compliance with the law.

    Article 43

    Freedom of investment and trading shall be acknowledged. It shall be exercised within the statutory framework.

    The State shall work towards improving the business environment. It shall encourage the growth of businesses without any discrimination in the service of national economic development.

    The State shall regulate the market. The law shall protect the rights of the consumers.

    The law shall prohibit monopoly and unfair competition.

    Article 44

    Freedom of intellectual, artistic and scientific creativity shall be guaranteed to the citizen.

    Intellectual property shall be protected by law.

    The seizure of any publication, recording or other means of communication and            information shall only be effectuated by virtue of a judicial warrant.

    Academic freedom and the freedom of scientific research shall be guaranteed and practised within the framework of the law.

    The State shall work towards promoting and valorising scientific research to further the Nation’s sustainable development.

    Article 45

    The right to culture shall be guaranteed for all citizens.

    The State shall protect and work towards preserving the tangible and intangible national cultural heritage.

    Article 46

    The private life and the honour of the citizen shall be inviolable and protected by law.

    The secrecy of correspondence and private communications, in all their forms, shall be guaranteed.

    It shall be emphatically forbidden to infringe these rights without a reasoned requisition by the judicial authority. The breach of this provision shall be punishable by law.

    The protection of individuals when handling personal data shall be a fundamental right guaranteed by law; its violation shall be punishable by law.

    Article 47

    The State shall guarantee the inviolability of the domicile.

    No search can be made, except in compliance with a law and in conformity with its provisions.

    A search may only be effectuated by virtue of a warrant issued by the competent judicial authority.

    Article 48

    Freedoms of expression, association and assembly shall be guaranteed to the citizen.

    Article 49

    Freedom of peaceful assembly shall be guaranteed to the citizen within the framework of the law stipulating the modalities of its practice.

    Article 50

    Freedom of the press, be it written, audiovisual or on information networks shall be guaranteed. It shall not be restricted by any form of prior censorship.

    This freedom shall not be exploited to infringe upon the dignity, liberty and rights of the others.

    The free dissemination of information, ideas, images and opinions shall be guaranteed within the framework of the law and the respect for the basics and religious, moral and cultural values of the Nation.

    Press offences shall not incur a custodial sentence.

    Article 51

    The acquisition and transmission of information, documents and statistics shall be guaranteed to the citizen.

    The exercising of this right shall not infringe on the private life and the rights of others, and on the legitimate interests of businesses, as well as the exigencies of national security.

    The law shall determine the modalities of exercising this right.

    Article 52

    The right to establish political parties shall be acknowledged and guaranteed.

    However, this right may not be invoked in order to undermine fundamental freedoms, the values and the main constituents of the national identity, the national unity, the security and integrity of the national territory, the independence of the country and the sovereignty of the people, as well as the democratic and republican character of the State.

    In accordance with the provisions of the present Constitution, political parties shall not be founded on a religious, linguistic, racial, sexual, corporatist or regional basis.

    Political parties may not have recourse to party political propaganda using the elements referred to in the previous paragraph.

    Political parties shall be forbidden from having any form of affiliation to foreign interests or parties.

    No political party shall resort to violence or constraint, of whatever nature or form.

    Other obligations and duties shall be determined by the organic law.

    Article 53

    In compliance with the provisions of the abovementioned Article 52, the registered political parties shall without any discrimination benefit especially of the following rights:

    • freedom of opinion, expression and assembly;

    • airtime in public media outlets proportional to their representation at national level;

    • public funding, if appropriate, based on their representation in Parliament, as determined by the law;

    • exercising power at local and national levels through democratic alternation in accordance with the provisions of this Constitution.

    The law shall determine the modalities of implementing this provision.

    Article 54

    The right to form associations shall be guaranteed.

    The State shall encourage the flourishing of associative movements.

    An organic law shall determine the conditions and the modalities pertaining to the creation of associations.

    Article 55

    Every citizen enjoying all civil and political rights shall have the right to freely choose the place of residence and to move within the national territory.

    The right of entry and exit from the national territory shall be guaranteed.

    Any restriction of these rights shall only be enforced for a specific period and by virtue of a reasoned decision by the judicial authority.

    Article 56

    Every person shall be presumed innocent until proven guilty by an ordinary jurisdiction in accordance with a fair trial that ensures all the requisite guarantees for his defence.

    Article 57

    Underprivileged persons shall have access to legal aid.

    The law shall determine the conditions for the implementation of this provision.

    Article 58

    No person shall be held guilty except by virtue of a law duly promulgated before the perpetration of the incriminated act.

    Article 59

    No person shall be prosecuted, arrested or detained except in the cases determined by law and in accordance with the forms prescribed by it.

    Provisional detention shall be an exceptional measure for which the reasons, period and conditions of its extension are defined by law.

    Acts and facts of arbitrary arrest shall be punishable by law.

    Article 60

    Detention pending a criminal investigation shall be subject to judicial control and shall not exceed forty-eight (48) hours.

    Any person remanded in custody shall have the right to get in touch with his family immediately.

    Any person remanded in custody shall be informed of his right to contact his lawyer.

    The exercise of this right may be restricted by the judge in exceptional circumstances specified by law.

    Extended pre-charge detention shall only be effectuated as an exceptional measure in accordance with the conditions specified by law.

    When the term of custody expires an obligatory medical examination shall be carried out on the person on remand should he so requests; in any case, he shall be informed of this right.

    Medical examination shall be mandatory for minors.

    The law shall determine the modalities of implementing this provision.

    Article 61

    Miscarriage of justice shall give rise to compensation by the State.

    The law shall determine the conditions and modalities of the compensation.

    Article 62

    Every citizen meeting the legal requirements shall have the right to vote and to be elected.

    Article 63

    All citizens shall have equal access to functions and employment in the State, without any conditions other than those stipulated by law.

    Exclusive Algerian nationality shall be a prerequisite for access to senior executive positions in government and in politics.

    The law shall determine the list of the abovementioned high office and political positions.

    Article 64

    Private property shall be guaranteed.

    The right to inheritance shall be guaranteed.

    The holdings of the «waqf» and the foundations shall be acknowledged; their purposes shall be protected by law.

    Article 65

    The right to education shall be guaranteed.

    Public education shall be free within the conditions fixed by law.

    Primary education shall be compulsory.

    The State shall organise the national education system.

    The State shall protect equal access to schooling and vocational training.

    Article 66

    All citizens shall have the right to healthcare.

    The State shall ensure the prevention and the fight against epidemic and endemic diseases.

    The State shall work towards generating the conditions of healthcare for the underprivileged.

    Article 67

    The State shall encourage housing projects.

    The State shall work towards facilitating the access to housing for disadvantaged categories.

    Article 68

    Citizens shall have the right to a healthy environment.

    The State shall work towards preserving the environment.

    The law shall determine the obligations of natural and legal persons pertaining to the protection of the environment.

    Article 69

    All citizens shall have the right to work.

    The right to protection, security and hygiene at work shall be guaranteed by law.

    The right to rest shall be guaranteed. Law shall determine the modalities of its exercise.

    The right to social security for workers shall be guaranteed by law.

    Employment of children below the age of sixteen (16) shall be punishable by law.

    The State shall work towards promoting apprenticeship and putting in place the policies that support job creation.

    Article 70

    The right to belong to a trade union shall be acknowledged for all citizens.

    Article 71

    The right to strike shall be acknowledged. It shall be exercised within the framework of the law.

    The law may prohibit or restrict the exercise of the right to strike in the fields of national defence and security, or for services and public activities which are of vital interest to the community.

    Article 72

    The family shall enjoy the protection of the State and society.

    The family, society and the State shall protect the rights of children.

    The State shall take responsibility for abandoned or non-affiliated children.

    The law shall punish violence against children.

    The State shall work towards assisting vulnerable persons with special needs in enjoying all the acknowledged rights of the citizens and in gaining social integration.

    The family and the State shall protect the elderly.

    The conditions and modalities of implementing the current provisions shall be fixed by law.

    Article 73

    The living conditions of citizens below the legal working age and those who cannot work or can never work again shall be guaranteed.

    CHAPTER V. Duties

    Article 74

    Ignorance of the law is no excuse.

    Every person shall respect the Constitution and the laws of the Republic.

    Article 75

    Every citizen shall assume the duty of protecting and safeguarding the country’s independence and sovereignty, the integrity of its national territory, the unity of its people and all the attributes of the State.

    Treason, espionage, defection to the enemy, and all offences committed against the security of the State, shall be punished to the fullest extent of the law.

    Article 76

    Every citizen shall faithfully undertake his obligations vis-à-vis the national community.

    The commitment of the citizen towards his Mother Country and the obligation to contribute to its defence shall be sacred and permanent duties.

    The State shall guarantee the respect for the symbols of the Revolution, the memory of the Shouhada’ and the dignity of their dependants and that of the Mujahidin.

    The State, furthermore, shall endeavour to promote the writing of history and its teaching to the younger generations.

    Article 77

    All individual freedoms shall be exercised within the respect of the rights of others recognised by the Constitution; in particular, the respect of the right to honour, privacy and the protection of the family, the youth and childhood.

    Article 78

    Citizens shall be equal in respect of taxation.

    Everyone should participate in the financing of public expenditure according to his ability to contribute.

    No tax may be imposed except by reason of a law.

    No tax, contribution, excise or right of any kind may be imposed with retroactive effect.

    Any action to circumvent the equality of citizens and legal persons as regards taxation is an infringement of the interests of the national community. It shall be punishable by law.

    The law shall punish tax evasion and capital flight.

    Article 79

    Under penalty of prosecution, parents shall have the obligation to ensure the education of their children, and children shall have the duty to provide help and assistance to their parents.

    Article 80

    The duty of every citizen is to protect public property and the interests of the national community and to respect the property of others.

    Article 81

    Any foreigner entering the national territory legally shall have his life and property protected in accordance with the law.

    Article 82

    None shall be extradited except according to and in implementation of the extradition law.

    Article 83

    In no case shall a political refugee having legally the right of asylum be delivered or extradited.

    Title 2. ORGANISATION OF POWERS

    CHAPTER I. The Executive Power

    Article 84

    The President of the Republic, Head of State, shall embody the unity of the Nation.

    He shall be the guarantor of the Constitution.

    He shall embody the State within the country and abroad.

    He shall reserve the right to address the Nation directly.

    Article 85

    The President of the Republic shall be elected by universal, direct and secret suffrage.

    The election shall be won by an absolute majority of votes cast.

    The other terms of the presidential election shall be prescribed by an organic law.

    Article 86

    The President of the Republic shall exercise the supreme magistracy within the limits defined by the Constitution.

    Article 87

    To be eligible for the Presidency of the Republic, the candidate shall:

    • not have acquired a foreign nationality;

    • have, solely, the native Algerian nationality and certify the native Algerian nationality of the father and mother;

    • be Muslim;

    • be forty (40) years old on election day;

    • enjoy full civil and political rights;

    • prove the exclusive native Algerian nationality of the spouse;

    • justify a permanent residence only in Algeria for a minimum of ten (10) years preceding the submission of the candidacy;

    • justify his participation in the Revolution of 1 November 1954 for the candidates born before July 1942;

    • justify the non-involvement of the parents of the candidate born after July 1942, in hostile acts against the Revolution of 1st November 1954;

    • submit a public declaration of his movable and immovable property, both inside and outside Algeria.

    Other conditions shall be prescribed by an organic law.

    Article 88

    The presidential term shall be five (5) years.

    The President of the Republic may be re-elected once.

    Article 89

    The President of the Republic shall take an oath before the people and in the presence of the high authorities of the Nation, in the week following his election.

    He shall take office after being sworn in.

    Article 90

    The President of the Republic shall take the Oath in the following terms:

    ”In the Name of Allah the most Merciful the most Compassionate. Faithful to the great sacrifices and to the memory of our martyrs as well as to the ideals of the eternal November Revolution, I do solemnly swear by Allah the Almighty that I shall respect and glorify the Islamic religion, defend the Constitution, see to the continuity of the State and provide the necessary conditions for the normal functioning of the reinforcement of the democratic process, respect the free choice of the people as well as the institutions and laws of the Republic, preserve the integrity of the national territory, the unity of the people and the nation, protect the freedoms and the fundamental human and citizen’s rights, work relentlessly towards the development and progress of the people and endeavour with all my strength to achieve the great ideals of justice, freedom and peace in the world. And Allah is my witness”.

    Article 91

    In addition to the powers explicitly conferred upon him by other provisions of the Constitution, the President of the Republic shall have the following powers and prerogatives:

    1. he shall be the Commander-in-Chief of the Armed Forces of the Republic;

    2. he shall be responsible for National Defence;

    3. he shall decide and conduct the foreign policy of the Nation;

    4. he shall chair the Council of Ministers;

    5. he shall appoint the Prime Minister, after consultation with the parliamentary majority, and terminate his functions;

    6. he shall sign the presidential decrees;

    7. he shall have the right to grant pardons, the right to remission or commutation of punishment;

    8. he may refer, on any issue of national importance, to the people by means of referendum;

    9. he shall conclude and ratify international treaties;

    10. he shall award decorations, distinctions and honorary titles of the State.

    Article 92

    The President of the Republic shall appoint:

    1. to posts and mandates provided by the Constitution;

    2. to civil and military posts of the State;

    3. to posts decided by the Council of Ministers;

    4. the First President of the Supreme Court;

    5. the President of the Council of State;

    6. the Secretary General of the Government;

    7. the Governor of the Bank of Algeria;

    8. the judges;

    9. the officials of security organs;

    10. the Walis.

    The President of the Republic shall appoint and recall ambassadors and special envoys of the Republic abroad.

    He shall receive the letters of credence and recall of foreign diplomatic representatives.

    In addition to the functions set out in paragraphs 4 and 5 above, an organic law shall determine the other judicial functions to which the President of the Republic shall appoint.

    Article 93

    The President of the Republic shall appoint the members of the Government after consultation with the Prime Minister.

    The Prime Minister shall coordinate Government action.

    The Government shall develop its action plan and present it in the Council of Ministers.

    Article 94

    The Prime Minister shall submit the action plan of the Government for the approval of the People’s National Assembly. The latter shall hold a general debate for this purpose.

    The Prime Minister may, in light of this debate, adapt this action plan in consultation with the President of the Republic.

    The Prime Minister shall submit a statement to the Council of the Nation on the action plan of the Government as approved by the People’s National Assembly.

    The Council of the Nation may adopt a resolution.

    Article 95

    In case of non-approval of the action plan of the Government by the People’s National Assembly, the Prime Minister shall tender the resignation of the Government to the President of the Republic.

    The latter shall appoint a new Prime Minister pursuant to the same modalities.

    Article 96

    If the approval of the People’s National Assembly is not obtained, the People’s National Assembly shall be dissolved de jure.

    The Government in office shall be kept in position in order to manage daily affairs until a new People’s National Assembly is elected within a maximum period of three (3) months.

    Article 97

    The Prime Minister shall execute and coordinate the action plan adopted by the People’s National Assembly.

    Article 98

    The Government shall annually present to the People’s National Assembly, a statement of general policy.

    The statement of general policy shall lead to a debate on Government action.

    This debate may end up with a resolution.

    It can also lead to the filing of a motion of censure by the People’s National Assembly in accordance with the provisions of Article s 153, 154 and 155 below.

    The Prime Minister may ask the People’s National Assembly for a vote of confidence.

    If the motion of confidence is not passed, the Prime Minister shall tender the resignation of the Government.

    In this case, the President of the Republic may, before accepting the resignation, make use of the provisions of Article  147 below.

    The Government may also submit a statement of general policy to the Council of the Nation.

    Article 99

    In addition to the powers explicitly conferred upon him by other provisions of the Constitution, the Prime Minister shall exercise the following functions:

    1. he shall allocate the functions to the members of the Government in accordance with the constitutional provisions;

    2. he shall ensure the implementation of laws and regulations;

    3. he shall chair the meetings of the Government;

    4. he shall sign the executive decrees;

    5. he shall appoint employees in State jobs, after the approval of the President of the Republic and without prejudice to the provisions of Article s 91 and 92 above;

    6. he shall ensure the good functioning of the public administration.

    Article 100

    The Prime Minister may tender to the President of the Republic the resignation of the Government.

    Article 101

    The President of the Republic may not, in any case, delegate the power to appoint the Prime Minister, the members of the Government as well as the Presidents and members of constitutional institutions for which no other mode of designation is stipulated by the Constitution.

    Similarly, he may not delegate his power to call for referendum, dissolve the People’s National Assembly, decide on anticipated legislative elections and implement the provisions of Article s 91, 92, 105, 107-109, 111, 142, 144, 145 and 146 of the Constitution.

    Article 102

    When the President of the Republic, because of a serious and lasting illness, is totally unable to perform his functions, the Constitutional Council shall meet de jure and, after having verified the reality of the impediment by all appropriate means, it shall propose, unanimously, to Parliament to declare the state of impediment.

    Parliament, convened in a joint session of both Chambers, shall declare the state of impediment of the President of the Republic, by a majority of two thirds (2/3) of its members and assign, as an acting Head of State, for a maximum period of forty-five (45) days, the President of the Council of the Nation who shall exercise his prerogatives in accordance with the provisions of Article  104 of the Constitution.

    If the impediment continues at the expiry of the period of forty-five (45) days, there shall be a declaration of vacancy by a resignation de jure, in pursuance to the procedure referred to in the paragraphs above and the provisions of the following paragraphs of this Article .

    In case of resignation or death of the President of the Republic, the Constitutional Council shall meet de jure and declare the permanent vacancy of the Presidency of the Republic.

    It shall immediately communicate the act of declaration of definitive vacancy to Parliament, which shall meet de jure.

    The President of the Council of the Nation shall assume the function of the Head of State for a maximum period of ninety (90) days, during which presidential elections shall be organized.

    The Head of State, so designated, may not be a candidate for the Presidency of the Republic.

    In case of coincidence of the resignation or death of the President of the Republic with the vacancy of the Presidency of the Council of the Nation, for any reason whatsoever, the Constitutional Council shall meet de jure and declare unanimously the permanent vacancy of the Presidency of the Republic and the incapacity of the President of the Council of the Nation. In this case, the President of the Constitutional Council shall assume the function of the Head of State, in pursuance to the terms provided in the preceding paragraphs of this Article  and Article  104 of the Constitution.

    He cannot be candidate for the Presidency of the Republic.

    Article 103

    If a candidacy for the presidential election has been validated by the Constitutional Council, the withdrawal can only occur in cases of serious impediment duly noted by the Constitutional Council or the death of the candidate concerned.

    If one of the two candidates for the second round withdraws, the electoral process shall continue without taking the withdrawal into account.

    In case of death or legal incapacity of one of the two candidates in the second round, the Constitutional Council shall declare that the whole electoral process must be held again. It shall extend, in this case, the period for the organisation of new elections for a maximum of sixty (60) days.

    When applying the provisions of this Article , the President of the Republic in office or who assumes the function of Head of State shall remain in office until the President of the Republic takes the oath.

    An organic law shall determine the conditions and modalities of implementation of these provisions.

    Article 104

    The Government in office at the time of the impediment, death or resignation of the President of the Republic cannot be dismissed or reshuffled until the new President of the Republic undertakes his duties.

    If the Prime Minister in office becomes a candidate for the Presidency of the Republic, he shall resign de jure. The function of the Prime Minister shall be assumed by another member of the Government appointed by the Head of State.

    During the periods stipulated in Article s 102 and 103 above, the provisions in paragraphs 7 and 8 of Article  91 and Article s 93, 142, 147, 154, 155, 208, 210 and 211 of the Constitution may not be applied.

    During these same periods, the provisions of Article s 105, 107, 108, 109 and 111 of the Constitution cannot be implemented without the approval of Parliament, convened in a joint session of both Chambers. The Constitutional Council and the High Council of Security ought to be consulted beforehand.

    Article 105

    In case of urgent necessity, after convening the High Council of Security, and consulting the President of the Council of the Nation, the President of the People’s National Assembly, the Prime Minister and the President of the Constitutional Council, the President of the Republic shall decree the state of emergency or the state of siege, for a definite period, and take all necessary measures to restore the situation.

    The duration of the state of emergency or the state of siege can be extended only after approval of Parliament, convened in joint session of both Chambers.

    Article 106

    The organisation of the state of emergency and the state of siege shall be defined by an organic law.

    Article 107

    When the country is threatened by an imminent danger to its institutions, its independence or its territorial integrity, the President of the Republic shall decree the state of exception.

    Such a measure shall be taken after consulting the President of the Council of the Nation, the President of the People’s National Assembly and the President of the Constitutional Council, and after hearing the High Council of Security and the Council of Ministers.

    The state of exception shall empower the President of the Republic to take exceptional measures that are fundamental to safeguarding the independence of the Nation and the institutions of the Republic.

    Parliament shall be convened de jure.

    The state of exception shall be terminated according to the same aforementioned forms and procedures that led to its proclamation.

    Article 108

    The President of the Republic shall decree the general mobilization in the Council of Ministers after having heard the High Council of Security and having consulted with the President of the Council of the Nation and the President of the People’s National Assembly.

    Article 109

    The President of the Republic shall declare war in case of actual or imminent aggression, in accordance with the relevant provisions of the United Nations Charter, after having convened the Council of Ministers, having heard the High Council of Security and having consulted the President of the Council of the Nation, the President of the People’s National Assembly and the President of the Constitutional Council.

    Parliament shall be convened de jure.

    The President of the Republic shall deliver a speech to inform the Nation.

    Article 110

    During the period of the state of war, the Constitution shall be suspended; the President of the Republic shall assume all the powers.

    When the mandate of the President of the Republic comes to expiry, it shall be extended de jure until the end of the war.

    In case the President of the Republic resigns or dies or any other impediment, the President of the Council of the Nation shall assume, as Head of State and within the same conditions as that of the President of the Republic, all the prerogatives required by the state of war.

    In case there is a conjunction of the vacancy of the Presidency of the Republic and the Presidency of the Council of the Nation, the President of the Constitutional Council shall assume the functions of the Head of State within the conditions provided for above.

    Article 111

    The President of the Republic shall sign armistice agreements and peace treaties.

    He shall obtain the opinion of the Constitutional Council on the relevant agreements.

    He shall submit the agreements immediately to be approved explicitly by each Chamber of Parliament.

    CHAPTER II. The Legislative Power

    Article 112

    The legislative power shall be exercised by a Parliament, consisting of two Chambers, the People’s National Assembly and the Council of the Nation.

    Parliament shall draft and vote the laws in a sovereign manner.

    Article 113

    Parliament shall monitor the action of the Government within the conditions defined by Article s 94, 98, 151 and 152 of the Constitution.

    The monitoring, prescribed in Article s 153 to 155 of the Constitution, shall be carried out by the People’s National Assembly.

    Article 114

    The parliamentary opposition shall have rights enabling effective participation in parliamentary activities and in political life, including:

    1. the freedom of opinion, expression and assembly;

    2. the benefit of financial aid granted to the elected members of Parliament;

    3. the effective participation in legislative activities;

    4. the effective participation in monitoring the Government’s action;

    5. an appropriate representation in the organs of both Chambers of Parliament;

    6. the referral to the Constitutional Council in accordance with the provisions of Article  187 (paragraphs 2 and 3) of the Constitution, concerning the laws passed by Parliament;

    7. the participation in parliamentary diplomacy.

    Each Chamber of Parliament shall devote a monthly session to discuss an agenda presented by one or some parliamentary groups of the opposition.

    The modalities of application of this Article  shall be described in the Rules of Procedure of each Chamber of Parliament.

    Article 115

    Parliament shall, within its constitutional prerogatives, remain faithful to the trust of the people and be permanently aware of their aspirations.

    Article 116

    The deputy or the member of the Council of the Nation shall be fully devoted to fulfilling his mandate.

    The rules of procedure of the People’s National Assembly and the Council of the Nation shall contain provisions on the obligation of effective participation of their members in the works of the committees and plenary sessions, under penalty of sanctions applicable in case of absence.

    Article 117

    The elected member of the People’s National Assembly or the Council of the Nation, affiliated to a political party, who would voluntarily change the affiliation under the aegis of which he was elected, shall forfeit his electoral mandate as of right.

    The Constitutional Council notified by the President of the relevant Chamber shall declare the vacancy of seat. The law shall define the modalities of his replacement.

    The deputy, who has resigned from his party or has been excluded, shall retain his mandate as an unaffiliated Member of Parliament.

    Article 118

    The members of the People’s National Assembly shall be elected by universal, direct and secret suffrage.

    Two-thirds (2/3) of the Members of the Council of the Nation shall be elected by indirect and secret suffrage, with two seats per Wilaya, among members of the People’s Communal Assemblies and members of the People’s Wilaya Assemblies.

    One-third (1/3) of the members of the Council of the Nation shall be designated by

    the President of the Republic among national personalities and qualified experts.

    Article 119

    The People’s National Assembly shall be elected for a period of five (5) years.                           The mandate of the Council of the Nation shall be limited to six (6) years.                                 Half the members of the Council of the Nation shall be renewed every three (3) years.           The mandate of Parliament cannot be extended unless there are very exceptional circumstances which hinder the normal course of elections.

    This situation shall be ascertained by a decision of Parliament, convened in a joint session of both Chambers, at the suggestion of the President of the Republic and having consulted the Constitutional Council.

    Article 120

    The modalities of the election of deputies and those relating to the election or designation of members of the Council of the Nation, the conditions of eligibility, the clauses of ineligibility and incompatibility as well as the system of parliamentary allowances shall be defined by an organic law.

    Article 121

    The validation of the mandate of the deputies and that of the members of the Council of the Nation shall be within the respective competence of each of the two Chambers.

    Article 122

    The mandate of the deputy and the member of the Council of the Nation shall be national. It can be renewed and not concurrent with other mandate or function.

    Article 123

    The deputy or the member of the Council of the Nation who does not fulfil or no longer meets the requirements of his eligibility shall incur the forfeiture of his mandate.

    This forfeiture shall be decided, as appropriate, by the People’s National Assembly or the Council of the Nation by the majority of their members.

    Article 124

    The deputy or the member of the Council of the Nation shall be accountable to his peers who can revoke his mandate if he commits an act unworthy of his function.

    The rules of procedure of each of the two Chambers shall define the conditions of dismissing a deputy or a member of the Council of the Nation. The dismissal shall be decided, as appropriate, by the People’s National Assembly or the Council of the Nation, by the majority of its members without prejudice to any other common law proceedings.

    Article 125

    The conditions by which Parliament accepts the resignation of one of its members shall be defined by an organic law.

    Article 126

    Parliamentary immunity shall be granted to deputies and members of the Council of the Nation during the period of their mandate.

    They cannot be subject to lawsuits, arrest or, in general, to any civil or penal action or pressure because of opinions they have expressed, utterances they have made or votes they have cast during the exercise of their mandate.

    Article 127

    Lawsuits cannot be instituted against a deputy or a member of the Council of the Nation for crime or infringement unless there is an explicit renunciation by the party concerned or an authorisation, depending on the case, from the People’s National Assembly or the Council of the Nation which may decide by the majority of its members to lift the immunity.

    Article 128

    In case of flagrant offence or flagrant crime, the deputy or the member of the Council of the Nation may be arrested. The Bureau of the People’s National Assembly or of the Council of the Nation, depending on the case, shall be informed immediately.

    The informed Bureau may request the suspension of lawsuits and the release of the deputy or the member of the Council of the Nation; then, it shall be proceeded according to the abovementioned provisions of Article  127.

    Article 129

    An organic law shall define the conditions pertaining to the replacement of a deputy or a member of the Council of the Nation in case his seat becomes vacant.

    Article 130

    The term of the legislature shall stArticle de jure on the fifteenth (15th) day following the date of announcement of the results by the Constitutional Council, under the chairmanship of the oldest member of the People’s National Assembly, assisted by the two youngest deputies.

    The People’s National Assembly shall elect its Bureau and form its Committees.

    The abovementioned provisions shall apply to the Council of the Nation.

    Article 131

    The President of the People’s National Assembly shall be elected for the term of the legislature.

    The President of the Council of the Nation shall be elected after each partial renewal of the composition of the Council.

    Article 132

    The organisation and functioning of the People’s National Assembly and the Council of the Nation, as well as the functional relations between the Chambers of Parliament and the Government shall be defined by an organic law.

    The budget of the two Chambers shall be determined by law.

    The People’s National Assembly and the Council of the Nation shall draft and adopt their rules of procedure.

    Article 133

    The sessions of Parliament shall be public.

    The proceedings shall be recorded in a book and published in accordance with the conditions defined by an organic law.

    The People’s National Assembly and the Council of the Nation may sit in camera upon a request made by their presidents, by the majority of their members present or by the Prime Minister.

    Article 134

    The People’s National Assembly and the Council of the Nation shall set up standing committees within the framework of their rules of procedure.

    Each standing committee at each Chamber may establish a temporary fact-finding mission on a specific topic or situation.

    The rules of procedure of each Chamber shall define the provisions governing the fact-finding mission.

    Article 135

    Parliament shall meet in one ordinary session each year, for a minimum period of ten (10) months. This session shall begin on the second working day of the month of September.

    So as to complete the ongoing review of an item on the agenda, the Prime Minister may request an extension of the ordinary session for few days.

    Parliament may be convened in extraordinary session on the initiative of the President of the Republic.

    It may also be summoned by the President of the Republic at the request of the Prime Minister or at the request of two-thirds (2/3) of the members of the People’s National Assembly.

    The closure of the extraordinary session shall take place after Parliament has completed the agenda for which it was convened.

    Article 136

    The Prime Minister, deputies and members of the Council of the Nation shall have the right to initiate laws.

    To be admissible, the proposed laws shall be introduced by twenty (20) deputies or twenty (20) members of the Council of the Nation in the matters stipulated in Article 137 below.

    Draft laws shall be presented in the Council of Ministers, following the opinion of the Council of State, and then submitted by the Prime Minister, as applicable, to the Bureau of the People’s National Assembly or that of the Council of the Nation.

    Article 137

    The draft laws relating to the local organisation, the territorial planning and división shall be submitted to the Bureau of the Council of the Nation.

    Except for the cases listed in the paragraph above, all other draft laws shall be filed with the Bureau of the People’s National Assembly.

    Article 138

    Subject to the provisions of paragraph 1 of Article  137 above, any proposed or draft law, to be adopted, shall be debated successively by the People’s National Assembly and the Council of the Nation.

    The discussion of the draft laws by the People’s National Assembly shall deal with the text presented to it by the Prime Minister or the text adopted by the Council of the Nation in the matters stipulated in Article  137 above.

    The Government shall submit to one of the two Chambers the text voted by the other Chamber. Each Chamber shall debate the text voted by the other Chamber and adopt it.

    In all cases, the Council of the Nation shall adopt the text voted by the People’s National Assembly, by a majority of its members present for the draft ordinary laws, or by an absolute majority for the draft organic laws.

    Should a disagreement between the two Chambers arise, the Prime Minister shall request the meeting, within a maximum of fifteen (15) days, of a joint committee, composed equally of members of both Chambers, to propose a text pertaining to the disputed provisions. The joint committee shall complete its deliberations within a maximum of fifteen (15) days.

    This text shall be submitted by the Government for approval to the two Chambers.

    No amendment is admissible, except with the consent of the Government.

    Should the disagreement between the two Chambers persist, the Government may request the People’s National Assembly to give a final decision. In this case, the People’s National Assembly shall resume the text drafted by the joint committee or, if not, the last text it has voted.

    If the Government does not notify the People’s National Assembly in accordance with the preceding paragraph, the text shall be withdrawn.

    Parliament shall adopt the finance law within a maximum period of seventy-five (75) days, as from the date of its submission, in accordance with the preceding paragraphs.

    Should it not be adopted within the indicated period, the President of the Republic shall promulgate the draft law of the Government by ordinance.

    The other procedures shall be defined by the organic law referred to in Article 132 of the Constitution.

    Article 139

    Any bill that has the purpose or effect of decreasing public resources or increasing public expenditure shall be inadmissible unless it is accompanied by measures which seek to increase the revenues of the State or to achieve savings at least equal in size on other items of public expenditure.

    Article 140

    Parliament shall legislate on the subject matters assigned to it by the Constitution as well as in the following fields:

    1. the fundamental rights and duties of individuals, particularly the legal regime of public freedoms, the safeguarding of individual freedoms, and the duties of the citizens;

    2. the general rules pertaining to personal status and family law and particularly to marriage, divorce, filiation, legal capacity and inheritance;

    3. the conditions of settlement for individuals;

    4. basic legislation concerning nationality;

    5. general rules pertaining to the status of foreigners;

    6. rules concerning the creation of jurisdictions;

    7. general rules of criminal law and criminal procedure and particularly the determination of crimes and offences, the institution of the corresponding penalties of any kind, amnesty, extradition and the penitentiary regime;

    8. the general rules of civil and administrative procedure and the enforcement procedures;

    9. the system of civil and commercial obligations and property;

    10. the territorial division of the country;

    11. the vote on the State budget;

    12. the introduction of the tax base and tax rates, contributions, duties and fees of every kind;

    13. the customs system;

    14. the general regulations concerning the issuing of money, the banking regime, credit and insurance;

    15. general rules relating to education and scientific research;

    16. general rules relating to public health and population;

    17. general rules relating to labour law, social security and the right to organise;

    18. general rules relating to the environment, living conditions, and town and country planning;

    19. general rules relating to the protection of the fauna and flora;

    20. protection and preservation of cultural and historical heritage;

    21. general regulation for forests and pasture lands;

    22. general water system;

    23. general system for mines and hydrocarbons;

    24. land tenure;

    25. the fundamental guarantees granted to public officials and the general statute of Public Service;

    26. the general rules pertaining to National Defence and the mobilisation of the Armed Forces by civil authorities;

    27. the rules governing the transfer of property from the public to the private sector;

    28. the establishment of categories of legal entities;

    29. the creation of decorations, distinctions and honorific titles of the State.

    Article 141

    In addition to the domains earmarked by the Constitution for regulation by organic law, the following domains shall be subject to regulation by organic law:

    • the organisation and functioning of public authorities;

    • the electoral system;

    • law on Political Parties;

    • law on Information;

    • the status of the magistracy and the judicial organisation;

    • the framework law on Finance Laws.

    The organic law shall be adopted by an absolute majority of the deputies and the members of the Council of the Nation.

    It shall be submitted to the Constitutional Council to ascertain its conformity prior to its promulgation.

    Article 142

    In case the People’s National Assembly is in recess, or vacant between parliamentary sessions, the President of the Republic may legislate on urgent matters by ordinance, after consultation with the Council of State.

    The President of the Republic shall submit the texts he adopts for ratification to each of the Chambers of Parliament at their next session.

    Ordinances not adopted by Parliament shall be null and void.

    In case of a state of emergency defined in Article 107 of the Constitution, the President of the Republic may legislate by ordinances.

    The ordinances shall be passed in the Council of Ministers.

    Article 143

    Matters other than those earmarked for statutory legislation shall fall within the regulatory power of the President of the Republic.

    The implementation of the laws shall be a matter for the regulatory field of the Prime Minister.

    Article 144

    The law shall be promulgated by the President of the Republic within thirty (30) days of the date of its transmittal.

    However, when a law has been submitted to the Constitutional Council prior to its promulgation by one of the authorities referred to in Article  187 below, this time limit shall be suspended until the Constitutional Council gives its ruling according to the conditions specified in Article 189 below.

    Article 145

    The President of the Republic may request a second reading of a law voted by Parliament within thirty (30) days following its adoption.

    In that case, a majority of two-thirds (2/3) of the deputies of the People’s National Assembly and members of the Council of the Nation shall be required for the adoption of the law.

    Article 146

    The President of the Republic may communicate a message to Parliament.

    Article 147

    After consulting the President of the Council of the Nation, the President of the People’s National Assembly, the President of the Constitutional Council and the Prime Minister, the President of the Republic may decide on the dissolution of the People’s National Assembly or on anticipated legislative elections.

    In both cases, legislative elections shall take place within a maximum limit of three (3) months.

    Article 148

    Upon request of the President of the Republic or one of the Presidents of one of the two Chambers, Parliament may initiate a debate on foreign policy.

    This debate shall be concluded, if need be, with a resolution of Parliament meeting in joint session of the two Chambers, which shall be communicated to the President of the Republic.

    Article 149

    Armistice agreements, treaties of peace, alliance and union, treaties relating to the borders of the State as well as treaties concerning the status of persons and those which involve expenditures unforeseen in the budget of the State, bilateral and multilateral agreements pertaining to free trade zones and economic associations and integrations shall be ratified by the President of the Republic after explicit approval by each of the two Chambers of Parliament.

    Article 150

    The treaties ratified by the President of the Republic in the conditions specified by the Constitution shall prevail over Acts of Parliament.

    Article 151

    Members of Parliament may demand from the Government explanations related to current issues. The reply shall be given within a maximum limit of thirty (30) days.

    Parliament Committees may hear the members of the Government.

    Article 152

    Members of Parliament may address orally or in written form any question to any member of the Government.

    The written question shall receive a reply in the same form within a maximum period of thirty (30) days.

    The response to oral questions shall not exceed thirty (30) days.

    The People’s National Assembly and the Council of the Nation shall hold, alternatively, a weekly session dedicated to the responses of the Government to oral questions raised by deputies and members of the Council of the Nation.

    If one of the two Chambers believes that the oral or written response from a member of the Government warrants a debate, this latter shall be ensued in the conditions specified in the rules of procedure of the People’s National Assembly and the Council of the Nation.

    The questions and answers are published in accordance with the same conditions as per the records of the parliamentary debates.

    Article 153

    During the debate on general policy statement, the People’s National Assembly can hold the Government to account by voting a motion of censure.

    Such a motion shall be rejected unless it is signed by at least a seventh (1/7) of the number of deputies.

    Article 154

    The motion of censure shall be approved by a majority vote of two-thirds (2/3) of the deputies.

    The vote may only take place three (3) days after the tabling of the motion of censure.

    Article 155

    When the motion of censure is approved by the People’s National Assembly, the Prime Minister shall tender the resignation of the Government to the President of the Republic.

    CHAPTER III. The Judicial Power

    Article 156

    The judicial power shall be independent. It shall be exercised within the framework of the law. The President of the Republic shall be the guarantor of the Independence of the judiciary.

    Article 157

    The judicial power shall protect society and freedoms.

    It shall guarantee to all and sundry the protection of their fundamental rights.

    Article 158

    Justice shall be founded on the principles of legality and equality.

    It shall be equal for all and accessible to all, and shall find its expression in the respect of the law.

    Article 159

    Justice shall be rendered in the name of the people.

    Article 160

    Criminal sanctions shall conform to the principles of legality and personality.

    The law shall guarantee the two-stage procedure in criminal matters and determine the modalities of its implementation.

    Article 161

    The judiciary shall rule on appeals brought against decisions of the administrative authorities.

    Article 162

    Judicial decisions shall give reasons and shall be pronounced in public hearings.

    Judicial orders shall be reasoned.

    Article 163

    All competent organs of the State shall be required to ensure at all times and in every place and in every circumstance the execution of judicial decisions.

    Any hindrance of the judicial decisions’ execution shall be punishable by law.

    Article 164

    Justice shall be rendered by the judges.

    They may be assisted by people’s assessors under conditions specified by law.

    Article 165

    The judge shall only obey the law.

    Article 166

    The judge shall be protected against all forms of pressures, interventions or manoeuvres of any nature that could be harmful to the fulfilment of his duty or to the respect for his free judgment.

    Any intervention in the course of justice shall be prohibited.

    The judge shall guard against any attitude likely to affect his impartiality.

    The sitting judge shall be irremovable under the conditions set by the status of the magistracy.

    An organic law shall determine the modalities of implementing this Article .

    Article 167

    A judge shall be held accountable to the High Council of Magistracy in the forms specified by law for the manner in which he fulfils his duty.

    Article 168

    The law shall protect the litigant against any abuse or misconduct perpetrated by the judge.

    Article 169

    The right to defence shall be acknowledged.

    It shall be guaranteed in criminal matters.

    Article 170

    The lawyer shall be granted legal guarantees that ensure his protection against any form of pressure and allow him to exercise his profession within the framework of the law.

    Article 171

    The Supreme Court shall be the organ regulating the activity of the courts and tribunals.

    The Council of State shall act as an organ regulating the activity of the administrative courts.

    The Supreme Court and the Council of State shall ensure the standardisation of jurisprudence across the country and shall oversee the adherence to the law.

    The Court of Jurisdictional Conflicts shall determine the conflicts of jurisdiction between ordinary courts and administrative courts.

    Article 172

    The organisation, functioning and other powers of the Supreme Court, the Council of State and the Court of Jurisdictional Conflicts shall be determined by an organic law.

    Article 173

    The High Council of Magistracy shall be chaired by the President of the Republic.

    Article 174

    The High Council of Magistracy shall decide on, in the conditions determined by law, the appointments, transfers, and career development of the judges.

    It shall oversee the respect for the provisions on the status of the magistracy and the observance of discipline by the magistrates under the chairmanship of the First President of the Supreme Court.

    Article 175

    The High Council of Magistracy shall provide a consultative opinion to the President of the Republic prior to exercising the power to pardon.

    Article 176

    The composition, functioning and other attributions of the High Council of Magistracy shall be determined by an organic law.

    The High Council of Magistracy shall be granted administrative and financial autonomy. The organic law shall determine its modalities.

    Article 177

    A High Court of State shall be established to review acts which can be qualified as high treason by the President of the Republic, and crimes and offences by the Prime Minister, perpetrated as they exercise their functions.

    The composition, organisation and functioning of the High Court of State, as well as the applicable procedures, shall be established by an organic law.

    Title 3. SUPERVISION, ELECTIONS OBSERVATION AND CONSULTATIVE INSTITUTIONS

    CHAPTER I. Supervision

    Article 178

    The elected assemblies shall assume the supervisory role in its popular dimension.

    Article 179

    The Government shall give an account to each Parliament Chamber on the use of budgetary funds for which it has voted on each budgetary period.

    The financial year shall be closed, as far as Parliament is concerned, by the vote of each Chamber for an Act pertaining to settling the balance sheet of the year under consideration.

    Article 180

    Each of the two Chambers of Parliament may, at any time, establish, within the framework of its powers, a commission of inquiry on any matter of public interest.

    A commission of inquiry cannot be established on the grounds of facts that are subject to judicial investigation.

    Article 181

    The institutions and organs of control shall have the task of verifying the conformity of the legislative and executive action(s) with the Constitution and of verifying the conditions of the use and management of material means and public funds.

    Article 182

    The Constitutional Council is an independent institution in charge of monitoring the observance of the Constitution.

    The Constitutional Council shall monitor, among other matters, the proper conduct of referendum operations, of the election of the President of the Republic and of legislative elections.

    It shall review, in their substance, the appeals it receives on the provisional results of the presidential and legislative elections and shall announce the final results of all the operations provided in the preceding paragraph.

    The Constitutional Council shall have administrative and financial autonomy.

    Article 183

    The Constitutional Council shall consist of twelve (12) members: four (4) shall be appointed by the President of the Republic, including the President of the Council and the Vice-President, two (2) shall be elected by the People’s National Assembly, two (2) shall be elected by the Council of the Nation, two (2) shall be elected by the Supreme Court, and two (2) shall be elected by the Council of State.

    In the case of a tie between the members of the Constitutional Council, the President of the Council shall have the casting vote.

    As soon as they are elected or designated, the members of the Constitutional Council shall cease any other mandate, function, task or mission, as well as any other liberal activity or profession.

    The President of the Republic shall appoint the President and Vice-President of the Constitutional Council for a single eight-year (8) term.

    The other members of the Constitutional Council shall serve a single term of eight (8) years; the membership of the Council shall be renewed by one-half (1/2) every four (4) years.

    Before taking office, the members of the Constitutional Council shall be sworn in before the President of the Republic in the terms set out below:

    “I swear by Allah The Almighty, to carry out my duty with integrity and impartiality, to safeguard the confidentiality of the deliberations and to refrain from publicly taking positions in any of the cases that fall under the jurisdiction of the Constitutional Council.”

    Article 184

    The elected or designated members of the Constitutional Council shall:

    • be aged forty (40) on the day of their appointment or election.

    • have a professional experience of no less than fifteen (15) years in the higher education of legal sciences, in magistracy and as a lawyer at the Supreme Court, at the Council of State or in one of the State’s higher positions.

    Article 185

    During their mandate, the President, Vice-President and the members of the Constitutional Council shall be granted jurisdictional immunity in criminal matters.

    They shall not be subject to legal actions, arrest for any felony or offence, unless the concerned person expressly waivers his immunity or upon an authorisation from the Constitutional Council.

    Article 186

    Aside from the other functions which are expressly conferred upon it by other provisions of the Constitution, the Constitutional Council shall rule on the constitutionality of treaties, laws and regulations by an opinion.

    Upon request by the President of the Republic, the Constitutional Council shall issue a binding opinion on the constitutionality of the organic laws after their adoption by Parliament.

    The Constitutional Council shall also rule in the same form, as specified in the preceding paragraph, on the conformity of the rules of procedure of each Chamber of Parliament with the Constitution.

    Article 187

    The Constitutional Council may be referred to by the President of the Republic, the President of the Council of the Nation, the President of the People’s National Assembly or the Prime Minister.

    It may also be referred to by fifty (50) deputies or thirty (30) members of the Council of the Nation.

    The referral to the Constitutional Council specified in the two preceding paragraphs shall not apply to a referral on the exception of unconstitutionality stipulated by Article 188 below.

    Article 188

    The Constitutional Council may be referred to with regard to an exception of unconstitutionality pursuant to a request by the Supreme Court or the Council of State when one of the parties in a trial claims before the jurisdiction that the legislative provision upon which the issue of litigation relies may adversely affect the rights and freedoms granted by the Constitution.

    The conditions and modalities of implementing the paragraph above shall be determined by an organic law.

    Article 189

    The Constitutional Council shall deliberate in camera and give its opinion or decisión within thirty (30) days after a matter has been submitted to it. In an emergency situation, and upon request from the President of the Republic, the deadline shall be shortened to ten (10) days.

    When the Constitutional Council is summoned to rule on the basis of Article  88 above, it shall deliver a decision within the four (4) months following the referral date. This deadline might be extended only once for no more than four (4) months, pursuant to a reasoned decision of the Council notified to the jurisdiction that has requested the referral.

    The Constitutional Council shall establish its rules of procedure.

    Article 190

    When the Constitutional Council rules that a treaty, agreement or convention is unconstitutional, it shall not be ratified.

    Article 191

    When the Constitutional Council rules that a legislative or regulatory provision is unconstitutional, it ceases to be effective from the day of the decision of the Council.

    When a legislative provision is ruled unconstitutional based on Article 188 above, it ceases to be effective from the day fixed by the decision of the Constitutional Council.

    The opinions and decisions of the Constitutional Council are irrevocable. They shall be binding upon all public authorities as well as the administrative and jurisdictional authorities.

    Article 192

    The Court of Accounts shall be independent. It shall be in charge of the post control of the finances of the State, the territorial communities and public services as well as the State’s merchant capital.

    The Court of Accounts shall contribute to the development of good governance and transparency in the management of public finances.

    The Court of Accounts shall prepare an annual report which it shall submit to the President of the Republic, the President of the Council of the Nation, the President of the People’s National Assembly and the Prime Minister.

    The law shall determine the competences, organisation and functioning of the Court of Accounts and the sanctioning of its investigations as well as its relation with the other organs of the State in charge of control and inspection.

    CHAPTER II. Elections Observation

    Article 193

    Public authorities in charge of organising elections shall be required to guarantee their transparency and impartiality.

    Thus, the electoral register shall be made available to the candidates at each election.

    The organic law related to the electoral system shall set the modalities of implementing this provision.

    Article 194

    An independent High Authority for Monitoring Elections shall be established.

    It shall be chaired by a public figure nominated by the President of the Republic, following consultations with the political parties.

    The High Authority shall have a standing committee and shall deploy its other members once the electorate is convened.

    The High Authority shall be composed of an equal number of:

    • magistrates proposed by the High Council of Magistracy, nominated by the President of the Republic;

    • independent competencies chosen from the civil society, nominated by the President of the Republic.

    The High Authority shall ensure the transparency and integrity of the presidential, legislative and local elections, and the referendum, from the convening of the electorate until the announcement of the provisional results of the elections.

    The standing Committee of the High Authority shall ensure particularly:

    • the supervision of the revision of the voting lists by the administration;

    • the preparation of recommendations for the improvement of the legislative and regulatory texts that standardise the electoral process;

    • the organisation of civil training courses for the benefit of the political parties on the monitoring of elections and the filing of appeals.

    An organic law shall set the modalities of implementing this Article .

    CHAPTER III. Consultative Institutions

    Article 195

    A High Islamic Council shall be established under the auspices of the President of the Republic in order to:

    • encourage and promote Ijtihad;

    • provide its opinion on matters submitted to it with regard to the Shari’ah rules;

    • submit a periodic report on its activity to the President of the Republic.

    Article 196  

    The High Islamic Council shall be composed of fifteen (15) members, including the President, who shall be nominated by the President of the Republic among the national elites in various sciences.

    Article 197

    A High Council of Security shall be established under the chairmanship of the President of the Republic. This organ shall have the task of providing counsel to the President of the Republic on all issues relating to national security.

    The modalities of the organisation and functioning of the High Council of Security shall be determined by the President of the Republic.

    Article 198

    A National Council of Human Rights, hereinafter referred to as “The Council”, shall be established under the authority of the President of the Republic in his quality as guarantor of the Constitution.

    It shall be granted administrative and financial autonomy.

    Article 199

    The Council shall carry out the function of monitoring and providing early warnings and evaluation in terms of respecting human rights.

    Without undermining the functions of the judiciary power, the Council shall consider any case of violation of human rights it becomes aware of or is brought to its attention, and it shall proceed with the appropriate action. It shall submit the results of its investigation to the concerned administrative authorities and, if necessary, to the competent judicial authorities.

    The Council shall initiate awareness-raising actions, information and communication to promote human rights.

    It shall also give its opinions, suggestions and recommendations in relation to the promotion and protection of human rights.

    The Council shall prepare an annual report to submit to the President of the Republic, Parliament and the Prime Minister, and publish it.

    The composition and the modalities of nominating the members of the Council as well as the rules related to its organisation and functioning shall be determined by law.

    Article 200

    A High Council of Youth shall be established as a consultative institution under the auspices of the President of the Republic.

    The Council shall include representatives of the youth, the government and the public institutions in charge of youth issues.

    Article 201

    The High Council of Youth shall express its opinions and recommendations on issues related to the needs of the youth as well as their prosperousness in economic, social, cultural and sporting fields.

    The Council shall contribute as well to the promotion, among the youth, of the national values, the patriotic conscience, the civil spirit and social solidarity.

    Article 202

    A national organ for the Prevention and Fight against Corruption, an independent administrative authority, shall be established under the auspices of the President of the Republic.

    It shall be granted administrative and financial autonomy.

    The independence of the organ shall be specifically guaranteed by the oath its members and staff members have taken, as well as by the protection that shall be granted to them against all forms of pressure, intimidation, threats, contempt, insults, or attacks, regardless of their nature, they might be subjected to while carrying out their functions.

    Article 203

    The organ shall be in charge of proposing and contributing to the hosting of a global policy of prevention against corruption, enshrining thereby the principles of the rule of law and reflecting the integrity, transparency and accountability in the management of public properties and funds.

    The organ shall submit to the President of the Republic an annual report of evaluation of its activities related to the prevention and fight against corruption, pointing out the scantiness it has faced and the proposed recommendations, whenever necessary.

    Article 204

    The Social and Economic National Council, hereinafter referred to as “The Council

    shall represent a framework for dialogue, consultation and proposals in the economic and social fields.

    It shall be the advisor of the Government.

    Article 205

    The Council shall be in charge of:

    • providing a framework for the participation of civil society in the national consultations on policies related to social and economic development;

    • ensuring a constant dialogue and consultation between the national economic and social partners;

    • evaluating and addressing the issues of national interest in the economic, social, educational, vocational, and higher education fields;

    • preparing proposals and recommendations for the Government.

    Article 206

    A National Council for Scientific Research and Technology shall be established, hereinafter referred to as “The Council”.

    Article 207

    The Council shall be in charge of:

    • promoting national research in the field of technological and scientific innovation;

    • proposing measures fostering the development of national capacities in terms of research and development;

    • evaluating the efficiency of the national arrangements for the valorisation of the outcome of research for the benefit of the national economy within the framework of sustainable development.

    The Council shall be chaired by a recognised national competence nominated by the President of the Republic.

    The other tasks, organisation, and composition of the Council shall be determined by law.

    Title 4. ON CONSTITUTIONAL AMENDMENT

    Article 208

    The constitutional amendment shall be decided on the initiative of the President of the Republic. It shall be voted in identical terms by the People’s National Assembly and the Council of the Nation in the same conditions as a legislative text.

    It shall be submitted by referendum to the approval of the people within fifty (50) days of its adoption.

    The constitutional amendment, approved by the people, shall be promulgated by the President of the Republic.

    Article 209

    An Act pertaining to a draft constitutional amendment shall become null and void if rejected by the people.

    It cannot be resubmitted to the people during the same legislature.

    Article 210

    If according to the reasoned opinion of the Constitutional Council the draft constitutional amendment in no way infringes upon the general principles governing the Algerian society, the human and citizen’s rights and freedoms, and does not alter in any manner the fundamental balance of the powers and the institutions, the President of the Republic may directly promulgate the law containing the constitutional amendment without submitting it to referendum, if it has been approved by three-quarters (3/4) of the votes of the members of the two Chambers of Parliament.

    Article 211

    Three-quarters (3/4) of the members of the two Chambers of Parliament, meeting in joint session, may propose a constitutional amendment and present it to the President of the Republic, who may submit it to a referendum.

    If its approval is obtained, it shall be promulgated.

    Article 212

    No constitutional amendment shall undermine:

    1. the Republican character of the State;

    2. the democratic order based on a multi-party system;

    3. Islam as the religion of the State;

    4. Arabic as the national and official language;

    5. the fundamental freedoms and the human and citizens’ rights;

    6. the integrity and unity of the national territory;

    7. the national emblem and the national anthem as symbols of the Revolution and the Republic;

    8. the re-eligibility of the President of the Republic for a second term.

    TRANSITORY PROVISIONS

    Article 213

    The current ordinary laws set by this Constitution as organic laws shall remain applicable until their modification or replacement following the constitutional procedures.

    Article 214

    The Constitutional Council shall continue, in its current representation to carry out the prerogatives assigned to it by this Constitution, the mandates of its current members ending after the expiry of their respective terms.

    Any modification or addition shall be carried out following the conditions and procedures set by this Constitution in no later than six (6) months following its promulgation.

    The renewal of half of the members of the Constitutional Council, whether they are elected or designated in the framework of this Constitution shall take place following the fourth (4) year of the mandate by drawing lots.

    Article 215

    Pending the necessary conditions for the implementation of the provisions stipulated by Article 188 of the Constitution and in order to guarantee its efficient management, the mechanism set by this latter shall be put into place after a deadline of three (3) years following the entry into force of these provisions.

    Article 216

    The body in charge of the promotion and the protection of Human rights shall continue to carry out its prerogatives until the implementation of the provisions of Article s 198 and 199 of the Constitution.

    Article 217

    The text of the approved constitutional amendment shall be harmonised by the numerical order of its Article s.

    Article 218

    The President of the Republic shall promulgate the text of the approved constitutional amendment that shall be implemented as the fundamental law of the Republic.

    30Abr/21

    Dahir nº 1-11-91 du 27 chaabne 1432 (29 juillet 2011) Constitution.

    Dahir nº 1-11-91 du 27 chaabne 1432 (29 juillet 2011) portant promulgation du texte de la Constitution. (

    LOUANGE A DIEU SEUL !

    (Grand Sceau de Sa Majesté Mohammed VI)

    Que l’on sache par les présentes – Puisse Dieu en élever et en fortifier la teneur !

    Que Notre Majesté Chérifienne ;

    Vu la Constitution, notamment ses articles 29 et 105 ;

    Vu le dahir n° 1-11-82 du 14 rejeb 1432 (17 juin 2011) soumettant à référendum le projet de la Constitution ;

    Vu la loi organique n° 29-93 relative au Conseil constitutionnel, promulguée par le dahir n° 1-94-124 du 14 ramadan 1414 (25 février 1994), telle qu’elle a été modifiée et complétée, notamment ses articles 36 et 37 ;

    Vu les résultats du référendum sur le projet de la Constitution qui a eu lieu le vendredi 28 rejeb 1432 (1er juillet 2011), proclamés par le Conseil constitutionnel par décision n° 815-2011 du 12 chaabane 1432 (14 juillet 2011),

     A DECIDE CE QUI SUIT :

    Est promulgué et sera publié au Bulletin officiel, à la suite du présent dahir, le texte de la   Constitution, tel qu’adopté par voie de référendum le vendredi 28 rejeb 1432 (1er juillet 2011).

    Fait à Tétouan, le 27 chaabane 1432 (29 juillet 2011).

    PREAMBULE

    Fidèle à son choix irréversible de construire un Etat de droit démocratique, le Royaume du Maroc poursuit résolument le processus de consolidation et de renforcement des institutions d’un Etat moderne, ayant pour fondements les principes de participation, de pluralisme et de bonne gouvernance. Il développe une société solidaire où tous jouissent de la sécurité, de la liberté, de l’égalité des chances, du respect de leur dignité et de la justice sociale, dans le cadre du principe de corrélation entre les droits et les devoirs de la citoyenneté.

    Etat musulman souverain, attaché à son unité nationale et à son intégrité territoriale, le  Royaume du Maroc entend préserver, dans sa plénitude et sa diversité, son identité nationale une et indivisible. Son unité, forgée par la convergence de ses composantes arabo-islamique, amazighe et saharo-hassanie, s’est nourrie et enrichie de ses affluents africain, andalou, hébraïque et méditerranéen. La prééminence accordée à la religion musulmane dans ce référentiel national va de pair avec l’attachement du peuple marocain aux valeurs d’ouverture, de modération, de tolérance et de dialogue pour la compréhension mutuelle entre toutes les cultures et les civilisations du monde.

    Mesurant l’impératif de renforcer le rôle qui lui revient sur la scène internationale, le  Royaume du Maroc, membre actif au sein des organisations internationales, s’engage à souscrire aux principes, droits et obligations énoncés dans leurs chartes et conventions respectives ; il réaffirme son attachement aux droits de l’Homme tels qu’ils sont universellement reconnus, ainsi que sa volonté de continuer à œuvrer pour préserver la paix et la sécurité dans le monde.

    Se fondant sur ces valeurs et ces principes immuables, et fort de sa ferme volonté de raffermir les liens de fraternité, de coopération, de solidarité et de partenariat constructif avec les autres Etats, et d’œuvrer pour le progrès commun, le Royaume du Maroc, Etat uni, totalement souverain, appartenant au Grand Maghreb, réaffirme ce qui suit et s’y engage :

    – œuvrer à la construction de l’Union du Maghreb, comme option stratégique ; – approfondir les liens d’appartenance à la Oumma arabe et islamique, et renforcer les liens de fraternité et de solidarité avec ses peuples frères ;

     – consolider les relations de coopération et de solidarité avec les peuples et les pays d’Afrique, notamment les pays subsahariens et du Sahel ;

    – intensifier les relations de coopération, de rapprochement et de partenariat avec les pays du voisinage euro-méditerranéen ;

    – élargir et diversifier ses relations d’amitié et ses rapports d’échanges humains, économiques, scientifiques, techniques et culturels avec tous les pays du monde ;

    – renforcer la coopération Sud-Sud ;

     – protéger et promouvoir les dispositifs des droits de l’Homme et du droit international humanitaire et contribuer à leur développement dans leur indivisibilité et leur universalité ;

    – bannir et combattre toute discrimination à l’encontre de quiconque, en raison du sexe, de la couleur, des croyances, de la culture, de l’origine sociale ou régionale, de la langue, du handicap ou de quelque circonstance personnelle que ce soit ;

    – accorder aux conventions internationales dûment ratifiées par lui, dans le cadre des dispositions de la Constitution et des lois du Royaume, dans le respect de son identité nationale immuable, et dès la publication de ces conventions, la primauté sur le droit interne du pays, et harmoniser en conséquence les dispositions pertinentes de sa législation nationale.

    Ce préambule fait partie intégrante de la présente Constitution.

    TITRE PREMIER. DISPOSITIONS GENERALES

    Article premier

    Le Maroc est une monarchie constitutionnelle, démocratique, parlementaire et sociale.

    Le régime constitutionnel du Royaume est fondé sur la séparation, l’équilibre et la collaboration des pouvoirs, ainsi que sur la démocratie citoyenne et participative, et les principes de bonne gouvernance et de la corrélation entre la responsabilité et la reddition des comptes.

    La Nation s’appuie dans sa vie collective sur des constantes fédératrices, en l’occurrence la religion musulmane modérée, l’unité nationale aux affluents multiples, la monarchie constitutionnelle et le choix démocratique.

    L’organisation territoriale du Royaume est décentralisée. Elle est fondée sur une régionalisation avancée.

    Article 2

    La souveraineté appartient à la Nation qui l’exerce directement, par voie de référendum, et indirectement, par l’intermédiaire de ses représentants.

    La Nation choisit ses représentants au sein des institutions élues par voie de suffrages libres, sincères et réguliers.

    Article 3

    L’Islam est la religion de l’Etat, qui garantit à tous le libre exercice des cultes.

    Article 4

    L’emblème du Royaume est le drapeau rouge frappé en son centre d’une étoile verte à cinq branches.

    La devise du Royaume est DIEU, LA PATRIE, LE ROI.

    Article 5

    L’arabe demeure la langue officielle de l’Etat.

    L’Etat œuvre à la protection et au développement de la langue arabe, ainsi qu’à la promotion de son utilisation.

    De même, l’amazighe constitue une langue officielle de l’Etat, en tant que patrimoine commun de tous les Marocains sans exception.

    Une loi organique définit le processus de mise en œuvre du caractère officiel de cette langue, ainsi que les modalités de son intégration dans l’enseignement et dans les domaines  prioritaires de la vie publique, et ce afin de lui permettre de remplir à terme sa fonction de langue officielle.

    L’Etat œuvre à la préservation du Hassani, en tant que partie intégrante de l’identité culturelle marocaine unie, ainsi qu’à la protection des parlers et des expressions culturelles pratiqués au  Maroc. De même, il veille à la cohérence de la politique linguistique et culturelle nationale et à l’apprentissage et la maîtrise des langues étrangères les plus utilisées dans le monde, en tant qu’outils de communication, d’intégration et d’interaction avec la société du savoir, et d’ouverture sur les différentes cultures et sur les civilisations contemporaines. Il est créé un   Conseil national des langues et de la culture marocaine, chargé notamment de la protection et du développement des langues arabe et amazighe et des diverses expressions culturelles marocaines, qui constituent un patrimoine authentique et une source d’inspiration contemporaine. Il regroupe l’ensemble des institutions concernées par ces domaines. Une loi organique en détermine les attributions, la composition et les modalités de fonctionnement.

    Article 6

    La loi est l’expression suprême de la volonté de la Nation. Tous, personnes physiques ou morales, y compris les pouvoirs publics, sont égaux devant elle et tenus de s’y soumettre.

    Les pouvoirs publics œuvre nt à la création des conditions permettant de généraliser l’effectivité de la liberté et de l’égalité des citoyennes et des citoyens, ainsi que de leur participation à la vie politique, économique, culturelle et sociale.

    Sont affirmés les principes de constitutionnalité, de hiérarchie et d’obligation de publication des normes juridiques.

    La loi ne peut avoir d’effet rétroactif.

    Article 7

    Les partis politiques œuvre nt à l’encadrement et à la formation politique des citoyennes et des citoyens, ainsi qu’à la promotion de leur participation à la vie nationale et à la gestion des affaires publiques. Ils concourent à l’expression de la volonté des électeurs et participent à l’exercice du pouvoir, sur la base du pluralisme et de l’alternance par les moyens démocratiques, dans le cadre des institutions constitutionnelles.

    Leur constitution et l’exercice de leurs activités sont libres, dans le respect de la Constitution et de la loi.

    Le régime du parti unique est illégal.

    Les partis politiques ne peuvent être fondés sur une base religieuse, linguistique, ethnique ou régionale, ou, d’une manière générale, sur toute autre base discriminatoire ou contraire aux droits de l’Homme.

    Ils ne peuvent avoir pour but de porter atteinte à la religion musulmane, au régime monarchique, aux principes constitutionnels, aux fondements démocratiques ou à l’unité nationale et l’intégrité territoriale du Royaume.

    L’organisation et le fonctionnement des partis politiques doivent être conformes aux principes démocratiques.

    Une loi organique détermine, dans le cadre des principes énoncés au présent article, les règles relatives notamment à la constitution et aux activités des partis politiques, aux critères d’octroi du soutien financier de l’Etat, ainsi qu’aux modalités de contrôle de leur financement.

    Article 8

    Les organisations syndicales des salariés, les chambres professionnelles et les organisations professionnelles des employeurs contribuent à la défense et à la promotion des droits et des intérêts socioéconomiques des catégories qu’elles représentent. Leur constitution et l’exercice de leurs activités, dans le respect de la Constitution et de la loi, sont libres.

    Les structures et le fonctionnement de ces organisations doivent être conformes aux principes démocratiques.

    Les pouvoirs publics œuvre nt à la promotion de la négociation collective et à l’encouragement de la conclusion de conventions collectives de travail dans les conditions prévues par la loi.

    La loi détermine notamment les règles relatives à la constitution des organisations syndicales, à leurs activités et aux critères d’octroi du soutien financier de l’Etat, ainsi qu’aux modalités de contrôle de leur financement.

    Article 9

    Les partis politiques et les organisations syndicales ne peuvent être dissous ou suspendus par les pouvoirs publics qu’en vertu d’une décision de justice.

    Article 10

    La Constitution garantit à l’opposition parlementaire un statut lui conférant des droits à même de lui permettre de s’acquitter convenablement de ses missions afférentes au travail parlementaire et à la vie politique.

    Elle garantit à l’opposition, notamment, les droits suivants :

    – la liberté d’opinion, d’expression et de réunion ;

    – un temps d’antenne au niveau des médias publics, proportionnel à leur représentativité ;

    – le bénéfice du financement public, conformément aux dispositions de la loi ;

    – la participation effective à la procédure législative, notamment par l’inscription de propositions de loi à l’ordre du jour des deux Chambres du Parlement ; – la participation effective au contrôle du travail gouvernemental, notamment à travers les motions de censure et l’interpellation du gouvernement, les questions orales adressées au gouvernement et les commissions d’enquête parlementaires ;

    – la contribution à la proposition de candidats et à l’élection de membres de la Cour Constitutionnelle ;

    – une représentation appropriée aux activités internes des deux Chambres du Parlement ;

    – la présidence de la commission en charge de la législation à la Chambre des Représentants ;

    – la mise à sa disposition de moyens appropriés pour assumer ses fonctions institutionnelles ;

    – la participation active à la diplomatie parlementaire en vue de la défense des justes causes de la Nation et de ses intérêts vitaux ;

    – la contribution à l’encadrement et à la représentation des citoyennes et des citoyens à travers les partis politiques qui la forment et ce, conformément aux dispositions de l’article 7 de la présente Constitution ;

    – l’exercice du pouvoir aux plans local, régional et national, à travers l’alternance démocratique, et dans le cadre des dispositions de la présente Constitution.

    Les groupes de l’opposition sont tenus d’apporter une contribution active et constructive au travail parlementaire.

    Les modalités d’exercice, par les groupes de l’opposition, des droits susvisés sont fixées, selon le cas, par des lois organiques, par des lois ou encore, par le règlement intérieur de chaque Chambre du Parlement.

    Article 11

    Les élections libres, sincères et transparentes constituent le fondement de la légitimité de la représentation démocratique.

    Les pouvoirs publics sont tenus d’observer la stricte neutralité vis-à-vis des candidats et la non-discrimination entre eux.

    La loi définit les règles garantissant l’accès équitable aux médias publics et le plein exercice des libertés et des droits fondamentaux liés aux campagnes électorales et aux opérations de vote. Les autorités en charge de l’organisation des élections veillent à l’application de ces règles.

    La loi définit les conditions et les modalités de l’observation indépendante et neutre des élections, en conformité avec les normes internationalement reconnues.

    Toute personne qui porte atteinte aux dispositions et règles de probité, de sincérité et de transparence des élections est punie par la loi.

    Les pouvoirs publics mettent en œuvre  les moyens nécessaires à la promotion de la participation des citoyennes et des citoyens aux élections.

    Article 12

    Les associations de la société civile et les organisations non gouvernementales se constituent et exercent leurs activités en toute liberté, dans le respect de la Constitution et de la loi.

    Elles ne peuvent être dissoutes ou suspendues, par les pouvoirs publics, qu’en vertu d’une décision de justice.

    Les associations intéressées à la chose publique et les organisations non gouvernementales, contribuent, dans le cadre de la démocratie participative, à l’élaboration, la mise en œuvre  et l’évaluation des décisions et des projets des institutions élues et des pouvoirs publics. Ces institutions et pouvoirs doivent organiser cette contribution conformément aux conditions et modalités fixées par la loi.

    L’organisation et le fonctionnement des associations et des organisations non gouvernementales doivent être conformes aux principes démocratiques.

    Article 13

    Les pouvoirs publics œuvrent à la création d’instances de concertation, en vue d’associer les différents acteurs sociaux à l’élaboration, la mise en œuvre, l’exécution et l’évaluation des politiques publiques.

    Article 14

    Les citoyennes et les citoyens disposent, dans les conditions et selon les modalités fixées par une loi organique, du droit de présenter des motions en matière législative.

    Article 15

    Les citoyennes et les citoyens disposent du droit de présenter des pétitions aux pouvoirs publics.

    Une loi organique détermine les conditions et les modalités d’exercice de ce droit.

    Article 16

    Le Royaume du Maroc œuvre à la protection des droits et des intérêts légitimes des citoyennes et des citoyens marocains résidant à l’étranger, dans le respect du droit international et des lois en vigueur dans les pays d’accueil. Il s’attache au maintien et au développement de leurs liens humains, notamment culturels, avec le Royaume, et à la préservation de leur identité nationale.

    Il veille au renforcement de leur contribution au développement de leur Patrie, le Maroc, et au resserrement des liens d’amitié et de coopération avec les gouvernements et les sociétés des pays où ils résident, ou dont ils sont aussi citoyens.

    Article 17

    Les Marocains résidant à l’étranger jouissent des droits de pleine citoyenneté, y compris le droit d’être électeurs et éligibles. Ils peuvent se porter candidats aux élections au niveau des listes et des circonscriptions électorales locales, régionales et nationales. La loi fixe les critères spécifiques d’éligibilité et d’incompatibilité. Elle détermine, de même, les conditions et les modalités de l’exercice effectif du droit de vote et de candidature à partir des pays de résidence.

    Article 18

    Les pouvoirs publics œuvrent à assurer une participation aussi étendue que possible des Marocains résidant à l’étranger, aux institutions consultatives et de bonne gouvernance créées par la Constitution ou par la loi.

    TITRE II. LIBERTES ET DROITS FONDAMENTAUX

    Article 19

    L’homme et la femme jouissent, à égalité, des droits et libertés à caractère civil, politique, économique, social, culturel et environnemental, énoncés dans le présent Titre et dans les autres dispositions de la Constitution, ainsi que dans les conventions et pactes internationaux dûment ratifiés par le Maroc et ce, dans le respect des dispositions de la   Constitution, des constantes du Royaume et de ses lois.

    L’Etat œuvre à la réalisation de la parité entre les hommes et les femmes.

    Il est créé, à cet effet, une Autorité pour la parité et la lutte contre toutes formes de discrimination.

    Article 20

    Le droit à la vie est le droit premier de tout être humain. La loi protège ce droit.

    Article 21

    Toute personne a droit à la sécurité de sa personne et de ses proches, et à la protection de ses biens.

    Les pouvoirs publics assurent la sécurité des populations et du territoire national, dans le respect des libertés et des droits fondamentaux garantis à tous.

    Article 22

    Il ne peut être porté atteinte à l’intégrité physique ou morale de quiconque, en quelque circonstance que ce soit, et par quelque partie que ce soit, privée ou publique.

    Nul ne doit infliger à autrui, sous quelque prétexte que ce soit, des traitements cruels, inhumains, dégradants ou portant atteinte à la dignité humaine.

    La pratique de la torture, sous toutes ses formes et par quiconque, est un crime puni par la loi.

    Article 23

    Nul ne peut être arrêté, détenu, poursuivi ou condamné en dehors des cas et des formes prévus par la loi.

    La détention arbitraire ou secrète et la disparition forcée sont des crimes de la plus grande gravité. Elles exposent leurs auteurs aux sanctions les plus sévères.

    Toute personne détenue doit être informée immédiatement, et d’une façon qui lui soit compréhensible, des motifs de sa détention et de ses droits, dont celui de garder le silence. Elle doit bénéficier, au plus tôt, d’une assistance juridique et de la possibilité de communication avec ses proches, conformément à la loi.

    La présomption d’innocence et le droit à un procès équitable sont garantis.

    Toute personne détenue jouit de droits fondamentaux et de conditions de détention humaines. Elle peut bénéficier de programmes de formation et de réinsertion.

    Est proscrite toute incitation au racisme, à la haine et à la violence.

    Le génocide et tous autres crimes contre l’humanité, les crimes de guerre et toutes les violations graves et systématiques des droits de l’Homme sont punis par la loi.

    Article 24

    Toute personne a droit à la protection de sa vie privée.

    Le domicile est inviolable. Les perquisitions ne peuvent intervenir que dans les conditions et les formes prévues par la loi.

    Les communications privées, sous quelque forme que ce soit, sont secrètes. Seule la justice peut autoriser, dans les conditions et selon les formes prévues par la loi, l’accès à leur contenu, leur divulgation totale ou partielle ou leur invocation à la charge de quiconque.

    Est garantie pour tous, la liberté de circuler et de s’établir sur le territoire national, d’en sortir et d’y retourner, conformément à la loi.

    Article 25

    Sont garanties les libertés de pensée, d’opinion et d’expression sous toutes leurs formes.

    Sont garanties les libertés de création, de publication et d’exposition en matière littéraire et artistique et de recherche scientifique et technique.

    Article 26

    Les pouvoirs publics apportent, par des moyens appropriés, leur appui au développement de la création culturelle et artistique, et de la recherche scientifique et technique, ainsi qu’à la promotion du sport. Ils favorisent le développement et l’organisation de ces secteurs de manière indépendante et sur des bases démocratiques et professionnelles précises.

    Article 27

    Les citoyennes et les citoyens ont le droit d’accéder à l’information détenue par l’administration publique, les institutions élues et les organismes investis de mission de service public.

    Le droit à l’information ne peut être limité que par la loi, dans le but d’assurer la protection de tout ce qui concerne la défense nationale, la sécurité intérieure et extérieure de l’Etat, et la vie privée des personnes, de prévenir l’atteinte aux libertés et droits fondamentaux énoncés dans la présente Constitution, et de protéger les sources des informations et les domaines déterminés avec précision par la loi.

    Article 28

    La liberté de la presse est garantie et ne peut être limitée par aucune forme de censure préalable.

    Tous ont le droit d’exprimer et de diffuser librement et dans les seules limites expressément prévues par la loi, des informations, des idées et des opinions.

    Les pouvoirs publics favorisent l’organisation du secteur de la presse de manière indépendante et sur des bases démocratiques, ainsi que la détermination des règles juridiques et déontologiques le concernant.

    La loi fixe les règles d’organisation et de contrôle des moyens publics de communication.    Elle garantit l’accès à ces moyens dans le respect du pluralisme linguistique, culturel et politique de la société marocaine.

    Conformément aux dispositions de l’article 165 de la présente Constitution, la Haute autorité de la communication audiovisuelle veille au respect de ce pluralisme.

    Article 29

    Sont garanties les libertés de réunion, de rassemblement, de manifestation pacifique, d’association et d’appartenance syndicale et politique. La loi fixe les conditions d’exercice de ces libertés.

    Le droit de grève est garanti. Une loi organique fixe les conditions et les modalités de son exercice.

    Article 30

    Sont électeurs et éligibles tous les citoyennes et les citoyens majeurs jouissant de leurs droits civils et politiques. La loi prévoit des dispositions de nature à favoriser l’égal accès des femmes et des hommes aux fonctions électives.

    Le vote est un droit personnel et un devoir national.

    Les ressortissants étrangers jouissent des libertés fondamentales reconnues aux citoyennes et citoyens marocains, conformément à la loi.

    Ceux d’entre eux qui résident au Maroc peuvent participer aux élections locales en vertu de la loi, de l’application de conventions internationales ou de pratiques de réciprocité.

    Les conditions d’extradition et d’octroi du droit d’asile sont définies par la loi.

    Article 31

    L’Etat, les établissements publics et les collectivités territoriales œuvrent à la mobilisation de tous les moyens disponibles pour faciliter l’égal accès des citoyennes et des citoyens aux conditions leur permettant de jouir du droit :

    – aux soins de santé ;

    – à la protection sociale, à la couverture médicale et à la solidarité mutualiste ou organisée par l’Etat ;

    – à une éducation moderne, accessible et de qualité ;

    – à l’éducation sur l’attachement à l’identité marocaine et aux constantes nationales immuables ;

    – à la formation professionnelle et à l’éducation physique et artistique ;

    – à un logement décent ;

    – au travail et à l’appui des pouvoirs publics en matière de recherche d’emploi ou d’auto-emploi ;

    – à l’accès aux fonctions publiques selon le mérite ;

    – à l’accès à l’eau et à un environnement sain ;

    – au développement durable.

    Article 32

    La famille, fondée sur le lien légal du mariage, est la cellule de base de la société.

    L’Etat œuvre à garantir, par la loi, la protection de la famille sur les plans juridique, social et économique, de manière à garantir son unité, sa stabilité et sa préservation.

    Il assure une égale protection juridique et une égale considération sociale et morale à tous les enfants, abstraction faite de leur situation familiale.

    L’enseignement fondamental est un droit de l’enfant et une obligation de la famille et de l’Etat.

    Il est créé un Conseil consultatif de la famille et de l’enfance.

    Article 33

    Il incombe aux pouvoirs publics de prendre toutes les mesures appropriées en vue :

    – d’étendre et généraliser la participation de la jeunesse au développement social, économique, culturel et politique du pays ;

    – d’aider les jeunes à s’insérer dans la vie active et associative et prêter assistance à ceux en difficulté d’adaptation scolaire, sociale ou professionnelle ;

    – de faciliter l’accès des jeunes à la culture, à la science, à la technologie, à l’art, au sport et aux loisirs, tout en créant les conditions propices au plein déploiement de leur potentiel créatif et innovant dans tous ces domaines.

    Il est créé à cet effet un Conseil consultatif de la jeunesse et de l’action associative.

    Article 34

    Les pouvoirs publics élaborent et mettent en œuvre des politiques destinées aux personnes et aux catégories à besoins spécifiques. A cet effet, ils veillent notamment à :

    – traiter et prévenir la vulnérabilité de certaines catégories de femmes et de mères, d’enfants et de personnes âgées ;

    – réhabiliter et intégrer dans la vie sociale et civile les handicapés physiques sensorimoteurs et mentaux, et faciliter leur jouissance des droits et libertés reconnus à tous.

    Article 35

    Le droit de propriété est garanti.

    La loi peut en limiter l’étendue et l’exercice si les exigences du développement économique et social du pays le nécessitent. Il ne peut être procédé à l’expropriation que dans les cas et les formes prévus par la loi.

    L’Etat garantit la liberté d’entreprendre et la libre concurrence. Il œuvre à la réalisation d’un développement humain durable, à même de permettre la consolidation de la justice sociale et la préservation des ressources naturelles nationales et des droits des générations futures.

    L’Etat veille à garantir l’égalité des chances pour tous et une protection spécifique pour les catégories sociales défavorisées.

    Article 36

    Les infractions relatives aux conflits d’intérêts, aux délits d’initié et toutes infractions d’ordre financier sont sanctionnées par la loi.

    Les pouvoirs publics sont tenus de prévenir et réprimer, conformément à la loi, toutes formes de délinquance liées à l’activité des administrations et des organismes publics, à l’usage des fonds dont ils disposent, ainsi qu’à la passation et à la gestion des marchés publics.

    Le trafic d’influence et de privilèges, l’abus de position dominante et de monopole, et toutes les autres pratiques contraires aux principes de la concurrence libre et loyale dans les relations économiques, sont sanctionnés par la loi.

    Il est créé une Instance nationale de la probité, de la prévention et de la lutte contre la corruption.

    Article 37

    Tous les citoyennes et les citoyens doivent respecter la Constitution et se conformer à la loi. Ils doivent exercer les droits et les libertés garantis par la Constitution dans un esprit de responsabilité et de citoyenneté engagée, où l’exercice des droits se fait en corrélation avec l’accomplissement des devoirs.

    Article 38

    Tous les citoyennes et les citoyens contribuent à la défense de la Patrie et de son intégrité territoriale contre toute agression ou menace.

    Article 39

    Tous supportent, en proportion de leurs facultés contributives, les charges publiques que seule la loi peut, dans les formes prévues par la présente Constitution, créer et répartir.

    Article 40

    Tous supportent solidairement et proportionnellement à leurs moyens, les charges que requiert le développement du pays, et celles résultant des calamités et des catastrophes naturelles.

    TITRE III. DE LA ROYAUTE

    Article 41

    Le Roi, Amir Al Mouminine, veille au respect de l’Islam. Il est le Garant du libre exercice des cultes.

    Il préside le Conseil supérieur des Ouléma, chargé de l’étude des questions qu’Il lui soumet.

    Le Conseil est la seule instance habilitée à prononcer les consultations religieuses (Fatwas) devant être officiellement agréées, sur les questions dont il est saisi et ce, sur la base des principes, préceptes et desseins tolérants de l’Islam.

    Les attributions, la composition et les modalités de fonctionnement du Conseil sont fixées par dahir.

    Le Roi exerce par dahirs les prérogatives religieuses inhérentes à l’institution d’Imarat Al Mouminine qui Lui sont conférées de manière exclusive par le présent article.

    Article 42

    Le Roi Chef de l’Etat, Son Représentant Suprême, Symbole de l’unité de la Nation, Garant de la pérennité et de la continuité de l’Etat et Arbitre Suprême entre ses institutions, veille au respect de la Constitution, au bon fonctionnement des institutions constitutionnelles, à la protection du choix démocratique et des droits et libertés des citoyennes et des citoyens, et des collectivités, et au respect des engagements internationaux du Royaume.

    Il est le Garant de l’indépendance du pays et de l’intégrité territoriale du Royaume dans ses frontières authentiques.

    Le Roi exerce ces missions par dahirs en vertu des pouvoirs qui Lui sont expressément dévolus par la présente Constitution.

    Les dahirs, à l’exception de ceux prévus aux articles 41, 44 (2e alinéa), 47 (1er et 6e alinéas), 51, 57, 59, 130 (1er et 4e alinéas) et 174, sont contresignés par le Chef du Gouvernement.

    Article 43

    La Couronne du Maroc et ses droits constitutionnels sont héréditaires et se transmettent de père en fils aux descendants mâles en ligne directe et par ordre de primogéniture de SA MAJESTE LE ROI MOHAMMED VI, à moins que le Roi ne désigne, de Son vivant, un successeur parmi Ses fils, autre que Son fils aîné. Lorsqu’il n’y a pas de descendants mâles en ligne directe, la succession au Trône est dévolue à la ligne collatérale mâle la plus proche et dans les mêmes conditions.

    Article 44

    Le Roi est mineur jusqu’à l’âge de dix-huit ans accomplis. Durant la minorité du Roi, un Conseil de Régence exerce les pouvoirs et les droits constitutionnels de la Couronne, sauf ceux relatifs à la révision de la Constitution. Le Conseil de Régence fonctionnera comme organe consultatif auprès du Roi, jusqu’au jour où il aura atteint l’âge de vingt ans accomplis.

    Le Conseil de Régence est présidé par le Président de la Cour Constitutionnelle. Il se compose, en outre, du Chef du Gouvernement, du Président de la Chambre des Représentants, du Président de la Chambre des Conseillers, du Président-délégué du Conseil Supérieur du Pouvoir Judiciaire, du Secrétaire général du Conseil supérieur des Ouléma, et de dix personnalités désignées par le Roi intuitu personae.

    Les règles de fonctionnement du Conseil de Régence sont fixées par une loi organique.

    Article 45

    Le Roi dispose d’une liste civile.

    Article 46

    La personne du Roi est inviolable, et respect Lui est dû.

    Article 47

    Le Roi nomme le Chef du Gouvernement au sein du parti politique arrivé en tête des élections des membres de la Chambre des Représentants, et au vu de leurs résultats.

    Sur proposition du Chef du Gouvernement, Il nomme les membres du gouvernement.

    Le Roi peut, à Son initiative, et après consultation du Chef du Gouvernement, mettre fin aux fonctions d’un ou de plusieurs membres du gouvernement.

    Le Chef du Gouvernement peut demander au Roi de mettre fin aux fonctions d’un ou de plusieurs membres du gouvernement.

    Le Chef du Gouvernement peut demander au Roi de mettre fin aux fonctions d’un ou de plusieurs membres du gouvernement du fait de leur démission individuelle ou collective.

    A la suite de la démission du Chef du Gouvernement, le Roi met fin aux fonctions de l’ensemble du gouvernement.

    Le gouvernement dont il a été mis fin aux fonctions expédie les affaires courantes jusqu’à la constitution d’un nouveau gouvernement.

    Article 48

    Le Roi préside le Conseil des ministres, composé du Chef du Gouvernement et des ministres.

    Le Conseil des ministres se réunit à l’initiative du Roi ou à la demande du Chef du Gouvernement.

    Le Roi peut, sur la base d’un ordre du jour déterminé, déléguer au Chef du Gouvernement la présidence d’un Conseil des ministres.

    Article 49

    Le Conseil des ministres délibère sur les questions et textes suivants :

    – les orientations stratégiques de la politique de l’Etat ;

    – les projets de révision de la Constitution ;

    – les projets de lois organiques ;

    – les orientations générales du projet de loi de finances ;

    – les projets de loi-cadre visés à l’article 71 (2e alinéa) de la présente Constitution ;

    – le projet de loi d’amnistie ;

    – les projets de textes relatifs au domaine militaire ;

    – la déclaration de l’état de siège ;

    – la déclaration de guerre ;

    – le projet de décret visé à l’article 104 de la présente Constitution ;

    – la nomination, sur proposition du Chef du Gouvernement et à l’initiative du ministre concerné, aux emplois civils suivants : wali de Bank Al-Maghrib, ambassadeurs, walis et gouverneurs, et responsables des administrations chargées de la sécurité intérieure, ainsi que les responsables des établissements et entreprises publics stratégiques. Une loi organique précise la liste de ces établissements et entreprises stratégiques.

    Article 50

    Le Roi promulgue la loi dans les trente jours qui suivent la transmission au gouvernement de la loi définitivement adoptée.

    La loi ainsi promulguée doit faire l’objet de publication au « Bulletin officiel » du Royaume dans un délai n’excédant pas un mois courant à compter de la date du dahir de sa promulgation.

    Article 51

    Le Roi peut dissoudre, par dahir, les deux Chambres du Parlement ou l’une d’elles, dans les conditions prévues aux articles 96, 97 et 98.

    Article 52

    Le Roi peut adresser des messages à la Nation et au Parlement. Les messages sont lus devant les deux chambres et ne peuvent y faire l’objet d’aucun débat.

    Article 53

    Le Roi est le Chef Suprême des Forces Armées Royales. Il nomme aux emplois militaires et peut déléguer ce droit.

    Article 54

    Il est créé un Conseil supérieur de sécurité, en tant qu’instance de concertation sur les stratégies de sécurité intérieure et extérieure du pays, et de gestion des situations de crise. Le Conseil veille également à l’institutionnalisation des normes d’une bonne gouvernance sécuritaire.

    Le Roi préside ce Conseil et peut déléguer au Chef du Gouvernement la présidence d’une réunion du Conseil, sur la base d’un ordre du jour déterminé.

    Le Conseil supérieur de sécurité comprend, outre le Chef du Gouvernement, le Président de la Chambre des Représentants, le Président de la Chambre des Conseillers, le président-délégué du Conseil supérieur du pouvoir judiciaire, les ministres chargés de l’Intérieur, des Affaires étrangères, de la Justice et de l’administration de la Défense nationale, ainsi que les responsables des administrations compétentes en matière sécuritaire, des officiers supérieurs des Forces Armées Royales, et toute autre personnalité dont la présence est utile aux travaux dudit Conseil.

    Le règlement intérieur du Conseil fixe les règles de son organisation et de son fonctionnement.

    Article 55

    Le Roi accrédite les ambassadeurs auprès des Etats étrangers et des organismes internationaux. Les ambassadeurs et les représentants des organismes internationaux sont accrédités auprès de Lui.

    Il signe et ratifie les traités. Toutefois, les traités de paix ou d’union, ou ceux relatifs à la délimitation des frontières, les traités de commerce ou ceux engageant les finances de l’Etat ou dont l’application nécessite des mesures législatives, ainsi que les traités relatifs aux droits et libertés individuelles ou collectives des citoyennes et des citoyens, ne peuvent être ratifiés qu’après avoir été préalablement approuvés par la loi.

    Le Roi peut soumettre au Parlement tout autre traité ou convention avant sa ratification.

    Si la Cour Constitutionnelle, saisie par le Roi ou le Chef du Gouvernement ou le Président de la Chambre des Représentants ou le Président de la Chambre des Conseillers ou le sixième des membres de la première Chambre ou le quart des membres de la deuxième Chambre, déclare qu’un engagement international comporte une disposition contraire à la Constitution, sa ratification ne peut intervenir qu’après la révision de la Constitution.

    Article 56

    Le Roi préside le Conseil supérieur du pouvoir judiciaire.

    Article 57

    Le Roi approuve par dahir la nomination des magistrats par le Conseil supérieur du pouvoir judiciaire.

    Article 58

    Le Roi exerce le droit de grâce.

    Article 59

    Lorsque l’intégrité du territoire national est menacée ou que se produisent des événements qui entravent le fonctionnement régulier des institutions constitutionnelles, le Roi peut, après avoir consulté le Chef du Gouvernement, le Président de la Chambre des Représentants, le Président de la Chambre des Conseillers, ainsi que le Président de la Cour Constitutionnelle, et adressé un message à la Nation, proclamer par dahir l’état d’exception. De ce fait, le Roi est habilité à prendre les mesures qu’imposent la défense de l’intégrité territoriale et le retour, dans le moindre délai, au fonctionnement normal des institutions constitutionnelles.

    Le Parlement ne peut être dissous pendant l’exercice des pouvoirs exceptionnels.

    Les libertés et droits fondamentaux prévus par la présente Constitution demeurent garantis.

    Il est mis fin à l’état d’exception dans les mêmes formes que sa proclamation, dès que les conditions qui l’ont justifié n’existent plus.

    TITRE IV. DU POUVOIR LEGISLATIF

    De l’organisation du Parlement

    Article 60

    Le Parlement est composé de deux Chambres, la Chambre des Représentants et la Chambre des Conseillers. Leurs membres tiennent leur mandat de la Nation. Leur droit de vote est personnel et ne peut être délégué.

    L’opposition est une composante essentielle des deux Chambres. Elle participe aux fonctions de législation et de contrôle telles que prévues, notamment dans le présent Titre.

    Article 61

    Tout membre de l’une des deux Chambres qui renonce à l’appartenance politique au nom de laquelle il s’est porté candidat aux élections ou au groupe ou groupement parlementaire auquel il appartient, est déchu de son mandat.

    La Cour Constitutionnelle, saisie par le président de la Chambre concernée, déclare la vacance du siège et ce, conformément aux dispositions du règlement intérieur de la Chambre concernée, qui fixe également les délais et la procédure de saisine de la Cour Constitutionnelle.

    Article 62

    Les membres de la Chambre des Représentants sont élus pour cinq ans au suffrage universel direct. La législature prend fin à l’ouverture de la session d’octobre de la cinquième année qui suit l’élection de la Chambre.

    Le nombre des représentants, le régime électoral, les principes du découpage électoral, les conditions d’éligibilité, les cas d’incompatibilités, les règles de limitation du cumul de mandats et l’organisation du contentieux électoral, sont fixés par une loi organique.

    Le Président de la Chambre des Représentants et les membres du Bureau ainsi que les présidents des Commissions permanentes et leurs bureaux, sont élus en début de législature, puis à la troisième année, de celle-ci lors de la session d’avril, et pour la période restant à courir de ladite législature.

    L’élection des membres du Bureau a lieu à la représentation proportionnelle des groupes.

    Article 63

    La Chambre des Conseillers comprend au minimum 90 membres et au maximum 120, élus au suffrage universel indirect pour six ans, selon la répartition suivante :

    – trois cinquièmes des membres représentant les collectivités territoriales. Cet effectif est réparti entre les régions du Royaume, en proportion de leurs populations respectives et en observant l’équité entre les régions. Le tiers réservé à la région est élu au niveau de chaque région par le Conseil régional parmi ses membres. Les deux tiers restants sont élus par un collège électoral constitué au niveau de la région par les membres des conseils communaux, préfectoraux et provinciaux ;

    – deux cinquièmes des membres élus dans chaque région par des collèges électoraux composés d’élus des chambres professionnelles et des organisations professionnelles des employeurs les plus représentatives, et de membres élus à l’échelon national par un collège électoral composé des représentants des salariés.

    Le nombre des membres de la Chambre des Conseillers et leur régime électoral, le nombre de ceux à élire par chacun des collèges électoraux, la répartition des sièges par région, les conditions d’éligibilité et les cas d’incompatibilités, les règles de limitation du cumul de mandats, ainsi que l’organisation du contentieux électoral, sont fixés par une loi organique.

    Le Président de la Chambre des Conseillers et les membres du Bureau, ainsi que les présidents des Commissions permanentes et leurs bureaux, sont élus en début de législature, puis au terme de la moitié de la législature.

    L’élection des membres du Bureau a lieu à la représentation proportionnelle des groupes.

    Article 64

    Aucun membre du Parlement ne peut être poursuivi, recherché, arrêté, détenu ou jugé à l’occasion d’une opinion ou d’un vote émis par lui dans l’exercice de ses fonctions, hormis le cas où l’opinion exprimée met en cause la forme monarchique de l’Etat ou la religion musulmane ou constitue une atteinte au respect dû au Roi.

    Article 65

    Le Parlement siège pendant deux sessions par an. Le Roi préside l’ouverture de la première session qui commence le deuxième vendredi d’octobre. La seconde session s’ouvre le deuxième vendredi d’avril.

    Lorsque le Parlement a siégé quatre mois au moins, au cours de chaque session, la clôture peut être prononcée par décret.

    Article 66

    Le Parlement peut être réuni en session extraordinaire, soit par décret, soit à la demande du tiers des membres de la Chambre des Représentants ou de la majorité de ceux de la Chambre des Conseillers.

    Les sessions extraordinaires du Parlement se tiennent sur la base d’un ordre du jour déterminé. Lorsque ce dernier est épuisé, la session est close par décret.

    Article 67

    Les ministres ont accès à chaque Chambre et à leurs commissions. Ils peuvent se faire assister de commissaires désignés par eux.

    Outre les Commissions permanentes mentionnées à l’alinéa précédent, peuvent être créées à l’initiative du Roi ou à la demande du tiers des membres de la Chambre des Représentants, ou du tiers des membres de la Chambre des Conseillers, des commissions d’enquête formées pour recueillir les éléments d’information sur des faits déterminés ou sur la gestion des services, établissements et entreprises publics, et soumettre leurs conclusions à la Chambre concernée.

    Il ne peut être créé de commission d’enquête lorsque les faits ont donné lieu à des poursuites judiciaires et aussi longtemps que ces poursuites sont en cours. Si une commission a déjà été créée, sa mission prend fin dès l’ouverture d’une information judiciaire relative aux faits qui ont motivé sa création.

    Les commissions d’enquête ont un caractère temporaire. Leur mission prend fin par le dépôt de leur rapport auprès du Bureau de la Chambre concernée et, le cas échéant, par la saisine de la justice par le Président de ladite Chambre.

    Une séance publique est réservée par la Chambre concernée à la discussion des rapports des commissions d’enquête.

    Une loi organique fixe les modalités de fonctionnement de ces commissions.

    Article 68

    Les séances des Chambres du Parlement sont publiques. Le compte rendu intégral des débats est publié au « Bulletin officiel » du Parlement.

    Chaque Chambre peut siéger en comité secret, à la demande du Chef du Gouvernement ou du tiers de ses membres.

    Les réunions des Commissions du Parlement sont secrètes. Les règlements intérieurs des deux Chambres du Parlement fixent les cas et les règles permettant la tenue par ces Commissions de séances publiques.

    Le Parlement tient des réunions communes de ses deux Chambres, en particulier dans les cas suivants :

    – l’ouverture par le Roi de la session parlementaire, le deuxième vendredi du mois d’octobre, et l’adresse des messages Royaux destinés au Parlement ;

    – l’adoption de la révision de la Constitution, conformément aux dispositions de l’article 174 ;

    – les déclarations du Chef du Gouvernement ;

    – la présentation du projet de loi de finances de l’année ;

    – les discours des Chefs d’Etat et de gouvernement étrangers.

    Le Chef du Gouvernement peut également demander au Président de la Chambre des Représentants et au Président de la Chambre des Conseillers de tenir des réunions communes des deux Chambres, pour la présentation d’informations portant sur des affaires revêtant un caractère national important.

    Les réunions communes se tiennent sous la présidence du Président de la Chambre des Représentants. Les règlements intérieurs des deux Chambres déterminent les modalités et les règles de la tenue de ces réunions.

    Outre les séances communes, les Commissions permanentes du Parlement peuvent tenir des réunions communes pour écouter des informations portant sur des affaires revêtant un caractère national important et ce, conformément aux règles fixées par les règlements intérieurs des deux Chambres.

    Article 69

    Chaque Chambre établit et vote son règlement intérieur. Toutefois, il ne pourra être mis en application qu’après avoir été déclaré par la Cour Constitutionnelle conforme aux dispositions de la présente Constitution.

    Les deux Chambres du Parlement sont tenues, lors de l’élaboration de leur règlement intérieur respectif, de prendre en considération les impératifs de leur harmonisation et de leur complémentarité, de manière à garantir l’efficience du travail parlementaire.

    Le règlement intérieur fixe notamment :

    – les règles de composition, de fonctionnement et d’appartenance concernant les groupes et groupements parlementaires, et les droits spécifiques reconnus aux groupes d’opposition ;

    – l’obligation de participation effective des membres aux travaux des commissions et des séances plénières, y compris les sanctions applicables en cas d’absence ;

    – le nombre, les attributions et l’organisation des Commissions permanentes, en réservant la présidence d’une ou deux de ces commissions au moins à l’opposition, sous réserve des dispositions de l’article 10 de la présente Constitution.

    Des Pouvoirs du Parlement

    Article 70

    Le Parlement exerce le pouvoir législatif.

    Il vote les lois, contrôle l’action du gouvernement et évalue les politiques publiques.

    Une loi d’habilitation peut autoriser le gouvernement, pendant un délai limité et en vue d’un objectif déterminé, à prendre par décret des mesures qui sont normalement du domaine de la loi. Les décrets entrent en vigueur dès leur publication, mais ils doivent être soumis, au terme du délai fixé par la loi d’habilitation, à la ratification du Parlement. La loi d’habilitation devient caduque en cas de dissolution des deux Chambres du Parlement, ou de l’une d’elles.

    Article 71

    Sont du domaine de la loi, outre les matières qui lui sont expressément dévolues par d’autres articles de la Constitution :

    – les libertés et droits fondamentaux prévus dans le préambule, et dans d’autres articles de la présente Constitution ;

    – le statut de la famille et l’état civil;

    – les principes et règles du système de santé ;

    – le régime des médias audio-visuels et de la presse sous toutes ses formes;

    – l’amnistie ;

    – la nationalité et la condition des étrangers;

    – la détermination des infractions et des peines qui leur sont applicables ;

    – l’organisation judiciaire et la création de nouvelles catégories de juridictions ;

    – la procédure civile et la procédure pénale ;

    – le régime pénitentiaire ;

    – le statut général de la fonction publique ;

    – les garanties fondamentales accordées aux fonctionnaires civils et militaires ;

    – le statut des services et forces de maintien de l’ordre ;

    – le régime des collectivités territoriales et les principes de délimitation de leur ressort territorial ;

    – le régime électoral des collectivités territoriales et les principes du découpage des circonscriptions électorales ;

    – le régime fiscal et l’assiette, le taux et les modalités de recouvrement des impôts ;

    – le régime juridique de l’émission de la monnaie et le statut de la banque centrale ;

    – le régime des douanes ;

    – le régime des obligations civiles et commerciales, le droit des sociétés et des coopératives ;

    – les droits réels et les régimes des propriétés immobilières publique, privée et collective ;

    – le régime des transports ;

    – les relations de travail, la sécurité sociale, les accidents de travail et les maladies professionnelles ; – le régime des banques, des sociétés d’assurances et des mutuelles ;

    – le régime des technologies de l’information et de la communication ;

    – l’urbanisme et l’aménagement du territoire ;

    – les règles relatives à la gestion de l’environnement, à la protection des ressources naturelles et au développement durable ;

    – le régime des eaux et forêts et de la pêche ;

    – la détermination des orientations et de l’organisation générale de l’enseignement, de la recherche scientifique et de la formation professionnelle ;

    – la création des établissements publics et de toute autre personne morale de droit public ;

    – la nationalisation d’entreprises et le régime des privatisations.

    Outre les matières visées à l’alinéa précédent, le Parlement est habilité à voter des lois-cadres concernant les objectifs fondamentaux de l’activité économique, sociale, environnementale et culturelle de l’Etat.

    Article 72

    Les matières autres que celles qui sont du domaine de la loi appartiennent au domaine réglementaire.

    Article 73

    Les textes pris en forme législative peuvent être modifiés par décret, après avis conforme de la Cour Constitutionnelle, lorsqu’ils seront intervenus dans un domaine dévolu à l’exercice du pouvoir réglementaire.

    Article 74

    L’état de siège peut être déclaré, par dahir contresigné par le Chef du Gouvernement, pour une durée de trente jours. Ce délai ne peut être prorogé que par la loi.

    Article 75

    Le Parlement vote la loi de finances, déposée par priorité devant la Chambre des Représentants, dans les conditions prévues par une loi organique. Celle-ci détermine la nature des informations, documents et données nécessaires pour enrichir les débats parlementaires sur le projet de loi de finances.

    Le Parlement vote une seule fois les dépenses d’investissement nécessaires, dans le domaine de développement, à la réalisation des plans de développement stratégiques et des programmes pluriannuels, établis par le gouvernement qui en informe le Parlement. Les dépenses ainsi approuvées sont reconduites automatiquement pendant la durée des ces plans et programmes. Seul le gouvernement est habilité à déposer des projets de loi tendant à modifier les dépenses approuvées dans le cadre précité.

    Si, à la fin de l’année budgétaire, la loi de finances n’est pas votée ou n’est pas promulguée en raison de sa soumission à la Cour Constitutionnelle en application de l’article 132 de la présente Constitution, le gouvernement ouvre, par décret, les crédits nécessaires à la marche des services publics et à l’exercice de leur mission, en fonction des propositions budgétaires soumises à approbation.

    Dans ce cas, les recettes continuent à être perçues conformément aux dispositions législatives et réglementaires en vigueur les concernant à l’exception, toutefois, des recettes dont la suppression est proposée dans le projet de loi de finances. Quant à celles pour lesquelles ledit projet prévoit une diminution de taux, elles seront perçues au nouveau taux proposé.

    Article 76

    Le gouvernement soumet annuellement au Parlement une loi de règlement de la loi de finances au cours du deuxième exercice qui suit celui de l’exécution de ladite loi de finances. Cette loi inclut le bilan des budgets d’investissement dont la durée est arrivée à échéance.

    Article 77

    Le Parlement et le gouvernement veillent à la préservation de l’équilibre des finances de l’Etat.

    Le gouvernement peut opposer, de manière motivée, l’irrecevabilité à toute proposition ou amendement formulés par les membres du Parlement lorsque leur adoption aurait pour conséquence, par rapport à la loi de finances, soit une diminution des ressources publiques, soit la création ou l’aggravation d’une charge publique.

    De l’exercice du Pouvoir législatif

    Article 78

    L’initiative des lois appartient concurremment au Chef du Gouvernement et aux membres du Parlement.

    Les projets de loi sont déposés en priorité sur le bureau de la Chambre des Représentants. Toutefois, les projets de loi relatifs particulièrement aux Collectivités territoriales, au développement régional et aux affaires sociales sont déposés en priorité sur le bureau de la Chambre des Conseillers.

    Article 79

    Le gouvernement peut opposer l’irrecevabilité à toute proposition ou amendement qui n’est pas du domaine de la loi.

    En cas de désaccord, la Cour Constitutionnelle statue, dans un délai de huit jours, à la demande du Président de l’une ou l’autre Chambre du Parlement ou du Chef du Gouvernement.

    Article 80

    Les projets et propositions de loi sont soumis pour examen aux commissions, dont l’activité se poursuit entre les sessions.

    Article 81

    Le gouvernement peut prendre, dans l’intervalle des sessions, avec l’accord des commissions concernées des deux Chambres, des décrets-lois qui doivent être, au cours de la session ordinaire suivante du Parlement, soumis à la ratification de celui-ci.

    Le projet de décret-loi est déposé sur le bureau de la Chambre des Représentants. Il est examiné successivement par les commissions concernées des deux Chambres en vue de parvenir à une décision commune dans un délai de six jours. A défaut, la décision est prise par la commission concernée de la Chambre des Représentants.

    Article 82

    L’ordre du jour de chaque Chambre est établi par son bureau. Il comporte les projets de loi et les propositions de loi, par priorité et dans l’ordre que le gouvernement a fixé.

    Une journée par mois au moins est réservée à l’examen des propositions de loi dont celles de l’opposition.

    Article 83

    Les membres de chaque Chambre du Parlement et le gouvernement ont le droit d’amendement. Après l’ouverture du débat, le gouvernement peut s’opposer à l’examen de tout amendement qui n’a pas été antérieurement soumis à la commission intéressée.

    Si le gouvernement le demande, la Chambre saisie du texte en discussion, se prononce par un seul vote sur tout ou partie de celui-ci, en ne retenant que les amendements proposés ou acceptés par le gouvernement. La Chambre concernée peut s’opposer à cette procédure à la majorité de ses membres.

    Article 84

    Tout projet ou proposition de loi est examiné successivement par les deux Chambres du Parlement pour parvenir à l’adoption d’un texte identique. La Chambre des Représentants délibère la première et successivement sur les projets de loi et sur les propositions de loi initiées par ses membres ; la Chambre des Conseillers délibère en premier et successivement sur les projets de loi ainsi que sur les propositions de loi initiées par ses membres. Une

    Chambre saisie d’un texte voté par l’autre Chambre, délibère sur le texte tel qu’il lui a été transmis.

    La Chambre des Représentants adopte en dernier ressort le texte examiné. Le vote ne peut avoir lieu qu’à la majorité absolue des membres présents, lorsqu’il s’agit d’un texte concernant les collectivités territoriales et les domaines afférents au développement régional et aux affaires sociales.

    Article 85

    Les projets et propositions de lois organiques ne sont soumis à la délibération de la Chambre des Représentants qu’à l’issue d’un délai de dix jours après leur dépôt sur le bureau de la Chambre et suivant la même procédure visée à l’article 84. Ils sont définitivement adoptés à la majorité absolue des membres présents de ladite Chambre. Néanmoins, lorsqu’il s’agit d’un projet ou d’une proposition de loi organique relatif à la Chambre des Conseillers ou concernant les collectivités territoriales, le vote a lieu à la majorité des membres de la Chambre des représentants.

    Les lois organiques relatives à la Chambre des Conseillers doivent être votées dans les mêmes termes par les deux Chambres du Parlement.

    Les lois organiques ne peuvent être promulguées qu’après que la Cour Constitutionnelle se soit prononcée sur leur conformité à la Constitution.

    Article 86

    Les projets de lois organiques prévues par la présente Constitution doivent avoir été soumis pour approbation au Parlement dans un délai n’excédant pas la durée de la première législature suivant la promulgation de ladite Constitution.

    TITRE V.DU POUVOIR EXECUTIF

    Article 87

    Le gouvernement se compose du Chef du Gouvernement et des ministres, et peut comprendre aussi des secrétaires d’Etat.

    Une loi organique définit, notamment, les règles relatives à l’organisation et à la conduite des travaux du gouvernement et au statut de ses membres.

    Elle détermine également les cas d’incompatibilité avec la fonction gouvernementale, les règles relatives à la limitation du cumul des fonctions, ainsi que celles régissant l’expédition des affaires courantes par le gouvernement dont il a été mis fin aux fonctions.

    Article 88

    Après la désignation des membres du gouvernement par le Roi, le Chef du Gouvernement présente et expose devant les deux Chambres du Parlement réunies, le programme qu’il compte appliquer. Ce programme doit dégager les lignes directrices de l’action que le gouvernement se propose de mener dans les divers secteurs de l’activité nationale et notamment, dans les domaines intéressant la politique économique, sociale, environnementale, culturelle et extérieure.

    Ce programme fait l’objet d’un débat devant chacune des deux Chambres. Le débat est suivi d’un vote à la Chambre des Représentants.

    Le gouvernement est investi, après avoir obtenu la confiance de la Chambre des Représentants, exprimée par le vote à la majorité absolue des membres composant ladite chambre, en faveur du programme du gouvernement.

    Article 89

    Le gouvernement exerce le pouvoir exécutif.

    Sous l’autorité du Chef du Gouvernement, le gouvernement met en œuvre son programme gouvernemental, assure l’exécution des lois, dispose de l’administration et supervise les établissements et entreprises publics et en assure la tutelle.

    Article 90

    Le Chef du Gouvernement exerce le pouvoir réglementaire et peut déléguer certains de ses pouvoirs aux ministres.

    Les actes réglementaires du Chef du Gouvernement sont contresignés par les ministres chargés de leur exécution.

    Article 91 

    Le Chef du Gouvernement nomme aux emplois civils dans les administrations publiques et aux hautes fonctions des établissements et entreprises publics, sans préjudice des dispositions de l’article 49 de la présente Constitution.

    Il peut déléguer ce pouvoir.

    Article 92

    Sous la présidence du Chef du Gouvernement, le Conseil du gouvernement délibère sur les questions et textes suivants :

    – la politique générale de l’Etat avant sa présentation en Conseil des ministres ;

    – les politiques publiques ;

    – les politiques sectorielles ;

    – l’engagement de la responsabilité du gouvernement devant la Chambre des Représentants ;

    – les questions d’actualité liées aux droits de l’Homme et à l’ordre public ;

    – les projets de loi, dont le projet de loi de finances, avant leur dépôt au bureau de la Chambre des Représentants, sans préjudice des dispositions de l’article 49 de la présente Constitution ;

    – les décrets-lois ;

    – les projets de décrets réglementaires ;

    – les projets de décrets visés aux articles 65 (2e alinéa), 66 et 70 (3e alinéa) de la présente Constitution ;

    – les traités et les conventions internationales avant leur soumission au Conseil des ministres ;

    – la nomination des secrétaires généraux et des directeurs centraux des administrations publiques, des présidents d’universités, des doyens et des directeurs des écoles et instituts supérieurs. La loi organique prévue à l’article 49 de la présente Constitution peut compléter la liste des fonctions à pourvoir en Conseil du

    gouvernement, et déterminer, en particulier, les principes et critères de nomination à ces fonctions, notamment ceux d’égalité des chances, de mérite, de compétence et de transparence.

    Le Chef du Gouvernement informe le Roi des conclusions des délibérations du Conseil du gouvernement.

    Article 93

    Les ministres sont responsables, chacun dans le secteur dont il a la charge et dans le cadre de la solidarité gouvernementale, de la mise en œuvre de la politique du gouvernement.

    Les ministres accomplissent les missions qui leur sont confiées par le Chef du Gouvernement. Ils en rendent compte au Conseil du gouvernement.

    Ils peuvent déléguer une partie de leurs attributions aux secrétaires d’Etat.

    Article 94

    Les membres du gouvernement sont pénalement responsables devant les juridictions du Royaume pour les crimes et délits commis dans l’exercice de leurs fonctions.

    La loi détermine la procédure relative à cette responsabilité.

    TITRE VI. DES RAPPORTS ENTRE LES POUVOIRS

    Des rapports entre le Roi et le Pouvoir législatif

    Article 95

    Le Roi peut demander aux deux Chambres du Parlement qu’il soit procédé à une nouvelle lecture de tout projet ou proposition de loi.

    La demande d’une nouvelle lecture est formulée par message. Cette nouvelle lecture ne peut être refusée.

    Article 96

    Le Roi peut, après avoir consulté le Président de la Cour Constitutionnelle et informé le Chef du Gouvernement, le Président de la Chambre des Représentants et le Président de la Chambre des Conseillers, dissoudre par dahir, les deux Chambres ou l’une d’elles seulement.

    La dissolution a lieu après un message adressé par le Roi à la Nation.

    Article 97

    L’élection du nouveau Parlement ou de la nouvelle Chambre intervient deux mois, au plus tard, après la dissolution.

    Article 98

    Lorsqu’une Chambre est dissoute, celle qui lui succède ne peut l’être qu’un an après son élection, sauf si aucune majorité gouvernementale ne se dégage au sein de la Chambre des Représentants nouvellement élue.

    Article 99

    La déclaration de guerre, décidée en Conseil des ministres, conformément à l’article 49 de la présente Constitution, a lieu après communication faite par le Roi au Parlement.

    Des rapports entre les Pouvoirs législatif et exécutif

    Article 100

    Une séance par semaine est réservée dans chaque Chambre par priorité aux questions des membres de celle-ci et aux réponses du gouvernement.

    Le gouvernement doit donner sa réponse dans les vingt jours suivant la date à laquelle il a été saisi de la question.

    Les réponses aux questions de politique générale sont données par le Chef du Gouvernement. Une séance par mois est réservée à ces questions et les réponses y afférentes sont présentées devant la Chambre concernée dans les trente jours suivant la date de leur transmission au Chef du Gouvernement.

    Article 101

    Le Chef du Gouvernement présente devant le Parlement un bilan d’étape de l’action gouvernementale, à son initiative ou à la demande du tiers des membres de la Chambre des Représentants ou de la majorité des membres de la Chambre des Conseillers.

    Une séance annuelle est réservée par le Parlement à la discussion et à l’évaluation des politiques publiques.

    Article 102

    Les commissions concernées dans chacune des deux Chambres peuvent demander à auditionner les responsables des administrations et des établissements et entreprises publics, en présence et sous la responsabilité des ministres concernés.

    Article 103

    Le Chef du Gouvernement peut engager la responsabilité du gouvernement devant la Chambre des Représentants, sur une déclaration de politique générale ou sur le vote d’un texte.

    La confiance ne peut être refusée ou le texte rejeté qu’à la majorité absolue des membres composant la Chambre des Représentants.

    Le vote ne peut intervenir que trois jours francs après que la question de confiance ait été posée.

    Le refus de confiance entraîne la démission collective du gouvernement.

    Article 104

    Le Chef du Gouvernement peut dissoudre la Chambre des Représentants, par décret pris en Conseil des ministres, après avoir consulté le Roi, le président de cette Chambre et le Président de la Cour Constitutionnelle.

    Le Chef du gouvernement présente, devant la Chambre des Représentants, une déclaration portant notamment sur les motifs et les buts de la décision de dissolution.

    Article 105

    La Chambre des Représentants peut mettre en cause la responsabilité du gouvernement par le vote d’une motion de censure. Celle-ci n’est recevable que si elle est signée par le cinquième au moins des membres composant la Chambre. La motion de censure n’est approuvée par la Chambre des Représentants que par un vote pris à la majorité absolue des membres qui la composent.

    Le vote ne peut intervenir que trois jours francs après le dépôt de la motion. Le vote de censure entraîne la démission collective du gouvernement.

    Lorsque le gouvernement est censuré par la Chambre des Représentants, aucune motion de censure de cette Chambre n’est recevable pendant un délai d’un an.

    Article 106

    La Chambre des Conseillers peut interpeller le gouvernement par le moyen d’une motion signée par le cinquième au moins de ses membres. Elle ne peut être votée que trois jours francs après son dépôt et à la majorité absolue des membres de cette Chambre.

    Le texte de la motion d’interpellation est immédiatement adressé par le Président de la Chambre des Conseillers au Chef du Gouvernement qui dispose d’un délai de six jours pour présenter devant cette Chambre la réponse du gouvernement. Celle-ci est suivie d’un débat sans vote.

    TITRE VII. DU POUVOIR JUDICIAIRE

    De l’indépendance de la justice

    Article 107

    Le pouvoir judiciaire est indépendant du pouvoir législatif et du pouvoir exécutif.

    Le Roi est le garant de l’indépendance du pouvoir judiciaire.

    Article 108

    Les magistrats du siège sont inamovibles.

    Article 109

    Est proscrite toute intervention dans les affaires soumises à la justice. Dans sa fonction judiciaire, le juge ne saurait recevoir d’injonction ou instruction, ni être soumis à une quelconque pression.

    Chaque fois qu’il estime que son indépendance est menacée, le juge doit en saisir le Conseil supérieur du pouvoir judiciaire.

    Tout manquement de la part du juge à ses devoirs d’indépendance et d’impartialité, constitue une faute professionnelle grave, sans préjudice des poursuites judiciaires éventuelles.

    La loi sanctionne toute personne qui tente d’influencer le juge de manière illicite.

    Article 110

    Les magistrats du siège ne sont astreints qu’à la seule application de la loi. Les décisions de justice sont rendues sur le seul fondement de l’application impartiale de la loi.

    Les magistrats du parquet sont tenus à l’application de la loi et doivent se conformer aux instructions écrites, conformes à la loi, émanant de l’autorité hiérarchique.

    Article 111

    Les magistrats jouissent de la liberté d’expression, en compatibilité avec leur devoir de réserve et l’éthique judiciaire.

    Ils peuvent adhérer à des associations ou créer des associations professionnelles, dans le respect des devoirs d’impartialité et d’indépendance de la justice et dans les conditions prévues par la loi.

    Ils ne peuvent adhérer à des partis politiques ou à des organisations syndicales.

    Article 112

    Le statut des magistrats est fixé par une loi organique.

    Du Conseil supérieur du pouvoir judiciaire

    Article 113

    Le Conseil supérieur du pouvoir judiciaire veille à l’application des garanties accordées aux magistrats, notamment quant à leur indépendance, leur nomination, leur avancement, leur mise à la retraite et leur discipline.

    A son initiative, il élabore des rapports sur l’état de la justice et du système judiciaire, et présente des recommandations appropriées en la matière.

    A la demande du Roi, du gouvernement ou du Parlement, le Conseil émet des avis circonstanciés sur toute question se rapportant à la justice, sous réserve du principe de la séparation des pouvoirs.

    Article 114

    Les décisions individuelles du Conseil supérieur du pouvoir judiciaire sont susceptibles de recours pour excès de pouvoir devant la plus haute juridiction administrative du Royaume.

    Article 115

    Le Conseil supérieur du pouvoir judiciaire est présidé par le Roi. Il se compose :

    – du Premier-président de la Cour de Cassation en qualité de Président-délégué ;

    – du Procureur général du Roi près la Cour de Cassation ;

    – du Président de la Première Chambre de la Cour de Cassation ;

    – de 4 représentants élus, parmi eux, par les magistrats des cours d’appel ;

    – de 6 représentants élus, parmi eux, par les magistrats des juridictions du premier degré ;

    une représentation des magistrates doit être assurée, parmi les dix membres élus, dans la proportion de leur présence dans le corps de la magistrature ;

    – du Médiateur ;

    – du Président du Conseil national des droits de l’Homme ;

    – de 5 personnalités nommées par le Roi, reconnues pour leur compétence, leur impartialité et leur probité, ainsi que pour leur apport distingué en faveur de l’indépendance de la justice et de la primauté du droit, dont un membre est proposé par le Secrétaire général du Conseil supérieur des Ouléma.

    Article 116

    Le Conseil supérieur du pouvoir judiciaire tient au moins deux sessions par an.

    Il dispose de l’autonomie administrative et financière.

    En matière disciplinaire, le Conseil supérieur du pouvoir judiciaire est assisté par des magistrats-inspecteurs expérimentés.

    L’élection, l’organisation et le fonctionnement du Conseil supérieur du pouvoir judiciaire, ainsi que les critères relatifs à la gestion de la carrière des magistrats et les règles de la procédure disciplinaire sont fixés par une loi organique.

    Dans les affaires concernant les magistrats du parquet, le Conseil supérieur du pouvoir judiciaire prend en considération les rapports d’évaluation établis par l’autorité hiérarchique dont ils relèvent.

    Des droits des justiciables et des règles de fonctionnement de la justice

    Article 117

    Le juge est en charge de la protection des droits et libertés et de la sécurité judiciaire des personnes et des groupes, ainsi que de l’application de la loi.

    Article 118

    L’accès à la justice est garanti à toute personne pour la défense de ses droits et de ses intérêts protégés par la loi.

    Tout acte de nature réglementaire ou individuelle, pris en matière administrative, peut faire l’objet de recours devant la juridiction administrative compétente.

    Article 119

    Tout prévenu ou accusé est présumé innocent jusqu’à sa condamnation par décision de justice ayant acquis la force de la chose jugée.

    Article 120

    Toute personne a droit à un procès équitable et à un jugement rendu dans un délai raisonnable.

    Les droits de la défense sont garantis devant toutes les juridictions.

    Article 121

    Dans les cas où la loi le prévoit, la justice est gratuite pour ceux qui ne disposent pas de ressources suffisantes pour ester en justice.

    Article 122

    Les dommages causés par une erreur judiciaire ouvrent droit à une réparation à la charge de l’Etat.

    Article 123

    Les audiences sont publiques, sauf lorsque la loi en dispose autrement.

    Article   124

    Les jugements sont rendus et exécutés au nom du Roi et en vertu de la loi.

    Article   125

    Tout jugement est motivé et prononcé en audience publique dans les conditions prévues par la loi.

    Article 126

    Les jugements définitifs s’imposent à tous.

    Les autorités publiques doivent apporter l’assistance nécessaire lorsque celle-ci est requise pendant le procès. Elles sont également tenues de prêter leur assistance à l’exécution des jugements.

    Article 127

    Les juridictions ordinaires ou spécialisées sont créées par la loi.

    Il ne peut être créé de juridiction d’exception.

    Article 128

    La police judiciaire agit sous l’autorité du ministère public et des juges d’instruction pour tout ce qui concerne les enquêtes et les investigations nécessaires à la recherche des infractions, à l’arrestation des délinquants et à l’établissement de la vérité.

    TITRE VIII. DE LA COUR CONSTITUTIONNELLE

    Article 129

    Il est institué une Cour Constitutionnelle.

    Article 130

    La Cour Constitutionnelle est composée de douze membres nommés pour un mandat de neuf ans non renouvelable. Six membres sont désignés par le Roi, dont un membre proposé par le Secrétaire général du Conseil supérieur des Ouléma, et six membres sont élus, moitié par la Chambre des Représentants, moitié par la Chambre des Conseillers parmi les candidats présentés par le Bureau de chaque Chambre, à l’issue d’un vote à bulletin secret et à la majorité des deux tiers des membres composant chaque Chambre.

    Si les deux Chambres du Parlement ou l’une d’elles n’élisent pas les membres précités dans le délai légal requis pour le renouvellement, la Cour exerce ses attributions et rend ses décisions sur la base d’un quorum ne tenant pas compte des membres non encore élus. Chaque catégorie de membres est renouvelable par tiers tous les trois ans.

    Le Président de la Cour Constitutionnelle est nommé par le Roi, parmi les membres composant la Cour.

    Les membres de la Cour Constitutionnelle sont choisis parmi les personnalités disposant d’une haute formation dans le domaine juridique et d’une compétence judiciaire, doctrinale ou administrative, ayant exercé leur profession depuis plus de quinze ans, et reconnues pour leur impartialité et leur probité.

    Article  131

    Une loi organique détermine les règles d’organisation et de fonctionnement de la Cour Constitutionnelle, ainsi que la procédure qui est suivie devant elle et la situation de ses membres.

    Elle détermine également les fonctions incompatibles, dont notamment celles relatives aux professions libérales, fixe les conditions des deux premiers renouvellements triennaux et les modalités de remplacement des membres empêchés, démissionnaires, ou décédés en cours de mandat.

    Article 132

    La Cour Constitutionnelle exerce les attributions qui lui sont dévolues par les articles de la Constitution et les dispositions des lois organiques. Elle statue, par ailleurs, sur la régularité de l’élection des membres du Parlement et des opérations de référendum.

    Les lois organiques avant leur promulgation et les règlements de la Chambre des Représentants et de la Chambre des Conseillers, avant leur mise en application, doivent être soumis à la Cour Constitutionnelle qui se prononce sur leur conformité à la Constitution.

    Aux mêmes fins, les lois, avant leur promulgation, peuvent être déférées à la Cour Constitutionnelle par le Roi, le Chef du Gouvernement, le Président de la Chambre des Représentants, le Président de la Chambre des Conseillers, ou par le cinquième des membres de la Chambre des Représentants ou par quarante membres de la Chambre des Conseillers.

    Dans les cas prévus aux deuxième et troisième alinéas du présent article, la Cour Constitutionnelle statue dans un délai d’un mois à compter de sa saisine. Toutefois, à la demande du gouvernement, s’il y a urgence, ce délai est ramené à huit jours.

    Dans ces mêmes cas, la saisine de la Cour Constitutionnelle suspend le délai de promulgation.

    Elle statue sur la régularité de l’élection des membres du Parlement dans un délai d’un an, à compter de la date d’expiration du délai légal du recours. Toutefois, la Cour peut statuer au-delà de ce délai, par décision motivée, dans le cas où le nombre de recours ou leur nature l’exige.

    Article 133

    La Cour Constitutionnelle est compétente pour connaître d’une exception d’inconstitutionnalité soulevée au cours d’un procès, lorsqu’il est soutenu par l’une des parties que la loi dont dépend l’issue du litige, porte atteinte aux droits et libertés garantis par la Constitution.

    Une loi organique fixe les conditions et modalités d’application du présent article.

    Article 134

    Une disposition déclarée inconstitutionnelle sur le fondement de l’article 132 de la présente Constitution ne peut être promulguée ni mise en application. Une disposition déclarée inconstitutionnelle sur le fondement de l’article 133 est abrogée à compter de la date fixée par la Cour Constitutionnelle dans sa décision.

    Les décisions de la Cour Constitutionnelle ne sont susceptibles d’aucun recours. Elles s’imposent aux pouvoirs publics et à toutes les autorités administratives et juridictionnelles.

    TITRE IX. DES REGIONS ET DES AUTRES COLLECTIVITES TERRITORIALES

    Article 135

    Les collectivités territoriales du Royaume sont les régions, les préfectures, les provinces et les communes.

    Elles constituent des personnes morales de droit public, qui gèrent démocratiquement leurs affaires.

    Les Conseils des régions et des communes sont élus au suffrage universel direct. Toute autre collectivité territoriale est créée par la loi, le cas échéant, en substitution d’une ou plusieurs collectivités mentionnées à l’alinéa premier ci-dessus.

    Article 136

    L’organisation régionale et territoriale repose sur les principes de libre administration, de coopération et de solidarité. Elle assure la participation des populations concernées à la gestion de leurs affaires et favorise leur contribution au développement humain intégré et durable.

    Article 137

    Les régions et les autres collectivités territoriales participent à la mise en œuvre de la politique générale de l’Etat et à l’élaboration des politiques territoriales à travers leurs représentants à la Chambre des Conseillers.

    Article 138

    Les présidents des Conseils des régions et les présidents des autres collectivités territoriales exécutent les délibérations et décisions de ces Conseils.

    Article 139

    Des mécanismes participatifs de dialogue et de concertation sont mis en place par les Conseils régionaux et les Conseils des autres collectivités territoriales pour favoriser l’implication des citoyennes et des citoyens, et des associations dans l’élaboration et le suivi des programmes de développement.

    Les citoyennes et les citoyens et les associations peuvent exercer le droit de pétition en vue de demander l’inscription à l’ordre du jour du Conseil d’une question relevant de sa compétence.

    Article 140

    Sur la base du principe de subsidiarité, les collectivités territoriales ont des compétences propres, des compétences partagées avec l’Etat et celles qui leur sont transférables par ce dernier.

    Les régions et les autres collectivités territoriales disposent, dans leurs domaines de compétence respectifs et dans leur ressort territorial, d’un pouvoir réglementaire pour l’exercice de leurs attributions.

    Article 141

    Les régions et les autres collectivités territoriales disposent de ressources financières propres et de ressources financières affectées par l’Etat.

    Tout transfert de compétences de l’Etat vers les régions et les autres collectivités territoriales doit s’accompagner d’un transfert des ressources correspondantes.

    Article 142

    Il est créé, pour une période déterminée, au profit des régions, un Fonds de mise à niveau sociale destiné à la résorption des déficits en matière de développement humain, d’infrastructures et d’équipements.

    Il est créé, en outre, un Fonds de solidarité interrégionale visant une répartition équitable des ressources, en vue de réduire les disparités entre les régions.

    Article 143

    Aucune collectivité territoriale ne peut exercer de tutelle sur une autre.

    Dans l’élaboration et le suivi des programmes de développement régionaux et des schémas régionaux d’aménagement des territoires, la région assure, sous la supervision du président du Conseil de la région, un rôle prééminent par rapport aux autres collectivités territoriales, dans le respect des compétences propres de ces dernières.

    Lorsque le concours de plusieurs collectivités territoriales est nécessaire à la réalisation d’un projet, les collectivités concernées conviennent des modalités de leur coopération.

    Article 144

    Les collectivités territoriales peuvent constituer des groupements en vue de la mutualisation des moyens et des programmes.

    Article 145

    Dans les collectivités territoriales, les walis de régions et les gouverneurs de préfectures et de provinces représentent le pouvoir central.

    Au nom du gouvernement, ils assurent l’application des lois, mettent en œuvre les règlements et les décisions gouvernementaux et exercent le contrôle administratif. Les walis et gouverneurs assistent les présidents des collectivités territoriales et notamment les présidents des Conseils des régions dans la mise en œuvre des plans et des programmes de développement.

    Sous l’autorité des ministres concernés, ils coordonnent les activités des services déconcentrés de l’administration centrale et veillent à leur bon fonctionnement.

    Article 146

    Une loi organique fixe notamment :

    – les conditions de gestion démocratique de leurs affaires par les régions et les autres collectivités territoriales, le nombre des membres de leurs conseils, les règles relatives à l’éligibilité, aux incompatibilités et aux cas d’interdiction du cumul de mandats, ainsi que le régime électoral et les dispositions visant à assurer une meilleure représentation des femmes au sein de ces conseils ;

    – les conditions d’exécution, par les présidents des conseils des régions et les présidents des conseils des autres collectivités territoriales, des délibérations et des décisions desdits conseils, conformément aux dispositions de l’article 138 ;

    – les conditions d’exercice par les citoyennes et les citoyens et les associations du droit de pétition prévu à l’article 139 ;

    – les compétences propres, les compétences partagées avec l’Etat et celles qui sont transférées aux régions et aux autres collectivités territoriales, prévues à l’article 140;

    – le régime financier des régions et des autres collectivités territoriales ;

    – l’origine des ressources financières des régions et des autres collectivités territoriales prévues à l’article 141 ;

    – les ressources et les modalités de fonctionnement du Fonds de mise à niveau sociale et du Fonds de solidarité interrégionale prévus à l’article 142 ;

    – les conditions et les modalités de constitution des groupements visés à l’article 144; – les dispositions favorisant le développement de l’intercommunalité, ainsi que les mécanismes destinés à assurer l’adaptation de l’organisation territoriale dans ce sens;

    – les règles de gouvernance relatives au bon fonctionnement de la libre administration, au contrôle de la gestion des fonds et programmes, à l’évaluation des actions et à la reddition des comptes.

    TITRE X. DE LA COUR DES COMPTES

    Article 147

    La Cour des Comptes est l’institution supérieure de contrôle des finances publiques du Royaume. Son indépendance est garantie par la Constitution.

    La Cour des Comptes a pour mission la consolidation et la protection des principes et valeurs de bonne gouvernance, de transparence et de reddition des comptes de l’Etat et des organismes publics.

    La Cour des Comptes est chargée d’assurer le contrôle supérieur de l’exécution des lois de finances. Elle s’assure de la régularité des opérations de recettes et de dépenses des organismes soumis à son contrôle en vertu de la loi et en apprécie la gestion. Elle sanctionne, le cas échéant, les manquements aux règles qui régissent lesdites opérations.

    La Cour des Comptes contrôle et assure le suivi des déclarations du patrimoine, audite les comptes des partis politiques et vérifie la régularité des dépenses des opérations électorales.

    Article 148

    La Cour des Comptes assiste le Parlement dans les domaines de contrôle des finances publiques. Elle répond aux questions et consultations en rapport avec les fonctions de législation, de contrôle et d’évaluation, exercées par le Parlement et relatives aux finances publiques.

    La Cour des Comptes apporte son assistance aux instances judiciaires.

    La Cour des Comptes assiste le gouvernement dans les domaines relevant de sa compétence en vertu de la loi.

    Elle publie l’ensemble de ses travaux y compris les rapports particuliers et les décisions juridictionnelles.

    Elle soumet au Roi un rapport annuel sur l’ensemble de ses activités, qu’elle transmet également au Chef du Gouvernement et aux Présidents des deux Chambres du Parlement. Ce rapport est publié au «Bulletin officiel» du Royaume.

    Un exposé des activités de la Cour est présenté par son Premier président devant le Parlement. Il est suivi d’un débat.

    Article 149

    Les Cours régionales des comptes sont chargées d’assurer le contrôle des comptes et de la gestion des régions et des autres collectivités territoriales et de leurs groupements.

    Elles sanctionnent, le cas échéant, les manquements aux règles qui régissent lesdites opérations.

    Article 150

    Les attributions, les règles d’organisation et les modalités de fonctionnement de la Cour des Comptes et des cours régionales des comptes sont fixées par la loi.

    TITRE XI. DU CONSEIL ECONOMIQUE, SOCIAL ET ENVIRONNEMENTAL

    Article 151

    Il est institué un Conseil économique, social et environnemental.

    Article 152

    Le Conseil économique, social et environnemental peut être consulté par le gouvernement, par la Chambre des Représentants et par la Chambre des Conseillers sur toutes les questions à caractère économique, social ou environnemental.

    Il donne son avis sur les orientations générales de l’économie nationale et du développement durable.

    Article 153

    La composition, l’organisation, les attributions et les modalités de fonctionnement du Conseil économique, social et environnemental sont fixées par une loi organique.

    TITRE XII. DE LA BONNE GOUVERNANCE

    Principes généraux

    Article   154

    Les services publics sont organisés sur la base de l’égal accès des citoyennes et des citoyens, de la couverture équitable du territoire national et de la continuité des prestations rendues.

    Ils sont soumis aux normes de qualité, de transparence, de reddition des comptes et de responsabilité, et sont régis par les principes et valeurs démocratiques consacrés par la Constitution.

    Article 155

    Les agents des services publics exercent leurs fonctions selon les principes de respect de la loi, de neutralité, de transparence, de probité et d’intérêt général.

    Article 156

    Les services publics sont à l’écoute de leurs usagers et assurent le suivi de leurs observations, propositions et doléances.

    Ils rendent compte de la gestion des deniers publics conformément à la législation en vigueur et sont soumis, à cet égard, aux obligations de contrôle et d’évaluation.

    Article 157

    Une charte des services publics fixe l’ensemble des règles de bonne gouvernance relatives au fonctionnement des administrations publiques, des régions et des autres collectivités territoriales et des organismes publics.

    Article 158

    – Toute personne, élue ou désignée, assumant une charge publique doit faire, conformément aux modalités fixées par la loi, une déclaration écrite des biens et actifs détenus par elle, directement ou indirectement, dès la prise de fonctions, en cours d’activité et à la cessation de celle-ci.

    Article 159

    Les instances en charge de la bonne gouvernance sont indépendantes. Elles bénéficient de l’appui des organes de l’Etat. La loi pourra, si nécessaire, créer d’autres instances de régulation et de bonne gouvernance, en plus de celles visées ci-dessous.

    Article 160

    Toutes les institutions et instances visées aux articles 161 à 170 de la présente Constitution doivent présenter un rapport sur leurs activités, au moins une fois par an. Ces rapports font l’objet d’un débat au Parlement.

    – Les institutions et instances de protection des droits et libertés, de la bonne gouvernance, du développement humain et durable et de la démocratie participative ;

    – Les instances de protection et de promotion des droits de l’Homme.

    Article 161

    Le Conseil national des droits de l’Homme est une institution nationale pluraliste et indépendante, chargée de connaître de toutes les questions relatives à la défense et à la protection des droits de l’Homme et des libertés, à la garantie de leur plein exercice et à leur promotion, ainsi qu’à la préservation de la dignité, des droits et des libertés individuelles et collectives des citoyennes et citoyens, et ce, dans le strict respect des référentiels nationaux et universels en la matière.

    Article 162

    Le Médiateur est une institution nationale indépendante et spécialisée qui a pour mission, dans le cadre des rapports entre l’administration et les usagers, de défendre les droits, de contribuer à renforcer la primauté de la loi et à diffuser les principes de justice et d’équité, et les valeurs de moralisation et de transparence dans la gestion des administrations, des établissements publics, des collectivités territoriales et des organismes dotés de prérogatives de la puissance publique.

    Article 163

    Le Conseil de la communauté marocaine à l’étranger est chargé notamment d’émettre des avis sur les orientations des politiques publiques permettant d’assurer aux Marocains résidant à l’étranger le maintien de liens étroits avec leur identité marocaine, de garantir leurs droits, de préserver leurs intérêts, et de contribuer au développement humain et durable de leur Patrie, le Maroc, et à son progrès.

    Article 164

    L’autorité chargée de la parité et de la lutte contre toutes formes de discrimination, créée en vertu de l’article 19 de la présente Constitution, veille notamment au respect des droits et libertés prévues audit article, sous réserve des attributions dévolues au Conseil national des droits de l’Homme.

    Les instances de bonne gouvernance et de régulation

    Article 165

    La Haute autorité de la communication audiovisuelle est chargée de veiller au respect de l’expression pluraliste des courants d’opinion et de pensée et du droit à l’information, dans le domaine de l’audiovisuel et ce, dans le respect des valeurs civilisationnelles fondamentales et des lois du Royaume.

    Article 166

    Le Conseil de la concurrence est une institution indépendante chargée, dans le cadre de l’organisation d’une concurrence libre et loyale, d’assurer la transparence et l’équité dans les relations économiques, notamment à travers l´analyse et la régulation de la concurrence sur les marchés, le contrôle des pratiques anticoncurrentielles, des pratiques commerciales déloyales et des opérations de concentration économique et de monopole.

    Article 167

    L’Instance nationale de la probité, de la prévention et de la lutte contre la corruption, créée en vertu de l’article 36, a pour mission notamment d’initier, de coordonner, de superviser et d’assurer le suivi de la mise en œuvre des politiques de prévention et de lutte contre la corruption, de recueillir et de diffuser les informations dans ce domaine, de contribuer à la moralisation de la vie publique et de consolider les principes de bonne gouvernance, la culture du service public et les valeurs de citoyenneté responsable.

    Instances de promotion du développement humain et durable et de la démocratie participative

    Article 168

    Il est créé un Conseil supérieur de l’éducation, de la formation et de la recherche scientifique.

    Ce Conseil constitue une instance consultative chargée d’émettre son avis sur toutes les politiques publiques et sur toutes les questions d’intérêt national concernant l’éducation, la formation et la recherche scientifique, ainsi que sur les objectifs et le fonctionnement des services publics chargés de ces domaines. Il contribue également à l’évaluation des politiques et programmes publics menés dans ces domaines.

    Article 169

    Le Conseil consultatif de la famille et de l’enfance, créé en vertu de l’article 32 de la présente Constitution, a pour missions d’assurer le suivi de la situation de la famille et de l’enfance, d’émettre son avis sur les plans nationaux relatifs à ces domaines, d’animer le débat public sur la politique familiale et d’assurer le suivi de la réalisation des programmes nationaux, initiés par les différents départements, structures et organismes compétents.

    Article 170

    Le Conseil consultatif de la jeunesse et de l’action associative, créé en vertu de l’article 33 de la présente Constitution, est une instance consultative dans les domaines de la protection de la jeunesse et de la promotion de la vie associative. Il est chargé d’étudier et de suivre les questions intéressant ces domaines et de formuler des propositions sur tout sujet d’ordre économique, social et culturel intéressant directement les jeunes et l’action  associative, ainsi que le développement des énergies créatives des jeunes, et leur incitation à la participation à la vie nationale, dans un esprit de citoyenneté responsable.

    Article 171

    Des lois fixeront la composition, l’organisation, les attributions et les règles de fonctionnement des institutions et instances prévues aux articles 161 à 170 de la présente Constitution et, le cas échéant, les cas d’incompatibilités.

    TITRE XIII. DE LA REVISION DE LA CONSTITUTION

    Article 172

    L’initiative de la révision de la Constitution appartient au Roi, au Chef du Gouvernement, à la Chambre des Représentants et à la Chambre des Conseillers.

    Le Roi peut soumettre directement au référendum le projet de révision dont Il prend l’initiative.

    Article 173

    La proposition de révision émanant d’un ou de plusieurs membres d’une des deux Chambres du Parlement ne peut être adoptée que par un vote à la majorité des deux tiers des membres la composant.

    Cette proposition est soumise à l’autre Chambre qui l’adopte à la même majorité des deux tiers des membres la composant.

    La proposition de révision émanant du Chef du Gouvernement est soumise au Conseil des ministres, après délibération en Conseil du gouvernement.

    Article 174

    Les projets et propositions de révision de la Constitution sont soumis par dahir au référendum.

    La révision de la Constitution est définitive après avoir été adoptée par voie de référendum.

    Le Roi peut, après avoir consulté le Président de la Cour constitutionnelle, soumettre par dahir au Parlement un projet de révision de certaines dispositions de la Constitution.

    Le Parlement, convoqué par le Roi en Chambres réunies, l’approuve à la majorité des deux tiers des membres du Parlement.

    Le Règlement intérieur de la Chambre des Représentants fixe les modalités d’application de cette disposition.

    La Cour Constitutionnelle contrôle la régularité de la procédure de cette révision et en proclame les résultats.

    Article 175

    Aucune révision ne peut porter sur les dispositions relatives à la religion musulmane, sur la forme monarchique de l’Etat, sur le choix démocratique de la Nation ou sur les acquis en matière de libertés et de droits fondamentaux inscrits dans la présente Constitution.

    TITRE XIV. DISPOSITIONS TRANSITOIRES ET FINALES

    Article 176

    Jusqu’à l’élection des Chambres du Parlement prévues par la présente Constitution, les Chambres actuellement en fonction continueront d’exercer leurs attributions, notamment pour voter les lois nécessaires à la mise en place des nouvelles Chambres du Parlement, sans préjudice de l’application de l’article 51 de la présente Constitution.

    Article 177

    Le Conseil Constitutionnel en fonction continuera d’exercer ses attributions en attendant l’installation de la Cour Constitutionnelle prévue par la présente Constitution.

    Article 178

    Le Conseil supérieur de la magistrature, actuellement en fonction, continuera d’exercer ses attributions jusqu’à l’installation du Conseil supérieur du pouvoir judiciaire prévu par la présente Constitution.

    Article 179

    Les textes en vigueur relatifs aux institutions et instances citées au Titre XII, ainsi que ceux portant sur le Conseil économique et social et le Conseil supérieur de l’Enseignement, demeurent en vigueur jusqu’à leur remplacement, conformément aux dispositions de la présente Constitution.

    Article 180

    Sous réserve des dispositions transitoires prévues dans le présent Titre, est abrogé le texte de la Constitution révisée, promulgué par le dahir n° 1-96-157 du 23 joumada I 1417 (7 octobre 1996).

    29Abr/21

    Law nº 13 of 1995. Telecommunications Law and it is amendments

    Law nº 13 of 1995. Telecommunications Law and it is amendments. (Official Gazette, nº 4072, dated 01.10.1995).(Amended by virtue of the Amending Law of the Telecommunications Law nº 6 of 2000, (Official Gazette, nº 4416, dated 01.03.2000) (Amended by virtue of the Amending Law nº 21 of 2011). 

    Article 1

    This law is called “Telecommunications Law of 1995” and shall be put in effect as of the date it is issued in the Official Gazette.

    CHAPTER I. DEFINITIONS

    Article 2

    Wherever the following words and phrases appear in this Law, they shall have the meanings assigned to them hereunder unless the context indicates otherwise:

    Ministry:

    Ministry of Information and Communications Technology (MoICT).

    Minister:

    Minister of Information and Communications Technology.

    Commission:

    Telecommunications Regulatory Commission (TRC) established pursuant to the provisions of this Law.

    Board:

    Board of Commissioners of the Commission.

    Chairperson:

    Chairperson of the Board.

    Telecommunications:

    Any conveyance, emission, reception. or transmission of signs, signals, sounds, images or data of any nature by means of wire, radio, photic or any other means of electronic systems.

    Telecommunications Service:

    A service which consists, wholly or partly, of the transmission, reception or routing of information on Telecommunications networks by means of any Telecommunications process.

    Public Telecommunications Service:

    A Telecommunications service provided for compensation to the Beneficiaries in general or a certain category thereof in accordance with this Law.

    Information Technology:

    Generation, manipulation and storage of information using electronic means.

    Radio Waves:

    Electromagnetic waves of frequencies lower than 3,000 gigahertz, propagated in space without artificial guides.

    Public Telecommunications Network:

    A Telecommunications system or a group of Telecommunications systems for the offering of Public Telecommunications Services to Beneficiaries in accordance with the provisions of this Law.

    Private Telecommunications Network:

    The Telecommunications system operated for the benefit of a single person or a single group of persons under common ownership to serve their own needs.

    Telecommunications Terminal Equipment:

    Telecommunications equipment employed by a Beneficiary to transmit, receive, route or terminate Telecommunications.

    Beneficiary:

    A person who benefits from Public Telecommunications Services using Telecommunications means.

    License:

    The authorization granted by the Commission or a contract or agreement signed by the Commission and a person to allow that person to establish, operate and manage a Public Telecommunications Network, or provide Public Telecommunications Services, or use Radio Frequencies pursuant to the provisions of this Law and the by-laws issued pursuant to it.

    Licensee:

    A person who has acquired a License in accordance with the provisions of this Law.

    Type Approval:

    Approval to use or import certain types of Telecommunications equipment and Telecommunications Terminal Equipment.

    National Table of Frequency Allocations:

    The table containing the division of the frequency spectrum into bands in such a way as to permit the use of such bands to provide different types of Telecommunication Services in line with the International Telecommunication Union’s Table of Frequency Allocations.

    National Plan for Frequency Allocations:

    The plan that includes the technical standards established by the Commission for the use of frequency bands that exist in the National Table of Frequency Allocations, taking into consideration the requirements of national security in their use.

    Frequency Band Allocation:

    The entry in the National Table of Frequency Allocations of frequency bands for the purpose of their use in one or more space or terrestrial radio communications services or radio astronomy services under stipulated conditions.

    Assignment:

    The authorization given by the Commission for a Radio Station to use Radio Frequencies or a specific radio channel under conditions set by the Commission for this purpose.

    National Register of Frequency Assignments

    The special register containing all the information related to the channels and frequencies which are assigned to civilian Radio Stations and others.

    Radio Station:

    One or more transmitters or receivers or a combination thereof, including the supplemental equipment existing at a specific location, for the purpose of providing a radio communications, radio astronomy, or broadcasting service.

    Radio Frequencies / Radio Frequency Spectrum:

    Frequencies or spectrum of naturally propagated electromagnetic spectrum waves in the range of 3 (kilohertz) to 3,000 (gigahertz) which are utilized for the emission and reception of Telecommunications signals.

    Radio Communication:

    The transmission by radio of writings, signs, signals, images, or sounds of all kinds, including all instrumentalities, facilities, apparatuses, and transmission associated services such as the transmission, reception, or conveyance of communications.

    Broadcasting Emission:

    The emission of Radio Communications to be received by the public, directly or through the intermediary of satellite or terrestrial relay stations.

    Directory:

    Information related to subscribers to Public Telecommunications Networks services.

    Universality of Service:

    The provision of a minimum set of telecommunications and information technology services in areas and communities, and the facilitation of the provision and use of such services in accordance with the terms and conditions specified and modified as needed by the Commission.

    CHAPTER II. TASKS OF THE MINISTRY

    Article 3

    The Ministry shall undertake the following duties:

     a. To prepare the general policy of the telecommunications and information technology sectors in the Kingdom, coordinate with stakeholders in these sectors as circumstances require, submit such policy to the Council of Ministers for approval, and to set a biennial national strategic plan in accordance with this policy.

     b. To propose the policy related to the Universality of Services and submit the same to the Council of Ministers for approval, follow up the development of this policy for the purpose of expanding the scope of coverage of telecommunications and information technology services, both horizontally and vertically, in such a way as to meet the requirements of universal economic and social development in the Kingdom.

    c. To draw up plans that encourage investment, on a competitive basis, in the telecommunications and information technology sectors in the Kingdom, creating a proper atmosphere for the provision of services to Beneficiaries at just and reasonable prices, in accordance with the technological developments in these sectors.

     d. To strengthen the competitive position of the Kingdom internationally in the areas of telecommunications and information technology.

    e. To follow up the implementation of the Kingdom’s commitments in international treaties in the telecommunications and information technology sectors.

    f. To foster the Kingdom’s interests with states, regional and international organizations, unions, and commissions concerned with telecommunications and information technology; and to oversee the representation of the Kingdom in those forums in cooperation with the Commission, the ministries, and concerned parties.

    g. To promote the advancement of research and development in the areas of telecommunications and information technology.

    h. To encourage the setting of advanced education and training programs in telecommunications and information technology, including the use of the Internet, electronic commerce, and electronic transactions.

    i. To spread public awareness of the importance of the role of telecommunications and information technology to the economic and social development and advancement in the Kingdom.

    j. To provide the necessary facilities to allow the Commission and designated members of the armed forces and security departments to prepare the National Plan for Frequency Allocation and the National Register of Frequency Assignments, maintain these in the Ministry and prepare procedures for the coordination among these parties so as to ensure the optimal use of the of Radio Frequency Spectrum and to prevent harmful interference between frequencies assigned for civilian and military uses.

     k. To prepare draft laws in the areas of telecommunications and information technology in coordination with the Commission and present them to the Council of Ministers.

    l. To collect information that is available at the Commission and other government departments or private entities for the purpose of accomplishing the Ministry’s duties.

    m. To work towards the elimination of impediments in the telecommunications and information technology sectors through coordination and cooperation with the Commission and other parties in such a way to assist the Ministry in performing its duties and responsibilities.

    CHAPTER III. THE TELECOMMUNICATIONS REGULATORY COMMISSION

    Article 4

    a. A Commission called the “Telecommunications Regulatory Commission” answerable to the Minister shall be established in the Kingdom. It shall be a financially and administratively independent juridical personality, and, in such capacity, shall be entitled to own and dispose of movable and immovable property necessary to achieve its objectives, enter into contracts with third parties, and take all legal actions, including the right to litigate, and appoint the civil public prosecutor or any other attorney as its representative in judicial proceedings.

    b. The Commission shall enjoy all exemptions and facilities enjoyed by ministries, governmental entities, and official public sector organizations

    Article 5

    The Commission shall have its headquarters in Amman, and shall be entitled to set up offices anywhere in the Kingdom.

    Article 6

    The Commission shall undertake the following duties and responsibilities:

    a. To regulate telecommunications and information technology services in the Kingdom in accordance with the established general policy so as to ensure the provision of high quality telecommunications and information technology services to Beneficiaries at reasonable prices; and, by so doing, to make possible the optimal performance of the telecommunications and information technology sectors.

    b. To establish the basis for regulation of the telecommunications and information technology sectors, in accordance with the established general policy, in such a way that services meet the needs of the comprehensive development in the Kingdom in accordance with instructions issued by the Board for this purpose.

    c. To specify the minimum level of service quality which must be committed by licensees to meet the needs of Beneficiaries. This shall be done in consultation with licensees and shall be without the imposition of any specific technological solutions on them.

     d. To protect the interests of Beneficiaries and monitor the actions of persons and licensed parties to ensure that the conditions of Licenses are observed, including specified service standards, service quality, and prices; and to take the necessary legal actions in front of those who violate these conditions.

     e. To stimulate competition in the telecommunications and information technology sectors, relying on market forces, and so regulating them as to ensure the effective provision of telecommunications and information technology services and to ensure that its regulation is sufficient and effective to forbid or curtail illegal competitive practices or prevent any person with a dominant position in the market from abusing his position, and to take all necessary actions in this regard.

    f. To participate in the representation of the Kingdom in meetings, conferences, negotiations, and symposiums , and other international forums having to do with telecommunications and information technology.

     g. To encourage self-regulation by the telecommunications and information technology sectors.

     h. To establish and adopt the conditions and criteria for the granting of licenses for Telecommunications networks and services and for the use of Radio Frequencies.

    i. To manage the Radio Frequency Spectrum and to regulate the use of all terrestrial, maritime, aeronautical and space frequencies, including:

    1) Preparing and maintaining the National Table of Frequency Allocations.

    2) Preparing the National Plan for Frequency Allocations and the National Register of Frequency Assignments, in collaboration with the concerned parties in the military and Security entities.

    3) Maintaining the civilian portion of the National Plan for Frequency Allocations and the National Register of Frequency Assignments, and publishing them to the public.

     j. To regulate access to telecommunications networks and conditions of interconnection therewith in accordance with instructions issued by the Commission for this purpose, approve the interconnection agreements referred to in Paragraph (e) of Article 29 of this Law, and ensure that these agreements do not violate those instructions.

    k. To establish technical rules and standards for the connection of wire line or Wireless equipment, including Telecommunications Terminal Equipment with the Public Telecommunications Networks, and to set the regulation procedures for importing such equipment into the Kingdom, taking into consideration the bases prescribed in the effective Standards and Metrology Law.

    l. To grant Type Approvals and to regulate the import and usage of Telecommunications Terminal Equipment required for individual and private uses, or for use in specific zones, and to monitor such usage.

    m. To gather information related to the telecommunications and information technology sectors in order to prepare and publish reports, pamphlets, and guidelines for Beneficiaries, as well as to prepare media programs required to increase the public awareness of the importance of these sectors and the extent of their positive impact on the economic and social development in the Kingdom.

    n. To issue an annual report describing the Commission’s activities and achievements, technology developments, any variables in the established general policy relating to telecommunications services, and the future plans of the Commission, and to publish this report.

     o. To reassess the need for the adjustment of the level of regulation of any Telecommunication Services, or a specific type or a group thereof, taking into consideration competition factors and any other reasons, and to refer the same to the Board for approval.

    p. To propose draft laws dealing with the telecommunications and information technology sectors, refer them to the Ministry, and prepare the by-laws and establish the instructions related thereto.

    q. Any other tasks entrusted to it pursuant to the legislations in force.

    Article 7

    The Commission shall consist of:

    1) The Board of Commissioners.

    2) The Executive Body.

    Article 8

    a. The Commission shall be administered and supervised by a Board, known as the (Board of Commissioners), which shall be composed of five full-time members appointed by a resolution of the Council of Ministers, upon nomination by the Prime Minister based on the recommendation of the Minister, provided that there be amongst them distinguished experience in the field of Telecommunications. The Chairperson and Deputy Chairperson shall be named in this resolution.

    b. The term of the membership of the Board shall be four years, renewable for a similar term, with the exception that in the first Board formed in accordance with this article, two of the members shall have terms of two years. No membership shall be terminated before the expiry of the term for any reason except in accordance with the provisions of this Law.

    c. The Chairperson and the members of the Board, before the exercise of their duties, shall make the following oath before the Prime Minister:

     “I swear by Almighty God that I will be loyal to the King and country, that I Will respect the prevailing laws and by-laws , and that I will perform the duties and responsibilities with which I am charged with honour, honesty, and devotion.”

    d. The Minister, with the approval of the Prime Minister, may select two persons to represent specific, related governmental entities to participate in meetings of the Board, but without having the right to vote.

    e. The tasks and authorities of each commissioner will be specified in regard to supervision of departments of the executive body of the Commission, in accordance with instructions established by the Board for this purpose.

    f. 1) Until the Board of Commissioners described in Paragraph (a) of this Article is appointed, the existing Board of Directors will continue to exercise its authorities in accordance with Article (12) of this Law, as well as any other powers stipulated in its provisions.

     2) In addition, the existing Director General of the Commission will exercise the  authority of the Chief Executive Officer of the Commission according to Article (16) of this Law.

    Article 9

    a.

    1) No member of the Board, their spouses or first-degree or second-degree relatives,  may have a direct or indirect interest in investments in the telecommunications and  information technology sectors throughout the term of his membership on the Board.

     2) Each member of the Board, before assuming the powers of his work, must submit a declaration in writing to the effect that there is no interest between him and the  investors in the telecommunications and information technology sectors, and must  inform the Board of any such interest that has developed or may develop during the  term of his membership on the Board. Failure to do so shall be subject to legal  liability.

    b. If any Board member violates the provisions of Paragraph (a) of this Article, he shall be  prosecuted, as the case may require, for the crime of utilizing office or committing a  breach of trust, and he shall be obliged to repay all the amounts received by him as a  result of this violation, in addition to the compensation payable by him to any party who  has suffered damage there from.

    Article 10

    a. The membership of the appointed Board member shall be terminated for any of the following reasons:

    1) Resignation.

    2) Expiry of the term of membership.

    3) If he fails to attend three consecutive sessions or six non-consecutive sessions  throughout the year without a reason acceptable to the Board.

    4) If the conditions of Paragraph (a) of Article (9) of this Law is confirmed.

    5) If he forfeits any condition of membership.

    6) If he is convicted of a crime or an offense against morals and honour.

    7) If he becomes incapable, either physically or mentally, to perform the duties  assigned to him as a member of the Board.

    b. Notwithstanding the provisions of this Law, the Council of Ministers, upon the  recommendation of the Minister, may terminate the membership of any member of the  Board.

    c. The Council of Ministers shall appoint an alternative member on the Board to complete  the term of the member whose membership has, or has been, terminated, within a  maximum period of one month therefrom.

    Article 11

    The salaries, allowances, and other financial rights of the Chairperson and members of the Board shall be specified in the decree of appointment.

    Article 12

    a. The Board shall exercise all the necessary authorities to carry out the duties entrusted to the Commission by virtue of this Law, including the following:

    1. To study plans and proposals concerning the implementation of the general policy in the telecommunications sector, as approved by the Council of Ministers.

    2. To establish programs and issue instructions and decisions, and to take the necessary actions for this purpose.

    3. To grant licenses for the following:

    – To build, operate, and manage Public Telecommunications Networks and to provide Telecommunications Services to Beneficiaries, or

     – To build, operate, and manage Public Telecommunications Networks,

    – To provide Telecommunications Services to Beneficiaries. The above does not include the grant of licenses for business operation, profession practice, performance supervision, content approval and regulation related to any information activity via the means of Broadcasting Emission Service

    The above does not include the grant of licenses for business operation, profession practice, performance supervision, content approval and regulation related to any information activity via the means of Broadcasting Emission Service.

    4. To renew, modify, or cancel any of the licenses mentioned in Paragraph (3) of this Article in accordance with this Law and by-laws issued pursuant thereto; to monitor the performance of their terms, and to announce the grant of these licenses by the means the Board deems proper.

    5. To grant the licenses for the use of the allocated and assigned Radio Frequencies.

    6. To approve the Commission’s policies, particularly those related to encouragement of competition, prevention of monopoly, and the Allocation and Assignment of Radio Frequency Spectrum and the provision of services.

    7. To establish the bases for determining rates and rents for Telecommunications Services offered to Beneficiaries by Licensees, in line with the state of competition in offering of services and service levels, and monitor the compliance of Licensees as may be necessary.

    8. To set the rates and rents of Telecommunications Services offered to beneficiaries in the case where competition is absent or weak because of the dominance.

    9. To follow up the imposition of penalties on those violating license conditions or the provisions of this Law.

    10.To prepare recommendations concerning the appropriation of land for the use of Licensees pursuant to the provisions of this Law and legislations in force.

    11.To consider complaints submitted to the Board by the Beneficiaries against Licensees, as well as complaints submitted by Licensees, and to take the necessary actions concerning them; with the exception of disputes having to do with financial obligations resulting from the implementation of valid agreements.

    12.To appoint such consultative committees as may be necessary to assist the Commission in the discharge of its duties.

    13.To adopt the technical specifications and standards for connecting Telecommunications Terminal Equipment and other equipment, either wire-line or wireless, to Public Telecommunications Networks, as well as approve the procedures for bringing such equipment into the Kingdom, and publish these specifications and standards in the Official Gazette and any other media.

    14.To adopt a national numbering plan for Public Telecommunications Services, to assign numbers for these services and their providers, on the basis of objectivity, transparency, and impartiality.

    15.To adopt a list of the technical terms used in the Telecommunications sector and the meanings assigned to them in the Kingdom, and to publish these in the Official Gazette and other media.

    16.To propose the by-laws and issue the instructions necessary to implement the universal service policy with regard to telecommunications and information technology services.

    17.To set the returns the Commission shall receive for licenses and permits.

    18.To set the returns or rents the Commission shall receive for the services it renders.

    19.To approve the Commission’s annual estimated budget and to submit it to the Minister for presentation to the Council of Ministers for approval.

    20.To approve the annual report issued by the Commission, the balance sheet, final accounts, and the assessment review report mentioned in Paragraph (o) of Article (6) of this Law; and to submit them to the Minister for presentation to the Council of Ministers.

    21.To approve the organizational structure and job descriptions of the executive body of the Commission.

    b. The Board may delegate in writing to the Chairperson or any member of the Commission  any authority granted to the Board by this Law and the by-laws issued pursuant  thereto.

    Article 13

    In the course of conducting the tasks and duties entrusted to the Board pursuant to the provisions of this Law, it may:

    a. Enter into contracts or cooperate with specialized organizations, scientific or technical Institutions in order to perform certain functions and tasks of the Commission.

    b. Entrust some of the technical tasks of the Commission to other governmental departments which have the technical and administrative capabilities necessary therefore.

    Article 14

    a) The Board shall meet at least once a month upon a call by its Chairperson or his Deputy in his absence, and the meeting shall be legally valid if attended by a majority of members, provided the Chairperson or his Deputy shall be present. The Board shall pass its resolutions by the majority of votes of Board members at least. Any dissenting member shall record his signed dissent in the minutes of the meeting.

    b) Two members of the Board may request in writing from the Chairman to call for the Board to convene in order to discuss specific matters. In this case, the Board must be called for a meeting within a maximum period of seven days from the date of receipt of the request.

    c) The Board may form one or more technical and consultative committees to offer advice to it or to the Commission, and the Board may decide to dispense rewards to the members of these committees who are not employees of the Commission.

    d) The Chairperson shall select one of the employees of the Commission as the secretary to the Board, to prepare the agenda of the Board, record the minutes of the sessions, keep records of the Board’s activities, and perform any other duties or tasks assigned to him by the Board.

    Article 15

    The Chairperson is the Chief Executive Officer of the Commission and shall represent it before all other parties and departments; the Deputy Chairperson shall exercise his duties in his absence.

    Article 16

    a) The Chairperson shall assume the following tasks and authorities:

    1. To execute the Board’s decisions.

    2. To supervise the executive body of the Commission, to follow up its financial and administrative affairs, and to coordinate the work between the Commission and any other concerned party.

    3. To propose the organizational structure of the executive body of the Commission and to make available the human and technical resources necessary for the Commission to perform its duties.

    4. To sign contracts and agreements approved by the Board.

    5. To prepare and submit the Commission’s annual supposed budget to the Board.

    6. To prepare and submit to the Board the annual report of the activities of the Commission, its balance sheet, and final accounts for the previous fiscal year.

    7. To follow up the implementation of the review report prepared by the Commission in accordance with the provisions of Paragraph (o) of Article (6) of this Law.

    8. Any other authority accorded to him by the by-laws issued pursuant to the law or delegated to him by the Board.

    b) The Chairperson may delegate any of his authorities stipulated in this Law and the bylaws issued pursuant to it to his Deputy, any member of the Board, or any employee of the Commission, provided that such delegation shall be specific and in writing.

    Article 17:

    The Commission shall have its own executive body of officers and employees, whose appointment or contracts, employment conditions, salaries, allowances, remuneration, rights, duties and all other matters shall be determined pursuant to a by-laws to be issued for this purpose.

    Article 18

    The Commission’s financial resources shall consist of the following sources:

    a. The returns of the issuance and renewals of licenses and permits.

    b. The rents and revenues charged by the Commission for the services provided by it.

    c. The proceeds of the fines imposed pursuant to the provisions of this Law.

    d. The grants received by the Commission with the approval of the Council of Ministers.

    e. The funds assigned for it in the general budget of the State.

    f. Any other resources approved by the Council of Ministers.

    Article 19

    a. The Commission shall have its independent budget, which, with its final accounts, shall  be agreed by the Board and approved by the Council of Ministers.

    b. The Commission’s fiscal year shall start on the first of the month of January and shall end  on the thirty-first of the month of December of the same year.

    c. Subject to approval by the Council of Ministers, the Board shall appoint a chartered  auditor to audit the Commission’s accounts. Such auditor shall submit his report to the Board to be submitted by it to the Council of Ministers.

    d. Surpluses realized by the Commission shall accrue to the State treasury.

    e. The Commission’s funds and rights with third parties shall be considered state-owned  funds, and shall be collected pursuant to the provisions of the State Funds Collection Law in force. For purposes of applying the provisions of this Paragraph, the Chairperson shall perform all the authorities vested in the Administrative Governor and the State Funds Collection Committee stipulated in the said Law.

    CHAPTER IV. LICENSING OF TELECOMMUNICATIONS NETWORKS

    Article 20

    The establishment, operation, and administration of Public Telecommunications Networks, as well as the provision of Public Telecommunications Services, are not permitted unless a license has been obtained in this regard in accordance with the provisions of this Law.

    Article 21

    Subject to the provisions of Article 22 of this Law, Private Telecommunications Networks may be established and operated without a license from the Commission, except for the license required for the use of Radio Frequencies.

    Article 22

    The Commission may issue instructions specifying types of private networks, including guidelines and technical conditions related to their establishment and operation. The Commission may stipulate that its prior approval should be obtained for the establishment of certain types of these networks, when found to be necessary.

    Article 23

    Private Telecommunications Networks may be connected to each other or to a Public Telecommunications Network pursuant to a written agreement between the owners or operators of these networks, as circumstances may require, and in accordance with instructions issued by the Commission incorporating the guidelines and technical conditions necessary for the connection. The Commission may stipulate that its prior approval be obtained for the connection of certain types of these networks, when found to be necessary.

    Article 24

    A person who owns, operates, or manages a Private Telecommunications Network may not provide Public Telecommunications Services by means of that network.

    Article 25

    a) The Council of Ministers, upon a recommendation by the Minister based on a commendation by the Board, may decide to license the establishment, operation, and management of Public Telecommunications Networks, or the provision of Public Telecommunications Services, whether throughout or in part of the Kingdom . In such case, the Board shall publish its desire to license through the means it deems fit together with the instructions related to the procedures of and criteria for the selection of licensees, depending on the nature of the service to be provided.

    b) In implementing the provisions of Paragraph (a) of this Article, the Board shall declare its desire to license by the way it deems fit, including the following:

    1. Announcing the desire to license the service by public tender, in accordance with the bases and conditions approved by the Board.

    2. Allowing the submission of applications for the licensing of a new service by whoever meets the conditions approved by the Board.

    3. Proposing to licensees to offer new services within the Kingdom.

    Article 26

    In addition to the technical and any other conditions, the following matters shall be observed in the procedures of license granting:

    a) All those wishing to obtain a license shall be given the opportunity to submit their proposals or applications if they meet the conditions specified by the Commission.

    b) The proposal or application shall be based on the undertaking to provide the service to all of those wishing to obtain it within a reasonable period and at fair rates.

    c) The components of the proposal shall be based on fair and lawful competition with holders of previous licenses.

    Article 27

    a. The applicant for a license should enclose with the application the following documents:

    1) Acceptable statements illustrating the technical and administrative ability of the applicant to provide the service.

    2) Acceptable statements illustrating the financial ability of the applicant and the funding sources of the project.

    3) Bases of pricing of the proposed services and the method of their calculation.

    4) Types of the proposed services, the geographical area to be covered, and the technology used in the service.

    5) Any other statements or documents prescribed by the Board.

    b. In accordance with instructions the Board issues for this purpose, it may exempt from  providing any of the documents mentioned above in Paragraph (a) of this Article if the  Board determines that such documents are not necessary to specific licenses.

    Article 28

    The Board shall have the right to decide to exclude any licensees if it deems that their participation in the competition over the new licenses would lead to an anticompetitive condition in the market.

    Article 29

    The license shall be issued by virtue of a resolution by the Board, provided that a contract of an administrative nature is drawn up including the following terms and conditions in addition to any other conditions stipulated in this Law, or the By-Laws issued pursuant thereto, or any exceptions determined by the Board:

    a. The returns payable to the Commission for the licenses, their duration, the returns of  their renewal and any other lump sum or periodical returns or financial rights which  must be paid by the licensee.

    b. The Licensee’s commitment to submit the information and data relevant to the subject  matter of the license, which are required from time to time or periodically by the  Commission, and the Commission staff shall be entitled to verify the genuineness of the  said information.

    c. The Licensee’s commitment to abide by any instructions issued by the Board or the  Chairperson in implementation of the general policy of telecommunications, including  the conditions of subscription contracts drawn up between the Beneficiaries and the  licensee.

    d. The Licensee’s commitment to provide the necessary financial guarantees to reimburse  the amounts due to subscribers, such as fees and deposits, in case the license is revoked.

    e. The Licensee’s undertaking to enter into interconnection agreements with other licensees  in accordance with the stipulations of Paragraph (j) of Article (6) of this Law; in addition  to his undertaking to prepare and publish the conditions required to connect and use any  equipment or device to his network, provided that such conditions are in agreement with  the instructions or decisions issued by the Commission in this regard.

    f. The Licensee’s undertaking to provide free of charge emergency telecommunications  services to the Beneficiaries in accordance with the arrangements and limits to be  determined by the Commission in cooperation with the parties concerned.

    g. The Licensee’s commitment to offer the necessary facilities to the competent parties to implement the judicial and administrative orders related to tracing the telecommunications specified in those orders.

    h. The Licensee’s undertaking to provide the service to applicants or Beneficiaries on equal  footing and without discrimination, except for national security requirements or what is  considered as tolerance for operational, social or humanitarian reasons.

    i. The Licensee’s commitments to announce in advance the rates of the services and the methods of their collection.

    j. The Licensee’s undertaking to cooperate with the Directory service in accordance with the instructions issued by the Commission.

    k. The extent of the licensee’s right to rent out or resell services.

    l. Cooperation with all other license holders in order to facilitate the provision of services to Beneficiaries.

    m. The Licensee’s commitment to provide the licensed service to applicants thereof within a  reasonable period of time and to arrange to cover the whole geographical area assigned  to him with the licensed service.

    Article 30

    Every Licensee shall conclude interconnection agreements with other Licensees as required by the license of each of them; these agreements shall address all the technical, operational, administrative, financial, and commercial terms and conditions that will ensure the flexibility required for implementation by the involved, taking the following into consideration:

    a. Preparation of the agreements in accordance with the instructions issued by the  Commission pursuant to Paragraph (j) of Article (6) of this Law.

    b. Inclusion in the agreements of the conditions of their termination, revocation, and  amendment procedures as well as the procedures to be followed in the case of breach  by either party.

    c. Approval by the Commission is a prerequisite for these agreements to become effective.

    CHAPTER V. FREQUENCY MANAGEMENT AND LICENSING OF THEIR USE

    Article 31

    The Frequency Spectrum is a national resource, the use of which shall be regulated by the Commission in accordance with this Law. The Commission shall prepare the tables, plans, and registers necessary for this purpose as stipulated in this Law, and the portion assigned for civilian use shall be published to the public.

    Article 32

    a. Subject to the provisions of Paragraph (b) of this Article, no person may use any  electromagnetic waves below 3,000 gigahertz transmittable in space without obtaining a  license thereto in accordance with conditions specified by the Board.

    b. The Jordanian Armed Forces and Security Departments, in coordination with the Commission, may use Radio Frequencies allocated and assigned for their use without a license, provided that no interference is caused thereby to other Radio Frequencies. The military and security bodies may also use other Allocated frequencies, provided that they obtain the approval of the Commission thereto and comply to the same licensing conditions applied on other Licensees, and provided that they do not cause any harm to other users of Radio Frequencies. In this case, they will be exempted from licensing fees.

    c. Subject to the provisions of any other law that requires the acquisition of a license to operate broadcast services, operators of these services, including radio, television, satellite broadcasting, and reception equipment, must obtain licenses to use the Radio Frequencies assigned by the Commission.

    Article 33

    Based on the representation of the Minister that is based on the recommendation of the Board, the Council of Ministers may authorize the use of public tendering to grant licenses to use the Radio Frequency Spectrum in cases where this method will serve the public interest, provided that the revenues expected from this method shall not be the sole or main reason for the determination of this interest.

    Article 33

    a. A committee called the “Consultative Committee for Frequencies” shall be formed under the chairmanship of a representative of the Commission, who is to be selected  by the Board, and shall include the following as members:

    1) A representative of the Armed Forces to be nominated by the Chairman of the  Joint Chiefs of Staff, and another representative of the Security Departments  to be nominated by the head of the concerned department.

    2) Four members having experience and expertise in the subject, to be selected by the Board on the recommendation of the Chairperson of the Board.

    b. The committee shall give advice to the Commission on the Allocation of Radio Frequencies, taking into consideration any commercial, governmental, and security current uses, as well as the new technologies that may be used.

    c. The committee shall convene upon a call by its chairperson, or its vice-chairperson in the  case of the chairperson’s absence. Its meeting shall be valid if attended by a majority of  its members, provided that the chairperson or vice-chairperson is one of them. The  committee shall adopt its recommendations by unanimous or majority vote of those present; in the event of a tie, the vote of the chairperson shall be considered a casting one.

    d. The chairperson of the Board shall appoint one of the employees of the Commission to act as a secretary to the committee. The secretary shall prepare the agenda of the committee’s s meetings, record its minutes, keep its documents and transactions as well as follow up all administrative matters assigned to him by the chairperson.

    Article 34

    After seeking the opinion of the Consultative Committee for Frequencies, the Board shall set a plan for the Assignment of Radio Frequencies, and shall review and amend such plan whenever necessary. The plan shall take into consideration the National Table of Frequency Allocations, the National Plan for Frequency Assignment as well as the policies and objectives related to future uses of the Radio Frequencies in the Kingdom.

    Article 35

    Subject to the exceptions stipulated in Article (36) of this Law, no Radio Station may be possessed or used on the territories of the Kingdom, or on board a vessel or aircraft registered in the Kingdom, unless a License is obtained thereto in accordance with the provisions of this Law; nor may a Radio Station be entered into the Kingdom, unless its entry is allowed by the Commission.

    Article 36

    a. The Jordanian Armed Forces and Security Departments shall be excluded from the  provisions of Article (35) of this Law.

    b. The Board has the right to exclude the following parties from the provisions of Article (35) of this Law:

    1) Foreign vessels and aircraft, land transportation and transit services passing  through Jordanian territorial waters, skies or territories or landing at its seaports or  airports.

    2) Foreign embassies, on condition of reciprocal treatment and the acquisition of a  renewable permit.

    Article 37

    a. The Licensee should abide by the use of the Radio Frequencies, as well as the conditions  and standards on the basis of which the License was given, including the following:

    1) The frequencies of radio spectrum Assigned to him.

    2) The type and specifications of both the antenna and the Radio Station.

    3) The authorized geographical area for the mobile equipment.

    4) The site where the antenna shall be erected.

    5) Qualifications of the person operating the Radio Station.

    6) Any other technical conditions that may assist in the effective use of the frequencies.

    b. The Commission shall monitor the use of the Radio Frequencies Assigned to the Licensee.

    CHAPTER VI. RENEWAL, AMENDMENT AND CANCELLATION OF LICENSES

    Article 38

    A specific period of validity shall be set for the Public Telecommunications Network License or the License for the use of the frequencies, and it shall be renewed pursuant to instructions issued by the Commission.

    Article 39

    a. Subject to the provisions of Paragraph (b) of this Article, the Board may decide to amend  one or more of the licensing conditions. Such amendment shall be made according to the  following procedure:

    1. The Board shall notify the Licensee in writing of the amendment, its reasons and the period set for its implementation. The Licensee may submit his objection to that amendment within the period set by the Board.

    2. The Board shall invite the objector to discuss and hear the reasons of his objection;  it consequently may decide either to approve the amendment, or postpone its  enforcement or accept the objection.

    b. The amendment of the licensing conditions shall not be restricted to a single Licensee with the exclusion of others, if the reasons calling for such amendment are available too in the licensing conditions of the other Licensees.

    Article 40

    The Board may cancel the License entirely or for a specific service or in a specific area if the Licensee commits a violation of the License conditions or the provisions of this Law or the By-Laws issued pursuant to it, or the instructions of the Board, or causes harm to others and fails to correct his situation within 30 days of a written warning by the Chairperson, or if he exceeds 30 days not carrying out the Commission’s instructions without a reason that is acceptable to the Board.

    Article 41

    The license shall be cancelled if the Licensee fails to pay the set returns for renewal of the License on the due date.

    Article 42

    The License shall be cancelled ipso facto when the licensee is liquidated, declared bankrupt or incapacitated.

    Article 43

    A Licensee whose License has been cancelled in accordance with the Law shall not be entitled to claim any compensation or recover any returns paid for obtaining the License, renewing it, or for any other reason.

    Article 44

    The Licensee shall refrain from accepting new subscriptions as from the date of his notification of the cancellation of the License. Moreover, effective from the date of cancellation of the License, he shall not continue working except as necessary for the transfer of the subscribers to another Licensee upon a written approval of the Commission.

    Article 45

    A person whose License has been cancelled may not apply for a License before the lapse of at least two years from the cancellation of his License.

    Article 46

    The decision to cancel the License shall not prevent the right of those harmed by the Licensee’s violations to claim damages, or the right of subscribers to claim compensation or reimbursement of the fees due to them.

    Article 47

    The License is personal and non-transferable. The Board shall have the right to approve the transfer of the License to another person in accordance with the set conditions and returns.

    CHAPTER VII. TYPE APPROVALS AND AUTHORIZATION OF TELECOMMUNICATIONS EQUIPMENT

    Article 48

    a. The Commission shall set technical rules and standard specifications applicable to Telecommunications and Telecommunications Terminal Equipment to ensure that they do not cause damage to telecommunications networks or services or to public health and safety, or the environment. When setting such rules and specifications, the Commission shall coordinate with other bodies that set specifications in the Kingdom, including the Jordanian Institute for Standards and Metrology, and shall publish them in the Official Gazette and in two local daily newspapers and other media so as to make them available to interested parties.

    b. No person who provides Telecommunications services, supplies Telecommunications  equipment or sells them may use, supply or sell any telecommunications equipment that does not comply with the technical rules and standards set by the Commission.

    Article 49

    The importer or anyone wishing to import Telecommunications equipment of which the specifications have not been announced may apply to the Commission for its approval prior to the importation of such equipment, provided that his application be supported by the manufacturing company’s manual indicating their specifications, In coordination with the concerned parties.

    Article 50

    The manufacturing of any Telecommunications equipment prepared to be marketed in the Kingdom shall be subject to the standard specifications approved by the competent parties.

    Article 51

    Based on the recommendation of the Chairperson, the Board shall issue the instructions that specify the conditions and procedures for obtaining the approval for the entry into the Kingdom of Telecommunications equipment and Telecommunications Terminal Equipment, as well as for their use, retention, and sale.

    CHAPTER VIII. CONTROL OF LICENSEES AND PROTECTION OF BENEFICIARIES

    Article 52

    Everyone licensed to offer a Public Telecommunications Service shall set up a special section for receiving complaints of Beneficiaries and subscribers, and shall strive to avoid the causes of the complaints if they are related to the standard, quality or method of the service.

    Article 53

    Subject to the provisions indicated in Item (7), Paragraph (a) of Article (12) of this Law, the Licensee may not increase the rents or prices of his services except after the publication of the new fees or prices in two daily local newspapers within at least one month, provided that these rents or prices will not exceed what is stated in the conditions of the licensing agreement, or the instructions and decisions issued by the Commission. In all cases, the Licensee shall inform the Commission of any changes he makes to those rents or prices.

    Article 54

    If the Commission receives any complaint regarding a default on the part of the Licensee, or of a dispute between the Licensee and the Beneficiaries concerning the standard of service, or the violation of the conditions of the License, the Commission may investigate the reasons of the complaint and make the decision it deems proper. Such decision shall be considered final and binding on the Licensee.

    Article 55

    The licensee shall submit to the Commission an annual report in which he indicates the available technical, administrative and financial aspects that guarantee providing the licensed service to the Beneficiaries at the required standard.

    Article 56

    Telephone calls and private Telecommunications shall be considered confidential matters which may not be violated, under legal liability.

    Article 57

    In coordination with the Licensee, the Commission may set rules and procedures to be followed in dealing with annoyance complaints when received by the Licensee, as well as set the procedures for verifying such complaints and the necessary measures to decrease nuisance calls in general.

    Article 58

    a. A Telecommunications service may not be withheld or cancelled for Beneficiaries unless the Beneficiary has caused material damage to the network during his use of the service, has used the Telecommunications service in a way that violates effective legislations or public morals, or has defaulted on payment of due fees and rents despite being  warned in writing.

    b. Under no circumstances may a Telecommunications service be withheld from a Beneficiary as a consequence of financial, administrative, or technical disputes between Licensees, except in accordance with the procedures outlined in the interconnection agreements executed in accordance with Paragraph (e) of Article (29) and Article (29bis)) of this Law.

    Article 59

    The Commission shall verify the Licensees’ compliance with the License conditions and the provisions of the Law, and may take any actions it deems appropriate for this purpose, including:

    a. Conducting a physical on-site inspection of network locations and Telecommunications equipment.

    b. Examining the Licensee’s technical records and ensuring that sound and accurate  systems are being used for issuing invoices.

    c. Ensuring the standard of service provided to Beneficiaries and their complaint.

    d. Reviewing the Licensee’s records of maintenance and defects to ensure the efficiency of the service management.

    Article 60

    a. The concerned bodies in the Commission shall adjudicate the complaints rendered by  Beneficiaries against Licensees, as well as the complaints rendered by Licensees against other Licensees.

    b. The specialized Commissioner shall be responsible for concluding a settlement, drawing  up guidelines for negotiations between the disputants, or to adjudicate the dispute  himself or by means of one or more persons he appoints for this purpose. His decisión  shall be implemented immediately upon issuance, and objections to the decision will be  permitted before the Board within thirty days of the date of issuance; otherwise the  decision will be considered final.

    Article 61

    A Licensee operating a Public Telecommunications Network shall be obliged to prepare a Directory regarding all the information related to such network and its subscribers, and shall provide the Directory service to those wishing to benefit therefrom in accordance with the instructions issued by the Commission.

    CHAPTER IX. SEIZURE AUTHORITY

    Article 62

    The Chairperson, or any person authorized by him in writing, shall have the right to enter any place suspected of containing unlicensed equipment or networks, or equipment used for jamming telecommunications networks, or where activities contrary to this Law or to the ByLaws issued in pursuance thereof are being conducted. They shall be entitled to search the place, with the exception of residences where a permission must be obtained from the competent Public Prosecutor prior to entry therein. In any case, the employee conducting the search shall fill in a report thereon and submit the same to the Chairperson.

    Article 63

    a. The Commission’s employees authorized to seize violations shall be considered as  judicial seizure officers, and the reports prepared by them shall be valid until proven  otherwise, provided that the seizure conditions stipulated in the Penal Trial Code Law in force are observed.

    b. Civil and Military Authorities as well as Public Security Forces shall extend to the  Commission’s employees every possible assistance to perform their work in seizing  violations.

    Article 64

    a. The Commission employees may seize any Telecommunication sets or  equipment that are unlicensed, illegal or used in an unlicensed activity, against a receipt  in writing indicating the type and specifications of the equipment, and deliver  these equipment to the Commission.

    b. Seized equipment that are ineligible for licensing shall be confiscated, while equipment  that can be licensed shall be retained until they are licensed.

    c. If the seized equipment are not licensed or their owner fails to claim them within six months from the date of their seizure, the Board may issue a resolution to confiscate the same.

    d. The Board shall decide upon the method of disposing of the confiscated equipment.

    e. The confiscation of illegal equipment shall not prevent imposition of other penalties  stipulated in this Law or in any other law.

    Article 65

    a. The Commission shall have the right to trace the source of any radio waves to ascertain the licensing of that source, without this being considered as breach of the confidentiality of communications or violation of the provisions of the laws in force.

    b. The contents of the communications intercepted while tracing their source under Paragraph (a) of this Article shall not be spread or publicized. Any employee who  spreads or publicizes the content of those communications shall be subject to the penalties provided by Law.

    Article 66

    Subject to the provisions of the other laws, and with the exception of the crimes stipulated in Articles (71-79) of this Law, the Board may conduct a compromise settlement in cases of violation of the provisions of this Law before initiating Public Prosecution, by substituting, wholly or partially, the penalties and fines stipulated in this Law with a pecuniary fine not less than double the determined fine which shall be paid directly to the Commission.

    CHAPTER X. APPROPRIATION

    Article 67

    a. If the establishment of Public Telecommunications Networks requires fixing poles or  erecting towers or laying ground cables or spreading aerial wires through private lands or  real properties, agreement thereon shall be concluded with the owner. If it is imposible  to come to terms with the owner, the Licensee may submit the plans to the Commission  indicating thereon the trespasses that will occur on private properties.

    b. If the Commission finds that those works are necessary for the establishment of the  network and that their execution through the private lands or real property would not  prevent their exploitation or their use by their owners, the Board may  issue a resolution allowing the Licensee to execute said works, provided that the former situation shall be restored and a fair compensation, assessed by experts chosen by the Commission, shall be paid to the owners of those real properties, or as assessed by the court upon the request of either party

    Article 68

    If the establishment of Public Telecommunications Networks requires acquisition of real property by the Licensee and the owner refuses to sell him that real property or part thereof at a fair price, the Licensee shall have the right to request the appropriation of that real property or the part thereof necessary for the establishment of the network, according to the following procedures:

    a. To submits an application to the Commission requesting that the necessary legal actions be taken to have the ownership of that real property or the part thereof transferred  to him, justifying his application by technical reasons.

    b. If the Board finds, upon the recommendation of the Chairperson, that such real property  is necessary for the establishment of the network and that there are no other technical  solutions, it shall recommend to the Council of Ministers to approve the appropriation of that real property or the part thereof necessary for the benefit of the Licensee, as the  establishment of the network is a ” public utility project” in the sense intended for it in the  Appropriation Law.

    c. If the Board decides to recommend to the Council of Ministers to approve the  appropriation of that real property, it shall instruct the licensee to deposit the amount the  Board deems to be a fair compensation for the appropriated real property, pursuant to the  assessment of one or more experts entrusted by the Commission with the task of  assessing the real property or the part thereof to be appropriated.

    Article 69

    The Licensee shall, in coordination with the Commission, agree with the Ministry of Public Works or Greater Amman Municipality, or other Municipalities or Government Institutions, on arrangements and compensations related to the laying of ground or aerial networks on roads, streets, squares and public squares under their administration.

    Article 70

    If a tree or group of trees obstruct the spreading of aerial wires of a Public Telecommunications Network and it was impossible to reach an agreement with the owner, the Licensee may request the Commission to issue an order to their owner to remove them, if he so wishes, or to allow the Licensee to remove the same in consideration for a fair compensation to be paid by the Licensee as stated in this Law.

    CHAPTER XI. CRIMES AND PENALTIES

    Article 71

    Any person who spreads or discloses the content of any communication through a Public or Private Telecommunications Network or a telephone message which came to his knowledge by virtue of his post, or records the same without any legal basis, shall be punished by imprisonment for a period not less than one month and not exceeding one year, or by a fine not less than (JD100) and not more than (JD300), or by both penalties.

    Article 72

    a. Any person who intentionally sabotages Telecommunications installations or deliberately  causes damage thereto shall be punished by imprisonment for a period not less than three months and not exceeding two years, or by a fine not less than (JD200) and not  more than (JD5000), or by both penalties. The penalty shall be doubled if his act causes break down of the Telecommunications traffic.

    b. Any person, who, negligently, causes the destruction of or damage to the  Telecommunications installations, shall be punished by imprisonment for a period not  exceeding three months or by a fine not more than (JD100), or by both penalties.

    Article 73

    Any person who destroys a Telecommunications equipment assigned for public service shall be punished by imprisonment for a period not less than one month and not exceeding one year, or by a fine not less than (JD50) and not more than (JD200), or by both penalties.

    Article 74

    Any person who uses or assists in using illegitimate means to conduct Telecommunications without paying fees shall be punished by imprisonment from one month to three months, or by a fine from (JD100) to (JD1000), or by both penalties.

    Article 75

    a. Any person who originates or forwards, by any Telecommunications means, threatening  or abusive messages, or messages contrary to public morals, or forwards false  information with the intent to spread panic shall be punished by imprisonment for a  period that is not less than one month and not exceeding one year or by a fine of not les  than (JD300) and not more than (JD2000), or by both penalties.

    b. Any person who provides or contributes to the provision of Telecommunications services in violation of public order or public morals shall be punished by the penalties stipulated in Paragraph (a) of this Article in addition to the application of the provisions stipulated in Article (40) of this Law.

    Article 76

    Any person who intercepts, obstructs, alters or strikes off the contents of a message carried through the Telecommunications networks or encourages others to do so shall be punished by imprisonment for a period not less than one month and not exceeding six months, or by a fine not more than (JD200), or by both penalties.

    Article 77

    Any person who withholds a message he is obliged to transmit through Telecommunications networks to another person, or refuses to transmit messages he has been asked to transmit by the Licensee or the Commission, or copies or reveals a message or tampers with the information related to any subscriber, including unpublished telephone numbers and sent or received messages, shall be punished by imprisonment for a period not exceeding six months or a fine not more than (JD1000), or by both penalties.

    Article 78

    a. Any person who establishes, operates, or manages a Public Telecommunications Network for the purpose of providing Public Telecommunications Services in contradiction to the provisions of this Law, shall be punished by imprisonment for a period not less than three months, or by a fine not less than (JD 5000) and not more than (JD25000), or by both penalties.

    b. Any person who establishes, operates, or manages a Private Telecommunications Network in contradiction to the provisions of this Law shall be punished by imprisonment for a period not less than one month and not exceeding three months, or by a fine not less than (JD 2000) and not more than (JD5000), or by both penalties.

    Article 79

    Any person who uses a Public or Private Telecommunications Network in an illegal way or connects his network with another Telecommunications network without having the right to do so, or hinders the delivery of services from other Telecommunications networks, or endangers the national interests shall be punished by imprisonment for a period of not les than one month and not longer than six months, or a fine of not less than (JD2000) and not more than (JD5000), or by both penalties.

    Article 80

    a. Any person who deliberately makes any action to intercept, interfere with, or interrupt Radio Waves Assigned to others shall be punished by imprisonment for a period not les than six months, or by a fine not less than (JD5000) and not more than (JD25000),   or by both penalties.

    b. Any person who deliberately uses Radio Waves without a license shall be punished by  imprisonment for a period not less than one month, or by a fine not less than (JD2000)  and not more than (JD5000), or by both penalties.

    Article 81

    Any person, who enters Telecommunication equipment in contradiction to the provisions of Article (35) of this Law shall be punished by imprisonment for a period not exceeding one month or by a fine not less than (JD100), and not more than (JD500).

    Article 82

    Any person who imports or trades in Telecommunications equipment that is not in compliance with technical standards, or bears inaccurate information which is against the provisions of Articles (48), (49), (50), and (51) of this Law shall be punished by imprisonment for a period of not less than one month and not exceeding one year, or by a fine not less than (JD100) and not more than (JD2000), or by both penalties.

    Article 83

    Any person who keeps or operates a Radio Station in contradiction to the provisions of this Law shall be punished by imprisonment for a period not less than one month and not exceeding six months, or by a fine not less than (JD100), and not more than (JD500), or by both penalties.

    Article 84

    In addition to the penalties stipulated in Articles (78) and (79) of this Law, the competent court may, pursuant to a request by the Commission, decide to bind the offender to pay an amount not less than double the fees payable for licensing that service if it were licensed, in the form of civil liabilities in favor of the Commission.

    CHAPTER XII. FINAL PROVISIONS

    Article 85

    The preceding Articles shall not prevent the right of any person suffering harm from any violation of the provisions contained in these Articles to claim for damages and personal rights. .

    Article 86

    a) The Board, with the approval of the Council of Ministers, may establish in the Commission a fund that enjoys financial independence and has its special account.

    b) The purpose of this fund shall be to increase the universality of telecommunications and information technology services in the Kingdom and to contribute to the expansion and development of the infrastructure of these services where actually needed for areas of collective habitation.

    c) The composition of the financial sources of the fund shall be the following:

    1) Amounts assigned to it by a decision of the Council of Ministers, upon the  recommendation of the Board, from the returns provided for in Paragraph (a) of Article (18) of this Law.

    2) The support provided to the fund by the Licensees on the issuance or renewal of their licenses.

    3) Any other source agreed upon by the Board.

    d) All matters pertaining to the work organization of the fund, its management, control and expenditure shall be specified in a special By-Law that shall be drawn up for this purpose.

    Article 87

    If the Licensee violates the conditions of the License or refrains from providing the service, the Board may, by virtue of a justified decision, assume supervision of the operation, or assume the management of the licensed Telecommunications network for the period the Board deems proper.

    Article 88

    Neither the Licensees nor the persons suffering harm shall be entitled to claim compensation for any damages resulting from the measures taken pursuant to the provisions of Article (87) of this Law.

    Article 89

    By virtue of a resolution by the Council of Ministers, the Telecommunications Corporation (TCC) shall be registered as a public joint-stock company, the whole shares of which shall be state-owned. It shall be registered with the Companies Controller pursuant to the provisions of the Companies Law in force and shall be granted the necessary License to establish, manage and operate Public Telecommunications Networks by virtue of a licensing agreement drawn up between the Commission and this company.

    Article 90

    a. All Licensees or those permitted to own and operate Telecommunications networks or to  use Radio Waves shall adjust their states of affairs with the provisions of this Law  within a maximum period of six months from its effective date. Licenses and permits  granted pursuant to the provisions of the Laws in force prior to the effective date of this  Law shall be valid until their expiry date.

    b. As of the effective date of this Law, the Commission shall become the legal successor of  the TCC in all matters related to the regulation of the Telecommunications sector, the issuance of licenses or permits for the operation of Telecommunications networks or the use of Radio Frequencies, and the transactions and documents related to the valid licenses and permits shall be transferred thereto.

    Article 91

    a. The Council of Ministers shall issue the By-Laws necessary for the implementation of  the provisions of this Law, including the By-Laws related to the Commission’s works and activities, the Financial By-Law, the Supplies By-Law, the Employees’  By-Law and their Saving and housing Fund.

    b. Pending the issuance of the By-Laws stipulated in Paragraph (a) of this Article, the  By-Laws issued under the laws in force or those repealed by this Law shall remain in  force in as much as the provisions of those By-Laws are not in contradiction with the  provisions of this Law.

    Article 92

    Each of the following shall be repealed:*

    a. The Radiotelegraphy Law of 1934 and the amendments thereto.

    b. The Telecommunication Corporation Law nº (29) of 1971 and the amendments thereto.

    c. Any provision in any other legislation to the extent that it contradicts with the provisions  of this Law.

    Article 93

    The Prime Minister and Ministers are entrusted with the implementation of the provisions of this Law.

    * Article (92) has been amended by virtue of the Amending Law of the  Telecommunications Law nº (6) of 2000, which was published in the  Official Gazette, nº 4416, dated 01.03.2000, where Paragraph (B)  was added thereto.

    29Abr/21

    SENTENCIA T-509 DE 2020 DE LA CORTE CONSTITUCIONAL, DE 9 DE DICIEMBRE DE 2020

    Sentencia T-509/20

    Referencia: Expediente T-7.845.433

    Acción de tutela instaurada por Anggy Lizeth C. F.contra la Fiscalía General de la Nación.

    Magistrado ponente: JOSÉ FERNANDO REYES CUARTAS

    Bogotá D.C., nueve (9) de diciembre de dos mil veinte (2020).

    La Sala Octava de Revisión de tutelas de la Corte Constitucional, integrada por los Magistrados Richard S. Ramírez Grisales (e.), Alberto Rojas Ríos y José Fernando Reyes Cuartas, quien la preside, en ejercicio de sus competencias constitucionales y legales, profiere la siguiente:

    SENTENCIA

    Dentro del proceso de revisión de los fallos proferidos el 13 de noviembre de 2019 por el Juzgado Quince Administrativo del Circuito de Bogotá y el 4 de febrero de 2020 por la Subsección “A”, Sección Segunda del Tribunal Administrativo de Cundinamarca, en primera y segunda instancia.

    I. ANTECEDENTES

    Anggy Lizeth C. F. instauró acción de tutela contra la Fiscalía General de la Nación, invocando la protección de sus derechos fundamentales a la honra, buen nombre, intimidad, petición y habeas data. Para sustentar la solicitud de amparo narró los siguientes hechos (1):

    1.  Informó que es madre cabeza de familia, está desempleada, y que entre los años 2018 y 2019, se inscribió a diferentes convocatorias de empleo en el sector asegurador. Durante los procesos de selección, la sociedad Consultoría Seguridad Integral y Compañía Limitada (2) realizó estudios sobre sus circunstancias personales, académicas y profesionales.

    2.  Los resultados quedaron plasmados en los análisis del 27 de diciembre de 2018 (3) y 3 de septiembre de 2019 (4), en los cuales Cosinte Ldta. afirmó lo siguiente:

    “5. ANTECEDENTES: Consultadas las bases de datos de los organismos de seguridad del Estado, se confirmó (que) registra antecedentes. (…) || CONCLUSIÓN: luego de consultadas las bases de datos de los organismos de seguridad del Estado, se encontró que la evaluada REGISTRA DOS PROCESOS EN SU CONTRA. Teniendo en cuenta lo anterior, se considera que la candidata representa un nivel de riesgo MEDIO” (5).

    3.  La accionante indicó que, mediante llamada telefónica, un empleado de Cosinte Ldta. le comunicó que había sido excluida del proceso de selección, sin expresarle las razones que fundamentaron tal decisión. Posteriormente, la actora solicitó información al respecto, a lo cual le respondieron que el motivo era que figuraba en “la base de datos de la Fiscalía General de la Nación” (6). 

    4.  El 29 de agosto de 2019, la actora radicó una petición ante la Fiscalía solicitando eliminar su información de las bases de datos administradas por esa entidad.

    5.  En oficio del 17 de septiembre de 2019 (7), la Fiscalía Local 308 Delegada ante los Jueces Penales de Bogotá le contestó que en su contra existía una indagación bajo radicado 110016000013201115051 por la presunta comisión del punible de lesiones personales, en hechos ocurridos el 29 de octubre de 2011. Sin embargo, dicha actuación fue archivada por desistimiento de la querella y, en consecuencia, se registró la orden de archivo en el “Sistema Misional de Información de la Fiscalía General de la Nación -SPOA-, figurando el caso en estado INACTIVO” (8).

    No obstante, la entidad señaló que no era posible suprimir los datos que le conciernen, por cuanto la información contenida en el SPOA cumple un rol administrativo, establecido para rendir informes estadísticos, responder requerimientos de usuarios, y/o autoridades administrativas o judiciales. Aclaró que dichas anotaciones no representan antecedentes judiciales y que tal información no es de acceso público. Por último, instó a la peticionaria a “(poner) en conocimiento de la Fiscalía General de la Nación, el nombre de la empresa con la que adelantaba su proceso de selección, para establecer la forma en la que se encuentra accediendo a nuestra base de datos obteniendo información catalogada como reservada” (9).

    6.  El 29 de octubre de 2019, la accionante instauró acción de tutela contra la Fiscalía, argumentado que la negativa de “actualizar, corregir o subsidiariamente, eliminar el estado INACTIVO (…) y cambiar el estado de la investigación a ARCHIVADO” vulnera sus derechos fundamentales al dificultarle encontrar empleo. En ese sentido, sostuvo que la expresión “inactivo” “resulta transgresora de las garantías de las personas, por cuanto permite que terceros infieran la existencia de asuntos pendientes o en trámite con la justicia y, por tanto debe ser reemplazada por ARCHIVADO o subsidiariamente eliminadas” (10). Así mismo, reprochó que la Fiscalía permita acceder a terceros a la información sobre antecedentes.

    7.  La actora solicitó ordenar a la Fiscalía General de la Nación modificar “el sistema de consulta en línea de antecedentes y anotaciones judiciales, de manera que al ingresar la cédula del actor o el número de noticia criminal, aparezca la leyenda: PRECLUIDO o ARCHIVADO” (11), con el fin reflejar fielmente la situación jurídica de la persona objeto de consulta.

    Adicionalmente, y como consecuencia de lo anterior, pidió “cancelar, corregir, actualizar o eliminar las anotaciones que se hayan impuesto en mi contra en las bases de datos que, normalmente utilizan los Frentes de Seguridad Empresarial, los funcionarios de la Fiscalía General de la Nación, SPOA, SIAN y el Sistema de Antecedentes y Anotaciones Judiciales, (y el) Sistema Operativo de la Policía” (12).

    Trámite procesal

    8.  Mediante auto del 30 de octubre de 2019 (13), el Juzgado Quince Administrativo del Circuito de Bogotá avocó el conocimiento de la acción y corrió traslado al ente acusador para que se pronunciara frente a los hechos y pretensiones (14).

    Respuesta de la entidad accionada

    9.  La Dirección Seccional Bogotá de la Fiscalía indicó que la accionante figura vinculada en las noticias criminales n.° 1100160000151212133 y 110016000013201115051, a cargo de la Fiscalía 106 Delegada ante los Jueces Penales del Circuito de Bogotá y la Fiscalía 308 Delegada ante los Jueces Penales Municipales de Bogotá. Por consiguiente, remitió las comunicaciones sobre la admisión de la acción de tutela a esos despachos. En ese sentido, manifestó carecer de legitimación en la causa (15). 

    10.  La Fiscalía 308 Local Delegada ante los Jueces Penales Municipales y Promiscuos de Bogotá expresó que no ha vulnerado los derechos fundamentales invocados y carecer de competencia para acceder a las pretensiones de la accionante, por tanto, solicitó negar la acción. Para fundamentar lo anterior, adujo que el “SPOA” es el sistema de información de la Fiscalía General de la Nación para el Sistema Penal Oral Acusatorio, al cual pueden acceder, remota o localmente, los funcionarios de la entidad. Manifestó que la plataforma cumple una función administrativa sin constituir una base de datos pública. Además, aseveró que las anotaciones realizadas no configuran antecedentes penales.

    En cuanto al reproche de la accionante sobre el acceso de la sociedad Cosinte al sistema de la Fiscalía, afirmó que “resulta inquietante para este despacho, la forma en la que dicha empresa accedió a la información del sistema misional de la Fiscalía General de la Nación” (16). En ese sentido, adujo que la sociedad que realizó el estudio de seguridad sobre las condiciones personales de la actora es la responsable de la vulneración de derechos al haber accedido a información sin autorización de su titular.

    Sostuvo que no es posible reemplazar la descripción “inactivo” por “archivado” ni eliminarla, pues el sistema SPOA únicamente consagra las opciones “activo/inactivo”. Por lo cual, cualquier cambio implicaría realizar una modificación en la plataforma a nivel nacional. Destacó que la institución implementó un sistema de consulta pública que es acorde con la protección de datos personales, por cuanto exige contar con el número de radicación del proceso, y la información que arroja la consulta refiere únicamente el despacho fiscal a cargo y el estado de la actuación, sin suministrar el nombre o el documento de identidad de los involucrados.

    Por último, allegó un oficio suscrito por la Coordinadora del Grupo de Administración y Soporte de los Sistemas SPOA y SIJUF (17), en el cual se informa que no es posible cambiar las opciones del SPOA, salvo una restructuración ordenada por el Fiscal General de la Nación. De otro lado, expresa que el estado “activo” se refiere a “noticias criminales que no han tenido decisión que le cambie al estado Inactivo (archivos, sentencias condenatorias, entre otras)” (18).

    11.   La Fiscalía 45 Delegada ante los Jueces Penales del Circuito de Bogotá -en apoyo de la Fiscalía 106 Delegada Seccional- indicó que en el SPOA figuran dos registros relacionados con la accionante, ambos con estado inactivo por decisiones de archivo proferidas por los fiscales que instruyeron las indagaciones, por lo cual, no se puede predicar la existencia de antecedentes penales. Por otro lado, agregó que la eventual vulneración de derechos es atribuible a “las empresas a las que (la actora) se ha postulado, las que de manera ilegal han accedido a una información reservada” (19). Afirmó carecer de competencia para modificar el sistema informático del SPOA, y destacó que la Fiscalía cuenta con un sistema de consulta público acorde con la protección de datos personales.

    Sentencias objeto de revisión

    Primera instancia (20)

    12.  En sentencia del 13 de noviembre de 2019, el Juzgado Quince Administrativo del Circuito de Bogotá negó el amparo. Manifestó que las anotaciones que la accionante presenta en el SPOA figuran con estado “inactivo”, en tanto las diligencias fueron archivadas, sin que constituyan antecedentes judiciales. Por consiguiente, la información corresponde a la realidad. Mencionó que esta circunstancia fue confirmada tras consultar el sistema de antecedentes penales y requerimientos judiciales a cargo de la policía judicial. Así mismo, resaltó que el SPOA no es una base de datos pública.

    Relató que la accionante no acreditó que la sociedad Cosinte Ltda. la hubiese excluido de los procesos de selección laboral con base en los registros realizados en el sistema de información de la Fiscalía General de la Nación. Finalmente, instó a esta última a verificar “la forma como presuntamente la empresa en mención ha accedido, en caso de haber sido así, a la información personal de la demandante” (21).

    Impugnación (22)

    13.  La accionante impugnó el fallo. Después de reiterar los hechos y las pretensiones expuestas en el escrito de tutela, solicitó la vinculación de la sociedad Cosinte Ltda al trámite.

    Actuaciones realizadas en sede de segunda instancia

    14.   Mediante auto del 31 de enero de 2020, la Subsección “A” de la Sección Segunda del Tribunal Administrativo de Cundinamarca vinculó a la sociedad Cosinte Ltda, corriéndole traslado del escrito de tutela para que ejerciera el derecho de defensa y contradicción (23).

    Respuesta de la vinculada

    15.   A través del representante legal, la sociedad Cosinte adujo que no vulneró los derechos de la accionante y, en consecuencia, solicitó negar el amparo. Indicó que las empresas a las que presta sus servicios son las encargadas de decidir si contratan a los aspirantes. Aseveró que el análisis sobre las circunstancias de los candidatos se realiza a través de la información que estos aportan en la hoja de vida, mediante visita domiciliaria que se efectúa a los interesados, y de acuerdo al contenido de las bases de datos públicas, cuya consulta cuenta con autorización previa.

    Refirió que la accionante autorizó el tratamiento de sus datos, y haber informado “en desarrollo de la visita domiciliaria la existencia de dichos antecedentes, que tuvo problemas con la fiscalía y que tiene procesos legales”. Como documento anexo, allegó dos estudios realizados a la actora como aspirante a los cargos de asistente contable y analista de cartera (24).

    Sentencia de segunda instancia (25)

    16.  En sentencia del 4 de febrero de 2020, la Subsección “A”, Sección Segunda del Tribunal Administrativo de Cundinamarca revocó el fallo y, en su lugar, protegió los derechos fundamentales al habeas data, debido proceso y buen nombre.

    En consecuencia, le ordenó a la sociedad Cosinte realizar un nuevo estudio de seguridad y confiabilidad, ofreciendo información veraz sobre la existencia de antecedentes penales de la accionante, y comunicar los resultados a las empresas que conocieron los análisis previos. De otro lado, le ordenó a la Fiscalía General de la Nación modificar las anotaciones de la actora, cambiando el estado “inactivo” “al que en derecho corresponda según lo sucedido al interior de la actuación (archivado, precluido, etc.)” (26). Adicionalmente, le ordenó adoptar las medidas necesarias para preservar el uso interno de la información registrada en el SPOA.

    Como fundamento de lo anterior, mencionó que las anotaciones efectuadas en el SPOA no representan antecedentes penales y, en ese sentido, la sociedad Cosinte afirmó algo contrario a la realidad al sostener que la accionante contaba con antecedentes. Además, agregó que esa sociedad de alguna manera tuvo acceso a información reservada a la Fiscalía General de la Nación, de ahí que esa entidad deba adoptar las medidas necesarias para que los sistemas de búsqueda reflejen el estado real de las actuaciones -por ejemplo, diferenciando entre actuaciones activas o archivadas-, de manera que la información registrada no dé lugar a interpretaciones equívocas.

    Pruebas que obran en el expediente

    17.   Las pruebas relevantes para resolver el caso de la referencia que obran en el expediente, son las siguientes:

    (i)      Copia del oficio 2019-014 del 13 de junio de 2019, suscrito por el Fiscal Local 308 adscrito a la Casa de Justicia de Ciudad Bolívar -Bogotá-, sobre las actuaciones penales relacionadas con la accionante (27).

    (ii)   Constancia de antecedentes judiciales expedida por la Policía Nacional, según la cual la accionante “no tiene asuntos pendientes con las autoridades judiciales” (28).

    (iii)  Respuesta de la Fiscalía Local 308 adscrita a la Casa de Justicia de Ciudad Bolívar -Bogotá- a la petición elevada por la actora, en el sentido de suprimir los datos que le conciernen, contenidos en el SPOA (29).

    (iv)  Estudios de “confiabilidad y financieros” realizados por la Sociedad Cosinte sobre la accionante, con “fechas de entrega”: “2018-12-27” y “2019-09-03” (30). Así mismo, formatos diligenciados de autorización de tratamiento de datos personales (31).

    Actuaciones en sede de revisión

    18.   La Dirección de asuntos jurídicos de la Fiscalía General de la Nación solicitó la revisión del proceso (32). La Sala de Selección número tres de la Corte Constitucional (33) en auto del 28 de agosto de 2020 (34), escogió el presente asunto y fue repartido a este despacho.

    19.  En proveído del 24 de septiembre de 2020, el magistrado sustanciador decretó pruebas tendientes a recaudar elementos de juicio para el estudio del caso objeto de revisión (35). Así, solicitó lo siguiente:

    (i)  A la accionante le pidió informar acerca de las visitas domiciliarias realizadas por la sociedad Cosinte, su condición laboral actual, y expresar si tiene conocimiento de que la sociedad accionada haya cumplido el fallo de segunda instancia.

    (ii)   A Cosinte Ltda. le solicitó indicar cuál es su objeto social y en qué consisten los servicios de análisis de confiabilidad, e informar si cumplió la sentencia proferida por el Tribunal Administrativo de Cundinamarca. De otro lado, explicar cuál es la metodología de recolección de datos de los aspirantes a empleos y cuáles son las fuentes objeto de consulta. Por último, allegar los soportes de los estudios efectuados a la accionante, y las constancias de las visitas domiciliarias que le fueron realizadas.

    (iii)  A la Fiscalía General de la Nación le pidió hacer referencia a los protocolos de acceso, administración y seguridad de la información contenida en el SPOA. Indicar si existe algún tipo de investigación interna a causa de los hechos de la acción de tutela. Finalmente, manifestar si cumplió el fallo de segunda instancia.

    (iv)  Por último, el despacho invitó a algunas instituciones de investigación y universidades para que participaran en el presente caso, a través de un concepto acerca de la presunta vulneración de derechos fundamentales y medidas a adoptar (36).

    Respuestas allegadas a partir del decreto probatorio

    20.  En respuesta del 13 de octubre de 2020 (37), la representante legal de la sociedad Cosinte Ltda. informó que su objeto social está enfocado a la prestación remunerada de consultorías en temas de seguridad, riesgos corporativos, y estudios de confiabilidad para la selección de personal, entre otros. Señaló que cumplió el fallo de segunda instancia realizando los nuevos estudios de confiabilidad, análisis que arrojó como resultado “nivel de riesgo bajo”. Así mismo, informó que fueron remitidos a las sociedades que conocieron la versión previa a la acción de tutela, esto es, Adecco Colombia S.A., y Seguros S.A. (38).

    Reiteró que no es la encargada de decidir sobre la contratación de las personas a quienes les realiza el estudio de confiabilidad, pues este es tan solo un servicio que se presta a otras personas. Respecto a la metodología que implementa para la verificación y recolección de datos que conforman los estudios de confiabilidad o financieros, mencionó que consiste en la realización de las siguientes acciones:

    i) visita domiciliaria en la dirección indicada por la persona;

    ii) verificación de las referencias académicas, labores y personales expuestas en la hoja de vida, y

     iii) consulta de las anotaciones hechas en bases de datos públicas.

    Al respecto, agregó que en la visita domiciliaria se solicita a la persona suscribir una autorización sobre tratamiento de datos personales y se confronta la información suministrada con el fin de determinar el grado de veracidad, y se analiza el entorno y las condiciones de vida del entrevistado.

    Expresó que el 22 de diciembre de 2018 y el 30 de agosto de 2019, le realizó visitas domiciliarias a la accionante, escenario en el cual esta aludió a la existencia de procesos en la Fiscalía. Sobre esto indicó que “dentro de lo consultado por Cosinte Ltda., no se conoce que tipo de delitos, o noticias criminales ha cometido cada persona, hechos y demás”.

    Como documento anexo, allegó el estudio de confiabilidad realizado a la accionante en cumplimiento de lo ordenado por la Sección A, Sección Segunda del Tribunal Administrativo de Cundinamarca, que se identifica con fecha de entrega del “2020-02-11” (39). Por último, solicitó declarar la improcedencia de la acción por falta de legitimación por pasiva, e inexistencia de vulneración de derechos fundamentales. 

    21.   En comunicación del 14 de octubre del año en curso (40), la Fiscalía General de la Nación, a través de la Directora de asuntos jurídicos (e.), atendió lo solicitado por el Despacho. En primer lugar, expresó que mediante Resolución n.° 4004 de 2013 (41), la entidad estableció los protocolos para garantizar la seguridad de la información contenida en sus bases de datos, entre ellas, el SPOA. Mencionó que esta normativa tiene por objetivo “proteger los activos informáticos de la Fiscalía General de la Nación y garantizar un adecuado uso de la tecnología, ante amenazas, internas o externas, deliberadas o accidentales, con el fin de asegurar el cumplimiento de la confidencialidad, integridad y disponibilidad de la información” (42).

    Aseveró que el SPOA tiene como finalidad sistematizar el ejercicio de la acción penal y establecer valores estadísticos de la actividad investigativa de la entidad. Señaló que las variables “activo” e “inactivo” se utilizan para determinar si una noticia criminal se encuentra en etapa de investigación o judicialización, o si cesó el ejercicio de la acción penal. Agregó que no tiene la función de certificar la existencia de antecedentes judiciales al no ser una base de datos pública, pues su acceso se restringe a uso institucional. Por tanto, “la facultad de rectificación o corrección, como uno de los contenidos mínimos que integran el derecho al habeas data, debe exigirse dentro de las finalidades y características del -SPOA-”(43).

    Destacó que los protocolos de manejo y administración de las bases de datos se sustentan en el diligenciamiento de los formatos: “solicitud de acceso a servicios TI”, y “acuerdo de confidencialidad de la información”.  Frente a los mecanismos de control o de seguridad para acceder al SPOA, adujo que la entidad “tiene mecanismos de protección mediante una plataforma de seguridad perimetral que protege los sistemas de información frente a posibles ataques externos. Adicionalmente, el sistema de información -SPOA- cuenta con mecanismos de autenticación para el ingreso” (44).

    De otro lado, expresó que al consultar a la Dirección de control disciplinario, esa dependencia indicó que no existe actuación disciplinaria adelantada de oficio o por petición de la accionante respecto de los hechos relatados en la acción de tutela. Sin embargo, la entidad afirmó que ordenó el inicio de una indagación preliminar con miras a determinar si ocurrió una conducta disciplinable, así como al servidor responsable. Así mismo, mencionó que se adelantan 18 procesos disciplinarios relacionados con presuntas consultas irregulares en el SPOA, las cuales presentan el siguiente estado procesal: 9 en investigación, 8 en investigación preliminar, 1 en “prórroga”.

    Manifestó que la información contenida en el SPOA solo se administra a autoridades judiciales en ejercicio de sus funciones, al titular del dato, sus causahabientes o terceros autorizados expresamente por el titular. Sobre esto último, adujo que no todo conocimiento de los datos contenidos en el SPOA implica que necesariamente su divulgación provenga de la entidad, pues puede ocurrir que el titular del dato haya autorizado a un tercero para acceder a la información que le concierne. En ese sentido, consideró oportuno establecer si la accionante autorizó a la sociedad Cosinte para consultar su información, conforme los términos de la Ley 1581 de 2012.

    Indicó que las anotaciones relacionadas con la accionante se ajustan a la realidad, pues se encuentran “inactivas” por archivo y desistimiento de la querella. De ahí que la información contenida en los sistemas misionales de la entidad “sea actual, íntegra y veraz, que refleja las actuaciones penales adelantadas, incluso cuando el proceso ha concluido; y en ningún caso constituyen antecedentes penales”. Al respecto, recordó que la variable “inactivo“puede darse por diversas situaciones (archivo, preclusión, etc.), dentro de las cuales se encuentra la inactividad por terminación del proceso por sentencia condenatoria (…)”.

    22.  Por otra parte, mencionó haber cumplido la orden de la sentencia de tutela de segunda instancia, en palabras de la entidad:

    “En efecto, la Subdirección de Tecnologías de la información y las Comunicaciones, junto con la Dirección de Planeación y Desarrollo de la FGN, conforme las características y finalidades propias del -SPOA-, efectuaron las modificaciones correspondientes a la mencionada herramienta institucional, de modo tal que se ajustaran a la orden emitida en la sentencia del 4 de febrero de 2020, proferida por la el Tribunal Administrativo de Cundinamarca Sección Segunda –Subsección ‘A’-.

    Actualmente, la búsqueda de las noticias criminales relacionadas con la accionante en el -SPOA-, arroja como resultado, la visualización del ESTADO en la categoría binaria ACTIVO/INACTIVO, junto con la precisión del MOTIVO o la Causal para categorizarlo en dicho estado” (45).

    En ese sentido, expresó que, por ejemplo, en el caso de la accionante, la modificación efectuada en el sistema interno permite consultar lo siguiente:

    n.° caso-noticia                                Estado                  Motivo

    110016000013201115051            INACTIVO           Desistimiento de la querella por   inasistencia

                                                                                                  injustificada del querellante

    110016000015201212133            INACTIVO           Archivo por inexistencia del hecho art. 79 C.P.P

    Así mismo, indicó que la página de consulta pública de los procesos del sistema penal acusatorio también se modificó con la implementación de la categoría binaria “activo/inactivo” y la precisión del motivo o causal que justifica el estado del caso. En conclusión, reiteró que los cambios efectuados en el SPOA permiten consagrar información veraz, sin dar lugar a interpretaciones erróneas, por lo cual, no se vulneran los derechos fundamentales de la accionada.

    Intervenciones y conceptos académicos (46)

    23.   La Universidad Externado de Colombia atendió la invitación de la Corte, remitiendo el concepto solicitado (47). Expresó que la sentencia de segunda instancia debe ser confirmada. Señaló que el asunto de la referencia suscita cuatro problemas jurídicos relacionados con las dimensiones objetiva y subjetiva del derecho al habeas data (48).

    Mencionó que, para el momento de los fallos de los jueces de instancia, la información contenida en el SPOA era problemática, por cuanto “distintas interpretaciones sobre unos mismos hechos pueden alterar la relación de concordancia entre la ‘realidad’ de los hechos y la realidad que la información registrada revela”. Bajo ese entendido, adujo que la expresión “inactivo” no descarta la inminencia del cambio de estatus a “activo”, aunado a las consecuencias que implicaría la revelación de la información a terceros. Por lo cual, defendió la utilización de los términos técnicos del derecho penal, los cuales honrarían de forma más eficaz la realidad de los hechos y eliminarían las ambigüedades y posibles interpretaciones desfavorables para la persona concernida por el dato.

    Puso en duda la legitimidad de la permanencia de la información que permite relacionar a una persona con el actuar de la Fiscalía cuando el ejercicio de la acción penal cesó, teniendo en cuenta que se trata de información personal negativa, y los principios constitucionales que rigen la administración de datos personales, específicamente, finalidad y necesidad. En relación con esto, sostuvo que es preciso analizar la normativa que rige la recolección y permanencia de la información que reposa en las bases de datos de la Fiscalía. Sin embargo, mencionó que no son fáciles de identificar (49).

    De otro lado, expresó que el registro indefinido de información que permita vincular a una persona con un proceso penal que terminó de forma anómala, “puede dar lugar a conductas de corte discriminatorio, a la construcción de sesgos cognitivos, o de prejuicios respecto del carácter o de las condiciones personales de la persona así reseñada”. Por consiguiente, sostuvo que, al no advertirse la satisfacción del principio de finalidad, el mantenimiento de ese tipo de información en el SPOA es inconstitucional y vulnera el derecho al habeas data en su dimensión objetiva. Igualmente, indicó que, en caso de cumplirse ese postulado y el de necesidad, no se advierte la existencia de una disposición que concrete el principio de caducidad.

    En cuanto a las órdenes a adoptar, sugirió las siguientes alternativas:

    i) en caso de considerar que no se cumplen los principios de finalidad y necesidad, ordenar a la Fiscalía suprimir la información que posee de la accionante. Al respecto, adujo que la entidad podría mantener la información con fines estadísticos, pero salvaguardando el anonimato;

    ii) en caso estimarse cumplidos esos principios, confirmar la decisión de segunda instancia, y estimar la posibilidad de incluir un término de caducidad de la información; y

    iii) invitar al legislador a regular la materia.

    Del traslado probatorio

    24.   El 9 de noviembre del año en curso, durante el término de traslado probatorio, la sociedad Cosinte allegó un escrito en cual reiteró no haber accedido al sistema informático SPOA, señalando que fue la accionante quien, en desarrollo de la visita domiciliaria, informó la existencia de procedimientos que la vinculaban con el actuar de la Fiscalía General de la Nación. Así mismo, adujo que los estudios de confiabilidad que realiza se centran en verificar  la información aportada por en la hoja de vida del interesado y analizar sus condiciones de vida mediante la visita domiciliaria (50).

    II. CONSIDERACIONES

    Competencia

    1.  La Sala Octava de Revisión de la Corte Constitucional es competente para revisar las decisiones proferidas dentro de la acción de tutela de la referencia, de conformidad con lo dispuesto en los artículos 86 y 241-9 de la Constitución Política y en concordancia con los artículos 31 a 36 del Decreto 2591 de 1991.

    Problemas jurídicos

    2.  Con base en los hechos descritos, le corresponde a la Sala Octava de Revisión determinar, en primer lugar, si la acción de tutela es procedente para verificar la presunta vulneración de derechos invocados por la accionante. En caso de superar el examen de procedibilidad, deberá resolver los siguientes problemas jurídicos:

    ¿La Fiscalía General de la Nación vulnera el derecho al habeas data de la accionante al registrar en el SPOA las anotaciones que le conciernen bajo las categorías “activo/inactivo”, sin hacer ninguna precisión sobre el estado procesal de la actuación?

    Así mismo, a partir de lo expuesto por las partes y la información recaudada en sede de revisión, la Corte analizará si ¿es procedente solicitar la supresión de los registros de las actuaciones que hayan concluido por una de las formas anormales de terminación del proceso penal -archivo, preclusión, aplicación del principio de oportunidad-?

    Por último ¿la sociedad Cosinte vulneró el derecho al buen nombre de la accionante al distribuir información imprecisa sobre ella, respecto a la existencia de antecedentes penales?

    Con el fin de responder estas cuestiones, la Corte abordará los siguientes temas:

    i) ámbito de protección del derecho fundamental al habeas data;

    ii) el derecho fundamental al buen nombre;

    iii) los antecedentes penales y anotaciones en los sistemas informáticos de la Fiscalía General de la Nación; y

    iv) el caso concreto.

    Ámbito de protección del derecho fundamental al habeas data. Reiteración jurisprudencial

    3.  El derecho al habeas data está instituido en el artículo 15 de la Constitución, según el cual “(t)odas las personas tienen derecho a conocer, actualizar y rectificar las informaciones que se hayan recogido sobre ellas en bancos de datos y en archivos de entidades públicas y privadas”. Conforme a la jurisprudencia de esta Corporación, ante el robustecimiento del poder informático -característico de la sociedad de información-, “el habeas data  surge como un cuerpo normativo singular orientado a proteger las libertades individuales” (51).

    Por “poder informático” se entiende una especie de dominio social sobre el individuo (52), que consiste en “la posibilidad de acumular informaciones en cantidad ilimitada. De confrontarlas y agregarlas entre sí, de hacerle seguimiento en una memoria indefectible, de objetivizarlas y trasmitirlas como mercancía (…)” (53). En este contexto, el habeas data también ha sido denominado: “derecho a la autodeterminación informática” (54), en tanto instrumento que permite a la persona titular del dato tener control del uso que sobre el mismo se haga en los diferentes repositorios de información.

    4.  En sentencia T-729 de 2002, la Corte indicó que el concepto “dato personal” presenta las siguientes cualidades:

    i) se refiere a aspectos exclusivos y propios de una persona natural,

    ii) permite identificar a la persona, en mayor o menor medida, gracias a la visión de conjunto que se logre con el mismo y con otros datos;

    iii) su propiedad reside exclusivamente en el titular del mismo, situación que no se altera por su obtención por parte de un tercero de manera lícita o ilícita, y

    iv) su tratamiento -captación, administración y divulgación- está sometido a determinados principios.

    5.  Esta Corporación ha señalado que el derecho al habeas data es de naturaleza dúctil o proteica, por cuanto tiene doble naturaleza. Por una parte, goza del reconocimiento constitucional como derecho autónomo y, por la otra, ha sido considerado como una garantía de otros derechos (55). A partir de estas características se ha dicho que el ámbito de acción u operatividad de esta prerrogativa se enmarca en el contorno en el cual se desarrollan los procesos de administración de bases de datos personales (56).

    6.  Es necesario destacar que el ámbito de protección del derecho en comento no se reduce a las posibilidades de “conocer, actualizar y rectificar”. A partir del mandado del artículo 15 superior y su desarrollo jurisprudencial, este Tribunal Constitucional también ha establecido una dimensión subjetiva del derecho al habeas data, la cual consiste en las alternativas de “autorizar, incluir, suprimir y certificar” (57).

    7.  Así mismo, es posible diferenciar entre un régimen constitucional y legal de protección del derecho al habeas data. El primero está dado en los llamados “principios de la administración de datos personales”. El segundo, está conformado por la normatividad contenida en las Leyes 1266 de 2008 (58), 1581 de 2012 (59), y 1621 de 2013 (60). De cara a la importancia que representa para la decisión del caso de la referencia, se hará una cita in extenso de la sentencia T-729 de 2002, sobre los principios constitucionales de la administración de datos personales:

    “Según el principio de libertad, los datos personales sólo pueden ser registrados y divulgados con el consentimiento libre, previo y expreso del titular, de tal forma que se encuentra prohibida la obtención y divulgación de los mismos de manera ilícita (ya sea sin la previa autorización del titular o en ausencia de mandato legal o judicial). En este sentido por ejemplo, se encuentra prohibida su enajenación o cesión por cualquier tipo contractual.

    Según el principio de necesidad, los datos personales registrados deben ser los estrictamente necesarios para el cumplimiento de las finalidades perseguidas con la base de datos de que se trate, de tal forma que se encuentra prohibido el registro y divulgación de datos que no guarden estrecha relación con el objetivo de la base de datos.

    Según el principio de veracidad, los datos personales deben obedecer a situaciones reales, deben ser ciertos, de tal forma que se encuentra prohibida la administración de datos falsos o erróneos.

    Según el principio de integridad, estrechamente ligado al de veracidad, la información que se registre o se divulgue a partir del suministro de datos personales debe ser completa, de tal forma que se encuentra prohibido el registro y divulgación de datos parciales, incompletos o fraccionados. Con todo, salvo casos excepcionales, la integridad no significa que una única base de datos pueda compilar datos que, sin valerse de otras bases de datos, permitan realizar un perfil completo de las personas.

    Según el principio de finalidad, tanto el acopio, el procesamiento y la divulgación de los datos personales, debe obedecer a una finalidad constitucionalmente legítima, definida de manera clara, suficiente y previa; de tal forma que queda prohibida la recopilación de datos sin la clara especificación acerca de la finalidad de los mismos, así como el uso o divulgación de datos para una finalidad diferente a la inicialmente prevista.

    Según el principio de utilidad, tanto el acopio, el procesamiento y la divulgación de los datos personales, debe cumplir una función determinada, como expresión del ejercicio legítimo del derecho a la administración de los mismos; por ello, está prohibida la divulgación de datos que, al carecer de función, no obedezca a una utilidad clara o determinable.

    Según el principio de circulación restringida, estrechamente ligado al de finalidad, la divulgación y circulación de la información está sometida a los límites específicos determinados por el objeto de la base de datos, por la autorización del titular y por el principio de finalidad, de tal forma que queda prohibida la divulgación indiscriminada de los datos personales.

    Según el principio de incorporación, cuando de la inclusión de datos personales en determinadas bases, deriven situaciones ventajosas para el titular, la entidad administradora de datos estará en la obligación de incorporarlos, si el titular reúne los requisitos que el orden jurídico exija para tales efectos, de tal forma que queda prohibido negar la incorporación injustificada a la base de datos.

    Según el principio de caducidad, la información desfavorable al titular debe ser retirada de las bases de datos siguiendo criterios de razonabilidad y oportunidad, de tal forma que queda prohibida la conservación indefinida de los datos después que han desaparecido las causas que justificaron su acopio y administración.

    Según el principio de individualidad, las administradoras deben mantener separadamente las bases de datos que se encuentren bajo su administración, de tal forma que queda prohibida la conducta dirigida a facilitar cruce de datos a partir de la acumulación de informaciones provenientes de diferentes bases de datos”.

    8.  A manera de colofón, el habeas data, como derecho autónomo o instrumento para proteger otras prerrogativas, es una garantía que salvaguarda la libertad de la persona, entendida no como posibilidad de locomoción sin restricciones, sino como la extensión que se hace de ella en medios virtuales o físicos de acopio de datos personales, en los cuales se construida o proyectada a través de la diferente información que se ha recogido de sí. De ahí que también reciba el nombre del derecho a la “autodeterminación informática”.

    Derecho fundamental al buen nombre (61). Reiteración jurisprudencial

    9.  El artículo 15 de la Constitución dispone que “(t)odas las personas tienen derecho (…) a su buen nombre”. También se encuentra establecido en el artículo 11-2 de la Convención Americana de Derechos Humanos, al señalar que “(n)adie puede ser objeto de injerencias arbitrarias o abusivas en su vida privada, en la de su familia, en su domicilio o en su correspondencia, ni de ataques ilegales a su honra y reputación (…)”.

    10.  El derecho al buen nombre ha sido entendido como “la reputación, o el concepto que de una persona tienen los demás y que se configura como derecho frente al detrimento que pueda sufrir como producto de expresiones ofensivas o injuriosas o informaciones falsas o tendenciosas” (62). En ese sentido, constituye “uno de los más valiosos elementos del patrimonio moral y social, y un factor intrínseco de la dignidad humana que a cada persona debe ser reconocida tanto por el Estado, como por la sociedad” (63).

    La Corte ha sostenido que “se atenta contra este derecho, cuando sin justificación ni causa  cierta y real, es decir, sin fundamento, se propagan  entre el público -bien sea de forma directa o personal, o a través de los medios de comunicación de masas- informaciones falsas o erróneas que distorsionan el concepto público que se tiene del individuo y que por lo tanto, tienden a socavar el prestigio o la confianza de los que disfruta del entorno social en cuyo medio actúa, o cuando en cualquier forma se manipula la opinión general  para desdibujar su imagen” (64).

    En sentencia T-050 de 2016, esta Corporación sostuvo que el buen nombre tiene una cercana relación con la dignidad humana, en la medida que, al referirse a la reputación, protege a la persona contra ataques que restrinjan su proyección en el ámbito público o colectivo (65).

    11.  En definitiva, el ámbito de protección de este derecho protege a la persona contra ataques externos que tienen afectar o desmejorar su reputación, a través de información falsa o errónea que distorsionan el concepto o la confianza que de él alberga el entorno social o colectivo, en razón de su comportamiento.

    Antecedentes penales y anotaciones en los sistemas informáticos de la Fiscalía General de la Nación

    12.  El artículo 248 de la Constitución consagra que “(ú)nicamente las condenas proferidas en sentencias judiciales en forma definitiva tienen la calidad de antecedentes penales”. Bajo ese entendido, estos últimos son una especie de dato personal negativo al representar situaciones “no queridas, perjudiciales, socialmente reprobadas o simplemente desfavorables” (66). Sin embargo, los antecedentes penales constituyen información pública, al estar permitido conocer algunos aspectos propios del proceso penal, por ejemplo, las circunstancias en las que ocurrieron los hechos, las razones jurídicas sustantivas y procesales que fundamentan la responsabilidad penal, y el monto de la pena (67).

    A tono con lo anterior, el artículo 166 de la Ley 906 de 2004 (68) ordena a los funcionarios judiciales informar a diferentes autoridades sobre la ejecutoria de una sentencia que imponga una pena o medida de seguridad, entre ellas, la Procuraduría General de la Nación, la Registraduría Nacional del Estado Civil, y “demás organismos que tengan funciones de policía judicial y archivos sistematizados”. Así mismo, prescribe dar cuenta de las sentencias absolutorias en firme a la Fiscalía General de la Nación “con el fin de realizar la actualización de los registros existentes en las bases de datos que se lleven, respecto de las personas vinculadas en los procesos penales”. En la actualidad, la Policía Nacional es la entidad encargada de administrar la base de datos personales sobre antecedentes judiciales (69).

    13.  Así las cosas, las anotaciones o registros que realiza la Fiscalía en sus bases de datos no constituyen antecedentes penales pues, reitérese, no se derivan de sentencias condenatorias en firme. Entre los repositorios de información administrados por esa entidad se encuentran el SIJUF (70) y el SPOA. Este último es en una herramienta operativa del Sistema Penal Oral Acusatorio, al cual pueden acceder los funcionarios de la Fiscalía de forma local o remota, con el fin de indagar sobre aspectos relacionados con las diferentes indagaciones o investigaciones que adelante la institución, atendiendo las directrices establecidas en la materia.

    Bajo ese contexto, el contenido del SPOA -llámese anotaciones o registros- se refiere a información sobre el desarrollo de las actuaciones penales, por ejemplo, el estado procesal y la identificación de las personas que en ella participan. Estos registros facilitan el funcionamiento administrativo que implica el ejercicio de la acción penal, esto es, la investigación y acusación de los hechos que revistan las características de un delito -art. 250 C. Pol-.

    14.  En tanto repositorio de información personal, la administración del SPOA debe atender el régimen constitucional y legal de protección de datos personales -ver supra núm. 7-. Entre las reglamentaciones internas de la Fiscalía General de la Nación se encuentra la Resolución n.° 4004 de 2013 (71), la cual consagra el alcance de la política de seguridad, la regulación del acceso a los sistemas administrativos misionales y las consecuencias que puede acarrear su infracción (72).

    15.  En conclusión, los antecedentes penales y los diferentes registros que adelanta la Fiscalía General de la Nación, en ejercicio de sus funciones, comparten la cualidad de ser datos personales. Sin embargo, ambos presentan diferencias respecto a su publicidad y administración.

    Caso concreto

    Cuestión preliminar: solicitud de nulidad

    16.  En la solicitud de selección del proceso de la referencia, de forma subsidiaria, la Fiscalía pidió declarar la nulidad de lo actuado a partir del auto admisorio por indebida integración del contradictorio. Al efecto, adujo que las pretensiones de la accionante no se concretaron únicamente sobre esa entidad, sino que también se extendieron a los “Frentes de Seguridad Empresarial, (…) el Sistema de Antecedentes y Anotaciones Judiciales -Sistema operativo de la Policía Judicial, denominado SIOPER-”. Además, mencionó que el fallo de segunda instancia hizo alusión a bases de datos de los organismos de seguridad del Estado. Por consiguiente, era necesario vincular a la Policía Nacional y a la Dirección Nacional de Inteligencia.

    La Sala considera que no es necesario declarar la nulidad solicitada teniendo en cuenta que, conforme el relato expuesto por la accionante y las pruebas allegadas al proceso, es posible identificar que la controversia gira en torno a las anotaciones realizadas en las bases de datos operadas por la Fiscalía General de la Nación -específicamente el SPOA- y ante una presunta divulgación irregular de los datos que le conciernen.

    Bajo ese entendido, entre las pruebas allegadas en el escrito de tutela, obra una constancia de antecedentes judiciales proferido el SIOPER que señala que la accionante “no tiene asuntos pendientes con las autoridades judiciales” (73), lo cual demuestra que las bases de datos operadas por la Policía Nacional no contienen información que relacione a la accionante con la existencia de antecedentes penales. De ahí que no sea necesaria la vinculación de esa institución.

    De otro lado, frente a la supuesta necesidad de vincular a la Dirección Nacional de Inteligencia, a juicio de la Sala, la controversia que suscita el caso objeto de revisión se concreta en la actuación de la Fiscalía y de la sociedad Cosinte frente al manejo de datos personales o información referida a la accionante, sin que se desprenda de los hechos y documentos allegados que los organismos de inteligencia del Estado hayan tenido alguna participación al respecto. Además, la accionante, en sus pretensiones, no hizo alusión a instituciones de esa naturaleza. Luego, no era procedente vincular a la Dirección Nacional de Inteligencia.  

    En esos términos, al haberse vinculado como accionadas a la Fiscalía General de la Nación y la sociedad Cosinte Ltda, el contradictorio se integró adecuadamente, sin perder de vista que les fue garantizado el derecho al debido proceso. En consecuencia, no hay lugar a declarar la nulidad. Así las cosas, se continuará con el desarrollo de los problemas jurídicos atrás planteados.

    Análisis de los requisitos de procedencia de la acción de tutela

    Antes de abordar el fondo del asunto, la Sala analizará el cumplimiento de los presupuestos de procedibilidad de la acción de tutela. Para ello, de forma concreta se establecerá si se cumplen los requisitos de:

    i) legitimación por activa y pasiva;

    ii) inmediatez; y

    iii) subsidiariedad.

    (i) Legitimación por activa y por pasiva

    17.  La legitimación por activa exige que quien promueva el mecanismo de tutela sea el titular de los derechos conculcados o un tercero que actúe en su representación debidamente acreditado para tal fin; mientras que la legitimación por pasiva hace alusión a la autoridad o el particular contra quien se dirige la acción. Sobre este último aspecto, el artículo 86 de la Constitución establece que la acción de tutela procede contra particulares en los siguientes casos:

    i) cuando tengan a cargo la prestación de un servicio público;

    ii) que su conducta afecte grave y directamente el interés colectivo; y

    iii) frente a quienes el solicitante se halle en estado de subordinación o indefensión.

    18.  La jurisprudencia constitucional diferenciado estos dos conceptos. La subordinación alude a la existencia de una relación jurídica de dependencia (74); mientras que la indefensión hace referencia a una relación de dependencia de una persona respecto de otra, derivada de situaciones de naturaleza fáctica en cuya virtud la persona afectada en su derecho carece de defensa, entendida como posibilidad de respuesta efectiva ante la violación o amenaza de que se trate (75).

    19.  Teniendo en cuenta los anteriores parámetros, la legitimación por activa se cumple, pues Anggy Lizeth C. F.instauró la acción de tutela a nombre propio al considerar vulnerados sus derechos fundamentales. Por otro lado, este requisito por pasiva también se satisface al haberse vinculado al trámite a la Fiscalía General de la Nación, toda vez que, en criterio de la accionante, esa entidad vulneró su derecho al habeas data al administrar de forma inadecuada los datos que le conciernen contenidos en el SPOA.

    Además, en segunda instancia fue vinculada la sociedad Cosinte, institución de carácter privado que tiene por objeto social realizar estudios de confiabilidad y/o de seguridad para la selección de personal (76), entre otros. A juicio de la Sala, esta labor pone en situación de indefensión a las personas examinadas, en razón a que la compañía tiene la facultad de estructurar el análisis, es decir, determinar los aspectos que deberán ser informados por el participante (p. ej., nivel educativo, experiencia profesional, situación socioeconómica), cuya valoración concluirá en la asignación de un nivel de riesgo (bajo, medio, alto), lo cual, en la práctica, incide en la posibilidad de contratación del evaluado ante la empresa que solicitó el estudio.

    Además, de acuerdo con los informes y pruebas que obran en el expediente, los conceptos de confiabilidad o seguridad no son conocidos por los examinados, por consiguiente, estos no cuentan con la oportunidad de solicitar la corrección de información equivocada o imprecisa que podría concluir en la exclusión del proceso de selección laboral. En ese orden, la Corte encuentra que existe una relación de indefensión entre la accionante y la sociedad Cosinte, que habilita la procedencia de la acción de tutela frente a particulares. Así las cosas, a juicio de la Sala, la mentada sociedad comercial tiene legitimación por pasiva dentro del presente trámite. 

    (ii)   Inmediatez

    20.  La jurisprudencia constitucional ha indicado que, en virtud del requisito de inmediatez, la interposición de la acción de tutela debe hacerse dentro de un plazo razonable y oportuno (77), contado a partir del momento en que ocurre la situación violatoria o amenazante de los derechos fundamentales, pues hacerlo después de haber transcurrido un tiempo considerable desnaturalizaría la esencia y finalidad del mecanismo de amparo, además de generar inseguridad jurídica.

    El requisito de inmediatez se supera en este asunto, ya que entre el momento en el que la Fiscalía General de la Nación respondió la petición de la actora -17 de septiembre de 2019- y la radicación de la acción de tutela -29 de octubre de 2019-, trascurrieron menos de 3 meses, término que se considera razonable. 

    (iii)      Subsidiariedad

    21.  Conforme al artículo 86 de la Constitución, la acción de tutela procede ante la vulneración o amenaza de derechos fundamentales “por la acción o la omisión” de cualquier autoridad pública o de particulares en ciertos casos. Esa disposición establece que solo procederá cuando el afectado no cuente con otro medio de defensa judicial, salvo que se utilice como mecanismo transitorio para evitar un perjuicio irremediable.

    22.  Quiere decir lo anterior que en virtud del requisito de subsidiariedad, para que proceda la acción de tutela es necesario que se hayan agotado todos los medios de defensa judiciales consagrados en el ordenamiento para la protección de los intereses fundamentales en disputa, salvo que estos no resulten idóneos o eficaces (78) para la salvaguarda de los derechos, caso en el cual el amparo a conceder será definitivo. De otro lado, puede invocarse como mecanismo transitorio cuando se pretenda evitar la ocurrencia de un perjuicio irremediable (79), escenario en el que la protección será transitoria hasta tanto el juez natural adopte la decisión de fondo que corresponda.  

    23.  En relación con la protección al habeas data, la Corte ha señalado que la acción de tutela es el mecanismo judicial procedente para solicitar la supresión de información contenida en bases de datos, siempre y cuando, el interesado lo haya solicitado previamente ante el sujeto responsable de su administración (80), conforme lo dispuesto en el artículo 15 de la Ley 1581 de 2012 (81).

    Al respecto, recuérdese que el 29 de agosto de 2019, la accionante radicó una petición ante la Fiscalía solicitando la supresión de sus datos de las bases manejadas por esa institución. La entidad le respondió que no era posible debido a las funciones que desempeña el SPOA, relacionadas con la elaboración de informes estadísticos, atender requerimientos de usuarios y/o autoridades administrativas o judiciales (82) -ver hechos 4 y 5-. Por consiguiente, en este caso la acción de tutela procede para solicitar el amparo del derecho al habeas data. Por último, valga precisar que la Sala se pronunciará más adelante acerca del diseño de la plataforma del SPOA, y la permanencia de los datos allí contenidos.  

    Breve presentación del asunto.

    24.  Anggy Lizeth C. F. promovió acción de tutela contra la Fiscalía General de la Nación al considerar que vulneró sus derechos fundamentales al no actualizar o suprimir las anotaciones que sobre ella reposan en el SPOA, lo cual podría estar afectando sus posibilidades de encontrar empleo. Al trámite constitucional fue vinculada la sociedad Cosinte como institución presuntamente responsable de divulgar información imprecisa de la actora, mediante la realización de estudios sobre sus circunstancias socio-económicas y judiciales.

    El juez de primera instancia no concedió el amparo de los derechos al considerar que el SPOA no era una base de datos pública, y al no haberse probado la relación entre la exclusión de oportunidades laborales y los registros adelantados por la Fiscalía. En cambio, la segunda instancia protegió los derechos, por consiguiente, ordenó a la Fiscalía complementar la información registrada sobre la situación procesal de la accionante, y a la sociedad Cosinte Ltda. realizar nuevos estudios en los cuales aludiera a la inexistencia de antecedentes penales.

    Análisis de fondo de la vulneración de los derechos al habeas data y buen nombre de la señora Anggy Lizeth Centrales Fino

    25.  De manera preliminar, la Sala considera necesario precisar que el análisis se centrará sobre la presunta vulneración de los derechos al habeas data y al buen nombre de la accionante, toda vez que de la narración de los hechos es posible advertir que estas garantías pudieron verse comprometidas ante las actuaciones que la accionante reprochó a la Fiscalía General de la Nación -negativa de actualizar o suprimir los datos- y de la sociedad Cosinte -divulgar información inexacta sobre la existencia de antecedentes-.

    26.  Bajo ese entendido, no se hará un pronunciamiento en torno a los derechos fundamentales de petición, a la honra y a la intimidad. El primero, por cuanto de las pruebas documentales que obran en el proceso, se avizora que la Fiscalía respondió la petición radicada por la actora el 29 de agosto de 2019, pronunciamiento que atendió el fondo de las cuestiones. Al respecto, es necesario recordar que la garantía del derecho de petición no consiste en ofrecer una respuesta afirmativa o acceder a lo solicitado, basta con que la respuesta atienda las características establecidas por la jurisprudencia constitucional (83).

    27.  Frente a los derechos a la intimidad y a la honra, considera la Sala que, en cuanto a la primera prerrogativa, si bien pudo haberse accedido de forma irregular o divulgado información reservada relacionada con la accionante, esta controversia guarda mayor injerencia con el derecho al habeas data. Por otro lado, esta providencia hará referencia a la presunta circulación de información imprecisa o falsa sobre la accionante, lo cual repercute con mayor énfasis en su reputación -buen nombre- que en su amor propio.

    Así las cosas, debe la Corporación analizar la incidencia que las actuaciones de la Fiscalía y la sociedad Cosinte tuvieron en los derechos fundamentales de la actora.

    Análisis de la actuación desplegada por la Fiscalía General de la Nación

    28.  La accionante le solicitó a la Fiscalía actualizar o corregir la información que sobre ella reposa en el en sistema misional del sistema penal acusatorio -SPOA-, cambiando el estado “inactivo” a “archivado” o suprimir sus datos de las bases manejadas por esa institución. La entidad no accedió, argumentando que la información contenida en ese sistema cumple un rol administrativo establecido para rendir informes estadísticos y responder requerimientos de usuarios o autoridades administrativas o judiciales. Así mismo, aclaró que las anotaciones no representan antecedentes judiciales, y tampoco es de acceso al público.

    29.  Bajo ese contexto y antes de desarrollar los problemas jurídicos atrás planteados, la Sala considera pertinente aclarar algunos presupuestos sobre el SPOA:

    i) más allá de representar una plataforma informática de recopilación de información del sistema penal acusatorio, esencialmente es una base de datos que permite relacionar a una persona con investigaciones que en su contra lleva a cabo la Fiscalía General de la Nación;

    ii) es diferente al sistema de consulta pública implementada por esa institución para indagar el estado procesal de las querellas, denuncias o investigaciones promovidas de oficio.

    Sobre el segundo aspecto, es posible establecer que el SPOA cuenta con dos modalidades de consulta: una reservada a funcionarios de la Fiscalía, y otra de carácter público. Según lo indicado por esa Entidad, la primera tiene por objeto brindar información para llevar a cabo informes estadísticos sobre la operatividad institucional, resolver solicitudes de usuarios o de autoridades. Además, cuenta con datos detallados sobre la actuación procesal, de ahí que su acceso esté limitado a los servidores quienes deben seguir el procedimiento interno a efectos de hacer consultas, para lo cual deben diligenciar los siguientes formatos: “solicitud de acceso a servicios TI”, y “acuerdo de confidencialidad de la información” (84).

    Por otro lado, el sistema de consulta ubicado en la página web de la entidad (85) es de acceso público, siempre y cuando el interesado cuente con el número de veintiún dígitos que identifica a la actuación objeto de indagación o investigación. Esta plataforma señala en qué etapa procesal se encuentra la actuación y cuál es la delegada fiscal a cargo, sin comprometer datos que permitan identificar a los participantes. 

    30.  Así las cosas, una vez hecha la anterior precisión, debe tenerse en cuenta que la acción de tutela objeto de revisión se concreta frente al sistema de consulta SPOA de uso institucional o restringido. Recuérdese que la Fiscalía informó que la descripción “inactivo” hace referencia a actuaciones que se encuentran archivadas, precluidas o con sentencia. Por lo cual, la expresión o el estado “activo” corresponde a los trámites en curso.

    31.  Una primera cuestión jurídica relevante que suscita el presente asunto es definir si las anotaciones que reposan en el SPOA vulneran el derecho al habeas data de las personas concernidas con la información. Así las cosas, a primera vista, la Sala considera que la respuesta a ese planteamiento es negativa, teniendo en cuenta el fin institucional que cumple tal repositorio en el quehacer constitucional a cargo de la Fiscalía General de la Nación, específicamente frente a la operatividad del sistema procesal penal de corte acusatorio implementado en el ordenamiento a través de la enmienda constitucional 03 de 2002, desarrollado mediante la Ley 906 de 2004 (86).

    Bajo ese entendido, los registros efectuados en esa plataforma satisfacen los principios constitucionales de finalidad, utilidad, y circulación restringida, los cuales gobiernan la administración de datos personales (este punto será desarrollado con mayor profundidad en los numerales 32, 35 y 36). 

    Así mismo, debe precisarse que si bien el registro, per se, no vulnera el derecho al habeas data, no significa que el ciclo del dato (recolección, tratamiento y circulación) (87) desatienda los parámetros decantados por la jurisprudencia relacionados con la administración de información personal, entre los que se encuentran los principios de finalidad, utilidad, veracidad. En tanto este planteamiento fue desarrollado durante el trámite de tutela, a continuación, se hará referencia a las actuaciones surtidas en primera y segunda instancia y, con base en ello, la Sala analizará si las medidas adoptadas fueron adecuadas para proteger los derechos fundamentales de la accionante o si es necesario proferir otro correctivo judicial.

    En ese sentido, se tiene que ante el juez de primera instancia la Fiscalía expresó que en el SPOA figuraban con dos registros sobre la actora, ambos con estado “inactivo” sin que fuera posible actualizar o corregir dicha descripción a “archivado”, puesto que la plataforma virtual solo permitía las alternativas activo/inactivo. 

    Posteriormente, y en cumplimiento de lo ordenado por el juez de segunda instancia, la Fiscalía adelantó las gestiones necesarias para que el sistema incluyera una descripción adicional sobre el estado procesal específico en el que se halla la actuación. En ese orden de ideas, en sede de revisión, el ente acusador manifestó que el SPOA presenta las siguientes anotaciones respecto de la accionante (88):

    n.° caso-noticia                                Estado                  Motivo

    110016000013201115051            INACTIVO           Desistimiento de la querella por inasistencia

                                                                                                  injustificada del querellante

    110016000015201212133            INACTIVO           Archivo por inexistencia del hecho art. 79 C.P.P

    32.  A juicio de la Sala, este cambio operativo se ajusta al principio de veracidad, como uno de los postulados que rigen la administración de las bases de datos. Según este principio la información contenida en repositorios de datos debe ser completa, exacta y comprensible. Además, exige que el registro y la divulgación de datos no conduzca a error (89). Esto último concuerda con lo afirmado por la accionante y la Universidad Externado al sostener que la expresión “inactivo” permite hacer interpretaciones que no corresponden a la realidad.

    Bajo esa idea y conforme la jurisprudencia constitucional, los principios de administración de información personal aplican para todas las bases de datos, con independencia de si son de acceso público o restringido. Por lo cual, para esta Corporación no es de recibo lo afirmado por la Fiscalía en el sentido de que “la facultad de rectificación o corrección, como uno de los contenidos mínimos que integran el derecho al habeas data, debe exigirse dentro de las finalidades y características del -SPOA-”. Al respecto, resulta oportuna una de las afirmaciones expuestas en la intervención allegada a la Corte, según la cual “(e)l diseño o la arquitectura del sistema no puede tiranizar el ejercicio de los derechos” (90).

    33.  En estos términos, deviene adecuada la orden proferida por el Tribunal Administrativo de Cundinamarca, y su cumplimiento por parte de la Fiscalía General de la Nación. Por consiguiente, al haberse adoptado un remedio judicial acorde con la protección de derechos fundamentales, la Corte no hará ningún pronunciamiento al respecto y, por consiguiente, confirmará el fallo de segunda instancia. Sin embargo, es necesario precisar que el ad quem amparó el derecho al debido proceso sin explicar en qué consistió su vulneración. Al no advertir que la accionante estuviera en medio de una actuación judicial o administrativa, la Sala considera que tal derecho no fue vulnerado pues, reitérese, la controversia giró en torno a los derechos al habeas data y al buen nombre, por tanto, no será objeto de protección.

    34.  Efectuado el anterior análisis, corresponde desarrollar el segundo problema jurídico que atañe a la Fiscalía General de la Nación. Esto es, establecer si es procedente solicitar la supresión del registro de actuaciones que hayan concluido por alguna de las formas anormales de terminación del proceso penal, por ejemplo: el archivo o la preclusión.

    Al efecto, reitérese que, según el ente acusador, el SPOA contribuye a realizar funciones administrativas, y a resolver solicitudes y requerimientos de usuarios y autoridades. Por su parte, la intervención de la Universidad Externado puso en duda el cumplimiento de los principios de finalidad y necesidad respecto de la permanencia de datos personales en la plataforma de consulta de la Fiscalía, teniendo en cuenta que se trata de información negativa, y que la entidad puede realizar los análisis estadísticos conservando el anonimato de las personas. Así mismo, sugirió a la Corte establecer un término de caducidad para ese tipo de datos.

    35.  A juicio de la Sala, se identifica una finalidad legítima en la conservación de las anotaciones o registros relacionados con actuaciones que se encuentren en estado “inactivo”, de cara al propósito que el Constituyente de 1991 le encargó a la Fiscalía General de la Nación consistente en “adelantar el ejercicio de la acción penal y realizar la investigación de los hechos que revistan las características de un delito” -art. 250 C. Pol.-.

    36.  La permanencia de esa información incide en algunas actuaciones del sistema procesal penal acusatorio consagrado en la Ley 906 de 2004 y en el diseño de la política criminal. Por ejemplo, el desarchivo, evitar dobles juzgamientos ante hechos en los que se declaró la preclusión, y el reconocimiento de la indemnización integral, como pasa a explicarse:

    Conforme el artículo 79 de la mentada ley, la Fiscalía puede disponer el archivo de la actuación cuanto “tenga conocimiento de un hecho respecto del cual constate que no existen motivos o circunstancias fácticas que permitan su caracterización como delito, o indiquen su posible existencia como tal”. Sin embargo, acto seguido, la disposición establece que “si surgieren nuevos elementos probatorios la indagación se reanudará mientras no se haya extinguido la acción penal”. 

    Esto significa que los registros en el SPOA de actuaciones en las que se dispuso el archivo, facilitan analizar el mérito de reanudar la indagación, pues las anotaciones virtuales permiten a los funcionarios conocer los pormenores del caso, por ejemplo, identificar las razones por las cuales se ordenó el archivo, y el relato fáctico de la noticia criminal, cuya temporalidad podría incidir en el término de prescripción de la acción penal. Lo anterior, sin necesidad de localizar el expediente físico para revisar estos detalles, agilizándose así la labor del ente acusador y, por ende, la atención a la ciudadanía.  

    De otro lado, conforme lo expuesto por esta Corporación en la sentencia C-920 de 2007, la aplicación de la preclusión por el juez de conocimiento -por tratarse de una decisión típicamente jurisdiccional que pone fin a la acción penal- hace tránsito a cosa juzgada. De esta manera, tener conocimiento de las indagaciones o investigaciones que han sido objeto de preclusión, evita que se adelanten nuevas actuaciones por los mismos hechos. Por último, conocer las actuaciones que han terminado por preclusión también incide en la extinción de la acción penal por indemnización integral -propia de la Ley 600 de 2000- para casos inmersos en la Ley 906 de 2004 (91).

    Por consiguiente, estos actos procesales demuestran que la permanencia de las anotaciones relacionadas con actuaciones que hayan concluido por alguna de las formas de terminación anormal del proceso penal -archivo, preclusión, etc., son útiles para la operatividad del sistema procesal penal de corte acusatorio. Así mismo, su supresión, en términos del principio de caducidad del dato negativo, no es procedente, pues los anteriores ejemplos demuestran la razonabilidad de su conservación.

    Como argumento adicional, aunque la Sala concuerda con el interviniente al señalar que las anotaciones del SPOA representan datos negativos, pues permiten asociar a la persona con la existencia presente o pasada de un proceso penal (92), no puede perderse de vista que tal anotación o registro no constituye un antecedente penal. Además, el acceso a esta información es, en principio, restringido a los funcionarios de la Fiscalía General de la Nación y a las personas que cuenten con el número de radicado de la querella o denuncia interpuesta ante el ente acusador, en caso de consultar la plataforma pública del SPOA.

    37.  Al respecto, según la información allegada por la Fiscalía, son posibles los ingresos o consultas irregulares al SPOA. Recuérdese que por este hecho esa entidad adelanta 19 investigaciones disciplinarias (93) sin contar la iniciada de oficio con ocasión de la acción de tutela de la referencia.

    38.  Frente a las medidas de seguridad con las que cuenta la Fiscalía para acceder a las bases de datos que administra, esa institución indicó que el manejo del SPOA sigue las pautas establecidas en la Resolución n.° 4004 de 2013. Al respecto, el artículo quinto y el numeral 5.5.5 consagran el alcance de la política de seguridad y la regulación sobre el acceso a los sistemas administrativos misionales. El tenor literal de las disposiciones es el siguiente:

    “Artículo Quinto. DECLARACIÓN DE POLÍTICA DE SEGURIDAD. Todos los empleados y funcionarios de la FISCALÍA GENERAL DE LA NACIÓN, así como terceros que deban realizar labores por medios lógicos o físico que involucren el manejo de información de la Entidad, deben velar por la disponibilidad, confidencialidad e integridad de los activos informáticos (94), cumpliendo con las políticas de seguridad establecidas y las correspondientes cláusulas de confidencialidad de la información que para su caso aplique”.

    “5.5.5. Acceso a los sistemas administrativos y misionales:

    a) Tendrá acceso a los sistemas administrativos solo el personal de la FISCALIA GENERAL DE LA NACION o la persona que tenga la autorización por parte de la Oficina de informática.

    b) El manejo de información administrativa que se considere de uso restringido deberá ser cifrado con el objeto de garantizar su integridad.

    c) Se prohíbe el acceso de personal no autorizado a los servidores de bases de datos, excepto para el personal autorizado de la Oficina de Informática.

    d) El servidor o funcionario de la Entidad deberá diligenciar el formato correspondiente para que le sea asignada una cuenta de acceso a los sistemas administrativos y misionales.

    e) El usuario se compromete a mantener la confidencialidad de su contraseña de acceso y de los datos consultados de carácter reservado, privado o confidencial” (95).

    39.  Estas disposiciones enfatizan que solo los funcionarios de la Fiscalía tienen acceso a los sistemas informáticos de la institución y en el deber de confidencialidad e integridad de los activos informáticos. De otra parte, en los considerandos de la Resolución, la entidad especificó cuál es la normativa que guía la política de seguridad informática, así:

    “Que las normas y políticas de seguridad informática en la Fiscalía General de la Nación se encuentran enmarcadas en preceptos Constitucionales, Leyes, Decretos, Convenios Internacionales, así como en Resoluciones, Circulares y Memorandos proferidos por la Entidad, Entre las que se encuentran:

    a.   Ley de Delitos informáticos: Ley 1273 de enero de 2009.

    b.  Ley de Correo Electrónico: Ley 527 de 1999.

    c.   Decreto 1747 del 2000: Por el cual se reglamenta parcialmente la Ley 527 de 1999.

    d.  Ley General del Archivo: Ley 594 de 2000 – El Párrafo 1 del artículo 19… ‘están en la obligación de garantizar la autenticidad, integridad y la inalterabilidad de la información allí consignada…’

    e.   Código de Ética y Buen Gobierno: Adoptado mediante Resolución (…).

    f.    Código sustantivo del trabajo: Artículo 58 –Obligaciones Especiales del Trabajador, 3ª… ‘Conservar y restituir en buen estado, salvo el deterioro natural, los instrumentos y útiles que le hayan sido facturados y las materias primas sobrantes…’.

    g.   Ley de Derechos de Autor: Ley 23 de 1982.

    h.  Ley de habeas data: Ley 1266 de Diciembre de 2008 (96).

    40.  A juicio de la Sala, este listado de leyes permite advertir que la normativa que guía la política de seguridad al interior del ente acusador va encaminada, en mayor medida, a la protección de los objetos, enseres materiales o inmateriales, llámese la “infraestructura de TIC” -hardware y software-, más que hacia la protección del derecho al habeas data de las personas registradas o reseñadas en sus sistemas informáticos. Valga precisar que a pesar que la lista menciona la Ley Estatutaria del derecho al habeas data –Ley1266 de 2008-, la regulación de la Resolución 4004 de 2013 no hace ninguna alusión a los principios de la administración de datos personales, ni siquiera menciona el derecho al habeas data.

    41.  Por consiguiente, la Sala le ordenará a la Fiscalía General de la Nación, en cuanto entidad que administra bases de datos, velar por la protección del derecho al habeas data de las personas objeto de anotaciones o registros en los diferentes sistemas informáticos con los que opera esa institución, para lo cual deberá tener en cuenta los principios constitucionales y legales que guían la administración de datos personales.  

    Así mismo, se remitirá copia del fallo de revisión a la Procuraduría General de la Nación para que, en el ámbito de sus competencias, realice un seguimiento de las indagaciones e investigaciones disciplinarias realizadas al interior de la Fiscalía relacionadas con ingresos o divulgación irregular de información reservada. Igualmente, para que adelante las acciones a las que haya lugar en caso de encontrar mérito. 

    Análisis de la actuación desplegada por la sociedad Cosinte Ltda

    42.  La accionante consideró que la sociedad Cosinte vulneró su derecho al habeas data, al señalar: “niego que, en momento alguno haber otorgado mi consentimiento para que se ingresaran a su información de carácter restringido de esa entidad (Fiscalía General de la Nación)” (97). Al respecto, es necesario reiterar que el diseño de la plataforma del SPOA ocasionó la vulneración al derecho al habeas data al clasificar el estado de las actuaciones como “activas/inactivas” sin hacer ninguna otra precisión. Sin embargo, esta situación se remedió con el fallo de segunda instancia, conforme a lo atrás indicado. Así las cosas, a partir de lo acreditado durante el trámite de la referencia, es necesario analizar si Cosinte Ltda. vulneró el derecho al buen nombre de la accionante.

    43.  Al efecto, en los estudios realizados a la accionante “con fecha de entrega” del “2018-12-27” y el “2019-09-03”, Cosinte expresó:

    “5. ANTECEDENTES: Consultadas las bases de datos de los organismos de seguridad del Estado, se confirmó registra antecedentes. (…) || CONCLUSIÓN: Luego de consultadas las bases de datos de los organismos de seguridad del Estado, se encontró que la evaluada REGISTRA DOS PROCESOS EN SU CONTRA. Teniendo en cuenta lo anterior, se considera que la candidata representa un nivel de riesgo MEDIO”. (98).

    De otro lado, a partir de los documentos solicitados en sede de revisión, la sociedad allegó copia del estudio de confiabilidad realizado a la accionante, con “fecha de entrega 2020-02-11”, en el cual dejó constancia de los siguiente:

    “4. VISITA DOMICILIARIA: (…) Señala que cuenta con dos procesos en la fiscalía por hurto y lesiones personales, afirma que los procesos se encuentran inactivos. (…)

    5. ANTECEDENTES: Consultadas las bases de datos públicas disponibles, se pudo evidenciar que la persona evaluada no registra anotaciones; sin embargo, ella manifiesta que cuenta que dos procesos en la Fiscalía por los delitos de hurto y lesiones personales, los cuales afirma se encuentran inactivos. (…)

    CONCLUSIÓN: El presente estudio de seguridad y confiabilidad, se modifica en cumplimiento de la orden impartida por el Tribunal Administrativo de Cundinamarca Sección Segunda – Subsección “A” de acuerdo a la impugnación de tutela N° AT-2019-00432, con fecha 05 de febrero de 2020 lo anterior, como mecanismo de restablecimiento al buen nombre de la accionante. Una vez hecha la anterior observación, se emite un nivel de riesgo BAJO” (99).

    44.  Al comparar los estudios realizados con anterioridad a la presentación de la acción de tutela, y el realizado en cumplimiento del fallo de segunda instancia, la Sala considera relevante destacar tres aspectos:

    i) Los dos primeros análisis incurrieron en una falsedad al establecer que la accionante “registra antecedentes” (100), equiparando las anotaciones o registros con antecedentes penales;

    ii) Tal distorsión de la verdad, tuvo la entidad de afectar el derecho al buen nombre de la accionante, por cuanto la información que vincula a una persona con el ejercicio del ius puniendi en cabeza de la Fiscalía General de la Nación, constituye un dato negativo, dadas las circunstancias perjudiciales o desfavorables que de él se derivan. Además, afectó su reputación al ser una información imprecisa (101), cuyos efectos tienen la entidad suficiente para proyectarse e incidir en el ámbito público o colectivo (102).  Afirmar que una persona registra antecedentes penales equivale a decir que un día cometió un delito/contravención, que por ella fue procesada y el Estado le impuso una pena.

    iii) Aunque el último estudio establece que la actora no registra anotaciones         -antecedentes-, acto seguido indica que cuenta con dos procesos en la Fiscalía en estado inactivo (103). A pesar que esto último es veraz, incurre en la falencia identificada en la sentencia de segunda instancia frente al diseño del SPOA, y sobre lo cual la Sala se pronunció párrafos atrás -ver supra núms. 25-28-.

    45.  Por consiguiente, teniendo en cuenta que el estudio refiere que la accionante cuenta con dos procesos judiciales en estado “inactivo”, y que las anotaciones o registros en las bases de datos a cargo de la Fiscalía constituyen un dato negativo con capacidad de someter al sujeto concernido por el dato a condiciones de discriminación o exclusión, la Sala le ordenará a la sociedad Cosinte Ltda que en próximos estudios que realice de la accionante, omita referir actuaciones penales con estado “inactivo” o, en caso de mencionarlas, especifique la situación procesal que sustenta esa descripción -el archivo, desistimiento de la querella, preclusión-.

    46.  De otro lado, a partir de lo evidenciado en el desarrollo de este trámite, se tiene que Cosinte vulneró el derecho al buen nombre de la accionante, por lo que se adoptarán órdenes tendientes a su reivindicación. Sin embargo, no se descarta que la afectación causada sea susceptible de ser reparada, empero, dada la naturaleza jurídica de la acción de tutela cuyo fin esencial es salvaguardar las garantías superiores -es decir que, en principio, no persigue la indemnización de perjuicios (104)-, se advierte a la actora que puede ejercer la acción de responsabilidad civil extracontractual si así lo considera.

    47.  Por último, en consideración a que la sociedad Cosinte está sometida a las funciones de inspección, control y vigilancia de la Superintendencia de Vigilancia y Seguridad Privada (105), la Sala le remitirá copias de la presente decisión a esa entidad para que, en el ámbito de sus funciones (106), indague si la sociedad pudo haber incurrido en alguna actuación irregular en el acopio de los datos personales de la accionante, y si tal situación puede dar lugar a alguna de las sanciones establecidas en el artículo 76 del Decreto Ley 356 de 1994 (107).

    III. SÍNTESIS DE LA DECISIÓN

    La Sala revisó la acción de tutela formulada contra la Fiscalía General de la Nación, trámite al que fue vinculada la sociedad Cosinte Ltda. La accionante consideró que la Fiscalía vulneró su derecho al habeas data al no actualizar las anotaciones que reposan sobre ella con estado “inactivo” en el SPOA o suprimir esa información. Por otro lado, esta Corporación analizó si la segunda vulneró el derecho al buen nombre al divulgar información imprecisa sobre la existencia de antecedentes penales a través de estudios de confiabilidad y/o financieros.

    La Corporación acreditó que las opciones de consulta “activo/inactivo” con las que opera el SPOA -de uso restringido o institucional- contraría las reglas de administración de datos personales, específicamente, el principio de veracidad, según el cual la información recopilada debe ser completa, exacta y compresible. Sin embargo, esta situación se superó con lo ordenado en el fallo de segunda instancia, al haberse modificado esa plataforma virtual indicando con mayor precisión el estado procesal de la actuación penal. Por consiguiente, la Sala confirmó esa decisión. Por otro lado, respecto a la petición de suprimir los datos relacionados con actuaciones “inactivas”, la Sala consideró que no era procedente al advertir que la permanencia de la información atiende los principios de finalidad y necesidad. 

    De otro lado, se adoptó una orden adicional al remitir copia de la presente decisión a la Procuraduría General de la Nación para que lleve a cabo seguimiento de las investigaciones disciplinarias al interior de la Fiscalía por ingresos irregulares al SPOA.

    Frente a la sociedad Cosinte Ltda., se constató que vulneró el derecho fundamental al buen nombre de la accionante al divulgar información imprecisa sobre ella relacionada con la existencia de antecedentes. Si bien se probó que la sociedad realizó nuevos estudios corrigiendo la información, estos fueron imprecisos al hacer referencia a actuaciones “inactivas”, es decir, sin mencionar las circunstancias que sustentan esa descripción. Así mismo, la Corte decidió remitir copia de esta sentencia a la Superintendencia de Vigilancia y Seguridad Privada para que, en ejercicio de sus competencias, verifique si Cosinte Ltda. pudo haber incurrido en una conducta irregular en el acopio de datos personales de la accionante. 

    VI. DECISIÓN

    En mérito de lo expuesto, la Sala Octava de Revisión de la Corte Constitucional, administrando justicia en nombre del pueblo y por mandato de la Constitución Política,

    RESUELVE

    Primero. CONFIRMAR la sentencia del 4 de febrero de 2020 de la Subsección “A”, Sección Segunda del Tribunal Administrativo de Cundinamarca que protegió los derechos al habeas data y al buen nombre de Anggy Lizeth Cendales Fino, vulnerados por la Fiscalía General de la Nación y la Sociedad Consultoría Seguridad Integral y Compañía Limitada -Cosinte Ltda.-, conforme las razones expuestas en esta providencia. Adiciónese las siguientes disposiciones:

    Segundo. ORDENAR a la Fiscalía General de la Nación, en cuanto entidad que administra bases de datos, velar por la protección del derecho al habeas data de las personas objeto de anotaciones o registros en los diferentes sistemas informáticos con los que opera esa institución, para lo cual deberá tener en cuenta los principios constitucionales y legales que guían la administración de datos personales, de conformidad con lo señalado en esta decisión.

    Tercero. ORDENAR a la Sociedad Cosinte Ltda. que en los próximos estudios que realice de Anggy Lizeth Cendales Fino, OMITA referir actuaciones judiciales de carácter penal con estado “inactivo” o, en caso de mencionarlas, especifique la situación procesal da lugar a esa descripción, de acuerdo con la parte motiva de esta sentencia.

    Cuarto. REMITIR copia del presente fallo a la Procuraduría General de la Nación para que, en el ámbito de sus competencias, realice seguimiento de las investigaciones disciplinarias realizadas al interior de la Fiscalía relacionadas con ingresos o divulgación irregular de información reservada. Igualmente, para que adelante las acciones a las que haya lugar en caso de encontrar mérito.

    Quinto. REMITIR copia del presente fallo a la Superintendencia de Vigilancia y Seguridad Privada para que, en el ámbito de sus funciones de inspección, control y vigilancia, verifique si la Sociedad Cosinte Ltda. pudo haber incurrido en alguna actuación irregular en el acopio de los datos personales de la accionante. Lo anterior, con base en lo expuesto en este proveído.

    Sexto. LÍBRENSE por Secretaría General las comunicaciones de que trata el artículo 36 del Decreto Estatutario 2591 de 1991.

    Notifíquese, comuníquese, publíquese y cúmplase.

    JOSÉ FERNANDO REYES CUARTAS, Magistrado

    RICHARD S. RAMÍREZ GRISALES, Magistrado (e.)

    ALBERTO ROJAS RÍOS, Magistrado

    MARTHA VICTORIA SÁCHICA MÉNDEZ, Secretaria General

     ———————————————————-

    (1) La narración de los hechos se complementó a partir de los diferentes documentos que obran en el expediente con la finalidad de facilitar el entendimiento del caso.

    (2) De ahora en adelante: “Consinte Ltda.” o “la sociedad Cosinte”.

    (3) Cuaderno de segunda instancia, folio 19. Cargo a ocupar: Asistente contable.

    (4) Idem, folio 21. Cargo a ocupar: Analista de cartera.

    (5) Idem, folios 19 vto y 21 vto.

    (6) Cuaderno de primera instancia, folio 1.

    (7) Idem, folio 9. Inicialmente, la petición fue radicada ante la Dirección Seccional de Fiscalías Bogotá, la cual la remitió por competencia, ver cuaderno de primera instancia folio 6.

    (8) Idem.

    (9) Idem, folio 10.

    (10) Idem, folio 3.

    (11) Idem, folio 3.

    (12) Idem.

    (13) Cuaderno de primera instancia, folio 14.

    (14) En el auto admisorio, la autoridad judicial aclaró lo siguiente: “(h)ágase la salvedad referente a que, de no ser el funcionario competente para el conocimiento de la acción de la referencia, se remita de manera inmediata al que ostente dicha facultad, informando tal situación al Despacho”.

    (15) Cuaderno de primera instancia, folio 20.

    (16) Idem, folio 25.

    (17) Sistema de Información Judicial de la Fiscalía, Ley 600 de 2000.

    (18) Cuaderno de primera instancia, folio 29.

    (19) Idem, folio 40.

    (20) Idem, folios 41-44.

    (21) Idem, folio 6.

    (22) Cuaderno de primera instancia, folios 149-153.

    (23) Cuaderno de segunda instancia, folio 11.

    (24) Idem, folios 19 y 21.

    (25) idem, folios 25-34.

    (26) Idem, folio 33.

    (27) Cuaderno de primera instancia, folios 7 y 8.

    (28) Idem, folio 9.

    (29) Idem, folio 10.

    (30) Cuaderno de segunda instancia, folios 19 y 21, respectivamente.

    (31) Idem. Folios 20 y 22.

    (32) La Entidad solicitó la selección de la acción de tutela y, de forma subsidiaria, pidió declarar la nulidad de lo actuado a partir del auto admisorio por indebida integración del contradictorio. Este último aspecto será abordado como cuestión preliminar al analizar el caso concreto.

    (33) Conformada por la Magistrada Cristina Pardo Schlesinger y el Magistrado José Fernando Reyes Cuartas.

    (34) Cuaderno de la Corte, folios 19 a 32 vto.

    (35) Cuaderno de la Corte, folio 36.

    (36) Al respecto, el Despacho invitó al Observatorio Ciro Angarita Barón de la Universidad de los Andes, la Fundación Karisma, y los departamentos de derecho constitucional de las Universidades Externado, de Caldas y Nacional -sede Bogotá-.

    (37) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “Expediente T-7.845.433 –Oficio N. OPTB -618-20- (…)”.

    (38) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “2 Y 3. ANEXOS RESPUESTA INCIDENTE DE DESACATO (…)”.

    (39) El documento señala que la accionante presenta un “nivel de riesgo bajo”. Así mismo, hace una descripción de sus condiciones personales, familiares, académicas, y labores. Otro de los puntos se refiere a las observaciones realizadas en la visita domiciliaria, acápite que da cuenta de los hábitos de la entrevistada, de las características que presenta la residencia y del entorno en el que está ubicada. Por último, establece que “no registra anotaciones”. Sin embargo, señala que la accionante manifestó contar con dos “procesos” “inactivos” en la Fiscalía. Ver cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “5. Estudios de confiabilidad y análisis de información financiera”.

    (40) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “v.d. 20201014RTA AUTO DE PRUEBAS TUTELA ANGGY CENDALES”.

    (41) “Por la cual se actualizan las políticas de seguridad de la información, emitidas mediante la Circular DFGN-0001, mayo 6 de 2006 del Fiscal General de la Nación”.

    (42) Resolución 4004 de 2013, artículo 1.

    (43) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “v.d. 20201014RTA AUTO DE PRUEBAS TUTELA ANGGY CENDALES”, pág. 7.

    (44) Idem, pág. 3.

    (45) Idem, pág. 7.

    (46) A pesar de la invitación realizada en el auto de pruebas, la Corte solo recibió la intervención de la Universidad Externado de Colombia.

    (47) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “Intervención ciudadana Universidad Externado de Colombia”, el documento está suscrito por el docente Juan Carlos Upegui Mejía.

    (48) Respecto de la dimensión objetiva del derecho al habeas data, el concepto señala los siguientes dos planteamientos:

    “a) Si la actora tiene derecho a obtener la rectificación de la información contenida en la base de datos del SPOA consistente en la calificación de inactivo de un proceso penal en su contra, cuando este ha concluido por una de las formas anormales de terminación del proceso penal, y por ende de cesación del ejercicio de la acción penal (desistimiento de la querella, archivo, preclusión) con el propósito de que dicha información se acerque en la mayor medida de lo posible a la realidad procesal del caso”, y

    “b) Si la actora tiene derecho a obtener la eliminación definitiva de la información contenida en la base de datos del SPOA consistente en la calificación de inactivo de un proceso penal, cuando este ha concluido por una de las formas anormales de terminación del proceso penal, y por ende de cesación del ejercicio de la acción penal (desistimiento de la querella, archivo, preclusión) si no existe una finalidad constitucionalmente legítima que habilite conservar esta información en el SPOA”.

    En relación con la dimensión subjetiva:

    “c) Si la Fiscalía General de la Nación desconoce el derecho fundamental al habeas data en su dimensión objetiva si, dentro de los criterios de administración de la base de datos del SPOA, no existen normas con fuerza formal de ley, que precisen que el mantenimiento de información relacionada con procesos penales en los que ha cesado el ejercicio de la acción penal, y por tanto han terminado de forma anómala (por desistimiento de la querella, archivo o preclusión) cumple con una finalidad constitucionalmente legítima y es por tanto necesaria para el cumplimiento o la satisfacción de dicha finalidad” y, por último

    “d) si la Fiscalía General de la Nación desconoce el derecho fundamental al habeas data en su dimensión objetiva si ha facilitado o no ha impedido el acceso a la información personal contenida en el SPOA a terceras personas no legitimadas para ello, y por tanto ha desconocido los principios de circulación restringida y de seguridad de la información personal”.

    (49) Al respecto, el interviniente afirmó que los Decretos Ley 016 de 2014 -Por el cual se modifica y define la estructura orgánica y funcional de la Fiscalía General de la Nación-, y 898 de 2017, que lo adiciona, subroga y deroga parcialmente, no hacen referencia a un registro, sistema de información o base de datos que se relaciones con el sistema penal oral y acusatorio.

    (50) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “Expediente T-845.433 –Oficio N. OPTB 723-20 (…)”.

    (51) Sentencia SU-458 de 2012.

    (52) Sentencia T-414 de 1992.

    (53) Idem.

    (54) La sentencia T-414 de 1992 lo definió “derecho a la libertad informática”, y la sentencia SU-082 de 1995 lo denominó “derecho a la autodeterminación informática”. 

    (55) Sentencia SU-458 de 2012.

    (56) Sentencia T-729 de 2002. En esta providencia, la Corte expresó que el contexto material de este derecho está dato por “el objeto o la actividad de las entidades administradoras de bases de datos, las regulaciones internas, los mecanismos técnicos para la recopilación, procesamiento, almacenamiento, seguridad y divulgación de los datos personales y la reglamentación sobre usuarios de los servicios de las administradoras de las bases de datos”.

    (57) Sentencia SU-458 de 2012.

    (58) “Por la cual se dictan las disposiciones generales del hábeas data y se regula el manejo de la información contenida en bases de datos personales, en especial la financiera, crediticia, comercial, de servicios y la proveniente de terceros países y se dictan otras disposiciones”. Valga referir que la sentencia C-1011 de 2008, consideró que los principios contenidos en la ley estatutaria de habeas data financiero eran constitucionales y que, además, su aplicación era extensiva a todas las bases de datos personales sin importar que la regulación estudiada tenía un marcado carácter sectorial, reiterado de la sentencia SU-458 de 2012.

    (59) “Por la cual se dictan disposiciones generales para la protección de datos personales”.

    (60) “Por medio de la cual se expiden normas para fortalecer el Marco Jurídico que permite a los organismos que llevan a cabo actividades de inteligencia y contrainteligencia cumplir con su misión constitucional y legal, y se dictan otras disposiciones”.

    (61) Algunas de las consideraciones de este acápite son reiteradas de la sentencia SU-274 de 2019.

    (62) Sentencia C-489 de 2002. Cfr. Sentencia T-022 de 2017.

    (63) Sentencia T-977 de 1999. Cfr. Sentencia T-022 de 2017.

    (64) Sentencia T-471 de 1994.

    (65) La jurisprudencia constitucional ha diferenciado los derechos a la honra y al buen nombre. Aunque que guardan una relación de interdependencia, “el primero responde a la apreciación que se tiene de la persona a partir de su propia personalidad y comportamientos privados directamente ligados a ella, el segundo se refiere a la apreciación que se tiene del sujeto por asuntos relacionales ligados a la conducta que observa en su desempeño dentro de la sociedad”, sentencia C-452 de 2016.

    (66) Sentencia C-185 de 2003.

    (67) Sentencia SU-458 de 2012.

    (68) Código de Procedimiento Penal.

    (69) De conformidad con los Decretos 4057 de 2011 y 233 de 2012.

    (70) Las siglas “SIJUF” significan: Sistema de Información Judicial de la Fiscalía Ley 600.

    (71) “Por la cual se actualizan las políticas de seguridad de la información, emitidas mediante la Circular DFGN-0001, mayo 6 de 2006 del Fiscal General de la Nación”.

    (72) Al respecto, la sección 5.2. establece lo siguiente: “Responsabilidades de los usuarios. Todos los servidores de la FISCALÍA GENERAL DE LA NACIÓN, deberán conocer, entender y asumir sus responsabilidades con respecto al cumplimiento de las políticas de seguridad de la información, así como: a) El incumplimiento de algunas de las políticas o normas estipuladas en este documento que conlleve a un incidente de seguridad, implicará el proceso respectivo por parte de la entidad para establecer la responsabilidad del usuario involucrado. (…)”.

    (73) Cuaderno de primera instancia, folio 9. El documento precisa que, en cumplimiento de la sentencia SU-458 de 2012, dicha descripción aplica “para todas aquellas personas que no registran antecedentes y para quienes la autoridad judicial competente haya decretado la extinción de la condena o la prescripción de la pena”.

    (74) En sentencia T-233 de 1994, la Corte indicó que la subordinación se ha entendido como “el acatamiento y sometimiento a órdenes proferidas por quienes, en razón de sus calidades, tienen la competencia para impartirlas’ (74), encontrándose entre otras,

    (i) las relaciones derivadas de un contrato de trabajo;

    (ii) las relaciones entre estudiantes y directivas del plantel educativo;

    (iii) las relaciones de patria potestad originadas entre los hijos menores y los incapaces respecto de los padres, o

    (iv) las relaciones entre los residentes de un conjunto residencial y las juntas administradoras de los mismos”, (pronunciamiento reiterado en las sentencias T-188 de 2017 y T-043 de 2020).

    (75) La jurisprudencia constitucional también ha establecido que relaciones de indefensión se pueden constituir en las siguientes situaciones:

    “(i) (l)a falta, ausencia o ineficacia de medios de defensa legales, materiales o físicos, que le permitan al particular que instaura la acción contrarrestar los ataques o agravios, que contra sus derechos sean inferidos por el particular contra el cual se impetra la acción;

    (ii) La imposibilidad de satisfacer una necesidad básica o vital, por la forma irracional, irrazonable y desproporcionada en la que un particular ejerce una posición o un derecho del que es titular;

    (iii) La existencia de un vínculo afectivo, moral, social o contractual, que facilite la ejecución de acciones u omisiones que resulten lesivas de derechos fundamentales de una de las partes;

    (iv) En el uso de medios o recursos que buscan, por medio de la presión social, que un particular haga o deje de hacer algo en favor de otro, por ejemplo la publicación de la condición de deudor de una persona por parte de su acreedor en un diario de amplia circulación, o la utilización de personas con determinadas características para efectuar el cobro de acreencias”, sentencia T-181 de 2017, reiterada en la sentencia T-030 de 2018.

    (76) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “1. Camara de comercio Cosinte Ldta”, pág. 3.

    (77) Sentencias T-834 de 2005 y T-887 de 2009.

    (78) En sentencia T-313 de 2017, la Corte adujo que una acción judicial es idónea “cuando es materialmente apta para producir el efecto protector de los derechos fundamentales” y efectiva “cuando está diseñada para brindar una protección oportuna a los derechos amenazados o vulnerados”. De otro lado, autores nacionales han identificado la idoneidad como “la capacidad o aptitud del medio para dar una respuesta a la pregunta constitucional”, situación en la que se valora, por ejemplo, la aceptación de las posturas adoptadas por la Corte a través de su jurisprudencia o la formalidad exigida en el mecanismo judicial. Frente a la eficacia aducen que “los criterios claves para la evaluación son la oportunidad e integralidad de la respuesta”, en este punto deben ser valoradas las categorías de “sujeto de especial protección”, “tercera edad”, “expectativa promedio de vida”, entre otras. (Luis Manuel Castro Novoa y Cesar Humberto Carvajal Santoyo, en “Acciones Constitucionales. Módulo I, acción de tutela” 2017).

    (79) La jurisprudencia constitucional ha establecido que la configuración de un perjuicio irremediable requiere que este sea:

    “(i) inminente, es decir, por estar próximo a ocurrir;

    (ii) grave, por dañar o menoscabar material o moralmente el haber jurídico de la persona en un grado relevante;

    (iii) urgente, que requiera medidas urgentes para conjurarlo; y

    (iv) que la acción de tutela sea impostergable a fin de garantizar el adecuado restablecimiento del orden social justo en toda su integridad” (Sentencia T-326 de 2013, reiterada en la sentencia T-328 de 2017) (resalto añadido).

    (80) Sentencias T-176A de 2014, y T-490 de 2018, entre otras.

    (81) Ley 1581 de 2012, Art. 15. Reclamos. “El Titular o sus causahabientes que consideren que la información contenida en una base de datos debe ser objeto de corrección, actualización o supresión, o cuando adviertan el presunto incumplimiento de cualquiera de los deberes contenidos en esta ley, podrán presentar un reclamo ante el Responsable del Tratamiento o el Encargado del Tratamiento el cual será tramitado bajo las siguientes reglas: 1. El reclamo se formulará mediante solicitud dirigida al Responsable del Tratamiento o al Encargado del Tratamiento, con la identificación del Titular, la descripción de los hechos que dan lugar al reclamo, la dirección, y acompañando los documentos que se quiera hacer valer. Si el reclamo resulta incompleto, se requerirá al interesado dentro de los cinco (5) días siguientes a la recepción del reclamo para que subsane las fallas. Transcurridos dos (2) meses desde la fecha del requerimiento, sin que el solicitante presente la información requerida, se entenderá que ha desistido del reclamo. En caso de que quien reciba el reclamo no sea competente para resolverlo, dará traslado a quien corresponda en un término máximo de dos (2) días hábiles e informará de la situación al interesado. 2. Una vez recibido el reclamo completo, se incluirá en la base de datos una leyenda que diga “reclamo en trámite” y el motivo del mismo, en un término no mayor a dos (2) días hábiles. Dicha leyenda deberá mantenerse hasta que el reclamo sea decidido. 3. El término máximo para atender el reclamo será de quince (15) días hábiles contados a partir del día siguiente a la fecha de su recibo. Cuando no fuere posible atender el reclamo dentro de dicho término, se informará al interesado los motivos de la demora y la fecha en que se atenderá su reclamo, la cual en ningún caso podrá superar los ocho (8) días hábiles siguientes al vencimiento del primer término”. Cfr. Sentencias T-022 de 2017, T-032 de 2017 y T-167 de 2015.

    (82) Cuaderno de primera instancia, folio 9.

    (83) Al respecto, en sentencia T-2016 de 2018, la Corte reiteró que el derecho de petición garantiza una respuesta oportuna, eficaz, de fondo y congruente con lo solicitado.

    (84) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “v.d. 20201014 RTA AUTO PRUEBAS TUTELA ANGGY CENDALES”.

    (85) “https://www.fiscalia.gov.co/colombia/” ventana: “Casos registrados en la base de datos del Sistema Penal Oral Acusatorio (SPOA)”.

    (86) “Por la cual se expide el Código de Procedimiento Penal”.

    (87) La expresión “ciclo del dato” se deriva del segundo inciso del artículo 15 Superior, según el cual “(e)n la recolección, tratamiento y circulación de datos se respetarán la libertad y demás garantías consagradas en la Constitución”.

    (88) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “v.d. 20201014 RTA AUTO PRUEBAS TUTELA ANGGY CENDALES”.

    (89) Sentencia T-238 de 2018.

    (90) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “Intervención ciudadana Universidad Externado de Colombia”, pág. 4.

    (91) Al respecto, en Auto AP210-2015 del 21 de enero de 2015 (rad. 45.114), la Sala de Casación Penal de la Corte Suprema de Justicia indicó lo siguiente: “La Sala (CSJ AP, 13 abril 2011, Rad. 35946), la Sala al analizar la figura de la indemnización integral estableció que pese a no estar prevista en la Ley 906 de 2004, era dable su aplicación para casos regidos por tal normativa, en virtud del principio de favorabilidad acudiendo para ello al artículo 42 de la Ley 600 de 2000 que sí lo regula. || Efectivamente la Corporación, tras analizar el principio de aplicación favorable de la ley el cual tiene cabida no sólo cuando se trata de preceptos de contenido sustancial, sino también procesal con proyección sustancial, enfatizó que era también viable con ocasión de la coexistencia normativa de los dos ordenamientos procesales penales (Ley 600 y 906). (…). || Con esa arista la Sala ha admitido la extinción de la acción penal por indemnización integral para casos propios del sistema procesal acusatorio, siempre que se cumplan los requisitos del artículo 42 de la Ley 600 de 2000, respecto de la naturaleza del delito, esto es, correspondan a los allí enumerados, se repare integralmente el daño ocasionado y que dentro de los cinco años anteriores no se haya proferido en otro proceso preclusión de la investigación o cesación de procedimiento en favor del procesado por el mismo motivo”. (Negrilla añadida).

    (92) En sentencia C-185 de 2003, la Corte indicó que la información negativa u odiosa es “aquella que asocia una situación (no querida, perjudicial, socialmente reprobada o simplemente desfavorable) al nombre de una persona (…)”. De otro lado, en sentencia SU-458 de 2012, señaló que los antecedentes penales constituyen un dato negativo, por cuanto asocian el nombre de una persona con “la ruptura del pacto social, con la defraudación de las expectativas normativas, con la violación de los bienes jurídicos fundamentales”.

    (93) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “v.d. 20201014 RTA AUTO PRUEBAS TUTELA ANGGY CENDALES”, pág. 4.

    (94) Conforme al artículo tercero, la expresión “Activo informático” se refiere a la “infraestructura de TIC y todo lo relacionado con esta”.

    (95) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “RESOLUCION 0-4004-13 PROTOCOLOS DE SEGURIDAD DE LA INFORMACION”.

    (96) Idem.

    (97) Cuaderno de primera instancia, folio 3.

    (98) Cuaderno de segunda instancia, folios 19 y 21.

    (99) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “6. Estudios de confidencialidad y análisis de información financiera 2020”, pág. 2.

    (100) Cuaderno de segunda instancia, folios 19 y 21.

    (101) Sentencias C-489 de 2002, y T-022 de 2017, reiteradas en la SU-274 de 2019.

    (102) Sentencia T-050 de 2016, reiterada en la SU-274 de 2019.

    (103) Cuaderno de la Corte, folio 44. Ver disco compacto allegado en el informe secretarial sobre el decreto y traslado probatorio. Archivo denominado “6. Estudios de confidencialidad y análisis de información financiera 2020”, pág. 2.

    (104) Al respecto, el artículo 25 del Decreto 2591 de 1991 dispone lo siguiente: “INDEMNIZACIONES Y COSTAS. Cuando el afectado no disponga de otro medio judicial, y la violación del derecho sea manifiesta y consecuencia de una acción clara e indiscutiblemente arbitraria, además de lo dispuesto en los dos artículos anteriores, en el fallo que conceda la tutela el juez, de oficio, tiene la potestad de ordenar en abstracto la indemnización del daño emergente causado si ello fuere necesario para asegurar el goce efectivo del derecho así como el pago de las costas del proceso. La liquidación del mismo y de los demás perjuicios se hará ante la jurisdicción de lo contencioso administrativo o ante el juez competente, por el trámite incidental, dentro de los seis meses siguientes, para lo cual el juez que hubiere conocido de la tutela remitirá inmediatamente copia de toda la actuación. || La condena será contra la entidad de que dependa el demandado y solidariamente contra éste, si se considera que ha mediado dolo o culpa grave de su parte, todo ellos sin perjuicio de las demás responsabilidades administrativas, civiles o penales en que haya incurrido. || Si la tutela fuere rechazada o denegada por el juez, éste condenará al solicitante al pago de las costas cuando estimare fundadamente que incurrió en temeridad”. (Resalto añadido por la Sala)

    (105) Al efecto, el artículo 1.2.1.1.1 del Decreto 1070 de 2015 “Por el cual se expide el Decreto Único Reglamentario del Sector Administrativo de Defensa”, dispone que a la Superintendencia de Vigilancia y Seguridad Privada le corresponde “ejercer el control, inspección y vigilancia sobre la industria y los servicios de vigilancia y seguridad privada”. De otro lado, al consultar el portal web de la compañía Cosinte  -cosinte.com-, se advierte que, mediante Resolución n.° 03667 del 30 de noviembre de 2018, dicha Superintendencia le otorgó la licencia de funcionamiento (consultado el 20 de noviembre de 2020).

    (106) Conforme lo dispuesto en el Decreto Ley 356 de 1994 y el Decreto 1070 de 2015, sin perjuicio de cualquier otra normativa aplicable en la materia.

    (107) “ARTÍCULO 76. SANCIONES. La Superintendencia de Vigilancia y Seguridad Privada impondrá a los vigilados que infrinjan lo dispuesto en este Decreto y en especial lo dispuesto en los títulos V y VII de este Decreto, las siguientes sanciones:

    1. Amonestación y plazo perentorio para corregir las irregularidades.

    2. Multas sucesivas en cuantía de 5 hasta 100 salarios mínimos legales mensuales vigentes.

    3. Suspensión de la licencia de funcionamiento o credencial hasta por 6 meses.

    4. Cancelación de la licencia de funcionamiento del vigilado, sus sucursales o agencias, o de las credenciales respectivas”.

    28Abr/21

    Real Decreto-ley 1/2021, de 19 de enero 2021

    Real Decreto-ley 1/2021, de 19 de enero, de protección de los consumidores y usuarios frente a situaciones de vulnerabilidad social y económica. (B.O.E. número 17 de 20 de enero de 2021).

    I

    El artículo 51.1 de la Constitución Española establece que los poderes públicos garantizarán la defensa de las personas consumidoras y usuarias, protegiendo, mediante procedimientos eficaces, la seguridad, la salud y los legítimos intereses económicos de los mismos.

    Para el efectivo cumplimiento de dicho mandato, se han de considerar las consecuencias provocadas en el ámbito social y económico por la pandemia del COVID-19, con graves repercusiones en diferentes ámbitos sectoriales, que han afectado especialmente a las relaciones de consumo y, en consecuencia, a la protección de las personas consumidoras y usuarias, cuya garantía en estas condiciones incumbe prioritariamente a los poderes públicos y obliga a la adopción de actuaciones específicas.

    En tal sentido resulta urgente considerar el concepto de persona consumidora vulnerable en la normativa estatal de defensa de las personas consumidoras y usuarias, atendiendo a este mandato constitucional, en el sentido de garantizar con un grado mayor de protección a los derechos en determinados supuestos en los que la persona consumidora se ve afectada por una especial situación de vulnerabilidad que puede incidir en su toma de decisiones e, incluso, forzarla a aceptar ciertas condiciones contractuales que en otra situación no aceptaría. Esta figura ya ha sido recogida en la normativa autonómica y, si bien esta necesidad ya era patente antes de que aconteciera esta crisis sanitaria mundial, la actual situación ha ahondado en la urgente necesidad de protección de estas personas que puedan encontrarse en especial situación de vulnerabilidad en una relación de consumo.

    Por tanto, se incluye por primera vez en la normativa estatal de defensa de las personas consumidoras la figura de la persona consumidora vulnerable, que deberá ser objeto de especial atención tanto por parte de autoridades públicas como de empresas privadas en las relaciones de consumo. Más allá de la tradicional alusión a la situación económica de las personas consumidoras a la hora de determinar su situación de vulnerabilidad, se constatan diversas situaciones en las que, agravadas por la actual situación de crisis sanitaria, las circunstancias sociales o personales hacen que se encuentren en una especial situación de subordinación, indefensión o desprotección en sus relaciones de consumo, tal como ha recordado recientemente la Comisión Europea con la publicación de la Comunicación, de 13 de noviembre de 2020, sobre la Nueva Agenda del Consumidor: «Reforzar la resiliencia del consumidor para una recuperación sostenible». Por consiguiente, es necesario que la normativa estatal recoja de forma urgente la previsión de las circunstancias que generan que los derechos de estas personas consumidoras necesiten una protección reforzada.

    La Nueva Agenda del Consumidor presenta la visión de la política europea de consumo para el periodo 2020-2025. Entre sus finalidades, además de abordar las necesidades actuales de las personas consumidoras ante la pandemia, se subraya la promoción de medidas para un mercado único más ecológico, digital y justo, fortaleciendo la confianza y toma de decisiones de los consumidores, así como la protección eficaz de sus intereses en las relaciones de consumo. La Agenda asume un enfoque holístico que abarca aquellas políticas de la Unión Europea que revisten especial interés para las personas consumidoras, complementando otras iniciativas como el Pacto Verde Europeo, la Economía Circular o, en el marco de Naciones Unidas, la Agenda 2030.

    Para alcanzar sus objetivos, la Agenda cubre cinco ámbitos prioritarios:

    a) la transición ecológica;

    b) la transformación digital;

    c) la tutela y defensa de los derechos de los consumidores;

    d) las necesidades específicas de determinados grupos de consumidores; y

    e) la cooperación internacional.

    Entre ellos, el tercero y el cuarto son los que establecen el marco adecuado para la modificación urgente del texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios, aprobado por Real Decreto Legislativo 1/2007, de 16 de noviembre.

    La tutela eficaz de los derechos de las personas consumidoras se ha vuelto más acuciante tras el impacto social y económico que la pandemia de la COVID-19 ha tenido sobre las prácticas de consumo. La Comisión Europea alerta en su Comunicación sobre el aumento de prácticas comerciales desleales, lo que motiva la necesidad de implantar medidas coordinadas con los Estados miembros para garantizar la protección de los derechos de los consumidores en un entorno cada vez más digital. En esta línea, la Nueva Agenda del Consumidor subraya la necesidad de abordar las necesidades específicas de consumidores que, por sus características o circunstancias, requieran una mayor protección para garantizar la toma de decisiones en las relaciones concretas de consumo acorde con sus intereses.

    Entre ellas, en la Agenda se destacan las siguientes: la necesidad de garantizar tanto la asequibilidad de los productos, bienes y servicios, como la disponibilidad de un información clara, accesible y fácil de manejar sobre ellos; la adopción de un enfoque justo y no discriminatorio en la transformación digital; la educación permanente, la sensibilización y la formación, especialmente a niños, niñas y menores de edad; o la protección frente a prácticas discriminatorias por razón de género. En suma, la Nueva Agenda del Consumidor coloca en el centro de sus políticas y medidas la protección de las personas consumidoras que, por encontrarse en una situación de vulnerabilidad, no puedan adoptar una decisión acorde con sus intereses en una relación de consumo.

    El concepto de consumidor vulnerable recogido en la Nueva Agenda del Consumidor se fundamenta en los estudios teóricos e investigaciones empíricas desarrolladas en los últimos años sobre la vulnerabilidad específicamente referida al ámbito del consumo. Dichos avances en el plano académico y en la literatura utilizada por las instituciones internacionales confluyen en una noción de vulnerabilidad en consumo entendida como la probabilidad ex ante de que una determinada persona obtenga un posible resultado negativo en su relación de consumo.

    En particular, la probabilidad de que una persona consumidora obtenga resultados negativos en sus relaciones de consumo vendrá condicionada por aspectos tales como la dificultad para obtener o asimilar información, una menor capacidad para comprar, elegir o acceder a productos adecuados, o una mayor susceptibilidad a dejarse influir por prácticas comerciales. Dado que la clave para que las políticas de protección a las personas consumidoras vulnerables sean eficaces reside en su capacidad de actuar de forma preventiva, identificando a las personas o colectivos que tienen mayor probabilidad de verse afectados por esas contingencias antes de que el posible resultado negativo se produzca, gran parte de la literatura especializada se ha centrado en la identificación de los factores que determinan dicha vulnerabilidad.

    Aunque la identificación de los factores de vulnerabilidad de consumo ha dado lugar a múltiples tipologías, existen algunos consensos básicos dentro del mundo académico.

    En primer lugar, se asume que la situación de vulnerabilidad no se deriva de circunstancias estrictamente personales, sino que hay que considerar aspectos de origen demográfico, social e, incluso, relacionados con cada entorno de mercado concreto.

    En segundo lugar, y relacionado con lo anterior, hay consenso general en que las condiciones que predisponen a la vulnerabilidad en las relaciones de consumo exceden el plano de lo estrictamente económico, tradicionalmente aproximado con indicadores del nivel de renta. Los primeros avances teóricos en este sentido datan de los años noventa del siglo pasado y se derivan de estudios centrados en el análisis de la vulnerabilidad de consumo en mercados específicos como el de productos farmacéuticos o el alimentario. En estos casos se evidenciaba con nitidez cómo factores tanto de índole biológico como cultural tenían una importancia crucial para estimar la vulnerabilidad en sus relaciones de consumo de ciertos individuos o colectivos.

    Posteriores investigaciones han venido confirmando que la multidimensionalidad de la vulnerabilidad de consumo, es decir, su relación con factores de distintas dimensiones, afecta a todos los ámbitos de consumo, siendo especialmente patentes en algunos sectores de consumo específicos como el financiero, el energético o el de comercio electrónico.

    En tercer lugar, los estudios académicos conciben la vulnerabilidad en el ámbito del consumo como un concepto dinámico, en el sentido de que no define a las personas o a los colectivos como vulnerables de una forma estructural ni permanente. De esta forma, una persona puede ser considerada vulnerable en un determinado ámbito de consumo, pero no en otros. Además, esa condición de vulnerabilidad podrá variar a lo largo del tiempo según puedan hacerlo las condiciones que la determinan, tanto las de tipo personal como las sociales o de contexto. En definitiva, las investigaciones especializadas confirman que cualquier persona puede ser vulnerable en algún momento de su vida respecto de alguna relación de consumo específica.

    En consonancia con esta aproximación teórica y conceptual, se significa que la normativa europea conmina a proteger a las personas consumidoras vulnerables, no solo en relación con aspectos económicos, como tradicionalmente se ha hecho en la normativa sectorial, sino también en relación con aquellas otras circunstancias, tales como por ejemplo la edad, sexo, origen nacional o étnico, lugar de procedencia, las personas alérgicas o con algún tipo de intolerancia alimenticia, las víctimas de violencia de género, las familias monoparentales, las personas desempleadas, las personas con algún tipo de discapacidad, las personas enfermas, las minorías étnicas o lingüísticas, las personas desplazadas temporalmente de su residencia habitual, la población migrante o solicitante de protección internacional, así como las personas con carencias económicas o en riesgo de exclusión, o cualesquiera otras circunstancias que puedan incidir, generando desventaja, en sus relaciones de consumo. En este sentido ya se pronunció el Parlamento Europeo, en su Resolución de 22 de mayo de 2012 sobre una estrategia de refuerzo de los derechos de los consumidores vulnerables, o, junto con el Consejo, en el Reglamento 254/2014, de 26 de febrero de 2014, sobre el Programa plurianual de Consumidores para el período 2014-2020, que apuesta claramente por la protección de las personas consumidoras vulnerables a través de la inclusión de previsiones legislativas especiales.

    Por consiguiente, es preciso tener en cuenta que son diversas las causas que determinan la posible situación de vulnerabilidad de las personas consumidoras y usuarias en atención a las específicas relaciones de consumo que les afecten. Es importante señalar que las relaciones de consumo están diseñadas sin tener en cuenta las necesidades y circunstancias de determinados colectivos de personas que enfrentan especiales obstáculos a la hora de desenvolverse y ejercer sus derechos en condiciones de igualdad. Así, el impacto de determinadas variables psicosociales en las relaciones de consumo (tales como la edad, sexo, origen nacional o étnico, lugar de procedencia o discapacidad, entre otras) coloca a las personas consumidoras en una situación de especial vulnerabilidad que reclama una protección reforzada de sus derechos. Asimismo, es preciso atender a circunstancias como el desconocimiento del idioma, el nivel de formación (bien sea general o específica de un sector del mercado), el lugar de residencia, la situación social, económica y financiera o, incluso, problemas asociados al uso de las nuevas tecnologías como instrumento o vía de acceso normalizado al mercado de bienes y servicios. Además, es importante tener en cuenta que varias causas o factores de los mencionados pueden operar simultáneamente o interaccionar entre sí, incrementando en esos casos la situación de vulnerabilidad.

    Todo ello supone la necesidad de considerar, entre los colectivos que pueden encontrarse en una especial situación de vulnerabilidad en las relaciones comerciales entre personas consumidoras y empresarios en España, a distintos grupos de personas.

    Las personas mayores son uno de los grupos más numerosos de consumidores en España. Según los datos provisionales del Instituto Nacional de Estadística (INE) de enero de 2020, hay 9.278.923 personas de 65 o más años para un total de población española de 47.332.614, lo que supone un 19,6 % del total de la población. En muchas ocasiones, factores que pueden estar asociados a la edad, como el estado de salud, el desfase generacional o el nivel sociocultural, influyen en la posibilidad de las personas mayores para desenvolverse como personas consumidoras en igualdad de condiciones, principalmente en la sociedad de la información actual. Además, las personas mayores enfrentan en ocasiones barreras relacionadas con la forma en que se genera o proporciona la información en las relaciones de consumo, incrementándose el riesgo de que puedan ser inducidas a error, así como barreras relacionadas con prejuicios y estereotipos asociados a la edad. Este desfase generacional que puede afectar a sus relaciones de consumo se observa, por ejemplo, respecto al consumo on line, puesto que el uso de internet de forma frecuente por personas de entre 65 y 74 años se sitúa por debajo del 60 %, muy lejos del 83,1 % del total de la población mayor de 16 años, de acuerdo con datos del INE.

    Asimismo, se visibiliza cómo la vulnerabilidad también tiene un componente transversal de género, puesto que en España las mujeres cuya edad está comprendida entre los 65 y los 99 años constituyen el 57 % frente a los hombres. Además, de acuerdo con información proporcionada por el Instituto de las Mujeres, las mujeres de edad avanzada viven solas con más frecuencia que los hombres, tienen ingresos más bajos, sufren, en mayor medida, enfermedades crónicas, y tienen peor percepción subjetiva de su salud y calidad de vida.

    Entre otros obstáculos que impiden o dificultan el desarrollo en condiciones de igualdad en las relaciones de consumo, la cuestión del género bien puede entenderse como otro de los factores de vulnerabilidad. Por ejemplo, de acuerdo con datos del INE, las compras por internet por parte de las mujeres son 0,9 puntos porcentuales inferiores a las de los hombres. El hecho de que el género sea un factor estructural que posiciona en condición de subordinación en el ámbito económico se aprecia con claridad en los indicadores de capacidad económica, puesto que la renta neta anual media en los hogares es mayor en aquellos en los que la persona de referencia es un hombre (30.531 euros) que en los que lo es una mujer (25.198 euros). En relación con las pensiones, por ejemplo, y de acuerdo con datos del Ministerio de Inclusión, Seguridad Social y Migraciones, la pensión media de las mujeres en octubre de 2020 ascendió a 813,52 euros por 1.235,18 euros de los hombres.

    Asimismo, entre las dificultades que impiden el desarrollo en condiciones de igualdad en las relaciones de consumo por cuestiones de género, la violencia de género y la trata de mujeres y niñas con fines de explotación sexual han de ser contempladas en razón de su especial incidencia. La violencia de género sitúa a las mujeres en riesgo de exclusión social, frustrando sus posibilidades de inserción en el mundo laboral o sus expectativas de independencia económica, todo ello como consecuencia del control que ejerce el agresor sobre las víctimas mujeres. Según datos de la Cruz Roja, el 84 % de las mujeres víctimas de violencia de género están en riesgo de pobreza y exclusión social, lo que afecta de una forma directa a sus relaciones de consumo.

    Adicionalmente, y en el ámbito de la cuestión de género, se encuentran las familias monoparentales. Estos colectivos, encabezados por mujeres en un 81 % de los casos, afrontan necesidades que los sitúan en una posición de desigualdad en las relaciones de consumo. El 46,8 % de estos hogares se encuentra en riesgo de pobreza y exclusión social y tienen una tasa de pobreza infantil quince veces superior a la media. Asimismo, las mujeres que encabezan estos hogares han de enfrentarse a situaciones de empleabilidad inestables, debido a las escasas posibilidades de conciliación que ofrecen las empresas, lo que provoca que muchas de ellas se puedan encontrar en situación de desempleo o de trabajo en situación irregular dada su condición.

    También se debe prestar especial atención a la situación de los niños, niñas y adolescentes que, de acuerdo con el INE, suponen el 17,6 % del total de la población, siendo los menores de 16 años el colectivo más afectado por el riesgo de pobreza relativa según la encuesta de condiciones de vida. En sus relaciones de consumo, los niños, niñas y adolescentes, por ejemplo, presentan una mayor sensibilidad a la publicidad y a las prácticas comerciales agresivas, disponen de menor capacidad para reconocer el peligro, pueden sentirse atraídos por la apariencia de productos que entrañen riesgos para su salud o seguridad, o pueden presentar mayor sensibilidad frente a la toxicidad de determinadas sustancias químicas. Requieren, como la Nueva Agenda del Consumidor advierte, medidas de educación permanente, formación y sensibilización.

    Igualmente es necesario hacer alusión a las personas con discapacidad y cómo puede afectar esta situación a sus relaciones de consumo. De acuerdo con la Encuesta de Discapacidad, Autonomía Personal y Situaciones de Dependencia, elaborada por el INE en 2008 (último informe disponible), el número de personas con alguna discapacidad se elevaba a 3.847.900 personas, de las cuales 1.600.000 aproximadamente son menores de 65 años.

    Estas personas se pueden encontrar en diferentes situaciones de vulnerabilidad a la hora de desenvolverse en las relaciones de consumo dependiendo de la capacidad de respuesta. En tal sentido, estas personas están más expuestas a la quiebra y vulneración de sus derechos como personas consumidoras, por cuanto en muchas ocasiones el mercado de bienes, productos y servicios carece de condiciones de accesibilidad universal, dificultando su desempeño como consumidores protegidos. Por ejemplo, las personas con discapacidad visual pueden ver impedido el acceso a la información que incorporan las etiquetas de los productos de uso cotidiano.

    Por otro lado, entre los factores que pueden afectar a la población en general, pero que son susceptibles de hacerlo especialmente a los colectivos que se han identificado previamente como en situación de particular vulnerabilidad, cabe aludir en primer lugar al nivel de renta de las personas consumidoras. En concreto, y según la Encuesta de Condiciones de Vida del INE en el año 2019, la población en riesgo de pobreza o exclusión social (tasa AROPE) se situó en España en el 25,3 %. Un dato que todavía no tenía en cuenta el impacto de la crisis económica debida a la COVID-19. Impacto que sí tiene en cuenta la Red Europea de Lucha contra la Pobreza y Exclusión Social (EAPN), cuando calcula que un 9,2 % de la población, más de cuatro millones de personas, sufre «pobreza severa», dato coincidente con los estudios de las asociaciones de consumidores, como OCU, que desvelan que un 10 % de las familias no llegan a fin de mes en 2020.

    El nivel formativo y cultural también puede incidir de forma importante en las relaciones de consumo, situando en posiciones de vulnerabilidad a aquellas personas consumidoras que cuentan con menores niveles de estudios. Es preciso tener en cuenta que, actualmente, hay en España en torno a 577.600 personas analfabetas funcionales, según el último dato de la Encuesta de Población Activa, lo que incide de forma directa, por ejemplo, en su capacidad para poder entender de forma precisa la información que se les facilita en sus relaciones de consumo.

    Otro factor que cobra especial importancia es la brecha digital en las relaciones de consumo en la era digital. Si bien el avance tecnológico ha supuesto en muchos aspectos una apertura a nuevas oportunidades de consumo, puede situar en una situación de vulnerabilidad al 4,7 % de la población que no tiene conexión a internet. Pero no solo poder acceder a estos servicios es importante para poder desenvolverse en situaciones de igualdad en las relaciones de consumo, sino que adquirir habilidades y conocimientos tecnológicos es imprescindible para operar de forma adecuada en el comercio on line, aspecto que también tiene un importante componente de edad, pues solo el 17,1 % de la población mayor de 74 años hace uso diario de internet, de acuerdo con datos del INE.

    De igual modo, el lugar de residencia también puede ser una causa de vulnerabilidad en las relaciones de consumo. Aparte de la ya mencionada dificultad de acceso a servicios bancarios, pues según el Banco de España 4.109 municipios españoles, el 51,8 % del total, no tienen acceso a ninguna oficina bancaria, también es importante mencionar que los hogares con al menos un miembro de 16 a 74 años residentes en el 26,3 % de las ciudades de menos de 10.000 habitantes no tiene acceso a internet por banda ancha fija. Todas estas situaciones, además, se han visto acrecentadas con la situación de crisis sanitaria derivada del COVID-19, que ha traído aparejado un aumento del número de personas consumidoras en situación de vulnerabilidad económica. Así, desde que se pusieron en marcha por el Gobierno de España las distintas moratorias para tratar de paliar los efectos de la crisis sanitaria en la población económicamente más vulnerable y hasta el 30 de septiembre, de acuerdo con la información del Banco de España, se han concedido 226.000 moratorias legales hipotecarias y 366.000 moratorias de créditos al consumo. Asimismo, se han concedido 793.000 moratorias entre hipotecarias y no hipotecarias al amparo de un acuerdo marco sectorial bancario.

    Por tanto, se ve cómo son numerosas las causas tanto endógenas como exógenas que pueden situar a una persona en situación de vulnerabilidad en sus relaciones de consumo, no únicamente sus circunstancias económicas, como tradicionalmente se ha enfocado este asunto a nivel sectorial.

    En consideración a cuanto ha quedado expuesto, los artículos del presente real decreto-ley se refieren a las medidas urgentes adoptadas para hacer frente a determinadas situaciones de vulnerabilidad que afectan a las personas consumidoras y usuarias.

    Así, en su artículo primero se procede a modificar el texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios, aprobado por Real Decreto Legislativo 1/2007, de 16 de noviembre.

    La modificación esencial del texto refundido es la que afecta al artículo 3, en relación al concepto general de consumidor y usuario, con la finalidad de incluir la definición de persona consumidora vulnerable.

    Así, se determina que a los efectos de esta norma y sin perjuicio de la normativa sectorial que en cada caso resulte de aplicación, tienen la consideración de personas consumidoras vulnerables respecto de relaciones concretas de consumo, aquellas personas físicas que, de forma individual o colectiva, por sus características, necesidades o circunstancias personales, económicas, educativas o sociales, se encuentran, aunque sea territorial, sectorial o temporalmente, en una especial situación de subordinación, indefensión o desprotección que les impide el ejercicio de sus derechos como personas consumidoras en condiciones de igualdad.

    Como consecuencia de esta previsión, de carácter esencial en el texto refundido al determinarse el concepto de persona consumidora vulnerable, se procede a modificar diversos artículos de dicho texto con la finalidad de adecuar el régimen de derechos de las personas consumidoras vulnerables en el ámbito de aplicación del texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios.

    Con tal finalidad se incorpora la previsión de esta categoría, la de persona consumidora vulnerable, en los siguientes preceptos:

    En el artículo 8, sobre derechos básicos de los consumidores y usuarios, del que se procede a modificar su redacción al objeto de prever lo relativo a los derechos de las personas consumidoras vulnerables.

    Se introduce un nuevo apartado 3 en el artículo 17, relativo al derecho a la información, formación y educación de los consumidores y usuarios, con la finalidad de considerar la referencia a las personas consumidoras vulnerables, de forma que se dispone que se prestará especial atención a aquellos sectores que, debido a su complejidad o características propias, cuenten con mayor proporción de personas consumidoras vulnerables entre sus clientes o usuarios, atendiendo de forma precisa a las circunstancias que generan la situación de concreta vulnerabilidad.

    Se modifica el apartado 2 del artículo 18, dedicado al etiquetado y presentación de los bienes y servicios, al objeto de determinar que, sin perjuicio de las exigencias concretas que se establezcan reglamentariamente y de la normativa sectorial que en cada caso resulte de aplicación, que prestarán especial atención a las personas consumidoras vulnerables, todos los bienes y servicios puestos a disposición de los consumidores y usuarios deberán ser de fácil acceso y comprensión y, en todo caso, incorporar, acompañar o, en último caso, permitir obtener de forma clara y comprensible, información veraz, eficaz y suficiente sobre sus características esenciales, conforme se detalla en el mismo.

    Con el mismo objeto se da nueva redacción al artículo 19, relativo a las prácticas comerciales, de especial relevancia al objeto pretendido por el real decreto-ley, al disponerse que los legítimos intereses económicos y sociales de los consumidores y usuarios deberán ser respetados en los términos establecidos en esta norma, aplicándose, además, lo previsto en las normas civiles y mercantiles, en las regulaciones sectoriales de ámbito estatal, así como lo previsto en la normativa comunitaria y autonómica que resulten de aplicación, incorporándose al texto refundido la referencia a que las prácticas comerciales de los empresarios quedan sujetas a lo dispuesto en el texto refundido, en la Ley 3/1991, de 10 de enero, de Competencia Desleal, y en la Ley 7/1996, de 15 de enero, de Ordenación del Comercio Minorista, no obstante la normativa sectorial que en cada caso resulte de aplicación.

    Al efecto se prevé que respecto a las prácticas comerciales relativas a servicios financieros y bienes inmuebles, o en el ámbito de las telecomunicaciones o energético, podrán establecerse normas legales o reglamentarias que ofrezcan una mayor protección al consumidor o usuario. Y que las políticas públicas que inciden en el ámbito del consumo y las prácticas comerciales orientadas a las personas consumidoras vulnerables estarán destinadas dentro del ámbito de las relaciones entre consumidores o usuarios y empresarios a prever y remover las circunstancias que generan la situación de vulnerabilidad, así como a paliar sus efectos, en particular en relación con las comunicaciones comerciales o información precontractual facilitada, la atención post contractual o el acceso a bienes o servicios básicos.

    Con la misma finalidad, se modifica el artículo 20, relativo a la información necesaria en la oferta comercial de bienes y servicios, al objeto de precisar que, sin perjuicio de la normativa sectorial que en su caso resulte de aplicación, la información necesaria a incluir en la oferta comercial deberá facilitarse a los consumidores o usuarios, principalmente cuando se trate de personas consumidoras vulnerables, en términos claros, comprensibles, veraces y en un formato fácilmente accesible, de forma que aseguren su adecuada comprensión y permitan la toma de decisiones óptimas para sus intereses.

    Asimismo, se procede a modificar el artículo 43, relativo a cooperación en materia de control de calidad, con la finalidad de dotar al texto de coherencia semántica y gramatical en relación con la nueva figura de persona consumidora vulnerable.

    Finalmente, se modifica el apartado 1 del artículo 60, sobre información previa al contrato, con la finalidad de prever de manera expresa lo relativo a la información a las personas consumidoras vulnerables, concretándose que el empresario deberá facilitarle de forma clara y comprensible, la información relevante, veraz y suficiente sobre las características principales del contrato, en particular sobre sus condiciones jurídicas y económicas, y estableciéndose, sin perjuicio de la normativa sectorial que en su caso resulte de aplicación, los términos y formato en que deba ser suministrada dicha información, principalmente cuando se trate de personas consumidoras vulnerables, para garantizar su adecuada comprensión y que les permita la toma de decisiones óptimas para sus intereses.

    Por su parte, mediante el artículo segundo, se procede a modificar la disposición final primera del Real Decreto Legislativo 1/2007, de 16 de noviembre, por el que se aprueba el texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios y otras leyes complementarias, relativa al título competencial, al objeto de adecuar su contenido en coherencia con las modificaciones operadas en el texto refundido vinculadas al carácter de normativa básica estatal de los preceptos que son objeto de modificación.

    Las anteriores modificaciones se dictan al amparo de la competencia exclusiva atribuida al Estado por la regla 13.ª del artículo 149.1 de la Constitución Española, que atribuye al Estado la competencia exclusiva sobre bases y coordinación de la planificación general de la actividad económica.

    Y ello atendiendo a que la competencia estatal sobre la ordenación general de la economía ampara todas las normas y actuaciones, sea cual sea su naturaleza, orientadas al logro de una serie de fines, entre los que la doctrina constitucional [STC 34/2013, de 14 de febrero, FJ 4.b)] ha situado el de incidir en principios rectores de la política económica y social (SSTC 95/2002, FFJJ 7 y 11, seguida por las SSTC 190/2002, de 17 de octubre; 228/2003 y 230/2003, ambas de 18 de diciembre), habiéndose asimismo concretado que la competencia estatal sobre las bases y la coordinación de la planificación general de la actividad económica comprende no sólo la ordenación del conjunto de la economía sino también la ordenación de cada sector o subsector de la actividad económica, y el Estado podría así actuar en sectores muy específicos de la actividad económica sobre los que las comunidades autónomas tienen atribuidas competencias, conforme ha afirmado reiteradamente el Tribunal en relación con múltiples sectores y subsectores económicos (SSTC 225/1993, de 8 de julio, 16/2018, de 22 de febrero; 32/2018, de 12 de abril; 43/2018, de 26 de abril; 63/2018, de 7 de junio; 80/2018, de 5 de julio; 97/2018, de 19 de septiembre;102/2018, de 4 de octubre; 85/2015, de 30 de abril,).

    II

    Además, el real decreto-ley incorpora determinadas modificaciones urgentes mediante sus disposiciones finales primera a cuarta.

    La disposición final primera procede a modificar el Real Decreto-ley 11/2020, de 31 de marzo, por el que se adoptan medidas urgentes complementarias en el ámbito social y económico para hacer frente al COVID-19.

    Así, se modifica el artículo 1 bis introducido en el Real Decreto-ley 37/2020, de 22 de diciembre, de medidas urgentes para hacer frente a las situaciones de vulnerabilidad social y económica en el ámbito de la vivienda y en materia de transportes, con objeto de dar cobertura a las situaciones en las que los procedimientos de desahucio y lanzamiento afecten a personas económicamente vulnerables sin alternativa habitacional, incluso en las causas penales en las que el lanzamiento afecte a personas que carezcan de título para habitar una vivienda.

    Esta modificación se ampara en la competencia exclusiva del Estado atribuida por la regla 6.ª del artículo 149.1 de la Constitución Española, que atribuye al Estado competencia exclusiva en materia de legislación procesal.

    La disposición final segunda modifica la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, de una parte, a efectos de derogar la disposición adicional sexta, y, de otra parte, modificar el anexo XII. Bonificaciones Portuarias.

    Se procede a la derogación de la disposición adicional sexta de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, en materia de absorción del Fondo Europeo de Desarrollo Regional, habida cuenta de la existencia de una regulación parcialmente coincidente de la absorción de la financiación procedente de la Unión Europea por parte de la Agencia Estatal de Investigación y el Centro para el Desarrollo Tecnológico Industrial, organismos públicos adscritos al Ministerio de Ciencia e Innovación, en la Disposición adicional sexta del Real Decreto-ley 36/2020, de 30 de diciembre, por el que se aprueban medidas urgentes para la modernización de la Administración Pública y para la ejecución del Plan de Recuperación, Transformación y Resiliencia. De esta manera, queda claro que la normativa aplicable en dicha materia será la contenida en el referido real decreto-ley.

    Ello al amparo de la regla 16.ª del artículo 149.1 de la Constitución Española, que atribuye al Estado la competencia exclusiva en materia de fomento y coordinación general de la investigación científica y técnica.

    De otra parte, se modifica el anexo XII. Bonificaciones Portuarias, de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, con la finalidad de subsanar determinados errores de omisión en los cuadros de diferentes autoridades portuarias y sus correspondientes textos al pie, porque sin dichas modificaciones no sería posible una correcta liquidación de las tasas portuarias para el ejercicio 2021.

    Las modificaciones introducidas se refieren a:

    – La inclusión de un cuadro de las bonificaciones portuarias del artículo 245.3, de la Autoridad Portuaria de Santander (que figura como anexo de este real decreto-ley).

    – La inclusión de determinadas frases finales en las bonificaciones del artículo 245.3 bis, de las Autoridades Portuarias de Barcelona, Motril y Vilagarcía; y del artículo 182, de la Autoridad Portuaria de Las Palmas.

    Se trata de una modificación urgente con el objetivo de que las bonificaciones que no están recogidas en el texto actual de dicha ley entren en vigor en menor plazo posible y puedan ser aplicadas de forma inmediata, coincidiendo con el ejercicio anual, y con ello sea posible una correcta liquidación de las tasas portuarias para este ejercicio 2021.

    La modificación del anexo XII de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, se dicta de acuerdo con la regla 20.ª del artículo 149.1 de la Constitución Española, que atribuye al Estado la competencia exclusiva en materia de puertos de interés general.

    La disposición final tercera se refiere a la habilitación para modificaciones de determinados preceptos del Real Decreto 849/1986, de 11 de abril, por el que se aprueba el Reglamento del Dominio Público Hidráulico, que desarrolla los títulos preliminar, I, IV, V, VI, VII y VIII del texto refundido de la Ley de Aguas, aprobado por el Real Decreto Legislativo 1/2001, de 20 de julio.

    Conforme a ello, las modificaciones del Real Decreto 849/1986, de 11 de abril, por el que se aprueba el Reglamento del Dominio Público Hidráulico, que desarrolla los títulos preliminar, I, IV, V, VI y VII del texto refundido de la Ley de Aguas, aprobado por el Real Decreto Legislativo 1/2001, de 20 de julio, aprobadas mediante la disposición final quinta de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, que afectan al último párrafo del apartado a) del artículo 300, al primer párrafo del artículo 303, al último párrafo del apartado a) del artículo 307 y al primer párrafo del artículo 310, podrán efectuarse mediante disposición con rango de real decreto.

    Se trata de salvaguardar el rango reglamentario de las disposiciones del Real Decreto 849/1986, de 11 de abril, por el que se aprueba el Reglamento del Dominio Público Hidráulico, que desarrolla los títulos preliminar, I, IV, V, VI y VII, del texto refundido de la Ley de Aguas, aprobado por el Real Decreto Legislativo 1/2001, de 20 de julio, que se han modificado mediante la disposición final quinta de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021: último párrafo del apartado a) del artículo 300, al primer párrafo del artículo 303, al último párrafo del apartado a) del artículo 307 y al primer párrafo del artículo 310.

    La disposición final cuarta modifica los precios básicos del canon de control de vertidos del texto refundido de la Ley de Aguas, aprobado por Real Decreto legislativo 1/2001, de 20 de julio.

    Tiene por objeto modificar los precios básicos del canon de control de vertidos del segundo párrafo del artículo 113.3 del texto refundido de la Ley de Aguas. El canon de control de vertidos se configura como un ingreso de los organismos de cuenca destinado al estudio, control, protección y mejora del medio receptor. Asimismo, su finalidad ambiental de protección de la calidad de las aguas del dominio público hidráulico, aconseja armonizar su cuantificación con la fijada por la disposición adicional nonagésima novena de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021.

    Todo ello atendiendo que la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021 contiene dos preceptos que regulan los mismos cánones con cuantificaciones diferenciadas:

    Por una parte, la disposición adicional nonagésima novena. Actualización de los precios básicos del canon de control de vertidos, establece lo siguiente:

    «Con efectos de 1 de enero de 2021 y vigencia indefinida, de conformidad con lo previsto en el párrafo segundo del apartado 3 del artículo 113 del texto refundido de la Ley de Aguas, aprobado por Real Decreto Legislativo 1/2001, de 20 de julio, el precio básico por metro cúbico se fija en 0,01751 euros para el agua residual urbana y en 0,04377 euros para el agua residual industrial».

    Por su parte, el apartado dos de la disposición final novena establece lo siguiente:

    «Dos. Se da nueva redacción al párrafo segundo del apartado 3 del artículo 113, que queda redactado como sigue:

    “El precio básico por metro cúbico se fija en 0,01808 euros para el agua residual urbana y en 0,04520 euros para el agua residual industrial. Estos precios básicos podrán revisarse periódicamente en las Leyes de Presupuestos Generales del Estado.”»

    A fin de evitar las dificultades interpretativas y aplicativas, con los consiguientes problemas de recaudación y jurisdiccionales, se propone introducir esta disposición final que modifique el párrafo segundo del apartado 3 del artículo 113 del texto refundido de la Ley de Aguas, fijando en el mismo la cuantía del precio básico para aguas residuales urbanas e industriales, respectivamente, y por otra parte, establecer de manera expresa que quedan sin efecto a partir de 1 de enero de 2021 las cuantificaciones de los precios básicos que difieran de lo previsto en esta redacción.

    Las referidas disposiciones finales tercera y cuarta se dictan al amparo de las reglas 22.ª y 23.ª del artículo 149.1 de la Constitución Española, que atribuyen al Estado la competencia exclusiva en materia de legislación, ordenación y concesión de recursos y aprovechamientos hidráulicos cuando las aguas discurran por más de una comunidad autónoma y de legislación básica sobre protección del medio ambiente, respectivamente.

    III

    El presente real decreto-ley se estructura en dos artículos, cinco disposiciones finales y un anexo.

    En el articulado se realizan las modificaciones precisas en el texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios, aprobado por Real Decreto Legislativo 1/2007, de 16 de noviembre, así como en el real decreto-legislativo aprobatorio de dicho texto.

    Y por lo que se refiere a las disposiciones finales, se significa que:

    La disposición final primera procede a modificar el artículo 1 bis del Real Decreto-ley 11/2020, de 31 de marzo, por el que se adoptan medidas urgentes complementarias en el ámbito social y económico para hacer frente al COVID-19.

    La disposición final segunda modifica la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021.

    La disposición final tercera se refiere a la habilitación para modificaciones de determinados preceptos del Real Decreto 849/1986, de 11 de abril, por el que se aprueba el Reglamento del Dominio Público Hidráulico que desarrolla los títulos preliminar, I, IV, V, VI, VII y VIII del texto refundido de la Ley de Aguas, aprobado por el Real Decreto Legislativo 1/2001, de 20 de julio.

    Por su parte, la disposición final cuarta modifica los precios básicos del canon de control de vertidos del segundo párrafo del artículo 113.3 del texto refundido de la Ley de Aguas, aprobado por Real Decreto legislativo 1/2001, de 20 de julio.

    La disposición final quinta se refiere a la entrada en vigor, estableciendo su entrada en vigor para el día siguiente al de su publicación en el «Boletín Oficial del Estado».

    El anexo se refiere al cuadro de las bonificaciones portuarias de la Autoridad Portuaria de Santander.

    IV

    El Tribunal Constitucional ha avalado de manera reiterada la adopción de medidas con impacto social en situaciones excepcionales y de urgente necesidad. Dicho aval demanda la concurrencia material de una motivación explícita y razonada de la necesidad y también formal, vinculada con la urgencia que impide acudir a la tramitación ordinaria de los textos normativos. Este real decreto-ley cumple aquella doctrina reiterada del Tribunal Constitucional contenida en múltiples sentencias entre las que cabría citar la 6/1983, de 4 de febrero, F 5; la 11/2002, de 17 de enero, F 4, la 137/2003, de 3 de julio, F 3 y la 189/2005, de 7 julio, F 3), entre otras muchas.

    Su motivación material deriva de la necesidad de poder afrontar las graves consecuencias del empeoramiento de la vulnerabilidad de muchas personas consumidoras atendiendo a la actual coyuntura económica y social. Y la extraordinaria y urgente necesidad forma parte del juicio político y de oportunidad que corresponde al Gobierno (nuevamente SSTC 61/2018, de 7 de junio, FJ 4; 142/2014, de 11 de septiembre, FJ 3).

    Las medidas adoptadas se consideran, además, las necesarias con carácter imprescindible para atender a los intereses generales afectados, existiendo (STC 139/2016 de 21 julio, FJ 3) «una conexión de sentido o relación de adecuación entre la situación definida que constituye el presupuesto habilitante y las medidas que en el decreto-ley se adoptan» (así, desde un principio, STC 29/1982, de 31 de mayo (RTC 1982, 29), FJ 3, hasta las más recientes SSTC 96/2014, de 12 de junio (RTC 2014, 96), FJ 5, y 183/2014, de 6 de noviembre (RTC 2014, 183), FJ 4).

    Este real decreto-ley no afecta al ordenamiento de las instituciones básicas del Estado, a los derechos, deberes y libertades de los ciudadanos regulados en el Título I de la Constitución, al régimen de las Comunidades Autónomas ni al Derecho electoral general.

    En relación con ello, mediante las modificaciones que se operan del texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios y otras leyes complementarias, aprobado por Real Decreto Legislativo 1/2007, de 16 de noviembre, se pretende reforzar la garantía de la defensa de las personas consumidoras y usuarias, en orden a proteger más eficazmente los legítimos intereses de aquellos que se encuentran en una situación de vulnerabilidad, para el adecuado cumplimiento del mandato que a los poderes públicos encomienda el artículo 51.1 de la Constitución.

    A tales efectos, la inclusión de la figura de la persona consumidora vulnerable en la normativa estatal de defensa de las personas consumidoras y usuarias no afecta al régimen general del principio rector recogido en el artículo 51 de la Constitución, sino que, siguiendo dicho mandato constitucional, incorpora de forma expresa algunos elementos para la necesaria protección de personas y colectivos que, aunque ya se infería de la normativa vigente, en determinadas ocasiones podía no estar positivizada de tal forma que resultase efectiva, máxime en el marco de las extraordinarias circunstancias que se derivan del COVID-19.

    En consecuencia, el objetivo pretendido es el de ampliar en todo caso la garantía de la debida protección de los derechos de las personas consumidoras y usuarias en situación de vulnerabilidad, y ello en el marco general del texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios, que recoge la definición de consumidor y usuario con carácter general.

    Se estima urgente y prioritario el poder hacerlo, en atención a las circunstancias actuales derivadas en particular de la pandemia, con la importante incidencia que está teniendo en las diversas relaciones de consumo o de servicio en la que se encuentran consumidores y usuarios, y considerando, además, que se actúa para el adecuado cumplimiento de los pronunciamientos de las instituciones comunitarias, que hacen expresa referencia a otros factores y circunstancias específicas más allá de la situación económica en la que se encuentran las personas consumidoras y usuarias como causas específicas de su vulnerabilidad.

    Como ha señalado recientemente la Comisión Europea en la Nueva Agenda del Consumidor, de 13 de noviembre de 2020, las vulnerabilidades de los consumidores se han visto exacerbadas por la actual pandemia. De hecho, la propia Comisión señala entre los impactos de la pandemia sobre los consumidores «la explotación de las vulnerabilidades financieras que existían desde antes de la pandemia pero que se han vuelto más acuciantes». Y esto es así porque, como se recoge expresamente, «la pandemia ha planteado retos significativos que afectan la vida cotidiana de los consumidores, sobre todo, en relación con la disponibilidad y la accesibilidad de productos y servicios, así como los viajes hacia, desde y dentro de la UE». Como punto importante derivado de la pandemia, la Comisión también llama la atención sobre «el aumento de las estafas a los consumidores, las técnicas de comercialización engañosas y el fraude en las compras en línea, de los que han sido y siguen siendo víctima un número creciente de consumidores».

    Por lo tanto, resulta urgente adecuar la normativa básica estatal a tales requerimientos para así además evitar la apertura de procedimientos por incumplimientos del Estado en esta materia que pudieran verse instados por las propias instituciones comunitarias o como consecuencia de demandas de las personas consumidoras y usuarias vulnerables afectadas, si se considerase que no están adecuadamente protegidas.

    Por otra parte, la urgencia deriva de la necesidad de garantizar un trato igualitario en la protección de los derechos de las personas consumidoras y usuarias que se encuentren en situación de vulnerabilidad en relación con las relaciones de consumo que les afecten de manera particular. En tal sentido, se considera preciso con urgencia llevar a cabo la modificación del artículo 3 del texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios, que tiene carácter de normativa básica estatal, por lo cual resultará vinculante para las comunidades autónomas, en aras de determinar un mínimo común de protección en todo el territorio de Estado de estas personas que precisan de una especial protección, sin perjuicio de que las comunidades autónomas, en ejercicio de sus competencias, puedan prever en su normativa propia regulaciones que resulten más favorables para las personas consumidoras y usuarias en situación de vulnerabilidad, pero no disminuir la protección que se les otorgue a las mismas en virtud el texto refundido.

    Con la incorporación de esta definición al artículo 3 del texto refundido, que tiene carácter básico, se da homogeneidad a la normativa horizontal de protección a las personas consumidoras, en línea con los textos aprobados por las instituciones europeas, además de clarificarse su naturaleza no estructural, sino referida a relaciones de consumo específicas. Asimismo, se evita la confusión y falta de seguridad jurídica que pueda provocar el uso de diferentes términos en la normativa estatal y autonómica para referirse a una misma realidad.

    En la actualidad, el hecho de no contar con un cuerpo normativo a nivel nacional que proteja a las personas consumidoras vulnerables ante las infracciones de la normativa de consumo pone en una situación de especial desprotección a estas personas ante la actual pandemia, puesto que no se dispone de habilitaciones legales -más allá de la figura del real decreto-ley- para poder desarrollar la normativa de protección de las personas consumidoras en aspectos tan importantes como la información precontractual a facilitar en la contratación a distancia, la toma en cuenta de situaciones de vulnerabilidad en la interposición de reclamaciones ante incumplimientos contractuales o la información concreta a facilitar respecto determinados productos de protección frente a la COVID-19 cuando vayan destinados a determinados colectivos vulnerables.

    De ahí la urgencia de incorporar la figura de la persona consumidora vulnerable en el texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios, puesto que con ello se palía una laguna de nuestra normativa que podía suponer una clara desprotección de las personas consumidoras vulnerables ante los efectos de la actual pandemia.

    Asimismo, esta modificación por la vía de urgencia es óptima desde el punto de vista de técnica normativa, porque ampara desarrollos más rápidos y eficaces de la ley para materias que no tienen rango de ley, sin tener que recurrir a la vía del real decreto-ley.

    Por su parte, la urgente necesidad de incorporar al presente real decreto-ley las modificaciones incluidas en las disposiciones finales primera a cuarta se detalla a continuación.

    En cuanto a la modificación del artículo 1 bis del Real Decreto 11/2020, de 31 de marzo, por el que se adoptan medidas urgentes complementarias en el ámbito social y económico para hacer frente al COVID-19, que fue introducido mediante el Real Decreto-ley 37/2020, de 22 de diciembre, de medidas urgentes para hacer frente a las situaciones de vulnerabilidad social y económica en el ámbito de la vivienda y en materia de transportes, deriva de la necesidad de dar cobertura inmediata a las situaciones en las que los procedimientos de desahucio y lanzamiento afecten a personas económicamente vulnerables sin alternativa habitacional, incluso en las causas penales en las que el lanzamiento afecte a personas que carezcan de título para habitar una vivienda.

    Respecto a la urgencia de modificar la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, de una parte, a efectos de derogar la disposición adicional sexta, se significa que la urgencia queda justificada habida cuenta de la existencia de una regulación parcialmente coincidente de la absorción de la financiación procedente de la Unión Europea por parte de la Agencia Estatal de Investigación y el Centro para el Desarrollo Tecnológico Industrial, en la disposición adicional sexta del Real Decreto-ley 36/2020, de 30 de diciembre, por el que se aprueban medidas urgentes para la modernización de la Administración Pública y para la ejecución del Plan de Recuperación, Transformación y Resiliencia, por lo que se precisa que la normativa aplicable será la contenida en el referido real decreto-ley.

    De otra parte, es muy urgente proceder a la modificación de las bonificaciones portuarias para permitir que las bonificaciones que no están recogidas en el texto actual de dicha ley entren en vigor cuanto antes, con el fin de que se puedan aplicar de forma inmediata, coincidiendo con el ejercicio anual, y con ello sea posible una correcta liquidación de las tasas portuarias para este ejercicio 2021.

    Por lo que se refiere a las modificaciones a las que se refieren las disposiciones finales tercera y cuarta se significa que la extraordinaria y urgente necesidad de la modificación de los precios básicos del canon de control de vertidos se justifica en proporcionar seguridad jurídica a sus destinatarios, así como en atención a la actual coyuntura económica, la cual requiere favorecer la actividad de los operadores afectados, en equilibrio con la política de protección de la calidad de las aguas del dominio público hidráulico (como señala por todas, el FJ 4.f) de la ya citada STC 61/2018, de 13 de junio).

    Por su parte, la coherencia del ordenamiento jurídico respecto de la salvaguarda del rango reglamentario de las modificaciones del Reglamento del Dominio Público Hidráulico, se justifica en la necesidad de su concreción «en un plazo más breve que el requerido por la vía normal o por el procedimiento de urgencia para la tramitación parlamentaria de las leyes» (SSTC 31/2011, de 17 de marzo, FJ 4; 137/2011, de 14 de septiembre, FJ 6, y 100/2012, de 8 de mayo, FJ 8).

    El real decreto-ley responde, asimismo, a los principios de necesidad, eficacia, proporcionalidad, seguridad jurídica, transparencia, y eficiencia, tal y como exige la Ley 39/2015, de 1 de octubre, del Procedimiento Administrativo Común de las Administraciones Públicas. La necesidad y eficacia se apoyan en el interés general en el que se fundamentan las medidas de protección que se establecen para quienes son más vulnerables en el ámbito de los consumidores y usuarios, de modo que pueda garantizarse en el contexto de la situación actual, la adecuada defensa de sus derechos como personas consumidoras vulnerables que son objeto de especial protección. Asimismo, las modificaciones que el real decreto-ley incorpora en los demás ámbitos objeto de regulación se consideran necesarias dada la urgencia que presenta dar solución a las cuestiones puestas de manifiesto en cada caso. Se da cumplimiento también el principio de proporcionalidad, porque contiene las medidas que se consideran imprescindibles para la consecución de los objetivos previamente mencionados (STC 139/2016 de 21 julio). Es coherente con el vigente ordenamiento jurídico, en tanto que se procede a su modificación considerando las motivaciones manifestadas, ajustándose, por ello, al principio de seguridad jurídica y, por último, en cuanto al principio de transparencia, esta norma está exenta de los trámites de consulta pública, audiencia e información pública por tratarse de un real decreto-ley.

    En su virtud, haciendo uso de la autorización contenida en el artículo 86 de la Constitución Española, a propuesta del Ministro de Consumo, y previa deliberación del Consejo de Ministros en su reunión del día 19 de enero de 2021,

    DISPONGO:

    Artículo primero. Modificación del texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios y otras leyes complementarias, aprobado por Real Decreto Legislativo 1/2007, de 16 de noviembre.

    El texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios y otras leyes complementarias, aprobado por Real Decreto Legislativo 1/2007, de 16 de noviembre, queda modificado como sigue:

    Uno. Se modifica el artículo 3, que queda redactado de la siguiente manera:

    «Artículo 3. Conceptos de consumidor y usuario y de persona consumidora vulnerable.

    1. A efectos de esta ley, y sin perjuicio de lo dispuesto expresamente en sus libros tercero y cuarto, son consumidores o usuarios las personas físicas que actúen con un propósito ajeno a su actividad comercial, empresarial, oficio o profesión.

    Son también consumidores a efectos de esta norma las personas jurídicas y las entidades sin personalidad jurídica que actúen sin ánimo de lucro en un ámbito ajeno a una actividad comercial o empresarial.

    2. Asimismo, a los efectos de esta ley y sin perjuicio de la normativa sectorial que en cada caso resulte de aplicación, tienen la consideración de personas consumidoras vulnerables respecto de relaciones concretas de consumo, aquellas personas físicas que, de forma individual o colectiva, por sus características, necesidades o circunstancias personales, económicas, educativas o sociales, se encuentran, aunque sea territorial, sectorial o temporalmente, en una especial situación de subordinación, indefensión o desprotección que les impide el ejercicio de sus derechos como personas consumidoras en condiciones de igualdad.»

    Dos. Se modifica el artículo 8, que queda redactado en los siguientes términos:

    «Artículo 8. Derechos básicos de los consumidores y usuarios.

    1. Son derechos básicos de los consumidores y usuarios y de las personas consumidoras vulnerables:

    a) La protección contra los riesgos que puedan afectar su salud o seguridad.

    b) La protección de sus legítimos intereses económicos y sociales; en particular frente a las prácticas comerciales desleales y la inclusión de cláusulas abusivas en los contratos.

    c) La indemnización de los daños y la reparación de los perjuicios sufridos.

    d) La información correcta sobre los diferentes bienes o servicios y la educación y divulgación para facilitar el conocimiento sobre su adecuado uso, consumo o disfrute.

    e) La audiencia en consulta, la participación en el procedimiento de elaboración de las disposiciones generales que les afectan directamente y la representación de sus intereses, a través de las asociaciones, agrupaciones, federaciones o confederaciones de consumidores y usuarios legalmente constituidas.

    f) La protección de sus derechos mediante procedimientos eficaces, en especial en relación con las personas consumidoras vulnerables.

    2. Los derechos de las personas consumidoras vulnerables gozarán de una especial atención, que será recogida reglamentariamente y por la normativa sectorial que resulte de aplicación en cada caso. Los poderes públicos promocionarán políticas y actuaciones tendentes a garantizar sus derechos en condiciones de igualdad, con arreglo a la concreta situación de vulnerabilidad en la que se encuentren, tratando de evitar, en cualquier caso, trámites que puedan dificultar el ejercicio de los mismos.»

    Tres. Se introduce un apartado 3 en el artículo 17 con la siguiente redacción:

    «3. En el cumplimiento de lo dispuesto en los apartados anteriores, se prestará especial atención a aquellos sectores que, debido a su complejidad o características propias, cuenten con mayor proporción de personas consumidoras vulnerables entre sus clientes o usuarios, atendiendo de forma precisa a las circunstancias que generan la situación de concreta vulnerabilidad.»

    Cuatro. Se modifica el apartado 2 del artículo 18, que queda redactado en los siguientes términos:

    «2. Sin perjuicio de las exigencias concretas que se establezcan reglamentariamente y de la normativa sectorial que en cada caso resulte de aplicación, que prestarán especial atención a las personas consumidoras vulnerables, todos los bienes y servicios puestos a disposición de los consumidores y usuarios deberán ser de fácil acceso y comprensión y, en todo caso, incorporar, acompañar o, en último caso, permitir obtener de forma clara y comprensible, información veraz, eficaz y suficiente sobre sus características esenciales, en particular sobre las siguientes:

    a) Nombre y dirección completa del productor.

    b) Naturaleza, composición y finalidad.

    c) Calidad, cantidad, categoría o denominación usual o comercial, si la tienen.

    d) Fecha de producción o suministro y lote, cuando sea exigible reglamentariamente, plazo recomendado para el uso o consumo o fecha de caducidad.

    e) Instrucciones o indicaciones para su correcto uso o consumo, así como la correcta gestión de sus residuos, advertencias y riesgos previsibles.»

    Cinco. Se modifica el artículo 19, que queda redactado de la siguiente manera:

    «Artículo 19. Principio general y prácticas comerciales.

    1. Los legítimos intereses económicos y sociales de los consumidores y usuarios deberán ser respetados en los términos establecidos en esta norma, aplicándose, además, lo previsto en las normas civiles y mercantiles, en las regulaciones sectoriales de ámbito estatal, así como en la normativa comunitaria y autonómica que resulten de aplicación.

    2. Sin perjuicio de lo dispuesto en los apartados siguientes, para la protección de los legítimos intereses económicos y sociales de los consumidores y usuarios, las prácticas comerciales de los empresarios dirigidas a ellos están sujetas a lo dispuesto en esta ley, en la Ley 3/1991, de 10 de enero, de Competencia Desleal, y en la Ley 7/1996, de 15 de enero, de Ordenación del Comercio Minorista, no obstante la normativa sectorial que en cada caso resulte de aplicación. A estos efectos, se consideran prácticas comerciales de los empresarios con los consumidores y usuarios todo acto, omisión, conducta, manifestación o comunicación comercial, incluida la publicidad y la comercialización, directamente relacionada con la promoción, la venta o el suministro de bienes o servicios, incluidos los bienes inmuebles, así como los derechos y obligaciones, con independencia de que sea realizada antes, durante o después de una operación comercial.

    No tienen la consideración de prácticas comerciales las relaciones de naturaleza contractual, que se regirán conforme a lo previsto en el artículo 59.

    3. Lo dispuesto en el apartado anterior no obsta la aplicación de:

    a) Las normas que regulen las prácticas comerciales que puedan afectar a la salud y seguridad de los consumidores y usuarios, incluidas las relativas a la seguridad de bienes y servicios.

    b) Las normas sobre certificación y grado de pureza de los objetos fabricados con metales preciosos.

    4. Las normas previstas en esta ley en materia de prácticas comerciales y las que regulan las prácticas comerciales en materia de medicamentos, etiquetado, presentación y publicidad de los productos, indicación de precios, aprovechamiento por turno de bienes inmuebles, crédito al consumo, comercialización a distancia de servicios financieros destinados a los consumidores y usuarios, comercio electrónico, inversión colectiva en valores mobiliarios, normas de conducta en materia de servicios de inversión, oferta pública o admisión de cotización de valores y seguros, incluida la mediación y cualesquiera otras normas de carácter sectorial que regulen aspectos concretos de las prácticas comerciales desleales previstos en normas comunitarias prevalecerán en caso de conflicto sobre la legislación de carácter general aplicable a las prácticas comerciales desleales.

    El incumplimiento de las disposiciones a que hace referencia este apartado será considerado en todo caso práctica desleal por engañosa, en iguales términos a lo dispuesto en el artículo 19.2 de la Ley 3/1991, de 10 de enero, de Competencia Desleal, en relación con las prácticas engañosas reguladas en los artículos 20 a 27 de dicha ley.

    5. En relación con las prácticas comerciales relativas a servicios financieros y bienes inmuebles, y en el ámbito de las telecomunicaciones o energético, podrán establecerse normas legales o reglamentarias que ofrezcan una mayor protección al consumidor o usuario.

    6. Las políticas públicas que inciden en el ámbito del consumo y las prácticas comerciales orientadas a las personas consumidoras vulnerables estarán destinadas, en su caso y siempre dentro del ámbito de las relaciones entre consumidores o usuarios y empresarios, a prever y remover, siempre que sea posible, las circunstancias que generan la situación de vulnerabilidad, así como a paliar sus efectos, en particular en relación con las comunicaciones comerciales o información precontractual facilitada, la atención post contractual o el acceso a bienes o servicios básicos.»

    Seis. Se modifica el apartado 2 del artículo 20, y se añade un apartado 3, quedando redactados del modo siguiente:

    «2. A efectos del cumplimiento de lo previsto en el apartado anterior, y sin perjuicio de la normativa sectorial que en su caso resulte de aplicación, la información necesaria a incluir en la oferta comercial deberá facilitarse a los consumidores o usuarios, principalmente cuando se trate de personas consumidoras vulnerables, en términos claros, comprensibles, veraces y en un formato fácilmente accesible, de forma que aseguren su adecuada comprensión y permitan la toma de decisiones óptimas para sus intereses.

    3. El incumplimiento de lo dispuesto en los apartados anteriores será considerado práctica desleal por engañosa en iguales términos a los que establece el artículo 7 de la Ley 3/1991, de 10 de enero, de Competencia Desleal.»

    Siete. Se modifica la letra c) del artículo 43, que queda redactada del siguiente modo:

    «c) Los bienes o servicios sobre los que se produzca un mayor número de reclamaciones o en los que, por el tipo de estas, quepa deducir razonablemente que existen situaciones especialmente lesivas para los derechos de los consumidores y usuarios o que afecten, en particular, a las personas consumidoras vulnerables.»

    Ocho. Se incorpora un segundo párrafo al apartado 1 del artículo 60, quedando redactado del modo siguiente:

    «1. Antes de que el consumidor y usuario quede vinculado por un contrato y oferta correspondiente, el empresario deberá facilitarle de forma clara y comprensible, salvo que resulte manifiesta por el contexto, la información relevante, veraz y suficiente sobre las características principales del contrato, en particular sobre sus condiciones jurídicas y económicas.

    Sin perjuicio de la normativa sectorial que en su caso resulte de aplicación, los términos en que se suministre dicha información, principalmente cuando se trate de personas consumidoras vulnerables, además de claros, comprensibles, veraces y suficientes, se facilitarán en un formato fácilmente accesible, garantizando en su caso la asistencia necesaria, de forma que aseguren su adecuada comprensión y permitan la toma de decisiones óptimas para sus intereses.»

    Artículo segundo. Modificación del Real Decreto Legislativo 1/2007, de 16 de noviembre, por el que se aprueba el texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios y otras leyes complementarias.

    Se modifica el apartado 2 de la disposición final primera del Real Decreto Legislativo 1/2007, de 16 de noviembre, por el que se aprueba el texto refundido de la Ley General para la Defensa de los Consumidores y Usuarios y otras leyes complementarias, que queda redactado del modo siguiente:

    «2. Los artículos 8, 9, 17.1 y 3, 18, 23. 1 y 3, 25 y 26; los capítulos III y V del título I del libro primero y el título IV del libro primero tienen carácter básico al dictarse al amparo de las competencias que corresponden al Estado en el artículo 149.1.1.ª, 13.ª y 16.ª de la Constitución Española

    Disposición final primera. Modificación del Real Decreto-ley 11/2020, de 31 de marzo, por el que se adoptan medidas urgentes complementarias en el ámbito social y económico para hacer frente al COVID-19.

    El Real Decreto-ley 11/2020, de 31 de marzo, por el que se adoptan medidas urgentes complementarias en el ámbito social y económico para hacer frente al COVID-19, se modifica en los siguientes términos:

    Uno. Se modifica el título y el apartado 1 del artículo 1 bis, que quedan redactados de la siguiente manera:

    «Artículo 1 bis. Suspensión durante el estado de alarma del procedimiento de desahucio y de los lanzamientos para personas económicamente vulnerables sin alternativa habitacional en los supuestos de los apartados 2º, 4º y 7º del artículo 250.1 de la Ley 1/2000, de 7 de enero, de Enjuiciamiento Civil, y en aquellos otros en los que el desahucio traiga causa de un procedimiento penal.

    1. Desde la entrada en vigor del presente real decreto-ley y hasta la finalización del estado de alarma declarado por el Real Decreto 926/2020, de 25 de octubre, por el que se declara el estado de alarma para contener la propagación de infecciones causadas por el SARS-CoV-2, prorrogado por Real Decreto 956/2020, de 3 de noviembre, en todos los juicios verbales en los que se sustancien las demandas a las que se refieren los apartados 2.º, 4.º y 7.º del artículo 250.1 de la Ley 1/2000, de 7 de enero, de Enjuiciamiento Civil, y en aquellos otros procesos penales en los que se sustancie el lanzamiento de la vivienda habitual de aquellas personas que la estén habitando sin ningún título habilitante para ello, el Juez tendrá la facultad de suspender el lanzamiento hasta la finalización del estado de alarma.

    Estas medidas de suspensión que se establecen con carácter extraordinario y temporal, dejarán de surtir efecto en todo caso en cuanto finalice el estado de alarma declarado por Real Decreto 926/2020, de 25 de octubre, prorrogado por Real Decreto 956/2020, de 3 de noviembre.»

    Dos. Se modifican las letras b) y c) del apartado 7 del artículo 1 bis, que quedan redactadas del modo siguiente:

    «b) Cuando se haya producido en un inmueble de propiedad de una persona física o jurídica que lo tenga cedido por cualquier título válido en derecho a una persona física que tuviere en él su domicilio habitual o segunda residencia debidamente acreditada.

    c) Cuando la entrada o permanencia en el inmueble se haya producido mediando intimidación o violencia sobre las personas.»

    Disposición final segunda. Modificación de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021.

    Con efectos desde el 1 de enero de 2021, la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, queda modificada del siguiente modo:

    Uno. Se deroga la disposición adicional sexta.

    Dos. Se modifica el anexo XII. Bonificaciones Portuarias, de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, en el siguiente sentido:

    1. En la Autoridad Portuaria de Barcelona, en las bonificaciones 245.3 bis, se incluye una última frase: «Las liquidaciones de estas tasas con fecha de devengo a partir del día 1 de noviembre de 2020, practicadas antes de la entrada en vigor de esta ley, tendrán la consideración de provisionales y podrán revisarse, mediante la aplicación de la presente bonificación, a solicitud del sujeto pasivo formulada antes de que transcurra el plazo de dos meses a contar desde la entrada en vigor de esta ley.»

    2. En la Autoridad Portuaria de Las Palmas, en las bonificaciones del artículo 182, se incluye la frase: «(c) C= Toneladas movidas/metros cuadrados de superficie otorgada en concesión. Se aplicará sobre la tasa de ocupación de la superficie otorgada en concesión o autorización.»

    3. En la Autoridad Portuaria de Motril, en las bonificaciones 245.3 bis, se incluye una última frase: «Estas bonificaciones serán de aplicación a las tasas devengadas a partir del 1 de marzo de 2020.»

    4. En la Autoridad Portuaria de Vilagarcía, en la bonificación 245.3 bis, se incluye una última frase: «El efecto multiplicativo de las bonificaciones compatibles con las del artículo 245.3 no podrá superar el 40 % de bonificación a la cuota de la tasa correspondiente.

    5. En la Autoridad Portuaria de Santander, en las bonificaciones 245.3, se incluye un primer cuadro completo, el cual figura en el anexo de este real decreto-ley.

    Disposición final tercera. Habilitación para modificaciones de determinados preceptos del Real Decreto 849/1986, de 11 de abril, por el que se aprueba el Reglamento del Dominio Público Hidráulico que desarrolla los títulos preliminar, I, IV, V, VI, VII y VIII del texto refundido de la Ley de Aguas, aprobado por el Real Decreto Legislativo 1/2001, de 20 de julio.

    Las modificaciones del Real Decreto 849/1986, de 11 de abril, por el que se aprueba el Reglamento del Dominio Público Hidráulico, que desarrolla los títulos preliminar, I, IV, V, VI y VII del texto refundido de la Ley de Aguas, aprobado por el Real Decreto Legislativo 1/2001, de 20 de julio, aprobadas mediante la disposición final quinta de la Ley 11/2020, de 30 de diciembre, de Presupuestos Generales del Estado para el año 2021, que afectan al último párrafo del apartado a) del artículo 300, al primer párrafo del artículo 303, al último párrafo del apartado a) del artículo 307 y al primer párrafo del artículo 310, podrán efectuarse mediante disposición con rango de real decreto.

    Disposición final cuarta. Modificación de los precios básicos del canon de control de vertidos del texto refundido de la Ley de Aguas, aprobado por Real Decreto Legislativo 1/2001, de 20 de julio.

    Se modifica el párrafo segundo del apartado 3 del artículo 113 del texto refundido de la Ley de Aguas, aprobado por Real Decreto legislativo 1/2001, de 20 de julio, que queda redactado de la siguiente forma:

    «El precio básico por metro cúbico se fija en 0,01751 euros para el agua residual urbana y en 0,04377 euros para el agua residual industrial. Estos precios básicos podrán revisarse periódicamente en las Leyes de Presupuestos Generales del Estado.»

    Disposición final quinta. Entrada en vigor.

    El presente real decreto-ley entrará en vigor el día siguiente al de su publicación en el «Boletín Oficial del Estado».

    Dado en Madrid, el 19 de enero de 2021.

    FELIPE R.

    El Presidente del Gobierno,

    PEDRO SÁNCHEZ PÉREZ-CASTEJÓN

    ANEXO. Autoridad Portuaria de Santander

    […………………………]

    Información relacionada

    El Real Decreto-ley 1/2021, de 19 de enero, ha sido convalidado por Acuerdo del Congreso de los Diputados, publicado por Resolución de 4 de febrero de 2021. Ref. BOE-A-2021-1976

    28Abr/21

    CJI/RES. 266 (XCVIII/21) de 9 de abril de 2021. Principios actualizados sobre la privacidad y la protección de datos personales, con anotaciones.

    CJI/RES. 266 (XCVIII/21) de 9 de abril de 2021. Principios actualizados sobre la privacidad y la protección de datos personales, con anotaciones.

    CJI/RES. 266 (XCVIII/21)

    PRINCIPIOS ACTUALIZADOS SOBRE LA PRIVACIDAD Y LA PROTECCIÓN DE DATOS PERSONALES, CON ANOTACIONES

    EL COMITÉ JURÍDICO INTERAMERICANO,

    TENIENDO EN CUENTA:

    Que la Asamblea General de la OEA, mediante resolución AG/RES. 2926 (XLVIII-O/18) “Derecho Internacional”, en el punto i sobre “Observaciones y Recomendaciones al Informe Anual del Comité Jurídico Interamericano”, solicitó a este órgano que inicie la actualización de los Principios sobre la Protección de Datos Personales, teniendo en cuenta la evolución de los mismos; y que mediante resolución AG/RES. 2930 (XLIX-O/19) “Derecho Internacional” solicitó al CJI continuar con dicha labor;

    Que el CJI, a fin de dar cumplimiento a este mandato, procedió a la actualización de los “Principios sobre Privacidad y Protección de Datos Personales, con Anotaciones” adoptados en el año 2015 por el CJI como guía legislativa para los Estados miembros de la OEA, con base en los desarrollos normativos internacionales ocurridos desde 2015 y a la fecha;

    Que además de realizar una revisión exhaustiva y minuciosa de los Principios Anotados a la luz de los avances más recientes a nivel internacional, la relatoría del tema llevó a cabo un proceso de consultas entre agosto de 2020 y febrero de 2021, abierto a todos los Estados miembros y algunas entidades internacionales con el fin de incorporar estos valiosos insumos en su revisión, a fin de producir un documento que refleje las distintas aproximaciones que sobre el tema coexisten en la región;

    RESUELVE:

    1. Aprobar los “Principios Actualizados sobre la Privacidad y la Protección de los Datos Personales, con Anotaciones” (documento CJI/doc. 638/21) anexos a la presente resolución.

    2. Agradecer a la relatora del tema, doctora Mariana Salazar Albornoz, por la labor realizada, incluyendo la presentación de la versión final del documento referido en el numeral 1 anterior, la cual recoge además los comentarios y sugerencias realizadas por los demás miembros del Comité Jurídico Interamericano durante este 98º período de sesiones.

    3. Transmitir la presente resolución y los Principios Actualizados sobre la Privacidad y la Protección de los Datos Personales contenidos en la sección I del documento anexo, sin sus correspondientes anotaciones, a la Asamblea General para su debido conocimiento, y recomendar su aprobación por parte de este órgano.

    4. Solicitar al Departamento de Derecho Internacional, en su calidad de Secretaría Técnica del Comité Jurídico Interamericano, que le dé a estos Principios la mayor difusión entre los diversos actores interesados.

    La presente resolución fue aprobada por unanimidad en la sesión ordinaria celebrada el 9 de abril de 2021, por los siguientes miembros: doctores

    Mariana Salazar Albornoz,

    George Rodrigo Bandeira Galindo,

    Ramiro Gastón Orias Arredondo,

    José Antonio Moreno Rodríguez,

    Cecília Fresnedo de Aguirre,

    Ruth Stella Correa Palacio,

    Stephen G. Larson, Eric P. Rudge,

    Luis García-Corrochano Moyano,

    Miguel Angel Espeche Gil y

    Milenko Bertrand-Galindo Arriagada.

    28Abr/21

    Resolución AG/RES. 2004 (XXXIV-O/04) de 8 de junio de 2004

    Resolución AG/RES. 2004 (XXXIV-O/04) de 8 de junio de 2004. Adopción de una Estrategia Interamericana Integral de Seguridad Cibernética: Un enfoque multidimensional y multidisciplinario para la creación de una cultura de Seguridad Cibernética.

    AG/RES. 2004 (XXXIV-O/04)

    ADOPCIÓN DE UNA ESTRATEGIA INTERAMERICANA INTEGRAL PARA COMBATIR LAS AMENAZAS A LA SEGURIDAD CIBERNÉTICA:

    UN ENFOQUE MULTIDIMENSIONAL Y MULTIDISCIPLINARIO PARA LA CREACIÓN DE UNA CULTURA DE SEGURIDAD CIBERNÉTICA

     (Aprobada en la cuarta sesión plenaria, celebrada el 8 de junio de 2004)

    LA ASAMBLEA GENERAL,

    VISTO el informe anual del Consejo Permanente a la Asamblea General (AG/doc.4265/04 add. 5 corr. 1), en particular la sección sobre los temas encomendados a la Comisión de Seguridad Hemisférica, y específicamente las recomendaciones sobre una Estrategia Interamericana Integral para Combatir las Amenazas a la Seguridad Cibernética;

    RECORDANDO su resolución AG/RES. 1939 (XXXIII-O/03),Desarrollo de una estrategia interamericana para combatir las amenazas a la seguridad cibernética”;

    TENIENDO PRESENTE que el Comité Interamericano contra el Terrorismo (CICTE), en su cuarto período ordinario de sesiones, celebrado en Montevideo, Uruguay, del 28 al 30 de enero de 2004, adoptó la Declaración de Montevideo (CICTE/DEC. 1/04 rev. 3), en la que declara su compromiso de identificar y combatir las amenazas terroristas emergentes, independientemente de sus origen o motivación, tales como las amenazas a la seguridad cibernética;

    OBSERVANDO CON SATISFACCIÓN:

    Que la Conferencia de la OEA sobre Seguridad Cibernética, celebrada en Buenos Aires, Argentina, del 28 al 29 de julio de 2003, en cumplimiento de la resolución AG/RES. 1939 (XXXIII-O/03), demostró la gravedad de las amenazas en el ámbito de seguridad cibernética a los sistemas de información esenciales, las estructuras de información esenciales y las economías en todo el mundo y subrayó que una acción eficaz para abordar este problema debe contar con cooperación intersectorial y coordinación entre una amplia gama de entidades gubernamentales y no gubernamentales;

    Que el CICTE, en su cuarto período ordinario de sesiones, celebrado en Montevideo, Uruguay, del 28 al 30 de enero de 2004, consideró el documento “Marco para el establecimiento de una Red Interamericana CSIRT de vigilancia y alerta” (CICTE/INF.4/04) y decidió celebrar una reunión de expertos gubernamentales en materia de seguridad cibernética en marzo de 2004 en Ottawa, Canadá, a fin de preparar sus recomendaciones para el proyecto de Estrategia Interamericana Integral para Combatir las Amenazas a la Seguridad Cibernética, en cumplimiento de la resolución AG/RES. 1939 (XXXIII-O/03); y

    Las recomendaciones formuladas por el CICTE (CICTE/REGVAC/doc.2/04), la CITEL (CPP.I-TEL/doc.427/04 rev. 2) y la Reunión de Ministros de Justicia o Ministros o Procuradores Generales de las Américas (REMJA) y su Grupo de Expertos Gubernamentales en Materia de Delito Cibernético (CIBER-III/doc.4/03);

    ACOGIENDO CON BENEPLÁCITO el proyecto de Estrategia Interamericana Integral para Combatir las Amenazas a la Seguridad Cibernética: Un enfoque multidimensional y multidisciplinario para crear una cultura de seguridad cibernética, recomendado a la Asamblea General por el Consejo Permanente como un esfuerzo conjunto de los Estados Miembros y sus expertos con los conocimientos técnicos especializados del CICTE, la CITEL y el Grupo de Expertos Gubernamentales en Materia de Delito Cibernético de la REMJA (CP/doc…/04);

    RECONOCIENDO:

    La urgente necesidad de incrementar la seguridad de las redes y sistemas de información comúnmente denominados Internet, a fin de abordar las vulnerabilidades y proteger a los usuarios, la seguridad nacional y las infraestructuras esenciales frente a las graves y perjudiciales amenazas que representan aquellos que podrían llevar a cabo ataques en el espacio cibernético con fines maliciosos o delictivos;

    La necesidad de crear una red interamericana de alerta y vigilancia para diseminar rápidamente información sobre seguridad cibernética y responder a crisis, incidentes y amenazas a la seguridad de las computadoras y recuperarse de los mismos;

    La necesidad de desarrollar redes y sistemas de Internet dignos de confianza y fiables, mejorando de ese modo la confianza del usuario en dichas redes y sistemas;

    REITERANDO la importancia de desarrollar una estrategia global para la protección de la infraestructura de información que adopte un enfoque integral, internacional y multidisciplinario;

    CONSIDERANDO:

    Las resoluciones 55/63 y 56/121 de la Asamblea General de las Naciones Unidas sobre la lucha contra la utilización de la tecnología de la información con fines delictivos, la resolución 57/239 relativa a la creación de una cultura mundial de seguridad cibernética y la resolución 58/199 sobre la creación de una cultura mundial de seguridad cibernética y la protección de las infraestructuras de información esenciales; y

    Que en su XII Reunión, el Comité Directivo Permanente de la Comisión Interamericana de Telecomunicaciones (COM/CITEL), señaló que la “creación de una cultura de ciberseguridad para proteger la infraestructura de las telecomunicaciones aumentando la conciencia entre todos los participantes de las Américas en las redes y sistemas de información relacionados con el riesgo de dichos sistemas y desarrollando las medidas necesarias para hacer frente a los riesgos de seguridad respondiendo rápidamente a los ciber-incidentes” es parte de los mandatos de la CITEL,

    RESUELVE:

    1. Adoptar el proyecto de Estrategia Interamericana Integral de Seguridad Cibernética que se adjunta como anexo.

    2. Instar a los Estados Miembros a implementar dicha Estrategia.

    3. Instar a los Estados Miembros a establecer o identificar grupos nacionales de “vigilancia y alerta”, también conocidos como “Equipos de Respuesta a Incidentes de Seguridad en Computadoras” (CSIRT).

    4. Dar renovado énfasis a la importancia de lograr sistemas seguros de información de Internet en todo el Hemisferio.

    5. Solicitar al Consejo Permanente que, por medio de la Comisión de Seguridad Hemisférica, siga abordando esta cuestión y continúe facilitando las medidas de coordinación para implementar dicha Estrategia, en particular los esfuerzos de los expertos gubernamentales, el Comité Interamericano contra el Terrorismo (CICTE), la Comisión Interamericana de Telecomunicaciones (CITEL) y el Grupo de Expertos en Materia de Delito Cibernético de la Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA) y otros órganos pertinentes de la OEA.

    6. Instar a los Estados Miembros y a los órganos, organismos y entidades de la OEA a que coordinen sus esfuerzos para incrementar la seguridad cibernética.

    7. Solicitar a las Secretarías del CICTE y la CITEL y al Grupo de Expertos Gubernamentales en Materia de Delito Cibernético de la REMJA que asistan a los Estados Miembros, cuando lo soliciten, en la implementación de las respectivas partes de la Estrategia y presenten un informe conjunto al Consejo Permanente, por medio de la Comisión de Seguridad Hemisférica, sobre el cumplimiento de esta resolución, antes del trigésimo quinto período ordinario de sesiones de la Asamblea General.

    8. Respaldar la celebración de la segunda Reunión de Practicantes Gubernamentales en Materia de Seguridad Cibernética que convocará el CICTE para el seguimiento oportuno de las recomendaciones sobre el Establecimiento de la Red Interamericana de Alerta y Vigilancia, que figuran en el documento CICTE/REGVAC/doc.2/04 y que forman parte de la Estrategia.

    9. Estipular que esa Reunión de Practicantes Gubernamentales en Materia de Seguridad Cibernética se celebre con los recursos asignados en el programa-presupuesto de la Organización y otros recursos, y solicitar que la Secretaría General y la Secretaría del CICTE proporcionen el apoyo administrativo y técnico necesario para esta reunión.

    10. Instar a los Estados Miembros a implementar, según corresponda, las recomendaciones de la Reunión Inicial del Grupo de Expertos Gubernamentales en Materia de Delito Cibernético de la REMJA (REMJA-V/doc.5/04) y las recomendaciones relativas a seguridad cibernética de la Quinta Reuníón de la REMJA (REMJA-V/doc.7/04 rev. 4) como medio de crear un marco para promulgar leyes que protejan los sistemas de información, impidan el uso de computadoras para facilitar actividades ilícitas y sancionen el delito cibernético.

    11. Solicitar al Consejo Permanente que informe a la Asamblea General en su trigésimo quinto período ordinario de sesiones sobre la implementación de esta resolución.

    ANEXO A. UNA ESTRATEGIA INTERAMERICANA INTEGRAL DE SEGURIDAD CIBERNÉTICA: UN ENFOQUE MULTIDIMENSIONAL Y MULTIDISCIPLINARIO  PARA LA CREACIÓN DE UNA CULTURA DE SEGURIDAD CIBERNÉTICA.

    INTRODUCCIÓN

    La Internet y las redes y tecnologías relacionadas se han convertido en instrumentos indispensables para los Estados Miembros de la OEA.  La Internet ha impulsado un gran crecimiento en la economía mundial y ha aumentado la eficacia, productividad y creatividad en todo el Hemisferio. Individuos, empresas y gobiernos cada vez utilizan más las redes de información que integran la Internet para hacer negocios; organizar y planificar actividades personales, empresariales y gubernamentales; transmitir comunicaciones; y realizar investigaciones. Asimismo, en la Tercera Cumbre de las Américas, en la ciudad de Quebec, Canadá, en 2001, nuestros líderes se comprometieron a seguir aumento la conectividad en las Américas.

    Lamentablemente, la Internet también ha generado nuevas amenazas que ponen en peligro a toda la comunidad mundial de usuarios de Internet.  La información que transita por Internet puede ser malversada y manipulada para invadir la privacidad de los usuarios y estafar a los negocios.  La destrucción de los datos que residen en las computadoras conectadas por Internet puede obstaculizar las funciones del gobierno e interrumpir el servicio público de telecomunicaciones y otras infraestructuras críticas.  Estas amenazas a nuestros ciudadanos, economías y servicios esenciales, tales como las redes de electricidad, aeropuertos o suministro de agua, no pueden ser abordadas por un solo gobierno ni tampoco pueden combatirse utilizando una sola disciplina o práctica.  Como reconoce la Asamblea General en la resolución AG/RES. 1939 (XXXIII-O/03) (Desarrollo de una Estrategia Interamericana para Combatir las Amenazas a la Seguridad Cibernética), es necesario desarrollar una estrategia integral para la protección de las infraestructuras de información que adopte un enfoque integral, internacional y multidisciplinario. La OEA está comprometida con el desarrollo e implementación de esta estrategia de seguridad cibernética y en respaldo a esto, celebró una Conferencia sobre Seguridad Cibernética (Buenos Aires, Argentina, del 28 al 29 de julio de 2003) que demostró la gravedad de las amenazas a la seguridad cibernética para la seguridad de los sistemas de información esenciales, las insfraestructuras esenciales y las economías en todo el mundo, y que una acción eficaz para abordar este problema debe contar con la cooperación intersectorial y la coordinación entre una amplia gama de entidades gubernamentales y no gubernamentales.(1)

    De forma similar, en la Conferencia Especial sobre Seguridad (Ciudad de México, México, del 28 al 20 de octubre de 2003) los Estados Miembros consideraron el tema de la seguridad cibernética y acordaron lo siguiente:

    “Desarrollaremos una cultura de seguridad cibernética en las Américas adoptando medidas de prevención eficaces para prever, tratar y responder a los ataques cibernéticos, cualquiera sea su origen, luchando contra las amenazas cibernéticas y la delincuencia cibernética, tipificando los ataques contra el espacio cibernético, protegiendo la infraestructura crítica y asegurando las redes de los sistemas. Reafirmamos nuestro compromiso de desarrollar e implementar una estrategia integral de la OEA sobre seguridad cibernética, utilizando las contribuciones y recomendaciones elaboradas conjuntamente por los expertos de los Estados Miembros y por el Grupo de Expertos Gubernamentales de la REMJA en Materia de Delito Cibernético, el CICTE, la Comisión Interamericana de Telecomunicaciones (CITEL) y otros órganos apropiados, teniendo en cuenta el trabajo que desarrollan los Estados Miembros coordinado con la Comisión de Seguridad Hemisférica.”(2)

    Los estados del Hemisferio, reunidos en el cuarto período ordinario de sesiones del Comité Interamericano contra el Terrorismo (CICTE) (Montevideo, Uruguay, del 28 al 30 de enero de 2004), una vez más declararon su compromiso de combatir el terrorismo, incluidas las amenazas a la seguridad cibernética, la cual identificaron como una de las amenazas terroristas emergentes.(3)  en esa ocasión, el CICTE también consideró el documento “Marco para establecer una Red Interamericana CSIRT de Vigilancia y Alerta”.(4)  en esa ocasión el CICTE también decidió celebrar, en Ottawa, Canádá, en marzo de 2004, una reunión de expertos o practicantes gubernamentales para considerar ese Marco y elaborar recomendaciones, como aporte del CICTE a la Estrategia Interamericana Integral de Seguridad Cibernética.

    La Estrategia Interamericana Integral de Seguridad Cibernética se basa en los esfuerzos y conocimientos especializados del Comité Interamericano contra el Terrorismo (CICTE), la Comisión Interamericana de Telecomunicaciones  (CITEL), y la Reunión de Ministros de Justicia o Ministros o Procuradores Generales de las Américas (REMJA).  La Estrategia reconoce la necesidad de que todos los participantes en las redes y sistemas de información sean conscientes de sus funciones y responsabilidades con respecto a la seguridad a fin de crear una cultura de seguridad cibernética.

    La Estrategia también reconoce que un marco eficaz para la protección de las redes y sistemas de información que integran la Internet y para responder a incidentes y recuperarse de los mismos dependerá en igual medida de que:

    Se proporcione información a los usuarios y operadores para ayudarles a asegurar sus computadoras y redes contra amenazas y vulnerabilidades, y a responder ante incidentes y a recuperarse de los mismos;

    Se fomenten asociaciones públicas y privadas con el objetivo de incrementar la educación y la concientización, y se trabaje con el sector privado –el cual posee y opera la mayoría de las infraestructuras de información de las que dependen las naciones—para asegurar esas infraestructuras;

    Se identifiquen y evalúen normas técnicas y prácticas óptimas para asegurar la seguridad de la información transmitida por Internet y otras redes de comunicaciones, y se promueva la adopción de las mismas; y

    Se promueva la adopción de políticas y legislación sobre delito cibernético que protejan a los usuarios de Internet y prevengan y disuadan el uso indebido e ilícito de computadoras y redes informáticas, respetando a su vez la privacidad de los derechos individuales de los usuarios de Internet.

    Los Estados Miembros de la OEA están comprometidos, en el marco de este proyecto de Estrategia Interamericana Integral de Seguridad Cibernética, a fomentar una cultura de seguridad cibernética que disuada el uso indebido de la Internet y los sistemas de información asociados e impulse el desarrollo de redes de información que sean de confianza y fiables.  Este compromiso se llevará a cabo por medio de las acciones de los Estados Miembros y las iniciativas que emprenderán el CICTE, la CITEL, y el Grupo de Expertos Gubernamentales en Materia de Delito Cibernético de la REMJA que se describen a continuación.

    CICTE: Formación de una Red Interamericana de Vigilancia y Alerta para la rápida divulgación de información sobre seguridad cibernética y la respuesta a crisis, incidentes y amenazas a la seguridad informática

    Dada la rápidamente cambiante naturaleza de la tecnología, el descubrimiento diario de nuevas vulnerabilidades en el software y hardware, y el creciente número de incidentes de seguridad, la seguridad cibernética es imposible sin un suministro constante y fiable de información sobre amenazas y vulnerabilidades y sobre cómo responder ante estos incidentes y recuperarse de los mismos. Por lo tanto, en respaldo a la Estrategia Interamericana Integral de Seguridad Cibernética, el CICTE formulará planes para la creación de una red hemisférica que funcione 24 horas al día, 7 días a la semana, de Equipos de Respuesta a Incidentes de Seguridad en Computadoras (CSIRT) con la capacidad y el mandato de divulgar correcta y rápidamente información relacionada con la seguridad cibernética y proporcionar orientación y apoyo técnico en el caso de un incidente cibernético.  Estos equipos podrían empezar simplemente como puntos nacionales de contacto ubicados en cada Estado encargados de recibir información relacionada con la seguridad informática que se transformarían en CSIRT en el futuro. Las características principales de la iniciativa para crear esta red hemisférica se esbozan más abajo y se describen en detalle en el documento “Recomendaciones del Taller para Practicantes en Materia de Seguridad Cibernética del CICTE sobre la Estrategia Integral de Seguridad Cibernética de la OEA: Marco para establecer una Red Interamericana CSIRT de Vigilancia y Alerta” (CICTE/REGVAC/doc.2/04).(5) El CICTE creará, junto con los Estados Miembros, esta red hemisférica utilizando el plan de acción que se presenta en ese documento (CICTE/REGVAC/ doc.2/04, Sección IV, páginas 4-6).

    Principios

    Los grupos de “vigilancia y alerta” que participarán en la iniciativa del CICTE compartirán los siguientes principios comunes:

    Locales – La red hemisférica debe ser manejada y controlada por los puntos nacionales de contacto en cada país participante nombrados por los gobiernos.

    Sistémicos – La red hemisférica requiere un personal capacitado, la distribución periódica de información relativa a las amenazas y vulnerabilidades vigentes, una reevaluación constante, la implementación de las mejores prácticas y la apropiada interacción con las personas encargadas de formular políticas.

    Permanentes – Debido a la evolución diaria inherente a la Internet, el programa deberá actualizarse y mantenerse con regularidad, y el personal deberá ser capacitado periódicamente.

    Responsables – Deben entenderse y seguirse las reglas establecidas con respecto a cuestiones tales como el manejo y el suministro de la información, ya que de otra manera los usuarios perderían la confianza y los esfuerzos para proteger el sistema se verán perjudicados e incluso serán contraproducentes.

    Basados en disposiciones ya existentes – Hay un número de entidades que ya existen en el Hemisferio y que proporcionan servicios de seguridad cibernética en mayor o menor medida. Un sistema nuevo deberá basarse en esas instituciones ya existentes, a fin de evitar duplicaciones y promover una participación activa.

    Creación de la red hemisférica

    La creación de una red hemisférica de CSIRT requerirá una serie de medidas progresivas que dependerán de la participación activa de los Estados Miembros:

    Identificación de organizaciones CSIRT existentes – Debe realizarse un censo de CSIRT en el Hemisferio a fin de identificar lagunas en la cobertura de los CSIRT que actualmente existen en el Hemisferio y prevenir la duplicación de esfuerzos.

    Establecimiento de un modelo de servicio – Los CSIRT nacionales deberán ser designados por sus gobiernos respectivos y será certificados y autorizados de acuerdo con las normas internacionales de la comunidad de servicios informáticos.  También deberá establecerse un conjunto mínimo de normas para la cooperación y el intercambio de información entre los CSIRT, como las que se enumeran en el documento CICTE/REGVAC/doc.2/04.

    Cuestiones de confianza – Dado que gran parte de la información que tienen que intercambiar los CSIRT es de propiedad exclusiva, o es de carácter delicado por otros motivos, debe crearse confianza entre los participantes como un elemento esencial de la red hemisférica.  Para establecer relaciones de confianza, los CSIRT deberán contar con los atributos y capacidades que se describen en el documento CICTE/REGVAC/doc.2/04, los cuales incluyen una infraestructura segura para el manejo de información delicada; la capacidad para comunicarse sin riesgos con los interesados; y procedimientos de protección contra la fuga de información.  Los Estados Miembros mantendrán en todo momento el derecho a determinar el tipo de información que intercambiarían a través de sus CSIRT designados.

    Creación de conciencia pública – Los CSIRT nacionales deberán asegurar que el público sabe cómo notificar un incidente cibernético y a quién notificarlo.

    Extensión de la red – Los Estados Miembros considerarán, cuando proceda, extender las capacidades de la red hemisférica, a fin de ayudar a los Estados que así lo soliciten en la elaboración de sus planes concretos, la obtención de financiamiento y la creación de proyectos de desarrollo de capacidades.

    Mantenimiento de la red – El Grupo de Practicantes Gubernamentales en Materia de Seguridad Cibernética se reunirá periódicamente, en la medida necesaria y cuando lo convoque el CICTE, teniendo en cuenta los recursos disponibles.

    CITEL:  Identificación y adopción de normas técnicas para una arquitectura segura de Internet

    La IV Reunión del Comité Consultivo Permanente I: Normalización de las Telecomunicaciones, celebrada en Quito, Ecuador, del 16 al 19 de marzo de 2004, adoptó la Resolución adjunta CCP.I/RES.49 (IV-04)(6)Seguridad cibernética“, tras llevar a cabo un taller conjunto con la Unión Internacional de Telecomunicaciones (UIT) que abordó cuestiones clave de seguridad cibernética en lo que concierne a la CITEL. Dicha resolución, que incluye la contribución de la CITEL a la Estrategia Interamericana Integral sobre Seguridad Cibernética, se reproduce más adelante y proporciona orientación para la futura labor de la CITEL en esa área:

    Una estrategia eficaz de seguridad cibernética deberá reconocer que la seguridad de la red de los sistemas de información que comprenden la Internet requiere una alianza entre el gobierno y la industria. Tanto las industrias de telecomunicaciones y de tecnología de la información como los gobiernos de los Estados Miembros de la OEA están buscando soluciones integrales de seguridad cibernética eficaces en función de costos. Las capacidades de seguridad en los productos de computación son imprescindibles como elementos de la seguridad global de la red. Sin embargo, a medida de que se produzcan más tecnologías y se las integren en las redes existentes, su compatibilidad e interoperabilidad – o la falta de estas – determinarán su eficacia. La seguridad deberá desarrollarse de una manera tal que promueva la integración de capacidades de seguridad aceptables con la arquitectura general de la red. Para lograr semejantes soluciones integradas de seguridad cibernética con base en la tecnología, deberá diseñarse la seguridad de la red alrededor de normas internacionales desarrolladas en un proceso abierto.

    El desarrollo de normas para la arquitectura de seguridad en Internet requerirá un proceso de múltiples pasos para asegurar que se logre un nivel adecuado de consenso, planificación y aceptación entre las diferentes entidades gubernamentales y privadas que deberán cumplir un papel en la promulgación de semejantes normas. Aprovechando el trabajo de organizaciones de normalización como el Sector de Normalización de la Unión Internacional de Telecomunicaciones (UIT-T), la CITEL está identificando y evaluando las normas técnicas para poder recomendar su aplicabilidad a la región de las Américas, teniendo presente que el desarrollo de las redes en algunos de los Estados Miembros de la OEA ha sufrido algunos retrasos, lo que implica que, para tales países, el logro de un cierto grado de calidad para sus redes será importante para poder llevar a cabo plenamente sistemas para intercambio de información adecuadamente seguros. La CITEL está estableciendo enlaces, además, con otras entidades de normalización y foros de la industria para obtener la participación y los aportes de dichas partes.

    La identificación de las normas de seguridad cibernética será un proceso de múltiples pasos. Una vez que la evaluación por la CITEL de las normas técnicas vigentes se complete, recomendará la adopción de normas especialmente importantes para la región. Además, en forma oportuna y permanente, identificará los obstáculos que impidan la aplicación de dichas normas de seguridad en las redes de la región, y la posible acción apropiada que puedan considerar los Estados Miembros.

    El desarrollo de las normas técnicas no es un emprendimiento que sea igual para todos. La CITEL evaluará los enfoques regionales a la seguridad de redes, las estrategias de despliegue, el intercambio de información y la difusión a los sectores público y privado. Como parte de este esfuerzo, la CITEL identificará los recursos para las mejores prácticas en la comunicación en redes y la protección de la infraestructura con base en las tecnologías. Este proceso requerirá que la CITEL revise los objetivos, el alcance, la pericia, los marcos técnicos y los lineamientos asociados con los recursos disponibles, para poder determinar su aplicabilidad dentro de la región de las Américas, con el fin de decidir cuáles serán los más apropiados. La CITEL continuará trabajando con los Estados Miembros para asistirles para la aplicación más apropiada y eficaz.

    La contribución de la CITEL a la Estrategia Interamericana Integral de Seguridad Cibernética adoptará un enfoque prospectivo y buscará fomentar el intercambio de información entre los Estados Miembros para así promover las redes seguras. Identificará y evaluará los asuntos técnicos relativos a las normas requeridas para la seguridad de las redes futuras de comunicaciones en la región, así como las existentes. Esta función aprovechará primordialmente del trabajo del UIT-T. Otras entidades de normalización existentes, a través de la CITEL, serán consideradas según sean apropiadas. en último término, la CITEL resaltará las normas de seguridad de especial importancia y recomendará que los Estados Miembros adopten dichas normas. También es importante enfatizar el papel crucial de la CITEL en la promoción de programas de aumento de la capacidad y capacitación, con el fin de llevar adelante el proceso de propagación de información técnica y práctica relacionada con los asuntos de la seguridad cibernética.

    La CITEL reconoce que, aunque la primera prioridad deberá enfocarse en las políticas públicas que llevarán los beneficios de las tecnologías de las telecomunicaciones y la información a todos los ciudadanos de los Estados Miembros de la OEA, el fortalecimiento de la alianza privada- pública que redundará en la adopción amplia de un marco de normas técnicas que ayudarán a asegurar la Internet, requerirá de la comunicación y cooperación entre y dentro de las comunidades involucradas en esta asociación. La CITEL fomentará la cooperación entre los Estados Miembros en los aspectos relativos a la seguridad de redes, mediante la asistencia a las administraciones a que adopten políticas y prácticas que incentiven a los proveedores de servicios y redes a aplicar las normas técnicas para la seguridad de sus redes. La nueva edición del Libro Azul “Políticas de Telecomunicaciones para las Américas”, publicación conjunta de la CITEL y la UIT, incluirá un capítulo sobre la seguridad cibernética.  La CITEL también fomentará un diálogo dentro de las comunidades técnicas y gubernamentales pertinentes con relación al trabajo sobre la seguridad cibernética y de redes mediante seminarios conjuntos con la UIT sobre normas de seguridad. Las acciones de la CITEL podrán también incluir materias relativas a las políticas de telecomunicaciones, prácticas, regulaciones, aspectos económicos y responsabilidades de los usuarios, todo ello en el marco jurídico dentro del cual operan los servicios de telecomunicaciones, y dentro de las funciones y responsabilidades de la CITEL.

    REMJA: Asegurar que los Estados Miembros de la OEA cuentan con los instrumentos jurídicos necesarios para proteger a los usuarios de Internet y las redes de información

    Los delincuentes, como los “piratas informáticos”, los grupos delictivos organizados y los terroristas cada vez explotan más la Internet para fines ilícitos e ingenian nuevos métodos para utilizar la Internet como un medio para cometer y facilitar delitos.  Estas actividades ilícitas, a las que normalmente nos referimos como “delitos cibernéticos,” impiden el crecimiento y desarrollo de la Internet, fomentando el temor de que la Internet no es un medio seguro ni de confianza para realizar transacciones personales, gubernamentales o de negocios.  Por consiguiente, la contribución de la REMJA a la Estrategia Interamericana Integral de Seguridad Cibernética, por medio de las iniciativas del Grupo de Expertos Gubernamentales en Materia de Delito Cibernético (el Grupo de Expertos), se centrará en asistir a los Estados Miembros a combatir el delito cibernético, asegurando que las autoridades policiales y judiciales cuenten con los instrumentos jurídicos necesarios para investigar y enjuiciar dichos delitos. Esta decisión fue adoptada por la REMJA en su reunión celebrada del 28 al 30 de abril de 2004 en Washington, D.C., Estados Unidos.(7)

    Redacción y promulgación de legislación en materia de delito cibernético y mejoramiento de la cooperación internacional en asuntos relacionados con delitos cibernéticos

    Si no cuentan con leyes y reglamentos adecuados, los Estados Miembros no pueden proteger a sus ciudadanos de los delitos cibernéticos.  Además, los Estados Miembros que carecen de leyes y mecanismos de cooperación internacional en materia de delito cibernético corren el riesgo de convertirse en refugios para los delincuentes que cometen estos delitos.  Por consiguiente, el Grupo de Expertos proporcionará asistencia técnica a los Estados Miembros para la redacción y promulgación de leyes que tipifiquen el delito cibernético, protejan los sistemas de información y eviten el uso de las computadoras para facilitar actividades delictivas.  El Grupo de Expertos también promoverá mecanismos jurídicos que fomenten la cooperación en asuntos relacionados con delitos cibernéticos entre los investigadores y las autoridades policiales y judiciales que investigan y procesan casos de delitos cibernéticos.  Estas iniciativas de respaldo a la Estrategia Interamericana Integral de Seguridad Cibernética se emprenderán en el marco de las recomendaciones formuladas por el Grupo de Expertos (Tercera Reunión del Grupo de Expertos Gubernamentales en Materia de Delito Cibernético, OEA/Ser.K/XXXIV, CIBER-III/doc.4/03). (8)

    Para llevar a cabo esta iniciativa, el Grupo de Expertos creará material de capacitación, proporcionará asistencia técnica y llevará a cabo talleres regionales para asistir en la formulación de políticas gubernamentales y leyes que ayuden a generar confianza en los sistemas de información y en la Internet, mediante la tipificación como delito del uso indebido de computadoras y redes informáticas.  La capacitación en colaboración que proporcionará el Grupo de Expertos a los Estados Miembros se centrará en la modernización de las leyes y reglamentos para hacer frente al desafío que representa la lucha contra el delito cibernético.  Uno de los objetivos principales de estas sesiones de capacitación será el esbozo de las leyes penales y protecciones de la privacidad que sean necesarias para ayudar a hacer más seguros sus sistemas de información y promover la confianza entre los usuarios de esos sistemas.  Específicamente, los talleres se concentrarán en la promulgación de distintas categorías de leyes:

    Leyes substantivas sobre delitos cibernéticos – Todos los Estados Miembros deberán establecer prohibiciones de carácter penal y jurídico a los ataques contra la confidencialidad, integridad y seguridad de los sistemas informáticos. Comportamientos tales como el acceso a computadoras sin autorización, la intercepción ilícita de datos, la interferencia con la disponibilidad de sistemas informáticos, y el robo y sabotaje de datos deberán considerarse ilícitos de conformidad con la ley de cada Estado Miembro de la OEA.

    Leyes procesales para la recopilación de pruebas electrónicas – Además, todos los países deberán contar con procedimientos claros acordes con las normas internacionales para el acceso del gobierno a las comunicaciones y los datos almacenados cuando sea necesario para la investigación de un delito. Es igualmente importante que se asegure a las empresas y consumidores que el gobierno no va a vigilar de forma injustificada sus comunicaciones, y que se asegure a los consumidores que los datos que suministran a los comerciantes no van a ser utilizados indebidamente.

    Los talleres se centrarán en la necesidad de redactar dichas leyes de un manera que sea “neutral con respecto a la tecnología” (por ejemplo, dichas leyes deberán contemplar tipos de delitos o tipos de comportamiento en vez de ser redactadas solamente para contemplar un tipo particular de tecnología) para prevenir que las leyes recién promulgadas se vuelvan rápidamente obsoletas o irrelevantes.

    La naturaleza sin fronteras de las redes mundiales significa que un único acto delictivo relacionado con una computadora puede afectar o dirigirse a computadoras en varios países. Durante sus talleres regionales, el Grupo de Expertos también proporcionará capacitación sobre cómo responder a estos desafíos en el marco de la cooperación internacional y facilitar el intercambio de información relativa a las investigaciones sobre casos de delitos cibernéticos.  Se pondrá especial énfasis en el establecimiento de relaciones entre los expertos en materia de delito cibernético en el Hemisferio a fin de facilitar la cooperación internacional y proporcionar un acceso fácil a los conocimientos especializados y recursos de la región para combatir el delito cibernético.

    Tras la celebración de los talleres, el Grupo de Expertos asistirá nuevamente a los Estados Miembros proporcionando consultas jurídicas para respaldar a los ministerios del gobierno y legislaturas en la redacción de leyes, reglamentos y políticas.  Puede requerirse asistencia de los expertos a nivel bilateral para respaldar a los gobiernos en la formulación de leyes y políticas que consagren los conceptos centrales de las leyes en materia de delito cibernético, autoridades de investigación y privacidad.

    CONCLUSIONES Y ESTRATEGIA DE SEGUIMIENTO

    Cada una de las iniciativas del CICTE, la CITEL, y la REMJA que se describen arriba representa un pilar de este proyecto de Estrategia Interamericana Integral de Seguridad Cibernética. De forma conjunta, los esfuerzos multidisciplinarios concertados de estos órganos apoyarán el crecimiento, desarrollo y protección de la Internet y los sistemas de información relacionados, y protegerán a los usuarios de esas redes de información.  Estas iniciativas pueden ir cambiando con el paso del tiempo y requerir nuevos enfoques, pero su objetivo seguirá siendo el mismo: la creación y apoyo de una cultura de seguridad cibernética.  Considerando que la Estrategia es dinámica, debe emprenderse un examen periódico a fin de asegurar su continua aplicabilidad y eficacia. Esto puede lograrse a través de las siguientes acciones:

    1. Coordinación y cooperación permanentes entre las Secretarías del CICTE, la CITEL y el Grupo de Expertos Gubernamentales en Materia de Delito Cibernético de la REMJA.

    2. Fortalecimiento de la coordinación entre las autoridades y entidades nacionales, incluidos los CSIRT nacionales, que trabajan en cuestiones relacionadas con la seguridad cibernética.

    3. Establecimiento de una sitio Web conjunto en el que pueda introducirse la información pertinente sobre seguridad cibernética generada por el CICTE, la CITEL y el Grupo de Expertos Gubernamentales en Materia de Delito Cibernético de la REMJA, a fin de permitir un fecundo intercambio de ideas y facilitar el intercambio de información.

    4. Los Estados Miembros deberán llevar a cabo, junto con el CICTE, la CITEL y el Grupo de Expertos Gubernamentales de la REMJA en Materia de Delito Cibernético, un programa interamericano de concientización del público acerca de la seguridad y la ética cibernéticas en el que se destaquen: las ventajas y responsabilidades del uso de redes de información; las mejores prácticas de seguridad y protección; las posibles consecuencias negativas del uso indebido de las redes; cómo reportar un incidente cibernético y a quién; e información técnica y práctica relacionada con la seguridad cibernética.

    5. Exámenes periódicos de las iniciativas y programas en materia de seguridad cibernética del CICTE, la CITEL y el Grupo de Expertos Gubernamentales de la REMJA en Materia de Delito Cibernético, y sobre la implementación de la Estrategia, que realizarán estos tres órganos, con un informe conjunto de progreso para la Asamblea General.

    ANEXO I. COMITÉ INTERAMERICANO CONTRA EL TERRORISMO (CICTE)

    TALLER PARA PRACTICANTES EN MATERIA DE SEGURIDAD CIBERNÉTICA 9-30 de marzo de 2004. Ottawa, Canadá                                                                                                                      

    OEA/Ser.L/X.5 CICTE/REGVAC/doc.2/04 8 abril 2004. Original: inglés

    RECOMENDACIONES DEL TALLER PARA PRACTICANTES EN MATERIA DE SEGURIDAD CIBERNÉTICA DEL CICTE SOBRE LA ESTRATEGIA INTEGRAL DE SEGURIDAD CIBERNÉTICA DE LA OEA: MARCO PARA ESTABLECER UNA RED INTERAMERICANA CSIRT DE VIGILANCIA Y ALERTA

    I. OBJETIVOS

    Crear una red hemisférica, que funcione 24 horas al día, 7 días a la semana, de puntos nacionales de contacto entre equipos de respuesta a incidentes de seguridad en computadoras (Computer Security Incident Response Teams: CSIRT) con responsabilidad nacional (CSIRT nacionales), en los Estados Miembros de la OEA, con el mandato y la capacidad de responder debida y rápidamente a las crisis, incidentes y peligros relacionados con la seguridad cibernética.

    Estos equipos podrían comenzar simplemente como puntos de contacto oficiales en cada uno de los Estados y estarían a cargo de recibir información sobre seguridad cibernética. en el futuro se convertirían en un CSIRT.         

    Los intrusos ahora tienen medios cada vez más complejos para lanzar ataques muy automatizados que se desplazan rápidamente a través de Internet, empleando técnicas que tienen por fin encubrir el origen de tales ataques y dificultar su rastreo. Por tanto, reviste importancia creciente la colaboración mundial y la capacidad de respuesta en tiempo real entre los equipos. Dicha colaboración debe permitir lo siguiente:

    1. El establecimiento de CSIRT en cada uno de los Estados Miembros;

    2. El fortalecimiento de los CSIRT hemisféricos;

    3. La identificación de los puntos de contacto nacionales;

    4. La identificación de los servicios críticos;

    5. El diagnóstico rápido y preciso del problema;

    6. El establecimiento de protocolos y procedimientos para el intercambio de información;

    7. La pronta diseminación regional de advertencias sobre ataques;

    8. La pronta diseminación regional de advertencias sobre vulnerabilidades genéricas;

    9. La difusión de un alerta regional sobre actividades sospechosas y la colaboración para analizar y diagnosticar tales actividades;

    10. El suministro de información sobre medidas para mitigar y remediar los ataques y amenazas;

    11. La reducción de duplicaciones de análisis entre los equipos;

    12. El fortalecimiento de la cooperación técnica y la capacitación en materia de seguridad cibernética para establecer los CSIRTs nacionales;

    13. La utilización de los mecanismos subregionales existentes.

    La colaboración refuerza los conocimientos técnicos existentes entre los equipos para limitar mejor los perjuicios y permitir que continúen funcionando los servicios de importancia crítica.

    II. PRINCIPIOS

    1. Locales – La red hemisférica debe ser manejada y controlada por los puntos nacionales de contacto en cada país participante nombrados por los gobiernos.

    2. Sistémicos – La red hemisférica debe ser una operación multifacética que requiera un personal consciente y especializado, la distribución periódica de información relativa a las amenazas y vulnerabilidades vigentes, una reevaluación e implementación constantes de mejores prácticas y una interacción adecuada con las autoridades públicas.

    3. Permanentes – Debido a la evolución diaria inherente a la Internet, para que tenga buen resultado todo programa deberá actualizarse y mantenerse con regularidad, y el personal deberá ser capacitado periódicamente. La seguridad en la Internet no se logrará mediante una acción única.

    4. Responsables – La “seguridad” en la “ciberseguridad”. Deben entenderse y seguirse reglas establecidas respecto de cuestiones tales como el manejo y el suministro de la información, ya que de otra manera los usuarios perderían la confianza y los esfuerzos para proteger el sistema serán perjudicados e incluso serán contraproducentes.

    Basados en disposiciones ya existentes – Hay un número de entidades que ya existen en el hemisferio, entre ellas, CSIRT, compañías consultoras y redes de contactos, que proporcionan servicios de seguridad cibernética en mayor o menor medida. Un sistema nuevo deberá basarse en esas instituciones ya existentes y las relaciones de confianza que ya se han establecido dentro de cada región y entre regiones, a fin de evitar duplicaciones y promover una participación activa.

    III. IDENTIFICACIÓN DE ORGANIZACIONES EXISTENTES, ESTABLECIMIENTO DE UN MODELO DE SERVICIO, CUESTIONES DE CONFIANZA, FINANCIAMIENTO, CONCIENCIA PÚBLICA Y EXTENSIÓN DE LA RED

    1. Identificación de organizaciones existentes

    En todo el mundo hay más de cien organizaciones que usan el nombre CERT (Computer Emergency Response Team: equipo de respuesta a emergencias de computación) o CSIRT (el término genérico de significado equivalente). El Foro de Equipos de Respuesta a Incidentes y de Seguridad (Forum of Incident Response and Security Teams: FIRST), una asociación mundial voluntaria de equipos CSIRT, cuenta con 79 miembros en los Estados Miembros de la OEA, sin embargo la gran mayoría de estos actualmente existen en un Estado Miembro solamente. Dadas las lagunas en la información, llevar a cabo un censo de los CSIRT es el primer paso fundamental para la creación de una red de seguridad cibernética.

    2. Establecimiento de un modelo de servicio

    Si bien no hay normas internacionales acordadas sobre qué es lo que constituye un CSIRT, hay una serie de documentos y actividades que pueden servir para definir un equipo CSIRT y para la certificación y autorización de tales equipos.

    El CERT/CC ha publicado varios documentos que pueden servir de ayuda para la creación de un CSIRT, entre los que se cuentan los siguientes:

    Handbook for Computer Security Incident Response Teams (CSIRTs) (Manual para equipos de respuesta a incidentes de seguridad de computadoras (CSIRT)): guía actualizada sobre cuestiones genéricas que deben considerarse al formar un CSIRT;

    State of the Practice of Computer Security Incident Response Teams (Estado actual de las prácticas de los equipos de respuesta a incidentes de seguridad de computadoras). Este informe contiene información recogida mediante un estudio piloto de estos equipos, la experiencia propia del CERT/CC, discusiones con otros CSIRT y observaciones de éstos, e investigación y críticas de las publicaciones actuales sobre la respuesta a incidentes; y

    Creating a Computer Security Incident Response Team: A Process for Getting Started (Creación de un equipo de respuesta a incidentes de seguridad de computadoras: un método para su comienzo). Éste es un documento en el que se describen los requisitos básicos para crear un CSIRT.

    Debería existir un sistema de certificación y autorización de CSIRT nacionales. Los Estados Miembros deberían considerar si la afiliación de sus CSIRT nacionales al FIRST satisfaría los requisitos de certificación y autorización.

    Cuando se establece una red regional de CSIRT nacionales cooperantes, debe preverse un conjunto mínimo de normas para la cooperación y el intercambio de información entre los CSIRT, entre las que se contarían las siguientes:

    i. designación del CSIRT nacional por el gobierno respectivo;

    ii. convenio sobre los principios para compartir información entre los equipos cooperantes;

    iii. responsabilidad por recibir información de otros CSIRT nacionales, y por diseminar dicha información entre las entidades idóneas dentro del país;

    iv. participación en el intercambio de información entre los otros CSIRT nacionales en la red hemisférica;

    v. autorización para diseminar información entre otros CSIRT nacionales; y

    vi. prestación de asistencia a otros CSIRT nacionales para incidentes y amenazas.

    3. Cuestiones de confianza

    Gran parte de la información que tienen que intercambiar los CSIRT es de propiedad exclusiva, o es de carácter delicado por otros motivos, y hay pocos modelos buenos que sirvan para compartir uniformemente datos entre tales equipos. La confianza —el ingrediente esencial cuando se comparte información—, cuando existe, se desarrolla en la práctica entre individuos que se conocen y han trabajado juntos, más bien que institucionalmente entre organizaciones. Para establecer la confianza, todas las partes deben entender y seguir pautas claras sobre la forma en que la información intercambiada será usada o diseminada. Todos los CSIRT nacionales cooperantes deben convenir en las reglas para compartir información, que indiquen cómo tal información puede usarse o diseminarse.

    Entre los atributos que los CSIRT requieren para promover la confianza en las comunicaciones y la cooperación respecto de asuntos delicados de seguridad figuran los siguientes:

    i. una infraestructura segura para el manejo de información delicada;

    ii. la capacidad para comunicarse sin riesgos con los interesados;

    iii. la capacidad para reunir expertos y autoridades;

    iv. una infraestructura que permita la notificación anticipada a determinadas audiencias;

    v. procedimientos de protección contra fuga de información;

    vi. una interfaz pública bien conocida para la diseminación de información crítica; y

    vii. la capacidad para llegar rápidamente a una gran audiencia.

    La creación de una capacidad CSIRT regional requiere la formación de un consenso sobre las reglas para el intercambio de información, incluso qué información puede compartirse, con quién, y cuándo.

    4. Financiamiento

    Los Estados Miembros considerarán los mecanismos de financiación para establecer y mantener un CSIRT nacional en cada país y participar en la red hemisférica.

    5. Conciencia pública

     Los Estados Miembros deben llevar a cabo, junto con la CITEL y el Grupo de Trabajo de la REMJA, un programa interamericano de concientización del público acerca de la seguridad y la ética cibernéticas en el que se destaquen:

    i.  las ventajas y responsabilidades del uso de redes de información;

    ii. las mejores prácticas de seguridad y protección;

    iii. las posibles consecuencias negativas del uso indebido de las redes;

    iv. como reportar un incidente cibernético y a quien; y

    v. información técnica y práctica relacionada con la seguridad cibernética.

    El público incluye a los Estados Miembros, las entidades gubernamentales de todo nivel, el sector privado, el sector académico y la población general.

    6. Extensión de la Red

    Los Estados Miembros considerarán, cuando proceda, extender las capacidades de la red hemisférica, a fin de ayudar a los Estados que así lo soliciten en la elaboración de planes concretos, la obtención de financiamiento y la creación de proyectos de desarrollo de capacidades.

    IV.  Plan de acción

    A. Censo

    Llevar a cabo un censo para identificar los CSIRT existentes, la diversidad de miembros y los servicios que proporcionan. Esto nos permitirá identificar las lagunas en la cobertura, tanto geográfica como sectorialmente, y establecerá las bases para fijar un conjunto consensual de servicios que ofrecerán los CSIRT miembros.

    B. Reglas relativas al intercambio de información

     Establecer reglas relativas al intercambio de información entre los CSIRT, incluido cómo debe protegerse y difundirse la información intercambiada.

    C. Establecimiento de los CSIRT nacionales

    Cada Estado miembro establecerá los CSIRT nacionales. Entre sus responsabilidades figurarán la implementación de las propuestas pertinentes contenidas en el documento “Recomendaciones del Taller para Practicantes en Materia de Seguridad Cibernética del CICTE sobre la Estrategia Integral de Seguridad Cibernética de la OEA: Marco para Establecer una Red Interamericana CSIRT de Vigilancia y Alerta” (REGVAC/doc.2/04).

    D. Punto nacional de contacto

    Designar un punto nacional de contacto con capacidad para intercambiar información acerca de amenazas, deficiencias e incidentes, informar sobre el estado de la seguridad cibernética en su jurisdicción y brindar información oportuna a las autoridades de ésta.

    E. Compendio de mejores prácticas

    Producir un compendio de mejores prácticas basado en las normas y prácticas CSIRT internacionales. Éstas podrían incluir normas y protocolos para llevar a cabo monitoreo en tiempo real y un subsiguiente intercambio de información en toda la red, y podría servir de base para protocolos posteriores de asistencia técnica y pruebas.

    F. Asistencia para construir y mantener los CSIRT en los Estados Miembros

    Identificar los recursos y capacidades que pueden utilizarse para ayudar a los Estados Miembros a construir y mantener la capacidad de los CSIRT o mejorar las infraestructuras de los CSIRT existentes a fin de participar con eficacia en la red hemisférica y cumplir las reglas de intercambio de información. Se incluirá la asistencia técnica y capacitación de personal necesarias.

    G. Conciencia pública

    El CICTE, la CITEL y el Grupo de Trabajo de Expertos Gubernamentales en materia de Delito Cibernético de la REMJA trabajarán juntos para llevar a cabo una campaña de concientización a fin de alertar al público en los Estados Miembros de las cuestiones relativas a la seguridad cibernética y la necesidad de proteger sus redes cibernéticas.

    H. Seguimiento

    Se recomienda que el CICTE convoque de nuevo la Reunión de Expertos en Materia de Seguridad Cibernética (Taller para Practicantes en Materia de Seguridad Cibernética) para elaborar e implementar las recomendaciones formuladas en el documento “Recomendaciones del Taller para Practicantes en Materia de Seguridad Cibernética del CICTE sobre la Estrategia Integral de Seguridad Cibernética de la OEA: Marco para Establecer una Red Interamericana CSIRT de Vigilancia y Alerta” (REGVAC/doc.2/04).

    Asimismo, se recomienda que el Grupo de Trabajo encargado de la Elaboración de un Proyecto de Estrategia de Seguridad Cibernética para los Estados Miembros de la OEA, de la Comisión de Seguridad Hemisférica de la OEA, transmita este documento marco a la Asamblea General para su adopción.

    ANEXO II. CCP.I/RES. 49 (IV-04)(9) SEGURIDAD CIBERNÉTICA

    La IV Reunión del Comité Consultivo Permanente I: Normalización de Telecomunicaciones,

    RECONOCIENDO:

    a) Que garantizar la seguridad de los sistemas de información en red (seguridad cibernética) es un asunto de prioridad para nuestro hemisferio;

    b) Que las redes de información ubicuas y seguras desempeñan un papel importante en la infraestructura crítica de todos los Estados Miembros de la OEA, sus economías y sus sociedades;

    c) Que las redes de próxima generación (NGN) que actualmente se están diseñando y normalizando podrán tomar en cuenta tecnologías y técnicas para asegurar su solidez y fortalecer su resistencia contra los ataques cibernéticos,

    TENIENDO EN CONSIDERACION:

    a) Que la operación segura y eficiente de la infraestructura global de telecomunicaciones es crucial para el bienestar y desarrollo de todos los sectores de la economía y, en consecuencia, de interés vital tanto para los gobiernos como para el sector privado; y

    b) El número cada vez más frecuente y la naturaleza insidiosa de los ataques cibernéticos sobre las redes, instituciones y usuarios, que están produciendo todo tipo de daño, especialmente morales, económicos y financieros,

    CONSIDERANDO:

    a) Que la CITEL, CICTE (el Comité Interamericano contra el Terrorismo de la OEA) y REMJA (la Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas) están trabajando para desarrollar una estrategia a nivel hemisférico para la seguridad cibernética, como lo determinó la Asamblea General de la OEA en la Resolución AG/RES.1939 (XXXIII-O/03);

    b) El taller realizado conjuntamente por el Grupo de Trabajo sobre Servicios y Tecnologías de Redes Avanzadas y el Grupo de Trabajo sobre Coordinación de Normas acerca de la seguridad cibernética, en la IV Reunión del CCP.1 en Quito, Ecuador, trató los asuntos claves de la seguridad cibernética vinculados a la CITEL; y

    c) Los importantes compromisos realizados por los Jefes del Estado y de Gobierno de la Región, planteados en la Declaración de Nuevo León, incluyendo incentivos para un acceso asequible para todos a las tecnologías de información y comunicaciones,

    CONSIDERANDO ADEMÁS:

    Que la CITEL, a través de sus alianzas con el sector privado sobre asuntos en sus áreas de responsabilidad, y a través de su Plan de Trabajo para temas de redes avanzadas, y en particular la seguridad cibernética y las NGN, podrá realizar un aporte importante tanto para una mayor concienciación acerca de los temas críticos que puedan tener un impacto potencial en la Región, como para perfeccionar sus planes de trabajo en dichas áreas facilitando discusiones enfocadas y la compartición de información,

    RESUELVE:

    1. Aprobar el aporte adjunto de la CITEL sobre la Estrategia de Seguridad Cibernética de la OEA y enviarlo al Comité sobre Seguridad Hemisférica de la OEA para su revisión y entrega a la Asamblea General de la OEA en junio de 2004.

    2. Solicitar al Relator de la CITEL sobre asuntos de Seguridad Cibernética e Infraestructura Crítica que envíe una copia de esta Resolución al Grupo de Trabajo Conjunto de CICTE/CITEL/REMJA sobre la Seguridad Cibernética.

    INVITA:

    a)  Al Grupo de Trabajo sobre los Servicios y Tecnologías de Redes Avanzadas y al Grupo de Trabajo sobre Coordinación de Normas a que sigan trabajando en el tema de la seguridad cibernética y que informen al CCP.I acerca de sus logros en dicho tema específico.

    b) Al Presidente del CCP.I a enviar una carta al Presidente del Comité sobre Seguridad Hemisférica de la OEA adjuntando una copia de esta Resolución.

    ANEXO A LA RESOLUCIÓN CCP.I/RES. 49 (IV-04)

    CITEL:  La identificación y adopción de normas técnicas para una arquitectura segura de Internet

    Una estrategia eficaz de seguridad cibernética deberá reconocer que la seguridad de la red de los sistemas de información que comprenden la Internet requiere una alianza entre el gobierno y la industria. Tanto las industrias de telecomunicaciones y de tecnología de la información como los gobiernos de los Estados Miembros de la OEA están buscando soluciones integrales de seguridad cibernética eficaces en función de costos. Las capacidades de seguridad en los productos de computación son imprescindibles como elementos de la seguridad global de la red. Sin embargo, a medida de que se produzcan más tecnologías y se las integren en las redes existentes, su compatibilidad e interoperabilidad – o la falta de estas – determinarán su eficacia. La seguridad deberá desarrollarse de una manera tal que promueva la integración de capacidades de seguridad aceptables en la arquitectura general de la red. Para lograr semejantes soluciones integradas de seguridad cibernética con base en la tecnología, deberá diseñarse la seguridad de la red alrededor de normas internacionales desarrolladas en un proceso abierto.

    El desarrollo de normas para la arquitectura de seguridad en Internet requerirá un proceso de múltiples pasos para asegurar que se logre un nivel adecuado de consenso, planificación y aceptación entre las diferentes entidades gubernamentales y privadas que deberán cumplir un papel en la promulgación de semejantes normas. Aprovechando el trabajo de organizaciones de normalización como el Sector de Normalización de la Unión Internacional de Telecomunicaciones (UIT-T), la CITEL está identificando y evaluando las normas técnicas para poder recomendar su aplicabilidad a la región de las Américas, teniendo presente que el desarrollo de las redes en algunos de los Estados Miembros de la OEA ha sufrido algunos retrasos, lo que implica que, para tales países, el logro de un cierto grado de calidad para sus redes será importante para poder llevar a cabo plenamente sistemas para intercambio de información adecuadamente seguros. Para agilizar su trabajo, la CITEL y el UIT-T organizaron un taller conjunto sobre Seguridad Cibernética en marzo del 2004. La CITEL está estableciendo enlaces, además, con otras entidades de normalización y foros de la industria para obtener la participación y los aportes de dichas partes.

    La identificación de las normas de seguridad cibernética será un proceso de múltiples pasos. Una vez que la evaluación por la CITEL de las normas técnicas vigentes se complete, recomendará la adopción de normas especialmente importantes para la región. Además, en forma oportuna  y permanente, identificará los obstáculos que impidan la aplicación de dichas normas de seguridad en las redes de la región, y la posible acción apropiada que puedan considerar los Estados Miembros.

    El desarrollo de las normas técnicas no es un emprendimiento que sea igual para todos. La CITEL evaluará los enfoques regionales a la seguridad de redes, las estrategias de despliegue, el intercambio de información y la difusión a los sectores público y privado. Como parte de este esfuerzo, la CITEL identificará los recursos para las mejores prácticas en la comunicación en redes y la protección de la infraestructura con base en las tecnologías. Este proceso requerirá que la CITEL revise los objetivos, alcances, pericia, marcos técnicos y lineamientos asociados con los recursos disponibles, para poder determinar su aplicabilidad dentro de la región de las Américas, con el fin de decidir cuáles serán los más apropiados. La CITEL continuará trabajando con los Estados Miembros para asistirles para la aplicación más apropiada y eficaz.

    La contribución de la CITEL a la estrategia de seguridad cibernética adoptará un enfoque prospectivo y buscará fomentar el intercambio de información entre los Estados Miembros para así promover las redes seguras. Identificará y evaluará los asuntos técnicos relativos a las normas requeridas para la seguridad de las redes futuras de comunicaciones en la región, así como las existentes. Esta función aprovechará primordialmente del trabajo del UIT-T. Otras entidades de normalización existentes, a través de la CITEL, serán consideradas según sean apropiadas. en último término, la CITEL resaltará las normas de seguridad de especial importancia y recomendará que los Estados Miembros adopten dichas normas. También es importante enfatizar el papel crucial de la CITEL en la promoción de programas de aumento de la capacidad y capacitación, con el fin de llevar adelante el proceso de propagación de información técnica y práctica relacionada con los asuntos de la seguridad cibernética.

    La CITEL reconoce que, aunque la primera prioridad deberá enfocarse en las políticas públicas que llevarán los beneficios de las tecnologías de las telecomunicaciones y la información a todos los ciudadanos de los Estados Miembros de la OEA, el fortalecimiento de la alianza privada / pública que redundará en la adopción amplia de un marco de normas técnicas que ayudarán a asegurar la Internet, requerirá de la comunicación y cooperación entre y dentro de las comunidades involucradas en esta asociación. La CITEL fomentará la cooperación entre los Estados Miembros en los aspectos relativos a la seguridad de redes, mediante la asistencia a las Administraciones a que adopten políticas y prácticas que incentiven a los proveedores de servicios y redes a aplicar las normas técnicas para la seguridad de sus redes. La nueva edición del Libro Azul “Políticas de Telecomunicaciones para las Américas”, publicación conjunta de la CITEL y la UIT, incluirá un capítulo sobre la seguridad cibernética.  La CITEL también fomentará un diálogo dentro de las comunidades técnicas y gubernamentales pertinentes con relación al trabajo sobre la seguridad cibernética y de redes mediante seminarios conjuntos con la UIT sobre normas de seguridad. Las acciones de la CITEL podrán también incluir materias relativas a las políticas de telecomunicaciones, prácticas, regulaciones, aspectos económicos y responsabilidades de los usuarios, todo ello en el marco jurídico dentro del cual operan los servicios de telecomunicaciones, y dentro de las funciones y responsabilidades de la CITEL.

    ANEXO III. REUNIÓN DE MINISTROS DE JUSTICIA O DE MINISTROS O PROCURADORES GENERALES DE LAS AMERICAS  (REMJA)                                               

    OEA/Ser.K/XXXIV. CIBER-III/doc.4/03.  24 junio de 2003. Original: español                                                                                                                                                                      

    Tercera Reunión del Grupo de Expertos Gubernamentales en Materia de Delito Cibernético 23 y 24 de junio de 2003. Washington, D.C.                                    

    RECOMENDACIONES  DE LA REUNIÓN INICIAL DEL GRUPO DE EXPERTOS GUBERNAMENTALES EN MATERIA DE DELITO CIBERNÉTICO*

    Los expertos gubernamentales en materia de delito cibernético de los Estados Miembros de la OEA, se reunieron en la sede de esta Organización, en Washington D.C., Estados Unidos de América, durante los días 23 y 24 de junio de 2003, en cumplimiento de lo acordado en la Cuarta Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA-IV) y de la resolución de la Asamblea General de la OEA AG/RES. 1849 (XXXII-O/02).

    Teniendo en cuenta el mandato que le fue asignado por la REMJA-IV, al finalizar sus deliberaciones en el marco de esta reunión inicial, el Grupo de Expertos Gubernamentales acordó formular las siguientes recomendaciones en relación con las áreas en las cuales se requieren mayores avances con el fin de fortalecer y consolidar la cooperación hemisférica en el combate contra el Delito Cibernético:

    Que, de acuerdo con la recomendación formulada por este Grupo y adoptada por la REMJA-III, los Estados que aún no lo han hecho, en el menor plazo posible, identifiquen o, si fuere necesario, creen o establezcan  unidades o entidades encargadas específicamente de dirigir y desarrollar  la investigación y persecución de las diversas modalidades de delitos cibernéticos  y les asignen los  recursos humanos, financieros y técnicos necesarios para el cumplimiento de sus responsabilidades en forma eficaz, eficiente y oportuna.

    Que los Estados que aún no lo hayan hecho, a la mayor brevedad posible, examinen sus sistemas jurídicos  para determinar  si éste se aplica en forma adecuada  a los delitos cibernéticos y  a la obtención y mantenimiento en custodia segura  de indicios y/o pruebas electrónicas.

    Que los Estados que aún no lo hayan hecho, adopten la legislación que específicamente se requiera para tipificar las diversas modalidades de delitos cibernéticos, así como para dictar las medidas procesales que aseguren la obtención y mantenimiento en custodia segura de indicios y/o pruebas electrónicas y la investigación y persecución de tales delitos en forma efectiva, eficaz y oportuna.

    Que, con el fin de asistir a los Estados en la elaboración o mejoramiento y adopción de la legislación en materia de delito cibernético,  se realicen reuniones técnicas, en el marco de la OEA, sobre redacción de legislación en este campo, en las cuales se consideren los desarrollos específicos que se deben dar, entre otras,  en las áreas substantiva, procesal y de asistencia judicial mutua, para facilitar la armonización de las legislaciones nacionales y contar con el marco jurídico que permita y garantice la efectiva, eficiente y oportuna cooperación hemisférica en el combate contra las diversas modalidades de delitos cibernéticos.

    Que, con base en la información que le suministren los Estados, la Secretaría General de la OEA elabore y mantenga actualizado un directorio con los puntos de contacto de cada uno de los Estados que integran el Grupo de Expertos Gubernamentales en Materia de Delito Cibernético, así como un directorio de las autoridades responsables de la investigación y persecución del Delito Cibernético.

    Que los Estados que aún no lo han hecho, adopten todas las decisiones que se requieran con el fin de vincularse, a la mayor brevedad posible, a la “Red de Emergencia de 24 horas/7 días”, habiendo tomado los pasos a que se refiere el párrafo 1, si fuere necesario.

    Que, teniendo en cuenta los progresos dados a través de la página de la OEA en Internet, se avance en la consolidación de un sistema integral de información sobre los desarrollos dados en materia de combate contra el delito cibernético, con una parte pública y otra con acceso restringido para las autoridades gubernamentales con responsabilidades en este campo, en relación con información sensible. Asimismo que, con base en la información que provean los Estados, la  Secretaría General compile y publique en la página en Internet de la OEA las legislaciones en la materia e identifique las áreas temáticas comunes entre estas.

    Que los Estados incorporen la formación específica en materia de delito cibernético y el manejo de pruebas electrónicas como parte de los programas de capacitación dirigidos a jueces, fiscales y autoridades de policía judicial y que para el desarrollo de éstos, los Estados Miembros de la OEA y los Observadores Permanentes ante esta Organización se presten la más amplia asistencia y cooperación técnica mutua entre ellos.

    Que se continúe fortaleciendo el intercambio de información y la cooperación con otras organizaciones e instancias internacionales en materia de delito cibernético como las Naciones Unidas, el Consejo de Europa, la Unión Europea, el Foro de Cooperación Económica del Pacífico Asiático, la OCDE, el G-8 y el Commonwealth, de manera que los Estados Miembros de la OEA puedan conocer y aprovechar los desarrollos dados en dichos ámbitos.

    Que el Grupo de Expertos Gubernamentales en materia de Delito Cibernético se reúna por lo menos una vez al año, en el ámbito de la OEA, y que en el marco de las próximas reuniones:

    a) Examine los resultados de las reuniones técnicas a que se refiere el párrafo 4 y, teniendo en cuenta sus resultados, considere, si fuere el caso, los ajustes que se deben adoptar en futuros encuentros de esta naturaleza, así como otras acciones que se deban realizar para facilitar la adopción y aplicación de la legislación antes mencionada.

    b) Prepare recomendaciones para identificar y describir los diversos tipos de delitos cibernéticos.

    c) Prepare recomendaciones para identificar y describir las facultades de investigación que los Estados deben poseer para investigar los delitos cibernéticos. Estas facultades de investigación deben:

    i.) Aplicarse no sólo a las investigaciones de delitos cibernéticos, sino también a la recolección y custodia segura de indicios y/o pruebas en forma electrónica de cualquier otro delito.

    ii.) Asegurar un adecuado equilibrio entre el ejercicio fundado y motivado de  dichas facultades y la necesidad de garantizar las normas del debido proceso,  en el marco del respeto de los derechos humanos y las libertades fundamentales.

    iii.) Ser aplicables, en la forma permitida por la legislación nacional, tanto para responder a las solicitudes internacionales de cooperación como a las investigaciones nacionales.

    iv.) Permitir el rastreo de comunicaciones de presuntos delincuentes, a través de redes electrónicas que comprendan a proveedores de servicios múltiples, para determinar el curso, origen o destino de las comunicaciones.

    d) Recomiende medidas para evitar la creación de “paraísos de los delitos cibernéticos”, de conformidad con la ley de cada Estado y los tratados internacionales.

    e) Los Estados informen sobre las medidas que han tomado entre una y otra reunión.

    Washington D.C., Estados Unidos de América, 24 de Junio de 2003.

    ANEXO IV. QUINTA REUNIÓN DE MINISTROS DE JUSTICIA O DE MINISTROS O PROCURADORES GENERALES DE LAS AMÉRICAS  28 al 30 de abril de 2004. Washington, D.C.                                                                            

    OEA/Ser.K/XXXIV.5. REMJA-V/doc.7/04 rev. 4. 30  abril 2004.                                                           Original: español

    CONCLUSIONES Y RECOMENDACIONES DE LA REMJA V **

    CONCLUSIONES Y RECOMENDACIONES DE LA REMJA V

    Al finalizar los debates sobre los diferentes puntos comprendidos en su agenda, la Quinta Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA V), convocada en el marco de la OEA, adoptó las siguientes conclusiones y recomendaciones para ser transmitidas, a través del Consejo Permanente, al trigésimo cuarto período ordinario de sesiones de la Asamblea General de la OEA.

    I. COOPERACIÓN HEMISFÉRICA CONTRA LA DELINCUENCIA TRANSNACIONAL ORGANIZADA Y CONTRA EL TERRORISMO

    La REMJA V reafirma que el daño que infringen y la amenaza que representan las diversas manifestaciones de la criminalidad transnacional organizada y el terrorismo,  para nuestros ciudadanos, para nuestras democracias y  para el desarrollo económico y social de nuestros Estados, hacen necesario y urgente continuar fortaleciendo y perfeccionando la cooperación jurídica y judicial mutua a nivel hemisférico, así como, si no lo han hecho, adoptar  legislación, procedimientos y mecanismos nuevos que les permitan combatir de manera eficaz estos delitos.

    Al respecto, destaca que, de acuerdo con la “Declaración sobre la Seguridad en las Américas”, aprobada en la Ciudad de México, el 28 de octubre de 2003, el terrorismo y la delincuencia organizada transnacional hacen parte de las nuevas amenazas, preocupaciones y otros desafíos de naturaleza diversa que afectan la seguridad de los Estados del Hemisferio y que en ella se reafirma “que las Reuniones de Ministros de Justicia o Ministros o Procuradores Generales de las Américas  (REMJA) y otras reuniones de autoridades en materia de justicia penal son foros importantes y eficaces para la promoción y el fortalecimiento del entendimiento mutuo, la confianza, el diálogo y la cooperación en la formulación de políticas en materia de justicia penal y de respuestas para hacer frente a las nuevas amenazas a la seguridad”.

    Considerando que, si bien la comunidad internacional ha avanzado en la elaboración de normas para combatir estas formas de delincuencia, subsisten diferencias en la forma en que los Estados tipifican las conductas delictivas, lo cual puede crear impedimentos para una más efectiva cooperación internacional.

    La REMJA V reconoce la conveniencia de que el tema de la Delincuencia Organizada Transnacional continúe siendo tratado por las diferentes entidades de la OEA que lo han venido haciendo en el marco de sus respectivas competencias, tales como la CICAD, el Comité Consultivo de la CIFTA, la CIM, el Instituto Interamericano del Niño, la REMJA y el MESICIC.

    La REMJA V  reafirma que las medidas realizadas por los Estados Parte para combatir el terrorismo deberán llevarse a cabo respetando plenamente el Estado de derecho, los derechos humanos y las libertades fundamentales, sin menoscabar los derechos y las obligaciones de los Estados y las personas conforme al Derecho Internacional, el Derecho Internacional de los Derechos Humanos y el Derecho Internacional de los Refugiados.

    La REMJA V expresa satisfacción ante el hecho de que en el período que siguió a la REMJA-IV, los Estados Miembros de la OEA hayan adoptado importantes medidas para reforzar la aplicación hemisférica de los instrumentos de las Naciones Unidas de lucha contra el terrorismo y la delincuencia transnacional organizada, de modo de hacer frente en forma eficaz a esos crímenes.  en especial, en el intervalo comprendido entre la REMJA-IV y la REMJA-V, numerosos Estados Miembros de la OEA se convirtieron en Partes del Convenio para la Represión de la Financiación del Terrorismo de 1999, así como de instrumentos universales anteriores de lucha contra el terrorismo.  Análogamente, numerosos Estados Miembros de la OEA se convirtieron en Partes de la Convención de las Naciones Unidas contra la Delincuencia Organizada Transnacional de 2000 y sus tres Protocolos Complementarios  o adoptaron importantes medidas encaminadas a adquirir esa condición.  La REMJA-V reconoce este notable avance en la lucha contra el terrorismo y la delincuencia transnacional organizada.

    La REMJA V toma nota también con satisfacción de que se ha acelerado en gran medida la adhesión a instrumentos regionales de lucha contra el terrorismo y la delincuencia organizada.  La Convención Interamericana contra el Terrorismo de 2002 entró en vigor el 10 de julio de 2003 y ha sido ratificada por ocho (8) Estados Miembros de la OEA; y  la Convención Interamericana contra la Fabricación y el Tráfico Ilícitos de Armas de Fuego, Municiones, Explosivos y Otros Materiales Relacionados (CIFTA) ha sido ratificada por veintidós (22) Estados Miembros de la OEA.

    La REMJA V expresa asimismo su satisfacción por los avances registrados con el propósito de fortalecer y consolidar la cooperación entre los Estados de las Américas para combatir el terrorismo, a través del Trabajo del Comité Interamericano contra el Terrorismo (CICTE) y de sus puntos de contacto nacionales.

    Al mismo tiempo quedan tareas por hacer en cuanto a determinación de mecanismos de eficaz aplicación de normas hemisféricas y mundiales de lucha contra el terrorismo y la delincuencia organizada, y tomamos nota con alarma del incremento de los ataques terroristas a nivel mundial y las actividades de otras organizaciones criminales.  en consecuencia recomendamos:

    A. COOPERACIÓN HEMISFÉRICA CONTRA LA DELINCUENCIA TRANSNACIONAL ORGANIZADA

    1. Que con respecto a la lucha contra la delincuencia transnacional organizada, los Estados Miembros que aún no lo hayan hecho firmen y ratifiquen, ratifiquen, o adhieran, según sea el caso, e implementen, a la brevedad posible:

    a. La Convención de las Naciones Unidas contra la Delincuencia Organizada Transnacional, el Protocolo para prevenir, reprimir y sancionar la trata de personas, especialmente mujeres y niños, y el Protocolo contra el tráfico ilícito de migrantes por tierra, mar y aire. Instamos a los Estados Miembros a completar sus procesos internos para determinar si han de suscribir y ratificar el Protocolo contra la fabricación y el tráfico ilícitos de armas de fuego, sus piezas y componentes y municiones.        

    b. La Convención Interamericana contra la Fabricación y el Tráfico Ilícitos de Armas de Fuego, Municiones, Explosivos y Otros Materiales Relacionados (CIFTA) que, entre otras cosas, establece un régimen eficaz de penalización del tráfico ilícito de armas de fuego que ayudará a la lucha contra la delincuencia transnacional organizada y contra el terrorismo y que, además, crea un mecanismo de seguimiento hasta la fuente de las armas de fuego que puedan ser  objeto de tráfico ilícito.

    2. Que los Estados Miembros que son Parte o signatarios de la Convención contra la Delincuencia Organizada Transnacional y sus dos protocolos en vigor trabajen conjuntamente en la Primera Conferencia de las Partes, que tendrá lugar entre el 28 de junio y el 9 de julio de 2003, para facilitar la aplicación de esos importantes instrumentos internacionales.

    3. Recomendar a la Asamblea General de la OEA que convoque a un grupo de expertos que considere la posibilidad de la elaboración de un Plan de Acción Hemisférico contra la Delincuencia Transnacional Organizada, como un plan integrado que recoja el esfuerzo que cada área de la OEA viene desarrollando en los diferentes aspectos del problema, de conformidad con la Declaración sobre Seguridad en las Américas.

    4. Que los Estados Miembros consideren –cuando sea apropiado- la armonización de sus respectivos ordenamientos jurídicos con las obligaciones asumidas en esta materia. A tal fin, se recomienda que la Asamblea General de la OEA encomiende al Comité Jurídico Interamericano la realización de un estudio sobre el punto antes mencionado, y que le informe a la entidad que la Asamblea General atribuya la responsabilidad de considerar la posibilidad de elaborar un Plan de Acción Hemisférico contra la Delincuencia Organizada Transnacional.

    5. Que los Estados Miembros promuevan una mayor interrelación entre las autoridades de aplicación de la ley para que determinen líneas de acción comunes en la investigación y enjuiciamiento de estos delitos.

    6. Instar a los Estados a la realización de seminarios y jornadas de capacitación tanto a nivel regional como nacional, referidos a los diferentes aspectos de la delincuencia transnacional organizada.

    B. COOPERACIÓN HEMISFÉRICA CONTRA EL TERRORISMO

    1. Que con respecto a la lucha contra el terrorismo, los Estados Miembros que aún no lo hayan hecho firmen y ratifiquen, ratifiquen, o adhieran, según sea el caso, e implementen, a la brevedad posible:

    a. Las doce convenciones de las Naciones Unidas contra el terrorismo.

    b. La Convención Interamericana contra el Terrorismo.

    2. Que los Estados Miembros dispongan de capacidad suficiente para tomar acciones de aplicación de la ley con respecto a situaciones en las cuales aún no se ha realizado un ataque terrorista y en que una oportuna investigación y persecución pueda prevenir la realización de esos ataques, y adoptar medidas inmediatas que confieran capacidad suficiente para la persecución de dichas conductas y hacer efectiva la cooperación mutua al respecto.

    3. Que cada Estado Miembro fortalezca su capacidad para facilitar el intercambio de información entre los servicios de seguridad y los organismos de aplicación de la ley para prevenir ataques y lograr el encauzamiento de terroristas, de conformidad con las leyes nacionales y los instrumentos internacionales aplicables.

    4. Que, en aplicación del artículo 7 de la Convención Interamericana contra el Terrorismo, los Estados Miembros promuevan las más amplias medidas de cooperación, especialmente medidas que garanticen la eficaz colaboración entre los organismos de aplicación de la ley, los servicios de inmigración y entidades conexas y sometan a mejores controles a sus documentos de viaje y de identidad.

    5. Tomar nota de la labor de la Comisión Interamericana de Derechos Humanos en la esfera del terrorismo y de los derechos humanos. Recomienda que las autoridades responsables de la elaboración de leyes contra el terrorismo sigan reuniéndose e intercambiando mutuamente prácticas modelo y experiencias nacionales sobre este tema.

    6. Recomendar que la Red Hemisférica de Intercambio de Información para la Asistencia Judicial Mutua en Materia Penal comprenda información sobre legislación y, según sea apropiado, políticas antiterroristas vigentes en los Estados Miembros.

    7. Recomendar que, para ayudar a la prevención de actos de terrorismo, deben tomarse medidas para evitar la discriminación contra miembros de la sociedad.

    II. ASISTENCIA JUDICIAL MUTUA EN MATERIA PENAL Y EXTRADICIÓN

    A. REUNIÓN DE AUTORIDADES CENTRALES Y OTROS EXPERTOS EN ASISTENCIA JUDICIAL MUTUA EN MATERIA PENAL

    La REMJA V recomienda:

    1. Expresar su satisfacción por la realización de la “Reunión de Autoridades Centrales y Otros Expertos en Materia de Asistencia Judicial Mutua en Materia Penal”, celebrada en cumplimiento de las recomendaciones de la REMJA IV, en Ottawa, Canadá, entre los días 30 de abril y 2 de mayo de 2003, y adoptar en su integridad las recomendaciones formuladas, las cuales se encuentran publicadas en el documento OEA/Ser.K/XXXIV.5 REMJA-V/doc.4.

    2. Respaldar, conforme a la recomendación 6 de esa reunión, la continua celebración de reuniones de las Autoridades Centrales y otros Expertos sobre asistencia judicial mutua en materia penal del Hemisferio, por lo menos una vez entre una REMJA y la siguiente, con el apoyo y la coordinación del Grupo de Trabajo sobre Asistencia Judicial Mutua, y la consideración, en su siguiente reunión, del avance logrado en cuanto a la aplicación de las recomendaciones de la reunión de Ottawa e, inter alia, los temas a los que se refiere la arriba mencionada recomendación 6, conforme al orden de prioridades que definan.

    3. Decide que, en la próxima reunión de autoridades centrales y otros expertos, se inicie la consideración de acciones para fortalecer la cooperación jurídica hemisférica en materia de extradición, incluyendo la extradición temporal cuando proceda de acuerdo con la legislación nacional, y proceda a la preparación de las secciones relativas a la cooperación jurídica y judicial mutua de un plan de acción hemisférico para el combate contra la delincuencia transnacional organizada y contra el terrorismo, incluyendo medidas de administración de casos por el Estado requirente  para no sobrecargar al Estado requerido.

    4. Decide que la próxima reunión de autoridades centrales y otros expertos continúe fortaleciendo y haciendo más efectivos los mecanismos de asistencia judicial mutua en materia penal y la cooperación hemisférica en materia de extradición. A tal efecto la reunión de autoridades centrales y otros expertos, podrá solicitar insumos a las siguientes entidades en relación con las áreas de su competencia: CICTE, CICAD, Comité Consultivo de la CIFTA, CIM, MESICIC, Instituto Interamericano del Niño y al Comité Jurídico Interamericano.

    B. RED HEMISFÉRICA DE INTERCAMBIO DE INFORMACIÓN PARA LA ASISTENCIA JUDICIAL MUTUA EN MATERIA PENAL

    Considerando la utilidad e importancia de la Red Hemisférica de Intercambio de Información para la Asistencia Judicial Mutua en Materia Penal, la REMJA V formula las siguientes recomendaciones:

    1. Decide adoptar la Red Hemisférica de Intercambio de Información para la Asistencia Judicial Mutua en Materia Penal e insta a todos los Estados Miembros a implementar su componente público y darle difusión entre los usuarios más interesados.

    2. Establece, que como la red, bajo la orientación de un grupo formado por Argentina, Bahamas, Canadá y El Salvador y administrado por la Secretaría General de la OEA, comprende datos referentes a todos los Estados Miembros de la OEA, en el sitio público en “Internet” debe seguir publicándose información referente a asistencia judicial mutua en materia penal.

    3. Que los Estados que hasta ahora no lo hayan hecho, identifiquen a una persona de contacto para que proporcione y actualice la información que se proporciona a través de la red.

    4. Expresar satisfacción con respecto a la elaboración del proyecto piloto de AJM de correo electrónico seguro, y recomienda que todos los Estados adopten las medidas apropiadas para evaluarlo y que el mismo siga funcionando y se amplíe de modo de abarcar a otros Estados.

    5. Examinar la posibilidad de intercambiar información, en las áreas y metodologías de mutuo interés, con la “Fiscalía Virtual de Iberoamérica”.

    III. POLÍTICAS PENITENCIARIAS Y CARCELARIAS

    Dada la importancia y conveniencia de continuar y consolidar el proceso de intercambio de información y de experiencias y de cooperación mutua en relación con las políticas penitenciarias y carcelarias de los Estados Miembros de la OEA, la REMJA V recomienda:

    1. Expresar su satisfacción por los resultados y adoptar el informe de la Primera Reunión de Autoridades Responsables de las Políticas Penitenciarias y Carcelarias de los Estados Miembros de la OEA (documento OEA/Ser.K/XXXIV.5 REMJA-V/doc.6/04), celebrada en la sede de la OEA, durante los días 16 y 17 de Octubre de 2003, en cumplimiento de lo acordado en la REMJA-IV.

    2. Respaldar la realización de reuniones periódicas de las autoridades responsables de las políticas penitenciarias y carcelarias de los Estados Miembros de la OEA y la creación de un sistema de información a través de “Internet” en relación con dichas políticas, de acuerdo con las recomendaciones formuladas en la primera reunión de tales autoridades.

    3. Que los Estados, a través de su participación en las reuniones de autoridades penitenciarias y carcelarias, promuevan estrategias y políticas penitenciarias, basadas en el respeto a los derechos humanos, que contribuyan al deshacinamiento carcelario. Con este fin, los Estados incentivarán la modernización de la infraestructura carcelaria y la profundización de las funciones de rehabilitación y reinserción social del individuo, a través del mejoramiento de las condiciones de privación de la libertad y el estudio de nuevos estándares penitenciarios.

    IV. DELITO CIBERNÉTICO

    En relación con esta materia, la REMJA V recomienda:

    1. Expresar su satisfacción por los resultados de la Reunión Inicial del Grupo de Expertos Gubernamentales en Materia de Delito Cibernético, celebrada en la sede de la OEA, durante los días 23 y 24 de junio de 2003,  en cumplimiento de lo acordado en la REMJA-IV.

    2. Adoptar las recomendaciones formuladas por el Grupo de Expertos Gubernamentales (documento OEA/Ser.K/XXXIV.5 REMJA-V/doc.5/04) y solicitarle que, a través de su Presidencia, informe a la próxima REMJA sobre los avances dados en relación con las mismas.

    3. Respaldar que las recomendaciones formuladas por el Grupo de Expertos Gubernamentales en su reunión inicial sirvan como la contribución de las REMJA para el desarrollo de la Estrategia Interamericana para Combatir las Amenazas a la Seguridad Cibernética a que se refiere la resolución de la Asamblea General de la OEA AG/RES. 1939 /XXXIII-O/03), así como solicitar al Grupo que, a través de su Presidencia, continúe apoyando el proceso de elaboración de dicha Estrategia.

    4. Que se dispense capacitación internacional en relación con el delito cibernético a los Estados de la OEA que la soliciten, y que los Estados de la OEA en general consideren la posibilidad de asignar recursos que garanticen el suministro de esa capacitación.

    5. Que los Estados Miembros participen en las reuniones técnicas del Grupo de Expertos Gubernamentales sobre Delito Cibernético, a fin de que a nivel hemisférico se logre una clara comprensión sobre los futuros desafíos.

    6. Que los Estados Miembros, en el contexto del Grupo de Expertos, examinen mecanismos que faciliten una amplia y eficiente cooperación mutua para combatir el Delito Cibernético y estudien, según sea posible, el desarrollo de la capacidad técnica y jurídica para unirse a la red 24/7 establecida por el G-8 para ayudar a realizar las investigaciones sobre delitos cibernéticos.

    7. Que en la medida de lo posible, los Estados Miembros dispongan lo necesario para que las diferencias en la descripción de los delitos no vayan en detrimento de la eficiencia de la cooperación a través de la asistencia jurídica y judicial mutua y la extradición.

    8. Que los Estados Miembros evalúen la conveniencia de la aplicación de los principios de la Convención del Consejo de Europa sobre la Delincuencia Cibernética (2001) y que consideren la posibilidad de adherirse a dicha Convención.

    9. Que los Estados Miembros examinen y, si corresponde, actualicen, la estructura y la labor de entidades u organismos internos encargados de hacer cumplir las leyes, de modo de adaptarse a las cambiantes características de los delitos cibernéticos, incluso examinando la relación entre los organismos que combaten ese tipo de delitos y los que proporcionan la asistencia policial o judicial mutua tradicional.

    V. CORRUPCIÓN: SEGUIMIENTO DE LOS COMPROMISOS DE LA DECLARACIÓN DE NUEVO LEÓN

    En las Declaraciones de Nuevo León y de la Ciudad de Québec, así como en anteriores REMJA, se reconoce la seriedad del problema de la corrupción en nuestras sociedades.

    Tomamos nota con aprobación del hecho de que a partir de la REMJA-IV, la mayor parte de los Estados Miembros suscribieron la Convención de las Naciones Unidas contra la Corrupción y algunos Estados Miembros adicionales se convirtieron en Partes de la Convención Interamericana contra la Corrupción, pero hoy procuramos reforzar nuestros esfuerzos para promover eficazmente la lucha contra la corrupción.

    En consecuencia, la REMJA-V recomienda que los Estados Miembros:

    1. Que aún no lo hayan hecho, adopten a la brevedad posible las medidas necesarias para alcanzar los siguientes objetivos:

    a. Firmar y ratificar, ratificar, o adherir, según sea el caso, e implementar la Convención de las Naciones Unidas contra la Corrupción de 2003.

    b. Firmar y ratificar, ratificar, o adherir, según sea el caso, e implementar la Convención Interamericana contra la Corrupción de 1996.

    2. Cooperen para reforzar el Mecanismo de Seguimiento de la Implementación de la Convención Interamericana contra la Corrupción, a través de medidas prácticas que lo hagan más eficaz, incluyendo lo relativo a la necesidad de incrementar los recursos económicos y perfeccionar los recursos humanos y la aceleración del proceso de evaluación en la Primera Ronda.

    3. Antes de la realización de la REMJA VI, cada Estado Miembro, con apego a su legislación nacional y a las normas internacionales aplicables, adoptará medidas legales internas que nieguen acogida a funcionarios corruptos, a quienes los corrompen y a sus bienes e intercambiarán información sobre las medidas que hayan adoptado.

    4. Con apego a sus legislaciones nacionales y a las normas internacionales aplicables, revisen  sus regímenes legales de extradición y suministro de asistencia judicial mutua en relación con delitos de corrupción, incluida su capacidad de disponer el decomiso o la confiscación de activos derivados de actividades criminales a pedido de otros países que tengan diferentes modalidades de realización del decomiso o  confiscación, a fin de reforzarlos.

    5. Adopten, conforme a los principios fundamentales de su legislación interna, las medidas legislativas y de otro género que sean necesarias para que sus autoridades competentes puedan devolver los bienes decomisados o confiscados al Estado requirente, en caso de apropiación fraudulenta de fondos públicos o lavado de fondos públicos que hayan sido objeto de apropiación fraudulenta.

    6. Apoyen los trabajos de la reunión de los Estados Parte de la Convención Interamericana contra la Corrupción que tendrá lugar en Managua, Nicaragua, en julio de 2004, la cual deberá considerar “medidas concretas adicionales para aumentar la transparencia y combatir la corrupción”.

    VI. TRATA DE PERSONAS, ESPECIALMENTE MUJERES Y NIÑOS

    Teniendo en cuenta que la trata de personas es un grave delito, que debe ser tipificado, prevenido y combatido, que sus víctimas se encuentran en una condición de vulnerabilidad lo cual exige una mayor atención internacional y la debida asistencia y protección, amparando sus derechos humanos y que para lograr estos fines se requiere de la cooperación integral por parte de todos los Estados.

    Reconociendo que existe un importante conjunto de instrumentos internacionales para garantizar la protección de las mujeres, niños, niñas y adolescentes, como son la Convención sobre los Derechos Humanos del Niño, la Convención sobre todas las formas de Discriminación contra la Mujer, la Convención Interamericana para Prevenir, Sancionar y Erradicar la Violencia contra la Mujer, la Convención nº 182 de la OIT sobre las peores formas de trabajo infantil, el Protocolo Opcional de la Convención sobre los Derechos del Niño en relación con la venta de niños, la prostitución y la pornografía infantiles, la Convención Interamericana sobre el Tráfico Internacional de Menores y el Protocolo para Prevenir, Reprimir y Sancionar la Trata de Personas, Especialmente Mujeres y Niños.

    Teniendo presente que el Protocolo para Prevenir, Reprimir y Sancionar la Trata de Personas, Especialmente Mujeres y Niños, complementario de la Convención de las Naciones Unidas contra la Delincuencia Organizada Transnacional, especifica las acciones que  configuran el delito de trata de personas.

    Decididos a superar los obstáculos en la lucha contra este delito transnacional.

    La REMJA V recomienda:

    1. Que los Estados Miembros que aún no lo hayan hecho firmen y ratifiquen, ratifiquen, o adhieran, según sea el caso, e implementen, a la brevedad posible, el Protocolo para Prevenir, Reprimir y Sancionar la Trata de Personas, Especialmente Mujeres y Niños, que complementa la  Convención de las Naciones Unidas contra la Delincuencia Organizada Trasnacional.

    2. Instar a los Estados Miembros a completar sus procesos internos para determinar si han de suscribir y ratificar:

    a. El Protocolo contra el Tráfico Ilícito de Migrantes por Tierra, Mar y Aire, y

    b. La Convención Interamericana sobre el Tráfico Internacional de Menores.

    3. La realización de una Reunión de autoridades nacionales en esta materia, incluyendo la participación, entre otros, de la CIM, el IIN, las Naciones Unidas, la OIM y otros organismos internacionales relacionados, con el propósito de estudiar mecanismos de cooperación integral entre los Estados para asegurar la protección y asistencia a las víctimas, la prevención del delito y la persecución a sus autores. Asimismo, la reunión facilitará el intercambio de información y experiencias, el diálogo político y la cooperación entre los países de origen, tránsito y destino de la trata de personas, así como el establecimiento o mejoramiento de registros estadísticos en la materia.

    4. Mantener el tema de la Trata de Personas como punto del temario en futuros debates de la REMJA.

    VII. VIOLENCIA CONTRA LA MUJER

    La REMJA V:

    1. Insta a los Estados Miembros a completar sus procesos internos para determinar si han de suscribir y ratificar la Convención Interamericana para Prevenir, Sancionar y Erradicar la Violencia contra la Mujer (Convención de Belem do Pará).

    2. Alienta a los Estados Parte de la Convención Interamericana para Prevenir, Sancionar y Erradicar la Violencia contra la Mujer (Convención de Belem do Pará) a analizar el modo más apropiado de crear un mecanismo de seguimiento de la Convención.

    VIII. GÉNERO Y JUSTICIA

    La REMJA V, habiendo escuchado la presentación de la CIM (Comisión Interamericana de Mujeres), toma nota de las recomendaciones sobre genero y justicia formuladas a la REMJA V por la Segunda Reunión de Ministras o Ministros o Autoridades al más alto nivel Responsables de las Políticas de las Mujeres en los Estados Miembros y las refiere a los Estados Miembros para mayor consideración.

    IX. CENTRO DE ESTUDIOS DE JUSTICIA DE LAS AMÉRICAS (CEJA)

    En cumplimiento de los mandatos de la Segunda y Tercera Cumbres de las Américas, de las resolución de la Asamblea General de la OEA AG/RES. 1 (XXVI-E/99) y de las conclusiones y recomendaciones de las REMJA II y III, que impulsaron la creación de un Centro de Estudios que contribuya al mejoramiento de las políticas de Justicia y al desarrollo institucional de los sistemas judiciales en la región.

    Y habiendo oído el informe del Centro de Estudios de Justicia de las Américas, la REMJA-V decide:

    1. Expresar su agradecimiento al Consejo Directivo y al Director Ejecutivo por la orientación e iniciativa que han puesto de manifiesto al guiar y elaborar los pasos iniciales del trabajo del Centro en la esfera de la justicia penal, y dar forma concreta a la visión de un centro regional de expertos en el sector de la justicia establecido por los Jefes de Estado y de Gobierno en Santiago de Chile.

    2. Felicitar al Centro por la exitosa puesta en marcha de sitios y publicaciones en Internet que están siendo ampliamente consultados en la región, y por la elaboración de un importante estudio comparado de normas y prácticas de procedimiento penal en la región que contribuirán a mejorar el desempeño del sistema de justicia.

    3. Expresar satisfacción por los esfuerzos realizados para hacer efectiva la participación de  los Estados Miembros en programas y actividades del Centro, pese a la diversidad de intereses e instituciones que intervienen y la escasez de financiamiento.

    4. Solicitar al Centro que, de conformidad con los objetivos establecidos en su Estatuto, incluya en sus planes de trabajo las conclusiones y recomendaciones de la REMJA. Para este fin, los Estados Miembros proveerán los recursos que sean necesarios.

    5. Solicitar al Centro que organice un grupo o proceso de trabajo, incluyendo los Estados Miembros y otros donantes, a fin de elaborar, para que sea considerado por la REMJA VI, un plan de financiamiento del Centro de acuerdo con el mandato de la Tercera Cumbre de las Américas. Este proceso debe ser desarrollado sin perjuicio de las contribuciones voluntarias que con este objeto los Estados Miembros deban entregar, de acuerdo a lo establecido en el Estatuto del Centro, aprobado por la Asamblea General de la Organización de los Estados Americanos.

    6. Aprobar la renovación del mandato del Director Ejecutivo del Centro acordada por su  Consejo Directivo, de acuerdo con su Estatuto, en sesión ordinaria celebrada el 5 de enero de 2004, en Santiago de Chile.

    7. Solicitar al Centro que siga apoyando los esfuerzos que se realizan para  fortalecer los sistemas de Justicia internos con miras al mejoramiento de los marcos nacionales en el ámbito de la cooperación y asistencia judicial mutua en el Hemisferio.

    X. PRÓXIMA REUNIÓN

    La REMJA V recomienda que la Sexta Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA VI) se realice en el año 2006 y que la Asamblea General de la OEA encargue al Consejo Permanente de la Organización de fijar la fecha y sede de la misma.

    ANEXO V. CUARTO PERÍODO ORDINARIO DE SESIONES, 28-30 de enero de 2004.  Montevideo, Uruguay                             

    MARCO PARA ESTABLECER UNA RED INTERAMERICANA CSIRT DE VIGILANCIA Y ALERTA (Presentado por la Embajadora Margarita Escobar, Presidenta del Grupo de Trabajo de la Comisión de Seguridad Hemisférica de la OEA, en la tercera sesión plenaria celebrada el día 29 de enero de 2004)

    Objetivo: Crear una red hemisférica, que funcione 24 horas al día, 7 días a la semana, de puntos nacionales de contacto entre equipos de respuesta a incidentes de seguridad en computadoras (Computer Security Incident Response Teams: CSIRT) con responsabilidad nacional (CSIRT nacionales), en los Estados Miembros de la OEA, con la capacidad y a cargo de responder debida y rápidamente a las crisis, incidentes y peligros relacionados con la seguridad cibernética.

    Dado que los intrusos emplean instrumentos de ataque cada vez más sofisticados, lanzan ataques muy automatizados que se desplazan a la velocidad de la Internet, y emplean intencionalmente técnicas de ataque que hacen difícil entender la naturaleza y origen de tales ataques, la colaboración mundial en tiempo real entre los equipos de respuesta tiene una importancia creciente. Dicha colaboración permitiría lo siguiente:

    ·                un diagnóstico rápido y preciso del problema;

    ·                la pronta diseminación mundial de advertencias sobre ataques;

    ·                la pronta diseminación mundial de advertencias sobre vulnerabilidades genéricas;

    ·                un alerta mundial sobre actividades sospechosas, y la colaboración para investigar y diagnosticar tales actividades;

    ·                el suministro de información sobre medidas para mitigar y remediar los ataques y amenazas; y

    ·                una reducción de duplicaciones de análisis entre los equipos.

    La colaboración refuerza los conocimientos técnicos existentes entre los equipos para limitar los perjuicios y permitir que continúen funcionando los servicios de importancia crítica.

    Principios:

    Locales – El programa debe ser manejado y controlado por entidades locales de cada país participante, designadas por su Gobierno.

    Sistémicos – El sistema debe ser una operación multifacética que requiere un personal consciente y especializado, una distribución regular de la información relativa a las amenazas y vulnerabilidades vigentes, una reevaluación e implementación constantes de las mejores prácticas, y una interacción adecuada con las autoridades públicas.

    Permanentes – Debido a la evolución diaria inherente de la Internet, para que tenga buen resultado un programa deberá actualizarse y mantenerse con regularidad. La seguridad en la Internet no se logrará mediante una acción única.

    Responsables – La “seguridad” en la ciberseguridad. Deben entenderse y seguirse reglas estrictas respecto de cuestiones tales como el manejo de la información, ya que de otra manera los usuarios perderían la confianza, y los esfuerzos para proteger el sistema serán perjudicados e incluso serán contraproducentes.

    Basados en disposiciones ya existentes – Hay un número de entidades preexistentes en el hemisferio que proporcionan servicios de seguridad cibernética en mayor o menor medida. Un sistema nuevo deberá basarse en esas instituciones ya existentes a fin de evitar duplicaciones y promover una participación activa.

    Identificación de organizaciones existentes

    En todo el mundo, hay más de cien organizaciones que usan el nombre CERT (Computer Emergency Response Team: equipo de respuesta a emergencias de computación), o CSIRT (el término genérico de significado equivalente). Muchas de ellas, pero no todas, tienen una cierta relación con el Centro de Coordinación CERT (CERT/CC) en la Universidad de Carnegie Mellon, en donde se creó el primer “CERT”. Incluso los CSIRT relacionados con el CERT/CC tienen diferentes métodos de respuesta a los incidentes, dependiendo de diversos factores tales como la uniformidad, cuestiones geográficas y técnicas, la autoridad, los servicios suministrados, y los recursos. en los Estados Unidos, el Departamento de Seguridad de la Patria, División de Ciberseguridad Nacional, ha creado el US-CERT, para que sea el “Equipo de emergencias informáticas”, con responsabilidad nacional en los Estados Unidos. en el Canadá, la División de Ciberprotección, dentro de la organización de Seguridad Pública y Preparación para Emergencias-Canadá (PSEPC) cumple una función similar de responsabilidad nacional.

    El Foro sobre Equipos de Respuesta a Incidentes (Forum on Incident Response Teams: FIRST), una asociación mundial voluntaria de equipos CSIRT, cuenta con 79 miembros en los Estados Miembros de la OEA, 68 de ellos en los EE.UU. De los restantes, seis son del Canadá, dos del Brasil, con sendos miembros en Chile, México y Perú. Además, algunas compañías, tales como ATT, Symantec, y Visa, ofrecen servicios CSIRT a sus clientes de todo el mundo, y puede haber otros CSIRT en la región, tales como Ar-CERT en la Argentina, que no forman parte de la red FIRST.

    Dadas las lagunas en la información, llevar a cabo un censo de los CSIRT es el primer paso para la creación de una red de seguridad cibernética.

    Establecimiento de un modelo de servicio

    Si bien no hay normas internacionales acordadas sobre qué es lo que constituye un CSIRT, hay una serie de documentos y actividades que pueden servir para definir un equipo CSIRT, y que están relacionados con la certificación y autorización de tales equipos.

    El CERT/CC ha publicado varios documentos que pueden servir de ayuda para la creación de un CSIRT, entre los que se cuentan los siguientes:

    ·                Handbook for Computer Security Incident Response Teams (CSIRTs) (Manual para equipos de respuesta a incidentes de seguridad de computadoras (CSIRT)): guía actualizada sobre cuestiones genéricas que deben considerarse al formar un CSIRT;

    ·                State of the Practice of Computer Security Incident Response Teams (Estado actual de las prácticas de los equipos de respuesta a incidentes de seguridad de computadoras). Este informe contiene información recogida mediante un estudio piloto de estos equipos, la experiencia propia del CERT/CC, discusiones con otros CSIRT y observaciones de éstos, e investigación y críticas de las publicaciones actuales sobre la respuesta a incidentes; y

    ·                Creating a Computer Security Incident Response Team:  A Process for Getting Started (Creación de un equipo de respuesta a incidentes de seguridad de computadoras: un método para su comienzo). Éste es un documento en el que se describen los requisitos básicos para crear un CSIRT.

    Además, el Departamento de Defensa de los Estados Unidos (US DoD) ha creado un programa de certificación y autorización de proveedores de servicios de defensa de redes de computadoras dentro de dicho Departamento. Ese programa puede usarse de punto de partida para establecer criterios para la certificación de equipos CSIRT nacionales.

    Cuando se establece una red regional de CSIRT nacionales cooperantes, debe preverse un conjunto mínimo de normas y servicios, entre los que se contarían los siguientes:

    ·                designación de responsabilidad por el Gobierno del CSIRT nacional;

    ·                convenio sobre los principios para compartir información entre los equipos cooperantes;

    ·                responsabilidad por recibir información de otros CSIRT nacionales, y por diseminar dicha información entre las entidades idóneas dentro del país;

    ·                autorización para diseminar información entre otros CSIRT nacionales; y

    ·                proporcionar asistencia de coordinación a otros CSIRT nacionales para incidentes y amenazas.

    Cuestiones de confianza

    Gran parte de la información que tienen que intercambiar los CSIRT es de propiedad exclusiva, o es de carácter delicado por otros motivos, y hay pocos modelos buenos que sirvan para compartir uniformemente datos entre tales equipos. La confianza—el ingrediente esencial cuando se comparte información—, cuando existe, se desarrolla entre individuos que se conocen y han trabajado juntos, más bien que institucionalmente entre organizaciones. Para establecer la confianza, todas las partes deben entender y seguir pautas claras sobre la forma en que la información intercambiada será usada o diseminada. Todos los CSIRT nacionales cooperantes deben convenir en los principios para compartir información que indiquen cómo tal información puede usarse o diseminarse.

    Las normas de divulgación de la vulnerabilidad describen las circunstancias en las cuales se disemina información sobre tal vulnerabilidad, y entre quiénes. en tales normas debe establecerse un equilibrio entre la necesidad de diseminar información procesable entre las audiencias debidas y la necesidad de minimizar las posibilidades de que un intruso pudiera obtener tal información antes de contar con parches o soluciones improvisadas.

    Entre los atributos de los CSIRT necesarios para promover la confianza en las comunicaciones y la cooperación respecto de asuntos delicados de seguridad figuran los siguientes:

    ·                una infraestructura segura para el manejo de información delicada;

    ·                la capacidad para comunicarse sin riesgos con los interesados;

    ·                la capacidad para reunir expertos y autoridades;

    ·                una infraestructura que permita la notificación anticipada a determinadas audiencias;

    ·                procedimientos de protección contra fugas de información;

    ·                una interfaz pública bien conocida para la diseminación de información crítica; y

    ·                la capacidad para llegar rápidamente a una gran audiencia.

    La creación de una capacidad CSIRT regional requiere la formación de un consenso sobre los principios para el intercambio de información, incluso qué información puede compartirse, con quién, y cuándo.

    Financiamiento

    No es barato financiar los CSIRT. Además de suministrar equipos y personal especializado permanentemente, los administradores de dichos equipos tienen que proporcionar asistencia técnica periódica y organizar ejercicios regulares para mantener sus operaciones a punto. Los Estados Miembros y la Organización deberán considerar cuidadosamente los mecanismos de financiación de los CSIRT y probablemente tengan que establecer un orden de prioridades de su cobertura, o buscar fuentes estables de financiación externa.

    Cabe señalar que en octubre de 2002 los líderes de la APEC pidieron la creación de una capacidad regional CSIRT 24/7 para octubre de 2003. Tanto la APEC como el Gobierno de Australia convinieron en financiar proyectos de creación de capacidad CSIRT en las economías de cuatro miembros. en su informe más reciente sobre el proyecto, funcionarios de la APEC admitieron que hay dificultades para atraer candidatos aceptables y para obtener fondos adecuados para cubrir el costo del proyecto.

    Conciencia pública

    El apoyo del Gobierno y la industria para los programas (y financiación) de los CSIRT está directamente relacionado con la conciencia que tiene el público del problema de la ciberseguridad y sus posibles repercusiones en objetivos sumamente deseables en materia de desarrollo. Si los sistemas de una economía interconectada no se protegen debidamente, las redes e infraestructuras de todas las economías interconectadas son vulnerables. Los participantes en una red, ya sea como creadores, propietarios, explotadores o usuarios individuales, deben tener conciencia de las amenazas a la red y de sus vulnerabilidades, y asumir la responsabilidad de su protección según la posición que ocupen y la función que cumplan. La Organización, trabajando con los Estados Miembros y los CSIRT, debe llevar a cabo un programa de concientización del público acerca de la seguridad y la ética cibernéticas en el que se destaquen:

    (1) las ventajas y responsabilidades del uso de redes de información;

    (2) las mejores prácticas de seguridad y protección; y

    (3) las posibles consecuencias negativas del uso indebido de las redes. Existen varias organizaciones y sitios en línea con datos útiles para dicho fin, y la Organización debe hacer uso de ellos.

    Extensión de la red

    Si bien la conciencia del público es un elemento esencial de esta propuesta, establecer una capacidad regional de CSIRT requerirá compromisos políticos en donde éstos puedan no existir. El grupo de trabajo deberá proponer un proyecto de resolución sobre la seguridad cibernética para su aprobación por la Comisión de Seguridad Hemisférica y transmitirlo a la Asamblea General con el mismo fin, que comprometa a los Estados Miembros a establecer equipos CSIRT en sus países, y a implementar las recomendaciones que pudiera presentar el grupo y aprobar la Comisión. Así se aplicará la voluntad política de los Estados Miembros al logro de una cobertura regional de los CSIRT, y se proporcionará a la Organización el marco institucional necesario para proceder. Con esta resolución, el grupo de trabajo puede asistir a los Estados a formular planes concretos y, suponiendo una financiación adecuada, a organizar proyectos para crear capacidad en sus respectivos países. Hasta el momento, ningún Estado ha ofrecido financiar este proyecto.

    Plan de acción

    Acción 1: Llevar a cabo un censo para identificar los CSIRT existentes, su variedad de miembros y los servicios que proporcionan. Esto nos permitirá identificar las lagunas en la cobertura, tanto geográfica como sectorialmente, y establecerá las bases para fijar un conjunto consensual de servicios que ofrecerán los CSIRT miembros. Se adjunta un posible cuestionario de censo.

    Acción 2: Establecer un consenso para un conjunto mínimo de servicios que ofrecerán todos los CSIRT miembros. Eso ayudará a formar una doctrina de operación hemisférica uniforme, y servirá de base para las actividades subsiguientes de asistencia técnica.

    Acción 3: Redactar una resolución para presentarla a la Comisión de Seguridad Hemisférica y la Asamblea General, pidiendo a los Estados Miembros que creen equipos CSIRT y que implementen las otras propuestas que figuren en el informe del grupo de trabajo. De los 11 CSIRT no estadounidenses que son miembros de la red FIRST, seis son estatales, cuatro son privados, y uno es dirigido por una universidad.

    Acción 4: Producir un compendio de mejores prácticas basado en los servicios y normas CSIRT consensuales, acordes con las prácticas similares en Europa y Asia. Incluiría normas y protocolos para llevar a cabo monitoreo en tiempo real y un subsiguiente intercambio de información en toda la red, y servirán de base para protocolos consiguientes de pruebas y asistencia técnica.

    Acción 5: Establecer un sistema de asistencia técnica e intercambio de información permanente para los CSIRT. Algunos países necesitarán asistencia para crear capacidad, o asistencia técnica para crear una capacidad de coordinación de la protección informática, o mejorar las capacidades existentes a fin de cumplir con las normas requeridas. Será necesario obtener financiamiento.

    Al finalizarse la acción 1, realizar una reunión interamericana de representantes de los CSIRT existentes, a fin de adelantar las acciones y las cuestiones de compartimiento de información, la identificación de lagunas en la cobertura y asistencia técnica, la capacidad de interfuncionamiento, y la intercomunicación. Podrían asistir representantes del Grupo de Trabajo de Seguridad Cibernética de la OEA a fin de proporcionar información normativa cuando ello sea necesario, y asegurarse de que se aborden las cuestiones descritas en el presente documento. Esa reunión también sería un paso importante para enfrentar la cuestión de la confianza y, como sería a nivel técnico, no dependería de las acciones de la Asamblea General.

    ————————————————————————-

    (1). Informe de la Conferencia sobre Seguridad Cibernética, documento OEA/Ser.L/X.5, CICTE/CS/doc.2/03.

    (2). Declaración sobre Seguridad en las Américas, documento CES/DEC.1/04 rev. 1.

    (3). Declaración de Montevideo, OEA/Ser.L/X.2.4, CICTE/DEC. 1/04 rev. 3.

    (4). Anexo V, documento OEA/Ser.L/X.2.4, CICTE/INF.4/04.

    (5). Anexo I.

    (6). Anexo II.

    (7). Anexo IV, documento OEA/Ser.K/XXXIV.5/REMJA-V/doc.7/04 rev. 4.

    (8). Anexo III.

    (1). CCP.I-TEL/doc.427/04 rev. 2

    * El presente documento fue aprobado en su integridad por el Grupo de Expertos Gubernamentales en Materia de Delito Cibernético, en la sesión celebrada el día 24 de Junio de 2003.

    ** Las presentes “Conclusiones y Recomendaciones de la REMJA V” fueron aprobadas por consenso en la sesión plenaria celebrada el día 30 de abril de 2004, en el marco de la Quinta Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA V) celebrada en la sede de la OEA en Washington D.C., Estados Unidos de América.

    28Abr/21

    Marco para el establecimiento de una Red Interamericana CSIRT de vigilancia y alerta (CICTE/INF.4/04) de 29 de enero de 2004

    Marco para el establecimiento de una Red Interamericana CSIRT de vigilancia y alerta (CICTE/INF.4/04) de 29 de enero de 2004.

    MARCO PARA ESTABLECER UNA RED INTERAMERICANA CSIRT DE VIGILANCIA Y ALERTA (Presentado por la Embajadora Margarita Escobar, Presidenta del Grupo de Trabajo de la Comisión de Seguridad Hemisférica de la OEA, en la Tercera Sesión Plenaria celebrada el día 29 de enero de 2004)

    Objetivo:           

    Crear una red hemisférica, que funcione 24 horas al día, 7 días a la semana, de puntos nacionales de contacto entre equipos de respuesta a incidentes de seguridad en computadoras (Computer Security Incident Response Teams: CSIRT) con responsabilidad nacional (CSIRT nacionales), en los Estados miembros de la OEA, con la capacidad y a cargo de responder debida y rápidamente a las crisis, incidentes y peligros relacionados con la seguridad cibernética.

    Dado que los intrusos emplean instrumentos de ataque cada vez más sofisticados, lanzan ataques muy automatizados que se desplazan a la velocidad de la Internet, y emplean intencionalmente técnicas de ataque que hacen difícil entender la naturaleza y origen de tales ataques, la colaboración mundial en tiempo real entre los equipos de respuesta tiene una importancia creciente. Dicha colaboración permitiría lo siguiente:

    •             un diagnóstico rápido y preciso del problema;

    •             la pronta diseminación mundial de advertencias sobre ataques;

    •             la pronta diseminación mundial de advertencias sobre vulnerabilidades genéricas;

    •             un alerta mundial sobre actividades sospechosas, y la colaboración para investigar y diagnosticar tales actividades;

    •             el suministro de información sobre medidas para mitigar y remediar los ataques y amenazas; y

    •             una reducción de duplicaciones de análisis entre los equipos.

    La colaboración refuerza los conocimientos técnicos existentes entre los equipos para limitar los perjuicios y permitir que continúen funcionando los servicios de importancia crítica.

    Principios:

    Locales .– El programa debe ser manejado y controlado por entidades locales de cada país participante, designadas por su Gobierno.

    Sistémicos .– El sistema debe ser una operación multifacética que requiere un personal consciente y especializado, una distribución regular de la información relativa a las amenazas y vulnerabilidades vigentes, una reevaluación e implementación constantes de las mejores prácticas, y una interacción adecuada con las autoridades públicas.

    Permanentes .– Debido a la evolución diaria inherente de la Internet, para que tenga buen resultado un programa deberá actualizarse y mantenerse con regularidad. La seguridad en la Internet no se logrará mediante una acción única.

    Responsables .– La “seguridad” en la ciberseguridad. Deben entenderse y seguirse reglas estrictas respecto de cuestiones tales como el manejo de la información, ya que de otra manera los usuarios perderían la confianza, y los esfuerzos para proteger el sistema serán perjudicados e incluso serán contraproducentes.

    Basados en disposiciones ya existentes .– Hay un número de entidades preexistentes en el hemisferio que proporcionan servicios de seguridad cibernética en mayor o menor medida. Un sistema nuevo deberá basarse en esas instituciones ya existentes a fin de evitar duplicaciones y promover una participación activa.

    Identificación de organizaciones existentes

    En todo el mundo, hay más de cien organizaciones que usan el nombre CERT (Computer Emergency Response Team: equipo de respuesta a emergencias de computación), o CSIRT (el término genérico de significado equivalente). Muchas de ellas, pero no todas, tienen una cierta relación con el Centro de Coordinación CERT (CERT/CC) en la Universidad de Carnegie Mellon, en donde se creó el primer “CERT”. Incluso los CSIRT relacionados con el CERT/CC tienen diferentes métodos de respuesta a los incidentes, dependiendo de diversos factores tales como la uniformidad, cuestiones geográficas y técnicas, la autoridad, los servicios suministrados, y los recursos. En los Estados Unidos, el Departamento de Seguridad de la Patria, División de Ciberseguridad Nacional, ha creado el US-CERT, para que sea el “Equipo de emergencias informáticas”, con responsabilidad nacional en los Estados Unidos. En el Canadá, la División de Ciberprotección, dentro de la organización de Seguridad Pública y Preparación para Emergencias-Canadá (PSEPC) cumple una función similar de responsabilidad nacional.

    El Foro sobre Equipos de Respuesta a Incidentes (Forum on Incident Response Teams: FIRST), una asociación mundial voluntaria de equipos CSIRT, cuenta con 79 miembros en los Estados miembros de la OEA, 68 de ellos en los EE.UU. De los restantes, seis son del Canadá, dos del Brasil, con sendos miembros en Chile, México y Perú. Además, algunas compañías, tales como ATT, Symantec, y Visa, ofrecen servicios CSIRT a sus clientes de todo el mundo, y puede haber otros CSIRT en la región, tales como Ar-CERT en la Argentina, que no forman parte de la red FIRST.

    Dadas las lagunas en la información, llevar a cabo un censo de los CSIRT es el primer paso para la creación de una red de seguridad cibernética.

    Establecimiento de un modelo de servicio

    Si bien no hay normas internacionales acordadas sobre qué es lo que constituye un CSIRT, hay una serie de documentos y actividades que pueden servir para definir un equipo CSIRT, y que están relacionados con la certificación y autorización de tales equipos.

    El CERT/CC ha publicado varios documentos que pueden servir de ayuda para la creación de un CSIRT, entre los que se cuentan los siguientes:

    •             Handbook for Computer Security Incident Response Teams (CSIRTs) (Manual para equipos de respuesta a incidentes de seguridad de computadoras [CSIRT]): guía actualizada sobre cuestiones genéricas que deben considerarse al formar un CSIRT;

    •             State of the Practice of Computer Security Incident Response Teams (Estado actual de las prácticas de los equipos de respuesta a incidentes de seguridad de computadoras). Este informe contiene información recogida mediante un estudio piloto de estos equipos, la experiencia propia del CERT/CC, discusiones con otros CSIRT y observaciones de éstos, e investigación y críticas de las publicaciones actuales sobre la respuesta a incidentes; y

    •             Creating a Computer Security Incident Response Team:  A Process for Getting Started (Creación de un equipo de respuesta a incidentes de seguridad de computadoras: un método para su comienzo). Éste es un documento en el que se describen los requisitos básicos para crear un CSIRT.

    Además, el Departamento de Defensa de los Estados Unidos (US DoD) ha creado un programa de certificación y autorización de proveedores de servicios de defensa de redes de computadoras dentro de dicho Departamento. Ese programa puede usarse de punto de partida para establecer criterios para la certificación de equipos CSIRT nacionales.

    Cuando se establece una red regional de CSIRT nacionales cooperantes, debe preverse un conjunto mínimo de normas y servicios, entre los que se contarían los siguientes:

    •             designación de responsabilidad por el Gobierno del CSIRT nacional;

    •             convenio sobre los principios para compartir información entre los equipos cooperantes;

    •             responsabilidad por recibir información de otros CSIRT nacionales, y por diseminar dicha información entre las entidades idóneas dentro del país;

    •             autorización para diseminar información entre otros CSIRT nacionales; y

    •             proporcionar asistencia de coordinación a otros CSIRT nacionales para incidentes y amenazas.

    Cuestiones de confianza

    Gran parte de la información que tienen que intercambiar los CSIRT es de propiedad exclusiva, o es de carácter delicado por otros motivos, y hay pocos modelos buenos que sirvan para compartir uniformemente datos entre tales equipos. La confianza—el ingrediente esencial cuando se comparte información—, cuando existe, se desarrolla entre individuos que se conocen y han trabajado juntos, más bien que institucionalmente entre organizaciones. Para establecer la confianza, todas las partes deben entender y seguir pautas claras sobre la forma en que la información intercambiada será usada o diseminada. Todos los CSIRT nacionales cooperantes deben convenir en los principios para compartir información que indiquen cómo tal información puede usarse o diseminarse.

    Las normas de divulgación de la vulnerabilidad describen las circunstancias en las cuales se disemina información sobre tal vulnerabilidad, y entre quiénes. En tales normas debe establecerse un equilibrio entre la necesidad de diseminar información procesable entre las audiencias debidas y la necesidad de minimizar las posibilidades de que un intruso pudiera obtener tal información antes de contar con parches o soluciones improvisadas.

    Entre los atributos de los CSIRT necesarios para promover la confianza en las comunicaciones y la cooperación respecto de asuntos delicados de seguridad figuran los siguientes:

    •             una infraestructura segura para el manejo de información delicada;

    •             la capacidad para comunicarse sin riesgos con los interesados;

    •             la capacidad para reunir expertos y autoridades;

    •             una infraestructura que permita la notificación anticipada a determinadas audiencias;

    •             procedimientos de protección contra fugas de información;

    •             una interfaz pública bien conocida para la diseminación de información crítica; y

    •             la capacidad para llegar rápidamente a una gran audiencia.

    La creación de una capacidad CSIRT regional requiere la formación de un consenso sobre los principios para el intercambio de información, incluso qué información puede compartirse, con quién, y cuándo.

    Financiamiento

    No es barato financiar los CSIRT. Además de suministrar equipos y personal especializado permanentemente, los administradores de dichos equipos tienen que proporcionar asistencia técnica periódica y organizar ejercicios regulares para mantener sus operaciones a punto. Los Estados miembros y la Organización deberán considerar cuidadosamente los mecanismos de financiación de los CSIRT y probablemente tengan que establecer un orden de prioridades de su cobertura, o buscar fuentes estables de financiación externa.

    Cabe señalar que en octubre de 2002 los líderes de la APEC pidieron la creación de una capacidad regional CSIRT 24/7 para octubre de 2003. Tanto la APEC como el Gobierno de Australia convinieron en financiar proyectos de creación de capacidad CSIRT en las economías de cuatro miembros. En su informe más reciente sobre el proyecto, funcionarios de la APEC admitieron que hay dificultades para atraer candidatos aceptables y para obtener fondos adecuados para cubrir el costo del proyecto.

    Conciencia pública

    El apoyo del Gobierno y la industria para los programas (y financiación) de los CSIRT está directamente relacionado con la conciencia que tiene el público del problema de la ciberseguridad y sus posibles repercusiones en objetivos sumamente deseables en materia de desarrollo. Si los sistemas de una economía interconectada no se protegen debidamente, las redes e infraestructuras de todas las economías interconectadas son vulnerables. Los participantes en una red, ya sea como creadores, propietarios, explotadores o usuarios individuales, deben tener conciencia de las amenazas a la red y de sus vulnerabilidades, y asumir la responsabilidad de su protección según la posición que ocupen y la función que cumplan. La Organización, trabajando con los Estados miembros y los CSIRT, debe llevar a cabo un programa de concientización del público acerca de la seguridad y la ética cibernéticas en el que se destaquen (1) las ventajas y responsabilidades del uso de redes de información; (2) las mejores prácticas de seguridad y protección; y (3) las posibles consecuencias negativas del uso indebido de las redes. Existen varias organizaciones y sitios en línea con datos útiles para dicho fin, y la Organización debe hacer uso de ellos.

    Extensión de la red

    Si bien la conciencia del público es un elemento esencial de esta propuesta, establecer una capacidad regional de CSIRT requerirá compromisos políticos en donde éstos puedan no existir. El grupo de trabajo deberá proponer un proyecto de resolución sobre la seguridad cibernética para su aprobación por la Comisión de Seguridad Hemisférica y transmitirlo a la Asamblea General con el mismo fin, que comprometa a los Estados miembros a establecer equipos CSIRT en sus países, y a implementar las recomendaciones que pudiera presentar el grupo y aprobar la Comisión. Así se aplicará la voluntad política de los Estados miembros al logro de una cobertura regional de los CSIRT, y se proporcionará a la Organización el marco institucional necesario para proceder. Con esta resolución, el grupo de trabajo puede asistir a los Estados a formular planes concretos y, suponiendo una financiación adecuada, a organizar proyectos para crear capacidad en sus respectivos países. Hasta el momento, ningún Estado ha ofrecido financiar este proyecto.

    Plan de acción

    Acción 1: Llevar a cabo un censo para identificar los CSIRT existentes, su variedad de miembros y los servicios que proporcionan. Esto nos permitirá identificar las lagunas en la cobertura, tanto geográfica como sectorialmente, y establecerá las bases para fijar un conjunto consensual de servicios que ofrecerán los CSIRT miembros. Se adjunta un posible cuestionario de censo.

    Acción 2: Establecer un consenso para un conjunto mínimo de servicios que ofrecerán todos los CSIRT miembros. Eso ayudará a formar una doctrina de operación hemisférica uniforme, y servirá de base para las actividades subsiguientes de asistencia técnica.

    Acción 3: Redactar una resolución para presentarla a la Comisión de Seguridad Hemisférica y la Asamblea General, pidiendo a los Estados miembros que creen equipos CSIRT y que implementen las otras propuestas que figuren en el informe del grupo de trabajo. De los 11 CSIRT no estadounidenses que son miembros de la red FIRST, seis son estatales, cuatro son privados, y uno es dirigido por una universidad.

    Acción 4: Producir un compendio de mejores prácticas basado en los servicios y normas CSIRT consensuales, acordes con las prácticas similares en Europa y Asia. Incluiría normas y protocolos para llevar a cabo monitoreo en tiempo real y un subsiguiente intercambio de información en toda la red, y servirán de base para protocolos consiguientes de pruebas y asistencia técnica.

    Acción 5: Establecer un sistema de asistencia técnica e intercambio de información permanente para los CSIRT. Algunos países necesitarán asistencia para crear capacidad, o asistencia técnica para crear una capacidad de coordinación de la protección informática, o mejorar las capacidades existentes a fin de cumplir con las normas requeridas. Será necesario obtener financiamiento.

    Al finalizarse la acción 1, realizar una reunión interamericana de representantes de los CSIRT existentes, a fin de adelantar las acciones y las cuestiones de compartimiento de información, la identificación de lagunas en la cobertura y asistencia técnica, la capacidad de interfuncionamiento, y la intercomunicación. Podrían asistir representantes del Grupo de Trabajo de Seguridad Cibernética de la OEA a fin de proporcionar información normativa cuando ello sea necesario, y asegurarse de que se aborden las cuestiones descritas en el presente documento. Esa reunión también sería un paso importante para enfrentar la cuestión de la confianza y, como sería a nivel técnico, no dependería de las acciones de la Asamblea General.

    27Abr/21

    Resolución 63/37 del 2 de diciembre de 2008

    Resolución aprobada por la Asamblea General el 2 de diciembre de 2008 [sobre la base del informe de la Primera Comisión (A/63/385)] 63/37. Los avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional

    La Asamblea General,

    Recordando sus resoluciones 53/70, de 4 de diciembre de 1998, 54/49, de 1° de diciembre de 1999, 55/28, de 20 de noviembre de 2000, 56/19, de 29 de noviembre de 2001, 57/53, de 22 de noviembre de 2002, 58/32, de 8 de diciembre de 2003, 59/61, de 3 de diciembre de 2004, 60/45, de 8 de diciembre de 2005, 61/54, de 6 de diciembre de 2006, y 62/17, de 5 de diciembre de 2007,  Recordando también sus resoluciones sobre la función de la ciencia y la tecnología en el contexto de la seguridad internacional, en las cuales, en particular, se reconoce que los avances científicos y tecnológicos pueden tener aplicaciones civiles y militares y que es necesario mantener y fomentar el progreso científico y tecnológico para su empleo en aplicaciones civiles,

     Observando que se han alcanzado considerables progresos en el desarrollo y la aplicación de las tecnologías de la información y los medios de telecomunicación más modernos,

     Afirmando que a su juicio este proceso ofrece las más amplias posibilidades constructivas para el desarrollo futuro de la civilización, la multiplicación de las oportunidades de cooperación para el bien común de todos los Estados, el aumento de la capacidad creadora de la humanidad y el logro de nuevas mejoras en la difusión de la información en la comunidad mundial,

     Recordando, en este contexto, los enfoques y los principios que se esbozaron en la Conferencia sobre la sociedad de la información y el desarrollo, celebrada en Midrand (Sudáfrica) del 13 al 15 de mayo de 1996,

     Teniendo presentes los resultados de la Conferencia Ministerial sobre el Terrorismo, celebrada en París el 30 de julio de 1996, así como las recomendaciones que formuló (1),

    Teniendo presentes también los resultados de la Cumbre Mundial sobre la Sociedad de la Información, celebrada en Ginebra del 10 al 12 de diciembre de 2003 (primera fase) y en Túnez del 16 al 18 de noviembre de 2005 (segunda fase) (2),

    Observando que la difusión y utilización de las tecnologías y los medios de información afectan a los intereses de toda la comunidad internacional y que una amplia cooperación internacional contribuye a lograr una eficacia óptima,

    Expresando su preocupación ante la posibilidad de que estas tecnologías y medios se utilicen con propósitos incompatibles con el objetivo de mantener la estabilidad y la seguridad internacionales y afecten negativamente a la integridad de la infraestructura de los Estados, en detrimento de su seguridad en las esferas civil y militar,

    Considerando que es necesario impedir la utilización de los recursos o las tecnologías de la información con fines delictivos o terroristas,

    Observando la contribución de los Estados Miembros que han presentado al Secretario General sus evaluaciones de los problemas de la seguridad de la información, con arreglo a los párrafos 1 a 3 de las resoluciones 53/70, 54/49, 55/28, 56/19, 57/53, 58/32, 59/61, 60/45, 61/54 y 62/17,  Tomando nota de los informes del Secretario General en que figuran esas evaluaciones (3),

    Acogiendo con beneplácito la iniciativa de la Secretaría y del Instituto de las Naciones Unidas de Investigación sobre el Desarme de celebrar en Ginebra, en agosto de 1999 y en abril de 2008, reuniones internacionales de expertos sobre los avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional, y los resultados de esas reuniones,

    Considerando que las evaluaciones de los Estados Miembros que figuran en los informes del Secretario General y las reuniones internacionales de expertos han contribuido a que se comprenda mejor la esencia de los problemas internacionales de la seguridad de la información y los criterios conexos,

    Teniendo presente que, en cumplimiento de la resolución 58/32, el Secretario General estableció en 2004 un grupo de expertos gubernamentales que, con arreglo al mandato recibido, examinó las amenazas reales y potenciales en el ámbito de la seguridad de la información y las posibles medidas de cooperación para encararlas, así como los conceptos internacionales pertinentes encaminados a fortalecer la seguridad de los sistemas mundiales de información y telecomunicaciones,

    Tomando nota del informe del Secretario General sobre el Grupo de Expertos Gubernamentales sobre los avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional, preparado sobre la base de los resultados de la labor de dicho Grupo (4),

    1. Exhorta a los Estados Miembros a seguir promoviendo el examen multilateral de las amenazas reales y potenciales en el ámbito de la seguridad de la información y de posibles medidas para limitar las amenazas que surjan en ese ámbito, de manera compatible con la necesidad de preservar la libre circulación de información;

    2. Considera que el propósito de esas medidas podría promoverse examinando los conceptos internacionales pertinentes encaminados a fortalecer la seguridad de los sistemas mundiales de información y telecomunicaciones;

    3. Invita a todos los Estados Miembros a seguir comunicando al Secretario General sus opiniones y observaciones sobre las cuestiones siguientes:

     a) La evaluación general de los problemas de la seguridad de la información;

     b) Las medidas que se adoptan a nivel nacional para fortalecer la seguridad de la información y contribuir a la colaboración internacional en ese ámbito;

     c) El contenido de los conceptos mencionados en el párrafo 2 supra;

     d) Las medidas que la comunidad internacional podría adoptar para fortalecer la seguridad de la información a escala mundial;

    4. Pide al Secretario General que, con la asistencia de un grupo de expertos gubernamentales que se establecerá en 2009 sobre la base de una distribución geográfica equitativa, continúe examinando las amenazas reales y potenciales en el ámbito de la seguridad de la información y las posibles medidas de cooperación para encararlas, así como los conceptos a que se hace referencia en el párrafo 2 supra, y que le presente un informe sobre los resultados de dicho examen en su sexagésimo quinto período de sesiones;

    5. Decide incluir en el programa provisional de su sexagésimo cuarto período de sesiones el tema titulado “Los avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional”.

    61ª sesión plenaria, 2 de diciembre de 2008

    —————————————————————————

    (1)  Véase A/51/261, anexo.

    (2)  Véanse A/C.2/59/3 y A/60/687.

    (3)  A/54/213, A/55/140 y Corr.1 y Add.1, A/56/164 y Add.1, A/57/166 y Add.1, A/58/373, A/59/116 y Add.1, A/60/95 y Add.1, A/61/161 y Add.1 y A/62/98 y Add.1.

    (4)  A/60/202.

    27Abr/21

    Resolución 58/199 de 23 de diciembre de 2003

    Resolución 58/199 de 23 de diciembre de 2003, relativa a la creación de una cultura mundial de seguridad cibernética y protección de las infraestructuras de información esenciales, aprobada por la Asamblea General de las Naciones Unidas.

    Resolución aprobada por la Asamblea General [sobre la base del informe de la Segunda Comisión (A/58/481/Add.2)] 58/199. Creación de una cultura mundial de seguridad cibernética y protección de las infraestructuras de información esenciales

    La Asamblea General,

    Recordando sus resoluciones 57/239, de 20 de diciembre de 2002, sobre la creación de una cultura mundial de seguridad cibernética, 55/63, de 4 de diciembre de 2000, y 56/121, de 19 de diciembre de 2001, sobre el establecimiento de la base jurídica para luchar contra la utilización de las tecnologías de la información con fines delictivos, y 53/70, de 4 de diciembre de 1998, 54/49, de 1° de diciembre de 1999, 55/28, de 20 de noviembre de 2000, 56/19, de 29 de noviembre de 2001, y 57/53, de 22 de noviembre de 2002, sobre los avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional,

    Reconociendo que los gobiernos, las empresas, otras organizaciones y los usuarios particulares conceden cada vez más importancia a las tecnologías de la información para la promoción del desarrollo socioeconómico y el suministro de bienes y servicios esenciales, la gestión de sus asuntos y el intercambio de información,

    Observando que cada vez hay más vínculos entre las infraestructuras esenciales de la mayoría de los países —como las utilizadas para, entre otras cosas, la generación, transmisión y distribución de energía, el transporte aéreo y marítimo, los servicios bancarios y financieros, el comercio electrónico, el suministro de agua, la distribución de alimentos y la salud pública— y las infraestructuras de información esenciales que interconectan y afectan cada vez más sus operaciones, Reconociendo que cada país determinará sus propias infraestructuras de información esenciales,

    Reconociendo también que esa creciente interdependencia tecnológica se basa en una red compleja de componentes de las infraestructuras de información esenciales, Observando que, como resultado de la creciente interconectividad, las infraestructuras de información esenciales están hoy expuestas a un número cada vez mayor y más variado de amenazas y vulnerabilidades que plantean nuevos problemas de seguridad,

    Observando también que la protección efectiva de las infraestructuras esenciales consiste, entre otras cosas, en determinar las amenazas y reducir la vulnerabilidad a que están expuestas las infraestructuras de información esenciales, reducir al mínimo los daños y el tiempo de recuperación en caso de daño o ataque, e identificar la causa del daño o la fuente del ataque,

    Reconociendo que la protección efectiva exige comunicación y cooperación a nivel nacional e internacional entre todos los interesados y que los esfuerzos que se realizan a nivel nacional deberían ir apoyados por una cooperación efectiva y sustantiva a nivel internacional y regional entre los interesados,

    Reconociendo también que las disparidades entre los Estados en el acceso a las tecnologías de la información y en su utilización pueden reducir la eficacia de la cooperación para combatir la utilización de las tecnologías de la información con fines delictivos y crear una cultura mundial de seguridad cibernética, y teniendo en cuenta la necesidad de facilitar la transferencia de las tecnologías de la información, en particular a los países en desarrollo,

    Reconociendo además la importancia de la cooperación internacional para lograr la seguridad cibernética y la protección de las infraestructuras de información esenciales mediante el apoyo de los esfuerzos realizados a nivel nacional para mejorar la capacidad humana, crear más oportunidades de aprendizaje y empleo, mejorar los servicios públicos y elevar la calidad de vida aprovechando unas tecnologías y redes de información y comunicaciones avanzadas, fiables y seguras y promoviendo el acceso universal,

    Observando la labor que realizan las organizaciones internacionales y regionales pertinentes para mejorar la seguridad de las infraestructuras de información esenciales,

    Reconociendo que deberían hacerse esfuerzos para proteger las infraestructuras de información esenciales teniendo debidamente en cuenta las leyes nacionales aplicables a la protección de la privacidad y otra legislación pertinente,

    1. Toma nota de los elementos enunciados en el anexo de la presente resolución para proteger las infraestructuras de información esenciales;

    2. Invita a todas las organizaciones internacionales pertinentes, incluidos los órganos de las Naciones Unidas competentes, a que consideren cuando corresponda esos elementos, entre otras cosas para proteger las infraestructuras de información esenciales en toda labor futura en materia de seguridad cibernética o de protección de infraestructuras esenciales;

    3. Invita a los Estados Miembros a que consideren, entre otras cosas, esos elementos al desarrollar sus estrategias para reducir los riesgos que afectan a las infraestructuras de información esenciales, de conformidad con las leyes y reglamentos nacionales;

    4. Invita a los Estados Miembros y a todas las organizaciones internacionales pertinentes a que en los preparativos de la segunda fase de la Cumbre Mundial sobre la Sociedad de la Información que se celebrará en Túnez del 16 al 18 de noviembre de 2005 tengan en cuenta, entre otras cosas, esos elementos y la necesidad de proteger las infraestructuras de información esenciales;

    5. Alienta a los Estados Miembros y a las organizaciones regionales e internacionales pertinentes que hayan elaborado estrategias de seguridad cibernética y protección de infraestructuras de información esenciales que compartan las mejores prácticas y medidas que puedan ayudar a otros Estados Miembros en sus esfuerzos para facilitar la seguridad cibernética;

    6. Subraya la necesidad de que se hagan más esfuerzos para acabar con las disparidades de acceso a las tecnologías de la información y las comunicaciones, lograr acceso universal a éstas y proteger las infraestructuras de información esenciales facilitando la transferencia de tecnologías de la información y creación de capacidad, en particular a los países en desarrollo, especialmente los países menos adelantados, para que todos los Estados puedan beneficiarse plenamente de las tecnologías de la información y las comunicaciones para su desarrollo socioeconómico.

    78ª sesión plenaria, 23 de diciembre de 2003

    Anexo.  Elementos para la protección de las infraestructuras de información esenciales

    1. Contar con redes de alerta de emergencia en relación con las vulnerabilidades, las amenazas y los incidentes cibernéticos.

    2. Crear más conciencia para que los interesados entiendan la naturaleza y el alcance de sus infraestructuras de información esenciales y la función que debe desempeñar cada uno en su protección.

    3. Examinar las infraestructuras y determinar las interdependencias de éstas, mejorando así su protección.

    4. Promover alianzas entre las partes interesadas, tanto públicas como privadas, para compartir y analizar las infraestructuras de información esenciales a fin de prevenir e investigar los daños y los ataques contra dichas infraestructuras, y responder a ellos.

    5. Crear y mantener redes de comunicación para casos de crisis y probarlas para asegurarse de que seguirán siendo estables y seguras en situaciones de emergencia.

    6. Garantizar que en las políticas sobre disponibilidad de datos se tenga en cuenta la necesidad de proteger las infraestructuras de información esenciales.

    7. Facilitar el rastreo de los ataques contra las infraestructuras de información esenciales y, cuando corresponda, revelar la información recabada a otros Estados.

    8. Ofrecer capacitación y hacer prácticas para mejorar las capacidades de respuesta y probar planes de continuidad y contingencia en el caso de un ataque contra las infraestructuras de información, y alentar a las partes interesadas a emprender actividades similares.

    9. Contar con leyes sustantivas y de procedimiento adecuadas y personal capacitado para que los Estados puedan investigar los ataques contra las infraestructuras de información esenciales y enjuiciar a los responsables, y coordinar dichas investigaciones con otros Estados, cuando corresponda.

    10. Cooperar a nivel internacional, cuando corresponda, para proteger las infraestructuras de información esenciales, en particular desarrollando y coordinando sistemas de alerta de emergencia, compartiendo y analizando información sobre vulnerabilidades, amenazas e incidentes y coordinando las investigaciones sobre los ataques contra dichas infraestructuras de conformidad con las leyes nacionales.

    11. Promover la investigación y el desarrollo a nivel nacional e internacional y alentar la aplicación de tecnologías de seguridad que cumplan las normas internacionales.

    27Abr/21

    Resolución 55/63, de 4 de diciembre de 2000

    Resolución 55/63, de 4 de diciembre de 2000, sobre la lucha contra la utilización de la tecnología de la información con fines delictivos, aprobada por la Asamblea General de las Naciones Unidas.

    Resolución aprobada por la Asamblea General [sobre la base del informe de la Tercera Comisión (A/55/593)] 55/63. Lucha contra la utilización de la tecnología de la información con fines delictivos

    La Asamblea General,

    Recordando la Declaración del Milenio (1)  en la que los Estados Miembros resolvieron velar por que los beneficios de las nuevas tecnologías, especialmente las tecnologías de la información y las comunicaciones, alcancen a todos, de conformidad con las recomendaciones formuladas en la Declaración Ministerial de la serie de sesiones de alto nivel del período de sesiones sustantivo de 2000 del Consejo Económico y Social (2),

    Recordando también su resolución 45/121, de 14 de diciembre de 1990, por la que hizo suyas las recomendaciones del Octavo Congreso de las Naciones Unidas sobre Prevención del Delito y Tratamiento del Delincuente (3), y tomando nota en particular de la resolución sobre los delitos relacionados con la informática (4), en la que el Octavo Congreso hizo un llamamiento a los Estados para que intensifiquen sus esfuerzos por combatir de forma más eficaz los abusos relacionados con la informática,

    Destacando las contribuciones que pueden aportar las Naciones Unidas, en especial la Comisión de Prevención del Delito y Justicia Penal, en el campo del fomento de una mayor eficiencia y eficacia en la aplicación de la ley y la administración de justicia y de los más altos principios de la equidad y la dignidad humana,

    Reconociendo que la libre corriente de información puede promover el desarrollo económico y social, la educación y el gobierno democrático, Observando los importantes avances que han tenido lugar en el desarrollo y la aplicación de tecnologías de la información y medios de telecomunicaciones,

    Expresando su preocupación por el hecho de que los avances tecnológicos han abierto nuevas posibilidades de actividades delictivas, en particular la utilización de la tecnología de la información con fines delictivos,

    Observando que la dependencia de la tecnología de la información, aunque puede variar de un Estado a otro, ha dado lugar a un considerable aumento de la cooperación y coordinación a nivel mundial, como consecuencia de lo cual la utilización de esa tecnología con fines delictivos puede tener graves consecuencias para todos los Estados,

    Reconociendo que las lagunas en el acceso y la utilización por los Estados de la tecnología de la información pueden reducir la eficacia de la cooperación internacional en la lucha contra la utilización de la tecnología de la información con fines delictivos, y observando la necesidad de facilitar la transferencia de tecnología de la información, en particular a los países en desarrollo,

    Observando la necesidad de prevenir la utilización de la tecnología de la información con fines delictivos,

    Reconociendo la necesidad de que los Estados y la industria privada cooperen para luchar contra la utilización de la tecnología de la información con fines delictivos,

    Subrayando la necesidad de fomentar la coordinación y la cooperación entre los Estados en la lucha contra la utilización de la tecnología de la información con fines delictivos y, en ese contexto, haciendo hincapié en la función que pueden desempeñar las Naciones Unidas y las organizaciones regionales,

    Acogiendo con beneplácito la labor del Décimo Congreso de las Naciones Unidas sobre Prevención del Delito y Tratamiento del Delincuente (5),

    Tomando nota de la labor del Comité de Expertos del Consejo de Europa sobre el crimen en el espacio cibernético relativa a un proyecto de convención sobre el delito cibernético, los principios aprobados por los Ministros de Justicia e Interior del Grupo de los Ocho en Washington, D.C. el 10 de diciembre de 1997 y que hicieron suyos los jefes de Estado del Grupo de los Ocho en Birmingham (Reino Unido de Gran Bretaña e Irlanda del Norte) el 17 de mayo de 1998, la labor de la Conferencia del Grupo de los Ocho acerca del diálogo entre la industria y el gobierno sobre seguridad y confianza en el espacio cibernético, celebrada en París del 15 al 17 de mayo de 2000, y las recomendaciones aprobadas el 3 de marzo de 2000 por la Tercera Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas, celebrada en San José (Costa Rica) del 1° al 3 de marzo de 2000 en el marco de la Organización de los Estados Americanos (6),

     1. Toma nota con reconocimiento de los esfuerzos de los organismos mencionados por impedir la utilización de la tecnología de la información con fines delictivos y toma nota también del valor que tienen, entre otras, las siguientes medidas para luchar contra esa utilización delictiva:

    a) Los Estados deben velar para que en su legislación y en la práctica se eliminen los refugios seguros para quienes utilicen la tecnología de la información con fines delictivos;

    b) Debe coordinarse entre todos los Estados interesados la cooperación en lo que se refiere a la vigilancia del cumplimiento de la ley y la investigación y el enjuiciamiento de los casos en que se utilice la tecnología de la información con fines delictivos en el plano internacional;

    c) Los Estados deben intercambiar información acerca de los problemas a que hacen frente en la lucha contra la utilización de la tecnología de la información con fines delictivos;

    d) El personal encargado de hacer cumplir la ley debe contar con capacitación y equipo adecuado para hacer frente a la utilización de la tecnología de la información con fines delictivos;

    e) Los sistemas jurídicos deben proteger el carácter confidencial, la integridad y la disponibilidad de datos y sistemas respecto a la injerencia no autorizada y hacer que los abusos graves se tipifiquen como delito;

    f) Los sistemas jurídicos deben permitir la conservación de datos electrónicos relativos a investigaciones criminales concretas, y un rápido acceso a esos datos;

    g) Los regímenes de asistencia mutua deben velar por la investigación oportuna de la utilización de la tecnología de la información con fines delictivos y la reunión y el intercambio oportunos de pruebas en esos casos;

    h) Debe sensibilizarse al público en general acerca de la necesidad de prevenir y combatir la utilización de la tecnología de la información con fines delictivos;

    i) En la medida de lo posible, la tecnología de la información deberá diseñarse de forma que facilite la prevención y detección de su utilización con fines delictivos, la localización de los delincuentes y la reunión de pruebas;

    j) La lucha contra la utilización de la tecnología de la información con fines delictivos requiere la elaboración de soluciones que tengan en cuenta tanto la protección de las libertades individuales y el derecho a la intimidad como la preservación de la capacidad de los gobiernos para combatir esa utilización con fines delictivos;

    2. Invita a los Estados a que tengan en cuenta las medidas enumeradas en el párrafo anterior en sus esfuerzos por combatir la utilización de las tecnologías de la información con fines delictivos;

    3. Decide mantener la cuestión de la utilización de la tecnología de la información con fines delictivos en el programa de su quincuagésimo sexto período de sesiones como parte del tema titulado “Prevención del delito y justicia penal.”

    81a. sesión plenaria, 4 de diciembre de 2000

    ——————————————————————-

    (1)  Véase resolución 55/2.

    (2)  Véase A/55/3, cap. III. Para el texto definitivo, véase Documentos Oficiales de la Asamblea General, quincuagésimo quinto período de sesiones, Suplemento nº 3.

    (3) Octavo Congreso de las Naciones Unidas sobre Prevención del Delito y Tratamiento del Delincuente, La Habana, 27 de agosto a 7 de septiembre de 1990: informe preparado por la Secretaría (publicación de las Naciones Unidas, nº de venta: S.91.IV.2), cap. I.

    (4)  Ibíd., secc. C, resolución 9.

    (5)  Véase Décimo Congreso de las Naciones Unidas sobre Prevención del Delito y Tratamiento del Delincuente, Viena, 10 a 17 de abril de 2000: informe preparado por la Secretaría (publicación de las Naciones Unidas, nº de venta: S.00.IV.8).

    (6)  Véase REMJA-III/doc.14/00 rev.2, cap. IV.

    27Abr/21

    Resolución 56/121 de 19 de diciembre de 2001

    Resolución 56/121 de 19 de diciembre de 2001, sobre la lucha contra la utilización de la tecnología de la información con fines delictivos, aprobada por la Asamblea General de las Naciones Unidas.

    Resolución aprobada por la Asamblea General [sobre la base del informe de la Tercera Comisión (A/56/574)]  56/121. Lucha contra la utilización de la tecnología de la información con fines delictivos

    La Asamblea General,

    Recordando la Declaración del Milenio (1), en que los Estados Miembros resolvieron velar por que los beneficios de las nuevas tecnologías, especialmente las tecnologías de la información y las comunicaciones, alcanzaran a todos, de conformidad con las recomendaciones formuladas en la declaración ministerial de la serie de sesiones de alto nivel del período de sesiones sustantivo de 2000 del Consejo Económico y Social (2), y su resolución 55/63, de 4 de diciembre de 2000, en que invitó a los Estados Miembros a que tuvieran en cuenta las medidas propuestas para combatir la utilización de la tecnología de la información con fines delictivos,

    Reconociendo que la libre circulación de información puede promover el desarrollo económico y social, la educación y el gobierno democrático,

    Observando los importantes avances que han tenido lugar en el desarrollo y la aplicación de la tecnología de la información y medios de telecomunicación,

    Expresando su preocupación por el hecho de que los avances tecnológicos han abierto nuevas posibilidades de actividades delictivas, en particular la utilización de la tecnología de la información con fines delictivos,

    Observando que la dependencia de la tecnología de la información, aunque puede variar de un Estado a otro, ha dado lugar a un considerable aumento de la cooperación y coordinación a nivel mundial, en razón de lo cual la utilización de esa tecnología con fines delictivos puede tener graves consecuencias para todos los Estados,

    Reconociendo que las lagunas en el acceso y la utilización por los Estados de la tecnología de la información pueden reducir la eficacia de la cooperación internacional en la lucha contra la utilización de la tecnología de la información con fines delictivos, y reconociendo también la necesidad de facilitar la transferencia de tecnología de la información, en particular a los países en desarrollo,

    Observando la necesidad de prevenir la utilización de la tecnología de la información con fines delictivos,

    Reconociendo la necesidad de que los Estados y el sector privado cooperen para luchar contra la utilización de la tecnología de la información con fines delictivos,

    Subrayando la necesidad de fomentar la coordinación y la cooperación entre los Estados en la lucha contra la utilización de la tecnología de la información con fines delictivos y, en ese contexto, haciendo hincapié en la función que pueden desempeñar las Naciones Unidas y otras organizaciones internacionales y regionales,

    Acogiendo con satisfacción la labor del Décimo Congreso de las Naciones Unidas sobre Prevención del Delito y Tratamiento del Delincuente, Expresando su reconocimiento por la labor realizada por la Comisión de Prevención del Delito y Justicia Penal en sus períodos de sesiones noveno y décimo y la subsiguiente preparación de un plan de acción contra los delitos de alta tecnología y relacionados con las redes informáticas, en que se reconoce, entre otras cosas, la necesidad de hacer cumplir la ley con eficacia y de mantener una protección efectiva de la privacidad y otros derechos básicos conexos, así como la necesidad de tener en cuenta la labor que se realiza en otros foros (3),

    Observando la labor de organizaciones internacionales y regionales en la lucha contra el delito de alta tecnología, incluida la labor del Consejo de Europa en la preparación del Convenio sobre el Delito Cibernético (4), así como la labor de esas organizaciones encaminada a fomentar un diálogo entre los gobiernos y el sector privado sobre la seguridad y la confianza en el espacio cibernético,

    1. Invita a los Estados Miembros a que, al elaborar leyes y políticas nacionales y al adoptar prácticas para luchar contra la utilización de la tecnología de la información con fines delictivos, tengan en cuenta, según proceda, la labor y los logros de la Comisión de Prevención del Delito y Justicia Penal y de otras organizaciones internacionales y regionales;

    2. Toma nota del valor de las medidas enunciadas en su resolución 55/63, e invita nuevamente a los Estados Miembros a que las tengan en cuenta en su lucha contra la utilización de la tecnología de la información con fines delictivos;

    3. Decide aplazar el examen de este tema, mientras se realiza la labor prevista en el plan de acción contra los delitos de alta tecnología y relacionados con las redes informáticas de la Comisión de Prevención del Delito y Justicia Penal (3).

    88ª sesión plenaria, 19 de diciembre de 2001

    ——————————————————————————-

    (1)  Véase la resolución 55/2.

    (2)  Véase Documentos Oficiales de la Asamblea General, quincuagésimo quinto período de sesiones, Suplemento nº 3 (A/55/3/Rev.1), cap. III, párr. 17.

    (3)  Véase Documentos Oficiales del Consejo Económico y Social, 2001, Suplemento nº 10 (E/2001/30/Rev.1), segunda parte, cap. I.

    (4)  Consejo de Europa, Série des Traités européens, nº185.

    27Abr/21

    Resolución 57/239, de 20 de diciembre de 2002

    Resolución 57/239, de 20 de diciembre de 2002, sobre los elementos para la Creación de una Cultura Mundial de Seguridad Cibernética para Sistemas y Redes de Información.

    Resolución aprobada por la Asamblea General [sobre la base del informe de la Segunda Comisión (A/57/529/Add.3)] 57/239. Creación de una cultura mundial de seguridad cibernética

    La Asamblea General,

     Observando que los gobiernos, las empresas, otras organizaciones y los usuarios individuales dependen cada vez más de las tecnologías de la información para el suministro de bienes y servicios esenciales, la gestión de sus asuntos y el intercambio de información,

    Reconociendo que la necesidad de seguridad cibernética aumenta a medida que los países incrementan su participación en la sociedad de la información,

    Recordando sus resoluciones 55/63, de 4 de diciembre de 2000, y 56/121, de 19 de diciembre de 2001, sobre el establecimiento de la base jurídica para luchar contra la utilización de las tecnologías de la información con fines delictivos,

    Recordando también sus resoluciones 53/70, de 4 de diciembre de 1998, 54/49, de 1° de diciembre de 1999, 55/28, de 20 de noviembre de 2000, 56/19, de 29 de noviembre de 2001, y 57/53, de 22 de noviembre de 2002, sobre los avances en la esfera de la información y las telecomunicaciones en el contexto de la seguridad internacional,

    Consciente de que la seguridad cibernética no es sólo cuestión de prácticas de gobierno o de orden público, sino que debe alcanzarse por medio de la prevención y con el apoyo de toda la sociedad,

    Consciente también de que la tecnología por sí sola no puede garantizar la seguridad cibernética y que debe darse prioridad a la planificación y gestión de la seguridad cibernética en toda la sociedad,

    Reconociendo que, cada uno en su papel, los gobiernos, las empresas, otras organizaciones, y los propietarios y usuarios individuales de las tecnologías de la información deben tener conciencia de los riesgos que existen para la seguridad cibernética y de las medidas preventivas, deben asumir sus responsabilidades y tomar medidas para mejorar la seguridad de esas tecnologías de la información,

    Reconociendo también que las disparidades entre los países en el acceso a las tecnologías de la información y en su utilización pueden reducir la eficacia de la cooperación internacional en la lucha contra la utilización de las tecnologías de la información con fines delictivos y en la creación de una cultura mundial de la seguridad cibernética, y teniendo en cuenta la necesidad de facilitar la transferencia de las tecnologías de la información, en particular a los países en desarrollo,

    Reconociendo además la importancia de la cooperación internacional para lograr la seguridad cibernética apoyando las iniciativas nacionales encaminadas a desarrollar la capacidad humana, aumentar las oportunidades de aprendizaje y empleo y mejorar los servicios públicos y la calidad de vida aprovechando las posibilidades que brindan las tecnologías y las redes de información y comunicaciones avanzadas, fiables y seguras y promoviendo el acceso universal a ellas,

    Observando que, como resultado de la creciente interconectividad, los sistemas y redes de información están hoy expuestos a un número cada vez mayor y una variedad más amplia de amenazas y vulnerabilidades que plantean nuevos problemas de seguridad para todos los usuarios de computadoras,

    Tomando conocimiento de la labor de las organizaciones internacionales y regionales pertinentes en relación con el mejoramiento de la seguridad cibernética y la seguridad de las tecnologías de la información,

    1. Toma nota de los elementos que figuran en el anexo de la presente resolución, con miras a crear una cultura mundial de seguridad cibernética;

     2. Invita a todas las organizaciones internacionales pertinentes a que en toda labor futura en materia de seguridad cibernética tengan presentes, entre otras cosas, esos elementos para la creación de una cultura mundial de seguridad cibernética;

     3. Invita a los Estados Miembros a que tengan en cuenta esos elementos, entre otras cosas, en sus actividades para promover en todas sus sociedades una cultura de seguridad cibernética en la aplicación y utilización de las tecnologías de la información;

     4. Invita a los Estados Miembros y a todas las organizaciones internacionales pertinentes a que en los preparativos de la Cumbre Mundial sobre la Sociedad de la Información, que se celebrará en Ginebra del 10 al 12 de diciembre de 2003 y en Túnez en 2005, tengan en cuenta, entre otras cosas, esos elementos y la necesidad de una cultura mundial de seguridad cibernética;

     5. Subraya la necesidad de facilitar la transferencia de las tecnologías de la información y el fomento de la capacidad para ayudar a los países en desarrollo a adoptar medidas en materia de seguridad cibernética.

    78ª sesión plenaria, 20 de diciembre de 2002

    Anexo. Elementos para la creación de una cultura mundial de seguridad cibernética

     Los rápidos progresos de las tecnologías de la información han cambiado el modo en que los gobiernos, las empresas, otras organizaciones y los usuarios individuales que desarrollan, poseen, proporcionan, gestionan, mantienen y utilizan esos sistemas y redes de información (“participantes”) deben abordar la cuestión de la seguridad cibernética. Una cultura mundial de seguridad cibernética requerirá que todos los participantes tomen en consideración los nueve elementos complementarios siguientes:

    a) Conciencia. Los participantes deben tener conciencia de la necesidad de la seguridad de los sistemas y redes de información y de lo que pueden hacer por mejorar esa seguridad;

    b) Responsabilidad. Los participantes son responsables de la seguridad de los sistemas y redes de información en cuanto corresponde a sus funciones individuales. Deben examinar periódicamente sus propias políticas, prácticas, medidas y procedimientos y evaluar si son las que convienen en su contexto;

    c) Respuesta. Los participantes deben actuar de manera oportuna y cooperativa para prevenir y detectar los incidentes de seguridad y reaccionar ante ellos. Deben compartir la información sobre las amenazas y las vulnerabilidades, según convenga, y aplicar procedimientos para establecer una cooperación rápida y eficaz a fin de prevenir y detectar los incidentes de seguridad y reaccionar ante ellos. Para ello puede ser necesario compartir información y cooperar a través de las fronteras;

    d) Ética. Dada la omnipresencia de los sistemas y redes de información en las sociedades modernas, los participantes deben respetar los legítimos intereses de los demás y reconocer que lo que hagan o dejen de hacer puede perjudicar a otros;

    e) Democracia. Las medidas de seguridad deben aplicarse de manera compatible con los valores reconocidos de las sociedades democráticas, incluidos la libertad de intercambiar pensamientos e ideas, el libre flujo de la información, la confidencialidad de la información y las comunicaciones, la debida protección de la información personal, la franqueza y la transparencia;

    f) Evaluación de riesgos. Todos los participantes deben realizar evaluaciones periódicas de los riesgos a fin de determinar las amenazas y vulnerabilidades; esas evaluaciones deben tener una base suficientemente amplia para abarcar los principales factores internos y externos, tales como la tecnología, los factores físicos y humanos, las políticas y los servicios de terceros que tengan consecuencias para la seguridad; permitir la determinación del nivel de riesgo aceptable; y ayudar a la selección de controles apropiados para gestionar el riesgo de posibles daños a los sistemas y redes de información, teniendo en cuenta la naturaleza y la importancia de la información que se debe proteger;

    g) Diseño y puesta en práctica de la seguridad. Los participantes deben incorporar la seguridad como elemento esencial de la planificación y el diseño, el funcionamiento y el uso de los sistemas y redes de información;

    h) Gestión de la seguridad. Los participantes deben adoptar un enfoque amplio de la gestión de la seguridad basado en una evaluación de los riesgos que sea dinámica e incluya todos los niveles de las actividades de los participantes y todos los aspectos de sus operaciones;

    i) Reevaluación. Los participantes deben examinar y reevaluar la seguridad de los sistemas y redes de información e introducir las modificaciones apropiadas en las políticas, prácticas, medidas y procedimientos de seguridad que permitan hacer frente a las amenazas y vulnerabilidades a medida que se presentan o se transforman.

    27Abr/21

    Resolución 64/211, aprobada por la Asamblea General el 21 de diciembre de 2009

    Resolución aprobada por la Asamblea General el 21 de diciembre de 2009 [sobre la base del informe de la Segunda Comisión (A/64/422/Add.3)] 64/211. Creación de una cultura mundial de seguridad cibernética y balance de las medidas nacionales para proteger las infraestructuras de información esenciales

    La Asamblea General,

    Recordando sus resoluciones 55/63, de 4 de diciembre de 2000, y 56/121, de 19 de diciembre de 2001, relativas a la lucha contra la utilización de la tecnología de la información con fines delictivos, 57/239, de 20 de diciembre de 2002, relativa a la creación de una cultura mundial de seguridad cibernética, y 58/199, de 23 de diciembre de 2003, relativa a la creación de una cultura mundial de seguridad cibernética y protección de las infraestructuras de información esenciales, Recordando también sus resoluciones 53/70, de 4 de diciembre de 1998, 54/49, de 1° de diciembre de 1999, 55/28, de 20 de noviembre de 2000, 56/19, de 29 de noviembre de 2001, 57/53, de 22 de noviembre de 2002, 58/32, de 8 de diciembre de 2003, 59/61, de 3 de diciembre de 2004, 60/45, de 8 de diciembre de 2005, 61/54, de 6 de diciembre de 2006, 62/17, de 5 de diciembre de 2007, y 63/37, de 2 de diciembre de 2008, relativas a los avances con respecto a las tecnologías de la información en el contexto de la seguridad internacional,

    Recordando además los documentos finales de la Cumbre Mundial sobre la Sociedad de la Información celebrada en Ginebra del 10 al 12 de diciembre de 2003 (primera fase) y en Túnez del 16 al 18 de noviembre de 2005 (segunda fase) (1),

    Reconociendo que la confianza y la seguridad en la utilización de las tecnologías de la información y las comunicaciones son unos de los pilares más importantes de la sociedad de la información, y que es necesario alentar, fomentar, desarrollar y poner en práctica resueltamente una cultura global sólida de seguridad cibernética,

    Reconociendo también la contribución cada vez mayor de las tecnologías de la información en red a muchas de las funciones esenciales de la vida cotidiana, el comercio y la prestación de bienes y servicios, la investigación, la innovación y la actividad empresarial, y a la libre circulación de información entre individuos y organizaciones, gobiernos, empresas y la sociedad civil,

    Reconociendo además que, cada uno en su papel, los gobiernos, las empresas, las organizaciones y los propietarios y usuarios individuales de las tecnologías de la información deben asumir sus responsabilidades y adoptar medidas para mejorar la seguridad de esas tecnologías de la información, Reconociendo la importancia del mandato del Foro para la Gobernanza de Internet, como un diálogo entre múltiples interesados sobre diversos asuntos, entre ellos cuestiones de política pública relativas a elementos clave de la gobernanza de Internet a fin de fomentar la sostenibilidad, la solidez, la seguridad, la estabilidad y el desarrollo de Internet, y reiterando que todos los gobiernos deben tener igual cometido y responsabilidad respecto de la gobernanza de Internet y de la estabilidad, la seguridad y la continuidad de Internet,

    Reafirmando la necesidad constante de una mayor cooperación que permita a los gobiernos cumplir en igualdad de condiciones su papel y responsabilidades en cuestiones de política pública internacional relativas a Internet, pero no en los asuntos técnicos y operacionales cotidianos que no repercuten en las cuestiones de política pública internacional,

    Reconociendo que cada país determinará sus propias infraestructuras de información esenciales,

    Reafirmando la necesidad de aprovechar el potencial de las tecnologías de la información y las comunicaciones para promover el logro de los objetivos de desarrollo internacionalmente convenidos, entre ellos los Objetivos de Desarrollo del Milenio, reconociendo que las lagunas en el acceso a las tecnologías de la información y su uso por los Estados pueden disminuir su prosperidad económica, y reafirmando también la eficacia de la cooperación para combatir la utilización de la tecnología de la información con fines delictivos y crear una cultura mundial de seguridad cibernética,

    Destacando la necesidad de que se desplieguen mayores esfuerzos para cerrar la brecha digital con el fin de lograr el acceso universal a las tecnologías de la información y las comunicaciones y proteger las infraestructuras de información esenciales facilitando la transferencia de tecnología de la información y fomentando la capacidad de los países en desarrollo, en especial los países menos adelantados, en los ámbitos de las mejores prácticas y la capacitación en materia de seguridad cibernética,

    Expresando preocupación porque las amenazas para el funcionamiento fiable de las infraestructuras de información esenciales y la integridad de la información transmitida por esas redes están aumentando en complejidad y gravedad y afectando al bienestar interno, nacional e internacional,

    Afirmando que la seguridad de las infraestructuras de información esenciales es una responsabilidad que los gobiernos deben asumir de manera sistemática y una esfera en la que deben desempeñar un papel rector a nivel nacional, en coordinación con los interesados competentes, quienes a su vez deben ser conscientes de los riesgos correspondientes, las medidas de prevención y las respuestas efectivas de manera acorde con sus respectivas funciones, Reconociendo que las medidas nacionales deben ir apoyadas por el intercambio de información y la colaboración a nivel internacional a fin de afrontar de manera efectiva el carácter cada vez más transnacional de esas amenazas,

    Observando la labor realizada por las organizaciones regionales e internacionales competentes para mejorar la seguridad cibernética, y reiterando su función de alentar los esfuerzos nacionales y fomentar la cooperación internacional,

    Observando también el informe de la Unión Internacional de Telecomunicaciones publicado en 2009 sobre la seguridad de las redes de información y comunicación y las prácticas óptimas para el desarrollo de una cultura de ciberseguridad, que se centra en un enfoque nacional amplio de la seguridad cibernética compatible con la libertad de expresión, la libre circulación de información y las debidas garantías procesales,

    Reconociendo que es beneficioso evaluar periódicamente los progresos en las medidas nacionales para proteger las infraestructuras de información esenciales,  

    1. Invita a los Estados Miembros a utilizar, siempre y cuando lo consideren procedente, el instrumento de autoevaluación voluntaria de las medidas nacionales para proteger las infraestructuras de información esenciales que figura en el anexo a fin de contribuir a la evaluación de sus esfuerzos en este sentido y fortalecer su seguridad cibernética de manera que se resalten los ámbitos en que se necesiten medidas adicionales con el objetivo de ampliar la cultura mundial de seguridad cibernética;

     2. Alienta a los Estados Miembros y a las organizaciones regionales e internacionales pertinentes que hayan elaborado estrategias de seguridad cibernética y de protección de las infraestructuras de información esenciales a que compartan las mejores prácticas y las medidas que puedan ayudar a otros Estados Miembros en sus esfuerzos por facilitar el logro de la seguridad cibernética proporcionando esa información al Secretario General para que la recopile y la difunda entre los Estados Miembros.

    66ª sesión plenaria, 21 de diciembre de 2009

     Anexo.  Instrumento de autoevaluación voluntaria de las medidas nacionales para proteger las infraestructuras de información esenciales (2)

    Balance de las necesidades y estrategias en materia de seguridad cibernética

    1. Evaluar el papel de las tecnologías de la información y las comunicaciones en la economía y la seguridad nacionales, las infraestructuras esenciales (como el transporte, el suministro de agua y alimentos, la salud pública, la energía, las finanzas y los servicios de emergencia) y la sociedad civil.

    2. Determinar los riesgos para la economía y la seguridad nacionales, las infraestructuras esenciales y la sociedad civil que deban gestionarse en el ámbito de la seguridad cibernética y la protección de las infraestructuras de información esenciales.

    3. Comprender las vulnerabilidades de las redes en uso, los niveles relativos de riesgo a que se enfrenta cada sector en la actualidad y el plan de gestión en vigor, y señalar la manera en que los cambios en el entorno económico, las prioridades de seguridad nacional y las necesidades de la sociedad civil afectan a esos cálculos.

    4. Determinar los objetivos de la estrategia nacional en materia de seguridad cibernética y protección de las infraestructuras de información esenciales; describir sus objetivos, el nivel de ejecución actual, las medidas existentes para medir los progresos, su relación con otros objetivos de política nacionales y la manera en que esa estrategia concuerda con las iniciativas regionales e internacionales.

    Funciones y responsabilidades de los interesados

    5. Determinar los principales interesados que participen en la seguridad cibernética y la protección de las infraestructuras de información esenciales y describir la función de cada uno de ellos en la elaboración de las políticas y operaciones pertinentes, incluidos:

    • Los ministerios u organismos gubernamentales nacionales, señalando los principales puntos de contacto y las responsabilidades de cada uno;

    • Otros participantes gubernamentales (locales y regionales);

    • Los agentes no gubernamentales, entre ellos la industria, la sociedad civil y los estamentos académicos;

    • Los particulares, señalando si el usuario medio de Internet tiene acceso a capacitación básica para evitar los riesgos en línea y si existe una campaña nacional de concienciación sobre la seguridad cibernética.

    Procesos políticos y participación

    6. Determinar los medios oficiales y oficiosos que existan en la actualidad para la colaboración entre el gobierno y la industria en la elaboración de políticas y operaciones en materia de seguridad cibernética y protección de las infraestructuras de información esenciales; determinar los participantes, sus funciones y objetivos, los métodos para obtener y utilizar las aportaciones y su idoneidad para el logro de los objetivos pertinentes en materia de seguridad cibernética y protección de las infraestructuras de información esenciales.

    7. Determinar otros foros o estructuras que podrían necesitarse para integrar las perspectivas y los conocimientos gubernamentales y no gubernamentales necesarios para lograr los objetivos nacionales en materia de seguridad cibernética y protección de las infraestructuras de información esenciales.

    Cooperación entre el sector público y el privado

    8. Recopilar todas las medidas y planes adoptados para aumentar la cooperación entre el gobierno y el sector privado, incluyendo todo arreglo para intercambiar información y gestionar los incidentes.

    9. Reunir todas las iniciativas actuales y previstas para promover intereses compartidos y enfrentar desafíos comunes entre los participantes encargados de las infraestructuras esenciales y los agentes del sector privado que dependan de las mismas infraestructuras esenciales interconectadas.

    Gestión de incidentes y recuperación

    10. Determinar el organismo gubernamental que coordine la gestión de los incidentes, incluida la capacidad para ejercer funciones de observación, alerta, respuesta y recuperación, los organismos gubernamentales colaboradores, los participantes no gubernamentales, incluidos la industria y otros asociados, y todo arreglo existente para la cooperación y el intercambio de información confiable.

    11. Determinar, separadamente, la capacidad nacional de respuesta ante incidentes informáticos, incluidos los equipos de respuesta ante incidentes informáticos con responsabilidades nacionales y sus funciones y atribuciones, incluidos los instrumentos y procedimientos existentes para la protección de las redes informáticas gubernamentales, y los instrumentos y procedimientos existentes para difundir información sobre la gestión de los incidentes.

    12. Determinar las redes y los procesos de cooperación internacional que puedan reforzar la respuesta ante los incidentes y la planificación para imprevistos, la identificación de los asociados y los arreglos de cooperación bilateral y multilateral, cuando proceda.

    Marcos jurídicos

    13. Examinar y actualizar las autoridades jurídicas (incluidas las relacionadas con los delitos cibernéticos, la privacidad, la protección de los datos, el derecho comercial, las firmas digitales y el cifrado) que puedan estar anticuadas u obsoletas como resultado de la rápida incorporación de las nuevas tecnologías de la información y las comunicaciones y de la dependencia de esas tecnologías, y utilizar en esos exámenes los convenios, arreglos y precedentes regionales e internacionales.

    Determinar si el país ha elaborado la legislación necesaria para la investigación y el enjuiciamiento de la delincuencia cibernética, indicando los marcos existentes, por ejemplo, las resoluciones de la Asamblea General 55/63 y 56/121 relativas a la lucha contra la utilización de la tecnología de la información con fines delictivos e iniciativas regionales como el Convenio del Consejo de Europa sobre la Ciberdelincuencia.

    14. Determinar la situación actual de las autoridades y procedimientos nacionales que se ocupan de la delincuencia cibernética, incluidas las competencias legales y las dependencias nacionales encargadas de las cuestiones relativas a la delincuencia cibernética, y el nivel de comprensión de esas cuestiones entre los fiscales, jueces y legisladores.

    15. Evaluar la idoneidad de los códigos jurídicos y las autoridades actuales para hacer frente a los desafíos presentes y futuros de la delincuencia cibernética y del ciberespacio de forma más general.

    16. Examinar la participación nacional en las iniciativas internacionales para luchar contra la delincuencia cibernética, como la Red permanente de puntos de contacto.

    17. Determinar los requisitos para que los organismos nacionales de imposición de la ley cooperen con sus homólogos internacionales a fin de investigar los delitos cibernéticos transnacionales en los casos en que la infraestructura o los autores del delito se encuentren en el territorio nacional pero las víctimas residan en otros lugares.

    Creación de una cultura mundial de seguridad cibernética

    18. Resumir las medidas y los planes adoptados para crear la cultura nacional de seguridad cibernética a que se hace referencia en las resoluciones de la Asamblea General 57/239 y 58/199, incluida la ejecución de un plan de seguridad cibernética para los sistemas operados por el gobierno, de programas nacionales de concienciación y divulgación dirigidos, entre otros, a los niños y los usuarios individuales, y de actividades nacionales de capacitación en materia de seguridad cibernética y protección de las infraestructuras de información esenciales.

    ——————————————————————————————–

    (1)  Véanse A/C.2/59/3 y A/60/687.

    (2)  Instrumento voluntario que los Estados Miembros pueden utilizar, en parte o íntegramente, siempre y cuando consideren procedente, como contribución a sus esfuerzos por proteger sus infraestructuras de información esenciales y fortalecer su seguridad cibernética.

    27Abr/21

    Resolución AG/RES. 1939 (XXXIII-O/03), de 10 de junio de 2003

    Resolución AG/RES. 1939 (XXXIII-O/03), de 10 de junio de 2003. “Desarrollo de una estrategia interamericana para combatir las amenazas a la seguridad cibernética”.

    AG/RES. 1939 (XXXIII-O/03)

    DESARROLLO DE UNA ESTRATEGIA INTERAMERICANA PARA COMBATIR LAS AMENAZAS A LA SEGURIDAD CIBERNÉTICA

    (Resolución aprobada en la cuarta sesión plenaria, celebrada el 10 de junio de 2003)

    LA ASAMBLEA GENERAL,

    VISTO el Informe Anual del Consejo Permanente a la Asamblea General (AG/doc.4156/03 add. 4), en particular la sección sobre los temas encomendados a la Comisión de Seguridad Hemisférica;

    TOMANDO NOTA de que la Comisión de Seguridad Hemisférica del Consejo Permanente, en su reunión del 3 de diciembre de 2002, abordó la seguridad de sistemas de información críticos y consideró la necesidad de que los Estados Miembros desarrollen una estrategia para hacer frente a las amenazas a la seguridad cibernética; y

    CONSIDERANDO:

    Que la Asamblea General de las Naciones Unidas, en diciembre de 2002, aprobó la Resolución 57/239 sobre los elementos para la Creación de una Cultura Mundial de Seguridad Cibernética para Sistemas y Redes de Información;

    Que en su XII Reunión, el Comité Directivo Permanente de la Comisión Interamericana de Telecomunicaciones (COM/CITEL), señaló que la “creación de una cultura de ciberseguridad para proteger la infraestructura de las telecomunicaciones aumentando la conciencia entre todos los participantes de las Américas en las redes y sistemas de información relacionados con el riesgo de dichos sistemas y desarrollando las medidas necesarias para hacer frente a los riesgos de seguridad respondiendo rápidamente a los ciber-incidentes” es parte de los mandatos de la CITEL;

    Que el Comité Interamericano contra el Terrorismo (CICTE) en su tercer período ordinario de sesiones adoptó la Declaración de San Salvador (CICTE/DEC. 1/03 rev. 2 corr. 1), la cual reconoció las amenazas a la seguridad cibernética como amenazas terroristas emergentes y, en sus Recomendaciones a la Conferencia Especial sobre Seguridad (CICTE/doc.6/03 rev. 2), exhortó a los Estados Miembros a fortalecer la cooperación, identificar amenazas terroristas emergentes, cualquiera que sea su origen, tales como las actividades de terroristas internacionales y las amenazas a la seguridad cibernética, y adoptar medidas para generar conciencia sobre éstas, incluyendo seminarios, capacitación, intercambio de experiencias y profundización de la cooperación;

    Que el Informe Final de la Cuarta Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA-IV), celebrada en Trinidad y Tobago, recomendó que se convoque de nuevo al Grupo de Expertos Gubernamentales con el fin de dar seguimiento al cumplimiento de las recomendaciones formuladas y los mandatos encomendados por la REMJA III y IV en materia de delito cibernético, e inclusive la elaboración de los instrumentos jurídicos interamericanos pertinentes y de legislación modelo con el fin de fortalecer la cooperación hemisférica en el combate del delito cibernético; y

    El ofrecimiento de Argentina durante el tercer período ordinario de sesiones del CICTE de ser sede de una conferencia/taller sobre seguridad cibernética en Buenos Aires en julio de 2003, la cual tiene por objeto abordar todos los aspectos de la seguridad cibernética y promover la coordinación entre los diferentes órganos, organismos y entidades de la OEA responsables de lo mismo, y que se ha alentado a los Estados Miembros a asistir con delegaciones de nivel y composición apropiados,

    RESUELVE:

    1. Encomendar al Comité Interamericano contra el Terrorismo (CICTE), la Comisión Interamericana de Telecomunicaciones (CITEL) y el Grupo de Expertos Gubernamentales sobre Delito Cibernético de la Reunión de Ministros de Justicia o de Ministros o Procuradores Generales de las Américas (REMJA) que se aseguren de que la Conferencia de la Organización de los Estados Americanos (OEA) sobre Seguridad Cibernética, propuesta por la Argentina, empiece a trabajar en el desarrollo de un proyecto de estrategia integral de la OEA sobre seguridad cibernética que aborde los aspectos multidimensional y multidisciplinario de la seguridad cibernética, y que informen sobre los resultados de la reunión, y sobre el trabajo de seguimiento que se considere apropiado, a la Comisión de Seguridad Hemisférica para su consideración.

    2. Encomendar al Consejo Permanente que, a través de la Comisión de Seguridad Hemisférica, desarrolle un proyecto de estrategia de seguridad cibernética para los Estados Miembros en coordinación y colaboración con la CITEL, el CICTE, el Grupo de Expertos Gubernamentales sobre Delito Cibernético de la REMJA y cualquier otro órgano de la OEA que se considere apropiado, sin perjuicio de sus respectivos mandatos, misiones y requerimientos existentes sobre presentación de informes, teniendo en consideración cualquier actividad pertinente en los Estados Miembros relativa a la protección de infraestructura crítica, y que presente este proyecto de estrategia sobre seguridad cibernética al Consejo Permanente para su consideración.

    3. Solicitar al Consejo Permanente que informe a la Asamblea General en su trigésimo cuarto período ordinario de sesiones sobre la implementación de esta resolución.

    25Abr/21

    DFL 3. Fija Texto Refundido, Coordinado y Sistematizado de la Ley de Propiedad Industrial de 9 de marzo de 2006

    DFL 3. Fija Texto Refundido, Coordinado y Sistematizado de la Ley de Propiedad Industrial de 9 de marzo de 2006

    D.F.L. nº 3.- Santiago, 9 de marzo de 2006.-

    Visto:

    Lo dispuesto en el artículo 64, inciso 5º, de la Constitución Política de la República.

        Decreto con fuerza de ley:

        Artículo único.- Fíjase el siguiente texto refundido, coordinado y sistematizado de la ley nº 19.039, Ley de Propiedad Industrial.

    LEY DE PROPIEDAD INDUSTRIAL

    TITULO I. Disposiciones preliminares

    Párrafo 1º. Del ámbito de aplicación

        Artículo 1º.- Las normas relativas a la existencia, alcance y ejercicio de los derechos de propiedad industrial, se regirán por la presente ley. Los derechos comprenden las marcas, las patentes de invención, los modelos de utilidad, los dibujos y diseños industriales, los esquemas de trazado o topografías de circuitos integrados, indicaciones geográficas y denominaciones de origen y otros títulos de protección que la ley pueda establecer.

        Asimismo, esta ley tipifica las conductas consideradas desleales en el ámbito de la protección de la información no divulgada.

        Artículo 2º.- Cualquier persona natural o jurídica, nacional o extranjera, podrá gozar de los derechos de la propiedad industrial que garantiza la Constitución Política, debiendo obtener previamente el título de protección correspondiente de acuerdo con las disposiciones de esta ley. Las personas naturales o jurídicas residentes en el extranjero deberán, para los efectos de esta ley, designar un apoderado o representante en Chile.

        Los derechos de propiedad industrial que en conformidad a la ley sean objeto de inscripción, adquirirán plena vigencia a partir de su registro, sin perjuicio de los que correspondan al solicitante y de los demás derechos que se establecen en esta ley.

        Artículo 3º.- La tramitación de las solicitudes, el otorgamiento de los títulos y demás servicios relativos a la propiedad industrial competen al Departamento de Propiedad Industrial, en adelante el Departamento, que depende del Ministerio de Economía, Fomento y Reconstrucción.

        Las solicitudes podrán presentarse personalmente o mediante apoderado.

        La presente ley garantiza que la protección conferida por los derechos de propiedad industrial que aquí se regulan, se concederá salvaguardando y respetando tanto el patrimonio biológico y genético como los conocimientos tradicionales nacionales. El otorgamiento de los derechos de propiedad industrial que constituyan elementos protegibles, que hayan sido desarrollados a partir del material obtenido de dicho patrimonio o de dichos conocimientos, estará supeditado a que ese material haya sido adquirido de conformidad con el ordenamiento jurídico vigente.

    Párrafo 2º. De los procedimientos generales de oposición y registro

        Artículo 4º.- Presentada y aceptada a tramitación una solicitud de registro, será obligatoria la publicación de un extracto de ésta en el Diario Oficial, en la forma y plazos que determine el reglamento.

    Los errores de publicación que a juicio del Jefe del Departamento no sean sustanciales, podrán corregirse mediante una resolución dictada en el expediente respectivo. En caso de errores sustanciales, el Jefe del Departamento ordenará una nueva publicación, que deberá efectuarse dentro del plazo de diez días, contados desde la fecha de la resolución que así lo ordene.

        Artículo 5º.- Cualquier interesado podrá formular ante el Departamento oposición a la solicitud de marca, patente de invención, modelo de utilidad, dibujo y diseño industrial, esquemas de trazado o topografía de circuitos integrados e indicaciones geográficas y denominaciones de origen. La oposición deberá presentarse dentro del plazo de 30 días contado desde la fecha de la publicación del extracto respectivo.

        El plazo señalado en el inciso anterior será de 45 días tratándose de solicitudes de patentes de invención, modelos de utilidad, dibujos y diseños industriales, esquemas de trazado o topografías de circuitos integrados e indicaciones geográficas y denominaciones de origen.

        En los procedimientos que exista controversia, en los cuales el Departamento de Propiedad Industrial actúe como tribunal de primera instancia, se deberá comparecer patrocinado por abogado habilitado, conforme a lo dispuesto por la ley n° 18.120.

        Artículo 6º.- Vencidos los plazos señalados en el artículo anterior, el Jefe del Departamento ordenará la práctica de un informe pericial respecto de las solicitudes de patentes de invención, modelos de utilidad, dibujos y diseños industriales y esquemas de trazado o topografías de circuitos integrados, con el objetivo de verificar si cumplen las exigencias establecidas en los artículos 32, 56, 62 y 75 de esta ley, según corresponda.

        Artículo 7º.- Ordenado el informe pericial, éste deberá evacuarse dentro del plazo de 60 días, contado desde la aceptación del cargo. Este plazo podrá ampliarse hasta por otros 60 días, en aquellos casos en que, a juicio del Jefe del Departamento, así se requiera.

        El informe del perito será puesto en conocimiento de las partes, las que dispondrán de 60 días, contados desde la notificación, para formular las observaciones que estimen convenientes. Este plazo se podrá ampliar por una sola vez durante el procedimiento, a solicitud del interesado, hasta por 60 días. De las observaciones de las partes se dará traslado al perito para que, en un plazo de 60 días, responda a dichas observaciones.

        Artículo 8º.- Decretado el examen pericial, el solicitante deberá acreditar, dentro de los 60 días siguientes, el pago del arancel correspondiente. En caso de no efectuarse el pago dentro de este plazo, la solicitud se tendrá por abandonada. En casos calificados, a solicitud del perito, el Jefe del Departamento fijará un monto específico para cubrir los gastos útiles y necesarios para su desempeño, cifra que deberá pagar el solicitante dentro de los 30 días siguientes. Dicho costo será de cargo del solicitante de la patente de invención, modelo de utilidad, dibujo o diseño industrial, esquemas de trazado o topografía de circuitos integrados o del demandante de nulidad de estos derechos.

        Artículo 9º.- En los procedimientos en que se hubiera deducido oposición, se dará al solicitante traslado de ella, para que haga valer sus derechos, por el plazo de 30 días, en el caso de marcas, y por el plazo de 45 días, en el caso de patentes de invención, modelos de utilidad, dibujos y diseños industriales, esquemas de trazado o topografías de circuitos integrados e indicaciones geográficas y denominaciones de origen.

        Artículo 10.- Si hubiera hechos sustanciales, pertinentes y controvertidos, se recibirá la causa a prueba por el término de 45 días, excepto para el caso de marcas, en cuyo caso el plazo será de 30 días.

        El término probatorio podrá prorrogarse hasta por 30 días, en casos calificados.

        Artículo 10 bis.- En caso de recibirse la causa a prueba, la documentación que se acompañe deberá ser presentada en idioma español, o debidamente traducida si el Departamento así lo exigiere.

        Citadas las partes para oír sentencia, no se admitirán escritos ni pruebas de ningún género, excepto aquellas referentes a las cesiones de solicitud, avenimientos, desistimiento o limitación de la petición.

        Artículo 11.- Los plazos de días establecidos en esta ley y sus normas reglamentarias, son fatales y de días hábiles.

    Para estos efectos, el día sábado se considera inhábil.

        Artículo 12.- En estos procedimientos las partes podrán hacer uso de todos los medios de prueba habituales en este tipo de materias, y de los señalados en el Código de Procedimiento Civil con exclusión de la testimonial.

        En estos procedimientos será aplicable además lo dispuesto en el inciso segundo del artículo 64 del citado Código.

        Artículo 13.- Todas las notificaciones que digan relación con el procedimiento de otorgamiento de un derecho de propiedad industrial, oposiciones, nulidad y, en general, cualquier materia que se siga ante el Departamento, se efectuarán por el estado diario que este último deberá confeccionar.

    Dicho estado diario podrá constar de uno o más listados.

    Se entenderá notificada cualquier resolución que aparezca en dichos listados.

        La notificación de oposición a la solicitud de registro se efectuará por carta certificada expedida al domicilio indicado por el solicitante en el expediente.

    En estos casos, la notificación se entenderá efectuada tres días después que la carta sea depositada en el correo y consistirá en el envío de copia íntegra de la oposición y su proveído. Cuando, además de la oposición, se hubieren dictado observaciones de fondo a la solicitud de registro, dicha resolución será notificada igualmente por carta certificada, conjuntamente con la notificación de oposición.

        La notificación de la demanda de nulidad de un registro se efectuará en los términos señalados en los artículos 40 y siguientes del Código de Procedimiento Civil, para lo cual los solicitantes extranjeros deberán fijar un domicilio en Chile. La demanda de nulidad de un registro concedido a una persona sin domicilio ni residencia en Chile se notificará al apoderado o representante a que se refiere el artículo 2º de esta ley.

        Todas las providencias y resoluciones que se dicten en los procesos contenciosos seguidos ante el Jefe del Departamento serán suscritas por éste y el Secretario Abogado del Departamento.

        Las notificaciones que realice el Tribunal de Propiedad Industrial se efectuarán por el estado diario, que deberá confeccionarlo el Secretario del mismo.

        La fecha y forma en que se practicó la notificación, deberá constar en el expediente.

        Artículo 14.- Los derechos de propiedad industrial son transmisibles por causa de muerte y podrán ser objeto de toda clase de actos jurídicos, los que deberán constar, al menos, por instrumento privado y se anotarán en extracto al margen del registro respectivo.

        En el extracto respectivo deberá constar la fecha en que se celebró el acto o contrato, así como las demás menciones que señale el Reglamento.

        Igualmente, los actos o contratos celebrados en el extranjero podrán ser anotados al margen del registro respectivo.

        Tratándose de cesiones de solicitudes de inscripción de derechos de propiedad industrial en trámite, bastará un instrumento privado, del que se dejará constancia en el expediente respectivo.

    En todo caso, las marcas comerciales son indivisibles y no pueden transferirse parcial y separadamente ninguno de los elementos o características del signo distintivo amparados por el título. En cambio, puede transferirse parcialmente una marca amparada en un registro, abarcando una o más de las coberturas para las que se encuentra inscrita y no relacionada, permaneciendo el resto del registro como propiedad de su titular.

        Tratándose de indicaciones geográficas y denominaciones de origen, se estará a lo establecido por el artículo 92 de esta ley.

        Artículo 15.- Los poderes relativos a la propiedad industrial se otorgarán por instrumento privado. No obstante lo anterior, los solicitantes podrán suscribirlos por escritura pública o por instrumento privado firmado ante notario o ante un oficial del registro civil competente, en aquellas comunas que no sean asiento de notario. Los mandatos provenientes del extranjero podrán otorgarse ante el cónsul de Chile respectivo sin ninguna otra formalidad posterior, o en la forma establecida en el artículo 345 del Código de Procedimiento Civil.

        La facultad para desistirse de una solicitud o para renunciar a un registro deberá conferirse expresamente, de lo contrario se entenderá que se excluye dentro de las facultades del representante.

        Sin perjuicio de lo señalado en el inciso primero, para la presentación de la solicitud bastará con que el representante indique en ella el nombre del solicitante por quien actuará. En estos casos, el Instituto conferirá un plazo de 30 días a los residentes nacionales y de 60 días a quienes son residentes en el extranjero para acompañar el poder respectivo.

    Vencidos estos plazos, se tendrá por abandonada la solicitud.

        Artículo 16.- En los procedimientos a que se refiere este Párrafo, la prueba se apreciará según las reglas de la sana crítica.

        Artículo 17.- Los juicios de oposición, los de nulidad de registro o de transferencias, los de caducidad, así como cualquiera reclamación relativa a su validez o efectos, o a los derechos de propiedad industrial en general, se sustanciarán ante el Jefe del Departamento, ajustándose a las formalidades que se establecen en esta ley.

        El fallo que dicte será fundado y, en su forma, deberá atenerse a lo dispuesto en el artículo 170 del Código de Procedimiento Civil, en lo que sea pertinente.

        Artículo 17 bis A.- Dentro de quince días contados desde la fecha de su notificación, tanto en primera como en segunda instancia, podrán corregirse, de oficio o a petición de parte, las resoluciones recaídas en procedimientos en los cuales haya mediado oposición que contengan o se funden en manifiestos errores de hecho.

    Tratándose de resoluciones recaídas en procedimientos en los cuales no haya mediado oposición, éstas podrán corregirse de la misma forma, hasta transcurrido el plazo establecido para la apelación de la resolución que pone término al procedimiento de registro.

          Artículo 17 bis B.- En contra de las resoluciones dictadas en primera instancia por el Jefe del Departamento, haya o no mediado oposición, procederá el recurso de apelación.

    Deberá interponerse en el plazo de quince días, contado desde la notificación de la resolución, para ser conocido por el Tribunal de Propiedad Industrial.

        El recurso de apelación se concederá en ambos efectos y procederá en contra de las resoluciones que tengan el carácter de definitivas o interlocutorias.

        En contra de las sentencias definitivas de segunda instancia procederá el recurso de casación en el fondo, ante la Corte Suprema.

        Los recursos se interpondrán y tramitarán de acuerdo con lo establecido en las disposiciones pertinentes del Código Orgánico de Tribunales y del Código de Procedimiento Civil.

        Con todo, no será necesario comparecer ante el Tribunal de Propiedad Industrial a proseguir el recurso de apelación.

    Párrafo 3º Del Tribunal de Propiedad Industrial

        Artículo 17 bis C.- El Tribunal de Propiedad Industrial, en adelante el Tribunal, es un órgano jurisdiccional especial e independiente, sujeto a la superintendencia directiva, correccional y económica de la Corte Suprema, cuyo asiento estará en la ciudad de Santiago.

        El Tribunal estará integrado por seis miembros titulares y cuatro suplentes. Cada uno de sus miembros será nombrado por el Presidente de la República, mediante decreto supremo del Ministerio de Economía, Fomento y Reconstrucción, de entre una terna propuesta por la Corte Suprema, confeccionada previo concurso público de antecedentes. Dicho concurso deberá fundarse en condiciones objetivas, públicas, transparentes y no discriminatorias, establecidas mediante un auto acordado de la Corte Suprema.

        Los miembros del Tribunal deberán acreditar estar en posesión del título de abogado por un período mínimo de 5 años.

    En la selección de cuatro de los miembros titulares y dos de los suplentes, deberán exigirse conocimientos especializados en propiedad industrial.

        Artículo 17 bis D.- El Tribunal funcionará ordinariamente en dos salas y extraordinariamente, en tres. Cada sala deberá ser integrada, a lo menos, por dos miembros titulares. Para la resolución de las causas sometidas a su conocimiento, cada sala deberá sesionar, a lo menos, tres días a la semana.

        El quórum para sesionar en sala será de tres miembros.

        Las resoluciones se adoptarán por simple mayoría, dirimiendo el voto de quien presida, en caso de empate. En lo demás, se seguirán las normas contenidas en el Código Orgánico de Tribunales.

        En casos complejos, el Tribunal podrá ordenar informe pericial, determinando quién debe asumir los costos del mismo, sin perjuicio de lo que en definitiva se resuelva en materia de costas. En los asuntos de que conozca el Tribunal, salvo los relativos a marcas comerciales, si lo solicita alguna de las partes, el Tribunal deberá ordenar el informe de uno o más peritos, caso en el cual éstos participarán en sus deliberaciones, con derecho a voz.

        El Presidente del Tribunal, como asimismo el de cada sala, será elegido por sus respectivos miembros titulares.

        Artículo 17 bis E.- La remuneración mensual de los integrantes del Tribunal será la suma de cincuenta unidades tributarias mensuales, para los miembros titulares, y de veinte unidades tributarias mensuales, para los suplentes.

        Cada miembro del Tribunal percibirá, además, la suma de 0.4 unidades tributarias mensuales por cada causa sometida a su conocimiento resuelta. En todo caso, la suma total que cada miembro puede percibir mensualmente por este concepto no podrá exceder de cincuenta unidades tributarias mensuales.

        Artículo 17 bis F.- Los miembros del Tribunal estarán afectos a las causales de implicancia y recusación establecidas en los artículos 195 y 196 del Código Orgánico de Tribunales.

        Será, asimismo, causal de implicancia para el respectivo miembro del Tribunal el que, en la causa que se someta a su conocimiento, tenga interés su cónyuge o sus parientes hasta el tercer grado de consanguinidad o segundo de afinidad; o personas que estén ligadas a él por vínculos de adopción, o empresas en las cuales estas mismas personas sean sus representantes legales, mandatarios, directores, gerentes o desempeñen otros cargos directivos, o posean directamente, o a través de otras personas naturales o jurídicas, un porcentaje de la sociedad que les permita participar en la administración de la misma, o elegir o hacer elegir uno o más de sus administradores.

        La causal invocada podrá ser aceptada por el integrante afectado.

    En caso contrario, será fallada de plano por el Tribunal, con exclusión de aquél. Se aplicará multa a beneficio fiscal de hasta veinte unidades tributarias mensuales a la parte que la hubiera deducido, si la implicancia o la recusación fueran desestimadas por unanimidad.

        Si por cualquier impedimento, el Tribunal no tuviera quórum para funcionar en al menos una sala, se procederá a la subrogación por ministros de la Corte de Apelaciones de Santiago, de acuerdo a lo dispuesto en el Código Orgánico de Tribunales.

        A los miembros del Tribunal se les aplicarán las normas contenidas en los artículos 319 a 331 del Código Orgánico de Tribunales, con excepción de lo dispuesto en el artículo 322.

        Los integrantes titulares y suplentes del Tribunal permanecerán tres años en sus cargos, pudiendo ser designados por nuevos períodos sucesivos.

        Artículo 17 bis G.- Los miembros del Tribunal de Propiedad Industrial cesarán en sus funciones por las siguientes causas:

    a) Término del período legal de su designación;

    b) Renuncia voluntaria;

    c) Haber cumplido 75 años de edad;

    d) Destitución por notable abandono de deberes;

    e) Incapacidad sobreviniente.

      Se entiende por tal, aquella que impide al integrante ejercer el cargo por un período de tres meses consecutivos o de seis meses en un año.

        Las medidas de las letras d) y e) precedentes se harán efectivas por la Corte Suprema, a petición del Presidente del Tribunal o de dos de sus miembros, sin perjuicio de las facultades disciplinarias de la Corte Suprema.

        La resolución que haga efectiva la destitución deberá señalar los hechos en que se funda y los antecedentes tenidos a la vista para acreditarlos.

        Producida la cesación en el cargo, si el tiempo que le restara fuera superior a ciento ochenta días, deberá procederse al nombramiento del reemplazante en conformidad con las reglas establecidas en el artículo 17 bis C de esta ley. En el caso de las letras b), d) y e) precedentes, el reemplazante durará en el cargo el tiempo que restara del respectivo período.

        Artículo 17 bis H.- El Tribunal contará con una dotación garantizada de un Secretario Abogado, dos Relatores Abogados y cuatro funcionarios administrativos, los que pertenecerán a la planta de la Subsecretaría de Economía, Fomento y Reconstrucción y estarán destinados permanentemente al Tribunal de Propiedad Industrial.

    Estos se regirán, en todo, por las normas aplicables a los funcionarios de dicha Subsecretaría, salvo en aquello que sea incompatible con la naturaleza de su función.

        Cualquiera de los relatores podrá subrogar al Secretario, quien también podrá relatar subrogando a aquellos.

        Artículo 17 bis I.- El Secretario, los Relatores y los funcionarios administrativos, en caso de ser necesario, podrán ser subrogados o suplidos por funcionarios de la Subsecretaría de Economía, Fomento y Reconstrucción que cumplan los requisitos exigidos para ocupar el cargo que subrogarán o suplirán, según el caso. Además, se podrá contratar personal en forma transitoria, cuando las necesidades del Tribunal lo requieran, previa autorización de la Dirección de Presupuestos.

        El mobiliario, el equipamiento, los materiales y cualquier servicio o material necesarios para el normal funcionamiento del Tribunal serán de responsabilidad administrativa y económica de la Subsecretaría de Economía, Fomento y Reconstrucción.

        La Ley de Presupuestos del Sector Público deberá contemplar, anualmente, los recursos necesarios para el funcionamiento del Tribunal. Para estos efectos, el Presidente del Tribunal comunicará los requerimientos económicos al Ministro de Economía, Fomento y Reconstrucción, quien los incluirá dentro de los del ministerio a su cargo, de acuerdo con las normas establecidas para el sector público.

        Artículo 17 bis J.- El Secretario Abogado será la autoridad directa del personal destinado al Tribunal para efectos administrativos, sin perjuicio de otras funciones y atribuciones específicas que le asigne o delegue el Tribunal.

          Artículo 17 bis K.- Antes de asumir sus funciones, los integrantes del Tribunal, Secretario y Relatores prestarán juramento o promesa de guardar la Constitución y las leyes de la República, ante el Presidente del Tribunal, actuando como ministro de fe el Secretario del mismo. A su vez, el Presidente lo hará ante el Ministro más antiguo.

    Párrafo 4º Del pago de derechos

        Artículo 18.- La concesión de patentes de invención, de modelos de utilidad, de dibujos y diseños industriales y de esquemas de trazado o topografías de circuitos integrados, estará sujeta al pago de un derecho equivalente a dos unidades tributarias mensuales por cada cinco años de concesión del derecho. Al presentarse la solicitud, deberá pagarse el equivalente a una unidad tributaria mensual, sin lo cual no se le dará trámite. Aceptada la solicitud, se completará el pago del derecho de los primeros diez años, para las patentes de invención, y de los primeros cinco años, para el caso de los modelos de utilidad, dibujos y diseños industriales y esquemas de trazado o topografías de circuitos integrados.

        Si la solicitud fuera rechazada, la cantidad pagada quedará a beneficio fiscal.

        El pago de los derechos correspondientes al segundo decenio o quinquenio, según se trate de patentes de invención, modelos de utilidad, dibujos y diseños industriales o esquemas de trazado o topografías de circuitos integrados, deberá efectuarse antes del vencimiento del primer decenio o quinquenio o dentro de los seis meses siguientes a la expiración de dicho plazo, con una sobretasa de 20% por cada mes o fracción de mes, contados a partir del primer mes del plazo de gracia.

    En caso de no efectuarse el pago dentro del término señalado, los derechos a los cuales hace referencia este artículo, caducarán.

          Artículo 18 bis A.- Los solicitantes de los derechos a que hace referencia el artículo anterior, que carezcan de medios económicos, podrán acceder al registro sin necesidad de satisfacer derechos pecuniarios de ninguna clase. Para optar a dicho beneficio, junto con la solicitud respectiva, el solicitante deberá acompañar una declaración jurada de carencia de medios económicos, además de los documentos exigidos por el reglamento de esta ley.

        Una vez concedido el beneficio, el titular no deberá satisfacer los pagos a que hace referencia el inciso primero del artículo 18, difiriendo lo que se hubiera dejado de pagar para los años sucesivos según lo determine el reglamento.

    En el registro se anotará el aplazamiento y la obligación de pagar la cantidad diferida.

    Esta obligación recaerá sobre quienquiera que sea el titular del registro.

          En cuanto al costo del informe pericial a que hace referencia el artículo 6º de esta ley, igualmente quedará diferido, debiendo el Jefe del Departamento designar a un perito perteneciente al registro que al efecto lleva el Departamento según el sistema de turnos establecido por el reglamento de esta ley. El perito estará obligado a aceptar el cargo bajo sanción de ser eliminado del registro, a la vez que desempeñarlo con la debida diligencia y prontitud.

    Igualmente, se anotará en el registro el nombre del perito que evacuó el informe y los honorarios devengados, debiendo ser pagados al tiempo que establezca el reglamento por quien aparezca como titular del registro.

        En el caso de no pago oportuno de los derechos y honorarios periciales diferidos, el Departamento declarará la caducidad de la patente.

        Artículo 18 bis B.- La inscripción de marcas comerciales, indicaciones geográficas y denominaciones de origen, estarán afectas al pago de un derecho equivalente a tres unidades tributarias mensuales. Al presentarse la solicitud, deberá pagarse el equivalente a una unidad tributaria mensual, sin lo cual no se le dará trámite.

    Aceptada la solicitud, se completará el pago del derecho y, si es rechazada, la cantidad pagada quedará a beneficio fiscal.

        La renovación de registros de marcas estará sujeta al pago del doble del derecho contemplado en el inciso anterior. El pago podrá efectuarse dentro de los seis meses siguientes al vencimiento del registro, con una sobretasa de 20% por cada mes o fracción de mes contados a partir del primer mes de expiración del plazo establecido en el artículo 24 de esta ley.

        Tratándose de indicaciones geográficas o denominaciones de origen, éstas no estarán afectas al pago de renovación establecido para las marcas comerciales en el inciso anterior.

        Artículo 18 bis C.- La presentación de apelaciones estará afecta al pago de un derecho equivalente a dos unidades tributarias mensuales.

    A la presentación deberá acompañarse el comprobante de pago respectivo. De ser aceptada la apelación, el Tribunal de Propiedad Industrial ordenará la devolución del monto consignado de acuerdo con el procedimiento que señale el reglamento.

          Artículo 18 bis D.- La inscripción de las transferencias de dominio, licencias de uso, prendas y cambios de nombre y cualquier otro tipo de gravámenes que puedan afectar a una patente de invención, modelo de utilidad, dibujos y diseño industrial, marca comercial o esquemas de trazado o topografía de circuitos integrado, se efectuará previo pago de un derecho equivalente a una unidad tributaria mensual. Los actos señalados no serán oponibles a terceros mientras no se proceda a su inscripción en el Departamento.

        Artículo 18 bis E.- Los derechos establecidos en los artículos anteriores, serán a beneficio fiscal, debiendo acreditarse su pago dentro de los 60 días contados desde la fecha en que quede ejecutoriada la resolución que autoriza la inscripción en el registro respectivo, sin lo cual se tendrá por abandonada la solicitud, procediéndose a su archivo.

        Dicha resolución deberá notificarse por carta certificada en la forma y condiciones que establezca el reglamento.

        Artículo 18 bis F.- Los registros de marcas comerciales que distingan servicios y se encuentran limitados a una o más provincias, se entenderán extensivos a todo el territorio nacional.

        Los registros de marcas comerciales efectuados por provincias para amparar establecimientos comerciales, se entenderá que cubren toda la región o regiones en que se encuentren comprendidas las provincias respectivas.

        Los titulares de los registros a que se refieren los dos incisos precedentes que, por efectos de este artículo, amplíen el ámbito territorial de protección de sus marcas, no podrán prestar servicios o instalar establecimientos comerciales amparados por dichas marcas en las mismas provincias para las cuales se encuentren inscritas marcas iguales o semejantes respecto a servicios o establecimientos del mismo giro, bajo apercibimiento de incurrir en la infracción contemplada en la letra a) del artículo 28 de esta ley.

    Párrafo 5º Del procedimiento de nulidad de registro

        Artículo 18 bis G.- Cualquier persona interesada podrá solicitar la nulidad de un registro de derecho de propiedad industrial.

        La demanda de nulidad deberá contener, al menos, los siguientes antecedentes.

        a) Nombre, domicilio y profesión del demandante.

        b) Nombre, domicilio y profesión del demandado.

        c) Número y fecha del registro cuya nulidad se solicita, e individualización del derecho respectivo.

        d) Razones de hecho y de derecho en las que se fundamenta la demanda.

        Artículo 18 bis H.- En el caso de patentes de invención y modelos de utilidad, la nulidad podrá ser solicitada respecto de todo el registro o de una o más de sus reivindicaciones.

        Artículo 18 bis I.- De la demanda se dará traslado al titular del derecho de propiedad industrial o a su representante por sesenta días si se trata de patente de invención, modelo de utilidad, dibujos o diseños industriales, esquemas de trazado o topografías de circuitos integrados e indicaciones geográficas y denominaciones de origen. Para el caso de marcas comerciales, dicho traslado será de treinta días.

        Artículo 18 bis J.- Con la contestación de la demanda de nulidad de una patente de invención, modelo de utilidad, dibujo o diseño industrial, esquema de trazado o topografía de circuito integrado, indicación geográfica o denominación de origen, o en rebeldía del demandado, se ordenará un informe de uno o más peritos respecto a los fundamentos de hecho contenidos en la demanda y su contestación. El perito será designado de común acuerdo por las partes en un comparendo o bien por el Jefe del Departamento si no hubiere acuerdo o el comparendo no se celebra por cualquier causa.

        Con todo, la parte que se sienta agraviada por el informe evacuado por el perito, podrá pedir un segundo informe, caso en el cual se procederá en la forma prescrita en este mismo artículo.

        El Jefe del Departamento podrá en cualquier momento escuchar al o los peritos que emitieron el informe al momento de solicitarse el registro, como antecedente para mejor resolver.

        Artículo 18 bis K.- Designado un perito por el Jefe del Departamento, las partes podrán tacharlo, dentro de los cinco días siguientes a la resolución que lo designa, exclusivamente por una o más de las siguientes causales:

        a) Por haber emitido públicamente una opinión sobre la materia.

        b) Por relación de parentesco, amistad o enemistad manifiesta con una de las partes.

        c) Por falta de idoneidad o competencia respecto de la materia sometida a su consideración.

        d) Por haber prestado servicios profesionales, dependientes o independientes, a alguna de las partes, en los últimos cinco años o por haber tenido una relación económica o de negocios con alguna de ellas, durante el mismo lapso de tiempo.

        Del escrito que tache a un perito se dará traslado a la otra parte por veinte días y con su respuesta o en su rebeldía, el Jefe del Departamento resolverá la cuestión sin más trámite.

        El informe pericial será puesto en conocimiento de las partes, quienes deberán formular sus observaciones dentro de un plazo de sesenta días.

        Si hubiere hechos sustanciales, pertinentes y controvertidos, el Jefe del Departamento abrirá un término de prueba de cuarenta y cinco días, prorrogables por única vez por otros cuarenta y cinco días, en casos debidamente calificados.

        Con lo expuesto por las partes y el informe pericial, el Jefe del Departamento se pronunciará sobre la nulidad solicitada.

        Artículo 18 bis L.- En el caso de marcas comerciales, una vez transcurrido el plazo de traslado de la demanda y si existieren hechos sustanciales, pertinentes y controvertidos, el Jefe del Departamento abrirá un término de prueba de treinta días, prorrogables por otros treinta días en casos debidamente calificados por el mismo Jefe.

        Artículo 18 bis M.- Son aplicables al procedimiento de nulidad las reglas contenidas en los artículos 10 bis, 12 y 16 de esta ley.

        Artículo 18 bis N.- El registro que fuere declarado nulo se tendrá como sin valor desde su fecha de vigencia.

        La sentencia que acoja la nulidad del registro, en todo o parte, se anotará al margen de la respectiva inscripción.

        Artículo 18 bis O.- El procedimiento contemplado en este párrafo se aplicará a los demás procesos de competencia del Jefe del Departamento, de acuerdo a lo dispuesto en el artículo 17 de esta ley.

    TITULO II. De las marcas comerciales

        Artículo 19.- Bajo la denominación de marca comercial, se comprende todo signo que sea susceptible de representación gráfica capaz de distinguir en el mercado productos, servicios o establecimientos industriales o comerciales. Tales signos podrán consistir en palabras, incluidos los nombres de personas, letras, números, elementos figurativos tales como imágenes, gráficos, símbolos, combinaciones de colores, sonidos, así como también, cualquier combinación de estos signos. Cuando los signos no sean intrínsecamente distintivos, podrá concederse el registro si han adquirido distintividad por medio del uso en el mercado nacional.

        Podrán también inscribirse las frases de propaganda o publicitarias, siempre que vayan unidas o adscritas a una marca registrada del producto, servicio o establecimiento comercial o industrial para el cual se vayan a utilizar.

        La naturaleza del producto o servicio al que la marca ha de aplicarse no será en ningún caso obstáculo para el registro de la marca.

        Artículo 19 bis A.- La nulidad o caducidad por no pago de los derechos de renovación producirán los mismos efectos respecto de las frases de propaganda adscritas al registro. En consecuencia, anulada o caducada una marca, el Departamento procederá a cancelar de oficio los registros de frases de propaganda dependientes de la marca anulada o caducada. De ello deberá dejarse constancia mediante la subinscripción marginal en el registro correspondiente.

        Artículo 19 bis.- En el caso que se solicite el registro de una marca a favor de dos o más titulares, éstos, actuando de consuno, podrán requerir que se registre también un reglamento de uso y control de la misma, que será obligatorio para los titulares e inoponible para terceros. En este caso, los comuneros podrán renunciar al derecho a pedir la partición de la comunidad por un período determinado o indefinidamente.

        El Departamento podrá objetar el registro del reglamento, en caso que contenga disposiciones ilegales o que induzcan a error o confusión al público consumidor.

        El reglamento de uso y control deberá presentarse junto a la solicitud de marca y se resolverá conjuntamente. El Departamento podrá hacer observaciones, hasta antes de dictar la resolución definitiva, las que deberán ser corregidas en un plazo máximo de sesenta días.

        El incumplimiento por parte de alguno de los comuneros de las normas previstas en el reglamento de uso y control, dará acción a cualquiera de los demás comuneros para solicitar el cumplimiento forzoso y/o la indemnización de perjuicios conforme a las normas del Título X de esta ley.

        Con igual procedimiento y efectos podrá registrarse una marca para ser usada colectivamente, con la finalidad de garantizar la naturaleza o cualidad de determinados productos o servicios. En este caso, la marca no podrá ser cedida a terceras personas.

        Artículo 19 bis B.- Las frases de propaganda no se podrán ceder o transferir, salvo que se cedan o transfieran con el registro principal al cual se adscriben.

        Artículo 19 bis C.- Los registros de marcas que contengan signos, figuras, cifras, colores, vocablos prefijos, sufijos, raíces o segmentos de uso común o que puedan tener carácter genérico, indicativo o descriptivo, se entenderán que confieren protección a la marca en su conjunto y se concederán dejándose expresa constancia de que no se otorga protección a los referidos elementos aisladamente considerados.

        Artículo 19 bis D.- La marca confiere a su titular el derecho exclusivo y excluyente de utilizarla en el tráfico económico en la forma que se le ha conferido y para distinguir los productos, servicios, establecimientos comerciales o industriales comprendidos en el registro.

        Por consiguiente, el titular de una marca registrada podrá impedir que cualquier tercero, sin su consentimiento, utilice en el curso de las operaciones comerciales marcas idénticas o similares para productos, servicios o establecimientos comerciales o industriales que sean idénticos o similares a aquéllos para los cuales se ha concedido el registro, y a condición de que el uso hecho por el tercero pueda inducir a error o confusión.

          Cuando el uso hecho por el tercero se refiera a una marca idéntica para productos, servicios o establecimientos comerciales o industriales idénticos, se presumirá que existe confusión.

        Artículo 19 bis E.- El derecho que confiere el registro de la marca no faculta a su titular para prohibir a terceros el uso de la misma respecto de los productos legítimamente comercializados en cualquier país con esa marca por dicho titular o con su consentimiento expreso.

        Artículo 20.- No podrán registrarse como marcas:

          a) Los escudos, las banderas u otros emblemas, las denominaciones o siglas de cualquier Estado, de las organizaciones internacionales y de los servicios públicos estatales.

        b) Respecto del objeto a que se refieren, las denominaciones técnicas o científicas, el nombre de las variedades vegetales, las denominaciones comunes recomendadas por la Organización Mundial de la Salud y aquellas indicativas de acción terapéutica.

        c) El nombre, el seudónimo o el retrato de una persona natural cualquiera, salvo consentimiento dado por ella o por sus herederos, si hubiera fallecido. Sin embargo, serán susceptibles de registrarse los nombres de personajes históricos cuando hubieran transcurrido, a lo menos, 50 años de su muerte, siempre que no afecte su honor.

        Con todo, no podrán registrarse nombres de personas cuando ello constituya infracción a las letras e), f), g) y h).

        d) Las que reproduzcan o imiten signos o punzones oficiales de control de garantías adoptados por un Estado, sin su autorización; y las que reproduzcan o imiten medallas, diplomas o distinciones otorgadas en exposiciones nacionales o extranjeras, cuya inscripción sea pedida por una persona distinta de quien las obtuvo.

        e) Las expresiones o signos empleados para indicar el género, naturaleza, origen, nacionalidad, procedencia, destinación, peso, valor o cualidad de los productos, servicios o establecimientos; las que sean de uso general en el comercio para designar cierta clase de productos, servicios o establecimientos, y las que no presenten carácter distintivo o describan los productos, servicios o establecimientos a que deban aplicarse.

        f) Las que se presten para inducir a error o engaño respecto de la procedencia, cualidad o género de los productos, servicios o establecimientos, comprendidas aquellas pertenecientes a distintas clases cuyas coberturas tengan relación o indiquen una conexión de los respectivos bienes, servicios o establecimientos.

        g) Las marcas iguales o que gráfica o fonéticamente se asemejen, en forma de poder confundirse con otras registradas en el extranjero para distinguir los mismos productos, servicios o establecimientos comerciales o industriales, siempre que ellas gocen de fama y notoriedad en el sector pertinente del público que habitualmente consume esos productos, demanda esos servicios o tiene acceso a esos establecimientos comerciales o industriales, en el país originario del registro.

        Rechazado o anulado el registro por esta causal, el titular de la marca notoria registrada en el extranjero, dentro del plazo de 90 días, deberá solicitar la inscripción de la marca. Si así no lo hiciera, la marca podrá ser solicitada por cualquier persona, teniendo prioridad dentro de los 90 días siguientes a la expiración del derecho del titular de la marca registrada en el extranjero, aquella a quien se le hubiera rechazado la solicitud o anulado el registro.

        De igual manera, las marcas registradas en Chile que gocen de fama y notoriedad, podrán impedir el registro de otros signos idénticos o similares solicitados para distinguir productos, servicios o establecimiento comercial o industrial distintos y no relacionados, a condición, por una parte, de que estos últimos guarden algún tipo de conexión con los productos, servicios o establecimiento comercial o industrial que distingue la marca notoriamente conocida y que, por otra parte, sea probable que esa protección lesione los intereses del titular de la marca notoria registrada.

        Para este caso, la fama y notoriedad se determinará en el sector pertinente del público que habitualmente consume esos productos, demanda esos servicios o tiene acceso a esos establecimientos comerciales o industriales en Chile.

        h) Aquellas iguales o que gráfica o fonéticamente se asemejen de forma que puedan confundirse con otras ya registradas o válidamente solicitadas con anterioridad para productos, servicios o establecimiento comercial o industrial idénticos o similares, pertenecientes a la misma clase o clases relacionadas.

        Esta causal será igualmente aplicable respecto de aquellas marcas no registradas que estén siendo real y efectivamente usadas con anterioridad a la solicitud de registro dentro del territorio nacional. Rechazado o anulado el registro por esta causal, el usuario de la marca deberá solicitar su inscripción en un plazo de 90 días. Si así no lo hiciera, la marca podrá ser solicitada por cualquier persona, teniendo prioridad dentro de los 90 días siguientes a la expiración del derecho del usuario, aquélla a quien se le hubiera rechazado la solicitud o anulado el registro.

        No obstante lo dispuesto en el párrafo primero de esta letra, el Departamento podrá aceptar los acuerdos de coexistencia de marcas, siempre que no transgredan derechos adquiridos por terceros con anterioridad o induzcan a confusión al público consumidor.

        i) La forma o el color de los productos o de los envases, además del color en sí mismo.

        j) Las que puedan inducir a error o confusión en el público consumidor, respecto de la procedencia o atributos del producto que pretende distinguir en Chile una Indicación Geográfica o Denominación de Origen.

        k) Las contrarias al orden público, a la moral o a las buenas costumbres, comprendidas en éstas los principios de competencia l eal y ética mercantil.

        Artículo 20 bis.- En el caso de que una marca haya sido solicitada previamente en el extranjero, el interesado tendrá prioridad por el plazo de seis meses contado desde la fecha de su presentación en el país de origen, para presentar la solicitud en Chile.

        Artículo 21.- El registro de marcas comerciales se llevará en el Departamento y las solicitudes de inscripción se presentarán ajustándose a las prescripciones y en la forma que establezca el reglamento.

        Toda solicitud que enumere varias clases de productos y/o servicios, denominada en adelante “solicitud inicial”, podrá ser dividida, a petición del solicitante, en dos o más solicitudes, denominadas en adelante “solicitudes divisionales”. Para este efecto, el solicitante deberá indicar en cada una de ellas la distribución de los productos y/o servicios. Las solicitudes divisionales conservarán la fecha de presentación de la solicitud inicial y el beneficio del derecho de prioridad, si lo hubiere. Las solicitudes divisionales darán lugar a los pagos respectivos que correspondan, como si se tratara de una nueva solicitud.

        La petición para dividir la solicitud para el registro de una marca comercial puede formularse hasta antes de la decisión final del Instituto sobre la solicitud inicial de su registro, ya sea que se trate de una solicitud con o sin juicio de oposición en trámite. Asimismo, la petición podrá presentarse durante la apelación o reclamación contra la decisión relativa al registro de la marca.

        Los registros de marcas comerciales vigentes siempre podrán ser divididos. En aquellos casos en que se esté impugnando su validez ante el Instituto o durante la apelación en un juicio de nulidad de una marca registrada, se podrá solicitar su división en términos similares a los señalados en los incisos precedentes.

        Durante la tramitación de una observación de fondo, procedimiento de oposición, de nulidad, o de otro recurso pendiente, la división de la solicitud o del registro, sólo será procedente cuando, como resultado de la división, la observación de fondo, el juicio de oposición, el juicio de nulidad o el recurso de que se trate, queden circunscritos a una de las solicitudes o uno de los registros divididos.

        Artículo 22.- Presentada una solicitud, el Conservador de Marcas verificará que se haya cumplido con las formalidades exigidas para la validez de la presentación. Si en este examen formal el Conservador de Marcas detectare algún error u omisión, apercibirá al interesado para que realice las correcciones o aclaraciones pertinentes dentro del término de 30 días, sin que por ello pierda su fecha de prioridad. De no mediar la corrección dentro del plazo señalado, la solicitud se tendrá por abandonada. De la resolución que declara abandonada la solicitud, se podrá reclamar ante el Jefe del Departamento de acuerdo a las normas generales. De no mediar la corrección o no aceptada la reclamación, la solicitud se tendrá por abandonada.

        Si el Jefe del Departamento acepta a tramitación una solicitud, ella no podrá ser posteriormente rechazada de oficio por la misma razón y fundamento legal de que conoció tal funcionario por la vía de la reclamación.

        Si para salvar la objeción de que ha sido objeto una solicitud se requiere la realización de otros trámites, el solicitante tiene derecho a pedir que se suspenda el procedimiento, hasta la conclusión de los mismos. Si los trámites que han servido de fundamento a la petición no se iniciaran dentro de 60 días, a partir de la fecha en que ello sea legalmente posible, la solicitud se tendrá por abandonada.

        Vencido el plazo para deducir oposiciones, el Jefe del Departamento hará un análisis de fondo de la solicitud e indicará si existen causales para el rechazo de oficio de la petición.

        De estas observaciones se dará traslado al solicitante quien deberá responderlas en el mismo plazo para contestar las oposiciones y conjuntamente con ellas si se hubieran presentado.

        Vencido el plazo señalado y habiéndose cumplido con las demás diligencias ordenadas en el procedimiento, el Jefe del Departamento dictará su resolución final pronunciándose sobre la aceptación o rechazo de la solicitud. En este caso, la solicitud no podrá ser rechazada por una causal diferente de las contenidas en las oposiciones o en las observaciones del Jefe del Departamento.

        Artículo 23.- Cada marca sólo podrá solicitarse para productos o servicios específicos y determinados, con la indicación de la o las clases del Clasificador Internacional a que pertenecen.

        Podrá solicitarse marcas para distinguir establecimientos comerciales o industriales de fabricación o comercialización asociados a productos específicos y determinados de una o varias clases; y frases de propaganda para aplicarse en publicidad de marcas ya inscritas.

        Cuando se hayan incluido en una única solicitud productos y/o servicios que pertenezcan a varias clases de la Clasificación Internacional de Niza, dicha solicitud dará por resultado un registro único.

        Artículo 23 bis A.- Para los efectos del pago de derechos, la solicitud o inscripción de una marca para productos y servicios se tendrá como una solicitud o registro distinto por cada clase, cualquiera sea el número de productos o servicios específicos incluidos en cada una. Lo establecido en el artículo anterior será igualmente aplicable a las diversas clases de productos comprendidos en la cobertura de los establecimientos industriales y comerciales. Dicho principio será extensivo tanto a los registros nuevos como a las renovaciones de los registros.

        Artículo 23 bis B.- Los registros de marcas que distinguen productos, servicios y establecimientos industriales tendrán validez para todo el territorio de la República.

        Los registros de marcas que protejan establecimientos comerciales servirán sólo para la región en que estuviera ubicado el establecimiento. Si el interesado quisiera hacer extensiva a otras regiones la propiedad de la misma marca, lo indicará en su solicitud de registro, debiendo pagar el derecho correspondiente a una solicitud y a una inscripción por cada región.

        Artículo 24.- El registro de una marca tendrá una duración de diez años, contados desde la fecha de su inscripción en el registro respectivo. El titular tendrá el derecho de pedir su renovación por períodos iguales, durante su vigencia o dentro de los 30 días siguientes a la expiración de dicho plazo.

        Artículo 25.- Toda marca inscrita y que se use en el comercio deberá llevar en forma visible las palabras “Marca Registrada” o las iniciales “M.R.” o la letra “R” dentro de un círculo. La omisión de este requisito no afecta la validez de la marca registrada, pero quienes no cumplan con esta disposición no podrán hacer valer las acciones penales a que se refiere esta ley.

        Artículo 26.- Procede la declaración de nulidad del registro de marcas comerciales cuando se ha infringido alguna de las prohibiciones establecidas en el artículo 20 de esta ley.

        Artículo 27.- La acción de nulidad del registro de una marca prescribirá en el término de 5 años, contado desde la fecha del registro.

        La referida acción de nulidad no prescribirá respecto de los registros obtenidos de mala fe.

        Artículo 28.- Serán condenados a pagar una multa a beneficio fiscal de 25 a 1.000 unidades tributarias mensuales:

        a) Los que maliciosamente usen, con fines comerciales, una marca igual o semejante a otra ya inscrita para los mismos productos, servicios o establecimientos o respecto de productos, servicios o establecimientos relacionados con aquellos que comprende la marca registrada. Lo anterior se entenderá sin perjuicio de lo dispuesto en el artículo 19 bis E.

        b) Los que usen, con fines comerciales, una marca no inscrita, caducada o anulada, con las indicaciones correspondientes a una marca registrada o simulando aquéllas.

        c) Los que, con fines comerciales, hagan uso de envases o embalajes que lleven una marca registrada, sin tener derecho a usarla y sin que ésta haya sido previamente borrada, salvo que el embalaje marcado se destine a envasar productos diferentes y no relacionados con los que protege la marca.

        Al que reincida dentro de los cinco años siguientes a la aplicación de una multa, se le aplicará otra que no podrá ser inferior al doble de la anterior y cuyo monto máximo podrá llegar a 2.000 unidades tributarias mensuales.

        Artículo 29.- Los condenados de acuerdo al artículo anterior serán obligados al pago de las costas y de los daños y perjuicios causados al dueño de la marca.

        Los utensilios y los elementos directamente empleados para la falsificación o imitación y los objetos con marcas falsificadas caerán en comiso. Tratándose de objetos con marca falsificada, se procederá a su destrucción. En el caso de los utensilios o elementos utilizados, será facultad del juez competente decidir sobre su destino, pudiendo ordenar su destrucción o distribución benéfica.

        Artículo 30.- Cuando una marca no registrada estuviera usándose por dos o más personas a la vez, el que la inscribiera no podrá perseguir la responsabilidad de los que continuaran usándola hasta que hayan transcurrido, a lo menos, 180 días desde la fecha de la inscripción.

        De igual manera, anulada una marca, el titular del registro que sirvió de base para pronunciar la nulidad, no podrá perseguir la responsabilidad respecto del titular del registro anulado hasta que hayan transcurrido, a lo menos, 180 días contados desde que la sentencia respectiva quedó ejecutoriada.

    TITULO III. De las invenciones

    Párrafo I. De las Invenciones en general

        Artículo 31.- Se entiende por invención toda solución a un problema de la técnica que origine un quehacer industrial. La invención podrá ser un producto o un procedimiento o estar relacionada con ellos.

        Se entiende por patente el derecho exclusivo que concede el Estado para la protección de una invención. Los efectos, obligaciones y limitaciones inherentes a la patente están determinados por esta ley.

        Artículo 31 bis.- En el ejercicio de las acciones civiles sobre infracción en materia de patentes de procedimiento, el juez estará facultado para ordenar que el demandado pruebe que ha empleado un procedimiento diferente al patentado, a condición de que el producto obtenido por el procedimiento patentado sea nuevo.

        En estos procesos se presumirá, salvo prueba en contrario, que todo producto idéntico ha sido obtenido por medio del procedimiento patentado.

        Para efectos de este artículo el producto se entenderá nuevo si, al menos, cumple con el requisito de novedad del artículo 33 a la fecha en que se haya presentado la solicitud de patente de procedimiento en Chile o a la fecha de prioridad validada en Chile, conforme al artículo 34. Para dicha calificación, el juez solicitará informe al jefe del Departamento, a costa del solicitante.

        Con todo, en la presentación de pruebas en contrario, se tendrán en cuenta los intereses legítimos del demandado en cuanto a la protección de sus secretos industriales y comerciales.

        Artículo 32.- Las patentes podrán obtenerse para todas las invenciones, sean de productos o de procedimientos, en todos los campos de la tecnología, siempre que sean nuevas, tengan nivel inventivo y sean susceptibles de aplicación industrial.

        Artículo 33.- Una invención se considera nueva, cuando no existe con anterioridad en el estado de la técnica. El estado de la técnica comprenderá todo lo que haya sido divulgado o hecho accesible al público, en cualquier lugar del mundo, mediante una publicación en forma tangible, la venta o comercialización, el uso o cualquier otro medio, antes de la fecha de presentación de la solicitud de patente en Chile o de la prioridad reclamada según el artículo 34.

        También quedará comprendido dentro del estado de la técnica, el contenido de las solicitudes nacionales de patentes o modelos de utilidad tal como hubiesen sido originalmente presentadas, cuya fecha de presentación sea anterior a la señalada en el inciso precedente y que hubieren sido publicadas en esa fecha o en otra posterior.

        Artículo 34.- En caso que una patente haya sido solicitada previamente en el extranjero, el interesado tendrá prioridad por el plazo de un año, contado desde la fecha de su presentación en el país de origen, para presentar la solicitud en Chile.

        Artículo 35.- Se considera que una invención tiene nivel inventivo, si, para una persona normalmente versada en la materia técnica correspondiente, ella no resulta obvia ni se habría derivado de manera evidente del estado de la técnica.

        Artículo 36.- Se considera que una invención es susceptible de aplicación industrial cuando su objeto pueda, en principio, ser producido o utilizado en cualquier tipo de industria. Para estos efectos, la expresión industria se entenderá en su más amplio sentido, incluyendo a actividades tales como: manufactura, minería, construcción, artesanía, agricultura, silvicultura, y la pesca.

        Artículo 37.- No se considera invención y quedarán excluidos de la protección por patente de esta ley:

        a) Los descubrimientos, las teorías científicas y los métodos matemáticos.

        b) Las plantas y los animales, excepto los microorganismos que cumplan las condiciones generales de patentabilidad. Las variedades vegetales sólo gozarán de protección de acuerdo con lo dispuesto por la ley nº 19.342, sobre Derechos de Obtentores de Nuevas Variedades Vegetales. Tampoco son patentables los procedimientos esencialmente biológicos para la producción de plantas y animales, excepto los procedimientos microbiológicos. Para estos efectos, un procedimiento esencialmente biológico es el que consiste íntegramente en fenómenos naturales, como los de cruce y selección.

        c) Los sistemas, métodos, principios o planes económicos, financieros, comerciales, de negocios o de simple verificación y fiscalización; y los referidos a las actividades puramente mentales o intelectuales o a materias de juego.

        d) Los métodos de tratamiento quirúrgico o terapéutico del cuerpo humano o animal, así como los métodos de diagnóstico aplicados al cuerpo humano o animal, salvo los productos destinados a poner en práctica uno de estos métodos.

        e) El nuevo uso, el cambio de forma, el cambio de dimensiones, el cambio de proporciones o el cambio de materiales de artículos, objetos o elementos conocidos y empleados con determinados fines. Sin perjuicio de lo anterior, podrá constituir invención susceptibles de protección el nuevo uso de artículos, objetos o elementos conocidos, siempre que dicho nuevo uso resuelva un problema técnico sin solución previa equivalente, cumpla con los requisitos a que se refiere el artículo 32 y requiera de un cambio en las dimensiones, en las proporciones o en los materiales del artículo, objeto o elemento conocido para obtener la citada solución a dicho problema técnico. El nuevo uso reivindicado deberá acreditarse mediante evidencia experimental en la solicitud de patente.

        f) Parte de los seres vivos tal como se encuentran en la naturaleza, los procesos biológicos naturales, el material biológico existente en la naturaleza o aquel que pueda ser aislado, inclusive genoma o germoplasma. Sin embargo, serán susceptibles de protección los procedimientos que utilicen uno o más de los materiales biológicos antes enunciados y los productos directamente obtenidos por ellos, siempre que satisfagan los requisitos establecidos en el artículo 32 de la presente ley, que el material biológico esté adecuadamente descrito y que la aplicación industrial del mismo figure explícitamente en la solicitud de patente.

        Artículo 38.- No son patentables las invenciones cuya explotación comercial deba impedirse necesariamente para proteger el orden público, la seguridad del Estado, la moral y las buenas costumbres, la salud o la vida de las personas o de los animales, o para preservar los vegetales o el medio ambiente, siempre que esa exclusión no se haga sólo por existir una disposición legal o administrativa que prohíba o que regule dicha explotación.

        Artículo 39.- Las patentes de invención se concederán por un periodo no renovable de 20 años, contado desde la fecha de presentación de la solicitud.

        Artículo 40.- Derogado.

        Artículo 41.- Derogado.

        Artículo 42.- No serán consideradas para efectos de determinar la novedad de la invención ni el nivel inventivo, las divulgaciones efectuadas dentro de los doce meses anteriores a la presentación de la solicitud, si la divulgación pública:

        a) fue hecha, autorizada o deriva del solicitante de la patente, o

        b) ha sido hecha con motivo o deriva de abusos y prácticas desleales de las que hubiese sido objeto el solicitante o su causante.

        Artículo 43.- Con la solicitud de patente deberán acompañarse los siguientes documentos:

    –    Un resumen del invento.

    –    Una memoria descriptiva del invento.

    –    Pliego de reivindicaciones.

    –    Dibujos del invento, cuando procediera.

        Artículo 43 bis.- El resumen tendrá una finalidad exclusivamente técnica y no podrá ser considerado para ningún otro fin, ni siquiera para la determinación del ámbito de la protección solicitada.

        Las reivindicaciones definen el objeto para el que se solicita la protección. Estas deben ser claras y concisas y han de fundarse en la memoria descriptiva.

        La memoria descriptiva deberá ser clara y completa de forma tal de permitir a un experto o perito en la materia reproducir el invento sin necesidad de otros antecedentes.

        Artículo 44.- Las declaraciones de novedad, propiedad y utilidad de la invención, corresponden al interesado, quien las hará bajo su responsabilidad.

        La concesión de una patente no significa que el Estado garantice la necesidad y exactitud de las manifestaciones que se hagan por el peticionario en la solicitud y en la memoria descriptiva.

        Artículo 45.- Ingresada la solicitud al Departamento, se practicará un examen preliminar, destinado a verificar que se hayan acompañado los documentos señalados en el artículo 43. Si en el examen preliminar se detectara algún error u omisión, se apercibirá al interesado para que realice las correcciones, aclaraciones o acompañe los documentos pertinentes dentro del término de sesenta días, sin que por ello pierda su fecha de prioridad. De no subsanarse los errores u omisiones dentro del plazo señalado, la solicitud se tendrá por no presentada.

        Las solicitudes que no cumplan con alguna otra exigencia de tramitación, dentro de los plazos señalados en esta ley o su reglamento, se tendrán por abandonadas, procediéndose a su archivo. Sin perjuicio de lo anterior, el solicitante podrá requerir su desarchivo siempre que subsane las exigencias de tramitación dentro de los ciento veinte días siguientes, contados desde la fecha del abandono, sin que pierda el derecho de prioridad. Vencido el plazo sin que se hayan subsanado los errores u omisiones, la solicitud se tendrá por abandonada definitivamente.

        Cuando del examen de una solicitud de derecho de propiedad industrial se deduzca que el derecho reclamando corresponde a otra categoría, será analizada y tratado como tal, conservando la prioridad adquirida.

        Artículo 46.- Los peticionarios de patentes ya solicitadas en el extranjero deberán presentar el resultado de la búsqueda y examen practicado por la oficina extranjera, en el caso en que se hubieren evacuado, hayan o no devenido en la concesión de la patente.

        Artículo 47.- La totalidad de los antecedentes de la patente solicitada se mantendrán en el Departamento a disposición del público, después de la publicación a que se refiere el artículo 4º.

        Artículo 48.- Una vez aprobada la concesión y después de acreditarse el pago de los derechos correspondientes se concederá la patente al interesado y se emitirá un certificado que otorgará protección a contar de la fecha en que se presentó la solicitud.

        Artículo 49.- El dueño de una patente de invención gozará de exclusividad para producir, vender o comercializar, en cualquier forma, el producto u objeto del invento y, en general, realizar cualquier otro tipo de explotación comercial del mismo.

        En las patentes de procedimiento, la protección alcanza a los productos obtenidos directamente por dicho procedimiento.

        El alcance de la protección otorgada por la patente o la solicitud de patente se determinará por el contenido de las reivindicaciones. La memoria descriptiva y los dibujos servirán para interpretar las reivindicaciones.

        El derecho de patente se extenderá a todo el territorio de la República hasta el día en que expire el plazo de concesión de la patente.

        La patente de invención no confiere el derecho de impedir que terceros comercialicen el producto amparado por la patente, que ellos hayan adquirido legítimamente después de que ese producto se haya introducido legalmente en el comercio de cualquier país por el titular del derecho o por un tercero, con el consentimiento de aquél.

        La patente de invención no confiere el derecho de impedir que terceros importen, exporten, fabriquen o produzcan la materia protegida por una patente con el objeto de obtener el registro o autorización sanitaria de un producto farmacéutico. Lo anterior no faculta para que dichos productos sean comercializados sin autorización del titular de la patente.

        Artículo 50.- Procederá la declaración de nulidad de una patente de invención por alguna de las causales siguientes:

        a) Cuando quien haya obtenido la patente no es el inventor ni su cesionario.

        b) Cuando la concesión se ha basado en informes periciales errados o manifiestamente deficientes.

        c) Cuando el registro se ha concedido contraviniendo las normas sobre patentabilidad y sus requisitos, de acuerdo con lo dispuesto en esta ley.

        La acción de nulidad de una patente de invención prescribirá en el término de cinco años, contado desde el registro de la misma.

        Artículo 51.- Procederá pronunciarse respecto de una solicitud de licencia no voluntaria en los siguientes casos:

        1) Cuando el titular de la patente haya incurrido en conductas o prácticas declaradas contrarias a la libre competencia, en relación directa con la utilización o explotación de la patente de que se trate, según decisión firme o ejecutoriada del Tribunal de Defensa de la Libre Competencia.

        2) Cuando por razones de salud pública, seguridad nacional, uso público no comercial, o de emergencia nacional u otras de extrema urgencia, declaradas por la autoridad competente, se justifique el otorgamiento de dichas licencias.

        3) Cuando la licencia no voluntaria tenga por objeto la explotación de una patente posterior que no pudiera ser explotada sin infringir una patente anterior. La concesión de licencias no voluntarias por patentes dependientes quedará sometida a las siguientes normas:

        a) La invención reivindicada en la patente posterior debe comprender un avance técnico de significación económica considerable respecto a la invención reivindicada en la primera patente.

        b) La licencia no voluntaria para explotar la patente anterior sólo podrá transferirse con la patente posterior.

        c) El titular de la patente anterior podrá, en las mismas circunstancias, obtener una licencia no voluntaria en condiciones razonables para explotar la invención reivindicada en la patente posterior.

        Tratándose de tecnología de semiconductores, la licencia sólo se podrá otorgar para fines públicos no comerciales o para rectificar la práctica declarada contraria a la competencia.

        Artículo 51 bis A.- La persona que solicite una licencia no voluntaria, deberá acreditar que pidió previamente al titular de la patente una licencia contractual, y que no pudo obtenerla en condiciones y plazo razonables. No se exigirá este requisito respecto de la causal establecida en el nº 2 del artículo 51 de esta ley. Tampoco se exigirá este requisito cuando la licencia no voluntaria tenga por objetivo poner término a prácticas consideradas contrarias a la competencia.

        Artículo 51 bis B.- La solicitud para el otorgamiento de una licencia no voluntaria constituirá una demanda y deberá contener todos los requisitos del artículo 254 del Código de Procedimiento Civil. Conocerán de ella:

        1. En el caso del artículo 51, nº 1), el Tribunal de Defensa de la Libre Competencia, conforme al procedimiento previsto en la ley nº 19.911.

        2. En el caso del artículo 51, nº 2), el Jefe del Departamento de Propiedad Industrial, conforme al procedimiento para nulidad de patentes establecido en esta ley. Además, por resolución fundada, resolviendo un incidente especial, podrá acceder provisoriamente a la demanda. Esta resolución se mantendrá en vigor mientras duren los hechos que fundadamente la motivaron o hasta la sentencia de término.

        3. En el caso del artículo 51, nº 3), el juez de letras en lo civil, según las normas de competencia del Código de Procedimiento Civil y de acuerdo al procedimiento sumario.

        Artículo 51 bis C.- La autoridad competente deberá pronunciarse sobre la solicitud de licencia no voluntaria en función de las circunstancias propias de ésta.

        En el caso de que dicho pronunciamiento sea positivo, el Tribunal de Defensa de la Libre Competencia, el Jefe del Departamento o el juez de letras en lo civil, según se trate del caso previsto en los números 1, 2 ó 3 del artículo 51, deberá, por un lado, fijar la duración y el alcance de la licencia, limitándola para los fines para los cuales fue concedida y, por el otro, el monto de la remuneración que pagará periódicamente el licenciatario al titular de la patente. La licencia otorgada por este procedimiento será de carácter no exclusivo y no podrá cederse, salvo con aquella parte de la empresa titular de la patente.

        Artículo 51 bis D.- La licencia no voluntaria podrá ser dejada sin efecto, total o parcialmente, a reserva de los intereses legítimos del licenciatario, si las circunstancias que dieron origen a ella hubieran desaparecido y no es probable que vuelvan a surgir. El Tribunal de Defensa de la Libre Competencia, el Jefe del Departamento o el juez de letras en lo civil, según sea el caso, previa consulta a la autoridad competente, cuando corresponda, estará facultado para examinar, mediando petición fundada, si dichas circunstancias siguen existiendo.

        No se acogerá la solicitud de revocación de una licencia no voluntaria si fuese probable que se repitieran las circunstancias que dieron origen a su concesión. De igual manera el Tribunal de Defensa de la Libre Competencia, el Jefe del Departamento o el juez de letra en lo civil, según sea el caso, a solicitud de una parte interesada, podrá modificar una licencia no voluntaria cuando nuevos hechos o circunstancias lo justifiquen, en particular cuando el titular de la patente hubiese otorgado licencias contractuales en condiciones más favorables que las acordadas para el beneficiario de la licencia no voluntaria.

        En los procedimientos de solicitud de licencia no voluntaria, en los casos previstos en los números 1 y 3 del artículo 51, deberá ser oído el Departamento antes de dictar sentencia.

        Artículo 52.- Serán condenados a pagar una multa a beneficio fiscal de veinticinco a mil unidades tributarias mensuales:

        a) Los que maliciosamente fabriquen, utilicen, ofrezcan o introduzcan en el comercio un invento patentado, o lo importen o estén en posesión del mismo, con fines comerciales. Lo anterior se entenderá sin perjuicio de lo dispuesto en el inciso quinto del artículo 49.

        b) Los que, con fines comerciales, usen un objeto no patentado, o cuya patente haya caducado o haya sido anulada, empleando en dicho objeto las indicaciones correspondientes a una patente de invención o simulándolas.

        c) Los que maliciosamente, con fines comerciales, hagan uso de un procedimiento patentado.

        d) Los que maliciosamente imiten o hagan uso de un invento con solicitud de patente en trámite, a menos de que, en definitiva, la patente no sea concedida.

        Los condenados de acuerdo a este artículo serán obligados al pago de las costas, daños y perjuicios causados al titular de la patente.

        Los utensilios y los elementos directamente empleados en la comisión de cualquiera de los delitos mencionado en este artículo y los objetos producidos en forma ilegal caerán en comiso. Tratándose de objetos producidos en forma ilegal, se procederá a su destrucción. En el caso de los utensilios o elementos utilizados, será facultad del juez competente decidir sobre su destino, pudiendo ordenar su destrucción o su distribución benéfica.

        Al que reincida dentro de los cinco años siguientes a la aplicación de una multa, se le aplicará otra que no podrá ser inferior al doble de la anterior y cuyo monto máximo podrá llegar a dos mil unidades tributarias mensuales.

        Artículo 53.- Todo objeto patentado deberá llevar la indicación del número de la patente, ya sea en el producto mismo o en el envase, y deberá anteponerse en forma visible la expresión “Patente de Invención” o las iniciales “P.I.” y el número del registro.

        Se exceptúan de la obligación establecida en el inciso anterior, los procedimientos en los cuales por su naturaleza, no es posible aplicar esta exigencia.

        La omisión de este requisito no afectará la validez de la patente. Pero quienes no cumplan con esta disposición, no podrán ejercer las acciones penales a que se refiere esta ley.

        Cuando existan solicitudes en trámite, se deberá indicar esa situación, en el caso de que se fabriquen o comercialicen con fines comerciales los productos a los que afecte dicha solicitud.

            Párrafo II. De la Protección Suplementaria

        Artículo 53 Bis 1.- Dentro de los seis meses de otorgada una patente, el titular tendrá derecho a requerir un término de Protección Suplementaria, siempre que hubiese existido demora administrativa injustificada en el otorgamiento de la patente y el plazo en el otorgamiento hubiese sido superior a cinco años, contado desde la fecha de presentación de la solicitud o de tres años contados desde el requerimiento de examen, cualquiera de ellos que sea posterior. La protección suplementaria se extenderá sólo por el período acreditado como demora administrativa injustificada.

        Artículo 53 Bis 2.- Dentro de los seis meses de otorgado un registro sanitario de un producto farmacéutico protegido por una patente, el titular tendrá derecho a requerir un término de Protección Suplementaria para aquella parte de la patente que contiene el producto farmacéutico, siempre que haya existido demora injustificada en el otorgamiento del señalado registro. Podrán requerir esta protección suplementaria, aquellos titulares cuya autorización o registro sanitario haya sido otorgado después de un año contado desde la fecha de presentación de la solicitud. La protección suplementaria se extenderá sólo por el período acreditado como demora injustificada por parte del órgano administrativo encargado de resolver dicho registro.

        Artículo 53 Bis 3.- No constituyen demoras injustificadas, aquellas que afecten a las solicitudes de patentes o las de registro sanitario atribuibles a:

        a) La oposición o cualquier recurso o acción de orden judicial;

        b) La espera de informes o diligencias de organismos o agencias nacionales e internacionales requeridos para el trámite de registro de la patente, y

        c) Acciones u omisiones del solicitante.

        Artículo 53 Bis 4.- La solicitud de Protección Suplementaria será presentada ante el Tribunal de Propiedad Industrial, quien resolverá sobre la existencia de demoras injustificadas y la extensión de

    éstas en única instancia, de conformidad al procedimiento establecido para el recurso de apelación. La resolución que así lo declare, tendrá como único efecto la ampliación del plazo de protección y no dará origen a responsabilidad de ninguna especie.

        Previo a la vista de la causa, el Tribunal ordenará se oficie al organismo respectivo, a fin de que emita su opinión dentro del plazo de sesenta días.

        Artículo 53 Bis 5.- El término de protección suplementaria deberá ser anotado al margen del registro respectivo, previo pago de una tasa de 1 UTM por cada año o fracción de año de protección adicional. El pago sólo se podrá efectuar dentro de los seis meses que preceden al vencimiento del plazo original de vigencia de la patente, sin el cual, no se tendrá la protección establecida en este título.

     TITULO IV. De los modelos de utilidad

        Artículo 54.- Se considerarán como modelos de utilidad los instrumentos, aparatos, herramientas, dispositivos y objetos o partes de los mismos, en los que la forma sea reivindicable, tanto en su aspecto externo como en su funcionamiento, y siempre que ésta produzca una utilidad, esto es, que aporte a la función a que son destinados un beneficio, ventaja o efecto técnico que antes no tenía.

        Artículo 55.- Las disposiciones del título III, relativas a las patentes de invención, son aplicables, en cuanto corresponda, a las patentes de modelo de utilidad, sin perjuicio de las disposiciones especiales contenidas en el presente título.

        Artículo 56.- Un modelo de utilidad será patentable cuando sea nuevo y susceptible de aplicación industrial.

        No se concederá una patente cuando el modelo de utilidad solamente presente diferencias menores o secundarias que no aporten ninguna característica utilitaria discernible con respecto a invenciones o a modelos de utilidad anteriores.

        La solicitud de patente de modelo de utilidad sólo podrá referirse a un objeto individual, sin perjuicio de que puedan reivindicarse varios elementos o aspectos de dicho objeto en la misma solicitud.

        Artículo 57.- Las patentes de modelo de utilidad se concederán por un período no renovable de 10 años, contado desde la fecha de la solicitud.

        Artículo 58.- Con la solicitud de modelo de utilidad deberán acompañarse los siguientes documentos:

    –    Un resumen del modelo de utilidad.

    –    Una memoria descriptiva del modelo de utilidad.

    –    Pliego de reivindicaciones.

    –    Dibujos del modelo de utilidad.

        Ingresada la solicitud al Departamento se practicará un examen preliminar, en el cual se verificará que se hayan acompañado los documentos señalados precedentemente.

        Artículo 59.- Todo modelo de utilidad deberá llevar en forma visible la expresión “Modelo de Utilidad” o las iniciales “M.U.”, y el número del registro. Estas indicaciones se podrán poner en el envase, siempre que sea de aquellos que se presentan al consumidor sellados, de manera que sea necesario destruirlos para acceder al producto. La omisión de este requisito no afecta la validez del modelo de utilidad, pero priva a su titular de la facultad de hacer valer las acciones penales establecidas en esta ley.

        Artículo 60.- La declaración de nulidad de las patentes de modelo de utilidad procede por las mismas causales señaladas en el artículo 50.

        Artículo 61.- Serán condenados a pagar una multa a beneficio fiscal de 25 a 1.000 unidades tributarias mensuales:

        a) Los que maliciosamente fabriquen, comercialicen, importen o utilicen, con fines comerciales, un modelo de utilidad registrado. Lo anterior se entenderá sin perjuicio de lo establecido en el inciso quinto del artículo 49, que será igualmente aplicable a esta categoría de derechos.

        b) Los que, con fines comerciales, usen las indicaciones correspondientes a un modelo de utilidad cuyo registro haya sido caducado o anulado, y los que, con los mismos fines, las simulen, cuando no exista registro.

        Los condenados de acuerdo a este artículo serán obligados al pago de las costas, daños y perjuicios causados al titular del modelo de utilidad.

        Los utensilios y los elementos directamente empleados en la comisión de cualesquiera de los delitos mencionados en este artículo y los objetos producidos en forma ilegal caerán en comiso. Tratándose de objetos producidos en forma ilegal, se procederá a su destrucción. En el caso de los utensilios o elementos utilizados, será facultad del juez competente decidir sobre su destino, pudiendo ordenar su destrucción o su distribución benéfica.

        Al que reincida dentro de los cinco años siguientes a la aplicación de una multa, se le aplicará otra que no podrá ser inferior al doble de la anterior y cuyo monto máximo podrá llegar a 2.000 unidades tributarias mensuales.

    TITULO V. De los dibujos y diseños industriales

        Artículo 62.- Bajo la denominación de diseño industrial se comprende toda forma tridimensional asociada o no con colores, y cualquier artículo industrial o artesanal que sirva de patrón para la fabricación de otras unidades y que se distinga de sus similares, sea por su forma, configuración geométrica, ornamentación o una combinación de éstas, siempre que dichas características le den una apariencia especial perceptible por medio de la vista, de tal manera que resulte una fisonomía nueva.

        Bajo la denominación de dibujo industrial se comprende toda disposición, conjunto o combinación de figuras, líneas o colores que se desarrollen en un plano para su incorporación a un producto industrial con fines de ornamentación y que le otorguen, a ese producto, una apariencia nueva.

        Los dibujos y diseños industriales se considerarán nuevos en la medida que difieran de manera significativa de dibujos o diseños industriales conocidos o de combinaciones de características de dibujos o diseños industriales conocidos.

        Los envases quedan comprendidos entre los artículos que pueden protegerse como diseños industriales, siempre que reúnan la condición de novedad antes señalada.

        Los estampados en géneros, telas o cualquier material laminar quedan comprendidos entre los artículos que pueden protegerse como dibujos industriales, siempre que reúnan la condición de novedad antes señalada.

        Artículo 62 bis.- La protección conferida a los dibujos y diseños industriales establecida en esta ley se entenderá sin perjuicio de aquella que pueda otorgárseles en virtud de las normas de la ley nº 17.336.

        Artículo 62 ter.- No podrán registrarse como diseños o dibujos industriales aquéllos cuya apariencia está dictada enteramente por consideraciones de orden técnico o funcional, sin que se añada aporte arbitrario alguno por parte del diseñador.

        Además, no podrán registrarse como diseños industriales los productos de indumentaria de cualquier naturaleza y aquellos que consistan en una forma cuya reproducción exacta sea necesaria para permitir que el producto que incorpora el diseño sea montado mecánicamente o conectado con otro producto del cual forme parte. Esta prohibición no se aplicará tratándose de productos en los cuales el diseño radique en una forma destinada a permitir el montaje o la conexión múltiple de los productos, o su conexión dentro de un sistema modular.

        Artículo 63.- Las disposiciones del Título III, relativas a las patentes de invención, son aplicables, en cuanto corresponda, a los dibujos y diseños industriales, sin perjuicio de las disposiciones especiales contenidas en el presente Título. En lo que respecta al derecho de prioridad, éste se regirá por lo dispuesto en el artículo 20 bis de esta ley.

        La declaración de nulidad de los dibujos y diseños industriales procede por las mismas causales señaladas en el artículo 50 de esta ley.

        Artículo 64.- Con la solicitud de dibujo o diseño industrial deberán acompañarse los siguientes documentos:

    –    Solicitud.

    –    Memoria descriptiva.

    –    Dibujo.

    –    Prototipo o maqueta, cuando procediera.

        Ingresada la solicitud al Departamento se practicará un examen preliminar, en el cual se verificará que se hayan acompañado los documentos señalados precedentemente.

        Artículo 65.- El registro de un dibujo o diseño industrial se otorgará por un período no renovable de 10 años, contado desde la fecha de su solicitud.

        Artículo 66.- Todo dibujo y diseño industrial deberá llevar en forma visible la expresión “Dibujo Industrial” o “Diseño Industrial” o las iniciales “D.I.” y el número del registro. Estas indicaciones se podrán poner en el envase, siempre que sea de aquellos que se presentan al consumidor sellados, de manera que sea necesario destruirlos para acceder al producto.

        La omisión de dicho requisito no afectará la validez del dibujo o diseño industrial, pero priva a su titular de la facultad de hacer valer las acciones penales establecidas en el artículo siguiente.

        Artículo 67.- Serán condenados a pagar una multa a beneficio fiscal de 25 a 1.000 unidades tributarias mensuales:

        a) Los que maliciosamente fabriquen, comercialicen, importen o utilicen, con fines comerciales, un dibujo o diseño industrial registrado. Lo anterior se entenderá sin perjuicio de lo establecido en el inciso quinto del artículo 49, que será igualmente aplicable a esta categoría de derechos.

        b) Los que, con fines comerciales, usen las indicaciones correspondientes a un dibujo o diseño industrial registrado, o las simulen cuando no exista dicho registro o esté caducado o anulado.

        Los condenados de acuerdo a este artículo serán obligados al pago de las costas, daños y perjuicios causados al titular del dibujo o diseño industrial.

        Los utensilios y los elementos directamente empleados en la comisión de cualesquiera de los delitos mencionados en este artículo y los objetos producidos en forma ilegal caerán en comiso. Tratándose de objetos producidos en forma ilegal, se procederá a su destrucción. En el caso de los utensilios o elementos utilizados, será facultad del juez competente decidir sobre su destino, pudiendo ordenar su destrucción o su distribución benéfica.

        Al que reincida dentro de los cinco años siguientes a la aplicación de una multa, se le aplicará otra que no podrá ser inferior al doble de la anterior y cuyo monto máximo podrá llegar a 2.000 unidades tributarias mensuales.

     TITULO VI. De las invenciones en servicio

        Artículo 68.- En los contratos de trabajo y prestación de servicios, cuya naturaleza sea el cumplimiento de una actividad inventiva o creativa, la facultad de solicitar el registro así como los eventuales derechos de propiedad industrial, pertenecerán exclusivamente al empleador o a quien encargó el servicio, salvo estipulación expresa en contrario.

        Artículo 69.- El trabajador que, según su contrato de trabajo, no se encuentra obligado a realizar una función inventiva o creativa, tendrá la facultad de solicitar el registro, así como los eventuales derechos de propiedad industrial derivados de las invenciones realizadas por él, los que le pertenecerán en forma exclusiva.

        Sin embargo, si para llevar a cabo la invención se hubiera beneficiado de modo evidente de los conocimientos adquiridos dentro de la empresa y utilizara medios proporcionados por ésta, tales facultades y derechos pertenecerán al empleador, en cuyo caso éste deberá conceder al trabajador una retribución adicional a convenir por las partes.

        Lo anterior será extensivo a la persona que obtuviera una invención que exceda el marco de la que le hubiere sido encargada.

        Artículo 70.- La facultad de solicitar el respectivo registro así como los eventuales derechos de propiedad industrial derivados de la actividad inventiva y creativa de personas contratadas en una relación dependiente o independiente, por universidades o por las instituciones de investigación incluidas en el decreto ley nº 1.263, de 1975, pertenecerán a estas últimas, o a quienes éstas determinen, sin perjuicio de que los estatutos de dichas entidades regulen las modalidades en que el inventor o creador participe de los beneficios obtenidos por su trabajo.

        Artículo 71.- Los derechos establecidos en beneficio del trabajador en los artículos precedentes, serán irrenunciables antes del otorgamiento de la patente, del modelo de utilidad o del esquema de trazado o topografía de circuitos integrados, según corresponda. Toda cláusula en contrario se tendrá por no escrita.

        Artículo 72.- Todas las controversias relacionadas con la aplicación de las disposiciones de este Título serán de competencia del Tribunal de Propiedad Industrial a que se refiere el Párrafo 3º del Título I de esta ley.

    TITULO VII. De los esquemas de trazado o topografías de los circuitos integrados

        Artículo 73.- Se entenderá por circuito integrado un producto, en su forma final o intermedia, destinado a realizar una función electrónica, en el que los elementos, al menos uno de los cuales deberá ser activo, y alguna o todas las interconexiones, formen parte integrante del cuerpo o de la superficie de una pieza de material.

        Artículo 74.- Se entenderá por esquemas de trazado o topografía de circuitos integrados la disposición tridimensional de sus elementos, expresada en cualquier forma, diseñada para su fabricación.

        Artículo 75.- Los esquemas de trazado o topografías de circuitos integrados serán protegidos por medio de esta ley en la medida en que sean originales.

        Se considerarán originales los que sean el resultado del esfuerzo intelectual de su creador y no sean de conocimiento ordinario entre los creadores de esquemas de trazado o topografía de circuitos integrados y los fabricantes de circuitos integrados, al momento de su creación.

        Un esquema de trazado o topografía de circuitos integrados que consista en una combinación de elementos o interconexiones que sean corrientes, sólo estará protegido si la combinación, en su conjunto, cumple con las condiciones señaladas en los incisos anteriores.

        Artículo 76.- El dueño de un esquema de trazado o topografía de circuitos integrados, gozará de exclusividad para producir, vender o comercializar en cualquier forma el objeto de la protección y el derecho que se le ha conferido.

        Por consiguiente, el titular de un esquema de trazado o topografía de circuitos integrados, podrá impedir que cualquier tercero sin su consentimiento:

        1. Reproduzca, en su totalidad o cualquier parte del mismo, por incorporación en un circuito integrado o en otra forma, el esquema de trazado o topografía de circuitos integrados protegido, excepto el acto de reproducir cualquier parte que no cumpla con la exigencia de originalidad mencionada en el artículo 75 de esta ley.

        2. Venda o distribuya en cualquier otra forma, con fines comerciales, el esquema de trazado o topografía de circuitos integrados protegido; un circuito integrado en el que esté incorporado el esquema de trazado o topografía de circuitos integrados protegido, o un producto que incorpore un circuito integrado que contenga un esquema de trazado o topografía de circuitos integrados ilícitamente reproducido.

        Artículo 77.- El derecho exclusivo de explotación contemplado en el artículo precedente, no se extenderá:

        1. A las reproducciones de los esquemas de trazado topografías de circuitos integrados a los cuales se le haya incorporado un esquema de trazado o topografía de circuitos integrados realizadas por terceros con propósitos privados o con el único objetivo de evaluación, análisis, investigación o enseñanza.

        2. A los actos de explotación comercial a que se refiere ese artículo, relativos a un esquema de trazado o topografía de circuitos integrados que, cumpliendo con los requisitos del artículo 75 de esta ley, haya sido creado como consecuencia del análisis y la evaluación de otro esquema de trazado o topografía de circuitos integrados protegido.

        3. A los actos de explotación comercial a que se refiere ese artículo y relativos a un circuito integrado que incorpore un esquema de trazado o topografía de circuitos integrados ilícitamente reproducido o en relación con cualquier artículo que incorpore tal circuito integrado, cuando el tercero que realice u ordene esos actos no supiera y no tuviera motivos razonables para saber, al adquirir el circuito integrado o el artículo que incorpora tal circuito integrado, que incorporaba un esquema de trazado o topografía de circuitos integrados reproducido ilícitamente.

        No obstante lo anterior, una vez que el tercero haya tomado conocimiento o tenga motivos fundados para creer que el esquema de trazado o topografía de circuitos integrados estaba reproducido ilícitamente, dicho tercero podrá realizar cualquier acto con respecto al producto en existencia o pedido antes de ese momento. En este caso, el titular del derecho protegido sólo podrá exigir el pago de una suma equivalente a la regalía razonable que correspondería por una licencia libremente negociada de tal esquema de trazado o topografía de circuitos integrados.

        El tribunal competente para conocer de las infracciones en materia de esquema de trazado o topografías de circuitos integrados, resolverá las controversias a que pueda dar lugar la determinación de la regalía a la que se refiere el inciso anterior, según las normas establecidas para los incidentes en el Código de Procedimiento Civil, sin que proceda la prueba de testigos y fallando en conciencia.

        4. Respecto de un esquema de trazado o topografía de circuitos integrados original idéntico que haya sido creado independientemente por un tercero.

        Artículo 78.- La protección de los esquemas de trazado o topografías de circuitos integrados, tendrá una duración no renovable de 10 años, contada a partir de la fecha de presentación de la solicitud de registro o de la primera explotación comercial en cualquier parte del mundo.

        Artículo 79.- El registro de los esquemas de trazado o topografías de circuitos integrados, se llevará en el Departamento de Propiedad Industrial.

        Artículo 80.- Con la solicitud de esquema de trazado o topografía de circuitos integrados, deberán acompañarse los siguientes documentos:

    –    Solicitud.

    –    Memoria descriptiva.

    –    Prototipo o maqueta, cuando procediera.

    –    Documentos complementarios, en su caso.

        Ingresada la solicitud al Departamento, se practicará un examen preliminar, en el cual se verificará que se hayan acompañado los documentos señalados precedentemente.

        Artículo 81.- La solicitud de registro podrá presentarse antes de iniciada la explotación comercial del esquema de trazado o topografía de circuitos integrados, o dentro de los dos años siguientes, contados a partir de la fecha de dicha explotación. En este último caso, el solicitante deberá acompañar, junto con la solicitud de registro, una declaración jurada que acredite la fecha de la primera explotación comercial.

        La tramitación de la solicitud, así como la publicación y resolución de la misma, se ajustará a las prescripciones que para ello establezca el reglamento.

        Artículo 82.- Procederá la declaración de nulidad de un esquema de trazado o topografía de circuitos integrados, por alguna de las causales siguientes:

        a) Cuando quien haya obtenido el esquema de trazado o topografía de circuitos integrados no sea el legítimo creador ni su cesionario;

        b) Cuando la concesión se ha basado en informes periciales errados o manifiestamente deficientes;

        c) Cuando el registro se hubiera concedido contraviniendo los requisitos de protección establecidos en el artículo 75;

        d) Cuando la explotación comercial del esquema de trazado o topografía de circuitos integrados se haya iniciado antes de los dos años precedentes a la presentación de la solicitud.

        Artículo 83.- Las disposiciones de los Títulos III y VI, relativas a las patentes de invención e invenciones en servicio, respectivamente, serán aplicables, en cuanto corresponda, a los esquemas de trazado o topografías de circuitos integrados, sin perjuicio de las disposiciones especiales contenidas en el presente Título.

        Artículo 84.- Todo esquema de trazado o topografía de circuitos integrados, deberá llevar en forma visible una letra “T” en mayúscula y encerrada dentro de un círculo. Estas indicaciones se podrán poner en el envase, siempre que sea de aquellos que se presentan al consumidor sellados, de manera que sea necesario destruirlos para acceder al producto. La omisión de este requisito no afectará la validez del esquema de trazado o topografía de circuitos integrados, pero priva a su titular de la facultad de hacer valer las acciones penales establecidas en el artículo siguiente.

        Artículo 85.- Serán condenados a pagar una multa a beneficio fiscal de 25 a 1.000 unidades tributarias mensuales:

        a) Los que maliciosamente fabriquen, comercialicen, importen o utilicen, con fines comerciales, un esquema de trazado o topografía de circuitos integrados registrado. Lo anterior se entenderá sin perjuicio de lo establecido en el inciso quinto del artículo 49, que será igualmente aplicable a esta categoría de derechos.

        b) Los que, con fines comerciales y sin tener derecho a hacerlo, usen las indicaciones correspondientes a un esquema de trazado o topografía de circuitos integrados registrado, o las simulen cuando no exista dicho registro o esté caducado o anulado.

        Los condenados de acuerdo a este artículo serán obligados al pago de las costas, daños y perjuicios causados al titular del esquema de trazado o topografía de circuitos integrados.

        Los utensilios y los elementos directamente empleados en la comisión de cualesquiera de los delitos mencionados en este artículo y los objetos producidos en forma ilegal caerán en comiso. Tratándose de objetos producidos en forma ilegal, se procederá a su destrucción. En el caso de los utensilios o elementos utilizados, será facultad del juez competente decidir sobre su destino, pudiendo ordenar su destrucción o su distribución benéfica.

        Al que reincida dentro de los cinco años siguientes a la aplicación de una multa, se le aplicará otra que no podrá ser inferior al doble de la anterior y cuyo monto máximo podrá llegar a 2.000 unidades tributarias mensuales.

     TITULO VIII. De los secretos empresariales y de la información presentada a la autoridad para la obtención de registros o autorizaciones sanitarios

    De los secretos empresariales

        Artículo 86.- Se entiende por secreto empresarial todo conocimiento sobre productos o procedimientos industriales, cuyo mantenimiento en reserva proporciona a su poseedor una mejora, avance o ventaja competitiva.

        Artículo 87.- Constituirá violación del secreto empresarial la adquisición ilegítima del mismo, su divulgación o explotación sin autorización de su titular y la divulgación o explotación de secretos empresariales a los que se haya tenido acceso legítimamente pero con deber de reserva, a condición de que la violación del secreto haya sido efectuada con ánimo de obtener provecho, propio o de un tercero, o de perjudicar a su titular.

        Artículo 88.- Sin perjuicio de la responsabilidad penal que corresponda, serán aplicables a la violación del secreto empresarial las normas del Título X, relativas a la observancia de los derechos de propiedad industrial.

    Párrafo 2º. De la información presentada a la autoridad para la obtención de registros o autorizaciones sanitarios

        Artículo 89.- Cuando el Instituto de Salud Pública o el Servicio Agrícola y Ganadero requieran la presentación de datos de prueba u otros que tengan naturaleza de no divulgados, relativos a la seguridad y eficacia de un producto farmacéutico o químico-agrícola que utilice una nueva entidad química que no haya sido previamente aprobada por la autoridad competente, dichos datos tendrán el carácter de reservados, según la legislación vigente.

        La naturaleza de no divulgados se entiende satisfecha si los datos han sido objeto de medidas razonables para mantenerlos en tal condición y no son generalmente conocidos ni fácilmente accesibles por personas pertenecientes a los círculos en que normalmente se utiliza el tipo de información en cuestión.

        La autoridad competente no podrá divulgar ni utilizar dichos datos para otorgar un registro o autorización sanitarios a quien no cuente con el permiso del titular de aquéllos, por un plazo de cinco años, para productos farmacéuticos, y de diez años, para productos químico-agrícolas, contados desde el primer registro o autorización sanitarios otorgado por el Instituto de Salud Pública o por el Servicio Agrícola y Ganadero, según corresponda.

        Para gozar de la protección de este artículo, el carácter de no divulgados de los referidos datos de prueba deberá ser señalado expresamente en la solicitud de registro o de autorización sanitarios.

        Artículo 90.- Se entiende por nueva entidad química aquel principio activo que no ha sido previamente incluido en registros o autorizaciones sanitarios otorgados por el Instituto de Salud Pública o por el Servicio Agrícola y Ganadero, según corresponda, o que no haya sido comercializado en el territorio nacional antes de la solicitud de registro o autorización sanitaria.

        Para efectos de este Párrafo, se entiende por principio activo aquella sustancia dotada de uno o más efectos farmacológicos o de usos químico-agrícolas, cualquiera sea su forma, expresión o disposición, incluyendo sus sales y complejos. En ningún caso se considerará como nueva entidad química:

        1. Los usos o indicaciones terapéuticas distintos a los autorizados en otros registros o autorizaciones sanitarios previos de la misma entidad química.

        2. Los cambios en la vía de administración o formas de dosificación a las autorizadas en otros registros o autorizaciones sanitarios previos de la misma entidad química.

        3. Los cambios en las formas farmacéuticas, formulaciones o combinaciones de entidades químicas ya autorizadas o registradas.

        4. Las sales, complejos, formas cristalinas o aquellas estructuras químicas que se basen en una entidad química con registro o autorización sanitarios previos.

        Artículo 91.- No procederá la protección de este Párrafo, cuando:

        a) El titular de los datos de prueba referidos en el artículo 89, haya incurrido en conductas o prácticas declaradas contrarias a la libre competencia en relación directa con la utilización o explotación de esa información, según decisión firme o ejecutoriada del Tribunal de Defensa de la Libre Competencia.

        b) Por razones de salud pública, seguridad nacional, uso público no comercial, emergencia nacional u otras circunstancias de extrema urgencia declaradas por la autoridad competente, se justifique poner término a la protección referida en el artículo 89.

        c) El producto farmacéutico o químico-agrícola sea objeto de una licencia obligatoria, conforme a lo establecido en esta ley.

        d) El producto farmacéutico o químico-agrícola no se haya comercializado en el territorio nacional al cabo de doce meses, contados desde el registro o autorización sanitaria realizado en Chile.

        e) La solicitud de registro o autorización sanitaria del producto farmacéutico o químico agrícola que sea presentada en Chile con posterioridad a doce meses de obtenido el primer registro o autorización sanitaria en el extranjero.

      TITULO IX. De las indicaciones geográficas y denominaciones de origen

        Artículo 92.- La presente ley reconoce y protege las indicaciones geográficas y denominaciones de origen de conformidad con las siguientes disposiciones:

        a) Se entiende por indicación geográfica aquella que identifica un producto como originario del país o de una región o localidad del territorio nacional, cuando la calidad, reputación u otra característica del mismo sea imputable, fundamentalmente, a su origen geográfico.

        b) Se entiende por denominación de origen aquella que identifica un producto como originario del país, o de una región o de una localidad del territorio nacional, cuando la calidad, reputación u otra característica del mismo sea imputable fundamentalmente a su origen geográfico, teniendo en consideración, además, otros factores naturales y humanos que incidan en la caracterización del producto.

        Artículo 93.- Las indicaciones geográficas y denominaciones de origen se regularán por las normas de esta ley y por los reglamentos específicos de uso que se aprueben. Lo anterior se entenderá sin perjuicio de las disposiciones que regulan las denominaciones de origen del Pisco, Pajarete y Vino Asoleado, y las que se refieren a la zonificación vitícola, prevaleciendo respecto de ellas las normas específicas contenidas en la ley nº 18.455.

        Las indicaciones geográficas y denominaciones de origen no podrán ser objeto de apropiación o gravamen que limiten o impidan su uso por los interesados que cumplan con los requisitos establecidos en esta ley y en el reglamento de uso de la indicación o denominación.

        Artículo 94.- El reconocimiento de una indicación geográfica o denominación de origen se hará por el Departamento, mediante la incorporación de la misma en un Registro de Indicaciones Geográficas y Denominaciones de Origen que se llevará al efecto.

        Cualquier persona, natural o jurídica, podrá solicitar el Registro de una Indicación Geográfica o Denominación de Origen, siempre que represente a un grupo significativo de productores, fabricantes o artesanos, cualquiera sea su forma jurídica, cuyos predios o establecimientos de extracción, producción, transformación o elaboración se encuentren dentro de la zona de delimitación establecida por la indicación geográfica o denominación de origen solicitada y cumplan con los demás requisitos señalados en esta ley. También podrán solicitar el reconocimiento de una indicación geográfica o denominación de origen las autoridades nacionales, regionales, provinciales o comunales, cuando se trate de indicaciones geográficas o denominaciones de origen ubicadas dentro de los territorios de sus respectivas competencias.

        Artículo 95.- No podrán reconocerse como indicaciones geográficas o denominaciones de origen los signos o expresiones:

        a) Que no se conformen a las definiciones contenidas en el artículo 92 de esta ley.

        b) Que sean contrarios a la moral o al orden público.

        c) Que puedan inducir a error o confusión en el público consumidor, respecto de la procedencia de la Indicación Geográfica o Denominación de Origen o de los atributos de los productos que pretenden distinguir.

        d) Que sean indicaciones comunes o genéricas para distinguir el producto de que se trate, entendiéndose por ello las consideradas como tales por los conocedores de la materia o por el público en general, salvo que hayan sido reconocidas como Indicaciones Geográficas o Denominaciones de Origen en virtud de tratados internacionales ratificados por Chile.

        Artículo 96.- Las indicaciones geográficas y denominaciones de origen extranjeras podrán registrarse en Chile, de conformidad con las normas de esta ley. No podrán protegerse, o perderán la protección si la tuvieran, cuando dejen de estar protegidas o hayan caído en desuso en su país de origen.

        En particular, no estarán sujetas a la protección establecida en esta ley las indicaciones geográficas y denominaciones de origen extranjeras que identifiquen vinos y bebidas espirituosas en relación con bienes y servicios, y que hayan sido utilizadas de forma continua por nacionales o residentes en el territorio nacional para identificar, en Chile, esos mismos bienes o servicios u otros afines, de buena fe, antes del 15 de abril de 1994, o durante diez años, como mínimo, antes de esa fecha, salvo que se haya dispuesto lo contrario en un tratado internacional ratificado por Chile.

        Artículo 96 bis A.- Cuando por aplicación de las normas previstas en esta ley o en tratados internacionales ratificados por Chile, el Departamento llegue a la convicción que es posible la coexistencia entre marcas e indicaciones geográficas o denominaciones de origen, o de estas últimas entre sí, en la resolución definitiva determinará las condiciones en las cuales deben ser usadas las Indicaciones Geográficas, Denominaciones de Origen o Marcas, para evitar la inducción a error o confusión al público consumidor.

    Cuando uno o más de los productos en cuestión tengan carácter silvoagropecuario o agroindustrial, el Departamento, para formar su convicción acerca de la posibilidad de coexistencia, deberá solicitar el informe al Ministerio de Agricultura.

        En todo caso, las condiciones de uso formarán parte del registro respectivo.

        El incumplimiento de las condiciones de uso, priva a su titular de la facultad de hacer valer las acciones establecidas en esta ley.

        Artículo 97.- La solicitud de reconocimiento de una indicación geográfica o denominación de origen deberá indicar:

        a) Nombre, domicilio, rol único tributario, si procediera, y actividad del solicitante relacionada con la indicación o denominación pedida.

        b) La indicación geográfica o denominación de origen.

        c) El área geográfica de producción, extracción, transformación o elaboración del producto que se distinguirá con la indicación o denominación, delimitándola a los caracteres geográficos y la división político-administrativa del país.

        d) La descripción detallada del producto o los productos que distinguirá la indicación o denominación solicitada, así como sus características o cualidades esenciales del mismo.

        e) Estudio técnico, elaborado por un profesional competente, que aporte antecedentes, en el sentido que las características o cualidades que se le atribuyen al producto son imputables fundamental o exclusivamente a su origen geográfico.

        f) Un proyecto de reglamento específico de uso y control de la indicación o denominación solicitada.

        Artículo 98.- Tratándose de solicitudes de indicaciones geográficas o denominaciones de origen chilenas, relativas a productos silvoagropecuarios y agroindustriales, se requerirá además, para el registro de las mismas, un informe favorable del Ministerio de Agricultura respecto del cumplimiento de las exigencias establecidas en el artículo 97. En el caso de las indicaciones geográficas y denominaciones de origen extranjeras relativas a los mencionados productos, se requerirá un informe del Ministerio de Agricultura.

        Dicho informe deberá emitirse en el plazo de ciento veinte días, a contar de la fecha de requerimiento del mismo por el Jefe del Departamento.

        Artículo 99.- La resolución que conceda el registro de una indicación geográfica o denominación de origen señalará:

        a) La indicación geográfica o denominación de origen reconocida.

        b) La zona geográfica delimitada de producción, extracción, transformación o elaboración cuyos productores, fabricantes o artesanos tengan derecho a usar la indicación o denominación.

        c) Los productos a los cuales se aplicará la indicación geográfica o denominación de origen y las cualidades o características esenciales que éstos deben tener.

        d) La calificación, de conformidad con el mérito de los antecedentes acompañados, de tratarse de una indicación geográfica o de una denominación de origen.

        Asimismo, tal resolución aprobará y ordenará el registro del reglamento específico de uso y control de la indicación geográfica o denominación de origen reconocida.

        Artículo 100.- El registro de una indicación geográfica o denominación de origen tendrá duración indefinida.

        El registro podrá ser modificado en cualquier tiempo cuando cambie alguna de las circunstancias establecidas en el artículo 97. La modificación deberá sujetarse al procedimiento de registro, en cuanto corresponda.

        Artículo 101.- Cualquier interesado podrá impetrar la declaración de nulidad del Registro de una indicación geográfica o denominación de origen, cuando se haya infringido alguna de las prohibiciones establecidas en esta ley.

        Artículo 102.- En cuanto corresponda, las normas de los Títulos I y II y las disposiciones reglamentarias relativas a las marcas comerciales, serán aplicables a los procedimientos de examen, publicación, registro y nulidad de las indicaciones geográficas y denominaciones de origen de que trata este Título.

        Artículo 103.- Todos los productores, fabricantes o artesanos que desempeñan su actividad dentro de la zona geográfica delimitada, inclusive aquellos que no estuvieran entre los que solicitaron el reconocimiento inicialmente, tendrán derecho a usar la indicación geográfica o denominación de origen en relación con los productos señalados en el Registro, siempre que cumplan con las disposiciones que regulan el uso de las mismas. Solamente ellos podrán emplear en la identificación del producto la expresión “Indicación Geográfica” o “Denominación de Origen” o las iniciales “I.G.” o “D.O.”, respectivamente. Estas indicaciones se podrán poner en el envase, siempre que sea de aquellos que se presentan al consumidor sellados, de manera que sea necesario destruirlos para acceder al producto.

        Artículo 104.- Las acciones civiles relativas al derecho de usar una indicación geográfica o denominación de origen registrada, y las destinadas a impedir el uso ilegal de las mismas, se ejercerán ante los tribunales ordinarios de justicia, conforme a las normas establecidas en el Título X, relativo a la observancia.

        Tratándose de indicaciones geográficas o denominaciones de origen registradas que identifiquen vinos y bebidas espirituosas, las acciones civiles establecidas en el inciso anterior procederán cuando se emplee una indicación geográfica o denominación de origen sin tener derecho a usarla, o traducida, o cuando se acompañe de términos como “clase”, “tipo”, “estilo”, “imitación”, u otras análogas, e incluso cuando se indique el verdadero origen del producto.

        Artículo 105.- Serán condenados a pagar una multa a beneficio fiscal de 25 a 1.000 unidades tributarias mensuales:

        a) Los que maliciosamente designen un producto del mismo tipo de los protegidos por una indicación geográfica o denominación de origen registrada, sin tener derecho a hacerlo.

        b) Los que, con fines comerciales, usen las indicaciones correspondientes a una indicación geográfica o denominación de origen no inscrita, caducada o anulada, o las simulen.

        c) Los que, con fines comerciales, hagan uso de envases o embalajes que lleven una indicación geográfica o denominación de origen registrada, sin tener derecho a usarla y sin que ésta haya sido previamente borrada, salvo que el embalaje marcado se destine a envasar productos diferentes y no relacionados con los que protege la indicación geográfica o denominación de origen.

        Los condenados de acuerdo a este artículo serán obligados al pago de las costas, daños y perjuicios causados a los legítimos usuarios de la indicación geográfica o denominación de origen.

        Los utensilios y los elementos directamente empleados para la comisión de cualquiera de los delitos mencionados en este artículo y los objetos con indicaciones geográficas o denominaciones de origen falsificadas caerán en comiso. Tratándose de los objetos con indicación geográfica o denominación de origen falsificada se procederá a su destrucción. En el caso de los utensilios o elementos utilizados, será facultad del juez competente decidir sobre su destino, pudiendo ordenar su destrucción o su distribución benéfica.

        Al que reincida dentro de los cinco años siguientes a la aplicación de una multa, se le aplicará otra que no podrá ser inferior al doble de la anterior y cuyo monto máximo podrá llegar a 2.000 unidades tributarias mensuales.

      TITULO X. De la observancia de los Derechos de Propiedad Industrial

    Párrafo 1º. De las acciones civiles

        Artículo 106.- El titular cuyo derecho de propiedad industrial sea lesionado podrá demandar civilmente:

        a) La cesación de los actos que violen el derecho protegido.

        b) La indemnización de los daños y perjuicios.

        c) La adopción de las medidas necesarias para evitar que prosiga la infracción.

        d) La publicación de la sentencia a costa del condenado, mediante anuncios en un diario a elección del demandante. Esta medida será aplicable cuando la sentencia así lo señale expresamente.

        Artículo 107.- Las acciones civiles establecidas en el artículo 106 se tramitarán conforme al procedimiento sumario y corresponderán a cualquiera que tenga interés en deducirlas, sin perjuicio de la acción penal que pueda proceder.

        Artículo 108.- La indemnización de perjuicios podrá determinarse, a elección del demandante, de conformidad con las reglas generales o de acuerdo con una de las siguientes reglas:

        a) Las utilidades que el titular hubiera dejado de percibir como consecuencia de la infracción;

        b) Las utilidades que haya obtenido el infractor como consecuencia de la infracción, o

        c) El precio que el infractor hubiera debido pagar al titular del derecho por el otorgamiento de una licencia, teniendo en cuenta el valor comercial del derecho infringido y las licencias contractuales que ya se hubieran concedido.

        Artículo 109.- Sin perjuicio de las otras acciones contempladas en este Título, no responderán por daños y perjuicios las personas que hubieran comercializado productos que infrinjan un derecho de propiedad industrial, salvo que estas mismas personas los hubieran fabricado o producido, o los hubieran comercializado con conocimiento de que estaban cometiendo una infracción a un derecho de propiedad industrial.

        Artículo 110.- El juez de la causa estará facultado para ordenar, en la sentencia, que el infractor proporcione las informaciones que posea sobre las personas que hubiesen participado en la producción o elaboración de los productos o procedimientos materia de la infracción, y respecto de los circuitos de distribución de estos productos.

        Artículo 111.- En estos procesos, el juez apreciará la prueba según las reglas de la sana crítica.

     Párrafo 2º. De las medidas precautorias

        Artículo 112.- Las medidas precautorias procederán en todos los asuntos que digan relación con infracciones a los derechos de propiedad industrial.

        Sin perjuicio de otras medidas precautorias, el Tribunal podrá decretar las siguientes:

        a) La cesación inmediata de los actos que constituyan la presunta infracción;

        b) El secuestro de los productos objeto de la presunta infracción y de los materiales y medios que sirvieran principalmente para cometerla. Tratándose de signos distintivos, podrá además decretarse el secuestro de los envases, embalaje, etiquetas, material impreso o de publicidad que posean el signo motivo de la presunta infracción;

        c) El nombramiento de uno o más interventores;

        d) La prohibición de publicitar o promover, de cualquier manera, los productos motivo de la presunta infracción, y

        e) La retención, en poder de un establecimiento de crédito o de un tercero, de los bienes, dineros o valores que provengan de la venta o comercialización de dichos productos, en cualquier forma.

    Párrafo 3º. De las medidas prejudiciales

        Artículo 113.- Podrán solicitarse como medidas prejudiciales, las precautorias de que trata el Párrafo 2º del Título X de esta ley y las medidas contempladas en los Títulos IV y V del Libro Segundo del Código de Procedimiento Civil.

    TITULO XI. De la Tramitación de las solicitudes  internacionales de patentes de invención o de modelos de utilidad.

        Artículo 114.- Una solicitud internacional corresponde a una solicitud de patente de invención o de modelo de utilidad presentada conforme al Tratado de Cooperación en Materia de Patentes.

        Artículo 115.- El Instituto Nacional de Propiedad Industrial será la Oficina Receptora en Chile para la presentación de solicitudes internacionales, conforme al Tratado de Cooperación en Materia de Patentes, respecto a solicitudes de nacionales o de residentes en Chile.

        Las solicitudes internacionales deberán presentarse en Chile en idioma español y pagar las tasas señaladas en el Tratado de Cooperación en Materia de Patentes.

        Asimismo, el Instituto actuará en calidad de Oficina Designada y/o Elegida cuando Chile haya sido designado o elegido como Estado, con el objeto de obtener un registro de una patente de invención o de un modelo de utilidad, en fase nacional, del Tratado de Cooperación en Materia de Patentes.

        Artículo 116.- Cuando la solicitud internacional tenga una fecha de presentación posterior a la fecha de vencimiento del plazo de prioridad, conforme al Tratado de Cooperación en Materia de Patentes, el solicitante podrá requerir la restauración del derecho de prioridad ante el Instituto como Oficina Receptora, dentro del plazo de dos meses contado desde la fecha de vencimiento del plazo de prioridad.

        En el mismo caso, el solicitante podrá requerir la restauración del derecho de prioridad ante el Instituto como Oficina Designada y/o Elegida al momento de la entrada en fase nacional, en caso que la solicitud de restauración del derecho de prioridad haya sido debidamente solicitada ante la Oficina Receptora correspondiente y ésta no se hubiere pronunciado o no la hubiere aceptado.

        En ambos casos, la petición deberá realizarse en conjunto con la presentación de la solicitud, acreditando el pago de la tasa respectiva; expresando las razones del incumplimiento del plazo de prioridad, y aportando las pruebas correspondientes.

        Artículo 117.- Las solicitudes de patentes de invención o de modelos de utilidad deberán presentarse en Chile, en fase nacional, conforme al Tratado de Cooperación en Materia de Patentes, antes del vencimiento del plazo de treinta meses contado desde la fecha de prioridad.

    Si la solicitud internacional no reivindica ninguna prioridad, se podrá presentar ante el Instituto hasta antes del vencimiento del plazo de treinta meses contado desde la fecha de presentación internacional.

        Encontrándose vencido el plazo de treinta meses establecido en el inciso anterior, el solicitante podrá pedir el restablecimiento de derechos ante el Instituto.

    La petición deberá realizarse en conjunto con la presentación de la solicitud, acreditando el pago de la tasa respectiva; expresando las razones del incumplimiento del plazo, y aportando las pruebas correspondientes.

        Artículo 118.- Para iniciar la tramitación de una solicitud internacional, en fase nacional, sin perjuicio de los demás requisitos que exija esta ley, el solicitante deberá:

    a)  Presentar una traducción al idioma español de la solicitud internacional, en caso que ésta no se hubiera presentado en este idioma, y de todas las modificaciones ocurridas durante la fase internacional, junto al formulario habilitado para el efecto, y

    b)  Pagar la tasa establecida en el artículo 18 de esta ley para la presentación de la solicitud y las demás tasas que fije el Instituto, de acuerdo con lo establecido por el Tratado de Cooperación en Materia de Patentes.

        Artículo 119.- Será aplicable a las solicitudes de patentes de invención o de modelos de utilidad que se presenten en Chile, en fase nacional, conforme al Tratado de Cooperación en Materia de Patentes, lo dispuesto en el artículo 4º, pudiendo cualquier interesado formular oposición a dichas solicitudes dentro del plazo dispuesto en el inciso segundo del artículo 5º.

        Artículo 120.- Las solicitudes de patentes de invención o de modelos de utilidad que se presenten en Chile, en fase nacional, conforme al Tratado de Cooperación en Materia de Patentes, se regirán en cuanto a sus aspectos sustantivos, por las disposiciones de la presente ley y su reglamento.

        Artículo 121.- El plazo de concesión para las patentes de invención y para los modelos de utilidad presentados en Chile, en fase nacional, conforme al Tratado de Cooperación en Materia de Patentes, se contará desde la fecha de la presentación de la solicitud internacional correspondiente.

    TITULO XII. Artículo final

        Artículo 122.- Derógase el decreto ley nº 958, de 1931, sobre Propiedad Industrial; los artículos 16 y 17 de la ley nº 18.591; el artículo 38 de la ley nº 18.681, y la ley nº 18.935.

    TITULO XIII. Disposiciones transitorias

        Artículo 1º.- No obstante lo dispuesto en el inciso segundo del artículo 39 de esta ley, sólo podrá solicitarse patente de invención sobre los medicamentos de toda especie, sobre las preparaciones farmacéuticas medicinales y sus preparaciones y reacciones químicas, siempre que se haya presentado en su país de origen solicitud de patente con posterioridad a la entrada en vigencia de esta ley.

        Anótese, tómese razón y publíquese.

    RICARDO LAGOS ESCOBAR, Presidente de la República.

    Jorge Rodríguez Grossi, Ministro de Economía, Fomento y Reconstrucción.

    Lo que transcribo a Ud. para su conocimiento.

    Saluda atentamente a Ud., Carlos Alvarez Voullième, Subsecretario de Economía, Fomento y Reconstrucción.

    25Abr/21

    Ley nº 17.336, de 28 de agosto de 1970

    Ley nº 17.336, de 28 de agosto de 1970. Propiedad Intelectual.

    Por cuanto el Congreso Nacional ha tenido a bien prestar su aprobación al siguiente,

    Proyecto de ley:

    TITULO I. DERECHO DE AUTOR

    CAPITULO I. Naturaleza y objeto de la Protección. Definiciones

        Artículo 1°- La presente ley protege los derechos que, por el solo hecho de la creación de la obra, adquieren los autores de obras de la inteligencia en los dominios literarios, artísticos y científicos, cualquiera que sea su forma de expresión, y los derechos conexos que ella determina.

        El derecho de autor comprende los derechos patrimonial y moral, que protegen el aprovechamiento, la paternidad y la integridad de la obra.

        Artículo 2°- La presente ley ampara los derechos de todos los autores, artistas intérpretes o ejecutantes, productores de fonogramas y organismos de radiodifusión chilenos y de los extranjeros domiciliados en Chile. Los derechos de los autores, artistas intérpretes o ejecutantes, productores de fonogramas y organismos de radiodifusión extranjeros no domiciliados en el país gozarán de la protección que les sea reconocida por las convenciones internacionales que Chile suscriba y ratifique.

        Para los efectos de esta ley, los autores apátridas o de nacionalidad indeterminada serán considerados como nacionales del país donde tengan establecido su domicilio.

        Artículo 3°- Quedan especialmente protegidos con arreglo a la presente ley:

        1) Los libros, folletos, artículos y escritos, cualesquiera que sean su forma y naturaleza, incluidas las enciclopedias, guías, diccionarios, antologías y compilaciones de toda clase;

        2) Las conferencias, discursos, lecciones, memorias, comentarios y obras de la misma naturaleza, tanto en la forma oral como en sus versiones escritas o grabadas;

        3) Las obras dramáticas, dramático-musicales y teatrales en general, así como las coreográficas y las pantomímicas, cuyo desarrollo sea fijado por escrito o en otra forma;

        4) Las composiciones musicales, con o sin texto;

        5) Las adaptaciones radiales o televisuales de cualquiera producción literaria, las obras originalmente producidas por la radio o la televisión, así como los libretos y guiones correspondientes;

        6) Los periódicos, revistas u otras publicaciones de la misma naturaleza;

        7) Las fotografías, los grabados y las litografías;

        8) Las obras cinematográficas;

        9) Los proyectos, bocetos y maquetas arquitectónicas y los sistemas de elaboración de mapas;

        10) Las esferas geográficas o armilares, así como los trabajos plásticos relativos a la geografía, topografía o a cualquiera otra ciencia, y en general los materiales audiovisuales;

        11) Las pinturas, dibujos, ilustraciones y otros similares;

        12) Las esculturas y obras de las artes figurativas análogas, aunque estén aplicadas a la industria, siempre que su valor artístico pueda ser considerado con separación del carácter industrial del objeto al que se encuentren incorporadas.

        13) Los bocetos escenográficos y las respectivas escenografías cuando su autor sea el bocetista;

        14) Las adaptaciones, traducciones y otras transformaciones, cuando hayan sido autorizadas por el autor de la obra originaria si ésta no pertenece al patrimonio cultural común;

        15) Los videogramas y diaporamas, y

        16) Los programas computacionales, cualquiera sea el modo o forma de expresión, como programa fuente o programa objeto, e incluso la documentación preparatoria, su descripción técnica y manuales de uso.

        17) Las compilaciones de datos o de otros materiales, en forma legible por máquina o en otra forma, que por razones de la selección o disposición de sus contenidos, constituyan creaciones de carácter intelectual. Esta protección no abarca los datos o materiales en sí mismos, y se entiende sin perjuicio de cualquier derecho de autor que subsista respecto de los datos o materiales contenidos en la compilación;

        18) Los dibujos o modelos textiles.

        Artículo 4°- El título de la obra forma parte de ellas y deberá ser siempre mencionado junto con el nombre del autor, cuando aquélla sea utilizada públicamente.

        No podrá utilizarse el título de una obra u otro que pueda manifiestamente inducir a engaño o confusión, para individualizar otra del mismo género.

        Artículo 5°- Para los efectos de la presente ley, se entenderá por:

        a) Obra individual: la que sea producida por una sola persona natural;

        b) Obra en colaboración: la que sea producida, conjuntamente, por dos o más personas naturales cuyos aportes no puedan ser separados;

        c) Obra colectiva: la que sea producida por un grupo de autores, por iniciativa y bajo la orientación de una persona natural o jurídica que la coordine, divulgue y publique bajo su nombre;

        d) Obra anónima: aquella en que no se menciona el nombre del autor, por voluntad del mismo, o por ser éste ignorado;

        e) Obra seudónima: aquella en que el autor se oculta bajo un seudónimo que no lo identifica, entendiéndose como tal, el que no haya sido inscrito conforme a lo dispuesto en el artículo 8°;

        f) Obra inédita: aquella que no haya sido dada a conocer al público;

        g) Obra póstuma: aquella que haya sido dada a la publicidad sólo después de la muerte de su autor;

        h) Obra originaria: aquella que es primigénitamente creada;

        i) Obra derivada: aquella que resulte de la adaptación, traducción u otra transformación de una obra originaria, siempre que constituya una creación autónoma;

        j) artista, intérprete o ejecutante: el actor, locutor, narrador, declamador, cantante, bailarín, músico o cualquiera otra persona que interprete o ejecute una obra literaria o artística o expresiones del folklore;

        k) productor de fonogramas significa la persona natural o jurídica que toma la iniciativa y tiene la responsabilidad económica de la primera fijación de los sonidos de una ejecución o interpretación u otros sonidos o las representaciones de sonidos;

        l) Organismo de radiodifusión: la empresa de radio o de televisión que transmite programas al público;

        m) Fonograma: toda fijación exclusivamente sonora de los sonidos de una ejecución o de otros sonidos.

        Copia de fonograma: el soporte que contiene sonidos tomados directa o indirectamente de un fonograma, y que incorpora la totalidad o una parte substancial de los sonidos fijados en él;

        m) bis Radiodifusión. Para los efectos de los derechos de los artistas intérpretes y productores de fonogramas, significa la transmisión inalámbrica de sonidos o de imágenes y sonidos o de las representaciones de éstos, para su recepción por el público; dicha transmisión por satélite también es una “radiodifusión”; la transmisión de señales codificadas será radiodifusión” cuando los medios de descodificación sean ofrecidos al público por el organismo de radiodifusión o con su consentimiento;

        n) Emisión o transmisión: la difusión por medio de ondas radioeléctricas, de sonido o de sonidos sincronizados con imágenes;

        ñ) Retransmisión: la emisión de la transmisión de un organismo de radiodifusión por otro o la que posteriormente hagan uno u otro de la misma transmisión;

        o) publicación de una obra, interpretación o ejecución fijada o de un fonograma significa la oferta al público de la obra, interpretación o ejecución fijada o del fonograma, con el consentimiento del titular del derecho, siempre que los ejemplares tangibles se ofrezcan al público en cantidad suficiente;

        p) Videograma: las fijaciones audiovisuales incorporadas en cassettes, discos u otros soportes materiales.

        Copia de videograma: el soporte que contiene imágenes y sonidos tomados directa o indirectamente de un videograma y que incorpora la totalidad o una parte substancial de las imágenes y sonidos fijados en él;

        q) Distribución: la puesta a disposición del público del original o copias tangibles de la obra mediante su venta o de cualquier otra forma de transferencia de la propiedad o posesión del original o de la copia.

        r) Planilla de ejecución: la lista de las obras musicales ejecutadas mencionando el título de la obra y el nombre o pseudónimo de su autor; cuando la ejecución se haga a partir de un fonograma, la mención deberá incluir además el nombre artístico del intérprete y la marca del productor;

        s) Diaporama: sistema mecánico que combina la proyección de una diapositiva con una explicación oral, y

        t) Programa computacional: conjunto de instrucciones para ser usadas directa o indirectamente en un computador a fin de efectuar u obtener un determinado proceso o resultado, contenidas en un cassete, diskette, cinta magnética u otro soporte material.

        Copia de programa computacional: soporte material que contiene instrucciones tomadas directa o indirectamente de un programa computacional y que incorpora la totalidad o parte sustancial de las instrucciones fijadas en él.

        u) Reproducción: la fijación permanente o temporal de la obra en un medio que permita su comunicación o la obtención de copias de toda o parte de ella, por cualquier medio o procedimiento.

        v) Comunicación pública: todo acto, ejecutado por cualquier medio o procedimiento que sirva para difundir los signos, las palabras, los sonidos o las imágenes, actualmente conocido o que se conozca en el futuro, por el cual una pluralidad de personas, reunidas o no en un mismo lugar, pueda tener acceso a la obra sin distribución previa de ejemplares a cada una de ellas, incluyendo la puesta a disposición de la obra al público, de forma tal que los miembros del público puedan acceder a ella desde el lugar y en el momento que cada uno de ellos elija.

        w) Transformación: todo acto de modificación de la obra, comprendida su traducción, adaptación y cualquier otra variación en su forma de la que se derive una obra diferente.

        x) fijación significa la incorporación de sonidos, o la representación de éstos, a partir de la cual puedan percibirse, reproducirse o comunicarse mediante un dispositivo.

        y) Prestador de Servicio significa, para los efectos de lo dispuesto en el Capítulo III del Título III de esta ley, una empresa proveedora de transmisión, enrutamiento o conexiones para comunicaciones digitales en línea, sin modificación de su contenido, entre puntos especificados por el usuario del material que selecciona, o una empresa proveedora u operadora de instalaciones de servicios en línea o de acceso a redes.

    CAPITULO II. Sujetos del Derecho

        Artículo 6°- Sólo corresponde al titular del derecho de autor decidir sobre la divulgación parcial o total de la obra.

        Artículo 7°- Es titular original del derecho el autor de la obra. Es titular secundario del derecho el que la adquiera del autor a cualquier título.

        Artículo 8°- Se presume autor de una obra, salvo prueba en contrario, a quien aparezca como tal al divulgarse aquélla, mediante indicación de su nombre, seudónimo, firma o signo que lo identifique de forma usual, o aquél a quien, según la respectiva inscripción, pertenezca el ejemplar que se registra.

        Tratándose de programas computacionales, serán titulares del derecho de autor respectivo las personas naturales o jurídicas cuyos dependientes, en el desempeño de sus funciones laborales, los hubiesen producido, salvo estipulación escrita en contrario.

        Respecto de los programas computacionales producidos por encargo de un tercero, se reputarán cedidos a éste los derechos de su autor, salvo estipulación escrita en contrario.

        Artículo 9°- Es sujeto del derecho de autor de la obra derivada, quien hace la adaptación, traducción o transformación de la obra originaria protegida con autorización del titular original. En la publicación de la obra derivada deberá figurar el nombre o seudónimo del autor original.

        Cuando la obra originaria pertenezca a patrimonio cultural común, el adaptador, traductor o transformador gozará de todos los derechos que esta ley otorga sobre su versión; pero no podrá oponerse a que otros utilicen la misma obra originaria para producir versiones diferentes.

    CAPITULO III.  Duración de la Protección

        Artículo 10.- La protección otorgada por esta ley dura por toda la vida del autor y se extiende hasta por 70 años más, contados desde la fecha de su fallecimiento.

        En el caso previsto en el inciso segundo del artículo 8° y siendo el empleador una persona jurídica, la protección será de 70 años a contar desde la primera publicación.

        Artículo 11º- Pertenecen al patrimonio cultural común:

        a) Las obras cuyo plazo de protección se haya extinguido;

        b) La obra de autor desconocido, incluyéndose las canciones, leyendas, danzas y las expresiones del acervo folklórico;

        c) Las obras cuyos titulares renunciaron a la protección que otorga esta ley;

        d) Las obras de autores extranjeros, domiciliados en el exterior que no estén protegidos en la forma establecida en el artículo 2°, y

        e) Las obras que fueren expropiadas por el Estado, salvo que la ley especifique un beneficiario.

        Las obras del patrimonio cultural común podrán ser utilizadas por cualquiera, siempre que se respete la paternidad y la integridad de la obra.

        Artículo 12. En caso de obras en colaboración el plazo de setenta años correrá desde la muerte del último coautor.

        Si un colaborador falleciere intestado sin dejar asignatarios forzosos, sus derechos acrecerán los derechos del coautor o coautores.

        Artículo 13. La protección de la obra anónima o seudónima dura setenta años, a contar desde la primera publicación. Si antes su autor se da a conocer se estará a lo dispuesto en el artículo 10.

        Con relación al inciso anterior y del artículo 10, a falta de tal publicación autorizada dentro de un plazo de 50 años a partir de la fecha de creación de la obra, el plazo de protección será de 70 años contados desde el final del año civil en que fue creada la obra.

    CAPITULO IV. Derecho Moral

        Artículo 14.- El autor, como titular exclusivo del derecho moral, tiene de por vida las siguientes facultades:

        1) Reivindicar la paternidad de la obra, asociando a la misma su nombre o seudónimo conocido;

        2) Oponerse a toda deformación, mutilación, u otra modificación hecha sin expreso y previo consentimiento. No se considerarán como tales los trabajos de conservación, reconstitución o restauración de las obras que hayan sufrido daños que alteren o menoscaben su valor artístico;

        3) Mantener la obra inédita;

        4) Autorizar a terceros a terminar la obra inconclusa, previo consentimiento del editor o del cesionario si los hubiere, y

        5) Exigir que se respete su voluntad de mantener la obra anónima o seudónima mientras ésta no pertenezca el patrimonio cultural común.

        Artículo 15.- El derecho moral es transmisible por causa de muerte al cónyuge sobreviviente y a los sucesores ab intestato del autor.

        Artículo 16.- Los derechos numerados en los artículos precedentes son inalienables y es nulo cualquier pacto en contrario.

    CAPITULO V. Derecho patrimonial, su ejercicio y limitaciones

        Párrafo I. Del derecho patrimonial en general

        Artículo 17.- El derecho patrimonial confiere al titular del derecho de autor las facultades de utilizar directa y personalmente la obra, de transferir, total o parcialmente, sus derechos sobre ella y de autorizar su utilización por terceros.

        Artículo 18. Sólo el titular del derecho de autor o quienes estuvieren expresamente autorizados por él, tendrán el derecho de utilizar la obra en alguna de las siguientes formas:

        a) Publicarla mediante su edición, grabación, emisión radiofónica o de televisión, representación, ejecución, lectura, recitación, exhibición, y, en general, cualquier otro medio de comunicación al público, actualmente conocido o que se conozca en el futuro;

        b) Reproducirla por cualquier procedimiento;

        c) Adaptarla a otro género, o utilizarla en cualquier otra forma que entrañe una variación, adaptación o transformación de la obra originaria, incluida la traducción, y

        d) Ejecutarla públicamente mediante la emisión por radio o televisión, discos fonográficos, películas cinematográficas, cintas magnetofónicas u otro soporte material apto para ser utilizados en aparatos reproductores de sonido y voces, con o sin imágenes, o por cualquier otro medio.

        e) La distribución al público mediante venta, o cualquier otra transferencia de propiedad del original o de los ejemplares de su obra que no hayan sido objeto de una venta u otra transferencia de propiedad autorizada por él o de conformidad con esta ley.

        Con todo, la primera venta u otra transferencia de propiedad en Chile o el extranjero, agota el derecho de distribución nacional e internacionalmente con respecto del original o ejemplar transferido.

        Artículo 19.- Nadie podrá utilizar públicamente una obra del dominio privado sin haber obtenido la autorización expresa del titular del derecho de autor.

        La infracción de lo dispuesto en este artículo hará incurrir al o los responsables en las sanciones civiles y penales correspondientes.

        Artículo 20.- Se entiende, por autorización el permiso otorgado por el titular del derecho de autor, en cualquier forma contractual, para utilizar la obra de alguno de los modos y por alguno de los medios que esta ley establece.

        La autorización deberá precisar los derechos concedidos a la persona autorizada, señalando el plazo de duración, la remuneración y su forma de pago, el número mínimo o máximo de espectáculos o ejemplares autorizados o si son ilimitados, el territorio de aplicación y todas las demás cláusulas limitativas que el titular del derecho de autor imponga. La remuneración que se acuerde no podrá ser inferior, en caso alguno, al porcentaje que señale el Reglamento.

        A la persona autorizada no le serán reconocidos derechos mayores que aquellos que figuren en la autorización, salvo los inherentes a la misma según su naturaleza.

        Artículo 21. Todo propietario, concesionario, usuario, empresario, arrendatario o persona que tenga en explotación cualquier sala de espectáculos, local público o estación radiodifusora o de televisión en que se representen o ejecuten obras teatrales, cinematográficas o piezas musicales, o fonogramas o videogramas que contengan tales obras, de autores nacionales o extranjeros, podrá obtener la autorización de que tratan los artículos anteriores a través de la entidad de gestión colectiva correspondiente, mediante una licencia no exclusiva; y estará obligado al pago de la remuneración que en ella se determine, de acuerdo con las normas del título V.

        En ningún caso las autorizaciones otorgadas por dichas entidades de gestión colectiva podrán limitar la facultad de los titulares de derechos de administrar sus obras en forma individual respecto de utilizaciones singulares de ellas, en conformidad con lo dispuesto en el artículo anterior.

        Artículo 22.- Las autorizaciones relativas a obras literarias o musicales no confieren el uso exclusivo de la obra, manteniendo el titular la facultad de concederlo, también sin exclusividad, a terceros, salvo pacto en contrario

        Artículo 23.- Las facultades inherentes al derecho patrimonial y los beneficios pecuniarios de la obra en colaboración, corresponden al conjunto de sus coautores.

        Cualquiera de los colaboradores podrá exigir la publicación de la obra.

        Aquellos que no estén de acuerdo con que se publique, sólo podrán exigir la exclusión de su nombre manteniendo sus derechos patrimoniales.

     Párrafo II. Normas especiales.

        Artículo 24.- En el caso de las obras que a continuación se señalan regirán las normas siguientes:

        a) En antologías, crestomatías y otras compilaciones análogas, el derecho en la compilación corresponde al organizador, quien está obligado a obtener el consentimiento de los titulares del derecho de las obras utilizadas y a pagar la remuneración que por ellos se convenga, salvo que se consigne expresamente que tal autorización se concede a título gratuito;

        b) En enciclopedias, diccionarios y otras compilaciones análogas, hechas por encargo del organizador, éste será el titular del derecho, tanto sobre compilación como sobre los aportes individuales;

        c) En diarios, revistas y otras publicaciones periódicas:

        1) La empresa periodística adquiere el derecho de publicar en el diario, revista o periódico en que él o los autores presten sus servicios, los artículos, dibujos, fotografías y demás producciones aportadas por el personal sujeto a contrato de trabajo, reteniendo sus autores los demás derechos que esta ley ampara.

        La publicación de esas producciones en otros diarios, revistas o periódicos de la misma empresa, distintos de aquél o aquéllos en que se presten los servicios, dará derecho a sus autores al pago adicional del honorario que señale el Arancel del Colegio de Periodistas de Chile. Si la publicación se hace por una empresa periodística distinta de la empleadora, aquélla deberá pagar al autor o autores el honorario que establezca el mencionado Arancel.

        El derecho a las remuneraciones establecidas en el inciso anterior prescribe en el plazo de un año contado desde la respectiva publicación de las producciones; pero se suspenden en favor del autor o autores, respecto de la empresa periodística empleadora, mientras esté vigente el contrato de trabajo.

        2) Tratándose de producciones encomendadas por un medio de difusión a personas no sujetas a contrato de trabajo, aquél tendrá el derecho exclusivo para su publicación en la primera edición que se efectúe después de la entrega, a menos que hubiere sido encargada expresamente para una edición posterior. Transcurrido el plazo correspondiente, el autor podrá disponer libremente de ellas.

        d) A las Agencias Noticiosas e Informativas les será aplicable lo dispuesto en la c) respecto de los artículos, dibujos, fotografías y demás producciones protegidas por esta ley, y

        e) En estaciones radiodifusoras o de televisión, corresponderán al medio informativo y a los autores de las producciones que aquél difunda los mismos derechos que, según el caso, establecen los n°s 1) y 2) de la letra c).

        Artículo 25.- El derecho de autor de una obra cinematográfica corresponde a su productor.

        Artículo 26.- Es productor de una obra cinematográfica la persona, natural, o jurídica, que toma la iniciativa y la responsabilidad de realizarla.

        Artículo 27.- Tendrán la calidad de autores de una obra cinematográfica la o las personas naturales que realicen la creación intelectual de la misma.

        Salvo prueba en contrario, se presumen coautores de la obra cinematográfica hecha en colaboración, los autores del argumento, de la escenificación, de la adaptación, del guión y de la música especialmente compuesta para la obra, y el director.

        Si la obra cinematográfica ha sido tomada de una obra o escenificación protegida, los autores de ésta lo serán también de aquélla.

        Artículo 28.- Si uno de los autores de la obra cinematográfica deja de participar en su realización, no perderá los derechos que por su contribución le correspondan: pero no podrá oponerse a que se utilice su parte en la terminación de la obra.

        Cada uno de los autores de la obra cinematográfica puede explotar libremente, en un género diverso, la parte que constituye su contribución personal.

        Artículo 29.- El contrato entre los autores de la obra cinematográfica y el productor importa la cesión en favor de éste de todos los derechos sobre aquélla, y lo faculta para proyectarla en público, presentarla por televisión, reproducirla en copias, arrendarla y transferirla, sin perjuicio de los derechos que esta ley reconoce a los autores de las obras utilizadas y demás colaboradores.

        En los contratos de arrendamiento de películas cinematográficas extranjeras se entenderá siempre que la renta pactada comprende el valor de todos los derechos de autor y conexos a que dé origen la respectiva obra cinematográfica, los que serán de cargo exclusivo del distribuidor.

        Artículo 30.- El productor cinematográfico está obligado a consignar en la película para que aparezcan proyectados, su propio nombre o razón social, y los nombres del director, de los autores de la escenificación, de la obra originaria, de la adaptación, del guión, de la música y de la letra de las canciones, y de los principales intérpretes y ejecutantes.

        Artículo 31.- Los autores del argumento de la música, de la letra de las canciones, del doblaje y de la obra que, eventualmente, hubiese sido objeto de adaptación cinematográfica, conservan el derecho de utilizar, por separado, sus respectivas contribuciones, siempre que no hayan convenido su uso exclusivo para la producción cinematográfica.

        Artículo 32.- El productor tiene la facultad de modificar las obras que utilice en la producción cinematográfica, en la medida que requiera su adaptación a este arte.

        Artículo 33.- Si el productor no diere término a la obra cinematográfica dentro de los dos años subsiguientes a la recepción del argumento y entrega de las obras literarias o musicales que hayan de ser utilizadas, los correspondientes titulares tienen derecho a dejar sin efecto el contrato. En ese caso, el autor notificará judicialmente al productor y dispondrá de sus contribuciones a la obra, sin que ello implique renuncia al derecho de reclamar la reparación de los daños y perjuicios que le hubiere causado la dilación.

        Antes de vencer el plazo señalado en el inciso anterior, el productor podrá recurrir al juez del domicilio del autor para solicitar una prórroga, la que le será concedida si prueba que la dilación se debe a fuerza mayor, caso fortuito o dificultades ocasionadas por la índole de la obra.

        Artículo 34.- Corresponde al fotógrafo el derecho exclusivo de reproducir, exponer, publicar y vender sus fotografías, a excepción de las realizadas en virtud de un contrato, caso en el cual dicho derecho corresponde al que ha encargado la obra, y sin perjuicio de lo que establece el N° 1) de la letra c) del artículo 24.

        La cesión del negativo o del medio análogo de reducción de la fotografía, implica la cesión del derecho exclusivo reconocido en este artículo.

        Artículo 35º- DEROGADO

        Artículo 36.- El autor chileno de una pintura, escultura, dibujo o boceto tendrá, desde la vigencia de esta ley, el derecho inalienable de percibir el 5% del mayor valor real que obtenga el que lo adquirió, al vender la obra en subasta pública o a través de un comerciante establecido.

        El derecho se ejercitará en cada una de las futuras ventas de la obra y corresponderá exclusivamente al autor, y no a sus herederos, legatarios o cesionarios.

        Corresponderá al autor la prueba del precio original de la obra o de los pagados en las ventas posteriores de la misma.

        Artículo 37.- La adquisición, a cualquier título, de pinturas, esculturas, dibujos y demás obras de artes plásticas, no faculta al adquirente para reproducirlas, exhibirlas o publicarlas con fines de lucro.

        El autor conserva el derecho de reproducción de la obra, pero no podrá, salvo autorización del propietario del original, ceder o comercializar esas reproducciones. Podrá, asimismo, hacer publicar y exhibir sin fines lucrativos, las reproducciones de sus obras originales que hubiese transferido, a condición de dejar expresa constancia de que se trata de una copia del original.

        Artículo 37 bis.- Respecto de los programas computacionales sus autores tendrán el derecho de autorizar o prohibir el arrendamiento comercial al público de dichas obras amparadas por el derecho de autor.

        Este derecho no será aplicable a los programas computacionales, cuando éstos no sean el objeto esencial del arrendamiento.

    PARRAFO III. Excepciones a las normas anteriores.- Derogado.

    Articulo 38°.- (DEROGADO)

    Artículo 39.- (DEROGADO)

    Articulo 40°.- (DEROGADO)

    Articulo 41°.- (DEROGADO)

    Articulo 42°.- (DEROGADO)

    Articulo 43°.- (DEROGADO)

    Articulo 44°.- (DEROGADO)

    Articulo 45°.- (DEROGADO)

    Articulo 45° BIS.- (DEROGADO)

    PARRAFO IV. Excepciones al derecho de autor.- (DEROGADO).

    Articulo 46°.- (DEROGADO)

    Articulo 47°.- (DEROGADO)

    CAPITULO VI. Contrato de Edición

        Artículo 48.- Por el contrato de edición el titular del derecho de autor entrega o promete entregar una obra al editor y éste se obliga a publicarla, a su costa y en su propio beneficio, mediante su impresión gráfica y distribución, y a pagar una remuneración al autor.

        El contrato de edición se perfecciona por escritura pública o por documento privado firmado ante notario, y debe contener:

        a) La individualizacion del autor y del editor;

        b) La individualización de la obra;

        c) El número de ediciones que se conviene y la cantidad de ejemplares de cada una;

        d) La circunstancia de concederse o no la exclusividad al editor;

        e) La remuneración pactada con el autor, que no podrá ser inferior a la establecida en el artículo 50, y su forma de pago, y

        f) Las demás estipulaciones que las partes convengan.

        Artículo 49.- El contrato de edición no confiere al editor otros derechos que el de imprimir, publicar y vender los ejemplares de la obra en las condiciones convenidas. El autor retiene los derechos exclusivos de traducción, presentación en público, adaptación cinematográfica, fonográfica o televisual y todos los demás de utilización de la obra.

        El derecho concedido a un editor para publicar varias obras separadas, no comprende la facultad de publicarlas reunidas en un solo volumen y viceversa.

        Artículo 50°- Cuando la remuneración convenida consista en una participación sobre el producto de la venta, ésta no podrá ser inferior al 10% del precio de venta al público de cada ejemplar.

        En tal caso, el editor deberá rendir cuenta al titular del derecho por lo menos una vez al año, mediante una liquidación completa y documentada en que se mencione el número de ejemplares impresos, el de ejemplares vendidos, el saldo existente en bodegas, librerías, depósito o en consignación, el número de ejemplares destruidos por caso fortuito o fuerza mayor y el monto de la participación pagada o debida al autor.

        Si el editor no rindiere cuenta en la forma antes especificada, se presumirá vendida la totalidad de la edición y el autor tendrá derecho a exigir el pago del porcentaje correspondiente a dicho total.

        Artículo 51.- El autor tiene el derecho de dejar sin efecto el contrato de edición en los siguientes casos:

        a) Cuando el editor no cumple con la obligación de editar y publicar la obra dentro del plazo estipulado o, si no se fijó ésta, dentro de un año a contar de la entrega de los originales, y

        b) Si facultado el editor para publicar más de una edición y, habiéndose agotado los ejemplares para la venta, no procede a publicar una nueva, dentro del plazo de un año, contado desde la notificación judicial que se le haga a requerimiento del autor.

        En los casos en que se deje sin efecto el contrato por incumplimiento del editor, el autor podrá conservar los anticipos que hubiere recibido de aquél, sin perjuicio del derecho de entablar en su contra las acciones pertinentes.

        El editor, a su vez, podrá pedir se deje sin efecto el contrato si el autor no entrega la obra dentro del plazo convenido y, si no se fijó éste, dentro de un año a contar desde la fecha del convenio, sin perjuicio del derecho de deducir en su contra las acciones judiciales que correspondan.

        Sin perjuicio de lo dispuesto en la letra b), el autor de una obra editada dos o más veces, que se encontrare agotada, podrá exigir al editor la publicación de una nueva edición, con igual tirada que la última que se hubiere publicado, dentro del plazo de un año contado desde el requerimiento respectivo.

        En caso de negarse el editor a efectuar la nueva edición, el autor podrá recurrir al Departamento de Derechos Intelectuales que establece el artículo 90, el que, previa audiencia del editor, si estimase que su negativa no tiene fundamento, ordenará se proceda a la impresión solicitada y a su venta al público, bajo apercibimiento de disponer se haga ello por un tercero, a costa del infractor, en caso de incumplimiento.

        Artículo 52°- El autor podrá dejar sin efecto el contrato si transcurridos cinco años de estar la edición en venta, el público no hubiere adquirido más del 20% de los ejemplares. En tal caso, el autor deberá adquirir todos los ejemplares no vendidos al editor, al precio de costo.

        Artículo 53.- Si se editare una obra de autor desconocido y con posterioridad éste apareciere, el editor quedará obligado a abonar al autor el 10% del precio de venta al público de los ejemplares que hubiere vendido, y conservará el derecho de vender el saldo, previo abono del porcentaje indicado u otro que se acuerde con el autor.

        El autor tiene el derecho preferente de adquirir los ejemplares que estén en poder del editor, con deducción del descuento concedido por éste a los distribuidores y consignatarios.

        Si el editor hubiere procedido de mala fe, el autor tendrá derecho, además, a la indemnización que corresponda.

        Artículo 54.- El editor tiene la facultad de exigir judicialmente el retiro de la circulación de las ediciones fraudulentas que pudieren aparecer durante la vigencia del contrato, y aún después de extinguido, mientras no se hubieren agotado los ejemplares de la edición.

        El autor tiene derecho a la totalidad del precio respecto del mayor número de ejemplares que se hubieren editado o reproducido con infracción del contrato.

        El Reglamento establecerá las medidas conducentes a evitar que se impriman y pongan a la venta mayor número de ejemplares que el convenido entre el autor y el editor.

        Artículo 55.- El que edite una obra protegida dentro del territorio nacional, está obligado a consignar en lugar visible, en todos los ejemplares, las siguientes indicaciones:

        a) Título de la obra;

        b) Nombre o seudónimo del autor o autores, y del traductor o coordinador, salvo que hubieren decidido mantenerse en anonimato;

        c) La mención de reserva, con indicación del nombre o seudónimo del titular del derecho de autor y el número de la inscripción en el registro;

        d) El año y el lugar de la edición y de las anteriores, en su caso;

        e) Nombre y dirección del editor y del impresor, y f) Tiraje de la obra.

        La omisión de las indicaciones precedentes no priva del ejercicio de los derechos que confiere esta ley, pero da lugar a la imposición de una multa de conformidad con el artículo 81 de esta ley y la obligación de subsanar la omisión.

    CAPITULO VII. Contrato de Representación

        Artículo 56.- El contrato de representación es una convención por la cual el autor de una obra de cualquier género concede a un empresario el derecho de representarla en público, a cambio de la remuneración que ambos acuerden. Esta remuneración no podrá ser inferior a los porcentajes señalados en el artículo 61.

        El contrato de representación se perfecciona por escritura pública o por instrumento privado firmado ante notario.

        Artículo 57.- El empresario estará obligado a hacer representar en público la obra dentro de los seis meses siguientes a la fecha de la firma del contrato.

        Expirado el plazo, legal o convencional, sin que la obra haya sido estrenada, el autor podrá dejar sin efecto el contrato, sin que esté obligado a devolver los anticipos que hubiere recibido.

        Artículo 58.- En ausencia de estipulaciones contractuales, el empresario adquiere la concesión exclusiva para la representación de la obra sólo durante seis meses a partir de su estreno y, sin exclusividad, por otros seis.

        Artículo 59.- El empresario podrá dejar sin efecto el contrato, perdiendo los anticipos hechos al autor, si la obra dejare de representarse durante las siete primeras funciones por cualquier causa o circunstancia ajena a su voluntad, excepto caso fortuito o fuerza mayor.

        Si la obra dejare de representarse por causa imputable al empresario, el autor podrá dejar sin efecto el contrato y demandar indemnización de perjuicios, reteniendo los anticipos que se le hubieren hecho.

        Artículo 60.- El empresario estará obligado:

        1.- A representar la obra en las condiciones señaladas en el contrato, sin introducir adiciones, cortes o variaciones no consentidas por el autor y a anunciarla al público con su título, nombre del autor y, en su caso, nombre del traductor o adaptador.

        2.- A permitir que el autor vigile la representación de la obra, y

        3.- A mantener los intérpretes principales o los directores de la orquesta y coro, si fueron elegidos de acuerdo con el autor.

        Artículo 61.- Cuando la remuneración del autor o autores no hubiere sido determinada contractualmente en un porcentaje superior, les corresponderá en conjunto, el 10% del total del valor de las entradas de cada función, y el día del estreno el 15%, descontados los impuestos que graven las entradas.

        Artículo 62.- Si el espectáculo fuere además radiodifundido o televisado corresponderá al autor percibir, como mínimo, un 5% del precio cobrado por la emisora por la publicidad realizada durante el programa o, si no la hubiere, un 10% de lo que reciba el empresario de la emisora por radiodifundir la representación. Esta remuneración se percibirá sin perjuicio de la que se pague por quien corresponda, conforme al artículo 61.

        Artículo 63.- La participación del autor en los ingresos de la taquilla tiene la calidad de un depósito en poder del empresario a disposición del autor y no será afectada por ningún embargo dictado en contra de los bienes del empresario.

        Si el empresario, al ser requerido por el autor, no le entregare la participación que mantiene en depósito, la autoridad judicial competente, a solicitud del interesado, ordenará la suspensión de las representaciones de la obra o la retención del producto de las entradas, sin perjuicio del derecho del autor para dejar sin efecto el contrato e iniciar las acciones a que hubiere lugar.

        Artículo 64. La ejecución singularizada de una o varias obras musicales y la recitación o lectura de las obras literarias en público se regirán por las disposiciones anteriores en cuanto les fueren aplicables, en cuyo caso la remuneración del autor o autores no podrá ser inferior a la establecida por las entidades de gestión, conforme con la naturaleza de la utilización. Lo anterior se considerará sin perjuicio de lo dispuesto en el artículo 100.

    TITULO II. DERECHOS CONEXOS AL DERECHO DE AUTOR

    CAPITULO I. Artistas, Intérpretes y Ejecutantes

        Artículo 65.- Son derechos conexos al derecho de autor los que esta ley otorga a los artistas, intérpretes y ejecutantes para permitir o prohibir la difusión de sus producciones y percibir una remuneración por el uso público de las mismas, sin perjuicio de las que corresponden al autor de la obra.

        Ninguna de las disposiciones de esta ley relativa a los derechos conexos podrá interpretarse en menoscabo de la protección que ella otorga al derecho de autor.

        Cuando sea necesaria la autorización del autor de una obra incorporada a un fonograma y la autorización del artista, intérprete o ejecutante y del productor del fonograma, éstas deberán concurrir sin que unas excluyan a las otras.

        Artículo 66. Respecto de las interpretaciones y ejecuciones de un artista, se prohíben sin su autorización expresa, o la de su heredero o cesionario, los siguientes actos:

        1) La grabación, reproducción, transmisión o retransmisión por medio de los organismos de radiodifusión o televisión, o el uso por cualquier otro medio, con fines de lucro, de tales interpretaciones o ejecuciones.

        2) La fijación en un fonograma de sus interpretaciones o ejecuciones no fijadas, y la reproducción de tales fijaciones.

        3) La difusión por medios inalámbricos o la comunicación al público de sus interpretaciones o ejecuciones en directo.

        4) La distribución al público mediante venta, o cualquier otra transferencia de propiedad  del original o de los ejemplares de su interpretación o ejecución que no hayan sido objeto de una venta u otra transferencia de propiedad autorizada por el artista o su cesionario o de conformidad con esta ley.

        Para los efectos de este número, la primera venta u otra transferencia de propiedad en Chile o el extranjero, agota el derecho de distribución nacional e internacionalmente con respecto del original o ejemplar transferido.

    CAPITULO II. De los fonogramas

        Artículo 67. El que utilice fonogramas o reproducciones de los mismos para su difusión por radio o televisión o en cualquiera otra forma de comunicación al público, estará obligado a pagar una retribución a los artistas, intérpretes o ejecutantes y a los productores de fonogramas, cuyo monto será establecido de acuerdo con lo dispuesto en el artículo 100.

        El cobro del derecho de ejecución de fonogramas a que se refiere este artículo deberá efectuarse a través de la entidad de gestión colectiva que los represente.

        La distribución de las sumas recaudadas por concepto de derecho de ejecución de fonogramas se efectuará en la proporción de un 50% para los artistas, intérpretes o ejecutantes, y un 50% para el productor fonográfico.

        El porcentaje que corresponda a los artistas, intérpretes o ejecutantes se repartirá de conformidad con las siguientes normas:

        a) Dos tercios serán pagados al artista intérprete, entendiéndose como tal el cantante, el conjunto vocal o el artista que figure en primer plano en la etiqueta del fonograma o, cuando la grabación sea instrumental, el director de la orquesta.

        b) Un tercio será pagado, en proporción a su participación en el fonograma, a los músicos acompañantes y miembros del coro.

        c) Cuando el artista intérprete sea un conjunto vocal, la parte que le corresponda, según lo dispuesto en la letra a), será pagada al director del conjunto, quien la dividirá entre los componentes, por partes iguales.

        Artículo 67 bis.- El productor de fonogramas, sobre su fonograma y el artista sobre su interpretación o ejecución fijada tendrán, respectivamente, el derecho exclusivo de autorizar o prohibir la puesta a disposición del público, por hilo o por medios inalámbricos, del fonograma o sus interpretaciones o ejecuciones fijadas en dicho fonograma, de forma que cada miembro del público, pueda tener, sin distribución previa de ejemplares, acceso a dichos fonogramas o interpretaciones o ejecuciones fijadas, en el lugar y en el momento que dicho miembro del público elija.

        Artículo 68. Los productores de fonogramas gozarán del derecho de autorizar o prohibir la reproducción, el arrendamiento, el préstamo y demás utilizaciones de sus fonogramas, incluyendo la distribución al público mediante venta, o cualquier otra transferencia de propiedad del original o de los ejemplares de su fonograma que no hayan sido objeto de una venta u otra transferencia de propiedad autorizada por él o de conformidad con esta ley.

        Para los efectos de este artículo, se entiende que la primera venta u otra transferencia de propiedad en Chile o el extranjero, agota el derecho de distribución nacional e internacionalmente con respecto del original o ejemplar transferido.

        El productor de fonogramas, además del título de la obra grabada y el nombre de su autor, deberá mencionar en la etiqueta del disco fonográfico el nombre del intérprete, la marca que lo identifique y el año de publicación. Cuando sea materialmente imposible consignar todas esas indicaciones directamente sobre la reproducción, ellas deberán figurar en el sobre, cubierta, caja o membrete que la acompañará obligatoriamente.

    CAPITULO III. Organismos de Radiodifusión

        Artículo 69.- Los organismos de radiodifusión o de televisión gozarán del derecho de autorizar o prohibir la fijación de sus emisiones y la reproducción de las mismas.

        La retransmisión de las emisiones de dichos organismos o su comunicación al público en locales a los que éste tenga libre acceso, otorgará a la empresa derecho a una retribución, cuyo monto fijará el Reglamento.

        En el caso de los permisionarios de servicios limitados de televisión, éstos no podrán emitir ni retransmitir, por cualquier medio, en su oferta programática, señales pertenecientes a los concesionarios de radiodifusión televisiva de libre recepción, sin la expresa autorización de éstos. La emisión y retransmisión de tales señales dará al concesionario el derecho a una retribución, que deberá ser acordada previamente por las partes.

        Los organismos de radiodifusión o televisión podrán realizar fijaciones efímeras de interpretaciones o ejecuciones de un artista con el único fin de utilizarlas en emisión, por el número de veces acordado, quedando obligados a destruirlas inmediatamente después de la última transmisión autorizada.

    CAPITULO IV. Duración de la protección de los derechos conexos

      Artículo 70.- La protección concedida por este Título tendrá una duración de setenta  años, contados desde el 31 de diciembre del año de la publicación de los fonogramas respecto de los productores de fonogramas y de 70 años desde la publicación de las interpretaciones o ejecuciones respecto de los artistas intérpretes o ejecutantes.

        A falta de tal publicación autorizada dentro de un plazo de 50 años a partir de la fecha de la fijación de la interpretación o ejecución o fonograma, la protección será de 70 años contados desde el final del año civil en que fue fijada la interpretación o ejecución o fonograma.

        En el caso de interpretaciones o ejecuciones no fijadas, el plazo de 70 años se contará desde la fecha de su realización.

        La protección de las emisiones de los organismos de radiodifusión tendrá una duración de cincuenta años, contados desde el 31 de diciembre del año de la transmisión.

        Artículo 71.- Los titulares de los derechos conexos podrán enajenarlos, total o parcialmente, a cualquier título. Dichos derechos son transmisibles por causa de muerte.

    Título III. Limitaciones y Excepciones al Derecho de Autor y a los Derechos Conexos

        Artículo 71 A. Cuando sea procedente, las limitaciones y excepciones establecidas en este Título se aplicarán tanto a los derechos de autor como a los derechos conexos.

        Artículo 71 B. Es lícita la inclusión en una obra, sin remunerar ni obtener autorización del titular, de fragmentos breves de obra protegida, que haya sido lícitamente divulgada, y su inclusión se realice a título de cita o con fines de crítica, ilustración, enseñanza e investigación, siempre que se mencione su fuente, título y autor.

        Artículo 71 C. Es lícito, sin remunerar ni obtener autorización del titular, todo acto de reproducción, adaptación, distribución o comunicación al público, de una obra lícitamente publicada, que se realice en beneficio de personas con discapacidad visual, auditiva, o de otra clase que le impidan el normal acceso a la obra, siempre que dicha utilización guarde relación directa con la discapacidad de que se trate, se lleve a cabo a través de un procedimiento o medio apropiado para superar la discapacidad y sin fines comerciales.

        En los ejemplares se señalará expresamente la circunstancia de ser realizados bajo la excepción de este artículo y la prohibición de su distribución y puesta a disposición, a cualquier título, de personas que no tengan la respectiva discapacidad.

        Artículo 71 D. Las lecciones dictadas en instituciones de educación superior, colegios y escuelas, podrán ser anotadas o recogidas en cualquier forma por aquellos a quienes van dirigidas, pero no podrán ser publicadas, total o parcialmente, sin autorización de sus autores.

        Las conferencias, discursos políticos, alegatos judiciales y otras obras del mismo carácter que hayan sido pronunciadas en público, podrán ser utilizadas libremente y sin pago de remuneración, con fines de información, quedando reservado a su autor el derecho de publicarlas en colección separada.

        Artículo 71 E. En los establecimientos comerciales en que se expongan y vendan instrumentos musicales, aparatos de radio o televisión o cualquier equipo que permita la emisión de sonidos o imágenes, podrán utilizarse libremente y sin pago de remuneración, obras o fonogramas, con el exclusivo objeto de efectuar demostraciones a la clientela, siempre que éstas se realicen dentro del propio local o de la sección del establecimiento destinada a este objeto y en condiciones que eviten su difusión al exterior.

        En el caso de los establecimientos comerciales en que se vendan equipos o programas computacionales, será libre y sin pago de remuneración la utilización de obras protegidas obtenidas lícitamente, con el exclusivo objeto de efectuar demostraciones a la clientela y en las mismas condiciones señaladas en el inciso anterior.

        Artículo 71 F. La reproducción de obras de arquitectura por medio de la fotografía, el cine, la televisión y cualquier otro procedimiento análogo, así como la publicación de las correspondientes fotografías en diarios, revistas y libros y textos destinados a la educación, es libre y no está sujeta a remuneración,  siempre que no esté en colección separada, completa o parcial, sin autorización del autor.

        Asimismo, la reproducción mediante la fotografía, el dibujo o cualquier otro procedimiento, de monumentos, estatuas y, en general, las obras artísticas que adornan permanentemente plazas, avenidas y lugares públicos, es libre y no está sujeta a remuneración, siendo lícita la publicación y venta de las reproducciones.

        Artículo 71 G. En las obras de arquitectura, el autor no podrá impedir la introducción de modificaciones que el propietario decida realizar, pero podrá oponerse a la mención de su nombre como autor del proyecto.

        Artículo 71 H. No será aplicable a las películas publicitarias o propagandísticas la obligación que establece el artículo 30. Tampoco será obligatorio mencionar el nombre del autor en las fotografías publicitarias.

        Asimismo, lo dispuesto en el artículo 37 bis no será aplicable a los programas computacionales, cuando éstos no sean el objeto esencial del arrendamiento.

        Artículo 71 I. Las bibliotecas y archivos que no tengan fines lucrativos podrán, sin que se requiera autorización del autor o titular ni pago de remuneración alguna, reproducir una obra que no se encuentre disponible en el mercado, en los siguientes casos:

        a) Cuando el ejemplar se encuentre en su colección permanente y ello sea necesario a los efectos de preservar dicho ejemplar o sustituirlo en caso de pérdida o deterioro, hasta un máximo de dos copias.

        b) Para sustituir un ejemplar de otra biblioteca o archivo que se haya extraviado, destruido o inutilizado, hasta un máximo de dos copias.

        c) Para incorporar un ejemplar a su colección permanente.

        Para los efectos del presente artículo, el ejemplar de la obra no deberá encontrarse disponible para la venta al público en el mercado nacional o internacional en los últimos tres años.

        Artículo 71 J. Las bibliotecas y archivos que no tengan fines lucrativos podrán, sin que se requiera autorización del autor o titular, ni pago de remuneración alguna, efectuar copias de fragmentos de obras que se encuentren en sus colecciones, a solicitud de un usuario de la biblioteca o archivo exclusivamente para su uso personal.

        Las copias a que se refiere el inciso anterior sólo podrán ser realizadas por la respectiva biblioteca o archivo.

        Artículo 71 K. Las bibliotecas y archivos que no tengan fines lucrativos podrán, sin que se requiera autorización del autor o titular, ni pago de remuneración alguna, efectuar la reproducción electrónica de obras de su colección para ser consultadas gratuita y simultáneamente hasta por un número razonable de usuarios, sólo en terminales de redes de la respectiva institución y en condiciones que garanticen que no se puedan hacer copias electrónicas de esas reproducciones.

        Artículo 71 L. Las bibliotecas y archivos que no tengan fines lucrativos podrán, sin que se requiera remunerar al titular ni obtener su autorización, efectuar la traducción de obras originalmente escritas en idioma extranjero y legítimamente adquiridas, cuando al cumplirse un plazo de tres años contado desde la primera publicación, o de un año en caso de publicaciones periódicas, en Chile no hayan sido publicadas su traducción al castellano por el titular del derecho.

        La traducción deberá ser realizada para investigación o estudio por parte de los usuarios de dichas bibliotecas o archivos, y sólo podrán ser reproducidas en citas parciales en las publicaciones que resulten de dichas traducciones.

        Artículo 71 M. Es lícito, sin remunerar ni obtener autorización del autor, reproducir y traducir para fines educacionales, en el marco de la educación formal o autorizada por el Ministerio de Educación, pequeños fragmentos de obras o de obras aisladas de carácter plástico, fotográfico o figurativo, excluidos los textos escolares y los manuales universitarios, cuando tales actos se hagan únicamente para la ilustración de las actividades educativas, en la medida justificada y sin ánimo de lucro, siempre que se trate de obras ya divulgadas y se incluyan el nombre del autor y la fuente, salvo en los casos en que esto resulte imposible.

        Artículo 71 N. No se considera comunicación ni ejecución pública de la obra, inclusive tratándose de fonogramas, su utilización dentro del núcleo familiar, en establecimientos educacionales, de beneficencia, bibliotecas, archivos y museos, siempre que esta utilización se efectúe sin fines lucrativos. En estos casos no se requerirá autorización del autor o titular ni pago de remuneración alguna.

        Artículo 71 Ñ. Las siguientes actividades relativas a programas computacionales están permitidas, sin que se requiera autorización del autor o titular ni pago de remuneración alguna:

        a) La adaptación o copia de un programa computacional efectuada por su tenedor, siempre que la adaptación o copia sea esencial para su uso, o para fines de archivo o respaldo y no se utilice para otros fines.

        Las adaptaciones obtenidas en la forma señalada no podrán ser transferidas bajo ningún título, sin que medie autorización previa del titular del derecho de autor respectivo; igualmente, las copias obtenidas en la forma indicada no podrán ser transferidas bajo ningún título, salvo que lo sean conjuntamente con el programa computacional que les sirvió de matriz.

        b) Las actividades de ingeniería inversa sobre una copia obtenida legalmente de un programa computacional que se realicen con el único propósito de lograr la compatibilidad operativa entre programas computacionales o para fines de investigación y desarrollo. La información así obtenida no podrá utilizarse para producir o comercializar un programa computacional similar que atente contra la presente ley o para cualquier otro acto que infrinja los derechos de autor.

        c) Las actividades que se realicen sobre una copia obtenida legalmente de un programa computacional, con el único propósito de probar, investigar o corregir su funcionamiento o la seguridad del mismo u otros programas, de la red o del computador sobre el que se aplica. La información derivada de estas actividades solo podrá ser utilizada para los fines antes señalados.

        Artículo 71 O. Es lícita la reproducción provisional de una obra, sin que se requiera remunerar al titular ni obtener su autorización. Esta reproducción provisional deberá ser transitoria o accesoria; formar parte integrante y esencial de un proceso tecnológico, y tener como única finalidad la transmisión lícita en una red entre terceros por parte de un intermediario, o el uso lícito de una obra u otra materia protegida, que no tenga una significación económica independiente.

        Artículo 71 P. Será lícita la sátira o parodia que constituye un aporte artístico que lo diferencia de la obra a que se refiere, a su interpretación o a la caracterización de su intérprete.

        Artículo 71 Q. Es lícito el uso incidental y excepcional de una obra protegida con el propósito de crítica, comentario, caricatura, enseñanza, interés académico o de investigación, siempre que dicha utilización no constituya una explotación encubierta de la obra protegida. La excepción establecida en este artículo no es aplicable a obras audiovisuales de carácter documental.

        Artículo 71 R. Se podrá, sin que se requiera autorización del autor o titular, ni pago de remuneración alguna, efectuar la traducción de obras originalmente escritas en idioma extranjero y legítimamente adquiridas, para efectos de uso personal.

        Artículo 71 S. Se podrá, sin requerir autorización del autor o titular, ni pago de remuneración alguna, reproducir o comunicar al público una obra para la realización de actuaciones judiciales, administrativas y legislativas.

     TITULO IV. DISPOSICIONES GENERALES

    ————————————————————————————

    NOTA

          El numeral 8 del artículo 1 de la Ley 20435, publicada el 04.05.2010, modifica la presente norma, en el sentido de intercalar un nuevo Título III, pasando el actual Título III a ser Título IV, sin embargo, no modifica la numeración de los demás Títulos, dejando dos Títulos IV.  

    ————————————————————————————

    CAPITULO I. Registro

        Artículo 72.- En el Registro de la Propiedad Intelectual deberán inscribirse los derechos de autor y los derechos conexos que esta ley establece.

        El Reglamento determinará, en lo demás, los deberes y funciones del Conservador y la forma y solemnidades de las inscripciones.

        Artículo 72 Bis.- El titular de un derecho patrimonial sobre una obra podrá utilizar, en el ejemplar, el símbolo “©” anteponiéndolo al año de la primera publicación y a su nombre.

        Tratándose de fonogramas, las copias de éstos o en sus envolturas, podrán presentar un símbolo “(p)” antepuesto al año de la primera publicación y al nombre del productor.

        Las personas naturales o jurídicas cuyo nombre aparezca indicado de la manera señalada en los incisos anteriores, se presumirán como titulares de los derechos respectivos.

        Artículo 73.- La transferencia total o parcial de los derechos de autor o de derechos conexos, a cualquier título, deberá inscribirse en el Registro dentro del plazo de 60 días, contado desde la fecha de celebración del respectivo acto o contrato. La transferencia deberá efectuarse por instrumento público o por instrumento privado autorizado ante notario.

        También deberá inscribirse, dentro del mismo plazo, la resolución del contrato que originó la transferencia.

        Artículo 74.- El editor gozará de los derechos que le otorga esta ley sólo previa inscripción del contrato respectivo en el Registro que establece el artículo 72; pero el incumplimiento de esta formalidad no privará al autor de los derechos que en conformidad a esta ley o al contrato le correspondan.

        Artículo 75. En el momento de inscribir una obra en el Registro de Propiedad Intelectual, se depositará un ejemplar completo, manuscrito, impreso o reproducido. Tratándose de obras no literarias, regirán las siguientes normas:

        a) Para las obras de pintura, dibujo, escultura, ingeniería y arquitectura, bastarán los croquis, fotografías o planos del original necesarios para identificarlo con las explicaciones del caso;

        b) Para las obras cinematográficas, será suficiente depositar una copia del argumento, escenificación y leyenda de la obra;

        c) Para las obras fotográficas, será suficiente acompañar una copia de la fotografía;

        d) Para el fonograma, será suficiente depositar la copia del disco o de la cinta magnetofónica que lo contenga, salvo que se trate de música nacional en que deberán depositarse dos ejemplares;

        e) Para las interpretaciones y ejecuciones, será suficiente depositar una copia de la fijación. En el caso de las interpretaciones y ejecuciones de música nacional deberá depositarse dos ejemplares de la fijación. Se dispensa la presentación de esta copia cuando la interpretación o ejecución esté incorporada a un fonograma o a una emisión inscritos de acuerdo a la letra d) o f) del presente artículo;

        f) Para las emisiones, se depositará una copia de la transmisión radial o televisual. Se dispensa la presentación de esta copia cuando haya sido enviada a la Oficina de Informaciones y Radiodifusión de la Presidencia de la República de acuerdo a las disposiciones legales vigentes, y

        g) Para las obras musicales será necesaria una partitura escrita; pero en el caso de las obras sinfónicas bastará una reducción para piano. Si se trata de obras con parte de canto, se acompañará la letra, y, en el caso de las obras de música nacional, deberá acompañarse dos ejemplares de la partitura.

    —————————————————————————

    NOTA:

        El Artículo 16 de la LEY 19928, publicada el 31.01.2004, dispone que el Registro de Propiedad Intelectual, que recibe el depósito legal a que se refiere este artículo, debe entregar a la Biblioteca Nacional uno de los ejemplares de las obras musicales, para los fines que indica.

    —————————————————————————-

        Artículo 76.- La inscripción en el Registro de la Propiedad Intelectual se hará previo pago de los siguientes derechos calculados en porcentajes sobre una unidad tributaria mensual:

        1.- Proyectos de ingeniería, de arquitectura y programas computacionales, 35%;

        2.- Obras cinematográficas, 40%, y

        3.- Cualquier otra inscripción de las contempladas en esta ley, 10%.

        Todos estos derechos serán depositados en la cuenta corriente única del Servicio Nacional del Patrimonio Cultural, bajo la responsabilidad y custodia del funcionario que dicho Servicio designe, quien los destinará a la administración del Departamento de Derechos Intelectuales creado por el artículo 90 de esta ley.

        Artículo 77.- Para los efectos de los derechos que se pagan por la inscripción en el Registro de Propiedad Intelectual, se considerarán como una sola pieza:

        a) Las obras teatrales, aunque tengan más de un acto, y

        b) El disco fonográfico o la cinta magnetofónica grabada, aunque contengan más de una interpretación o ejecución.

    CAPITULO II. De las Acciones y Procedimientos

    Párrafo I. De las Infracciones a las Disposiciones de esta Ley

        Artículo 78.- Las infracciones a esta ley y su reglamento no contempladas expresamente en los artículos 79 y siguientes, serán sancionadas con multa de 5 a 50 unidades tributarias mensuales.

    Párrafo II. De los Delitos Contra la Propiedad Intelectual

        Artículo 79. Comete falta o delito contra la propiedad intelectual:

        a) El que, sin estar expresamente facultado para ello, utilice obras de dominio ajeno protegidas por esta ley, inéditas o publicadas, en cualquiera de las formas o por cualquiera de los medios establecidos en el artículo 18.

        b) El que, sin estar expresamente facultado para ello, utilice las interpretaciones, producciones y emisiones protegidas de los titulares de los derechos conexos, con cualquiera de los fines o por cualquiera de los medios establecidos en el Título II.

        c) El que falsificare o adulterare una planilla de ejecución.

        d) El que falseare datos en las rendiciones de cuentas a que se refiere el artículo 50.

        e) El que, careciendo de autorización del titular de los derechos o de la ley, cobrare derechos u otorgase licencias respecto de obras o de interpretaciones o ejecuciones o fonogramas que se encontraren protegidos.

        Las conductas señaladas serán sancionadas de la siguiente forma:

        1. Cuando el monto del perjuicio causado sea inferior a las 4 unidades tributarias mensuales, la pena será de prisión en cualquiera de sus grados o multa de 5 a 100 unidades tributarias mensuales.

        2. Cuando el monto del perjuicio causado sea igual o superior a 4 unidades tributarias mensuales y sea inferior a 40 unidades tributarias mensuales, la pena será de reclusión menor en su grado mínimo y multa de 20 a 500 unidades tributarias mensuales.

        3. Cuando el monto del perjuicio sea igual o superior a 40 unidades tributarias mensuales, la pena será de reclusión menor en su grado mínimo y multa de 50 a 1.000 unidades tributarias mensuales.

        Artículo 79 bis.- El que falsifique obra protegida por esta ley, o el que la edite, reproduzca o distribuya ostentando falsamente el nombre del editor autorizado, suprimiendo o cambiando el nombre del autor o el título de la obra, o alterando maliciosamente su texto, será sancionado con las penas de reclusión menor en su grado mínimo y multa de 10 a 1.000 unidades tributarias mensuales.

        Artículo 80. Comete delito contra la propiedad intelectual y será sancionado con pena de multa de 25 a 500 unidades tributarias mensuales:

        a) El que, a sabiendas, reproduzca, distribuya, ponga a disposición o comunique al público una obra perteneciente al dominio público o al patrimonio cultural común bajo un nombre que no sea el del verdadero autor.

        b) El que se atribuyere o reclamare derechos patrimoniales sobre obras de dominio público o del patrimonio cultural común.

        c) El que obligado al pago en retribución por la ejecución o comunicación al público de obras protegidas, omitiere la confección de las planillas de ejecución correspondientes.

        Artículo 81. Comete delito contra la propiedad intelectual y será sancionado con pena de reclusión menor en su grado mínimo y multa de 50 a 800 unidades tributarias mensuales, el que tenga para comercializar, comercialice o alquile directamente al público copias de obras, de interpretaciones o de fonogramas, cualquiera sea su soporte, reproducidos en contravención a las disposiciones de esta ley.

        El que con ánimo de lucro fabrique, importe, interne al país, tenga o adquiera para su distribución comercial las copias a que se refiere el inciso anterior, será sancionado con las penas de reclusión menor en su grado medio a máximo y multa de 100 a 1.000 unidades tributarias mensuales.

        Artículo 82. En caso de reincidencia de los delitos previstos en esta ley, se aplicarán las penas máximas contempladas para cada uno de ellos. En estos casos, la multa no podrá ser inferior al doble de la anterior, y su monto máximo podrá llegar a 2.000 unidades tributarias mensuales.

        Artículo 83. Tratándose de los delitos previstos en el artículo 81, la pena aumentará en un grado si el responsable formare parte de una agrupación o reunión de personas para cometer dichos delitos, sin incurrir en los delitos de asociación ilícita.

        En el caso del artículo 293 del Código Penal, se aplicará además una multa de 100 a 1.000 unidades tributarias mensuales; y de 50 a 500 unidades tributarias mensuales en el caso del artículo 294 del Código Penal.

        Artículo 84. Incurrirá en responsabilidad civil el que, sin autorización del titular de los derechos o de la ley y, sabiendo o debiendo saber que inducirá, permitirá, facilitará u ocultará una infracción de cualquiera de los derechos de autor o derechos conexos, realice alguna de las siguientes conductas:

        a) Suprima o altere cualquier información sobre la gestión de derechos.

        b) Distribuya, importe para su distribución, emita, comunique o ponga a disposición del público copias de obras o fonogramas, sabiendo que la información sobre la gestión de derechos ha sido suprimida o alterada sin autorización.

        c) Distribuya o importe para su distribución, información sobre la gestión de derechos, sabiendo que la información sobre la gestión de derechos ha sido alterada sin autorización.

        El que realice alguna de las conductas descritas en los literales precedentes, será sancionado con pena de multa de 25 a 150 unidades tributarias mensuales.

        Artículo 85. Para los efectos de lo dispuesto en el artículo precedente, se entenderá que es información sobre la gestión de derechos:

        a) La información que identifica a la obra, a la interpretación o ejecución o al fonograma; al autor de la obra, al artista intérprete o ejecutante, o al productor del fonograma; o al titular de cualquier derecho sobre la obra, interpretación o ejecución o fonograma.

        b) La información sobre los términos y condiciones de utilización de las obras, interpretación o ejecución o fonograma.

        c) Todo número o código que represente tal información, cuando cualquiera de estos elementos estén adjuntos a un ejemplar de una obra, interpretación o ejecución o fonograma o figuren en relación con la comunicación o puesta a disposición del público de una obra, interpretación o ejecución o fonograma.

        Artículo 85 A. El monto de los perjuicios a que se refiere este Título se determinará en base al valor legítimo de venta al detalle de los objetos protegidos.

        Cuando se trate de objetos protegidos que no tengan valor de venta legítimo, el juez deberá prudencialmente determinar el monto de los perjuicios para efectos de aplicar la pena.

    Párrafo III. De las Normas Aplicables al Procedimiento Civil y Penal

        Artículo 85 B. El titular de los derechos reconocidos en esta ley tendrá, sin perjuicio de las otras acciones que le correspondan, acciones para pedir:

        a) El cese de la actividad ilícita del infractor.

        b) La indemnización de los daños y perjuicios patrimoniales y morales causados.

        c) La publicación de un extracto de la sentencia, a costa del demandado, mediante anuncio en un diario de circulación comercial de la Región correspondiente, a elección del perjudicado.

        Artículo 85 C. El tribunal, a solicitud del perjudicado, ordenará que los ejemplares que hubieren sido producto de alguna infracción o delito contenido en esta ley sean destruidos o apartados del comercio.

        Estos ejemplares sólo podrán ser destinados a beneficencia por el tribunal cuando cuente con autorización del titular de los derechos. En este caso, el tribunal podrá decretar las medidas necesarias para garantizar que no reingresen al comercio, ordenando el marcado de los ejemplares y decretando la prohibición de enajenarlos por parte del beneficiario.

        Artículo 85 D. El tribunal podrá ordenar, en cualquier estado del juicio, las siguientes medidas precautorias:

        a) La suspensión inmediata de la venta, circulación, exhibición, ejecución, representación o cualquier otra forma de explotación presuntamente infractora.

        b) La prohibición de celebrar actos y contratos sobre bienes determinados, incluyendo la prohibición de publicitar o promover los productos o servicios motivo de la presunta infracción.

        c) La retención de los ejemplares presuntamente ilícitos.

        d) La retención o secuestro de los materiales, maquinarias e implementos que hayan sido destinados a la producción de ejemplares presuntamente ilícitos, o de la actividad presuntamente infractora, cuando ello sea necesario para prevenir futuras infracciones.

        e) La remoción o retiro de los aparatos que hayan sido utilizados en la comunicación pública no autorizada, a menos que el presunto infractor garantice que no reanudará la actividad infractora.

        f) El nombramiento de uno o más interventores.

        g) La incautación del producto de la recitación, representación, reproducción o ejecución, hasta el monto correspondiente a los derechos de autor que establezca prudencialmente el tribunal.

        En lo no regulado por el inciso precedente, la dictación de estas medidas se regirá por las normas generales contenidas en el Título V del Libro II del Código de Procedimiento Civil.

        Las medidas establecidas en este artículo podrán solicitarse, sin perjuicio de las medidas prejudiciales de los Títulos IV y V del Libro II del Código de Procedimiento Civil, como medidas prejudiciales, siempre que se acompañen antecedentes que permitan acreditar razonablemente la existencia del derecho que se reclama, el riesgo de una inminente infracción y se rinda caución suficiente, de conformidad con lo establecido en el artículo 279 del Código de Procedimiento Civil.

        Artículo 85 E. Al determinar el perjuicio patrimonial el tribunal considerará, entre otros factores, el valor legítimo de venta al detalle de los bienes sobre los cuales recae la infracción.

        El tribunal podrá, además, condenar al infractor a pagar las ganancias que haya obtenido, que sean atribuibles a la infracción y que no hayan sido consideradas al calcular los perjuicios.

        Con independencia de la existencia de un perjuicio patrimonial, para efectos de la determinación del daño moral, el tribunal considerará las circunstancias de la infracción, la gravedad de la lesión, el menoscabo producido a la reputación del autor y el grado objetivo de difusión ilícita de la obra.

        Artículo 85 F. Al hacer efectiva la indemnización de perjuicios, el tribunal podrá ordenar, a petición de parte y sin perjuicio de los derechos que puedan hacer valer terceros, la incautación y entrega al titular del derecho del producto de la recitación, representación, reproducción, ejecución o cualquier otra forma de explotación ilícita.

        Artículo 85 G. Existirá acción pública para denunciar los delitos sancionados en esta ley.

        Artículo 85 H. Se presume, salvo prueba en contrario, que el derecho de autor y los derechos conexos subsisten sobre una obra o fonograma, cuya fecha de su primera publicación sea inferior a setenta años.

        Sin embargo, no será aplicable lo dispuesto en el inciso anterior respecto de aquellas obras y materias afines que hayan pasado al dominio público por expiración del plazo de protección de acuerdo a esta ley o a leyes anteriores.

    Párrafo IV. De las Normas Especiales Aplicables al Procedimiento Civil

        Artículo 85 I. En los procedimientos civiles, el tribunal podrá ordenar a el o los presuntos infractores a esta ley, la entrega de toda información que posean respecto a las demás personas involucradas en la infracción, así como todos los antecedentes relativos a los canales de producción y distribución de los ejemplares infractores. El tribunal podrá aplicar multas de 1 a 20 unidades tributarias mensuales a aquellos que se nieguen a entregar dicha información.

        Artículo 85 J. El juez de letras en lo civil que, de acuerdo a las reglas generales conozca de los juicios a que dé lugar la presente ley, lo hará breve y sumariamente.

        Artículo 85 K. El titular de un derecho podrá solicitar, una vez acreditada judicialmente la respectiva infracción, que las indemnizaciones de los daños y perjuicios patrimoniales y morales causados sean sustituidas por una suma única compensatoria que será determinada por el tribunal en relación a la gravedad de la infracción, no pudiendo ser mayor a 2.000 unidades tributarias mensuales por infracción.

    Capítulo III. Limitación de Responsabilidad de los Prestadores de Servicios de Internet

        Artículo 85 L. Sin perjuicio de las normas generales sobre responsabilidad civil aplicables, en el caso de aquellas infracciones a los derechos protegidos por esta ley cometidas por terceros, que ocurran a través de sistemas o redes controladas u operadas por personas naturales o jurídicas que presten algunos de los servicios señalados en los artículos siguientes, los prestadores de tales servicios no serán obligados a indemnizar el daño, en la medida que cumplan con las condiciones previstas en los artículos siguientes para limitar tal responsabilidad, conforme a la naturaleza del servicio prestado. En estos casos, los prestadores de servicio sólo podrán ser objeto de las medidas prejudiciales y judiciales a que se refiere el artículo 85 R.

        Artículo 85 M. Los prestadores de servicios de transmisión de datos, enrutamiento o suministro de conexiones no serán considerados responsables de los datos transmitidos a condición que el prestador:

        a) No modifique ni seleccione el contenido de la transmisión. Para estos efectos no se considerará modificación del contenido, la manipulación tecnológica del material necesaria para facilitar la transmisión a través de la red, como la división de paquetes;

        b) No inicie él la transmisión, y

        c) No seleccione a los destinatarios de la información.

        Esta limitación de responsabilidad comprende el almacenamiento automático o copia automática y temporal de los datos transmitidos, técnicamente necesarios para ejecutar la transmisión, siempre que este almacenamiento o copia automática no esté accesible al público en general y no se mantenga almacenado por más tiempo del razonablemente necesario para realizar la comunicación.

        Artículo 85 N. Los prestadores de servicios que temporalmente almacenen datos mediante un proceso de almacenamiento automático no serán considerados responsables de los datos almacenados a condición que el prestador:

        a) Respete las condiciones de acceso de usuarios y las reglas relativas a la actualización del material almacenado establecidas por el proveedor del sitio de origen, salvo que dichas reglas sean usadas por éste para prevenir o dificultar injustificadamente el almacenamiento temporal a que se refiere este artículo;

        b) No interfiera con la tecnología compatible y estandarizada utilizada en el sitio de origen para obtener información sobre el uso en línea del material almacenado, cuando la utilización de dichas tecnologías se realice de conformidad con la ley y sean compatibles con estándares de la industria ampliamente aceptados;

        c) No modifique su contenido en la transmisión a otros usuarios, y

        d) Retire o inhabilite en forma expedita el acceso a material almacenado que haya sido retirado o al que se haya inhabilitado el acceso en su sitio de origen, cuando reciba una notificación de conformidad con el procedimiento establecido en el artículo 85 Q.

        Artículo 85 Ñ. Los prestadores de servicios que a petición de un usuario almacenan, por sí o por intermedio de terceros, datos en su red o sistema, o que efectúan servicios de búsqueda, vinculación y, o referencia a un sitio en línea mediante herramientas de búsqueda de información, incluidos los hipervínculos y directorios, no serán considerados responsables de los datos almacenados o referidos a condición que el prestador:

        a) No tenga conocimiento efectivo del carácter ilícito de los datos;

        b) No reciba un beneficio económico directamente atribuible a la actividad infractora, en los casos en que tenga el derecho y la capacidad para controlar dicha actividad;

        c) Designe públicamente un representante para recibir las notificaciones judiciales a que se refiere el inciso final, de la forma que determine el reglamento, y

        d) Retire o inhabilite en forma expedita el acceso al material almacenado de conformidad a lo dispuesto en el inciso siguiente.

        Se entenderá que el prestador de servicios tiene un conocimiento efectivo cuando un tribunal de justicia competente, conforme al procedimiento establecido en el artículo 85 Q, haya ordenado el retiro de los datos o el bloqueo del acceso a ellos y el prestador de servicios, estando notificado legalmente de dicha resolución, no cumpla de manera expedita con ella.

        Artículo 85 O. Para gozar de las limitaciones de responsabilidad establecidas en los artículos precedentes, los prestadores de servicios, además, deberán:

        a) Haber establecido condiciones generales y públicas, bajo las cuales éste podrá hacer uso de la facultad de poner término a los contratos de los proveedores de contenido calificados judicialmente como infractores reincidentes de los derechos protegidos por esta ley.

        b) No interferir en las medidas tecnológicas de protección y de gestión de derechos de obras protegidas ampliamente reconocidas y utilizadas lícitamente.

        c) No haber generado, ni haber seleccionado el material o a sus destinatarios.

        Se exceptúa de esta obligación a los prestadores de servicios de búsqueda, vinculación o referencia a un sitio en línea mediante herramientas de búsqueda de información.

        Artículo 85 P. Los prestadores de servicios referidos en los artículos precedentes no tendrán, para efectos de esta ley, la obligación de supervisar los datos que transmitan, almacenen o referencien ni la obligación de realizar búsquedas activas de hechos o circunstancias que indiquen actividades ilícitas.

        Lo establecido en el inciso anterior se comprenderá sin perjuicio de cualquier actividad que los tribunales ordinarios de justicia decreten para investigar, detectar y perseguir delitos o prácticas constitutivas de ejercicios abusivos de los derechos de autor o conexos reconocidos por esta ley.

        Artículo 85 Q. Para las infracciones a los derechos reconocidos por esta ley cometidas en o por medio de redes o sistemas controlados u operados por o para prestadores de servicios, el titular de los respectivos derechos o su representante podrán solicitar como medida prejudicial o judicial las que se señalan en el artículo 85 R. Cuando las medidas se soliciten en carácter de prejudicial, y siempre que existan razones graves para ello, se podrán decretar sin audiencia del proveedor del contenido, pero debiendo el solicitante rendir caución previa, a satisfacción del tribunal. Esta solicitud será conocida por el juez de letras en lo civil del domicilio del prestador de servicios, sin perjuicio de las acciones penales que pudieran interponerse.

        Para estos efectos, la solicitud, además de cumplir con los requisitos de los números 1º, 2º y 3º del artículo 254 del Código de Procedimiento Civil, deberá indicar claramente:

        a) Los derechos supuestamente infringidos, con indicación precisa de la titularidad de éstos y la modalidad de la infracción;

        b) El material infractor, y

        c) La localización del material infractor en las redes o sistemas del prestador de servicios respectivos.

        Cumplido lo dispuesto en el inciso anterior, el tribunal decretará sin demora el retiro o bloqueo de los contenidos infractores. Dicha resolución se notificará por cédula al prestador de servicios respectivo y por el estado diario al solicitante.

        El proveedor de contenido afectado podrá, sin perjuicio de otros derechos, requerir al tribunal que decretó la orden que se deje sin efecto la medida de restricción de acceso o retiro de material. Para ello deberá presentar una solicitud que cumpla con los mismos requisitos señalados en el inciso segundo y deberá acompañar todo antecedente adicional que fundamente esta petición e implicará su aceptación expresa de la competencia del tribunal que está conociendo del asunto.

        Este procedimiento se tramitará breve y sumariamente, y las apelaciones se concederán en el solo efecto devolutivo, gozando de preferencia para su conocimiento y vista por el tribunal de alzada.

        Artículo 85 R. En los casos en que se hayan cumplido los requisitos generales del artículo 85 O y los requisitos establecidos en el artículo 85 M, respecto de las funciones de transmisión, enrutamiento o suministro, el tribunal sólo podrá disponer como medida prejudicial o judicial la adopción de medidas razonables para bloquear el acceso a un determinado contenido infractor que sea claramente identificado por el solicitante y que no implique el bloqueo de otros contenidos legítimos, de acuerdo a lo dispuesto en el inciso segundo del artículo precedente.

        En los casos en que se hayan cumplido los requisitos generales del artículo 85 O y los requisitos especiales establecidos en los artículos 85 N y 85 Ñ, respecto de las funciones mencionadas en dichos artículos, el tribunal sólo podrá disponer como medidas prejudiciales o judiciales las siguientes:

        a) El retiro o inhabilitación del acceso al material infractor que sea claramente identificado por el solicitante de acuerdo a lo dispuesto en el inciso segundo del artículo 85 Q;

        b) La terminación de cuentas determinadas de infractores reincidentes de dicho prestador de servicio, que sean claramente identificadas por el solicitante de acuerdo a lo dispuesto en el inciso segundo del artículo 85 Q, y cuyo titular esté usando el sistema o red para realizar una actividad infractora a los derechos de autor y conexos.

        Todas estas medidas se dictarán con la debida consideración de la carga relativa para el prestador de servicios, para los usuarios y para los suscriptores, del eventual daño al titular del derecho de autor o conexos, de la factibilidad técnica y eficacia de la medida, y de la existencia de otras formas de observancia menos gravosas para asegurar el respeto del derecho que se reclama.

        Estas medidas se decretarán previa notificación al prestador de servicios, de conformidad con los incisos tercero, cuarto y quinto del artículo 85 Q, con la excepción de los mandamientos judiciales que busquen asegurar la preservación de la evidencia o cuando se trate de otros mandamientos judiciales que se estime no tendrán un efecto real en la operación del sistema o red del prestador de servicios.

        Artículo 85 S. El tribunal competente, a requerimiento de los titulares de derechos que hayan iniciado el procedimiento establecido en el artículo precedente, podrá ordenar la entrega de la información que permita identificar al supuesto infractor por el prestador de servicios respectivo. El tratamiento de los datos así obtenidos se sujetará a lo dispuesto en la ley N°19.628, sobre protección de la vida privada.

        Artículo 85 T. El que, a sabiendas, proporcione información falsa relativa a supuestas infracciones a los derechos reconocidos en esta ley, deberá indemnizar los daños causados a cualquier parte interesada, si estos daños son resultado de acciones que el proveedor de servicios de red tome en base a dicha información, y le será aplicable lo dispuesto en el artículo 197 del Código Penal.

        Artículo 85 U. Sin perjuicio de las disposiciones previas contenidas en este Capítulo, los prestadores de servicios de Internet deberán comunicar por escrito a sus usuarios los avisos de supuestas infracciones que reciban, a condición que en la comunicación que reciban cumplan los siguientes requisitos:

        a) Reciba en forma electrónica o de otra forma escrita del titular de los derechos o de su representante, aviso de la supuesta infracción;

        b) El titular de los derechos o su representante deberá tener domicilio o residencia en Chile y, en su caso, contar con poder suficiente para ser emplazado en juicio, en representación del titular;

        c) Se identifiquen los derechos supuestamente infringidos, con indicación precisa de la titularidad de éstos y la modalidad de la infracción;

        d) Se identifique el material infractor y su localización en las redes o sistemas del prestador de servicios a quien se envía la comunicación, a través del URL o sus equivalentes, y

        e) Contenga datos que permitan al prestador de servicios identificar al usuario proveedor del supuesto material infractor.

        Los prestadores de servicios de Internet, una vez recibida una comunicación de conformidad al inciso anterior, informarán al usuario supuestamente infractor esta situación acompañando los antecedentes proporcionados por el titular del derecho o su representante, dentro del plazo de cinco días hábiles contados desde la recepción de la referida comunicación.

    CAPITULO IV. Disposiciones Generales

        Artículo 86.- Son irrenunciables los derechos patrimoniales que esta ley otorga a los titulares de los derechos de autor y conexos, especialmente los porcentajes a que se refieren los artículos 50, 61, 62 y 67.

        Artículo 87. DEROGADO

        Artículo 88.- El Estado, los Municipios, las Corporaciones oficiales, las Instituciones semifiscales o autónomas y las demás personas jurídicas estatales serán titulares del derecho de autor respecto de las obras producidas por sus funcionarios en el desempeño de sus cargos.

        Sin embargo, mediante resolución del titular podrá liberarse cualquiera de dichas obras, para que formen parte del patrimonio cultural común. Esta excepción no será aplicable a las obras desarrolladas en el contexto de la actividad propia de las empresas públicas o en las que el Estado tenga participación, cuando la obra tenga un sentido estratégico para sus fines o cuando la ley que la crea y regula lo establezca expresamente.

        Artículo 89.- Los derechos otorgados por esta ley a los titulares de derechos de autor y conexos, no afectan la protección que les sea reconocida por la Ley de Propiedad Industrial y otras disposiciones legales vigentes que no se deroguen expresamente.

    Título IV. DEPARTAMENTO DE DERECHOS INTELECTUALES

        Artículo 90.- Créase el Departamento de Derechos Intelectuales, que tendrá a su cargo el Registro de Propiedad Intelectual y las demás funciones que le encomiende el reglamento. Este organismo dependerá del Servicio Nacional del Patrimonio Cultural.

    Título V. DE LA GESTION COLECTIVA DE LOS DERECHOS DE AUTOR Y CONEXOS

        Artículo 91.- La gestión colectiva de los derechos de autor y conexos sólo podrá realizarse por las entidades autorizadas de conformidad con las disposiciones de este Título, sin perjuicio de lo dispuesto en el inciso segundo del artículo 21.

    ————————————————————

    NOTA:

        La Ley 19166 sustituyó el original Título V que comprendía de los artículos 91 a 97.

    ————————————————————

        Artículo 92.- Las entidades de gestión colectiva de derechos intelectuales deberán constituirse como corporaciones chilenas de derecho privado, en conformidad con lo previsto en el Título XXXIII del Libro Primero del Código Civil y su objetivo social sólo podrá consistir en la realización de las actividades de administración, protección y cobro de los derechos intelectuales a que se refiere este Título.

        Ello no obstante, la respectiva asamblea general de socios podrá acordar, por mayoría absoluta de los afiliados, que hasta el 10% de lo recaudado y los remanentes de fondos sociales que se generen con motivo de su actividad, sean destinados a la promoción de actividades o servicios de carácter asistencial en beneficio de sus miembros y representados, y de estímulo a la creación nacional, junto a otros recursos que les sean aportados para tales fines.

        Artículo 93.- Sin perjuicio de las disposiciones generales aplicables a las corporaciones, contenidas en el Título XXXIII del Libro Primero del Código Civil, los estatutos de las entidades de gestión colectiva deberán contener las siguientes estipulaciones:

        a) La especificación de los derechos intelectuales que la entidad se propone administrar.

        b) El régimen de votación, que podrá establecerse teniendo en cuenta criterios de ponderación en función de los derechos generados, que limiten en forma razonable el voto plural, salvo en materias relativas a sanciones de exclusión de socios, en que el régimen de votos será igualitario.

        c) Las reglas a que han de someterse los sistemas de reparto de la recaudación, incluido el porcentaje destinado a gastos de administración, que en ningún caso podrá exceder del 30 por ciento de lo recaudado.

        d) El destino del patrimonio, en el supuesto de liquidación de la entidad, y demás normas que regulen los derechos de los socios y administrados en tal evento.

        Artículo 94.- Las entidades de gestión colectiva, para dar inicio a cualquiera de las actividades señaladas en el artículo 92 requerirán de una autorización previa del Ministro de las Culturas, las Artes y el Patrimonio, la que se otorgará mediante resolución publicada en el Diario Oficial.

        Artículo 95.- El Ministro de las Culturas, las Artes y el Patrimonio otorgará la autorización prevista en el artículo anterior dentro de los 180 días siguientes a la presentación de la solicitud, si concurren las siguientes condiciones:

        a) Que los estatutos de la entidad solicitante cumplan los requisitos establecidos en este Título.

        b) Que la entidad solicitante represente, a lo menos, un 20 por ciento de los titulares originarios chilenos o extranjeros domiciliados en Chile que, en el país, causen derechos en un mismo género de obras o producciones.

        c) Que de los datos aportados y de la información practicada, se desprenda que la entidad solicitante reúne las condiciones de idoneidad necesaria para asegurar la correcta y eficaz administración de los derechos en todo el territorio nacional.

        Si el Ministro no se pronunciare dentro del plazo señalado en el inciso anterior, se entenderá concedida la autorización.

        Artículo 96.- La autorización podrá ser revocada por el Ministro de las Culturas, las Artes y el Patrimonio si sobreviniere o se pusiere de manifiesto algún hecho que pudiera haber originado la denegación de la autorización, o si la entidad de gestión dejase de cumplir gravemente las obligaciones establecidas en este Título. En estos casos, el Ministerio de las Culturas, las Artes y el Patrimonio, en forma previa a la revocación, apercibirá a la entidad de gestión respectiva para que en el plazo que determine, que no podrá ser inferior a 90 días, subsane o corrija los hechos observados.

        La revocación producirá sus efectos a los 90 días de la publicación de la resolución respectiva en el Diario Oficial, salvo que el Ministro de las Culturas, las Artes y el Patrimonio fijare un plazo inferior en casos graves y calificados.

        Artículo 97.- Las entidades de gestión colectiva estarán siempre obligadas a aceptar la administración de los derechos de autor y otros derechos de propiedad intelectual que les sean encomendados de acuerdo con sus objetivos o fines. Dicho encargo lo desempeñarán con sujeción a las disposiciones de esta ley y a sus estatutos.

        En los casos de titulares de derechos que no se encuentren afiliados a alguna entidad de gestión colectiva autorizada, podrán ser representados ante éstas por personas, naturales o jurídicas, que hubieren recibido el encargo de cautelar o cobrar sus derechos de autor o conexos.

        Artículo 98.- El reparto de los derechos recaudados en cada entidad de gestión colectiva se efectuará entre los titulares de las obras o producciones utilizadas, con arreglo al sistema determinado en los estatutos y reglamentos de la entidad respectiva.

        Los sistemas de reparto contemplarán una participación de los titulares de obras y producciones en los derechos recaudados, proporcional a la utilización de éstas.

        Artículo 99.- Las entidades de gestión colectiva confeccionarán, anualmente, un balance general al 31 de diciembre de cada año, y una memoria de las actividades realizadas en el último ejercicio social. Sin perjuicio de las normas de fiscalización que se establezcan en los estatutos, el balance y la documentación contable deberán ser sometidas a la aprobación de auditores externos, designados por la Asamblea General de socios.

        El balance, con el informe de los auditores externos, se pondrá a disposición de los socios con una antelación mínima de 30 días al de la celebración de la Asamblea General en la que haya de ser aprobado.

        Artículo 100.- Las entidades de gestión estarán obligadas a contratar, con quien lo solicite, la concesión de autorizaciones no exclusivas de los derechos de autor y conexos que administren, de acuerdo con tarifas generales que determinen la remuneración exigida por la utilización de su repertorio.

        Las entidades de gestión sólo podrán negarse a conceder las autorizaciones necesarias para el uso de su repertorio, en el caso que el solicitante no ofreciere suficiente garantía para responder del pago de la tarifa correspondiente.

        Las tarifas serán fijadas por la entidades de gestión, a través del órgano de administración previsto en sus Estatutos, y regirán a contar de su publicación en el Diario Oficial.

        Las entidades de gestión podrán diferenciar las tarifas generales según categoría de usuario, pudiendo fijarse además planes tarifarios alternativos o tarifas especiales mediante la celebración de contratos con asociaciones de usuarios, a los cuales podrá optar cualquier usuario que se ubique dentro de la misma categoría. Las tarifas acordadas conforme a esta disposición deberán ser publicadas en el Diario Oficial.

        Las tarifas correspondientes a usuarios con obligación de confeccionar planillas, de conformidad a la ley o a sus respectivos contratos de licenciamiento, deberán estructurarse de modo que la aplicación de éstas guarde relación con la utilización de las obras, interpretaciones o fonogramas de titulares representados por la entidad de gestión colectiva respectiva.

        La falta de confección de la planilla o su confección incompleta o falsa, no dará derecho a la aplicación de lo dispuesto en el inciso anterior.

        Salvo acuerdo en contrario, estarán obligadas a confeccionar planillas de ejecución o listas de obras utilizadas las empresas de entretenimiento que basen su actividad en la utilización de obras musicales y los organismos de radiodifusión. Los demás usuarios estarán exentos de la obligación de confeccionar planillas de ejecución.

        Lo dispuesto en este artículo no regirá respecto de la gestión de las obras literarias, dramáticas, dramático-musicales, coreográficas o pantomímicas, como, asimismo, respecto de aquellas utilizaciones a que se refiere el inciso segundo del artículo 21, a menos que la respectiva entidad realice gestión colectiva de los derechos de estas obras.

        Artículo 100 bis.- No obstante lo establecido en el inciso tercero del artículo anterior, las asociaciones con personalidad jurídica que representen a usuarios de derechos de autor o conexos, que no hubiesen alcanzado un acuerdo con una entidad de gestión colectiva sobre el monto de la tarifa, deberán someter la controversia a mediación, la que será obligatoria para ambas partes.

        La mediación será un procedimiento no adversarial y tendrá por objeto propender a que, mediante la comunicación directa entre las partes y con intervención de un mediador, éstas lleguen a una solución extrajudicial de la controversia. Los mediadores deberán inscribirse en un Registro Público de Mediadores y Árbitros de Propiedad Intelectual que llevará el Ministerio de las Culturas, las Artes y el Patrimonio. Los mediadores y árbitros a que alude el artículo siguiente deberán contar con un título profesional, con al menos cinco años de ejercicio profesional y con experiencia calificada en el ámbito de propiedad intelectual o en el área de la actividad económica. Los procedimientos de inscripción en el Registro, la forma y características de éste, y los honorarios que mediadores y árbitros deberán percibir serán determinados por un reglamento dictado, dentro de los seis meses siguientes a la publicación de esta ley en el Diario Oficial, por el Ministerio de las Culturas, las Artes y el Patrimonio y firmado, además, por el Ministro de Economía, Fomento y Turismo. La publicación del aviso a que alude el inciso cuarto de este artículo será solventado por la parte que impugna la tarifa.

        El mediador será nombrado de común acuerdo por las partes, y a falta de acuerdo, la designación será realizada por el juez de letras en lo civil del domicilio de la entidad de gestión respectiva, a requerimiento de la asociación de usuarios o de la entidad de gestión, de entre los inscritos en el Registro Público de Mediadores y Árbitros de Propiedad Intelectual, sujetándose al procedimiento de designación de peritos establecido en el Código de Procedimiento Civil. La designación efectuada por el tribunal no será susceptible de recurso alguno. Para efectuar esta designación el juez deberá verificar, mediante los antecedentes aportados por las partes, que no se trata de una tarifa vigente determinada convencionalmente o por sentencia arbitral ejecutoriada, dictada dentro de los tres años anteriores a la fecha de presentación y que el asunto controvertido no se encuentre sometido a mediación o arbitraje, ni haya sido sometido a mediación o arbitraje en igual plazo. De verificar alguna de estas circunstancias, el juez rechazará de plano la solicitud de mediación.

        Una vez nombrado el mediador, el juez ordenará poner en conocimiento de los interesados, mediante la publicación de un aviso en un diario de circulación nacional, la circunstancia de encontrarse sometida a mediación una determinada tarifa, para que éstos se hagan parte en la mediación, de conformidad a lo dispuesto en el inciso segundo del artículo 21 el Código de Procedimiento Civil.

        El proceso de mediación no durará más de sesenta días, contados desde la publicación del aviso a que alude el inciso anterior. Con todo, las partes, de común acuerdo, podrán solicitar la ampliación de este plazo.

        Durante el procedimiento el mediador podrá citar a todas las audiencias necesarias para el cumplimiento de los fines de la mediación.

        Dentro de los diez días siguientes a la notificación del nombramiento del mediador las partes deberán presentar sus propuestas fundadas de tarifa y las utilizaciones respecto de las cuales se aplica, así como los antecedentes en que se fundan. Sin perjuicio de lo anterior, en el transcurso de la mediación, las partes podrán presentar nuevas propuestas de tarifa.

        En caso de que una parte no comparezca, no haga una propuesta fundada de tarifa o se desista de la mediación, la propuesta de tarifa hecha por la otra parte se tendrá por aceptada por el solo ministerio de la ley y tendrá valor de sentencia ejecutoriada. El mediador dejará constancia de las circunstancias anteriores en el acta.

        En caso de llegarse a acuerdo sobre todos o algunos de los puntos sometidos a mediación, se dejará constancia en un acta de mediación, la que, luego de ser leída por los participantes, será firmada por ellos y por el mediador, quedando copia en poder de cada una de las partes y del mediador. Dicha acta tendrá valor de sentencia ejecutoriada. La tarifa adoptada bajo este procedimiento, al igual que la que se determine conforme al inciso anterior, no podrá ser modificada por la entidad de gestión respectiva, ni someterse a una nueva mediación, en un plazo de tres años contado desde la fecha del acta de mediación.

        Si dentro del plazo original o ampliado no hubiera acuerdo, se entenderá fracasado el procedimiento y se levantará un acta, que deberá ser firmada por ambas partes. En caso que alguna no quiera o no pueda firmar, dejará constancia de ello el mediador, quien actuará como ministro de fe. Luego de esto, las partes podrán someterse al arbitraje que regula el artículo siguiente.

        Artículo 100 ter.- En caso que la mediación fracase total o parcialmente, el o los asuntos controvertidos deberán ser sometidos a arbitraje, a requerimiento de cualquiera de las partes. Para ello, cualquiera de las partes podrá concurrir dentro de treinta días, contados desde la fecha del acta a que alude el inciso final del artículo anterior, al juez de letras en lo civil del domicilio de la entidad de gestión respectiva, acompañando el acta de la mediación previa, a efectos de dar inicio al procedimiento de designación del tribunal arbitral.

        Vencido el plazo establecido en el inciso anterior, no se podrá someter las tarifas impugnadas a un nuevo proceso de mediación sino transcurrido el término de tres años contado desde la fecha del acta de mediación respectiva.

        El tribunal arbitral estará integrado por tres miembros árbitros arbitradores, regidos por los artículos 222 y siguientes del Código Orgánico de Tribunales, uno nombrado por la asociación de usuarios, otro por la entidad de gestión y un tercero de común acuerdo por las partes y, a falta de acuerdo o en ausencia de nombramiento por una de las partes, la o las designaciones serán realizadas por el juez de letras en lo civil del domicilio de la entidad de gestión respectiva y se sujetarán al procedimiento de designación de peritos establecido en el Código de Procedimiento Civil, sin que las partes puedan oponerse a la designación. Los árbitros deberán estar previamente inscritos en el Registro de Mediadores y Árbitros de Propiedad Intelectual.

        El tribunal deberá fijar fecha para la audiencia de las partes, determinar el mecanismo de notificación que utilizará para poner en conocimiento de ellas las resoluciones o decisiones que adopte y sus normas y procedimientos, debiendo contemplar, en todo caso, la audiencia de las partes, los mecanismos para recibir las pruebas y antecedentes que éstas aporten y el modo en que se le formularán las solicitudes.

        Las partes deberán, en la audiencia fijada para el efecto, aportar en sobre cerrado sus respectivas propuestas fundadas de tarifas finales y las utilizaciones respecto de las cuales se aplican, junto a las pruebas y antecedentes que las sustentan.

        La incomparecencia injustificada de una de las partes tendrá como efecto la aceptación de la propuesta de la contraparte, en cuyo caso el tribunal deberá dictar sentencia dentro de diez días. Para estos efectos, la parte correspondiente deberá acompañar, dentro de tercero día, antecedentes que a juicio del tribunal justifiquen su incomparecencia.

        Para resolver el arbitraje deberán considerarse, entre otros criterios, la categoría del usuario, el beneficio pecuniario obtenido por los usuarios de esa categoría en la explotación del repertorio o registro de la entidad, la importancia del repertorio en el desarrollo de la actividad de los usuarios de esa categoría, y las tarifas anteriores convenidas por las partes o resueltas en un proceso anterior.

        En el curso del procedimiento el tribunal podrá llamar a las partes a conciliación. Asimismo, las partes podrán llegar a acuerdo, poniéndose término al procedimiento por la sola presentación del convenio de tarifas alcanzado. En este último caso, dicho convenio tendrá el valor de sentencia ejecutoriada.

        El tribunal, al dictar sentencia, deberá limitarse a optar exclusivamente por una de las propuestas de las partes entregadas en sobre cerrado. La sentencia del tribunal tendrá valor de sentencia ejecutoriada y constituirá un plan tarifario alternativo, pudiendo acogerse a estas tarifas especiales cualquier usuario que así lo solicite. Para estos efectos, la entidad de gestión colectiva deberá poner a disposición del público el laudo o, en su caso, el acuerdo. Igualmente, el tribunal remitirá copia a la Subsecretaría de las Culturas y las Artes, que llevará un registro público de los laudos y acuerdos.

        La tarifa adoptada bajo este procedimiento no podrá ser modificada por la entidad de gestión respectiva, ni someterse a una nueva mediación o a un nuevo arbitraje, en un plazo de tres años.

        El tribunal deberá dictar su fallo dentro de sesenta días contados desde su constitución. En contra de la sentencia arbitral sólo podrá interponerse el recurso de casación en la forma, de acuerdo a lo previsto en el artículo 239 del Código Orgánico de Tribunales, y el recurso de queja, conforme a los artículos 545 y siguientes del mismo Código.

        Procederá también el recurso de rectificación, aclaración o enmienda, con el solo efecto de precisar las condiciones necesarias para una mejor aplicación de la tarifa que resulte elegida por el tribunal, sin alterar las condiciones sustantivas de la misma. Dicho recurso podrá ser interpuesto dentro del plazo de quince días contado desde la notificación de la sentencia.

        Las costas del proceso serán solventadas por aquella parte cuya propuesta de tarifas resultare desechada por el tribunal.

        Durante el proceso de arbitraje los usuarios podrán utilizar el repertorio o registro de la sociedad de gestión colectiva cuyas tarifas fueron controvertidas, pagando las tarifas que hubiesen estado pagando con anterioridad al arbitraje y si no las hubiese, las que correspondan a la fijada por la entidad de gestión conforme a la ley. La diferencia que resulte entre la tarifa pagada y la definitiva dará origen a reliquidaciones que serán determinadas en el fallo arbitral.

        Artículo 101.- Los juicios a que dé lugar la aplicación de las normas de este título, se tramitarán en conformidad con las reglas del Título XI del Libro III del Código de Procedimiento Civil.

        Artículo 102.- Las entidades de gestión autorizadas representarán legalmente a sus socios y representados nacionales y extranjeros en toda clase de procedimientos administrativos o judiciales, sin otro requisito que la presentación de copias autorizadas de la escritura pública que contenga su estatuto y de la resolución que apruebe su funcionamiento.

        Para los efectos de este artículo, cada entidad de gestión llevará un registro público de sus asociados y representados extranjeros, el que podrá ser computarizado, con indicación de la entidad a que pertenecen y de la categoría de derecho que administra, de acuerdo al género de obras respectivo.

        Cada entidad de gestión enviará al Ministerio de las Culturas, las Artes y el Patrimonio, copia de los contratos de representación, legalizados y protocolizados, celebrados con las entidades de gestión extranjeras del mismo género o géneros de obras, los cuales también deberán mantenerse en el domicilio de la entidad de gestión a disposición de cualquier interesado.

    TITULO VI. De la Corporación Cultural Chilena

      Artículo 103. DEROGADO

    ——————————————————————————————

      NOTA:

        La LEY 19166 derogó el  antiguo Título VI que comprendía los artículos 98 al 105

    ——————————————————————————————

        Artículo 104. (DEROGADO)

        Artículo 105. (DEROGADO)

    TITULO VII. Disposiciones finales y artículos transitorios

        Artículo 106.- Deróganse el Decreto-Ley de Propiedad Intelectual número 345, de 17 de Marzo de 1925, y la ley n° 9.549, de 21 de Enero de 1950.

        Artículo 107.- Dentro del plazo de 180 días el Presidente de la República deberá dictar el Reglamento de esta ley.

        Artículo 108.- La presente ley regirá 180 días después de su publicación en el Diario Oficial.

        Artículo 109.- Los titulares de derechos conexos, cuyas interpretaciones o ejecuciones, emisiones y grabaciones hayan sido publicadas en el territorio nacional con anterioridad a la presente ley, para gozar de la protección otorgada por ésta, deberán proceder a su inscripción en el Registro de Propiedad Intelectual dentro del plazo de 180 días contados desde su publicación. La inscripción a que se refiere este artículo requerirá solamente la presentación de una declaración jurada, sin perjuicio de prueba en contrario.

        Artículo 110.- El Departamento del Pequeño Derecho de Autor refundirá en un solo texto todas las disposiciones relativas a la fijación y cobro del pequeño derecho de autor contenidas en la ley número 5.563, de 10 de Enero de 1935, en el DFL. número 35/6.331, de 19 de Noviembre de 1942 y en el Decreto Universitario número 1.070, de 16 de Mayo de 1951, y sus modificaciones. Mientras se dicta el referido texto, la Comisión Permanente del Pequeño Derecho de Autor tendrá todas las facultades, funciones y atribuciones que correspondían al Departamento del Pequeño Derecho de Autor de la Universidad de Chile.

        Artículo 111.- Dentro del plazo de 90 días de constituida la Corporación Cultural Chilena creada en el Título VI de esta ley, el Comité Ejecutivo de la misma presentará a la consideración de su Consejo un proyecto de reglamento interno de actividades, que se elaborará, dentro de lo posible, en consulta con las Corporaciones representadas en el Consejo.

        Artículo 112.- Las personas indicadas en el artículo 1° de la ley número 15.478 que al 27 de Octubre de 1966 tenían 65 años de edad y que acrediten haber desarrollado a lo menos durante 30 años algunas de las actividades allí señaladas, tendrán un nuevo plazo de 180 días para acogerse a los beneficios que otorga el artículo 1° transitorio de la ley número 16.571.

        La Caja de Previsión de Empleados Particulares publicará los avisos de prensa que sean necesarios para dar amplia difusión al precepto contenido en el inciso anterior.

        Y por cuanto he tenido a bien aprobarlo y sancionarlo, por tanto promúlguese y llévese a efecto como ley de la República.

    Santiago, a veintiocho de agosto de mil novecientos setenta.

    EDUARDO FREI MONTALVA.-

    Máximo Pacheco Gómez, Ministro de Educación.

    25Abr/21

    Ley nº 19.927, de 05 de enero de 2004

    Ley nº 19.927, de 05 de enero de 2004. Modifica el Código Penal, el Código de Procedimiento Penal y el Código Procesal Penal en materia de delitos de pornografía infantil.

    Teniendo presente que el H. Congreso Nacional ha dado su aprobación al siguiente

    Proyecto de ley:

    Artículo 1º

    Introdúcense las siguientes modificaciones en el Código Penal:

    1. Modifícase el artículo 21 en los siguientes términos:

    a) Agrégase en el acápite titulado “Penas de crímenes“, a continuación de la frase “Inhabilitación especial perpetua para algún cargo u oficio público o profesión titular“, en punto aparte (.), el siguiente texto:

    “Inhabilitación absoluta temporal para cargos, empleos, oficios o profesiones ejercidos en ámbitos educacionales o que involucren una relación directa y habitual con personas menores de edad.”.

    b) Agrégase en el acápite titulado “Penas de simples delitos“, a continuación de la palabra “Destierro“, en punto aparte (.), el siguiente texto:

    “Inhabilitación absoluta temporal para cargos, empleos, oficios o profesiones ejercidos en ámbitos educacionales o que involucren una relación directa y habitual con personas menores de edad.”.

    2. Agrégase el siguiente artículo 39 bis:

    “Artículo 39 bis.- La pena de inhabilitación absoluta temporal para cargos, empleos, oficios o profesiones ejercidos en ámbitos educacionales o que involucren una relación directa y habitual con personas menores de edad, prevista en el artículo 372 de este Código, produce:

    1º La privación de todos los cargos, empleos, oficios y profesiones que tenga el condenado.

    2º La incapacidad para obtener los cargos, empleos, oficios y profesiones mencionados antes de transcurrido el tiempo de la condena de inhabilitación, contado desde que se hubiere dado cumplimiento a la pena principal, obtenido libertad condicional en la misma, o iniciada la ejecución de alguno de los beneficios de la ley nº 18.216, como alternativa a la pena principal.

    La pena de inhabilitación de que trata este artículo tiene una extensión de tres años y un día a diez años y es divisible en la misma forma que las penas de inhabilitación absoluta y especial temporales.”.

    3. Intercálase, en el número 5º del artículo 90, a continuación de la palabra “titulares” la siguiente frase: “o para cargos, oficios o profesiones ejercidos en ámbitos educacionales o que involucren una relación directa y habitual con personas menores de edad,”.

    4. Reemplázase el epígrafe del Título VII del Libro II, por “Crímenes y delitos contra el orden de las familias, contra la moralidad pública y contra la integridad sexual“.

    5. Introdúcense las siguientes modificaciones al artículo 361:

    a) Reemplázase, en el inciso primero, la frase “presidio menor en su grado máximo a presidio mayor en su grado medio“, por “presidio mayor en su grado mínimo a medio“.

    b) Sustitúyese, en el encabezamiento del inciso segundo, la palabra “doce” por “catorce“.

    6. Reemplázase en el artículo 362 la palabra “doce” por “catorce“.

    7. Modifícase el encabezamiento del artículo 363 en los siguientes términos:

    a) Reemplázase la expresión “reclusión menor en sus grados medio a máximo“, por “presidio menor en su grado máximo a presidio mayor en su grado mínimo“.

    b) Sustitúyese la palabra “doce” por “catorce“.

    8. Incorpórase el siguiente artículo 365 bis, nuevo:

    “Artículo 365 bis.- Si la acción sexual consistiere en la introducción de objetos de cualquier índole, por vía vaginal, anal o bucal, o se utilizaren animales en ello, será castigada:

    1.- con presidio mayor en su grado mínimo a medio, si concurre cualquiera de las circunstancias enumeradas en el artículo 361;

    2.- con presidio mayor en cualquiera de sus grados, si la víctima fuere menor de catorce años, y 3.- con presidio menor en su grado máximo a presidio mayor en su grado mínimo, si concurre alguna de las circunstancias enumeradas en el artículo 363 y la víctima es menor de edad, pero mayor de catorce años.”.

    9. Sustitúyese el artículo 366 por el siguiente:

    “Artículo 366.- El que abusivamente realizare una acción sexual distinta del acceso carnal con una persona mayor de catorce años, será castigado con presidio menor en su grado máximo, cuando el abuso consistiere en la concurrencia de alguna de las circunstancias enumeradas en el artículo 361.

    Igual pena se aplicará cuando el abuso consistiere en la concurrencia de alguna de las circunstancias enumeradas en el artículo 363, siempre que la víctima fuere mayor de catorce y menor de dieciocho años.”.

    10. Reemplázase el artículo 366 bis, por el siguiente:

    “Artículo 366 bis.- El que realizare una acción sexual distinta del acceso carnal con una persona menor de catorce años, será castigado con la pena de presidio menor en su grado máximo a presidio mayor en su grado mínimo.”.

    11. En el artículo 366 ter, sustitúyese las palabras dos artículos anteriores por tres artículos anteriores.

    12. Reemplázase el artículo 366 quáter por el siguiente:

    “Artículo 366 quáter.- El que, sin realizar una acción sexual en los términos anteriores, para procurar su excitación sexual o la excitación sexual de otro, realizare acciones de significación sexual ante una persona menor de catorce años, la hiciere ver o escuchar material pornográfico o presenciar espectáculos del mismo carácter, será castigado con presidio menor en su grado medio a máximo.

    Si, para el mismo fin de procurar su excitación sexual o la excitación sexual de otro, determinare a una persona menor de catorce años a realizar acciones de significación sexual delante suyo o de otro, la pena será presidio menor en su grado máximo.

    Con iguales penas se sancionará a quien realice alguna de las conductas descritas en los incisos anteriores con una persona menor de edad pero mayor de catorce años, concurriendo cualquiera de las circunstancias del numerando 1º del artículo 361 o de las enumeradas en el artículo 363.”.

    13. Agrégase el siguiente artículo 366 quinquies:

    “Artículo 366 quinquies.- El que participare en la producción de material pornográfico, cualquiera sea su soporte, en cuya elaboración hubieren sido utilizados menores de dieciocho años, será sancionado con presidio menor en su grado máximo.

    Para los efectos de este artículo y del artículo 374 bis, se entenderá por material pornográfico en cuya elaboración hubieren sido utilizados menores de dieciocho años, toda representación de éstos dedicados a actividades sexuales explícitas, reales o simuladas, o toda representación de sus partes genitales con fines primordialmente sexuales”.

    14. Sustitúyese el artículo 367 por el siguiente:

    “Artículo 367.- El que promoviere o facilitare la prostitución de menores de edad para satisfacer los deseos de otro, sufrirá la pena de presidio menor en su grado máximo.

     Si concurriere habitualidad, abuso de autoridad o de confianza o engaño, se impondrán las penas de presidio mayor en cualquiera de sus grados y multa de treinta y una a treinta y cinco unidades tributarias mensuales.”.

    15. Introdúcense las siguientes modificaciones en el artículo 367 bis:

    a) Agrégase en el inciso primero, después de la palabra “veinte“, la expresión “a treinta“.

    b) Modifícase el inciso segundo en los siguientes términos:

    1º Sustitúyese el encabezamiento por el siguiente:

    “Sin embargo, se impondrán las penas señaladas en el inciso segundo del artículo anterior en los siguientes casos:”.

    2º Reemplázase el nº 4 por el siguiente:

    “4.- Si el autor fuere ascendiente, descendiente, cónyuge, conviviente, hermano, tutor, curador o encargado del cuidado personal de la víctima.”.

    16. Intercálase el siguiente artículo 367 ter:

    “Artículo 367 ter.- El que, a cambio de dinero u otras prestaciones de cualquier naturaleza, obtuviere servicios sexuales por parte de personas mayores de catorce pero menores de dieciocho años de edad, sin que medien las circunstancias de los delitos de violación o estupro, será castigado con presidio menor en su grado máximo.”.

    17. Agrégase el siguiente artículo 368 bis:

    “Artículo 368 bis.- Cuando, en la comisión de los delitos señalados en los artículos 366 quáter, 366 quinquies, 367, 367 ter o 374 bis se utilizaren establecimientos o locales, a sabiendas de su propietario o encargado, o no pudiendo éste menos que saberlo, podrá decretarse en la sentencia su clausura definitiva.

    Asimismo, durante el proceso judicial respectivo, podrá decretarse, como medida cautelar, la clausura temporal de dichos establecimientos o locales.”.

    18. Introdúcese el siguiente artículo 369 ter, nuevo:

    “Artículo 369 ter.- Cuando existieren sospechas fundadas de que una persona o una organización delictiva hubiere cometido o preparado la comisión de alguno de los delitos previstos en los artículos 366 quinquies, 367, 367 bis, 367 ter, 374 bis, inciso primero, y 374 ter, y la investigación lo hiciere imprescindible, el tribunal, a petición del Ministerio Público, podrá autorizar la interceptación o grabación de las telecomunicaciones de esa persona o de quienes integraren dicha organización, la fotografía, filmación u otros medios de reproducción de imágenes conducentes al esclarecimiento de los hechos y la grabación de comunicaciones. En lo demás, se estará íntegramente a lo dispuesto en los artículos 222 a 225 del Código Procesal Penal.

     Igualmente, bajo los mismos supuestos previstos en el inciso precedente, podrá el tribunal, a petición del Ministerio Público, autorizar la intervención de agentes encubiertos. Mediando igual autorización y con el objeto exclusivo de facilitar la labor de estos agentes, los organismos policiales pertinentes podrán mantener un registro reservado de producciones del carácter investigado. Asimismo, podrán tener lugar entregas vigiladas de material respecto de la investigación de hechos que se instigaren o materializaren a través del intercambio de dichos elementos, en cualquier soporte.

     La actuación de los agentes encubiertos y las entregas vigiladas serán plenamente aplicables al caso en que la actuación de los agentes o el traslado o circulación de producciones se desarrolle a través de un sistema de telecomunicaciones.

    Los agentes encubiertos, el secreto de sus actuaciones, registros o documentos y las entregas vigiladas se regirán por las disposiciones de la ley nº 19.366.”.

    19. Sustitúyese el artículo 372 por el siguiente:

    “Artículo 372.- Los comprendidos en el artículo anterior y cualesquiera otros condenados por la comisión de los delitos previstos en los dos párrafos precedentes en contra de un menor de edad, serán también condenados a las penas de interdicción del derecho de ejercer la guarda y ser oídos como parientes en los casos que la ley designa, y de sujeción a la vigilancia de la autoridad durante los diez años siguientes al cumplimiento de la pena principal. Esta sujeción consistirá en informar a Carabineros cada tres meses su domicilio actual. El incumplimiento de esta obligación configurará la conducta establecida en el artículo 496 nº 1 de este Código.

    Asimismo, el tribunal condenará a las personas comprendidas en el artículo precedente a la pena de inhabilitación absoluta temporal para cargos, oficios o profesiones ejercidos en ámbitos educacionales o que involucren una relación directa y habitual con personas menores de edad, en cualquiera de sus grados. “.

    20. Sustitúyese el artículo 372 bis por el siguiente:

    “Artículo 372 bis.- El que, con ocasión de violación, cometiere además homicidio en la persona de la víctima, será castigado con presidio perpetuo a presidio perpetuo calificado.”.

    21. Agrégase el siguiente artículo 374 bis:

    “Artículo 374 bis.- El que comercialice, importe, exporte, distribuya, difunda o exhiba material pornográfico, cualquiera sea su soporte, en cuya elaboración hayan sido utilizados menores de dieciocho años, será sancionado con la pena de presidio menor en su grado medio a máximo.

    El que maliciosamente adquiera o almacene material pornográfico, cualquiera sea su soporte, en cuya elaboración hayan sido utilizados menores de dieciocho años, será castigado con presidio menor en su grado medio.”.

    22. Agrégase el siguiente artículo 374 ter:

    “Artículo 374 ter.- Las conductas de comercialización, distribución y exhibición señaladas en el artículo anterior, se entenderán cometidas en Chile cuando se realicen a través de un sistema de telecomunicaciones al que se tenga acceso desde territorio nacional.”.

        23. Sustitúyese en el nº 7º del artículo 495 las expresiones “mujeres públicas” por la frase “quienes ejercen el comercio sexual“.

    Artículo 2º.- Introdúcense las siguientes modificaciones en el Código de Procedimiento Penal:

    1.- Sustitúyese en el inciso segundo del artículo 11 la frase “366 quáter“, por la siguiente: “366 quinquies“.

    2.- Introdúcese el siguiente artículo 113 ter, nuevo:

    “Artículo 113 ter.- Cuando existieren sospechas fundadas de que una persona o una organización delictiva hubiere cometido o preparado la comisión de alguno de los delitos previstos en los artículos 366 quinquies, 367, 367 bis, 367 ter, 374 bis, inciso primero, y 374 ter del Código Penal, y la investigación lo hiciere imprescindible, el juez podrá ordenar la interceptación o grabación de las telecomunicaciones de esa persona o de quienes integraren dicha organización y la grabación de comunicaciones.

     La orden que dispusiere la interceptación o grabación deberá indicar el nombre o los datos que permitan la adecuada identificación del afectado por la medida y señalar la forma en que se aplicará y su duración, la que no podrá exceder de sesenta días. El juez podrá prorrogar este plazo por períodos de hasta igual duración, para lo cual deberá examinar cada vez la concurrencia de los requisitos previstos en los incisos precedentes. En todo caso, la orden judicial no podrá extenderse más allá de un año desde que se decretó.

    Las empresas o establecimientos que presten los servicios de comunicación a que se refiere el inciso primero deberán, en el menor plazo posible, poner a disposición de los funcionarios encargados de la diligencia todos los recursos necesarios para llevarla a cabo. Con este objetivo los proveedores de tales servicios deberán mantener, en carácter reservado, a disposición del tribunal, un listado actualizado de sus rangos autorizados de direcciones IP y un registro, no inferior a seis meses, de los números IP de las conexiones que realicen sus abonados. La negativa o el entorpecimiento en la práctica de la medida decretada será constitutiva del delito de desacato, conforme al artículo 240 del Código de Procedimiento Civil. Asimismo, los encargados de realizar la diligencia y los empleados de las empresas o de los establecimientos deberán guardar secreto acerca de la misma, salvo que se les citare como testigos al procedimiento.

    Si las sospechas tenidas en consideración para ordenar las medidas se disiparen o hubiere transcurrido el plazo de duración fijado para las mismas, ellas deberán ser interrumpidas inmediatamente.

    Bajo los mismos supuestos previstos en el inciso primero, el juez podrá autorizar la intervención de agentes encubiertos, o la realización de entregas vigiladas de material, de acuerdo a lo dispuesto en el artículo 369 ter del Código Penal.”.

    3.- Agrégase el siguiente inciso cuarto al artículo 673:

    “En los casos de los artículos 366 quinquies, 374 bis, inciso primero y 374 ter del Código Penal, el tribunal destinará los instrumentos tecnológicos decomisados, tales como computadores, reproductores de imágenes o sonidos y otros similares, al Servicio Nacional de Menores o a los departamentos especializados en la materia de los organismos policiales que correspondan. Las producciones incautadas como pruebas de dichos delitos podrán destinarse al registro reservado a que se refiere el inciso segundo del artículo 369 ter del Código Penal. En este caso, la vulneración de la reserva se sancionará de conformidad con lo dispuesto en el párrafo 8 del Título V, del Libro II del Código Penal.”.

    Artículo 3º.- Incorpóranse las siguientes modificaciones al Código Procesal Penal:

    a) En el inciso quinto del artículo 222, a continuación de las palabras “a cabo“, reemplázase el punto seguido (.) por una coma (,) e intercálase el siguiente texto:

    “en el menor plazo posible. Con este objetivo los proveedores de tales servicios deberán mantener, en carácter reservado, a disposición del Ministerio Público, un listado actualizado de sus rangos autorizados de direcciones IP y un registro, no inferior a seis meses, de los números IP de las conexiones que realicen sus abonados.”.

    b) Agrégase el siguiente inciso cuarto al artículo 469:

    “En los casos de los artículos 366 quinquies, 374 bis, inciso primero, y 374 ter del Código Penal, el tribunal destinará los instrumentos tecnológicos decomisados, tales como computadores, reproductores de imágenes o sonidos y otros similares, al Servicio Nacional de Menores o a los departamentos especializados en la materia de los organismos policiales que correspondan.”.

    Artículo 4º.- Incorpóranse las siguientes modificaciones a la ley nº 16.618, de Menores:

    a) En el artículo 15, agrégase la siguiente letra e), nueva:

    “e) Otorgar protección inmediata a un niño, niña o adolescente que se encuentre en situación de peligro grave, directo e inminente para su vida o integridad física.

     Para ello, concurriendo tales circunstancias, podrá ingresar a un lugar cerrado y retirar al niño, niña o adolescente, debiendo en todo caso poner de inmediato los hechos en conocimiento del Juez de Menores, del Crimen o Fiscal del Ministerio Público, según corresponda.”.

    b) En el artículo 37, intercálase el siguiente inciso tercero, nuevo, pasando el actual inciso tercero a ser inciso cuarto:

    “También procederá el recurso de apelación en contra de aquellas resoluciones que nieguen la aplicación de alguna medida de protección provisoria solicitada en conformidad a lo dispuesto en los artículos 26 nº 7) y 40 de esta ley, cuando dicha solicitud se funde en situaciones de peligro físico grave e inminente para una persona menor de edad.”.

    Artículo 5º.- Intercálase, en el inciso tercero del artículo 3º del decreto ley nº 321, de 1925, sobre libertad condicional, entre la palabra “infanticidio” y la conjunción “y“, la frase “el previsto en el número 1 del artículo 367 bis del Código Penal”.

    Artículo 6º.- Intercálase, en la letra e) del artículo 4º de la ley nº 18.050, que fija normas generales para conceder indultos particulares, entre la expresión “robo con homicidio” y la conjunción “y“, la frase “el previsto en el número 1 del artículo 367 bis del Código Penal“.

    Artículo 7º.- Introdúcense las siguientes modificaciones en el decreto ley nº 645, de 1925, sobre Registro Nacional de Condenas:

    a) En el inciso primero del artículo 6º, agrégase a continuación de la palabra “Registro” la siguiente oración, precedida de una coma (,): “sin perjuicio de lo dispuesto en el artículo siguiente“.

    b) Agrégase el siguiente artículo 6º bis:

    “Artículo 6º bis.- Toda institución pública o privada que por la naturaleza de su objeto requiera contratar a una persona determinada para algún empleo, cargo, oficio o profesión que involucre una relación directa y habitual con menores de edad, podrá solicitar que se le informe, para fines particulares, si ésta se encuentra afecta a la inhabilitación establecida en el artículo 39 bis del Código Penal.

    La misma información podrá ser entregada a cualquier persona que cuente con una autorización expresa de aquel cuyos antecedentes se solicitan, para los fines señalados en el inciso anterior.”.

    Artículo 8º.- Sustitúyese el artículo 30 de la ley nº19.846, sobre calificación de la producción cinematográfica, por el siguiente:

        “Artículo 30.- La participación en la producción de material pornográfico en cuya elaboración hayan sido utilizados menores de dieciocho años y la comercialización, importación, exportación, distribución o exhibición de ese material, serán sancionadas de conformidad a lo previsto en los artículos 366 quinquies, 374 bis y 374 ter del Código Penal.”.

    Artículo 9º.- Introdúcense las siguientes modificaciones al artículo 6º del Código Orgánico de Tribunales:

    a) En el número 8º, reemplázase la coma (,) y la conjunción “y“, por un punto y coma (;),

    b) En el número 9º, sustitúyese el punto (.) por una coma (,) y la conjunción “y“, y

    c) Incorpórase el siguiente numeral 10:

    “10. Los sancionados en los artículos 366 quinquies, 367 y 367 bis nº 1, del Código Penal, cuando pusieren en peligro o lesionaren la indemnidad o la libertad sexual de algún chileno o fueren cometidos por un chileno o por una persona que tuviere residencia habitual en Chile; y el contemplado en el artículo 374 bis, inciso primero, del mismo cuerpo legal, cuando el material pornográfico objeto de la conducta hubiere sido elaborado utilizando chilenos menores de dieciocho años.”..

    Habiéndose cumplido con lo establecido en el nº 1º del artículo 82 de la Constitución Política de la República y por cuanto he tenido a bien aprobarlo y sancionarlo; por tanto promúlguese y llévese a efecto como Ley de la República.

    Santiago, 5 de enero de 2004.

    RICARDO LAGOS ESCOBAR, Presidente de la República.

    Luis Bates Hidalgo, Ministro de Justicia.

    Jorge Correa Sutil, Ministro del Interior (S).

    Lo que transcribo a Ud. para su conocimiento.

    Saluda atentamente a Ud., Jaime Arellano Quintana, Subsecretario de Justicia.

    Tribunal Constitucional

    Proyecto de ley que modifica el Código Penal, el Código de Procedimiento Penal y el Código Procesal Penal en materia de delitos de pornografía infantil

        El Secretario del Tribunal Constitucional, quien suscribe, certifica que la Honorable Cámara de Diputados envió el proyecto de ley enunciado en el rubro, aprobado por el Congreso Nacional, a fin de que este Tribunal ejerciera el control respecto del artículo 9º, y por sentencia de 18 de diciembre de 2003, dictada en los autos Rol nº 399, lo declaró constitucional. Santiago, diciembre 22 de 2003.

    Rafael Larraín Cruz, Secretario.

    25Abr/21

    Fallo 32.956-2018 de la Corte Suprema de Chile, de 22 de abril de 2019. Tercera Sala. s/Protección de Datos Personales

    Fallo 32.956-2018 de la Corte Suprema de Chile, de 22 de abril de 2019. Tercera Sala. s/Protección de Datos Personales

    TEXTOS COMPLETOS:

    SENTENCIA DE LA CORTE DE APELACIONES:

    Valparaíso, cinco de diciembre de dos mil dieciocho.

    VISTO:

    En estos antecedentes, correspondientes al proceso Rol de Ingreso n° 6552-2018 (Protección), comparece el abogado don Gastón B. B., en representación de Retail Chile S. A., quien deduce acción constitucional de protección en contra de la sociedad Servicios Equifax Chile Limitada, representada por don Carlos Ellis Johnson Lathrop, fundada en que la recurrida “[…] no obstante ser informada formalmente con fecha 27 de junio del presente año de su ilegal y arbitrario proceder, mantiene en sus registros a mi representada en calidad de morosa, en el denominado registro Boletín Eletrónico Dicom por concepto de una deuda no declarada de arrendamiento…”, actuación a su juicio es del todo ilegal y arbitraria y mediante la cual se habrían infringido las garantías constitucionales establecidas en los numerales 3°, 4° y 21° del artículo 19 de la Constitución Política de la República, que aseguran a todas las personas la igual protección de la ley en el ejercicio de sus derechos; el respeto y protección a la vida privada y a la honra de la persona y su familia y el derecho a desarrollar cualquiera actividad económica que no sea contraria a la moral, al orden público o a la seguridad nacional, respetando las normas legales que la regulen.

    Refiere la recurrente que, en la fecha indicada, el representante legal de Retail Chile S. A. le dirigió a Servicios Equifax Chile Limitada una solicitud en orden a que eliminara la deuda en referencia del denominado “Registro Dicom de Arrendamiento”, producto que permite a un arrendador, sin expresión de causa ni justificación alguna y sin que se acredite una declaración de morosidad emanada de un tribunal de la República de la parte arrendataria, ni se permita el ejercicio del derecho a defensa de ésta, publicar en el Boletín Comercial Dicom deudas de la misma, exigiéndose para ello como único requisito que el respectivo contrato de arrendamiento contenga una estipulación en la que la arrendataria autorice el uso de sus datos personales y su publicación en los registros de dicha empresa.

    Adiciona la actora que no hay sentencia judicial alguna que declare la existencia de una obligación morosa de la arrendataria, ni que establezca su cuantía, y que no obstante ello la recurrente figura como morosa en un registro compuesto por varios factores que, junto a otras variables, confluye en un factor de riesgo crediticio determinante para la obtención de créditos; que con ello se vulnera el artículo 17 de la Ley n° 18.101, que regula el arrendamiento de predios urbanos y que fija la competencia de los tribunales ordinarios de justicia para conocer de los asuntos que se susciten entre arrendatarios y arrendadores en virtud de un contrato de arrendamiento y que la publicación en comento y el rechazo a su eliminación le ha significado una dificultad en la obtención de créditos y para obtener financiamiento de diversos proyectos. Adiciona que ” A diferencia de lo que puede ocurrir en el registro “tradicional” del Boletín Comercial, en el cual se informan las morosidades de los instrumentos mercantiles protestados, que en su mayoría tienen mérito ejecutivo por sí mismos, en el caso de una deuda de arrendamiento, ésta nace de un incumplimiento contractual entre las partes, situación que debe ser ponderada y luego declarada judicialmente para estar en una situación de morosidad” y que el registro que lleva la empresa EQUIFAX y que alimenta el Sistema del Boletín Comercial de la Cámara de Comercio de Chile, se aparta de la normativa vigente, contenida en el Decreto Supremo n° 950, de Hacienda, de 1928, que establece que son los Tribunales de Justicia los que informarán a la Cámara de Comercio de Chile el listado de sentencias ejecutoriadas que condenen al pago de las rentas insolutas de arrendamiento de bienes raíces.

    Por otra parte, la actora califica la actuación de la recurrida como arbitraria, habida consideración que sí se accedió la eliminación del registro en comento del codeudor solidario, por no haberse acompañado la documentación suficiente respecto del mismo, pero que, sin embargo, no se dio lugar a la eliminación de la recurrente, a pesar que se le acompañaron todos los antecedentes para analizar el caso concreto.

    Con respecto a la infracción de la garantía constitucional consagrada bajo el numeral 3° del artículo 19 de la Constitución Política de la República en vigor, esto es, “La igual protección de la ley en el ejercicio de sus derechos”, la recurrente aduce que al determinar ante sí la existencia de una morosidad en un registro público, al cual acceden instituciones financieras, Servicios Equifax Chile Limitada ha invadido facultades privativas de los tribunales de justicia, constituyéndose en una comisión especial.

    Con relación a la garantía reconocida bajo el numeral 4° del artículo 19 de la Carta Fundamental, o sea, “El respeto y protección de la vida privada y a la honra de la persona y a su familia”, sostiene que se ha vulnerado groseramente el tratamiento de sus datos personales, siendo publicada en registros de acceso público, como deudora de una importante suma de dinero, sin mediar sentencia judicial que justifique la existencia de dicha deuda ni su cuantía.

    Y en cuanto a la afectación de su garantía constitucional consagrada en el numeral 21° del artículo 19 de la Constitución Política de la República, a saber, “El derecho a desarrollar cualquiera actividad económica que no sea contraria a la moral, al orden público o a la seguridad nacional, respetando las normas legales que la regulen”, la impugnante acusa que estas publicaciones le han causado artificialmente un aumento en su predictor de riesgo en los informes de morosidad que envía la recurrida a las instituciones financieras, afectando su patrimonio.

    En fin, la impugnante precisa en su libelo recursivo que el acto impugnado consiste en mantener en el registro de morosidad una deuda de arrendamiento no declarada judicialmente, actuación que a su juicio vulnera las disposiciones constitucionales que invoca y pide a este tribunal superior que adopte las medidas necesarias para restablecer el imperio del Derecho y declare la ilegalidad del proceder de la recurrida, ordenando que ésta elimine del registro informático la noticia que afecta negativamente a la recurrente, dentro del término de tres días, bajo apercibimiento de lo dispuesto en el Auto Acordado de la Excma. Corte Suprema para tales desobediencias.

    A fojas ciento noventa y cinco de estos antecedentes, comparece el abogado don Carlos Dávila Izquierdo, en representación de la parte recurrida, Equifax Chile Limitada, evacuando el Informe que prescribe el numeral 3° del Auto Acordado sobre Tramitación y Fallo del Recurso de Protección de las Garantías Constitucionales, quien, en primer lugar, alega la extemporaneidad de la acción constitucional materia de autos, argumentando que la recurrente debió haber tomado conocimiento de la publicación en referencia, a lo menos, el 27 de junio de 2018, y como el recurso fue deducido con fecha 04 de agosto de 2018, se excedió el plazo de 30 días previsto en el Auto Acordado de la Excma. Corte Suprema sobre la materia.

     Por otra parte y en cuanto al fondo, alega que no existe prohibición legal para efectuar la publicación impugnada, la que se enmarca dentro de las actividades comerciales que ella desarrolla, amparada en la norma consagrada en el artículo 19 n° 21 de la Constitución Política de la República.

    En cuanto a la confección de la base de datos, indica que la misma se forma con los antecedentes aportados por los asociados, siendo ellos los responsables de la exactitud de la información que le proporcionan.

     Manifiesta la recurrida que es obligación del suscriptor no ingresar morosidades respecto de las cuales se hayan concedido esperas, o existan juicios pendientes.

    Por otra parte, argumenta que el aportante libera a Equifax de la responsabilidad derivada del ingreso de datos inexactos.

     En cuanto al caso preciso materia de este proceso, sostiene que de la revisión de los respaldos se constató la existencia de una relación contractual, señalando que se trataría de una controversia sobre la existencia o no de la deuda, lo que ha de ser ventilado en un juicio de lato conocimiento, escapando a la finalidad de la acción cautelar de protección.

    Desde otra perspectiva, la recurrida alega la improcedencia de aplicar la Ley 19.628 a las personas jurídicas, acompañando jurisprudencia y antecedentes respecto de este tópico y pide, en definitiva, el rechazo del recurso interpuesto.

    A fojas 266 comparece doña Claudia Marcela Olivares Silva, en calidad de arrendadora del inmueble cuyo arrendamiento habría generado la deuda que motivó la publicación materia de la acción de autos, quien evacua también informe y alega la extemporaneidad de la acción de protección, argumentando que la tal publicación fue efectuada con fecha 24 de enero de 2018, de manera que al haber sido deducido el recurso con fecha 04 de agosto del mismo año, el mismo fue interpuesto fuera del plazo fatal de treinta días previsto en el señalado Auto Acordado de la Excma. Corte Suprema.

    En subsidio y en relación a la falta de mandato para solicitar la inclusión de la arrendataria morosa en el registro de Equifax, indica que existe un error de transcripción en la cláusula decimotercera del contrato suscrito entre la parte recurrente y la informante, conforme a la cual se faculta a la “Arrendataria” para que pueda dar a conocer la morosidad en el pago de las rentas de arrendamiento y consumos del inmueble individualizado. Alega que no obstante la redacción de dicha estipulación, resulta clara la intención de los contratantes en querer que el contrato produzca efecto en todas sus cláusulas con un sentido lógico, citando las normas de interpretación de los contratos contenidas en los artículos 1560 y 1562 del Código Civil.

    Informa que Equifax sacó de sus registros a don Cristian Eduardo Carvajal Segovia, codeudor solidario de la recurrente Retail Chile S. A., respecto de todas las obligaciones emanadas del contrato de arrendamiento en comento y de sus renovaciones, lo que fue rechazado mediante correo electrónico de 05 de julio del presente año, el que adjunta a su presentación. En virtud de ello solicita a esta Corte de Apelaciones pronunciarse al respecto, ordenando a Equifax reingresar al nombrado codeudor solidario al boletín electrónico Dicom y, en subsidio, dar indicaciones o recomendaciones a Equifax para el reingreso del mencionado codeudor.

    En cuanto al contrato de arrendamiento en referencia, explica que celebró dicha convención con Retail Chile S. A. en calidad de arrendadora y ésta como arrendataria, concurriendo don Cristian Carvajal como codeudor solidario. Dice que a través de su abogado comenzó con negociaciones con la recurrente, pues ésta mantenía una deuda por no pago de las rentas de arrendamiento de los meses de noviembre de 2017, diciembre, una parcialidad de 2017, gastos de consumo y multas por pagos atrasados durante el año 2017, la que totalizaba la suma de $10.232.058.

    Añade que las conversaciones con Retail Chile S. A. se mantuvieron desde los últimos dos meses de enero de 2017 hasta inicios de 2018 y acompaña copias de correos electrónicos intercambiados entre las partes con el objeto de conciliar, lo que no se produjo, señalando que por ello se envió la morosidad al registro de Dicom.

    Pide, en definitiva, declarar la acción de protección como extemporánea y, en subsidio, rechazarla en razón de los fundamentos expuestos y ordenar al recurrido a reingresar al codeudor solidario, don Cristian Eduardo Carvajal Segovia al boletín electrónico DICOM.

    Por resolución de fojas 273, se ordenó traer los autos en relación.

    CON LO RELACIONADO Y CONSIDERANDO:

    I. En cuanto a la alegación de extemporaneidad del recurso:

    PRIMERO:

    Que, constituye un hecho no discutido e indubitado en el proceso, la permanencia de la parte recurrente, Retail Chile S. A. en los registros de la recurrida Servicios Equifax Chile Limitada, en calidad de deudora morosa de un débito causado por un contrato de arrendamiento.

     SEGUNDO:

    Que el Auto Acordado sobre Tramitación y Fallo del Recurso de Protección de las Garantías Constitucionales, bajo el guarismo 1° establece que el recurso de protección se interpondrá “dentro del plazo fatal de treinta días corridos contados desde la ejecución del acto o la ocurrencia de la omisión o, según el caso, según la naturaleza de éstos, desde que se haya tenido noticia o conocimiento cierto de los mismos, lo que se hará contar en autos.”.

    TERCERO:

    Que, habida consideración que la actuación de Servicios Equifax Chile Limitada que se reprocha en el recurso es su negativa a eliminar del Boletín Electrónico Dicom a la recurrente, acto que se materializó con la negativa de la misma en orden a practicar dicha eliminación en su carta respuesta de fecha 05 de julio de 2018, dirigida a la recurrente, distinguiendo la situación de ésta con la del codeudor solidario, respecto de quien sí accedió a la eliminación solicitada, la acción constitucional de protección incoada con fecha de 04 de agosto de 2018 debe tenerse como interpuesta dentro del término expresado en el precepto jurídico trascrito, debiendo por consiguiente, rechazarse la extemporaneidad alegada por la recurrida.

     2. En cuanto al fondo de la acción constitucional de protección:

    CUARTO:

    Que la acción de protección consagrada en el artículo 20 de la Constitución Política de la República constituye jurídicamente una acción de naturaleza cautelar, destinada a amparar el legítimo ejercicio de las garantías y derechos preexistentes que en la misma disposición se indican, mediante la adopción de medidas de resguardo que se deben tomar ante un acto u omisión arbitrario o ilegal que impida, amague o perturbe su ejercicio.

     QUINTO: (eliminado)

    Que, en la especie, es menester tener en cuenta que, si bien el artículo 1° de la Ley n° 19.628, rotulada “Protección de Datos de Carácter Personal” impone obligaciones a quienes efectúen el tratamiento de tales datos, entre los que destaca el respeto por el pleno ejercicio de los derechos fundamentales de los titulares de los mismos y de las facultades que dicha ley les reconoce; que el artículo 2° letra f) dela misma norma jurídica dispone que se entenderá por “Datos de carácter personal o datos personales: los relativos a cualquier información concerniente a personas naturales, identificadas o identificables”; que la letra ñ) del mismo artículo entiende por titular a “la persona natural a la que se refieren los datos de carácter personal”; y que la historia fidedigna de este cuerpo normativo y numerosos fallos jurisprudenciales son indicativos de que la protección legal va dirigida a la persona natural, excluyéndose por consiguiente a las personas jurídicas, no es menos verdadero que el resguardo constitucional dispensado por el artículo 20° de nuestra Carta Fundamental a través de la acción de protección respecto de los derechos y garantías constitucionales asegurados en su artículo 19° que indica no solamente alcanza a las hipótesis de actos u omisiones ilegales, sino también a las de actos u omisiones arbitrarios, habiéndose asentado en la jurisprudencia de nuestros tribunales superiores de justicia que “la arbitrariedad implica carencia de razonabilidad en el actuar u omitir; falta de proporción entre los motivos y el fin a alcanzar; ausencia de ajuste entre los medios empleados y el objetivo a obtener, o aun la inexistencia de los hechos que fundamentan un actuar, lo que pugna contra la lógica y la recta razón” (Corte de Apelaciones de Punta Arenas, 22 de Septiembre de 1993, Revista Gaceta Jurídica, n° 166, pág. 90;  Corte de Apelaciones de Santiago, 05 de Marzo de 1992, Revista Gaceta Jurídica, n° 141, pág. 90; Corte de Apelaciones de Santiago, 30 de Abril de 1993, Revista Gaceta Jurídica, n° 154, pág. 64; Corte Suprema, 26 de Septiembre de 1996, Revista Gaceta Jurídica, n° 195, pág. 64.” http://www.diarioconstitucional.cl/articulos/comentario-a-una-sentencia-de-la-excelentisima-corte-suprema-en-materia-de-accion-constitucional-de-proteccion-del-derecho-a-la-integridad-psiquica/).

    SEXTO: (eliminado)

    Que, asimismo, la doctrina nacional está conteste en que “[…] Frente a esta situación, que amenaza convertir la acción de protección de garantías fundamentales en un recurso de control de legalidad, cabe preguntarse por la función que puede tener el concepto de arbitrariedad como una alternativa a la ilegalidad para controlar la juridicidad de los actos administrativos que aplican correctamente la ley, pero afectan alguna de las garantías constitucionales… Al tratarse la ilegalidad y la arbitrariedad de presupuestos alternativos de la acción de protección, cabe preguntarse por los efectos de las combinaciones en que el acto u omisión es legal pero arbitrario, o bien ilegal pero razonable. Ateniéndonos estrictamente al criterio que asocia la arbitrariedad al ámbito de las potestades discrecionales, y la ilegalidad de las potestades regladas, deberíamos concluir que no es posible que un mismo acto u omisión sea imputable de ambos reproches de antijuridicidad, porque lo reglado y lo discrecional se excluyen. Si así fuera, la distinción que a priori aparece como una garantía de que toda la actividad de la Administración es susceptible de ser recurrida por este remedio procesal, se puede transformar en un obstáculo que deje en la indefensión a los afectados por un acto legal pero injusto (inconstitucional, diríamos). Por otra parte, no podría explicarse que un mismo acto fuera simultáneamente ilegal y razonable Sin embargo, la distinción anotada no es interpretada por nadie tan restrictivamente que excluya la posibilidad de que existan actos legales pero arbitrarios o ilegales pero razonables. Así, Pfeffer admite la posibilidad de que un “acto que es lícito por no contrariar norma legal alguna, puede no obstante ser arbitrario“, al carecer de fundamento o ser desproporcionado en relación al fin. Cea advierte sobre el valor que debe otorgársele al “tópico de la arbitrariedad en contraposición a la legitimidad de la conducta, porque ese es un criterio esencial y sustantivo”, a diferencia de la legitimidad, que es un criterio formal.” Parece sugerir -porque no lo dice- que un acto arbitrario, aunque fuera formalmente legal, satisfaría el presupuesto de arbitrariedad del recurso de protección. Una sentencia de 1988 se hace cargo de esta posibilidad al definir el acto arbitrario como “aquel que no es proporcionado, no es justo o equilibrado, en el que se respeta en forma aparente la ley, pero existe una desviación del fin que justifica el precepto legal” (Silva Irarrázaval, Luis Alejandro. La Funcionalidad del Concepto Arbitrariedad del Recurso de Protección. Revista de Derecho Universidad Católica del Norte, vol. 14, núm. 2, 2007, pp. 169-174).

    SÉPTIMO: (eliminado)

    Que, aplicados los postulados anteriormente consignados al caso sub lite y teniendo especialmente en cuenta el contendido la carta de 05 de julio de 2018, mediante la cual la parte recurrida comunicó a la recurrente su decisión de no eliminar su supuesta morosidad de sus registros, aduciendo que la única persona facultada para los efectos, conforme a la estipulación decimotercera del contrato de arrendamiento cuyo incumplimiento originó dicha la morosidad era la arrendataria y que respecto del codeudor señor Carvajal Segovia, en cambio, sí se efectuaría dicha eliminación porque los respaldos enviados no cumplían con la normativa, haciendo así una discriminación favorable a éste no obstante la naturaleza y efectos del instituto de la solidaridad pasiva, y considerando además la circunstancia que la publicación efectuada en los registros de la recurrida respecto de una presunta deuda originada de un contrato cuyo cumplimiento no ha sido reclamado través del ejercicio de ninguna de las acciones o mecanismos procesales que el Ordenamiento Jurídico dispensa al acreedor, quien ha preterido la vía judicial y utilizado directamente un medio indirecto para compeler al deudor a su pago, cual es la publicación en el Boletín Electrónico de Dicom que se denuncia, se puede concluir que la actuación de la recurrida que se recrimina por la recurrente trasunta un comportamiento antijurídico y arbitrario -presupuesto básico e indispensable para la admisibilidad y acogimiento del recurso- en cuanto afecta de modo directo la imagen y prestigio de ésta, vulnerando las garantías constitucionales invocadas por la misma, motivo por el cual la acción constitucional ha de ser acogida.

    OCTAVO: (eliminado)

    Que, por lo demás, no procede atribuir a la cláusula signada con el guarismo decimotercero del contrato de arrendamiento invocado por la recurrida el efecto de la autorización que prevé el artículo 4° de la Ley n° 19.628, máxime cuando su redacción es defectuosa, lo que ha devenido en controversia entre las partes, y su correcto sentido y alcance no se ha determinado a través de la vía procesal pertinente.

    NOVENO: (eliminado)

    Que, en lo tocante a la solicitud efectuada por la persona que enarbola la calidad de arrendadora en el mismo contrato, dirigida a que se disponga la inclusión en el registro de morosidad de Dicom de quien figura como su codeudor solidario en dicha convención, esto es, a don Cristian Eduardo Carvajal Segovia, cabe hacer extensivos los razonamientos consignados en los motivos precedentes y, además, señalar que tal petición escapa a la naturaleza cautelar y al objeto de la acción de protección, amén que la peticionaria no tiene la calidad de parte en esta litis, por lo que será rechazada.

     Por los motivos y normas jurídicas precedentemente reseñados y conforme, además, con lo previsto en Auto Acordado de la Excma. Corte Suprema, sobre Tramitación y Fallo del Recurso de Protección de las Garantías Constitucionales, se acoge el recurso de protección deducido por el abogado don Gastón Boré Bacigaluppi, en representación de Retail Chile S. A., en contra de Servicios Equifax Chile Limitada, sin costas, debiendo la recurrida eliminar de sus registros las presuntas deudas informadas por doña Claudia Marcela O. S. respecto de la recurrente, inmediatamente que el presente fallo quede ejecutoriado.

    Regístrese, notifíquese y archívese en su oportunidad.

    Redactor: Abogado Integrante doña Sonia M. C.

    Se deja constancia que no firma la Abogado Integrante Sra. M. no obstante haber concurrido a la vista y al acuerdo de la causa, por encontrarse ausente.

    Rol N° 6552-2018.-

    Pronunciado por la Segunda Sala de la C. A. de Valparaíso integrada por los Ministros (as) Max Antonio Cancino C., María Del Rosario Lavín V.

    SENTENCIA DE LA CORTE SUPREMA:

    Santiago, veintidós de abril de dos mil diecinueve

    Vistos:

    Se reproduce la sentencia en alzada, con excepción de sus fundamentos quinto a noveno, que se eliminan.

    Y teniendo en su lugar y, además, presente:

    Primero:

    Que para analizar el asunto planteado por la presente vía resulta conveniente consignar que el recurso de protección de garantías constitucionales establecido en el artículo 20 de la Constitución Política de la República constituye jurídicamente una acción de naturaleza cautelar destinada a amparar el legítimo ejercicio de las garantías y derechos preexistentes que en esa misma disposición se enumeran, mediante la adopción de medidas de resguardo ante un acto u omisión arbitrario o ilegal que perturbe, amague o prive de ese ejercicio.

    Segundo:

    Que, Retail Chile S. A. ha recurrido de protección ante la negativa de Servicios Equifax Chile Limitada de retirarla de su registro de deudores morosos, en el cual fue incluida una deuda por concepto de rentas de arrendamiento correspondientes al contrato que la recurrente celebró con doña Claudia Marcela Olivares Silva, quien pidió su incorporación, en circunstancias que no ha sido notificada de alguna demanda de cobro de las rentas supuestamente adeudadas, cuya efectividad y monto la actora ha discutido. Asimismo, sostiene que la recurrida ha incurrido en una discriminación arbitraria al mantenerla en el aludido registro de morosos en circunstancias que eliminó a su codeudor solidario en virtud de las mismas razones que esgrime en su recurso.

    Tercero:

    Que la recurrida informó manifestando que la incorporación al registro de deudores morosos se realiza a solicitud de los asociados, que asumen la responsabilidad por la efectividad de la deuda, puesto que conforme a la ley, es obligación del suscriptor no ingresar morosidades respecto de las cuales se hayan concedido esperas, o existan juicios pendientes y que la eliminación del codeudor solidario se realizó porque sus circunstancias no eran las mismas. Agrega que la solicitante acreditó la existencia de una relación contractual y que la controversia sobre la existencia de la deuda debe ser ventilada en un juicio de lato conocimiento, escapando a la finalidad de la acción cautelar de protección. Asimismo, alega la improcedencia de aplicar la Ley 19.628 sobre Protección de Datos Personales a las personas jurídicas.

    Cuarto:

    Que también evacuó informe la arrendadora, quien manifestó que si bien existe un error de transcripción en la cláusula decimotercera del contrato suscrito con la recurrente, conforme a la cual se faculta a la “Arrendataria” para que pueda dar a conocer la morosidad en el pago de las rentas de arrendamiento y consumos del inmueble individualizado, dicha estipulación debe ser interpretada con un sentido lógico de manera que todas sus cláusulas produzcan efecto, conforme a las reglas de interpretación de los contratos contenidas en los artículos 1560 y 1562 del Código Civil y, en esa perspectiva, dicha cláusula expresa la clara intención de los contratantes de autorizar esta clase de publicaciones.

    Quinto:

    Que el hecho de si las rentas se pagaron íntegra y oportunamente no es un asunto que corresponda ser discutido por esta vía, sino que deberá ser alegado y debatido en el procedimiento correspondiente, careciendo por tanto dicho argumento de relevancia para determinar el carácter arbitrario o ilegal de la actuación que se reprocha a la recurrida.

     Sexto:

    Que es un hecho no discutido que la empresa Equifax Chile S. A. celebró un contrato de prestación de servicios con la arrendadora del inmueble ocupado por la actora, en virtud del cual la primera le informa las morosidades registradas por sus clientes y la recurrida transmite los datos comerciales aportados.

    Séptimo:

    Que, el artículo 4 de la Ley n° 19.628 sobre Protección de Datos Personales dispone lo siguiente: “El tratamiento de los datos personales sólo puede efectuarse cuando esta ley u otras disposiciones legales lo autoricen o el titular consienta expresamente en ello”. En esta última hipótesis, la norma exige que la persona que autoriza sea debidamente informada respecto del propósito del almacenamiento de sus datos personales y su posible comunicación al público y, asimismo, dispone que dicha autorización, deberá constar por escrito.

    Octavo:

    Que tampoco se ha discutido la existencia del contrato de arrendamiento, el que fue acompañado al informe solicitado a la arrendadora, en el cual puede leerse la cláusula contractual que habilita a la publicación de las morosidades y que expresa: “13.- DATOS PERSONALES: Con el objeto de dar cumplimiento a la Ley 19.628 y sus modificaciones, sobre protección de datos de carácter personal, el Arrendatario y su Fiador y Codeudor Solidario facultan irrevocablemente a la Arrendataria para que puedan dar a conocer la morosidad en el pago de las rentas de arrendamiento y consumos del inmueble individualizado, proporcionando dicha información a cualquier registro o banco de datos personales con objeto que sea divulgado, relevando el Arrendatario y su Fiador o Codeudor Solidario a la Arrendataria de cualquier responsabilidad que pudiera derivar al efecto.”.

    Noveno:

    Que, así las cosas, Equifax Chile S. A. se encontraba habilitada para publicar la deuda impaga del recurrente, quien autorizó expresamente su divulgación a través de ésta u otras bases de datos y no acreditó la solución de la misma para requerir su retiro del registro de deudores morosos.

    Décimo:

    Que, por último, la circunstancia de haberse eliminado al codeudor solidario del registro de morosidades no altera la efectividad del hecho que habilita a efectuar dicha publicación, cual es la existencia de la deuda impaga, por lo que no se advierte que la recurrida haya incurrido en una discriminación arbitraria al negarse a eliminar de su registro al actor de su base de datos.

    Undécimo:

    Que, por consiguiente, la aludida negativa de Equifax a retirar a la actora del registro de deudores morosos no es ilegal ni arbitraria, al no infringir disposición legal alguna en materia de información comercial.

    Por estas consideraciones y de conformidad, además, con lo dispuesto en el artículo 20 de la Constitución Política de la República y en el Auto Acordado de esta Corte sobre la materia, se revoca la sentencia apelada de cinco de diciembre de dos mil dieciocho, dictada por la Corte de Apelaciones de Valparaíso y se declara, en cambio, que se rechaza el recurso de protección interpuesto Retail Chile S. A. en contra de Servicios Equifax Chile Limitada.

    Regístrese y devuélvase.

    Redacción a cargo del Abogado Integrante señor M.

    Rol n° 32.956-2018.-

    Pronunciado por la Tercera Sala de esta Corte Suprema integrada por los Ministros Sr. Sergio Muñoz G., Sra. María Eugenia Sandoval G. y Sra. Ángela Vivanco M. y los Abogados Integrantes Sr. Jean Pierre M. A. y Sr. Ricardo A. D.

    25Abr/21

    Estándares de Protección de Datos Personales para los Estados Iberoamericanos, de 20 de junio de 2017

    Los Estados Iberoamericanos:

    1) Considerando que la protección de las personas físicas en relación con el tratamiento de sus datos personales es un derecho fundamental que se encuentra reconocido con rango máximo en la mayoría de las Constituciones Políticas de los Estados Iberoamericanos, bajo la forma del derecho a la protección de datos personales o habeas data, y que en algunos casos ha sido definido jurisprudencialmente por sus Tribunales o Cortes Constitucionales;

    (2) Determinando que el derecho a la protección de datos personales se ha conceptualizado en algunos países Iberoamericanos, legislativamente o jurisprudencialmente, como un derecho de naturaleza distinta a los derechos a la vida privada y familiar, a la intimidad, al honor, al buen nombre y otros derechos similares, que en su conjunto garantizan el libre desarrollo de la personalidad de la persona física, hasta conformarse en un derecho autónomo, con características y dinámica propias, que tiene por objeto salvaguardar el poder de disposición y control que tiene toda persona física con respecto a la información que le concierne, fundamentalmente en atención al empleo de las tecnologías de la información y las comunicaciones que cobran cada vez mayor relevancia en todos los quehaceres de la vida cotidiana;

    (3) Asumiendo que salvaguardar el derecho de las personas físicas respecto al tratamiento de sus datos personales es compatible con el objetivo de garantizar y proteger otros derechos, los cuales se reconocen como indivisibles e interdependientes unos con otros, y que requieren de una protección conforme para resguardar en su esfera más amplia a las personas físicas en contra de intrusiones ilegales o arbitrarias, incluso aquellas derivadas del tratamiento de datos personales. Lo anterior, no impide que el derecho a la protección de datos personales resulte aplicable a las personas jurídicas en cumplimiento a lo establecido en el derecho interno de los Estados Iberoamericanos;

    (4) Recordando que la Red Iberoamericana de Protección de Datos surgió con motivo del acuerdo alcanzado en el Encuentro Iberoamericano de Protección de Datos, celebrado en La Antigua, Guatemala, del 1 al 6 de junio de 2003, con la asistencia de representantes de 14 países iberoamericanos. Iniciativa que contó desde sus inicios con un apoyo político reflejado en la Declaración Final de la XIII Cumbre de Jefes de Estado y de Gobierno de los países Iberoamericanos, celebrada en Santa Cruz de la Sierra, Bolivia, el 14 y 15 de noviembre de 2003, conscientes del carácter de la protección de datos personales como un derecho fundamental;

    (5) Teniendo en cuenta que con motivo de la Resolución adoptada en la XXV Cumbre Iberoamericana de Jefes de Estado y de Gobierno, que tuvo lugar en Cartagena de Indias, Colombia, los días 28 y 29 de octubre de 2016, se reafirmó que la adopción, elaboración e impulso de diversos manuales, programas, iniciativas y proyectos fortalecerían la gestión e impacto de las acciones de cooperación entre los países de Iberoamérica;

    (6) Asumiendo que la Red Iberoamericana de Protección de Datos se constituye en un foro permanente de intercambio de información abierto a todos los países miembros de la Comunidad Iberoamericana y que permite el involucramiento de los sectores público, privado y social, con la finalidad de promover los desarrollos normativos necesarios para garantizar una regulación avanzada del derecho a la protección de datos personales en un contexto democrático y global;

    (7) Recordando que con motivo de la reunión celebrada en Santa Cruz de la Sierra, Bolivia, del 3 a 5 de mayo de 2006, se elaboró el documento denominado Directrices para la Armonización de la Protección de Datos en la Comunidad Iberoamericana, el cual establece un conjunto de disposiciones que tienen por objeto contribuir a la elaboración de las iniciativas regulatorias de la protección de datos que surjan en la Comunidad Iberoamericana, constituyéndose como un referente para el desarrollo de los presentes Estándares;

    (8) Teniendo en cuenta que la Unión Europea ha adoptado un nuevo marco normativo en la materia, con el objetivo de modernizar sus disposiciones y garantizar mayor solidez y coherencia en la protección efectiva del derecho fundamental a la protección de datos personales en la Unión Europea y con el fin de generar confianza en la sociedad en general y, a su vez, facilitar el desarrollo de la economía digital, tanto en su mercado interior como en sus relaciones globales; marco normativo que se posiciona como un referente obligado y determinante para la elaboración de las legislaciones nacionales de protección de datos en Iberoamérica;

    (9) Reconociendo que existe una falta de armonización en los Estados Iberoamericanos respecto al reconocimiento, adopción, definición y desarrollo de las figuras, principios, derechos y procedimientos que dan contenido al derecho a la protección de datos personales en sus legislaciones nacionales, lo cual, sin duda, dificulta actualmente hacer frente a los nuevos retos y desafíos para la protección de este derecho derivados de la constante y vertiginosa evolución tecnológica y la globalización en diversos ámbitos;

    (10) Haciendo apremiante, en el marco de una constante innovación tecnológica, la adopción de instrumentos regulatorios que garanticen, por una parte, la protección de las personas físicas con relación al tratamiento de sus datos personales y, por la otra, el libre flujo de los datos personales que actualmente constituyen la base para el desarrollo, fortalecimiento e intercambio de bienes y servicios en una economía global y digital, sobre los cuales se erigen las economías de los Estados Iberoamericanos;

    (11) Acordando que para garantizar un nivel alto de protección de los derechos y libertades de las personas físicas, entre otras cuestiones, se requiere, a su vez, un nivel uniforme y elevado de protección de las personas físicas con respecto a su información personal que responda a las necesidades y exigencias actuales en un contexto global, con la finalidad de no establecer barreras a la libre circulación de los datos personales en los Estados Iberoamericanos y, en consecuencia, favorecer las actividades comerciales entre la región, así como con otras regiones económicas;

    (12) Aceptando que con el objetivo de ampliar y fortalecer el régimen de protección de las personas físicas respecto al tratamiento de sus datos personales, es imperioso establecer un equilibrio entre los intereses de todos los actores del sector público, privado y social y titulares involucrados, incluyendo el establecimiento de excepciones por cuestiones de interés público que sean razonables y compatibles con los derechos y libertades, para evitar incurrir en restricciones o limitaciones injustificadas o desproporcionadas que no sean acordes con los fines perseguidos en sociedades democráticas;

    (13) Estando conscientes acerca de los riesgos potenciales que pueden derivarse en la esfera de las personas físicas con motivo del tratamiento de sus datos personales a gran escala efectuado por parte de organismos públicos y privados y, en particular, teniendo en cuenta la especial vulnerabilidad de las niñas, niños y adolescentes, quienes demandan de garantías adecuadas y suficientes de protección frente a usos indebidos o arbitrarios de su información personal, preservando de esta manera su interés superior, el libre desarrollo de su personalidad, su seguridad y otros valores que son objeto de máxima protección por parte de los Estados Iberoamericanos;

    (14) Conviniendo que el desarrollo tecnológico facilita el tratamiento de nuevas categorías de datos personales que presentan riesgos específicos, en particular el uso inadecuado de los mimos; por lo que resulta altamente relevante lograr un consenso mínimo respecto de las categorías de datos personales considerados con el carácter de sensible o especialmente protegidos, así como de las reglas para su tratamiento, teniendo en cuenta que las consecuencias e injerencias negativas que pueden derivarse a partir del uso indebido de este tipo de datos personales pueden generar condiciones injustas o discriminatorias para las personas físicas;

    (15) Admitiendo que no todos los Estados Iberoamericanos cuentan con una legislación en la materia, situación que puede provocar afectaciones en el resguardo y tratamiento de la información personal, si se considera el acelerado uso de las tecnologías de la información que facilitan y permiten una comunicación masiva de datos personales de manera inmediata y casi ilimitada;

    (16) Estableciendo que las legislaciones en materia de protección de datos personales de los Estados Iberoamericanos deben adoptar los referentes contenidos en los presentes Estándares para contar con un marco regulatorio armonizado que ofrezca un nivel de protección a las personas físicas respecto al tratamiento de sus datos personales y, a su vez, garantizando el desarrollo comercial y económico de la zona;

    (17) Admitiendo que actualmente las bases jurídicas que legitiman a todo organismo de carácter público o privado a tratar datos personales en su posesión son el consentimiento del titular; el cumplimiento de una disposición legal; el cumplimiento de una orden judicial, resolución o mandato fundado y motivado de autoridad pública competente; el ejercicio de facultades propias de las autoridades públicas; el reconocimiento o defensa de los derechos del titular ante una autoridad pública competente; la ejecución de un contrato o precontrato en el que el titular sea parte; el cumplimiento de una obligación legal aplicable al responsable; la protección de intereses vitales del titular o de otra persona física; el interés legítimo del organismo público o privado, o por razones de interés público;

    (18) Enfatizando la necesidad que en los Estados Iberoamericanos se traten los datos personales bajo los mismos estándares y reglas homogéneas que ofrezcan a los titulares las mismas garantías de protección, a través del establecimiento de un catálogo de principios de obligado cumplimiento que responda a los actuales estándares nacionales e internacionales en la materia, así como a las exigencias que demanda un efectivo ejercicio y respeto de este derecho fundamental;

    (19) Reconociendo que con el propósito de garantizar de manera efectiva el derecho a la protección de datos personales, es preciso adoptar un marco regulatorio que reconozca a cualquier persona física, en su carácter de titular de sus datos personales, la posibilidad de ejercer, por regla general de manera gratuita y excepcionalmente con costos asociados por razones naturales de reproducción, envío, certificación u otras, los derechos de acceso, rectificación, cancelación, oposición y portabilidad, inclusive en el contexto de tratamientos de datos personales efectuados por motores o buscadores de Internet; derechos que complementan las condiciones necesarias para que los titulares ejerzan de manera plena su derecho a la autodeterminación informativa;

    (20) Resaltando la importancia y el papel fundamental que desempeñan los prestadores de servicios que tratan datos personales a nombre y por cuenta del responsable, incluyendo aquéllos que prestan servicios de cómputo en la nube y otras materias, lo cual conlleva a los Estados Iberoamericanos a adoptar, en un mundo globalizado, un régimen que les permita regular este tipo de servicios con la finalidad de establecer una serie de garantías para la protección de los datos personales que con motivo de su encargo poseen y tratan, sin eximir al responsable de sus obligaciones y responsabilidades que tiene ante los titulares y las autoridades de control;

    (21) Considerando que el desarrollo de las nuevas tecnologías de la información y las comunicaciones así como los servicios desarrollados en el contexto de la economía digital están contribuyendo al crecimiento continuado de los flujos transfronterizos de datos personales en el marco de una sociedad global, es ineludible la obligación de establecer una base mínima que facilite y permita a responsables y encargados, en su calidad de exportadores, la realización de transferencias internacionales de datos personales con pleno respeto a los derechos de los titulares;

    (22) Teniendo en cuenta que mediante el Internet es posible acceder y recabar información disponible en cualquier país, así como llevar a cabo un tratamiento de la misma, como recabar datos de millones de personas sin estar físicamente domiciliado allí, circunstancia que no  debería constituirse en un factor que impida la efectiva protección de los derechos y libertades de las personas en el ciberespacio;

    (23) Reconociendo la importancia de la adopción de medidas preventivas que permitan al responsable responder proactivamente ante los posibles problemas relacionados con el derecho a la protección de datos personales como son la adopción de esquemas de autorregulación vinculante o sistemas de certificación en la materia; la designación de un oficial de protección de datos personales; la elaboración de evaluaciones de impacto a la protección de datos personales y la privacidad por defecto y por diseño, entre otras, lo cual resulta esencial en el ámbito de las tecnologías de la información y las telecomunicaciones;

    (24) Admitiendo la imperiosa necesidad de que cada Estado Iberoamericano cuente con una autoridad de control independiente e imparcial en sus potestades cuyas decisiones únicamente puedan ser recurribles por el control judicial, ajena a toda influencia externa, con facultades de supervisión e investigación en materia de protección de datos personales y encargada de vigilar el cumplimiento de la legislación nacional en la materia, la cual esté dotada de recursos humanos y materiales suficientes para garantizar el ejercicio de sus poderes y el desempeño efectivo de sus funciones;

    (25) Reconociendo que los Estados Iberoamericanos están obligados a adoptar un régimen que garantice a los titulares una serie de mecanismos y procedimientos para presentar sus reclamaciones ante la autoridad de control cuando consideren vulnerado su derecho a la protección de datos personales, así como para ser indemnizados cuando hubieren sufrido daños y perjuicios como consecuencia de una violación de su derecho;

    (26) Destacando la importancia de establecer una base mínima para la cooperación internacional entre las autoridades de control latinoamericanas y entre éstas y las de terceros países, con la finalidad de favorecer y facilitar la aplicación de la legislación en la materia y una protección efectiva de los titulares; Han convenido en adoptar los presentes Estándares como máxima prioridad en la Comunidad Iberoamericana para que con el carácter de directrices orientadoras contribuyan a la emisión de iniciativas regulatorias de protección de datos personales en la región de los países que aún no cuentan con estos ordenamientos, o en su caso, sirvan como referente para la modernización y actualización de las legislaciones existentes, favoreciendo la adopción de un marco regulatorio armonizado que ofrezca un nivel adecuado de protección de las personas físicas respecto al tratamiento de sus datos personales y garantizando, a su vez, el desarrollo comercial y económico de la región, al tenor de lo siguiente:

    Capítulo I. Disposiciones generales

    1. Objeto

    1.1. Los presentes Estándares tienen por objeto:

    a. Establecer un conjunto de principios y derechos de protección de datos personales que los Estados Iberoamericanos puedan adoptar y desarrollar en su legislación nacional, con la finalidad de garantizar un debido tratamiento de los datos personales y contar con reglas homogéneas en la región.

    b. Elevar el nivel de protección de las personas físicas en lo que respecta al tratamiento de sus datos personales, así como entre los Estados Iberoamericanos, el cual responda a las necesidades y exigencias internacionales que demanda el derecho a la protección de datos personales en una sociedad en la cual las tecnologías de la información y del conocimiento cobran cada vez mayor relevancia en todos los quehaceres de la vida cotidiana.

    c. Garantizar el efectivo ejercicio y tutela del derecho a la protección de datos personales de cualquier persona física en los Estados Iberoamericanos, mediante el establecimiento de reglas comunes que aseguren el debido tratamiento de sus datos personales.

    d. Facilitar el flujo de los datos personales entre los Estados Iberoamericanos y más allá de sus fronteras, con la finalidad de coadyuvar al crecimiento social y económico de la región.

    e. Impulsar el desarrollo de mecanismos para la cooperación internacional entre las autoridades de control de los Estados Iberoamericanos, autoridades de control no pertenecientes a la región y autoridades y entidades internacionales en la materia.

    2. Definiciones

    2.1. Para los efectos de los presentes Estándares se entenderá por:

    a. Anonimización: la aplicación de medidas de cualquier naturaleza dirigidas a impedir la identificación o reidentificación de una persona física sin esfuerzos desproporcionados.

    b. Consentimiento: manifestación de la voluntad, libre, específica, inequívoca e informada, del titular a través de la cual acepta y autoriza el tratamiento de los datos personales que le conciernen.

    c. Datos Personales: cualquier información concerniente a una persona física identificada o identificable, expresada en forma numérica, alfabética, gráfica, fotográfica, alfanumérica, acústica o de cualquier otro tipo. Se considera que una persona es identificable cuando su identidad pueda determinarse directa o indirectamente, siempre y cuando esto no requiera plazos o actividades desproporcionadas.

    d. Datos personales sensibles: aquellos que se refieran a la esfera íntima de su titular, o cuya utilización indebida puedan dar origen a discriminación o conlleve un riesgo grave para éste. De manera enunciativa, se consideran sensibles los datos personales que puedan revelar aspectos como origen racial o étnico; creencias o convicciones religiosas, filosóficas y morales; afiliación sindical; opiniones políticas; datos relativos a la salud, a la vida, preferencia u orientación sexual, datos genéticos o datos biométricos dirigidos a identificar de manera unívoca a una persona física.

    e. Encargado: prestador de servicios, que con el carácter de persona física o jurídica o autoridad pública, ajena a la organización del responsable, trata datos personales a nombre y por cuenta de éste.

    f. Exportador: persona física o jurídica de carácter privado, autoridad pública, servicios, organismo o prestador de servicios situado en territorio de un Estado que efectúe transferencias internacionales de datos personales, conforme a lo dispuesto en los presentes Estándares.

    g. Responsable: persona física o jurídica de carácter privado, autoridad pública, servicios u organismo que, solo o en conjunto con otros, determina los fines, medios, alcance y demás cuestiones relacionadas con un tratamiento de datos personales.

    h. Titular: persona física a quien le conciernen los datos personales.

    i. Tratamiento: cualquier operación o conjunto de operaciones efectuadas mediante procedimientos físicos o automatizados realizadas sobre datos personales, relacionadas, de manera enunciativa más no limitativa, con la obtención, acceso, registro, organización, estructuración, adaptación, indexación, modificación, extracción, consulta, almacenamiento, conservación, elaboración, transferencia, difusión, posesión, aprovechamiento y en general cualquier uso o disposición de datos personales.

    3. Ámbito de aplicación subjetivo

    3.1. Los presentes Estándares serán aplicables a las personas físicas o jurídicas de carácter privado, autoridades y organismos públicos, que traten datos personales en el ejercicio de sus actividades y funciones.

    4. Ámbito de aplicación objetivo

    4.1. Los presentes Estándares serán aplicables al tratamiento de datos personales que obren en soportes físicos, automatizados total o parcialmente, o en ambos soportes, con independencia de la forma o modalidad de su creación, tipo de soporte, procesamiento, almacenamiento y organización.

    4.2. Por regla general, los presentes Estándares serán aplicables a los datos personales de personas físicas, lo cual no impide que los Estados Iberoamericanos en su legislación nacional dispongan que la información de las personas jurídicas sea salvaguardada acorde con el derecho a la protección de datos personales, en cumplimiento a lo establecido en su derecho interno.

    4.3. Los Estándares no resultarán aplicables en los siguientes supuestos:

    a. Cuando los datos personales estén destinados a actividades exclusivamente en el marco de la vida familiar o doméstica de una persona física, esto es, la utilización de datos personales en un entorno de amistad, parentesco o grupo personal cercano y que no tengan como propósito una divulgación o utilización comercial.

    b. La información anónima, es decir, aquélla que no guarda relación con una persona física identificada o identificable, así como los datos personales sometidos a un proceso de anonimización de tal forma que el titular no pueda ser identificado o reidentificado.

    4.4. La legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá establecer categorías de datos personales a las cuales no les resulte aplicable el régimen de protección previsto en los presentes Estándares, en cumplimiento de su derecho interno.

    5. Ámbito de aplicación territorial

    5.1. Los Estándares serán aplicables al tratamiento de datos personales efectuado:

    a. Por un responsable o encargado establecido en territorio de los Estados Iberoamericanos.

    b. Por un responsable o encargado no establecido en territorio de los Estados Iberoamericanos, cuando las actividades del tratamiento estén relacionadas con la oferta de bienes o servicios dirigidos a los residentes de los Estados Iberoamericanos, o bien, estén  relacionadas con el control de su comportamiento, en la medida en que éste tenga lugar en los Estados Iberoamericanos.

    c. Por un responsable o encargado que no esté establecido en un Estado Iberoamericano pero le resulte aplicable la legislación nacional de dicho Estado, derivado de la celebración de un contrato o en virtud del derecho internacional público.

    d. Por un responsable o encargado no establecido en territorio de los Estados Iberoamericanos y que utilice o recurra a medios, automatizados o no, situados en ese territorio para tratar datos personales, salvo que dichos medios se utilicen solamente con fines de tránsito.

    5.2. Para los efectos de los presentes Estándares, se entenderá por establecimiento el lugar de la administración central o principal del responsable o encargado, el cual deberá determinarse en función de criterios objetivos e implicar el ejercicio efectivo y real de actividades de gestión que determinen las principales decisiones en cuanto a los fines y medios del tratamiento de datos personales que lleve a cabo, a través de modalidades estables.

    5.3. La presencia y utilización de medios técnicos y tecnologías para el tratamiento de datos personales o las actividades de tratamiento no constituirán, en sí mismas, un establecimiento principal y no serán considerados como criterios determinantes para la definición del establecimiento principal del responsable o encargado.

    5.4. Cuando el tratamiento de datos personales lo realice un grupo empresarial, el establecimiento principal de la empresa que ejerce el control deberá considerarse el establecimiento principal del grupo empresarial, excepto cuando los fines y medios del tratamiento los determine efectivamente otra de las empresas del grupo.

    6. Excepciones generales al derecho a la protección de datos personales.

    6.1. La legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá limitar el derecho a la protección de datos para salvaguardar la seguridad nacional, la seguridad pública, la protección de la salud pública, la protección de los derechos y las libertades de terceros, así como por cuestiones de interés público.

    6.2. Las limitaciones y restricciones serán reconocidas de manera expresa en ley, con el propósito de brindar certeza suficiente a los titulares acerca de la naturaleza y alcances de la medida.

    6.3. Cualquier ley que tenga como propósito limitar el derecho a la protección de datos personales contendrá, como mínimo, disposiciones relativas a:

    a. La finalidad del tratamiento.

    b. Las categorías de datos personales de que se trate.

    c. El alcance de las limitaciones establecidas.

    d. Las garantías adecuadas para evitar accesos o transferencias ilícitas o desproporcionadas.

    e. La determinación del responsable o responsables.

    f. Los plazos de conservación de los datos personales.

    g. Los posibles riesgos para los derechos y libertades de los titulares.

    h. El derecho de los titulares a ser informados sobre la limitación, salvo que resulte perjudicial o incompatible a los fines de ésta.

    6.4. Las leyes serán las necesarias, adecuadas y proporcionales en una sociedad democrática, y deberán respetar los derechos y las libertades fundamentales de los titulares.

    7. Ponderación del derecho a la protección de datos personales

    7.1. Los Estados Iberoamericanos podrán exentar, en su derecho interno, el cumplimiento de los principios y derechos previstos en los presentes Estándares, exclusivamente en la medida en que resulte necesario conciliar el derecho a la protección de datos personales con otros derechos y libertades fundamentales.

    7.2. Esta exención deberá requerir de un ejercicio de ponderación con la finalidad de determinar la necesidad, idoneidad y proporcionalidad de la restricción o excepción conforme a las reglas y criterios que establezcan los Estados Iberoamericanos en su derecho interno.

    8. Tratamiento de datos personales de niñas, niños y adolescentes

    8.1. En el tratamiento de datos personales concernientes a niñas, niños y adolescentes, los Estados Iberoamericanos privilegiarán la protección del interés superior de éstos, conforme a la Convención sobre los Derechos del Niño y demás instrumentos internacionales que busquen su bienestar y protección integral.

    8.2. Los Estados Iberoamericanos promoverán en la formación académica de las niñas, niños y adolescentes, el uso responsable, adecuado y seguro de las tecnologías de la información y comunicación y los eventuales riesgos a los que se enfrentan en ambientes digitales respecto del tratamiento indebido de sus datos personales, así como el respeto de sus derechos y libertades.

    9. Tratamiento de datos personales de carácter sensible

    9.1. Por regla general, el responsable no podrá tratar datos personales sensibles, salvo que se presente cualquiera de los siguientes supuestos:

    a. Los mismos sean estrictamente necesarios para el ejercicio y cumplimiento de las atribuciones y obligaciones expresamente previstas en las normas que regulan su actuación.

    b. Se dé cumplimiento a un mandato legal.

    c. Se cuente con el consentimiento expreso y por escrito del titular.

    d. Sean necesarios por razones de seguridad nacional, seguridad pública, orden público, salud pública o salvaguarda de derechos y libertades de terceros.

    9.2. La legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá establecer excepciones, garantías y condiciones adicionales para asegurar el debido tratamiento de los datos personales sensibles, de conformidad con su derecho interno.

    Capítulo II. Principios de protección de datos personales

    10. Principios aplicables al tratamiento de datos personales

    10.1. En el tratamiento de datos personales, el responsable observará los principios de legitimación, licitud, lealtad, transparencia, finalidad, proporcionalidad, calidad, responsabilidad, seguridad y confidencialidad.

    11. Principio de legitimación

    11.1. Por regla general, el responsable solo podrá tratar datos personales cuando se presente alguno de los siguientes supuestos:

    a. El titular otorgue su consentimiento para una o varias finalidades específicas.

    b. El tratamiento sea necesario para el cumplimiento de una orden judicial, resolución o mandato fundado y motivado de autoridad pública competente.

    c. El tratamiento sea necesario para el ejercicio de facultades propias de las autoridades públicas o se realice en virtud de una habilitación legal.

    d. El tratamiento sea necesario para el reconocimiento o defensa de los derechos del titular ante una autoridad pública.

    e. El tratamiento sea necesario para la ejecución de un contrato o precontrato en el que el titular sea parte.

    f. El tratamiento sea necesario para el cumplimiento de una obligación legal aplicable al responsable.

    g. El tratamiento sea necesario para proteger intereses vitales del titular o de otra persona física.

    h. El tratamiento sea necesario por razones de interés público establecidas o previstas en ley.

    i. El tratamiento sea necesario para la satisfacción de intereses legítimos perseguidos por el responsable o por un tercero, siempre que sobre dichos intereses no prevalezcan los intereses o los derechos y libertades fundamentales del titular que requiera la protección de datos personales, en particular cuando el titular sea niño, niña o adolescente. Lo anterior, no resultará aplicable a los tratamientos de datos personales realizados por las autoridades públicas en el ejercicio de sus funciones.

    11.2. Tratándose de este último inciso, se entenderá amparado por el interés legítimo el tratamiento de datos personales de contacto que sea imprescindible para la localización de personas físicas que prestan sus servicios al responsable, con la finalidad de mantener cualquier tipo de relación con ésta.

    12. Condiciones para el consentimiento

    12.1. Cuando sea necesario obtener el consentimiento del titular, el responsable demostrará de manera indubitable que el titular otorgó su consentimiento, ya sea a través de una declaración o una acción afirmativa clara.

    12.2. Siempre que sea requerido el consentimiento para el tratamiento de los datos personales, el titular podrá revocarlo en cualquier momento, para lo cual el responsable establecerá mecanismos sencillos, ágiles, eficaces y gratuitos.

    13. Consentimiento para el tratamiento de datos personales de niñas, niños y adolescentes

    13.1. En la obtención del consentimiento de niñas, niños y adolescentes, el responsable obtendrá la autorización del titular de la patria potestad o tutela, conforme a lo dispuesto en las reglas de representación previstas en el derecho interno de los Estados Iberoamericanos, o en su caso, solicitará directamente la autorización del menor de edad si el derecho interno de cada Estado Iberoamericano ha establecido una edad mínima para que lo pueda otorgar directamente y sin representación alguna del titular de la patria potestad o tutela.

    13.2. El responsable realizará esfuerzos razonables para verificar que el consentimiento fue otorgado por el titular de la patria potestad o tutela, o bien, por el menor directamente atendiendo a su edad de acuerdo con el derecho interno de cada Estado Iberoamericano, teniendo en cuenta la tecnología disponible.

    14. Principio de licitud

    14.1. El responsable tratará los datos personales en su posesión con estricto apego y cumplimiento de lo dispuesto por el derecho interno del Estado Iberoamericano que resulte aplicable, el derecho internacional y los derechos y libertades de las personas.

    14.2. El tratamiento de datos personales que realicen las autoridades públicas se sujetará a las facultades o atribuciones que el derecho interno del Estado Iberoamericano de que se trate les confiera expresamente, además de lo previsto en el numeral anterior de los presentes Estándares.

    15. Principio de lealtad

    15.1. El responsable tratará los datos personales en su posesión privilegiando la protección de los intereses del titular y absteniéndose de tratar éstos a través de medios engañosos o fraudulentos.

    15.2. Para los efectos de los presentes Estándares, se considerarán desleales aquellos tratamientos de datos personales que den lugar a una discriminación injusta o arbitraria contra los titulares.

    16. Principio de transparencia

    16.1. El responsable informará al titular sobre la existencia misma y características principales del tratamiento al que serán sometidos sus datos personales, a fin de que pueda tomar decisiones informadas al respecto.

    16.2. El responsable proporcionará al titular, al menos, la información siguiente:

    a. Su identidad y datos de contacto.

    b. Las finalidades del tratamiento a que serán sometidos sus datos personales.

    c. Las comunicaciones, nacionales o internacionales, de datos personales que pretenda realizar, incluyendo los destinatarios y las finalidades que motivan la realización de las mismas.

    d. La existencia, forma y mecanismos o procedimientos a través de los cuales podrá ejercer los derechos de acceso, rectificación, cancelación, oposición y portabilidad.

    e. En su caso, el origen de los datos personales cuando el responsable no los hubiere obtenido directamente del titular.

    16.3. La información proporcionada al titular tendrá que ser suficiente y fácilmente accesible, así como redactarse y estructurarse en un lenguaje claro, sencillo y de fácil comprensión para los titulares a quienes va dirigida, especialmente si se trata de niñas, niños y adolescentes.

    16.4. Todo responsable contará con políticas transparentes de los tratamientos de datos personales que realice.

    17. Principio de finalidad

    17.1. Todo tratamiento de datos personales se limitará al cumplimiento de finalidades determinadas, explícitas y legítimas.

    17.2. El responsable no podrá tratar los datos personales en su posesión para finalidades distintas a aquéllas que motivaron el tratamiento original de éstos, a menos que concurra alguna de las causales que habiliten un nuevo tratamiento de datos conforme al principio de legitimación.

    17.3. El tratamiento ulterior de datos personales con fines archivísticos, de investigación científica e histórica o con fines estadísticos, todos ellos, en favor del interés público, no se considerará incompatible con las finalidades iniciales.

    18. Principio de proporcionalidad

    18.1 El responsable tratará únicamente los datos personales que resulten adecuados, pertinentes y limitados al mínimo necesario con relación a las finalidades que justifican su tratamiento.

    19. Principio de calidad

    19.1. El responsable adoptará las medidas necesarias para mantener exactos, completos y actualizados los datos personales en su posesión, de tal manera que no se altere la veracidad de éstos conforme se requiera para el cumplimiento de las finalidades que motivaron su tratamiento.

    19.2. Cuando los datos personales hubieren dejado de ser necesarios para el cumplimiento de las finalidades que motivaron su tratamiento, el responsable los suprimirá o eliminará de sus archivos, registros, bases de datos, expedientes o sistemas de información, o en su caso, los someterá a un procedimiento de anonimización.

    19.3. En la supresión de los datos personales, el responsable implementará métodos y técnicas orientadas a la eliminación definitiva y segura de éstos.

    19.4. Los datos personales únicamente serán conservados durante el plazo necesario para el cumplimiento de las finalidades que justifiquen su tratamiento o aquéllas relacionadas con exigencias legales aplicables al responsable. No obstante, la legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá establecer excepciones respecto al plazo de conservación de los datos personales, con pleno respeto a los derechos y garantías del titular.

    20. Principio de responsabilidad

    20.1. El responsable implementará los mecanismos necesarios para acreditar el cumplimiento de los principios y obligaciones establecidas en los presentes Estándares, así como rendirá cuentas sobre el tratamiento de datos personales en su posesión al titular y a la autoridad de control, para lo cual podrá valerse de estándares, mejores prácticas nacionales o internacionales, esquemas de autorregulación, sistemas de certificación o cualquier otro mecanismo que determine adecuado para tales fines.

    20.2. Lo anterior, aplicará cuando los datos personales sean tratados por parte de un encargado a nombre y por cuenta del responsable, así como al momento de realizar transferencias de datos personales.

    20.3. Entre los mecanismos que el responsable podrá adoptar para cumplir con el principio de responsabilidad se encuentran, de manera enunciativa más no limitativa, los siguientes:

    a. Destinar recursos para la instrumentación de programas y políticas de protección de datos personales.

    b. Implementar sistemas de administración de riesgos asociados al tratamiento de datos personales.

    c. Elaborar políticas y programas de protección de datos personales obligatorios y exigibles al interior de la organización del responsable.

    d. Poner en práctica un programa de capacitación y actualización del personal sobre las obligaciones en materia de protección de datos personales.

    e. Revisar periódicamente las políticas y programas de seguridad de datos personales para determinar las modificaciones que se requieran.

    f. Establecer un sistema de supervisión y vigilancia interna y/o externa, incluyendo auditorías, para comprobar el cumplimiento de las políticas de protección de datos personales.

    g. Establecer procedimientos para recibir y responder dudas y quejas de los titulares.

    20.4. El responsable revisará y evaluará permanentemente los mecanismos que para tal afecto adopte voluntariamente para cumplir con el principio de responsabilidad, con el objeto de medir su nivel de eficacia en cuanto al cumplimiento de la legislación nacional aplicable.

    21. Principio de seguridad

    21.1. El responsable establecerá y mantendrá, con independencia del tipo de tratamiento que efectúe, medidas de carácter administrativo, físico y técnico suficientes para garantizar la confidencialidad, integridad y disponibilidad de los datos personales.

    21.2. Para la determinación de las medidas referidas en el numeral anterior, el responsable considerará los siguientes factores:

    a. El riesgo para los derechos y libertades de los titulares, en particular, por el valor potencial cuantitativo y cualitativo que pudieran tener los datos personales tratados para una tercera persona no autorizada para su posesión.

    b. El estado de la técnica.

    c. Los costos de aplicación.

    d. La naturaleza de los datos personales tratados, en especial si se trata de datos personales sensibles.

    e. El alcance, contexto y las finalidades del tratamiento.

    f. Las transferencias internacionales de datos personales que se realicen o pretendan realizar.

    g. El número de titulares.

    h. Las posibles consecuencias que se derivarían de una vulneración para los titulares.

    i. Las vulneraciones previas ocurridas en el tratamiento de datos personales.

    21.3. El responsable llevará a cabo una serie de acciones que garanticen el establecimiento, implementación, operación, monitoreo, revisión, mantenimiento y mejora continua de las medidas de seguridad aplicables al tratamiento de los datos personales, de manera periódica.

    22. Notificación de vulneraciones a la seguridad de los datos personales

    22.1. Cuando el responsable tenga conocimiento de una vulneración de seguridad de datos personales ocurrida en cualquier fase del tratamiento, entendida como cualquier daño, pérdida, alteración, destrucción, acceso, y en general, cualquier uso ilícito o no autorizado de los datos personales aun cuando ocurra de manera accidental, notificará a la autoridad de control y a los titulares afectados dicho acontecimiento, sin dilación alguna.

    22.2. Lo anterior, no resultará aplicable cuando el responsable pueda demostrar, atendiendo al principio de responsabilidad proactiva, la improbabilidad de la vulneración de seguridad ocurrida, o bien, que ésta no represente un riesgo para los derechos y las libertades de los titulares involucrados.

    22.3. La notificación que realice el responsable a los titulares afectados estará redactada en un lenguaje claro y sencillo.

    22.4. La notificación a que se refieren los numerales anteriores contendrá, al menos, la siguiente información:

    a. La naturaleza del incidente.

    b. Los datos personales comprometidos.

    c. Las acciones correctivas realizadas de forma inmediata.

    d. Las recomendaciones al titular sobre las medidas que éste pueda adoptar para proteger sus intereses.

    e. Los medios disponibles al titular para obtener mayor información al respecto.

    22.5. El responsable documentará toda vulneración de seguridad de los datos personales ocurrida en cualquier fase del tratamiento, identificando, de manera enunciativa más no limitativa, la fecha en que ocurrió; el motivo de la vulneración; los hechos relacionados con ella y sus efectos y las medidas correctivas implementadas de forma inmediata y definitiva, la cual estará a disposición de la autoridad de control.

    22.6. La legislación nacional de los Estados Iberoamericanos aplicable en la materia establecerá los efectos de las notificaciones de vulneraciones de seguridad que realice el responsable a la autoridad de control, en lo que se refiere a los procedimientos, forma y condiciones de su intervención, con el propósito del salvaguardar los intereses, derechos y libertades de los titulares afectados.

    23. Principio de confidencialidad

    23.1. El responsable establecerá controles o mecanismos para que quienes intervengan en cualquier fase del tratamiento de los datos personales mantengan y respeten la confidencialidad de los mismos, obligación que subsistirá aun después de finalizar sus relaciones con el titular.

    Capítulo III. Derechos del titular

    24. Derechos ARCO

    24.1. En todo momento el titular o su representante podrán solicitar al responsable, el acceso, rectificación, cancelación, oposición y portabilidad de los datos personales que le conciernen.

    24.2. El ejercicio de cualquiera de los derechos referidos en el numeral anterior no es requisito previo, ni impide el ejercicio de otro.

    25. Derecho de acceso

    25.1. El titular tendrá el derecho de solicitar el acceso a sus datos personales que obren en posesión del responsable, así como a conocer cualquier información relacionada con las condiciones generales y específicas de su tratamiento.

    26. Derecho de rectificación

    26.1. El titular tendrá el derecho a obtener del responsable la rectificación o corrección de sus datos personales, cuando éstos resulten ser inexactos, incompletos o no se encuentren actualizados.

    27. Derecho de cancelación

    27.1. El titular tendrá derecho a solicitar la cancelación o supresión de sus datos personales de los archivos, registros, expedientes y sistemas del responsable, a fin de que los mismos ya no estén en su posesión y dejen de ser tratados por este último.

    28. Derecho de oposición

    28.1. El titular podrá oponerse al tratamiento de sus datos personales cuando:

    a. Tenga una razón legítima derivada de su situación particular.

    b. El tratamiento de sus datos personales tenga por objeto la mercadotecnia directa, incluida la elaboración de perfiles, en la medida que esté relacionada con dicha actividad.

    28.2 Tratándose del inciso anterior, cuando el titular se oponga al tratamiento con fines de mercadotecnia directa, sus datos personales dejarán de ser tratados para dichos fines.

    29. Derecho a no ser objeto de decisiones individuales automatizadas

    29.1. El titular tendrá derecho a no ser objeto de decisiones que le produzcan efectos jurídicos o le afecten de manera significativa que se basen únicamente en tratamientos automatizados destinados a evaluar, sin intervención humana, determinados aspectos personales del mismo o analizar o predecir, en particular, su rendimiento profesional, situación económica, estado de salud, preferencias sexuales, fiabilidad o comportamiento.

    29.2. Lo dispuesto en el numeral anterior no resultará aplicable cuando el tratamiento automatizado de datos personales sea necesario para la celebración o la ejecución de un contrato entre el titular y el responsable; esté autorizado por el derecho interno de los Estados Iberoamericanos, o bien, se base en el consentimiento demostrable del titular.

    29.3. No obstante, cuando sea necesario para la relación contractual o el titular hubiere manifestado su consentimiento tendrá derecho a obtener la intervención humana; recibir una explicación sobre la decisión tomada; expresar su punto de vista e impugnar la decisión.

    29.4. El responsable no podrá llevar a cabo tratamientos automatizados de datos personales que tengan como efecto la discriminación de los titulares por su origen racial o étnico; creencias o convicciones religiosas, filosóficas y morales; afiliación sindical; opiniones políticas; datos relativos a la salud, a la vida, preferencia u orientación sexual, así como datos genéticos o datos biométricos.

    30. Derecho a la portabilidad de los datos personales

    30.1. Cuando se traten datos personales por vía electrónica o medios automatizados, el titular tendrá derecho a obtener una copia de los datos personales que hubiere proporcionado al responsable o que sean objeto de tratamiento, en un formato electrónico estructurado, de uso común y lectura mecánica, que le permita seguir utilizándolos y transferirlos a otro responsable, en caso de que lo requiera.

    30.2. El titular podrá solicitar que sus datos personales se transfieran directamente de responsable a responsable cuando sea técnicamente posible.

    30.3. El derecho a la portabilidad de los datos personales no afectará negativamente a los derechos y libertades de otros.

    30.4. Sin perjuicio de otros derechos del titular, el derecho a la portabilidad de los datos personales no resultará procedente cuando se trate de información inferida, derivada, creada, generada u obtenida a partir del análisis o tratamiento efectuado por el responsable con base en los datos personales proporcionados por el titular, como es el caso de los datos personales que hubieren sido sometidos a un proceso de personalización, recomendación, categorización o creación de perfiles.

    31. Derecho a la limitación del tratamiento de los datos personales

    31.1. El titular tendrá derecho a que el tratamiento de datos personales se limite a su almacenamiento durante el periodo que medie entre una solicitud de rectificación u oposición hasta su resolución por el responsable.

    31.2. El titular tendrá derecho a la limitación del tratamiento de sus datos personales cuando éstos sean innecesarios para el responsable, pero los necesite para formular una reclamación.

    32. Ejercicio de los derechos ARCO y de portabilidad

    32.1. El responsable establecerá medios y procedimientos sencillos, expeditos, accesibles y gratuitos que permitan al titular ejercer sus derechos de acceso, rectificación, cancelación, oposición y portabilidad.

    32.2. La legislación nacional de los Estados Iberoamericanos aplicable en la materia establecerá los requerimientos, plazos, términos y condiciones en que los titulares podrán ejercer sus derechos de acceso, rectificación, cancelación, oposición y portabilidad, así como las causales de improcedencia al ejercicio de los mismos como podrían ser, de manera enunciativa más no limitativa:

    a. Cuando el tratamiento sea necesario para el cumplimiento de un objetivo importante de interés público.

    b. Cuando el tratamiento sea necesario para el ejercicio de las funciones propias de las autoridades públicas.

    c. Cuando el responsable acredite tener motivos legítimos para que el tratamiento prevalezca sobre los intereses, los derechos y las libertades del titular.

    d. Cuando el tratamiento sea necesario para el cumplimiento de una disposición legal.

    e. Cuando los datos personales sean necesarios para el mantenimiento o cumplimiento de una relación jurídica o contractual.

    32.3. La legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá reconocer que las personas físicas vinculadas a fallecidos o designados por éstos, ejerzan los derechos a que se refiere el presente estándar respecto a los datos personales de fallecidos que les conciernan.

    32.4. La legislación nacional de los Estados Iberoamericanos aplicable en la materia reconocerá el derecho que tiene el titular de inconformarse o impugnar las respuestas otorgadas por el responsable ante una solicitud de ejercicio de los derechos aludidos en el presente numeral, o ante la falta de respuesta de éste ante la autoridad de control y, en su caso, ante instancias judiciales de conformidad con el derecho interno de cada Estado Iberoamericano.

    Capítulo IV. Encargado

    33. Alcance del encargado

    33.1. El encargado realizará las actividades de tratamiento de los datos personales sin ostentar poder alguno de decisión sobre el alcance y contenido del mismo, así como limitará sus actuaciones a los términos fijados por el responsable.

    34. Formalización de la prestación de servicios del encargado

    34.1. La prestación de servicios entre el responsable y encargado se formalizará mediante la suscripción de un contrato o cualquier otro instrumento jurídico que consideren los Estados Iberoamericanos en la legislación nacional aplicable en la materia.

    34.2. El contrato o instrumento jurídico establecerá, al menos, el objeto, alcance, contenido, duración, naturaleza y finalidad del tratamiento; el tipo de datos personales; las categorías de titulares, así como las obligaciones y responsabilidades del responsable y encargado.

    34.3. El contrato o instrumento jurídico establecerá, al menos, las siguientes cláusulas generales relacionadas con los servicios que preste el encargado:

    a. Realizar el tratamiento de los datos personales conforme a las instrucciones del responsable.

    b. Abstenerse de tratar los datos personales para finalidades distintas a las instruidas por el responsable.

    c. Implementar las medidas de seguridad conforme a los instrumentos jurídicos aplicables.

    d. Informar al responsable cuando ocurra una vulneración a los datos personales que trata por sus instrucciones.

    e. Guardar confidencialidad respecto de los datos personales tratados.

    f. Suprimir, devolver o comunicar a un nuevo encargado designado por el responsable los datos personales objeto de tratamiento, una vez cumplida la relación jurídica con el responsable o por instrucciones de éste, excepto que una disposición legal exija la conservación de los datos personales, o bien, que el responsable autorice la comunicación de éstos a otro encargado.

    g. Abstenerse de transferir los datos personales, salvo en el caso de que el responsable así lo determine, o la comunicación derive de una subcontratación, o por mandato expreso de la autoridad de control.

    h. Permitir al responsable o autoridad de control inspecciones y verificaciones en sitio.

    i. Generar, actualizar y conservar la documentación que sea necesaria y que le permita acreditar sus obligaciones.

    j. Colaborar con el responsable en todo lo relativo al cumplimiento de la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    34.4. Cuando el encargado incumpla las instrucciones del responsable y decida por sí mismo sobre el alcance, contenido, medios y demás cuestiones del tratamiento de los datos personales asumirá la calidad de responsable, conforme a la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    35. Subcontratación de servicios

    35.1. El encargado podrá, a su vez, subcontratar servicios que impliquen el tratamiento de datos personales, siempre y cuando exista una autorización previa por escrito, específica o general del responsable, o bien, se estipule expresamente en el contrato o instrumento jurídico suscrito entre este último y el encargado.

    35.2. El subcontratado asumirá el carácter de encargado en los términos que estipulen la legislación nacional del Estado Iberoamericano aplicable en la materia.

    35.3. El encargado formalizará la prestación de servicios del subcontratado a través de un contrato o cualquier otro instrumento jurídico que determine la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    35.4. Cuando el subcontratado incumpla sus obligaciones y responsabilidades respecto al tratamiento de datos personales que lleve a cabo conforme a lo instruido por el encargado, asumirá la calidad de responsable conforme a la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    Capítulo V. Transferencias internacionales de datos personales

    36. Reglas generales para las transferencias de datos personales

    36.1. El responsable y encargado podrán realizar transferencias internacionales de datos personales en cualquiera de los siguientes supuestos:

    a. El país, parte de su territorio, sector, actividad u organización internacional destinatario de los datos personales hubiere sido reconocido con un nivel adecuado de protección de datos personales por parte del país transferente, conforme a la legislación nacional de éste que resulte aplicable en la materia, o bien, el país destinatario o varios sectores del mismo acrediten condiciones mínimas y suficientes para garantizar un nivel de protección de datos personales adecuado.

    b. El exportador ofrezca garantías suficientes del tratamiento de los datos personales en el país destinatario, y éste, a su vez, acredite el cumplimiento de las condiciones mínimas y suficientes establecidas en la legislación nacional de cada Estado Iberoamericano aplicable en la materia.

    c. El exportador y destinatario suscriban cláusulas contractuales o cualquier otro instrumento jurídico que ofrezca garantías suficientes y que permita demostrar el alcance del tratamiento de los datos personales, las obligaciones y responsabilidades asumidas por las partes y los derechos de los titulares. La autoridad de control podrá validar cláusulas contractuales o instrumentos jurídicos según se determine en la legislación nacional de los Estados Iberoamericanos aplicable en la materia.

    d. El exportador y destinatario adopten un esquema de autorregulación vinculante o un mecanismo de certificación aprobado, siempre y cuando éste sea acorde con las disposiciones previstas en la legislación nacional del Estado Iberoamericano aplicable en la materia, que está obligado a observar el exportador.

    e. La autoridad de control del Estado Iberoamericano del país del exportador autorice la transferencia, en términos de la legislación  nacional que resulte aplicable en la materia.

    36.2. La legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá establecer expresamente límites a las transferencias internacionales de categorías de datos personales por razones de seguridad nacional, seguridad pública, protección de la salud

    pública, protección de los derechos y libertades de terceros, así como por cuestiones de interés público.

    Capítulo VI. Medidas proactivas en el tratamiento de datos personales

    37. Reconocimiento de medidas proactivas

    37.1. La legislación nacional de los Estados Iberoamericanos aplicable en la materia podrá reconocer y establecer medidas que promuevan el mejor cumplimiento de su legislación y coadyuven a fortalecer y elevar los controles de protección de datos personales implementados por el responsable, entre las cuales podrán encontrase las que a continuación se indican en el presente Capítulo.

    38. Privacidad por diseño y privacidad por defecto

    38.1. El responsable aplicará, desde el diseño, en la determinación de los medios del tratamiento de los datos personales, durante el mismo y antes de recabar los datos personales, medidas preventivas de diversa naturaleza que permitan aplicar de forma efectiva los principios, derechos y demás obligaciones previstas en la legislación nacional del Estado Iberoamericano que le resulte aplicable.

    38.2. El responsable garantizará que sus programas, servicios, sistemas o plataformas informáticas, aplicaciones electrónicas o cualquier otra tecnología que impliquen un tratamiento de datos personales, cumplan por defecto o se ajusten a los principios, derechos y demás obligaciones previstas en la legislación nacional del Estado Iberoamericano que le resulte aplicable. Específicamente, con el fin de que únicamente sean objeto de tratamiento el mínimo de datos personales y se limite la accesibilidad de éstos, sin la intervención del titular, a un número indeterminado de personas.

    39. Oficial de protección de datos personales

    39.1. El responsable designará a un oficial de protección de datos personales o figura equivalente en los casos que establezca la legislación nacional de los Estados Iberoamericanos aplicable en la materia y cuando:

    a. Sea una autoridad pública.

    b. Lleve a cabo tratamientos de datos personales que tengan por objeto una observación habitual y sistemática de la conducta del titular.

    c. Realice tratamientos de datos personales donde sea probable que entrañe un alto riesgo de afectación del derecho a la protección de datos personales de los titulares, considerando, entre otros factores y de manera enunciativa más no limitativa, las categorías de datos personales tratados, en especial cuando se trate de datos sensibles; las transferencias que se efectúen; el número de titulares; el alcance del tratamiento; las tecnologías de información utilizadas o las finalidades de éstos.

    39.2. El responsable que no se encuentre en alguna de las causales previstas en el numeral anterior, podrá designar a un oficial de protección de datos personales si así lo estima conveniente.

    39.3. El responsable estará obligado a respaldar al oficial de protección de datos personales en el desempeño de sus funciones, facilitándole los recursos necesarios para su desempeño y para el mantenimiento de sus conocimientos especializados y la actualización de éstos.

    39.4. El oficial de protección de datos personales tendrá, al menos, las siguientes funciones:

    a. Asesorar al responsable respecto a los temas que sean sometidos a su consideración en materia de protección de datos personales.

    b. Coordinar, al interior de la organización del responsable, las políticas, programas, acciones y demás actividades que correspondan para el cumplimiento de la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    c. Supervisar al interior de la organización del responsable el cumplimiento de la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    40. Mecanismos de autorregulación

    40.1. El responsable podrá adherirse, de manera voluntaria, a esquemas de autorregulación vinculante, que tengan por objeto, entre otros, contribuir a la correcta aplicación de la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia y establecer procedimientos de resolución de conflictos entre el responsable y titular sin perjuicio de otros mecanismos que establezca la legislación nacional de la materia aplicable, teniendo en cuenta las características específicas de los tratamientos de datos personales realizados, así como el efectivo ejercicio y respeto de los derechos del titular.

    40.2. Para los efectos del numeral anterior, se podrán desarrollar, entre otros, códigos deontológicos y sistemas de certificación y sus respectivos sellos de confianza que coadyuven a contribuir a los objetivos señalados en el presente numeral.

    40.3. La legislación nacional de los Estados Iberoamericanos aplicable en la materia establecerá las reglas que correspondan para la validación, confirmación o reconocimiento de los mecanismos de autorregulación aludidos.

    41. Evaluación de impacto a la protección de datos personales

    41.1. Cuando el responsable pretenda llevar a cabo un tipo de tratamiento de datos personales que, por su naturaleza, alcance, contexto o finalidades, sea probable que entrañe un alto riesgo de afectación del derecho a la protección de datos personales de los titulares, realizará, de manera previa, a la implementación del mismo una evaluación del impacto a la protección de los datos personales.

    41.2. La legislación nacional de los Estados Iberoamericanos que resulte aplicable en la materia señalará los tratamientos que requieran de una evaluación de impacto a la protección de datos personales; el contenido de éstas, los supuestos en que resulte procedente presentar el resultado ante la autoridad de control, así como los requerimientos de dicha presentación, entre otras cuestiones.

    Capítulo VII. Autoridades de control

    42. Naturaleza de las autoridades de control y supervisión

    42.1. En cada Estado Iberoamericano deberá existir una o más autoridades de control en materia de protección de datos personales con plena autonomía, de conformidad con su legislación nacional aplicable en la materia.

    42.2 Las autoridades de control podrán ser órganos unipersonales o pluripersonales; actuarán con carácter imparcial e independiente en sus potestades, así como serán ajenas a toda influencia externa, ya sea directa o indirecta, y no solicitarán ni admitirán orden ni instrucción alguna.

    42.3. El miembro o los miembros de los órganos de dirección de las autoridades de control deberán contar con la experiencia y aptitudes, en particular respecto al ámbito de protección de datos personales, necesarios para el cumplimiento de sus funciones y el ejercicio de sus potestades. Se nombrarán mediante un procedimiento transparente en virtud de la legislación nacional aplicable y únicamente podrán ser removidos por causales graves establecidas en el derecho interno de cada Estado Iberoamericano, conforme a las reglas del debido proceso.

    42.4. La legislación nacional de los Estados Iberoamericanos que resulte aplicable en la materia deberá otorgar a las autoridades de control suficientes poderes de investigación, supervisión, resolución, promoción, sanción y otros que resulten necesarios para garantizar el efectivo cumplimiento de ésta, así como el ejercicio y respeto efectivo del derecho a la protección de datos personales.

    42.5. Las decisiones de las autoridades de control únicamente estarán sujetas al control jurisdiccional, conforme a los mecanismos establecidos en la legislación nacional de los Estados Iberoamericanos que resulte aplicable en la materia y su derecho interno.

    42.6. Las autoridades de control deberán contar con los recursos humanos y materiales necesarios para el cumplimiento de sus funciones.

    Capítulo VIII. Reclamaciones y Sanciones

    43. Régimen de reclamaciones y de imposición de sanciones

    43.1. Todo titular tendrá derecho a presentar su reclamación ante la autoridad de control, así como recurrir a la tutela judicial para hacer efectivos sus derechos conforme a la legislación nacional del Estado Iberoamericano que resulte aplicable en la materia.

    43.2. La legislación nacional de los Estados Iberoamericanos aplicable en la materia establecerá un régimen que permita al titular presentar una reclamación ante la autoridad de control cuando considere que el tratamiento de sus datos personales infringe la normativa nacional en la materia, así como a solicitar la tutela judicial.

    43.3. La legislación nacional de los Estados Iberoamericanos aplicable en la materia establecerá un régimen que permita la adopción de medidas correctivas y sancionar las conductas que contravengan lo dispuesto en las legislaciones nacionales correspondientes, indicando, al menos, el límite máximo y los criterios objetivos para fijar las correspondientes sanciones, a partir de la naturaleza, gravedad, duración de la infracción y sus consecuencias, así como las medidas implementadas por el responsable para garantizar el cumplimiento de sus obligaciones en la materia.

    Capítulo IX. Derecho de indemnización

    44. Reparación del daño

    44.1. La legislación nacional de los Estados Iberoamericanos aplicable en la materia reconocerá el derecho que tiene el titular a ser indemnizado cuando hubiere sufrido daños y perjuicios, como consecuencia de una violación de su derecho a la protección de datos personales.

    44.2. El derecho interno de los Estados Iberoamericanos señalará la autoridad competente para conocer de este tipo de acciones interpuestas por el titular afectado, así como los plazos, requerimientos y términos a través de los cuales será indemnizado éste, en caso de resultar procedente.

    Capítulo X. Cooperación internacional

    45. Establecimiento de mecanismos de cooperación internacional

    45.1. Los Estados Iberoamericanos podrán adoptar mecanismos de cooperación internacional que faciliten la aplicación de las legislaciones nacionales aplicables en la materia, los cuales podrán comprender, de manera enunciativa más no limitativa:

    a. El establecimiento de mecanismos que permitan reforzar la asistencia y cooperación internacional en la aplicación de las respectivas legislaciones nacionales en la materia.

    b. La asistencia entre las autoridades de control a través de la notificación y remisión de reclamaciones, la asistencia en investigaciones y el intercambio de información.

    c. La adopción de mecanismos orientados al conocimiento e intercambio de mejores prácticas y experiencias en materia de protección de datos personales, inclusive en materia de conflictos de jurisdicción con terceros países.

    24Abr/21

    Informe del Comité Jurídico Interamericano (CJI) OEA/Ser. Q. CJI/doc. 638/21 de 8 de abril de 2021

    Informe del Comité Jurídico Interamericano (CJI) OEA/Ser. Q. CJI/doc. 638/21 de 8 de abril de 2021. Principios actualizados del Comité Jurídico Interamericano sobre la privacidad y la protección de Datos Personales, con anotaciones. 98º Periodo  Ordinario de Sesiones, 5-9 de abril. Sesión Virtual.

    98º PERÍODO ORDINARIO DE SESIONES OEA/Ser. Q

    5 – 9 abril de 2021 CJI/doc. 638/21

    Sesión virtual 8 abril 2021

    INFORME DEL COMITÉ JURÍDICO INTERAMERICANO (CJI)

    PRINCIPIOS ACTUALIZADOS DEL COMITÉ JURÍDICO INTERAMERICANO SOBRE LA PRIVACIDAD Y LA PROTECCIÓN DE DATOS PERSONALES, CON ANOTACIONES

    I. LOS PRINCIPIOS

    PRINCIPIO UNO. Finalidades Legítimas y Lealtad

    Los datos personales deberían ser recopilados solamente para finalidades legítimas y por medios leales y legítimos.

    PRINCIPIO DOS. Transparencia y Consentimiento

    Antes o en el momento en que se recopilen, se deberían especificar la identidad y datos de contacto del responsable de los datos, las finalidades específicas para las cuales se tratarán los datos personales, el fundamento jurídico que legitima su tratamiento, los destinatarios o categorías de destinatarios a los cuales los datos personales les serán comunicados, así como la información a ser transmitida y los derechos del titular en relación con los datos personales a ser recopilados. Cuando el tratamiento se base en el consentimiento, los datos personales solamente deberían ser recopilados con el consentimiento previo, inequívoco, libre e informado de la persona a que se refieran.

    PRINCIPIO TRES. Pertinencia y Necesidad

    Los datos personales deberían ser únicamente los que resulten adecuados, pertinentes, y limitados al mínimo necesario para las finalidades específicas de su recopilación y tratamiento ulterior.

    PRINCIPIO CUATRO. Tratamiento y Conservación Limitados

    Los datos personales deberían ser tratados y conservados solamente de manera legítima no incompatible con las finalidades para las cuales se recopilaron. Su conservación no debería exceder del tiempo necesario para cumplir dichas finalidades y de conformidad con la legislación nacional correspondiente.

    PRINCIPIO CINCO. Confidencialidad

    Los datos personales no deberían divulgarse, ponerse a disposición de terceros, ni emplearse para otras finalidades que no sean aquellas para las cuales se recopilaron, excepto con el consentimiento de la persona en cuestión o bajo autoridad de la ley.

    PRINCIPIO SEIS. Seguridad de los Datos

    La confidencialidad, integridad y disponibilidad de los datos personales deberían ser protegidas mediante salvaguardias de seguridad técnicas, administrativas u organizacionales razonables y adecuadas contra tratamientos no autorizados o ilegítimos, incluyendo el acceso, pérdida, destrucción, daños o divulgación, aún cuando éstos ocurran de manera accidental. Dichas salvaguardias deberían ser objeto de auditoría y actualización permanente.

    PRINCIPIO SIETE. Exactitud de los Datos

    Los datos personales deberían mantenerse exactos, completos y actualizados hasta donde sea necesario para las finalidades de su tratamiento, de tal manera que no se altere su veracidad.

    PRINCIPIO OCHO. Acceso, Rectificación, Cancelación, Oposición y Portabilidad

    Se debería disponer de métodos razonables, ágiles, sencillos y eficaces para permitir que aquellas personas cuyos datos personales han sido recopilados puedan solicitar el acceso, rectificación y cancelación de sus datos, así como el derecho a oponerse a su tratamiento y, en lo aplicable, el derecho a la portabilidad de esos datos personales. Como regla general, el ejercicio de esos derechos debería ser gratuito. En caso de que fuera necesario restringir los alcances de estos derechos, las bases específicas de cualquier restricción deberían especificarse en la legislación nacional y estar en conformidad con los estándares internacionales aplicables.

    PRINCIPIO NUEVE. Datos Personales Sensibles

    Algunos tipos de datos personales, teniendo en cuenta su sensibilidad en contextos particulares, son especialmente susceptibles de causar daños considerables a las personas si se hace mal uso de ellos. Las categorías de estos datos y el alcance de su protección deberían indicarse claramente en la legislación y normativas nacionales. Los responsables de los datos deberían adoptar medidas de privacidad y de seguridad reforzadas que sean acordes con la sensibilidad de los datos y su capacidad de hacer daño a los titulares de los datos.

    PRINCIPIO DIEZ. Responsabilidad

    Los responsables y encargados del tratamiento de datos deberían adoptar e implementar medidas técnicas y organizacionales que sean apropiadas y efectivas para asegurar y poder demostrar que el tratamiento se realiza en conformidad con estos Principios. Dichas medidas deberían ser auditadas y actualizadas periódicamente. El responsable o encargado del tratamiento y, en lo aplicable, sus representantes, deberían cooperar, a petición, con las autoridades de protección de datos personales en el ejercicio de sus tareas.

    PRINCIPIO ONCE. Flujo Transfronterizo de Datos y Responsabilidad

    Reconociendo su valor para el desarrollo económico y social, los Estados Miembros deberían cooperar entre sí para facilitar el flujo transfronterizo de datos personales a otros Estados cuando éstos confieran un nivel adecuado de protección de los datos de conformidad con estos Principios.

    Asimismo, los Estados Miembros deberían cooperar en la creación de mecanismos y procedimientos que aseguren que los responsables y encargados del tratamiento de datos que operen en más de una jurisdicción, o los transmitan a una jurisdicción distinta de la suya, puedan garantizar y ser efectivamente hechos responsables por el cumplimiento de estos Principios.

    PRINCIPIO DOCE. Excepciones

    Cualquier excepción a alguno de estos Principios debería estar prevista de manera expresa y específica en la legislación nacional, ser puesta en conocimiento del público y limitarse únicamente a motivos relacionados con la soberanía nacional, la seguridad nacional, la seguridad pública, la protección de la salud pública, el combate a la criminalidad, el cumplimiento de normativas u otras prerrogativas de orden público, o el interés público.

    PRINCIPIO TRECE. Autoridades De Protección De Datos

    Los Estados Miembros deberían establecer órganos de supervisión independientes, dotados de recursos suficientes, de conformidad con la estructura constitucional, organizacional y administrativa de cada Estado, para monitorear y promover la protección de datos personales de conformidad con estos Principios. Los Estados Miembros deberían promover la cooperación entre tales órganos.

    II. LAS ANOTACIONES

    Introducción

    La finalidad de actualizar los Principios sobre la Privacidad y la Protección de Datos Personales (con anotaciones)” adoptados por el Comité Jurídico Interamericano (CJI) en 2015 es contribuir al desarrollo de un marco vigente para salvaguardar los derechos de la persona a la protección de sus Datos Personales y a la autodeterminación en lo que respecta a la información en los países de las Américas. Esta actualización de los Principios se basa en normas y estándares reconocidos a nivel internacional, según han evolucionado hasta el año 2020. Su intención es proteger a las personas de la recopilación, el uso, la retención y la divulgación ilícitos o innecesarios de Datos Personales.

    La siguiente explicación detallada de los Principios tiene por objeto proporcionar una guía para orientar la reflexión al interior de cada Estado Miembro de la OEA sobre el estado que guarda su normativa en la materia, así como, en su caso, los esfuerzos de fortalecimiento de la misma.

    Cada Estado Miembro debería determinar cuál es la mejor manera de tomar en cuenta estos Principios en su ordenamiento jurídico interno. Sea por medio de leyes, normas u otros mecanismos, los Estados Miembros deberían establecer reglas efectivas para la protección de Datos Personales que den efecto al derecho de la persona a la privacidad y que respeten sus Datos Personales, protegiendo al mismo tiempo que la persona pueda beneficiarse del libre flujo de información y del acceso a la economía digital.

    La finalidad de estos Principios es proporcionar los elementos básicos de una protección efectiva. Los Estados podrían ofrecer mecanismos adicionales para garantizar la privacidad y la protección de los Datos Personales, teniendo en cuenta las funciones y las finalidades legítimas para su Tratamiento en beneficio de las personas. En general, los Principios reflejan la importancia de la efectividad, la razonabilidad, la proporcionalidad y la flexibilidad como elementos rectores.

    Ámbito de aplicación

    Estos Principios se aplican tanto a los sectores público como privado, es decir, tanto a los Datos Personales generados, recopilados o administrados por entidades públicas como a los Datos recopilados y tratados por entidades privadas (1). Se aplican a los Datos Personales que se encuentren en cualquier soporte físico o digital.

    Los Principios no se aplican a los Datos Personales utilizados por una persona exclusivamente en el contexto de su vida privada, familiar o doméstica. Tampoco se aplican a la información anónima, es decir, aquella que no guarde relación con una persona física identificada o identificable, así como a los Datos Personales que han sido seudonimizados o sujetos a un proceso de Anonimización de tal forma que el Titular no pueda ser identificado o reidentificado (cf. definición de “Anonimización”, infra).

    Los Principios están relacionados entre sí y deberían interpretarse en conjunto, con una perspectiva transversal de género y de derechos humanos que identifique los impactos diferenciados del Tratamiento de Datos y los haga visibles para que tanto los Responsables como los Encargados de los Datos Personales puedan tomar las medidas necesarias para mitigar estas disparidades e impedir que el Tratamiento menoscabe la dignidad y la privacidad de las personas que enfrentan situaciones de especial vulnerabilidad.

    El concepto de privacidad

    El concepto de privacidad está consagrado en el derecho internacional. Se basa en los conceptos fundamentales del honor personal y la dignidad, así como en la libertad de expresión, pensamiento, opinión y asociación, reconocidos por los principales sistemas de derechos humanos del mundo.

    En las Américas, estos conceptos están claramente establecidos en el artículo V de la Declaración Americana de los Derechos y Deberes del Hombre (1948) y en los artículos 11 y 13 de la Convención Americana sobre Derechos Humanos (“Pacto de San José”) (1969) (apéndice A) y en la Convención Interamericana para Prevenir, Sancionar y Erradicar la Violencia contra la Mujer (“Convención de Belém do Pará”) (1994). Asimismo, la Corte Interamericana de Derechos Humanos ha confirmado el derecho a la privacidad (2).

    Además, la constitución y las leyes fundamentales de muchos Estados Miembros de la OEA garantizan el respeto y la protección de Datos Personales como un derecho distinto y complementario a los derechos a la privacidad, la dignidad personal y el honor familiar, la inviolabilidad del hogar y las comunicaciones privadas y conceptos conexos. Casi todos los Estados Miembros de la OEA han adoptado algún tipo de legislación con respecto a la protección de la privacidad y los Datos Personales (aunque sus disposiciones varían en lo que se refiere a su enfoque, ámbito de aplicación y contenido).

    En consonancia con estos derechos fundamentales, los Principios de la OEA reflejan los conceptos de autodeterminación en lo que respecta a la información, la ausencia de restricciones arbitrarias del acceso a los datos, y la protección de la privacidad, la identidad, la dignidad y la reputación.

    Al mismo tiempo, tal como se reconoce en todos los ordenamientos jurídicos, el derecho a la privacidad no es absoluto y puede tener limitaciones razonables relacionadas con la tutela de otros derechos fundamentales, tales como la libertad de expresión y el acceso a la información pública o con el interés público.

    El concepto del libre flujo de información

    Los principios fundamentales de la libertad de expresión y de asociación y el libre flujo de información se reconocen en los principales sistemas de derechos humanos del mundo, entre ellos el sistema de la OEA; por ejemplo, en el artículo IV de la Declaración Americana de los Derechos y Deberes del Hombre (1948) y en el artículo 13 de la Convención Americana (Anexo A). Estos derechos civiles y políticos esenciales se reflejan en las Américas en la constitución y las leyes fundamentales de todos los Estados Miembros de la OEA (aunque cabe reiterar que sus disposiciones varían en cuanto a su enfoque, ámbito de aplicación y contenido). Son cruciales para la promoción de la democracia y las instituciones democráticas.

    En la región de las Américas, el acceso a la información pública y de manera especial el acceso a la digitalidad se ha caracterizado por la desigualdad y una brecha digital ampliamente documentada, entre otros en virtud de género. En una “sociedad de la información” centrada en la persona y orientada al desarrollo, la protección del derecho de las personas a tener acceso a información y conocimientos, a usarlos y a difundirlos puede ayudar a las personas, a las comunidades y a los pueblos a alcanzar su pleno potencial, promover el desarrollo sostenible y mejorar la calidad de vida en general, de acuerdo con los propósitos y principios de la Carta de la OEA y con nuestros instrumentos regionales de derechos humanos.

    Definiciones

    Anonimización.

    Tal como se usa en estos Principios, la palabra “Anonimización” se refiere a la aplicación de medidas de cualquier naturaleza dirigidas a impedir la identificación o reidentificación de una persona física sin esfuerzos desproporcionados.

    Autoridad Responsable de la Protección de Datos.

    Como se utiliza en estos Principios, el término “Autoridad Responsable de la Protección de Datos” se refiere a las autoridades supervisoras establecidas en los Estados Miembros, que tienen la facultad de redactar e implementar las leyes, reglamentos y requisitos relacionados con la protección de Datos Personales, sea a nivel nacional, regional o municipal y de conformidad con la estructura constitucional, organizacional y administrativa de cada Estado.

    Datos Personales.

    Tal como se usa en estos Principios, el término “Datos Personales” abarca la información que identifica o puede usarse de manera razonable para identificar a una persona física de forma directa o indirecta, especialmente por referencia a un número de identificación, datos de localización, un identificador en línea o a uno o más factores referidos específicamente a su identidad física, fisiológica, genética, mental, económica, cultural o social. Incluye información expresada en forma numérica, alfabética, gráfica, fotográfica, alfanumérica, acústica, electrónica, visual o de cualquier otro tipo. La frase no abarca la información que no identifica a una persona en particular (o no puede usarse de manera razonable para identificarla).

    En los Principios, la palabra “Datos” se usa intencionalmente en un sentido amplio a fin de conferir la protección más amplia posible a los derechos de las personas afectadas, independientemente de la forma particular en que se recopilen, se almacenen, se recuperen, se usen o se difundan los datos.

    En general, en los Principios se evita el uso de la frase “información personal”, la cual, por sí sola, podría interpretarse en el sentido de que no incluye “datos” específicos tales como elementos fácticos, “bits” almacenados electrónicamente o registros digitales. Análogamente, la palabra “datos” podría interpretarse en el sentido de que no incluye compilaciones de hechos que, tomados en conjunto, permitan sacar conclusiones sobre la persona o las personas en particular. Por ejemplo, los detalles relativos a la estatura, el peso, el color del cabello y la fecha de nacimiento de dos personas podrían constituir “datos” que, al compararlos, revelen la “información” de que son hermano y hermana o tal vez gemelos idénticos. A fin de promover la mayor protección posible de la privacidad, estos Principios se aplicarían en ambos casos y no permitirían que un Responsable de Datos efectuara distinciones de ese tipo.

    Ejemplos de Datos Personales incluyen identificadores como el nombre real, alias, dirección postal, identificador personal único, identificador en línea, dirección de protocolo de internet, dirección de correo electrónico, nombre de cuenta, número de seguridad social, número de licencia de conducir, número de pasaporte u otros identificadores similares, o información comercial, información biométrica, información de internet u otra actividad de redes electrónicas (como historial de navegación, historial de búsqueda e información sobre la interacción de un Titular con un sitio web, aplicación o anuncio, datos de geolocalización, información de audio, electrónica, visual, termal, olfatoria u otra similar, información profesional o relacionada al trabajo, información educativa e inferencias derivadas de lo anterior para crear un perfil de las preferencias, características, tendencias  psicológicas, predisposiciones, comportamiento, actitudes, inteligencia, habilidades y aptitudes del Titular de datos, entre otras.

    A efectos de estos Principios, solo la gente (personas físicas en lo individual o agrupadas en una persona jurídica) tiene intereses en materia de privacidad, a diferencia de los dispositivos, las computadoras o los sistemas mediante los cuales interaccionan. Tampoco tienen intereses en materia de privacidad las organizaciones u otras personas jurídicas con las que tratan. Los menores (personas que no han llegado a la edad adulta) también tienen derechos e intereses legítimos en materia de privacidad que deberían reconocerse y protegerse efectivamente en la legislación nacional.

    Datos Personales Sensibles.

    El término “Datos Personales Sensibles” se refiere a una categoría más estrecha que abarca los datos que afectan a los aspectos más íntimos de las personas físicas. Según el contexto cultural, social o político, esta categoría podría abarcar, por ejemplo, datos relacionados con la salud personal, las preferencias sexuales o vida sexual, las creencias religiosas, filosóficas o morales, la afiliación sindical, los datos genéticos, los datos biométricos dirigidos a identificar de manera unívoca a una persona física, las opiniones políticas o el origen racial o étnico, información sobre cuentas bancarias, documentos oficiales, información recopilada de niños y niñas o geolocalización personal. En ciertas circunstancias podría considerarse que estos datos merecen protección especial porque, si se manejan o divulgan de manera indebida, podrían conducir a graves perjuicios para la persona o a discriminación ilegítima o arbitraria.

    En los Principios se reconoce que la sensibilidad de los Datos Personales puede variar según la cultura y cambiar con el tiempo y que los riesgos de ocasionar daños reales a una persona como consecuencia de la divulgación de Datos podrían ser insignificantes en una situación en particular, pero podrían poner en peligro la vida en otra.

    Encargado de los Datos.

    Tal como se usa en estos Principios, el término “encargado de los datos” se refiere a la persona física o jurídica, entidad privada o autoridad pública, ajena a la organización del Responsable de los Datos, que presta sus servicios para llevar a cabo el Tratamiento de Datos Personales.

    Responsable de los Datos.

    Tal como se usan en estos Principios, el término “Responsable de los Datos” se refiere a la persona física o jurídica, entidad privada, autoridad pública u otro organismo u organización o servicio que (solo o junto con otros) se encarga del Tratamiento y la protección de los Datos Personales en cuestión. Tales personas determinan el contenido, las finalidades y el uso de los Datos Personales.

    Titular de los Datos.

    Tal como se utiliza en estos Principio, este término se refiere a la persona cuyos Datos Personales se recopilan, procesan, almacenan, utilizan o difunden.

    Tratamiento de Datos.

    En estos Principios, el término “Tratamiento de Datos” se usa en un sentido amplio y abarca toda operación o conjunto de operaciones realizado con Datos Personales, incluyendo, de manera enunciativa más no limitativa, la recopilación, acceso, organización, adaptación, indexación, aprovechamiento, registro, almacenamiento, alteración, recuperación, divulgación o transferencia.

    Principios Actualizados Anotados

    PRINCIPIO UNO: FINALIDADES LEGÍTIMAS Y LEALTAD

    Los datos personales deberían ser recopilados solamente para finalidades legítimas y por medios leales y legítimos

    Este Principio abarca dos elementos:

    1) las “finalidades legítimas” para las cuales se recopilan inicialmente los datos personales y

    2) los “medios leales y legítimos” con los cuales se efectúa la recopilación inicial.

    La premisa es que muchas o incluso la mayoría de las intrusiones en los derechos de las personas pueden evitarse si se respetan los conceptos conexos de legitimidad y lealtad desde el comienzo, cuando se recopilan inicialmente los Datos. Desde luego, estos Principios se aplican y deberían respetarse en todas las etapas del Tratamiento (a saber, el proceso de recopilación, compilación, almacenamiento, utilización, divulgación y eliminación de Datos Personales), no solo en el momento de su recopilación. Sin embargo, es más probable que se cumplan y se respeten si se recalcan y se respetan desde el comienzo.

    Finalidades Legítimas

    El requisito de legitimidad en las finalidades para las cuales se tratan los Datos Personales es una norma fundamental, profundamente arraigada en valores democráticos básicos y en el estado de derecho. En principio, la recopilación de Datos Personales debería ser limitada y realizarse con el conocimiento o el consentimiento de la persona. No deberían recopilarse Datos sobre personas excepto en las situaciones y con los métodos permitidos o autorizados por ley y (por lo general) deberían darse a conocer a las personas afectadas en el momento en que se recopilen.

    Los Estados Miembros deberían, por lo tanto, incluir en sus legislaciones nacionales disposiciones específicas sobre las finalidades legítimas del Tratamiento de Datos Personales. Como regla general, éstos podrían incluir casos en los que:

    (a) el Titular de los Datos otorgue su consentimiento expreso para el Tratamiento de sus Datos Personales para una o varias finalidades específicas;

    (b) el Tratamiento sea necesario para la ejecución de un contrato en el que el interesado es parte o para la aplicación a petición de éste de medidas precontractuales;

    (c) el Tratamiento sea necesario para el cumplimiento de una obligación legal aplicable al Responsable de datos;

    (d) el Tratamiento sea necesario para proteger intereses vitales del Titular o de otra persona;

    (e) el Tratamiento sea necesario para el cumplimiento de una misión realizada en interés público o en ejercicio de poderes públicos conferidos al Responsable de Datos;

    (f) el Tratamiento sea necesario para la satisfacción de intereses legítimos perseguidos por el Responsable de Datos;

    (g) el Tratamiento sea necesario para el cumplimiento de una orden judicial, resolución o mandato fundado y motivado de autoridad pública competente; y

    (h) el Tratamiento sea necesario para el reconocimiento o defensa de los derechos del Titular ante una autoridad pública.

    El requisito de legitimidad abarca el concepto de legalidad y excluye el Tratamiento arbitrario y caprichoso de Datos Personales. Implica transparencia y una estructura jurídica a la cual pueda tener acceso la persona cuyos Datos estén recopilándose.

    En la mayoría de los contextos se puede cumplir el requisito de legitimidad si el recopilador o Encargado de los Datos informa al Titular sobre las bases jurídicas de la solicitud de los Datos en el momento de su recopilación (por ejemplo, “se solicita su número de identificación personal de conformidad con la Ley de Registro Nacional de 2004” o “la Directiva 33-25 del Ministerio de Economía”).

    En otros casos podría necesitarse una explicación diferente, como “se requiere esta información para garantizar que el reembolso se envíe a la dirección correcta del reclamante”. En tales casos, se deberían indicar claramente las finalidades para las cuales se recopilan los datos, a fin de que la persona pueda entender cómo se recopilarán, usarán o divulgarán los datos.

    Medios leales y legítimos

    El Principio Uno también requiere que los medios que se empleen para recopilar Datos Personales sean “leales y legítimos”. Los Datos Personales se recopilan por medios leales y legítimos cuando la recopilación es compatible tanto con los requisitos legales aplicables como con las expectativas razonables de las personas basadas en su relación con el Responsable de Datos o con otra entidad que recopile los Datos y en el aviso o los avisos dados a las personas en el momento en que se recopilen sus Datos.

    Este Principio excluye la obtención de Datos Personales por medio de fraude, engaño o con pretextos falsos. Se infringiría, por ejemplo, si una organización se hiciera pasar por otra en llamadas de tele marketing, avisos publicitarios impresos o mensajes por correo electrónico a fin de engañar a los Titulares e inducirles a dar el número de su tarjeta de crédito, información sobre cuentas bancarias u otros tipos de información personal sensible.

    La “lealtad” es contextual y depende de las circunstancias. Requiere, entre otras cosas, que se ofrezcan opciones apropiadas a las personas con respecto a la forma y el momento en que vayan a proporcionar sus Datos Personales a los Responsables de los Datos en los casos en que no sea razonable prever que puedan recopilarse en vista de la relación de las personas con el recopilador o Encargado de Datos, y del aviso o los avisos que hayan recibido en el momento en que se recopilaron sus Datos. Las opciones que se ofrezcan a las personas no deberían interferir en las actividades y en la obligación de los Responsables de Datos de promover la seguridad externa e interna y el cumplimiento de la normativa ni impedir que empleen prácticas comúnmente aceptadas para la recopilación y utilización de Datos Personales.

    Al aplicar estos Principios, los Estados Miembros podrían establecer un requisito de “lealtad” separado del tema del engaño, con el fin de evitar Tratamientos de Datos Personales que den lugar a una discriminación injusta o arbitraria contra los titulares.

    PRINCIPIO DOS: TRANSPARENCIA Y CONSENTIMIENTO

    Antes o en el momento en que se recopilen, se deberían especificar la identidad y datos de contacto del responsable de los datos, las finalidades específicas para los cuales se tratarán los datos personales, el fundamento jurídico que legitima su tratamiento, los destinatarios o categorías de destinatarios a los cuales los datos personales les serán comunicados, así como la información a ser transmitida y los derechos del titular en relación con los datos personales a ser recopilados. Cuando el procesamiento se base en el consentimiento, los datos personales solamente deberían ser recopilados con el consentimiento previo, libre, inequívoco e informado de la persona a que se refieran.

    Este Principio también se centra en la recopilación de Datos Personales como primera etapa de su Tratamiento. Se basa en el concepto de la “autodeterminación en lo que respecta a la información” y, en particular, en dos conceptos que gozan de amplio reconocimiento a nivel internacional: el principio de “transparencia” y el principio de “consentimiento”. Combinados, estos principios requieren que

    (i) se especifiquen las categorías de Datos Personales a ser tratados, las finalidades para las cuales se traten los Datos Personales, así como los destinatarios o categorías de destinatarios a quienes se divulgarán los Datos Personales y los derechos del Titular de los Datos Personales en relación con los Datos a ser tratados, generalmente a más tardar en el momento en el cual se inicie la recopilación; y

    (ii) cuando el Tratamiento se base en el consentimiento, se recopilen Datos Personales solo con el consentimiento claro de la persona a la que se refieran.

    Transparencia

    Antes o al momento de recopilarse los Datos Personales, deberían especificarse claramente:

    i) la identidad y datos de contacto del Responsable;

    ii) las finalidades del Tratamiento;

    iii) el fundamento jurídico de su Tratamiento;

    iv) los destinatarios o categorías de destinatarios a los cuales los Datos Personales serán comunicados;

    v) la información a serles transmitida,

    vi) la existencia, forma y mecanismos o procedimientos a través de los cuales los Titulares de Datos Personales podrán ejercer sus derechos de acceso, rectificación, cancelación, oposición y portabilidad.

    Además, se debería informar a las personas sobre las prácticas y políticas de las entidades o personas que recopilen los Datos Personales, a fin de que puedan tomar una decisión fundamentada con respecto al suministro de tales datos. Sin claridad, el consentimiento de la persona con respecto al tratamiento de sus datos no puede ser válido.

    La información debería ser proporcionada al Titular en forma concisa, transparente, inteligible y de fácil acceso, con un lenguaje claro y sencillo, en particular cualquier información dirigida específicamente a un niño.

    Consentimiento

    Por lo general, la persona debería ser capaz de dar su consentimiento libremente respecto de la recopilación de Datos Personales de la forma y con las finalidades previstas. Por lo tanto, el consentimiento de la persona debería basarse en suficiente información y debería ser claro, es decir, no debería dar lugar a ninguna duda o ambigüedad con respecto a la intención de la persona. Para que el consentimiento sea válido, la persona debería contar con suficiente información sobre los detalles concretos de los Datos que se recopilarán, la forma en que se recopilarán, los fines del Tratamiento y toda divulgación que pueda efectuarse. La persona debería ser capaz de efectuar una elección real y no debería correr ningún riesgo de engaño, intimidación, coacción o consecuencias negativas significativas si se niega a dar el consentimiento.

    El método para obtener el consentimiento debería ser apropiado para la edad y la capacidad de la persona afectada (si se conocen) y para las circunstancias particulares del caso. En la obtención del consentimiento de niñas y niños, el Responsable de los Datos debería obtener la autorización del Titular de la patria potestad o tutela, conforme a lo dispuesto en las reglas de representación previstas en el derecho interno de los Estados, o en su caso, debería solicitar directamente la autorización del menor de edad si el derecho interno de cada Estado ha establecido una edad mínima para que lo pueda otorgar directamente y sin representación alguna del Titular de la patria potestad o tutela.

    El consentimiento debería reflejar la preferencia y la decisión fundamentada de la persona afectada. Evidentemente, el consentimiento obtenido bajo coacción o sobre la base de declaraciones falsas o incluso información incompleta o engañosa no puede cumplir las condiciones para la recopilación o el Tratamiento legítimos.

    El intercambio y la retransmisión de Datos entre los Responsables de los datos, plantean algunas cuestiones difíciles. El consentimiento de una persona respecto de la recopilación inicial de Datos Personales no autoriza automáticamente el intercambio (o la retransmisión) de esos Datos con otros Responsables o Encargados de Datos. Se debería informar a las personas sobre esos intercambios adicionales y ofrecerles oportunidades apropiadas para que den su consentimiento.

    Contexto

    El requisito del consentimiento debería interpretarse de manera razonable en el entorno tecnológico en rápida evolución en el cual se tratan Datos Personales en la actualidad. La índole del consentimiento podría variar según las circunstancias del caso. En estos Principios se reconoce que, en algunas circunstancias, el “conocimiento” podría ser la norma apropiada en los casos en que el Tratamiento y la divulgación de Datos satisfagan intereses legítimos. El consentimiento implícito podría ser apropiado cuando los Datos en cuestión no sean Datos Personales Sensibles y cuando se proporciona información razonable sobre las finalidades y el método de recopilación de manera tal que se cumplan los requisitos de transparencia.

    Por ejemplo, el consentimiento de una persona con respecto a la recopilación de algunos Datos Personales podría inferirse de manera razonable a partir de interacciones anteriores con Responsables de Datos (y los avisos dados por ellos) y en los casos en que la recopilación sea acorde con el contexto de la transacción para la cual se recopilaron los Datos originalmente. También podría inferirse de prácticas comúnmente aceptadas con respecto a la recopilación y el uso de Datos Personales o las obligaciones legales de los Responsables de los Datos.

    Como se ha señalado anteriormente, en unos pocos casos podría autorizarse la recopilación de algunos Datos Personales sin consentimiento cuando el responsable cuente con fundamentos legales alternativos, establecidos en el derecho interno o en el derecho internacional. En esos casos, la parte que procure recopilar y tratar los Datos debería demostrar que tiene una necesidad clara de hacerlo para proteger sus intereses legítimos o los de un tercero a quien puedan divulgarse los datos. También se debería demostrar que hay un equilibrio entre los intereses legítimos de la parte que busque la divulgación y los intereses del Titular de los Datos.

    En algunas situaciones, particularmente en el contexto de la acción humanitaria, obtener el consentimiento puede ser muy difícil y, por ende, puede ser necesario y legítimo recurrir a otro fundamento jurídico, como el interés público o los intereses vitales del Titular de datos. La posibilidad de basarse en motivos de interés público es particularmente relevante para organizaciones humanitarias que, debido a la naturaleza de sus actividades y las situaciones de emergencia en las que generalmente operan, tienen mayores dificultades para obtener consentimiento válido, particularmente el que sea dado de manera informada y libre. Esto puede ser el caso, por ejemplo, cuando el Tratamiento de datos personales es un prerrequisito para recibir asistencia, o cuando se requieran recopilar los datos de una persona desaparecida. En estos casos, las organizaciones humanitarias deberían fundamentar y motivar claramente su recopilación.

    La condición de los “intereses legítimos” no se cumplirá si el Tratamiento tendrá efectos perjudiciales en los derechos y libertades o en intereses legítimos del Titular de los Datos. En los casos en que haya una gran discrepancia entre intereses en pugna, los intereses legítimos del Titular de los Datos tienen prelación. La recopilación y el Tratamiento de Datos de acuerdo con la condición de los intereses legítimos deberían ser justos y legítimos y ceñirse a todos los principios de la protección de Datos.

    Los Datos Personales Sensibles solamente deberían procesarse sin el consentimiento explícito de su Titular en los casos en que ello sea claramente de gran interés público (según lo que esté autorizado por ley) o responda a intereses vitales del Titular de los Datos (por ejemplo, en una situación de emergencia en la cual corra peligro su vida).

    Momento

    Por lo general, se debería informar a la persona sobre las finalidades del Tratamiento en el momento en el cual se recopilen los Datos y se debería obtener su consentimiento en ese momento. En la mayoría de los casos, el consentimiento durará todo el tiempo que lleve el Tratamiento al cual se refiera. En algunos casos, la recopilación subsiguiente de más Datos podría basarse de manera razonable en el consentimiento anterior dado por la persona en relación con la recopilación inicial, salvo que la finalidad del Tratamiento subsecuente de los Datos sea distinta a la originalmente aceptada por el Titular.

    El Titular debería tener derecho a retirar su consentimiento de manera expresa en cualquier momento, para lo cual el Responsable deberá establecer mecanismos sencillos, ágiles, eficaces y gratuitos. En general, el retiro del consentimiento no afecta la validez del Tratamiento que se hubiere hecho sobre la base del consentimiento antes de su retiro, siempre y cuando dicho retiro no esté motivado por una intención del Titular de evadir alguna responsabilidad contractual o legal, o incurrir en cualquier otra conducta ilegal o fraudulenta.

    PRINCIPIO TRES: PERTINENCIA Y NECESIDAD

    Los datos personales deberían ser únicamente los que resulten adecuados, pertinentes y limitados al mínimo necesario para las finalidades específicas de su recopilación y tratamiento ulterior.

    La pertinencia y la necesidad son principios cruciales de la protección de Datos y la privacidad personal. Desde luego, sus requisitos deberían evaluarse en relación con el contexto específico en el cual se recopilen y ulteriormente traten los Datos. Las consideraciones contextuales incluyen qué Datos particulares se recopilan y con qué finalidades.

    Pertinencia

    El requisito de que los Datos sean “pertinentes” significa que deberían guardar una relación razonable con las finalidades para las cuales hayan sido recopilados y se tenga la intención de usarlos.

    Por ejemplo, los Datos relativos a opiniones podrían ser fácilmente engañosos si se usan para finalidades con los cuales no guarden ninguna relación.

    Necesidad y proporcionalidad

    Por lo general, los Encargados de Datos deberían tratar Datos Personales solamente de una forma acorde con las finalidades expresas de su recopilación; por ejemplo, cuando sean necesarios para proporcionar el servicio o el producto solicitado por la persona. Asimismo, los recopiladores y Encargados de Datos deberían seguir un criterio de “limitación” o “minimización”, de acuerdo con el cual deberían hacer un esfuerzo razonable para cerciorarse de que los Datos Personales que manejen correspondan al mínimo requerido para la finalidad expresa. En algunos sistemas jurídicos se usa el concepto de “proporcionalidad” para hacer referencia al equilibrio de valores en pugna. La proporcionalidad requiere que las instancias decisorias determinen si una medida ha ido más allá de lo que se requiere para alcanzar una finalidad legítima y si los beneficios alegados excederán los costos previstos.

    En el contexto del Tratamiento de Datos del sector público, la idea de necesidad a veces se mide sobre la base de la proporcionalidad; por ejemplo, al exigir un equilibrio entre

    1) el interés del público en el Tratamiento de los Datos Personales y

    2) la protección de los intereses de las personas en materia de privacidad.

    De acuerdo con estos Principios, los conceptos de “necesidad” y “proporcionalidad” imponen limitaciones generales al uso, lo cual significa que los Datos Personales solo deberían usarse para cumplir los propósitos de la recopilación excepto con el consentimiento de la persona cuyos Datos Personales se recopilen o cuando sea necesario para proporcionar un producto o servicio solicitado por la persona.

    No obstante, en los Principios se reconoce que el campo del Tratamiento de Datos está evolucionando continuamente desde el punto de vista tecnológico. En consecuencia, debería entenderse que este Principio abarca una medida razonable de flexibilidad y adaptabilidad.

    PRINCIPIO CUATRO: TRATAMIENTO Y CONSERVACIÓN LIMITADOS

    Los datos personales deberían ser tratados y conservados solamente de manera legítima no incompatible con las finalidades para las cuales se recopilaron. Su conservación no debería exceder del tiempo necesario para cumplir dichas finalidades, de conformidad con la legislación nacional correspondiente.

    En este Principio se enuncian dos premisas fundamentales con respecto al Tratamiento y la conservación de Datos Personales:

    1) los Datos deberían ser tratados y conservados solamente de una manera legítima que no sea incompatible con la finalidad para la cual se hayan recopilado (lo cual se denomina a veces el “principio de finalidad” o de “limitación de la finalidad”) y

    2) no deberían conservarse más del tiempo necesario para cumplir su finalidad y de conformidad con la legislación nacional correspondiente.

    Tratamiento limitado

    Con respecto a la primera premisa, los Datos Personales deberían tratarse con finalidades determinadas, específicas, explícitas y legítimas. El Tratamiento y la conservación de Datos Personales deberían ser compatibles con las expectativas razonables de las personas, su relación con el Responsable que recopile los Datos y el aviso o los avisos proporcionados por el Responsable de datos.

    No deberían tratarse ni conservarse Datos Personales con finalidades que no sean compatibles con aquellas para las cuales se hayan recopilado, excepto con el conocimiento o consentimiento del Titular de los Datos o por mandato de la ley. El concepto de “incompatibilidad” da cierto grado de flexibilidad, ya que permite hacer referencia al objetivo o finalidad general en relación con la cual la persona haya dado inicialmente su consentimiento para que se recopilaran datos. En ese sentido, la medida apropiada suele consistir en respetar el contexto en el cual la persona haya proporcionado sus Datos Personales y las expectativas razonables de la persona en esa situación particular.

    Por ejemplo, cuando un Titular da su nombre y su dirección a un vendedor en línea y dicho vendedor, a su vez da el nombre del Titular y su domicilio particular al expedidor para que se puedan entregar al comprador los productos comprados, esa divulgación es evidentemente un uso “compatible” de Datos Personales. Sin embargo, si el vendedor da el nombre del Titular y su domicilio particular a otro tipo de vendedor o comerciante con fines que no sean necesarios para completar la transacción en línea del Titular y que no estén relacionados con dicha transacción, lo más probable es que sea un Tratamiento o “incompatible” de los Datos del Titular y que no estaría permitido salvo que el Titular diera su consentimiento expreso.

    El Tratamiento ulterior de Datos Personales con fines archivísticos, investigación científica e histórica o con fines estadísticos, todos ellos, en favor del interés público, no se consideraría incompatible con las finalidades iniciales. No obstante, dicho tratamiento ulterior seguiría sujeto a este Principio de Tratamiento Limitado y Conservación.

    Así, otro caso en el cual este Principio podría aplicarse de manera razonable y con un alto grado de flexibilidades el uso de los Datos Personales de una persona como parte de un Tratamiento más amplio (o “agregado”) de Datos de un gran número de personas por el Responsable de datos; por ejemplo, para la elaboración de inventarios o con fines estadísticos o de contabilidad.

    Conservación limitada

    Los Datos Personales deberían conservarse de forma que se permita la identificación de sus Titulares únicamente durante el tiempo que sea necesario para las finalidades del Tratamiento de los Datos Personales. La realidad de la tecnología moderna exige una limitación general para la conservación de los datos. Como el costo del almacenamiento de datos ha bajado considerablemente, suele ser menos costoso para los Responsables de Datos almacenarlos indefinidamente en vez de examinarlos y borrar los que no sean necesarios. No obstante, la conservación innecesaria y excesiva de Datos Personales tiene evidentemente implicaciones para la privacidad. Como regla general, por lo tanto, los Responsables deberían disponer de los Datos de manera segura y definitiva a través, por ejemplo, de eliminarlos sus archivos, registros, bases de datos, expedientes o sistemas de información, o bien deberían someterlos a un proceso de Anonimización, cuando ya no se necesiten para su fin original o tal como se disponga en la legislación nacional.

    Los Datos Personales podrían conservarse durante períodos más largos siempre que se traten exclusivamente con fines archivísticos, de investigación científica e histórica o fines estadísticos, todos ellos en fin del interés público y sin perjuicio de la aplicación de las medidas técnicas y organizativas apropiadas para proteger los derechos y libertades del Titular.

    Asimismo, las personas deberían poder optar por dar su consentimiento, ya sea de manera expresa o implícita, para que traten y conserven sus Datos Personales con finalidades adicionales. La legislación interna pertinente podría establecer requisitos legales específicos para la conservación de Datos. Igualmente, un Responsable de Datos podría tener razones legales legítimas para conservarlos durante un período mayor al requerido; esto puede darse, por ejemplo, para cumplir otras obligaciones legales –de derecho nacional o internacional– o contractuales, o bien para proteger los derechos, la seguridad o los bienes de la persona, del Encargado de los Datos o de un tercero. Por ejemplo, los empleadores podrían conservar expedientes de ex empleados o los médicos podrían conservar expedientes de ex pacientes a fin de protegerse de ciertos tipos de acción judicial, como juicios por negligencia médica, despido ilegal, etc.

    PRINCIPIO CINCO: CONFIDENCIALIDAD

    Los datos personales no deberían divulgarse, ponerse a disposición de terceros, ni emplearse para otras finalidades que no sean aquellas para las cuales se recopilaron, excepto con el consentimiento de la persona en cuestión o bajo autoridad de la ley.

    Este Principio deriva del deber básico del Responsable de Datos de mantener la “confidencialidad” de los Datos Personales en un entorno seguro y controlado.

    Este deber requeriría que el Responsable de Datos se cerciore de que no se proporcionen tales Datos (ni se pongan a disposición por otros medios) a personas o entidades excepto con el consentimiento de la persona afectada, en consonancia con las expectativas razonables de la persona afectada o por mandato de la ley. En este último caso, la ley podría autorizar dicha divulgación para garantizar el cumplimiento de obligaciones contractuales y legales, la protección de intereses públicos y privados legítimos. Esta responsabilidad emana de la naturaleza misma de los Datos Personales.

    Este deber está directamente correlacionado con aquel contenido en el Principio Seis de proteger la seguridad externa e interna y el cumplimiento de la normativa al salvaguardar los Datos. Proteger la privacidad implica no solo mantener la seguridad de los Datos Personales, sino también permitir que las personas controlen la forma en que se usan y divulgan sus Datos Personales. Un elemento esencial de esta “autodeterminación en lo que respecta a la información” es el establecimiento y mantenimiento de la confianza entre el Titular de los Datos y el Responsable de datos, especialmente con respecto a la divulgación de Datos Personales a terceros.

    La divulgación de Datos Personales a las autoridades encargadas de hacer cumplir la ley y a otras agencias gubernamentales, cuando sea realizada de conformidad con la legislación nacional, no contravendría este Principio. La legislación nacional debería autorizarlo por medio de disposiciones claras y específicas.

    La protección de los Datos Personales en poder de las autoridades públicas puede estar sujeta a normas diferentes en función de la naturaleza de la información y las razones de la divulgación. Estas razones y normas también deberían ser tratadas por disposiciones claras y específicas. En este contexto, se llama la atención al Capítulo IV de la Ley Modelo Interamericana sobre Acceso a la Información Pública 2.0, aprobada por la Asamblea General de la OEA en 2020, conforme a la cual los sujetos obligados deben proteger la información confidencial de las personas y en particular, los Datos Personales cuya divulgación requiera autorización de sus Titulares.

    PRINCIPIO SEIS: SEGURIDAD DE LOS DATOS

    La confidencialidad, integridad y disponibilidad de los datos personales deberían ser protegidas mediante salvaguardias de seguridad técnicas, administrativas u organizacionales razonables y adecuadas contra tratamientos no autorizados o ilegítimos, incluyendo el acceso, la pérdida, destrucción, daños o divulgación, aún cuando éstos ocurran de manera accidental. Dichas salvaguardias deberían ser objeto de auditoría y actualización permanente.

    De acuerdo con este Principio, los Responsables de los Datos deberían establecer y mantener las medidas de carácter administrativo y técnico que sean necesarias para establecer salvaguardias de seguridad que garanticen la confidencialidad, integridad y disponibilidad de los Datos Personales que obren en su poder o bajo su custodia (o de los cuales sean responsables) y cerciorarse de que tales Datos Personales no sean tratados ni divulgados excepto con el consentimiento de la persona o de otra autoridad legítima, ni sean accidentalmente perdidos, destruidos o dañados (3).

    En términos generales, las medidas adoptadas para proteger los Datos Personales deberían ser elegidas tomando en cuenta, entre otros factores:

    i) la posible afectación a los derechos de los titulares, en particular, el posible valor de los datos para una tercera persona no autorizada para su tratamiento;

    ii) los costos de su implementación;

    iii) las finalidades del tratamiento, y

    iv) la naturaleza de los datos personales tratados, en especial los Datos Sensibles.

    La índole de las salvaguardias implementadas podría variar según la sensibilidad de los datos en cuestión. Evidentemente, los Datos Sensibles requieren un nivel más alto de protección, a la luz de riesgos como por ejemplo, la usurpación de la identidad, pérdidas económicas, efectos negativos en la calificación crediticia, daños a bienes y pérdida del empleo o de oportunidades comerciales o profesionales, la vulneración de la intimidad sexual, o actos de violencia de género digital.

    No obstante, en el contexto moderno, es técnicamente imposible garantizar la privacidad absoluta y la protección completa de los Datos Personales, puesto que el esfuerzo necesario para lograrlo impondría barreras indeseables y costos inaceptables. Asimismo, es posible que en distintos contextos se requieran soluciones y niveles de salvaguardias diferentes. Por consiguiente, este Principio requiere una valoración razonada e informada y no necesariamente se vulneraría cada vez que un Responsable de Datos experimente un acceso no autorizado, pérdida, destrucción, daño, uso, modificación o divulgación de los Datos Personales en su poder, siempre y cuando las medidas y salvaguardias implementadas hayan sido “razonables y adecuadas”.

    La determinación sobre la razonabilidad y adecuación de las salvaguardias debería basarse en métodos y técnicas de seguridad de los Datos consistentes con las buenas prácticas comúnmente aceptadas, al igual que en factores como:

    i) la evolución constante de las amenazas a la privacidad, especialmente las cibernéticas;

    ii) los métodos y técnicas más avanzados que estén en uso en el ámbito de la seguridad de los datos,

    iii) el contexto de la situación general, y

    iv) la proporcionalidad y necesidad de las medidas tomadas.

    Así pues, una práctica que hace solo unos meses era permisible podría considerarse en la actualidad como intrusiva, riesgosa o peligrosa para la privacidad individual. Análogamente, una restricción que haya parecido razonable hace algunos meses podría ser obsoleta o injusta a la luz de los adelantos tecnológicos. El reto consiste en proporcionar orientación válida a los Responsables de los Datos, procurando al mismo tiempo que las normas sigan siendo “tecnológicamente neutrales” y no se vuelvan obsoletas como consecuencia de los rápidos cambios tecnológicos En ese sentido, las medidas tomadas deberían revisarse, evaluarse, auditarse, actualizarse y mejorarse periódicamente.

    La protección de la privacidad implica también permitir que las personas controlen su experiencia “en línea”. Además de tomar medidas de seguridad eficaces, los Responsables de Datos (tales como los proveedores de servicios en línea) deberían tener flexibilidad para proporcionar a sus usuarios medios efectivos para controlar el intercambio de Datos Personales como parte de las medidas generales de protección de la privacidad.

    Vulneración de la seguridad de los Datos Personales

    La incidencia creciente de intrusiones externas (“vulneración de la seguridad de los Datos Personales”), que consisten en el acceso no autorizado a datos protegidos, suscita preocupaciones relacionadas con la privacidad y tiene incluso implicaciones en el ámbito penal. En estos casos, los Responsables de los Datos deberían notificar a las personas cuyos Datos hayan sido (o puedan haber sido) comprometidos, así como a las autoridades penales o civiles relevantes. muchos países, entre los cuales se cuentan Estados Miembros de la OEA, la notificación es obligatoria por ley en esos casos.

    Tales notificaciones permiten a las personas afectadas tomar medidas de protección y posiblemente tener acceso a los Datos y pedir que se corrijan Datos inexactos o el uso indebido de los Datos como consecuencia de su vulneración. Las notificaciones también podrían ofrecer incentivos a los Responsables de los Datos para asumir la responsabilidad, examinar las políticas en materia de conservación y retención de Datos y mejorar sus medidas de seguridad.

    Al mismo tiempo, las leyes sobre notificación de vulneraciones de la seguridad de los Datos podrían imponer a los Responsables de los Datos la obligación de cooperar con las autoridades encargadas de hacer cumplir la ley y con otras autoridades (por ejemplo, equipos de respuesta a incidentes de informática u otras entidades responsables de la supervisión de la ciber seguridad). En la legislación nacional se deberían indicar las (pocas) situaciones concretas en que las autoridades encargadas de hacer cumplir la ley puedan requerir la divulgación de Datos Personales sin el consentimiento de las personas afectadas. Hay que tener cuidado de no imponer requisitos contradictorios a los Responsables de los Datos con respecto a la notificación y la confidencialidad.

    En los casos en que se imponen sanciones a los Responsables de los Datos por incumplimiento del deber de salvaguardar y proteger, tales sanciones deberían ser proporcionales al grado de perjuicio o de riesgo. En este contexto podría ser útil que las jurisdicciones nacionales adoptaran definiciones específicas de lo que constituye una “vulneración de la seguridad de los Datos Personales” (o “acceso no autorizado”), los tipos de Datos que podrían requerir un grado mayor de protección en esos casos y las responsabilidades específicas que podría tener un Responsable de Datos en caso de una divulgación de ese tipo.

    PRINCIPIO SIETE: EXACTITUD DE LOS DATOS

    Los datos personales deberían mantenerse exactos, completos, y actualizados hasta donde sea necesario para las finalidades de su tratamiento, de tal manera que no se altere su veracidad.

    La exactitud y la precisión revisten una importancia vital para la protección de la privacidad. Los Datos inexactos pueden perjudicar tanto al Encargado de Datos como al Titular, pero en una medida que varía mucho según el contexto.

    Cuando se recopilan Datos Personales y se les retiene para seguir usándolos (en vez de hacerlo una sola vez o durante períodos cortos), el Responsable de Datos tiene la obligación de tomar medidas para que los Datos en su posesión se mantengan actualizados y sean exactos y completos, de tal manera que no se altere la veracidad de éstos, conforme sea necesario para las finalidades para las cuales se hayan recopilado y se traten.

    A fin de cumplir sus obligaciones con respecto a la exactitud, los responsables de los datos deberían dar a las personas una oportunidad razonable para examinar o corregir la información personal que les hayan suministrado, o para solicitar la supresión de dichos datos. Se podría establecer un plazo razonable para la vigencia de este requisito.

    Al tomar medidas para determinar la exactitud de los Datos Personales de un Titular (“calidad de los datos”), el Responsable podría considerar la sensibilidad de los Datos Personales que recopile o mantenga y la probabilidad de que éstos expongan a las personas a daños considerables, de conformidad con los requisitos del Principio Nueve.

    Como se mencionó bajo los Principios Tres y Cuatro, bajo los criterios de “minimización” y Tratamiento limitado y conservación, los Datos Personales que se traten deberían corresponder al mínimo requerido para lograr las finalidades específicas y no debería retenerse por más del tiempo que sea necesario para tales fines. En muchos casos, para aplicar este Principio será necesario borrar Datos Personales que ya no se necesiten para las finalidades que justificaron inicialmente su recopilación.

    En ciertas circunstancias (por ejemplo, para la investigación de fraudes o la protección contra fraudes) podría ser necesario que los Encargados traten y conserven algunos Datos inexactos o fraudulentos.

    PRINCIPIO OCHO: ACCESO, RECTIFICACIÓN, CANCELACIÓN, OPOSICIÓN Y PORTABILIDAD

    Se debería disponer de métodos razonables, ágiles, sencillos y eficaces para permitir que aquellas personas cuyos datos personales han sido recopilados, puedan solicitar el acceso, rectificación y cancelación de los mismos, así como el derecho a oponerse a su tratamiento y, en lo aplicable, el derecho a la portabilidad de esos datos personales. Como regla general, el ejercicio de esos derechos debería ser gratuito. En caso de que fuera necesario restringir los alcances de estos derechos, las bases específicas de cualquier restricción deberían especificarse en la legislación nacional y estar en conformidad con los estándares internacionales aplicables.

    Las personas deberían tener derecho a saber si los Responsables de Datos tienen Datos Personales relacionados con ellas. Deben tener acceso a esos Datos a fin de que puedan impugnar su exactitud y pedir al Responsable que modifique, revise, corrija o elimine los Datos en cuestión. Este derecho de acceso y rectificación es una de las salvaguardias más importantes en el campo de la protección de la privacidad. Las personas deben también tener derecho a cancelar sus Datos Personales, a objetar su Tratamiento, y cuando. sea aplicable, a la portabilidad de sus Datos (4).

    Sus elementos esenciales son:

    i) la capacidad de la persona para obtener Datos relacionados con ella en un plazo razonable y de una forma razonable e inteligible; para saber si se ha denegado una solicitud de acceso a dichos Datos y por qué; y

    ii) la capacidad de impugnar tal denegación. Como regla general, el ejercicio de esos derechos debería ser gratuito; excepcionalmente, los costos deberían ser solamente aquellos asociados por razones naturales de reproducción, envío o certificación de los datos.

    En el ordenamiento jurídico interno de algunos países de las Américas (pero no en todos) se reconoce el derecho de habeas data, en virtud del cual las personas pueden entablar juicio para prevenir un presunto abuso de sus Datos Personales o ponerle fin. Ese derecho podría dar a la persona acceso a bases de datos públicas o privadas, así como el derecho a corregir los Datos en cuestión, a mantener el carácter confidencial de los Datos Personales Sensibles y a rectificar o borrar Datos perjudiciales. Como el contorno específico de este derecho varía de un Estado Miembro a otro, en estos Principios se abordan las cuestiones que plantea desde el punto de vista de cada uno de sus elementos.

    La legislación nacional de cada Estado debería establecer los requerimientos, plazos, términos y condiciones en que los Titulares podrán ejercer los derechos de acceso, rectificación, cancelación, oposición y portabilidad, así como las causales de improcedencia al ejercicio de los mismos. Estos derechos no son absolutos, y las legislaciones nacionales deberían especificar claramente las causas y razones por las cuales puede ser improcedente su ejercicio. Tales causales podrían incluir, de manera enunciativa mas no limitativa:

    1) cuando el Tratamiento sea necesario para el cumplimiento de un objetivo importante de interés público o para el ejercicio de las funciones propias de las autoridades públicas;

    2) cuando el Responsable acredite tener motivos legítimos para que el Tratamiento prevalezca sobre los intereses, los derechos y las libertades del Titular;

    3) cuando el Tratamiento sea necesario para el cumplimiento de una disposición legal; o

    4) cuando los Datos Personales sean necesarios para el mantenimiento o cumplimiento de una relación jurídica o contractual.

    Los mecanismos previstos en la legislación nacional deberían incluir medios adecuados para que las personas que cuentan con menor acceso a la digitalidad entre ellas las mujeres, las niñas y los grupos en mayor desventaja o con diferentes ejes de exclusión, puedan acceder a los mismos.

    En caso de fallecimiento o desaparición del Titular, la legislación nacional de cada Estado podrá reconocer que las personas físicas que sean sus familiares (hasta un determinado grado de consanguinidad) o representantes legales quienes ejerzan los derechos a que se refieren estos Principios respecto de los Datos de esas personas.

    Además, la legislación nacional de cada Estado podrá reconocer el derecho que tiene el Titular de inconformarse o impugnar las respuestas otorgadas por el Responsable, o bien su falta de respuesta, ante una solicitud de ejercicio de los derechos aludidos en el presente Principio, ante la autoridad de control y, en su caso, ante instancias judiciales.

    Los Responsables y Encargados de Datos no deberían discriminar contra los Titulares en razón de que éstos hubieren ejercido cualquiera de estos derechos, incluyendo de manera enunciativa mas no limitativa mediante la denegación de bienes o servicios al Titular, la cobranza de precios o tarifas diferentes por ellos o el otorgamiento de un nivel o calidad distinta de los bienes.

    El derecho de acceso

    El derecho de acceso a los Datos Personales mantenidos por un Responsable de los Datos debería ser sencillo de ejercer. Por ejemplo, los mecanismos de acceso deberían formar parte de las actividades regulares del Responsable de los Datos y no se debería requerir ninguna medida especial o procedimiento judicial (como la presentación formal de un reclamo por la vía judicial). Cada persona debería tener la posibilidad de tener acceso a sus propios datos. En algunos casos, hasta terceros podrían tener derecho también (por ejemplo, los representantes de personas con discapacidad mental o los padres de menores).

    La capacidad de una persona para tener acceso a sus Datos se conoce también como derecho de “participación individual”. De acuerdo con este concepto, se debería otorgar acceso dentro de un plazo razonable y de una manera razonable. Según se mencionó, el acceso debería otorgarse libre de costo; excepcionalmente, los costos deberían ser solamente los asociados por razones naturales de reproducción, envío y certificación de los Datos. La carga y el costo de la presentación de los Datos no deberían ser irrazonables o desproporcionados.

    Todo dato que vaya a proporcionarse a su Titular debería presentarse de una forma inteligible, usando un lenguaje claro y sencillo. La información debería entregarse por correo o de manera electrónica (cf. seccion “Derecho a la portabilidad de datos”, infra).

    Excepciones y limitaciones

    Sin embargo, el derecho de acceso no es absoluto. En todo sistema nacional hay situaciones excepcionales en las cuales se podría requerir que se mantenga el carácter confidencial de ciertos datos.

    Estas circunstancias deberían enunciarse claramente en las leyes apropiadas o en otras directrices y deberían ponerse a disposición del público.

    Por ejemplo, podrían surgir situaciones de ese tipo si se sospecha que la persona a la cual se refieren los Datos ha cometido un acto ilícito y es el sujeto de una investigación que estén realizando las fuerzas del orden o una entidad similar, si los registros de esa persona están mezclados con los de un tercero que también tiene intereses en materia de privacidad o si otorgar acceso al Titular de los Datos podría comprometer secretos comerciales, pruebas confidenciales o material para exámenes. Las reglas relativas a situaciones de esos tipos deberían ser lo más estrechas y restrictivas posible.

    Además, por razones prácticas, un Responsable de Datos podría imponer condiciones razonables; por ejemplo, especificando el método para efectuar solicitudes y exigiendo que las  personas que efectúen solicitudes de ese tipo autentiquen su identidad por medios razonables. No es necesario que los Responsables de Datos accedan a solicitudes que impongan cargas o gastos desproporcionados, que violen los derechos a la privacidad de otras personas, que infrinjan Datos reservados o secretos comerciales, que contravengan las obligaciones legales de los Responsables de Datos o que impidan de cualquier otra forma que éstos protejan sus derechos, su seguridad o sus bienes, los de otro usuario, de una filial o de un tercero.

    El derecho a impugnar la denegación de acceso Si a una persona se le deniega la solicitud de acceso, debería haber un método efectivo para que la persona (o su representante) pueda averiguar las razones de la denegación e impugnarla. Es necesario permitir que la persona se entere de las razones de una decisión adversa a fin de que pueda ejercer el derecho a impugnar la decisión y prevenir la denegación arbitraria.

    Como ya se dijo, en algunos casos el derecho internacional o el derecho interno de cada Estado Miembro podrá considerar apropiado, o incluso necesario, retener ciertos datos. Sin embargo, esos casos deberían ser la excepción y no la regla, y las razones de la denegación deberían comunicarse claramente a la persona que efectúe la solicitud, a fin de prevenir la denegación arbitraria del derecho fundamental a corregir errores.

    El derecho de rectificación para corregir errores y omisiones

    La persona debería tener la posibilidad de ejercer el derecho a solicitar la corrección (o la adición) de Datos Personales sobre sí misma que sean incompletos, inexactos, innecesarios, excesivos o no se encuentren actualizados. Eso se conoce también como derecho de “rectificación.” Si los Datos en cuestión son incompletos o inexactos, se debería permitir que la persona proporcione más información a fin de corregir los errores u omisiones.

    Si los Datos en cuestión son evidentemente inexactos, el Responsable de Datos por lo general debería corregir la inexactitud cuando el Titular de los Datos lo solicite. Incluso en los casos en que se determine que los Datos son inexactos, como en el curso de una investigación del Titular de los datos, a veces podría ser más apropiado que el Responsable de los Datos agregue material al registro en vez de borrarlo, a fin de que refleje con exactitud la historia completa de la investigación.

    No se debería permitir que el Titular de los Datos introduzca Datos inexactos o erróneos en los registros del Responsable. El Titular de los Datos tampoco tiene necesariamente derecho a compeler al Responsable de los Datos a que borre Datos que sean exactos pero embarazosos.

    El derecho de corrección o rectificación no es absoluto. Por ejemplo, es posible que no se autorice la modificación de Datos Personales, aunque se trate de información errónea o engañosa, en los casos en que los Datos se requieran legalmente o deban ser conservados para el cumplimiento de una obligación impuesta a la persona Responsable por la ley nacional pertinente o posiblemente por las relaciones contractuales entre la persona Responsable y el Titular de los datos.

    Por consiguiente, en la legislación nacional se deberían indicar claramente las condiciones en las cuales se debería proporcionar acceso y permitir la corrección de los Datos, así como las restricciones que se apliquen y, en tal caso, los motivos de tales restricciones.

    Derecho a la cancelación

    En algunos marcos reglamentarios nacionales y regionales se da a las personas el derecho a solicitar que los Responsables de Datos supriman (o borren) Datos Personales específicos respecto de los cuales, aunque estén a disposición del público, las personas afirmen que ya no son necesarios o pertinentes o el Titular retire su consentimiento o se oponga a su Tratamiento.

    Este derecho no es absoluto sino contingente y contextual, y requiere un equilibrio difícil de intereses y principios. El ejercicio del derecho plantea necesariamente cuestiones fundamentales en lo que se refiere no solo a la privacidad, el honor y la dignidad, sino también al derecho de acceso a la verdad, la libertad de información y de expresión, y la proporcionalidad.

    Como se mencionó, la legislación nacional de cada Estado debería establecer, en su caso, la existencia del derecho a la cancelación, los requerimientos, plazos, términos y condiciones en que los Titulares podrán ejercer este derecho, así como las causales de improcedencia a su ejercicio.

    En algunos Estados, el “derecho a borrar o suprimir” sigue siendo controvertido y es el tema de definiciones y puntos de vista divergentes, en relación con Datos Personales que (aunque sean ciertos o exactos en cuanto a los hechos) la persona afectada considere personalmente embarazosos, excesivos o simplemente irrelevantes.

    El derecho de oposición

    El Titular debería tener el derecho de oponerse, en razón de su situación particular, en cualquier momento al Tratamiento de sus Datos Personales cuando tenga una razón legítima para ello o cuando el Tratamiento de sus Datos Personales tenga por objeto la mercadotecnia directa, incluida la elaboración de perfiles, en la medida que esté relacionada con dicha actividad. Cuando el Titular se oponga al Tratamiento con fines de mercadotecnia directa, sus Datos Personales deberían dejar de ser tratados para dichos fines.

    El derecho a la portabilidad de los Datos Personales

    El alcance del derecho a la portabilidad de Datos Personales es un tema emergente, que continúa siendo discutido al interior de algunos Estados Miembros, en particular respecto a los Datos que abarca y si debe abordarse de manera general o sectorizada. Un número significativo de Estados Miembros de la OEA coinciden en que, cuando se procesen Datos Personales por vía electrónica o medios

    automatizados, el Titular tendrá derecho a obtener una copia de los Datos Personales que hubiere proporcionado al Responsable en un formato electrónico estructurado, de uso común y lectura mecánica, que le permita seguir utilizándolos y transferirlos a otro Responsable sin impedimento, en caso de que lo requiera.

    El Titular podrá solicitar que sus Datos Personales se transfieran directamente de Responsable a Responsable, cuando sea técnicamente posible. El derecho a la portabilidad de los Datos Personales no afectará negativamente los derechos y libertades de otros.

    Sin perjuicio de otros derechos del Titular, el derecho a la portabilidad de los Datos Personales no debería resultar procedente cuando se trate de información inferida, derivada, creada, generada u obtenida a partir del análisis o Tratamiento efectuado por el Responsable con base en los Datos Personales proporcionados por el Titular, como es el caso de los Datos Personales que hubieren sido sometidos a un proceso de personalización, recomendación, categorización o creación de perfiles.

    PRINCIPIO NUEVE: DATOS PERSONALES SENSIBLES

    Algunos tipos de datos personales, teniendo en cuenta su sensibilidad en contextos particulares, son especialmente susceptibles de causar daños considerables a las personas si se hace mal uso de ellos. Las categorías de estos datos y el alcance de su protección deberían indicarse claramente en la legislación y normativas nacionales. Los responsables de los datos deberían adoptar medidas de privacidad y de seguridad reforzadas que sean acordes con la sensibilidad de los datos y su capacidad de hacer daño a los titulares de los datos.

    El término “Datos Personales Sensibles” abarca los Datos que se refieren a los aspectos más íntimos de las personas. Estos Datos merecen protección especial porque, si se manejan o se divulgan de manera indebida, darían lugar a una intrusión profunda en la dignidad personal, el honor de la persona afectada y sus libertades fundamentales, y podrían desencadenar una discriminación ilícita o arbitraria contra la persona o causar un riesgo de graves perjuicios para la persona.

    Los Estados Miembros deberían indicar claramente en su legislación y normativa nacionales las categorías de Datos Personales que se consideren especialmente “sensibles” y que, por consiguiente, requieran una mayor protección. Existe una variedad de aproximaciones a estas categorías entre los Estados Miembros de la OEA. Según el contexto cultural, social o político, podría incluir, por ejemplo, los Datos relacionados con su salud personal, vida sexual, orientación sexual, creencias religiosas, filosóficas o morales, afiliación sindical, datos genéticos, datos biométricos dirigidos a identificar de manera univoca a una persona física, opinión política u origen racial o étnico, información sobre cuentas bancarias, documentos oficiales, información recopilada de niños y niñas o geolocalización personal.

    Asimismo, la legislación y la normativa nacionales deberían establecer las garantías apropiadas, que reflejen las circunstancias imperantes en la jurisdicción pertinente a fin de proteger en medida suficiente los intereses de las personas en materia de privacidad y definir el alcance de la prohibición del Tratamiento de Datos Personales Sensibles y las excepciones a la misma. Como regla general, los Datos Personales Sensibles no deberían ser Tratados excepto, por ejemplo, cuando el Titular haya otorgado consentimiento explícito para ello o cuando el Tratamiento sea estrictamente necesario para el ejercicio y cumplimiento de las atribuciones y obligaciones específicas del Responsable de Datos , o para dar cumplimiento a un mandato legal, o razones de seguridad nacional, seguridad pública, orden público, salud pública, o salvaguarda de derechos y libertades de terceros. A manera de ejemplo, la necesidad de protección contra una amenaza transfronteriza grave a la salud pública, como sería una pandemia, podría quedar comprendida en estos supuestos. Al determinar las obligaciones reglamentarias pertinentes, hay que tener en cuenta el contexto en el cual una persona proporciona esos Datos.

    Debe recaer en los Responsables de Datos la carga de determinar los riesgos importantes para los Titulares de los Datos como parte del proceso general de gestión de riesgos y evaluación del impacto en la privacidad. Si se responsabiliza a quien controla efectivamente los Datos, se podrá proteger mejor a sus Titulares contra daños considerables en una amplia gama de contextos culturales.

    PRINCIPIO DIEZ: RESPONSABILIDAD

    Los responsables y encargados del tratamiento de datos deberían adoptar e implementar las medidas técnicas y organizacionales que sean apropiadas y efectivas para asegurar y poder demostrar que el tratamiento se realiza en conformidad con estos Principios. Dichas medidas deberían ser auditadas y actualizadas periódicamente. El responsable o encargado del tratamiento y, en lo aplicable, sus representantes, deberían cooperar, a petición, con las autoridades de protección de datos personales en el ejercicio de sus tareas.

    Los sistemas de protección de la privacidad deberían reflejar un equilibrio apropiado entre la reglamentación gubernamental y la implementación ética y efectiva por aquellos que tienen responsabilidad directa por la recopilación, procesamiento, uso, retención y difusión de Datos Personales. Estos “gerentes de Datos” deberían actuar en calidad de “buen custodio” de los Datos que les proporcionen o confíen.

    Responsabilidad

    El principio de responsabilidad requiere el establecimiento de metas apropiadas en lo que se refiere a la protección de la privacidad, a las cuales los Responsables de Datos (organizaciones y otras entidades) deberían adherirse, permitiéndoles determinar las medidas más apropiadas para alcanzar esas metas y vigilar su cumplimiento. De esa forma, los Responsables de Datos pueden alcanzar las metas en materia de protección de la privacidad de la forma que mejor se adapte a sus modelos empresariales, la tecnología y los requisitos de sus clientes.

    Los Responsables de Datos deberían implementar las medidas organizacionales y técnicas necesarias para asegurar y poder demostrar, a petición, que el Tratamiento se realiza de conformidad con estos Principios. Cuando el Tratamiento se realice en nombre de un Responsable, el Responsable debería recurrir solamente a Encargados que garanticen suficientemente la implementación de las medidas técnicas u organizacionales, que permitan que el Tratamiento cumpla con estos Principios y asegure la protección de los derechos del Titular.

    En los programas y procedimientos se deberían tener en cuenta la índole de los Datos Personales en cuestión, el tamaño y la complejidad de la organización que recopila, almacena y procesa Datos, y el riesgo de vulneraciones. La protección de la privacidad depende de una evaluación creíble de los riesgos que el Tratamiento de Datos Personales podría plantear para las personas y la mitigación responsable de esos riesgos. Deberían destinarse recursos apropiados para implementar programas, políticas y procedimientos de protección de Datos Personales, que deberían incluir, entre otros, sistemas de manejo de riesgos, capacitación sobre obligaciones de protección de Datos, revisión periódica de programas de seguridad, un sistema de supervisión y vigilancia, incluyendo auditorías, para revisar el cumplimiento y actualización de las políticas de protección de Datos , así como procedimientos para recibir y responder preguntas y quejas de Titulares. En muchos casos, la designación de un “responsable principal de la información y la privacidad” facilitará la consecución de esta meta.

    La adhesión a códigos de conducta o mecanismos de certificación, entre otros, pueden usarse como elementos para demostrar cumplimiento con estos Principios. Por lo tanto, las leyes y normas nacionales en materia de privacidad deberían proporcionar una orientación claramente expresada y bien definida a los Responsables de Datos, incluyendo la exigencia de que rindan cuentas del cumplimiento de estos Principios. Además del mecanismo con que cuenten las autoridades gubernamentales para hacer cumplir la normativa, el derecho interno debería proveer a las personas los mecanismos apropiados para responsabilizar a los Responsables de los Datos de las afectaciones que se produzcan (por ejemplo, mediante la indemnización por daños y perjuicios).

    Incorporación de la privacidad en el diseño de sistemas

    Un enfoque contemporáneo eficaz consiste en requerir que los Responsables de Datos incorporen la protección de la privacidad en el diseño y la arquitectura de sus sistemas de tecnología de la información y en sus prácticas comerciales. Deben incorporarse consideraciones de privacidad y seguridad en cada etapa del diseño de los productos.

    El concepto de “privacidad por diseño” es una forma de responsabilidad proactiva y se refiere a la etapa previa a la recopilación de los datos, es decir, antes de que inicie su Tratamiento por parte del Responsable o Encargado. En estas primeras etapas es cuando los Responsables o Encargados de los Datos deberían identificar las características y posibles riesgos del Tratamiento al que van a someter los Datos que eventualmente obtengan en función de la tarea que desarrollen, producto que ofrezcan, o servicio que presten.

    El diseño del modelo de Tratamiento de Datos asociado con estos productos o servicios debería priorizar la privacidad y la protección de los Datos de los usuarios, de manera consistente con estos Principios y con su legislación nacional, durante todo el tiempo que dure el dicho Tratamiento.

    Asimismo, la “privacidad por defecto” está relacionada con el uso proporcional de los Datos personales con la finalidad por la cual se recopilen, conforme a los Principios Tres y Siete. Los Responsables y Encargados de los datos, al igual que los desarrolladores de aplicaciones, sistemas, servicios, plataformas y programas, deberían garantizar que, por el simple hecho de registrarse en su sitio, abrir una cuenta, utilizar su servicio, interactuar con su plataforma o descargar una aplicación, se aplique al usuario la configuración básica de privacidad de manera automática, protegiendo sus Datos Personales conforme requiera la legislación nacional. Las medidas de privacidad por defecto deberían estar completamente implementadas antes de iniciar el Tratamiento de datos personales.

    Al implementar tanto la privacidad por diseño como la privacidad por defecto, se debería prestar especial atención a contar con una protección reforzada de los Datos Personales Sensibles que vayan a ser tratados y, en la medida que lo requiera la legislación nacional, documentar los riesgos identificados y las medidas tomadas para eliminar o mitigar dichos riesgos.

    Responsabilidad por compartir Datos con terceros

    Los Responsables de Datos deberían asumir la responsabilidad de asegurar que sus requisitos sean observados por terceros a quienes se comuniquen los Datos Personales. Esta obligación de asegurar que haya salvaguardias adecuadas de seguridad se aplica independientemente de que otra persona esté a cargo o de que un Responsable de Datos diferente trate Datos Personales en representación de la autoridad, es decir, la que está obligada a rendir cuentas). También se aplica en el caso de transferencias internacionales o transfronterizas de Datos Personales (véase el Principio Once).

    PRINCIPIO ONCE: FLUJO TRANSFRONTERIZO DE DATOS Y RESPONSABILIDAD

    Reconociendo su valor para el desarrollo económico y social, los Estados Miembros deberían cooperar entre sí para facilitar el flujo transfronterizo de datos personales a otros Estados cuando éstos confieran un nivel adecuado de protección de los datos de conformidad con estos Principios.

    Asimismo, los Estados Miembros deberían cooperar en la creación de mecanismos y procedimientos que aseguren que los responsables y encargados del tratamiento de datos que operen en más de una jurisdicción, o los transmitan a una jurisdicción distinta de la suya, puedan garantizar y ser efectivamente hechos responsables por el cumplimiento de estos Principios.

    En el mundo moderno de rápidos flujos de datos y comercio transfronterizo, es cada vez más probable que las transferencias de Datos Personales crucen fronteras nacionales. Sin embargo, la reglamentación que existe actualmente en diversas jurisdicciones nacionales varía en cuanto al fondo y al procedimiento. En consecuencia, existe la posibilidad de confusión, conflictos y contradicciones, por lo cual es deseable que los Estados Miembros de la OEA consideren reconocer estándares interoperables para transferencias transfronterizas de datos personales.

    Un reto fundamental para una política y una práctica eficaces en materia de protección de Datos consiste en conciliar

    1) las diferencias en los enfoques nacionales de la protección de la privacidad con la realidad moderna del flujo mundial de Datos;

    2) los derechos de las personas a tener acceso a Datos en un contexto transnacional; y

    3) el hecho fundamental de que los Datos y el Tratamiento de Datos impulsan el desarrollo y la innovación. Todos los instrumentos internacionales para la protección de Datos procuran alcanzar un equilibrio apropiado entre esas metas.

    En estos Principios se expresa una directriz para que cada Estado Miembro de la OEA evalúe sus propios mecanismos de protección de la privacidad de cara al flujo transfronterizo de datos personales.

    Al igual que en otras normas internacionales en este campo, en estos Principios se adopta una

    norma de razonabilidad con respecto a las transferencias transfronterizas. Por una parte, deberían permitirse las transferencias internacionales de Datos Personales entre Estados Miembros que confieran los grados de protección reflejados en estos Principios o que protejan los Datos Personales en medida suficiente por otros medios, entre ellos mecanismos efectivos de aplicación de la normativa. Al mismo tiempo, deberían permitirse las transferencias también en los casos en que los mismos Responsables de Datos tomen medidas apropiadas para asegurar que los Datos transferidos estén protegidos de manera efectiva en consonancia en estos Principios. Los Estados Miembros deberían tomar las medidas necesarias para que los Responsables y Encargados de Datos se responsabilicen de esa protección.

    Flujo transfronterizo de Datos

    La transferencia de Datos Personales a través de fronteras nacionales es un hecho de la vida contemporánea. Nuestra comunidad mundial está más interconectada que nunca. En la mayoría de los países, cualquiera que tenga un teclado y conexión a internet puede conseguir fácilmente información de todas partes del mundo. En el derecho internacional se reconoce el derecho de las personas a la privacidad y a la protección de Datos Personales en consonancia con el libre flujo de información.

    Algo igualmente importante es que las economías nacionales dependen en medida creciente del intercambio y el comercio transfronterizos, y la transferencia de datos (incluidos Datos Personales) es un aspecto fundamental de ese intercambio y comercio.

    Con el surgimiento de nuevas tecnologías, el almacenamiento de datos está volviéndose geográficamente indeterminado. La computación y el almacenamiento “en nube” y la prevalencia creciente de servicios móviles implican necesariamente el intercambio y el almacenamiento remoto de datos a través de fronteras nacionales. Un enfoque progresista de la privacidad y la seguridad debería permitir que las empresas e industrias nacionales crezcan y compitan en el plano internacional. Las restricciones nacionales innecesarias o irrazonables a los flujos transfronterizos de datos podrían crear barreras para el comercio de servicios y dificultar el desarrollo de productos y servicios innovadores, eficientes y eficaces en función del costo. Pueden convertirse fácilmente en obstáculos para las exportaciones y ocasionar perjuicios considerables tanto a los proveedores de servicios como a personas y a clientes empresariales. Las restricciones al flujo transfronterizo de Datos Personales deberían ser proporcionales a los riesgos presentados, tomando en cuenta la sensibilidad de los Datos, y el propósito y contexto del Tratamiento. Cualesquier restricciones deberían ser no-discriminatorias.

    Se alienta a los Estados Miembros de la OEA a considerar el reconocimiento de estándares interoperables para transferencias transfronterizas a fin de facilitar el flujo de Datos Personales entre Estados Miembros con distintos alcances y estados de desarrollo en sus legislaciones nacionales relativas a la privacidad y protección de Datos Personales. Esto permitiría responsabilidades compartidas y cooperación entre Estados Miembros en caso de transferencias no autorizadas, y contribuiría a incrementar el comercio, la inversión y los resultados económicos para los Estados Miembros, así como incentivar la innovación y reducir las barreras de entrada a la economía global.

    Finalmente, se insta a los Estados Miembros de la OEA a asegurar que la transferencia transfronteriza de Datos Personales entre una organización humanitaria y otra entidad con la finalidad específica de brindar ayuda humanitaria se mantenga libre de restricciones en la medida de lo posible y legalmente permisible. En consecuencia, las legislaciones nacionales deberían tener en cuenta que dichas organizaciones pueden verse en la necesidad de compartir Datos Personales a través de las fronteras para salvaguardar los intereses vitales de los Titulares de los Datos, o para servir al interés público, de conformidad con el mandato de la organización humanitaria.

    Restricciones nacionales basadas en distintos grados de protección

    En la OEA, todos los Estados Miembros comparten la meta general de proteger la privacidad y un compromiso con el libre flujo de información en el marco de ciertos criterios. Los Estados Miembros deberían abstenerse de restringir el flujo de Datos a otros Estados que sustancialmente están observando estos Principios, o donde existen las salvaguardias apropiadas. Lo mismo ocurre con la mayoría de los países del resto del mundo. No obstante, en algunos países las autoridades han impuesto restricciones a la comunicación transfronteriza de Datos por personas y entidades sujetas a su jurisdicción en los casos en que, en opinión de esas autoridades, las normas en materia de protección de Datos de los otros países no se ciñen a los requisitos específicos de las leyes vigentes en su jurisdicción. Por ejemplo, se podría impedir que una entidad del país A comunique Datos a una entidad el país B si, en opinión de las autoridades de A, las leyes de B sobre privacidad o protección de Datos no se ciñen a las normas de A, incluso si ambas entidades forman parte de la misma organización comercial.

    En (unas pocas) circunstancias particulares, las leyes nacionales podrían restringir justificadamente el flujo transnacional de Datos y requerir que los Datos se almacenen y procesen localmente. Las razones para restringir o prevenir los flujos de Datos deberían ser siempre imperiosas.

    Algunas razones de tales restricciones podrían ser más imperiosas que otras. No obstante, por lo general los requisitos relativos a la “localización de Datos” son en sí contraproducentes y deberían evitarse, prefiriéndose en cambio las medidas de cooperación.

    Cooperación internacional

    Por las razones anteriormente expuestas, los principios y mecanismos de la cooperación internacional deberían tratar de limitar y reducir las fricciones y los conflictos entre los distintos enfoques jurídicos internos que rigen el uso y la transferencia de Datos Personales. El respeto mutuo de los requisitos establecidos en la normativa de otros países (incluidas sus salvaguardias de la privacidad) fomentará el comercio transfronterizo de servicios. Ese respeto, a su vez, debería basarse en un concepto de transparencia entre los Estados Miembros con respecto a los requisitos y los procedimientos para la protección de Datos Personales.

    Los Estados Miembros deberían procurar el reconocimiento mutuo de las reglas y prácticas en materia de responsabilización, a fin de evitar conflictos y resolverlos cuando surjan. Los Estados Miembros deberían cooperar para desarrollar marcos regulatorios y estrategias para promover la transferencia transfronteriza de Datos (con las debidas salvaguardias) y no deberían imponer cargas que limiten el libre flujo de información o actividad económica entre jurisdicciones, como exigir que los proveedores de servicios operen en el país o instalen su infraestructura o sus Datos dentro de las fronteras de un país. Las leyes nacionales no deberían entorpecer el acceso de los Responsables de Datos o las personas a la información que esté almacenada fuera del país siempre que la información reciba un grado de protección que se apegue a los estándares aquí descritos.

    Responsabilización de los Responsables de Datos

    Desde luego, se debería exigir que los Responsables de Datos cumplan las obligaciones legales de la jurisdicción donde tengan su domicilio social y donde operen.

    Al mismo tiempo, los Responsables de Datos que transfieran Datos Personales a través de fronteras deberían asumir la responsabilidad de asegurar un grado continuo de protección que sea acorde con estos Principios.

    Los Responsables de Datos deberían tomar medidas razonables para que los Datos Personales estén protegidos eficazmente de acuerdo con estos Principios, sea que los Datos se transfieran a terceros dentro del país o a través de fronteras internacionales. Asimismo, deberían proporcionar a las personas del caso un aviso apropiado de tales transferencias, especificando los fines para los cuales esos terceros usarán los Datos. En general, estas obligaciones deberían reconocerse en acuerdos apropiados, en disposiciones contractuales o por medio de salvaguardias técnicas e institucionales de la seguridad, procesos para la tramitación de quejas, auditorías y medias similares. La idea es facilitar el flujo necesario de Datos Personales entre Estados Miembros y, al mismo tiempo, garantizar el derecho fundamental de las personas a la protección de sus Datos Personales.

    Estos Principios podrían servir de marco acordado para la cooperación y un mayor aumento de la capacidad entre las Autoridades Responsables de la Protección de Datos de cada Estado Miembro de la OEA, sobre la base de directrices para asegurar que se cumplan los requisitos básicos de la responsabilización transfronteriza.

    PRINCIPIO DOCE: EXCEPCIONES

    Cualquier excepción a alguno de estos Principios debería estar prevista de manera expresa y específica en la legislación nacional, ser puesta en conocimiento del público y limitarse únicamente a motivos relacionados con la soberanía nacional, la seguridad nacional, la seguridad pública, la protección de la salud pública, el combate a la criminalidad, el cumplimiento de normativas u otras prerrogativas de orden público o el interés publico.

    Proteger los intereses en materia de privacidad de las personas (los ciudadanos y otros) es cada vez más importante en un mundo donde se recopilan ampliamente Datos sobre personas, se les difunde con rapidez y se les almacena durante mucho tiempo. La finalidad de estos Principios es garantizara las personas los derechos básicos que necesitan para salvaguardar sus intereses.

    Sin embargo, la privacidad no es el único interés que los Estados Miembros y sus gobiernos deberían tener en cuenta en el campo de la recopilación, retención y difusión de Datos. De vez en cuando surgirá inevitablemente la necesidad de tener en cuenta otras responsabilidades del Estado, lo cual llevará a la limitación de los derechos de privacidad de las personas.

    En algunos casos, es posible que las autoridades de los Estados Miembros de la OEA tengan que apartarse de estos Principios o establecer restricciones que deberían limitarse a las necesarias, adecuadas y proporcionales en una sociedad democrática para salvaguardar la seguridad nacional y la seguridad pública, la protección de la salud pública, la administración de justicia, el cumplimiento de la normativa u otras prerrogativas esenciales del orden público, la protección de los derechos y libertades de otros objetivos de interés público general. Por ejemplo, al responder a las amenazas planteadas por la delincuencia internacional, el terrorismo y la corrupción, así como a ciertas violaciones graves a los derechos humanos, las autoridades competentes de los Estados Miembros de la OEA ya han efectuado arreglos especiales para la cooperación internacional en la detección, investigación, sanción y prevención de delitos penales.

    Estas excepciones y desviaciones respecto de la norma deberían ser la excepción y no la regla. Deberían aplicarse solo después de considerar lo más cuidadosamente posible la importancia e proteger la privacidad individual, la dignidad y el honor respetando los derechos y las libertades fundamentales de los Titulares. Debería haber límites sensatos en la capacidad de las autoridades nacionales para compeler a los Responsables a dar a conocer Datos Personales, manteniendo un equilibrio entre la necesidad de los Datos en circunstancias limitadas y el debido respeto al derecho de los intereses de las personas en materia de privacidad.

    Los Estados Miembros de la OEA deberían abstenerse de solicitar, a través de estas excepciones, Datos personales recopilados por organizaciones humanitarias, cuando el propósito sea utilizarlos con fines no humanitarios, ya que ello podría afectar gravemente a los beneficiarios de los servicios humanitarios en detrimento de su seguridad y de la acción humanitaria en general.

    Por medio de leyes o normas públicas, los Estados Miembros deberían indicar claramente esas restricciones y desviaciones respecto de la norma, los casos concretos en que pueda requerirse que los Responsables de Datos divulguen Datos Personales y las razones correspondientes.

    Cualquier legislación que tenga como propósito restringir la aplicación de estos Principios debería contener como mínimo, disposiciones relativas a la finalidad del Tratamiento, las categorías de datos personales de que se trate, el alcance de las limitaciones establecidas, las garantías adecuadas para evitar accesos o transferencias ilícitas o desproporcionadas, la determinación del Responsable, los plazos de conservación de los datos personales, los posibles riesgos para los derechos y libertades de los Titulares, y el derecho de los Titulares a ser informados sobre la limitación, salvo que resulte perjudicial o incompatible a los fines de ésta. Las autoridades nacionales deberían poner tales leyes o normas en conocimiento del público a la brevedad posible.

    PRINCIPIO TRECE: AUTORIDADES DE PROTECCIÓN DE DATOS

    Los Estados Miembros deberían establecer órganos de supervisión independientes, dotados de recursos suficientes, de conformidad con la estructura constitucional, organizacional y administrativa de cada Estado, para monitorear y promover la protección de datos personales de conformidad con estos Principios. Los Estados Miembros deberían promover la cooperación entre tales órganos.

    La mayoría de los Estados Miembros de la OEA han establecido organismos reguladores nacionales autónomos que se encargan de establecer y hacer cumplir leyes, normas y requisitos relativos a la protección de Datos Personales a fin de mantener la uniformidad en todo el país. En otros Estados Miembros se han establecido normas y autoridades en materia de protección de Datos en distintos niveles del gobierno (nacional, regional y municipal). En otros, los sistemas de reglamentación difieren según el sector o la esfera de actividad (bancaria, médica, educacional, etc.) y la responsabilidad podría estar distribuida entre organismos reguladores y entidades privadas con responsabilidades legales específicas.

    Como no se observa un enfoque uniforme en la región, cada Estado Miembro de la OEA deberá abordar individualmente la naturaleza específica, la estructura, las autoridades y las responsabilidades de estas Autoridades Responsables de la Protección de Datos. La legislación nacional de cada Estado debería dotar a dichas autoridades de la capacidad de cooperar internacionalmente entre sí, así como con las autoridades e instituciones públicas y privadas relevantes –incluyendo las relacionadas al ámbito penal, financiero, del consumidor, entre otras– cuyas labores tengan relación o incidencia con la protección de datos personales.

    Se insta a los Estados Miembros a que establezcan disposiciones, procedimientos o instituciones jurídicos, administrativos y de otros tipos que sean apropiados y eficaces para proteger la privacidad y las libertades individuales con respecto a los Datos Personales. Deberían crear medios razonables para que las personas ejerzan sus derechos y fomentar y apoyar la autorregulación (con códigos de conducta o por otros medios) de los Responsables de Datos y los Encargados de Datos. Asimismo, deberían establecer sanciones y recursos adecuados para los casos de incumplimiento y cerciorarse de que no se discrimine injustamente contra los Titulares de los Datos.

    Los Estados Miembros deberían establecer también los requisitos mínimos para cualquier tipo de protección de Datos que las autoridades escojan, a fin de proporcionarles los recursos, el financiamiento y la pericia técnica que necesiten para desempeñar sus funciones eficazmente.

    ANEXO A

    Parte I. Derecho a la privacidad

    Como se indica en el texto, hay disposiciones relativas a la privacidad, la protección del honor personal y la dignidad, la libertad de expresión y de asociación, y el libre flujo de información en los principales sistemas de derechos humanos del mundo.

    Por ejemplo, el concepto de privacidad está claramente establecido en el artículo V de la Declaración Americana de los Derechos y Deberes del Hombre (1948) y en el artículo 11 de la Convención Americana sobre Derechos Humanos (“Pacto de San José”) (1969) (5).

    El artículo V de la Declaración Americana de los Derechos y Deberes del Hombre dispone lo siguiente:

    Toda persona tiene derecho a la protección de la Ley contra los ataques abusivos a su honra, a su reputación y a su vida privada y familiar.

    Véanse también el artículo IX (“Toda persona tiene el derecho a la inviolabilidad de su domicilio”) y el artículo X (“Toda persona tiene derecho a la inviolabilidad y circulación de su correspondencia”).

    El artículo 11 de la Convención Americana sobre Derechos Humanos dispone lo siguiente:

    1. Toda persona tiene derecho al respeto de su honra y al reconocimiento de su dignidad.

    2. Nadie puede ser objeto de injerencias arbitrarias o abusivas en su vida privada, en la de su familia, en su domicilio o en su correspondencia, ni de ataques ilegales a su honra o reputación.

    3. Toda persona tiene derecho a la protección de la ley contra esas injerencias o esos ataques (6).

    Carta de la Unión Europea

    Solamente en la Carta de los Derechos Fundamentales de la Unión Europea (adoptada en 2000) se aborda la privacidad específicamente en el contexto de la protección de datos.

    El artículo 8 de la Carta dispone lo siguiente:

    1. Toda persona tiene derecho a la protección de los datos de carácter personal que la conciernan.

    2. Estos datos se tratarán de modo leal, para fines concretos y sobre la base del consentimiento de la persona afectada o en virtud de otro fundamento legítimo previsto por la ley. Toda persona tiene derecho a acceder a los datos recogidos que la conciernan y a su rectificación.

    3. El respeto de estas normas quedará sujeto al control de una autoridad independiente.

    Por consiguiente, en la Carta de la Unión Europa al parecer se hace una distinción entre la protección de datos y el derecho al respeto de la vida privada y familiar (art. 7), la libertad de pensamiento, de conciencia y de religión (art. 10), y la libertad de expresión y de información (art. 11).

    Los expertos siguen debatiendo si existe un derecho independiente a la protección de la información personal o si debería considerarse en cambio como parte de un derecho más general a la privacidad (7).

    Parte II. El derecho al libre flujo de información

    El artículo IV de la Declaración Americana de los Derechos y Deberes del Hombre dispone lo

    siguiente:

    Toda persona tiene derecho a la libertad de investigación, de opinión y de expresión y difusión del pensamiento por cualquier medio.

    El artículo 13 de la Convención Americana sobre Derechos Humanos dispone lo siguiente:

    1. Toda persona tiene derecho a la libertad de pensamiento y de expresión. Este derecho comprende la libertad de buscar, recibir y difundir informaciones e ideas de toda índole, sin consideración de fronteras, ya sea oralmente, por escrito o en forma impresa o artística, o por cualquier otro procedimiento de su elección.

    2. El ejercicio del derecho previsto en el inciso precedente no puede estar sujeto a previa censura sino a responsabilidades ulteriores, las que deberían estar expresamente fijadas por la ley y ser necesarias para asegurar:

    a) el respeto a los derechos o a la reputación de los demás, o

    b) la protección de la seguridad nacional, el orden público o la salud o la moral públicas.

    3. No se puede restringir el derecho de expresión por vías o medios indirectos, tales como el abuso de controles oficiales o particulares de papel para periódicos, de frecuencias radioeléctricas, o de enseres y aparatos usados en la difusión de información o por cualesquiera otros medios encaminados a impedir la comunicación y la circulación de ideas y opiniones.

    4. Los espectáculos públicos pueden ser sometidos por la ley a censura previa con el exclusivo objeto de regular el acceso a ellos para la protección moral de la infancia y la adolescencia, sin perjuicio de lo establecido en el inciso 2.

    5. Estará prohibida por la ley toda propaganda en favor de la guerra y toda apología del odio nacional, racial o religioso que constituyan incitaciones a la violencia o cualquier otra acción ilegal similar contra cualquier persona o grupo de personas, por ningún motivo, inclusive los de raza, color, religión, idioma u origen nacional.

    El artículo 19 de la Declaración Universal de Derechos Humanos (1948) dispone lo siguiente:

    Todo individuo tiene derecho a la libertad de opinión y de expresión; este derecho incluye el de no ser molestado a causa de sus opiniones, el de investigar y recibir informaciones y opiniones, y el de difundirlas, sin limitación de fronteras, por cualquier medio de expresión.

    El artículo 10 del Convenio para la protección de los derechos humanos y de las libertades fundamentales (titulado “Libertad de expresión”) dispone lo siguiente:

    1. Toda persona tiene derecho a la libertad de expresión. Este derecho comprende la libertad de opinión y la libertad de recibir o de comunicar informaciones o ideas sin que pueda haber injerencia de autoridades públicas y sin consideración de fronteras. El presente artículo no impide que los Estados sometan a las empresas de radiodifusión, de cinematografía o de televisión a un régimen de autorización previa.

    2. El ejercicio de estas libertades, que entrañan deberes y responsabilidades, podrá ser sometido a ciertas formalidades, condiciones, restricciones o sanciones, previstas por la ley, que constituyan medidas necesarias, en una sociedad democrática, para la seguridad nacional, la integridad territorial o la seguridad pública, la defensa del orden y la prevención del delito, la protección de la salud o de la moral, la protección de la reputación o de los derechos ajenos, para impedir la divulgación de informaciones confidenciales o para garantizar la autoridad y la imparcialidad del poder judicial.

    En la Declaración de Principios de la Cumbre Mundial sobre la Sociedad de la Información, de 2003 (párrs. 24-26) (que se encuentra en: http://www.itu.int/wsis/docs/geneva/official/dop-es.html) se recalca lo siguiente:

    La capacidad universal de acceder y contribuir a la información, las ideas y el conocimiento es un elemento indispensable en una Sociedad de la Información integradora.

    Es posible promover el intercambio y el fortalecimiento de los conocimientos mundiales en favor del desarrollo si se eliminan los obstáculos que impiden un acceso equitativo a la información para actividades económicas, sociales, políticas, sanitarias, culturales, educativas y científicas, y si se facilita el acceso a la información que está en el dominio público, lo que incluye el diseño universal y la utilización de tecnologías auxiliares.

    Un dominio público rico es un factor esencial del crecimiento de la Sociedad de la Información, ya que genera ventajas múltiples tales como un público instruido, nuevos empleos, innovación, oportunidades comerciales y el avance de las ciencias. La información del dominio público debería ser fácilmente accesible en apoyo de la Sociedad de la Información, y debería estar protegida de toda apropiación indebida. Habría que fortalecer las instituciones públicas tales como bibliotecas y archivos, museos, colecciones culturales y otros puntos de acceso comunitario, para promover la preservación de las constancias documentales y el acceso libre y equitativo a la información.

    Parte III. Protección de los datos personales

    A continuación, se presenta una selección de los textos de instrumentos internacionales que más probablemente sean útiles para los legisladores y otras autoridades gubernamentales, en orden cronológico por año de adopción.

    • Principios rectores de las Naciones Unidas para la reglamentación de los ficheros computadorizados de datos personales, adoptados mediante resolución 45/95 de la Asamblea General de las Naciones Unidas (14 de diciembre de 1990)

    Directiva 95/46/EC del Parlamento Europeo y del Consejo relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos (24 de octubre de 1995)

    Convenio del Consejo de Europa para la protección de las personas con respecto al tratamiento automatizado de datos de carácter personal (nº 108, 28 de enero de 1981) y su Protocolo de enmiendas (8 de noviembre de 2001)

    Directiva 2002/58/EC del Parlamento Europeo y del Consejo sobre la privacidad y las comunicaciones electrónicas (12 de julio de 2002)

    • La Resolución de Madrid: Estándares Internacionales sobre Protección de Datos Personales y Privacidad, adoptada por la 31ª Conferencia Internacional de Autoridades de Protección de Datos y Privacidad (5 de noviembre de 2009)

    • El Marco de Privacidad del Foro de Cooperación Económica Asia Pacífico (APEC) (20 de noviembre de 2004), Reglas de Privacidad Transfronteriza de APEC (13 de noviembre 2011), actualización al Marco de Privacidad de APEC aprobada por los ministros de APEC (15 de noviembre de 2016)

    Directrices de la Organización para la Cooperación y el Desarrollo Económico (OCDE) sobre protección de la privacidad y flujos transfronterizos de datos personales (en vigor desde el 23 de septiembre de 1980, actualizados el 12 de septiembre de 2013)

    • Convenio de la Unión Africana sobre Ciberseguridad y Datos Personales (adoptado el 27 de junio de 2014)

    Estándares de Protección de Datos Personales para los Estados Iberoamericanos, adoptados por la Red Iberoamericana de Protección de Datos el 20 de junio de 2017

    Reglamento General de Protección de Datos de la Unión Europea (“GDPR” por sus siglas en inglés), en vigor desde el 25 de mayo de 2018

    • Protocolo de enmiendas al Convenio del Consejo de Europa para la protección de las personas con respecto al tratamiento automatizado de datos de carácter personal (“Convenio 108 plus”, abierto a firma el 10 de octubre de 2018, aún no en vigor)

    • Decisión del Secretario-General de la Organización para la Cooperación y Desarrollo Económico (OCDE) sobre la Protección de Individuos en relación con el Tratamiento de sus Datos Personales, en vigor desde el 3 de mayo de 2019

    ————————————————————————————-

    (1) Con respecto al derecho específico de las personas de tener acceso a la información pública, véase la Ley Modelo Interamericana sobre Acceso a la Información Pública, adoptada por la Asamblea General de la OEA el 8 de junio de 2010 mediante la resolución AG/RES. 2607 (XL-O/10), en la cual se incorporan los principios enunciados por la Corte Interamericana de Derechos Humanos en Claude Reyes vs. Chile, Sentencia de 19 de septiembre de 2006 (Serie C nº 151), así como los Principios sobre el Derecho de Acceso a la Información, adoptados por el Comité Jurídico Interamericano mediante la resolución CJI/RES. 147 (LXXIII-O/08).

    (2) “[E]l ámbito de la privacidad se caracteriza por quedar exento e inmune a las invasiones o agresiones abusivas o arbitrarias por parte de terceros o de la autoridad pública”, Caso de las Masacres de Ituango vs. Colombia, Sentencia de 1 de julio de 2006 (párr. 149), que se encuentra en http://www.corteidh.or.cr/docs/casos/articulos/seriec_148_esp.pdf.

    (3) Véase, en este sentido, el artículo 15 (“Medidas mínimas de seguridad para documentación con datos personales”) de la Ley Modelo Interamericana sobre Gestión Documental (http://www.oas.(7)rg/es/sla/ddi/docs/acceso_informacion_propuesta_ley_modelo_2.0.pdf).

    (4) Véase, en este sentido, Artículo16 “Ejercicio de los derechos de acceso, rectificación y cancelación de los datos personales”, de la Ley Modelo Interamericana de Gestión Documental.

    (5). Véanse también la Declaración Universal de Derechos Humanos (art. 12, 18-20), el Pacto Internacional de Derechos Civiles y Políticos (art. 17-19), el Convenio para la protección de los derechos humanos y de las libertades fundamentales (art. 8-10), la Carta de los Derechos Fundamentales de la Unión Europea (art. 1, 7, 8, 10-12) y la Carta Africana sobre los Derechos Humanos y de los Pueblos (art. 5, 8-11 y 28).

    (6). Además, el artículo 14 de la Convención Americana (“Derecho de Rectificación o Respuesta”) dispone lo siguiente:

    1. Toda persona afectada por informaciones inexactas o agraviantes emitidas en su perjuicio a través de medios de difusión legalmente reglamentados y que se dirijan al público en general, tiene derecho a efectuar por el mismo órgano de difusión su rectificación o respuesta en las condiciones que establezca la ley.

    2. En ningún caso la rectificación o la respuesta eximirán de las otras responsabilidades legales en que se hubiese incurrido.

    3. Para la efectiva protección de la honra y la reputación, toda publicación o empresa periodística, cinematográfica, de radio o televisión tendrá una persona responsable que no esté protegida por inmunidades ni disponga de fuero especial.

    (7) Véase, por ejemplo, Orla Lynskey, “Deconstructing Data Protection: The ‘Added-Value’ of a Right to Data Protection in the EU Legal Order”, 63 Int’l & Comp. Law Q. 569 (2014).

    24Abr/21

    Carta Africana de Derechos Humanos y de los Pueblos de 27 de julio de 1981

    Carta Africana de Derechos Humanos y de los Pueblos de 27 de julio de 1981. (Carta de Banjul). El 27 de junio de 1981 la Asamblea de Jefes de Estado y de Gobierno de la entonces Organización de la Unidad Africana adoptó la Carta Africana de Derechos Humanos y de los Pueblos, sustituida por la Unión Africana a partir de la adopción de su Acta Constitutiva el 12 de julio de 2000 en Lomé, Togo.

    PREÁMBULO

    Los Estados africanos miembros de la Organización para la Unidad Africana, firmantes de este Convenio titulado “Carta africana sobre derechos humanos y de los pueblos”,

    Recordando la Decisión 115, XVI de la Asamblea de jefes de Estado de gobierno, en su decimosexta sesión ordinaria, celebrada en Monrovia, Liberia, del 17 al 20 de julio de 1979, referente a la preparación de “un proyecto preliminar de una Carta africana sobre los derechos humanos y de los pueblos que contemple entre otras cosas la creación de organismos cuya función sea promover y proteger los derechos humanos y de los pueblos”;

    Considerando la Carta de la Organización para la Unidad Africana, la cual estipula que “la libertad, la igualdad, la justicia y la dignidad son objetivos esenciales para la realización de las legítimas aspiraciones de los pueblos africanos”;

    Reafirmando la promesa que hicieron solemnemente en el artículo 2 de dicha Carta de erradicar de África toda forma de colonialismo, coordinar e intensificar su cooperación y esfuerzos por alcanzar una vida mejor para los pueblos de África y fomentar la cooperación con la debida consideración a la Carta de las Naciones Unidas y a la Declaración de los derechos humanos;

    Tomando en consideración las virtudes de su tradición histórica y los valores de la civilización africana que deberían inspirar y caracterizar su reflejo en el concepto de derechos humanos y de los pueblos, Reconociendo, por un lado, que los derechos humanos fundamentales derivan de los atributos de los seres humanos, lo cual justifica su protección internacional, y, por otro lado, que la realidad y el respeto de los derechos de los pueblos deberían necesariamente garantizar los derechos humanos; Considerando que el disfrute de derechos y libertades también implica el cumplimiento de deberes por parte de todos;

    Convencidos de que en lo sucesivo es esencial prestar especial atención al derecho al desarrollo y de que los derechos civiles y políticos no pueden ser disociados de los derechos económicos, sociales y culturales en su concepción y en su universalidad, y de que la satisfacción de los derechos económicos, sociales y culturales constituye una garantía del disfrute de los derechos civiles y políticos;

    Conscientes de su deber de lograr la total liberación de África, cuyos pueblos todavía están luchando por su dignidad y genuina independencia, y comprometiéndose a eliminar el colonialismo, el neocolonialismo, la segregación racial y el sionismo, y a hacer desaparecer las bases militares extranjeras agresivas y toda forma de discriminación, particularmente la basada en la raza, el grupo étnico, el color, el sexo, la lengua, la religión o las opiniones políticas;

    Reafirmando su adhesión a los principios de los derechos y las libertades humanos y de los pueblos contenidos en las declaraciones, convenios y otros instrumentos adoptados por la Organización para la Unidad Africana el Movimiento de los países no alineados y las Naciones Unidas;

    Firmemente convencidos de su deber de promover y proteger los derechos y libertades humanos y de los pueblos teniendo en cuenta la importancia tradicionalmente concedida en África a esos derechos y libertades; Acuerdan lo siguiente:

    PARTE I. DERECHOS Y DEBERES

    CAPITULO I. DERECHOS HUMANOS Y DE LOS PUEBLOS

    Artículo 1.

    Los Estados miembros de la Organización para la Unidad Africana firmantes de la presente Carta reconocerán los derechos, deberes y libertades contemplados en esta Carta y se comprometerán a adoptar medidas legislativas o de otra índole con el fin de llevarlos a efecto.

    Artículo 2.

    Todo individuo tendrá derecho al disfrute de los derechos y libertades reconocidos y garantizados en la presente Carta sin distinción de ningún tipo como raza, grupo étnico, color, sexo, lengua, religión, opinión política o de otra índole, origen social y nacional, fortuna, nacimiento u otro status.

    Artículo 3.

    1. Todos los individuos serán iguales ante la ley.

    2. Todos los individuos tendrán derecho a igual protección de la ley

    Artículo 4.

    Los seres humanos son inviolables. Todo ser humano tendrá derecho al respeto de su vida y de la integridad de su persona. Nadie puede ser privado de este derecho arbitrariamente.

    Artículo 5.

    Todo individuo tendrá derecho al respeto de la dignidad inherente al ser humano y al reconocimiento de su status legal. Todas las formas de explotación y degradación del hombre, especialmente la esclavitud, el comercio de esclavos, la tortura, el castigo y el trato cruel, inhumano o degradante, serán prohibidos.

    Artículo 6.

    Todo individuo tendrá derecho a la libertad y a la seguridad de su persona. Nadie puede ser privado de su libertad más que por razones y condiciones previamente establecidas por la ley. En especial, nadie puede ser arrestado o detenido arbitrariamente.

    Artículo 7.

    1. Todo individuo tiene derecho a que sea visto su caso, lo cual implica:

    a) derecho de apelación a órganos nacionales competentes contra actos que violen sus derechos fundamentales reconocidos y garantizados por los convenios, leyes, ordenanzas y costumbres vigentes;

    b) el derecho a ser considerado inocente hasta que un tribunal competente demuestre su inocencia;

    c) el derecho a la defensa, incluido el derecho a ser defendido por un abogado de su elección;

    d) el derecho a ser juzgado dentro de un plazo de tiempo razonable por un tribunal imparcial.

    2. Nadie puede ser condenado por un acto u omisión que no constituya una ofensa legalmente punible, en el momento en que se cometió. No se puede infligir pena alguna por una ofensa contra la que no existe ninguna disposición en el momento de ser cometida. Las penas son personales y sólo pueden ser impuestas al trasgresor.

    Artículo 8.

    La libertad de conciencia y profesión, y la libre práctica de la religión estarán garantizadas. Nadie que respete la ley y el orden puede ser sometido a medidas que restrinjan el ejercicio de esas libertades.

    Artículo 9.

    1. Todo individuo tendrá derecho a recibir información.

    2. Todo individuo tendrá derecho a expresar y difundir sus opiniones, siempre que respete la ley.

    Artículo 10.

    1. Todo individuo tendrá derecho a la libre asociación, siempre que cumpla con la ley.

    2. De conformidad con la obligación de solidaridad contemplada en el artículo 29, nadie puede ser obligado a formar parte de una asociación.

    Artículo 11.

    Todo individuo tendrá derecho a reunirse libremente con otros. El ejercicio de este derecho estará sujeto solamente a las necesarias restricciones estipuladas por la ley, en especial las decretadas en interés de la seguridad nacional, la seguridad personal, la salud, la ética y los derechos y libertades de los otros.

    Artículo 12.

    1. Todo individuo tendrá derecho a la libertad de tránsito y de residencia dentro de las fronteras de un Estado, siempre que se atenga a la ley.

    2. Todo individuo tendrá derecho a salir de cualquier país, incluido el suyo, y a retornar a su propio país. Este derecho sólo está sujeto a las restricciones estipuladas por la ley para la protección de la seguridad nacional, la ley y el orden, la salud pública o la moral.

    3. Todo individuo tendrá derecho, cuando esté perseguido, a buscar y obtener asilo en otros países de conformidad con las leyes de esos países y los convenios internacionales.

    4. Un extranjero legalmente admitido en un territorio de un Estado firmante de la presente Carta, sólo puede ser expulsado de él en virtud de una decisión tomada de conformidad con la ley.

    5. La expulsión masiva de extranjeros estará prohibida. Expulsión masiva será aquella dirigida a un grupo nacional, racial, étnico o religioso.

    Artículo 13.

    1. Todo ciudadano tendrá derecho a participar libremente en el gobierno de su país, ya sea de modo directo o a través de representantes libremente escogidos de conformidad con las disposiciones de la ley.

    2. Todo ciudadano tendrá derecho a acceder al servicio público de su país.

    3. Todo individuo tendrá derecho a acceder a la propiedad y a los servicios públicos en estricta igualdad con todas las personas ante la ley.

    Artículo 14.

    Estará garantizado el derecho a la propiedad. Este solamente podrá ser usurpado en el interés público o general de la comunidad y de conformidad con las disposiciones de las leyes adecuadas.

    Artículo 15.

    Todo individuo tendrá derecho a trabajar en condiciones justas y satisfactorias, y recibirá igual paga por igual trabajo.

    Artículo 16.

    1. Todo individuo tendrá derecho a disfrutar del mejor estado físico y mental posible.

    2. Los Estados firmantes de la presente Carta tomarán las medidas necesarias para proteger la salud de su pueblo y asegurarse de que reciben asistencia médica cuando están enfermos.

    Artículo 17.

    1. Todo individuo tendrá derecho a la educación.

    2. Todo individuo podrá participar libremente en la vida cultural de su comunidad.

    3. La promoción y protección de la moral y de los valores tradicionales reconocidos por la comunidad serán deberes del Estado.

    Artículo 18.

    1. La familia será la unidad natural y la base de la sociedad. Esta estará protegida por el Estado, el cual se ocupará de su salud física y moral.

    2. El Estado tendrá el deber de asistir a la familia, la cual custodia la moral y los valores tradicionales reconocidos por la comunidad.

    3. El Estado se hará responsable de la eliminación de toda discriminación de la mujer y de la protección de los derechos de la mujer y del niño tal como se estipulan en las declaraciones y convenios internacionales.

    4. Los ancianos y los minusválidos también tendrán derecho a medidas especiales de protección adecuadas a sus necesidades físicas o morales.

    Artículo 19.

    Todos los pueblos serán iguales; todos disfrutarán del mismo respeto y tendrán los mismos derechos. Nada justificará la dominación de un pueblo por otro.

    Artículo 20.

    1. Todos los pueblos tendrán derecho a la existencia. Tendrán el incuestionable e inalienable derecho a la autodeterminación. Decidirán libremente su status político y procurarán su desarrollo económico y social según la política que ellos mismos hayan escogido libremente.

    2. Los pueblos colonizados u oprimidos tendrán derecho a liberarse de las ataduras de la dominación recurriendo a cualquier medio reconocido por la comunidad internacional.

    3. Todos los pueblos tendrán derecho a la ayuda de los Estados firmantes de la presente Carta en su lucha por la liberación de la dominación extranjera, ya sea política, económica o cultural.

    Artículo 21.

    1. Todos los pueblos dispondrán libremente de sus riquezas y recursos naturales. Este derecho será ejercido en el exclusivo interés del pueblo. En ningún caso será pueblo alguno privado de él.

    2. En caso de expoliación, el pueblo desposeído tendrá derecho a la recuperación legal de su propiedad así como a una compensación adecuada.

    3. El derecho a disponer libremente de las riquezas y recursos naturales será ejercido sin perjuicio de la obligación de promover la cooperación económica internacional basada en el respeto mutuo, el intercambio equitativo y los principios del derecho internacional.

    4. Los Estados firmantes de la presente Carta ejercerán, individual y colectivamente, el derecho a disponer de sus riquezas y recursos naturales con vistas a reforzar la unidad y la solidaridad africanas.

    6. Los Estados firmantes de la presente Carta se comprometerán a eliminar toda forma de explotación económica extranjera, especialmente la practicada por los monopolios internacionales, con el fin de posibilitar que sus pueblos se beneficien plenamente de las ventajas derivadas de sus recursos naturales.

    Artículo 22.

    1. Todos los pueblos tendrán derecho a su desarrollo económico, social y cultural, con la debida consideración a su libertad e identidad y disfrutando por igual de la herencia común de la humanidad.

    2. Los Estados tendrán el deber, individual o colectivamente, de garantizar el ejercicio del derecho al desarrollo.

    Artículo 23.

    1. Todos los pueblos tendrán derecho a la paz y a la seguridad nacional e internacional. Los principios de solidaridad y de relaciones amistosas implícitamente afirmados por la Carta de las Naciones Unidas y reafirmados por la de la Organización para la Unidad Africana gobernarán las relaciones entre Estados.

    2. Con el fin de fortalecer la paz, la solidaridad y las relaciones amistosas, los Estados firmantes de la presente Carta garantizarán que:

    a) cualquier individuo que disfrute del derecho de asilo contemplado en el artículo 12 de la presente Carta no realice actividades subversivas contra su país o cualquier Estado firmante de la presente Carta;

    b) sus territorios no serán usados como base para actividades subversivas o terroristas contra el pueblo de cualquier otro Estado firmante de la presente Carta.

    Artículo 24.

    Todos los pueblos tendrán derecho a un entorno general satisfactorio favorable a su desarrollo.

    Artículo 25.

    Los Estados firmantes de la presente Carta tendrán el deber de promover y garantizar por medio de la enseñanza, la educación y la divulgación, el respeto de los derechos y libertades contenidos en la presente Carta y de procurar que estas libertades y derechos, así como las correspondientes obligaciones y deberes, sean entendidos.

    Artículo 26.

    Los Estados firmantes de la presente Carta tendrán el deber de garantizar la independencia de los tribunales de justicia y permitirán la creación y la mejora de instituciones nacionales apropiadas que se ocupen de la promoción y la protección de los derechos y libertades garantizados por la presente Carta.  

    CAPITULO II. DEBERES

    Artículo 27.

    1. Todo individuo tendrá deberes para con su familia y sociedad, para con el Estado y otras comunidades legalmente reconocidas, así como para con la comunidad internacional.

    2. Los derechos y libertades de cada individuo se ejercerán con la debida consideración a los derechos de los demás, a la seguridad colectiva, a la moralidad y al interés común.

    Artículo 28.

    Todo individuo tendrá el deber de respetar y considerar a sus semejantes sin discriminación, y de mantener relaciones encaminadas a promover, salvaguardar y fortalecer el respeto y la tolerancia mutuos.  

    Artículo 29.

    El individuo también tendrá el deber de:

    1. Preservar el desarrollo armonioso de la familia y de fomentar el respeto y la cohesión de ésta; de respetar a sus padres en todo momento y de mantenerlos en caso de necesidad;

    2. Servir a su comunidad nacional poniendo sus aptitudes físicas e intelectuales a su servicio;

    3. No comprometer la seguridad del Estado del cual sea nacional o residente;

    4. Preservar y reforzar la solidaridad nacional y social, especialmente cuando la primera se vea amenazada;

    5. Preservar y reforzar la independencia nacional y la integridad territorial de su país, así como contribuir a su defensa de conformidad con la ley;

    6. Trabajar al máximo de su rendimiento y pagar los impuestos estipulados por la ley en el interés de la sociedad;

    7. Preservar y reforzar los valores culturales africanos positivos en sus relaciones con los demás miembros de la sociedad en un espíritu de tolerancia, diálogo y consulta y, en general, contribuir a la promoción del bienestar moral de la sociedad;

    8. Contribuir en todo lo posible, en todo momento y a todos los niveles a la promoción y la consecución de la unidad africana.  

    PARTE II. MEDIDAS DE SALVAGUARDA

    CAPITULO I. CREACION Y ORGANIZACION DE LA COMISION AFRICANA SOBRE DERECHOS HUMANOS Y DE LOS PUEBLOS 

    Artículo 30.

    Dentro de la Organización para la Unidad Africana se creará una Comisión Africana sobre derechos humanos y de los pueblos, a la cual, a partir de aquí, nos referiremos como “la Comisión“, para promover los derechos humanos y de los pueblos y garantizar su protección en África.

    Artículo 31.

    1. La Comisión constará de once miembros escogidos entre personalidades africanas de la máxima reputación, conocidas por su gran moralidad, integridad, imparcialidad y competencia en materia de derechos humanos de los pueblos; se otorgará una particular consideración a las personas que tengan experiencia legal.

    2. Los miembros de la Comisión actuarán a título personal.

    Artículo 32.

    La Comisión no incluirá a más de un ciudadano del mismo Estado.

    Artículo 33.

    Los miembros de la Comisión serán elegidos en votación secreta por la Asamblea de jefes de Estado y de gobierno, de una lista de personas designadas por los Estados firmantes de la presente Carta.

    Artículo 34.

    Cada Estado firmante de la presente Carta no podrá designar a más de dos candidatos. Los candidatos deberán tener la nacionalidad de uno de los Estados firmantes de la presente Carta. Cuando un Estado designa dos candidatos, uno de ellos puede tener una nacionalidad distinta del Estado que lo designa.

    Artículo 35.

    1. El secretario general de la Organización para la Unidad Africana invitará a los Estados firmantes de la presente Carta, al menos cuatro meses antes de la elección, a designar candidatos;

    2. El secretario general de la Organización para la Unidad Africana confeccionará una lista de las personas designadas, por orden alfabético, y la transmitirá a los jefes de Estado y de gobierno al menos un mes antes de la elección.

    Artículo 36.

    Los miembros de la Comisión serán elegidos para un período de seis años y serán susceptibles de ser reelegidos. Sin embargo, la duración del cargo de cuatro de los miembros elegidos en la primera elección terminará al cabo de dos años, y la de los de los otros tres al cabo de cuatro años.

    Artículo 37.

    Inmediatamente después de la primera elección, el presidente de la Asamblea de Jefes de Estado y de gobierno de la Organización para la Unidad Africana echará a suertes qué miembros ocuparán su cargo durante un período u otro de los señalados en el artículo 36.

    Artículo 38.

    Tras la elección, los miembros de la Comisión realizarán una solemne declaración de su intención de desempeñar sus deberes imparcial y fielmente.

    Artículo 39

    1. En caso de muerte o dimisión de un miembro de la Comisión, el presidente de la misma informará inmediatamente al secretario general de la Organización para la Unidad Africana, el cual declarará el puesto vacante a partir de la fecha de la muerte o de la fecha en que la dimisión sea efectiva.

    2. Si todos los miembros de la Comisión opinan unánimemente que uno de los miembros ha dejado de desempeñar sus deberes por alguna razón que no sea una ausencia temporal, el presidente de la Comisión informará al secretario de la Organización para la Unidad Africana, el cual declarará el puesto vacante.

    3. En los casos anticipados anteriormente, la Asamblea de jefes de Estado y de gobierno designará un sustituto del miembro cuyo puesto ha quedado vacante para el restante período de la duración de su cargo, a no ser que éste sea inferior a seis meses.

    Artículo 40.

    Todo miembro de la Comisión ocupará su cargo hasta que acceda a él su sucesor.

    Artículo 41.

    El secretario general de la Organización para la Unidad Africana nombrará al secretario de la Comisión. También proporcionará el personal y los servicios necesarios para el efectivo cumplimiento de los deberes de la Comisión. La Organización para la Unidad Africana correrá con los gastos originados por el personal y los servicios.

    Artículo 42.

    1. La Comisión elegirá a su presidente y a su vicepresidente para un período de dos años. Estos serán susceptibles de reelección.

    2. La Comisión elaborará su reglamento.

    3. Siete miembros constituirán quórum.

    4. En caso de empate, el presidente tendrá el voto decisivo.

    5. El secretario general puede asistir a las reuniones de la Comisión, pero no participará en las deliberaciones ni tendrá derecho a voto. Sin embargo, el presidente de la Comisión puede invitarlo a hablar.

    Artículo 43.

    Al desempeñar sus funciones, los miembros de la Comisión disfrutarán de los privilegios e inmunidades diplomáticas que se contemplan en el Convenio general sobre privilegios e inmunidades de la Organización para la Unidad Africana.

    Artículo 44.

    En el presupuesto ordinario de la Organización para la Unidad Africana se incluirán los emolumentos y las retribuciones de los miembros de la Comisión.  

    CAPITULO II. MANDATO DE LA COMISION 

    Artículo 45.

    Las funciones de la Comisión serán:

    1. Promover los derechos humanos y de los pueblos, y en especial:

    a) recopilar documentos, emprender estudios e investigar los problemas africanos en materia de derechos humanos y de los pueblos, organizar seminarios, simposios y conferencias, difundir información, alentar a las instituciones nacionales y locales interesadas en los derechos humanos y de los pueblos, y, en su caso, dar sus opiniones o hacer recomendaciones a los gobiernos;

    b) formular y establecer principios y normas destinados a resolver problemas legales relativos a los derechos humanos y de los pueblos y a las libertades fundamentales en los que los gobiernos africanos puedan basar sus legislaciones.

    2. Garantizar la protección de los derechos humanos y de los pueblos en las condiciones establecidas por la presente Carta.

    3. Interpretar todas las disposiciones de la presente Carta a petición de un Estado firmante, de una institución de la OUA o de una organización africana reconocida por la OUA.

    4. Llevar a cabo cualquier otra tarea que la Asamblea de jefes de Estado y de gobierno le encomiende.  

    CAPITULO III. PROCEDIMIENTO DE LA COMISION

    Artículo 46.

    La Comisión puede recurrir a cualquier método de investigación apropiado; puede apelar al secretario general de la Organización para la Unidad Africana o a cualquier otra persona capaz de informarla.

    Comunicados de los Estados

    Artículo 47.

    Si un Estado firmante de la presente Carta tiene buenas razones para creer que otro Estado firmante de esta Carta ha violado las disposiciones de la misma, puede llamar la atención, mediante comunicado escrito de este Estado respecto al tema en cuestión. Ese comunicado también le será remitido al secretario general de la OUA y al presidente de la Comisión. Dentro de un período de tres meses a partir de la fecha de recepción del comunicado, el Estado al que éste va dirigido dará al Estado inquisidor una explicación o declaración escrita que aclare la cuestión. Esta incluirá toda la información relevante posible relativa a las leyes y normativa aplicadas y aplicables y el remedio arbitrado o la acción prevista.

    Artículo 48.

    Si al cabo de tres meses a partir de la fecha en que el comunicado original es recibido por el Estado al que va dirigido, el asunto no ha quedado resuelto a satisfacción de los dos Estados implicados mediante negociación bilateral o cualquier otro procedimiento pacífico, cualquiera de los dos Estados tendrá derecho a remitir el asunto a la Comisión a través del presidente y notificará a los Estados implicados.

    Artículo 49.

    A pesar de las disposiciones del artículo 47, si un Estado firmante de la presente Carta considera que otro Estado firmante ha violado las disposiciones de la Carta, puede remitir el asunto directamente a la Comisión dirigiendo un comunicado al presidente, al secretario general de la Organización para la Unidad Africana y al Estado implicado.

    Artículo 50.

    La Comisión solamente puede ocuparse de un asunto que se le haya remitido tras asegurarse de que se han agotado todos los recursos locales, en caso de que existan, a no ser que sea obvio para la Comisión que el proceso de agotamiento de esos recursos sería demasiado largo.

    Artículo 51.

    1. La Comisión puede solicitar de los Estados implicados que le proporcionen toda la información relevante.

    2. Mientras la Comisión está considerando el asunto, los Estados implicados pueden estar representados ante ella y presentar alegaciones orales o escritas.

    Artículo 52. 

    Tras haber obtenido de los Estados implicados y de otras fuentes toda la información que considere necesaria, y tras haber intentado todos los medios apropiados de llegar a una solución amistosa basada en el respeto los derechos humanos y de los pueblos, la Comisión preparará dentro de un período de tiempo razonable a partir de la fecha de la notificación a la que se hace referencia en el artículo 48, un informe en el que se especifiquen los hechos y sus conclusiones. Ese informe será remitido a los Estados implicados y comunicado a la Asamblea de jefes de Estado y de gobierno.

    Artículo 53.

    Mientras transmite ese informe, la Comisión puede hacer a la Asamblea de jefes de Estado y de gobierno las recomendaciones que considere útiles.

    Artículo 54.

    La Comisión presentará un informe de sus actividades a cada sesión ordinaria de la Asamblea de jefes de Estado y de gobierno.

    Otros comunicados

    Artículo 55.

    1. Antes de cada sesión, el secretario de la Comisión confeccionará una lista de los comunicados distintos de los de los Estados firmantes de la presente Carta y se la transmitirá a los miembros de la Comisión, los cuales indicarán qué comunicados deberán ser considerados por la Comisión.

    2. Un comunicado será considerado por la Comisión si lo decide así una mayoría simple de sus miembros.

    Artículo 56.

    Los comunicados relativos a los derechos humanos y de los pueblos a los que se hace referencia en el artículo 55 recibidos por la Comisión serán considerados si:

    1. sus autores se identifican, aunque soliciten el anonimato;

    2. son compatibles con la Carta de la Organización para la Unidad Africana o con la presente Carta:

    3. no están escritos en un lenguaje despectivo o insultante dirigido contra el Estado implicado, sus instituciones o contra la Organización para la Unidad Africana;

    4. no están basados exclusivamente en noticias difundidas por los medios de comunicación;

    5. son enviados después de agotar los recursos locales, si es que existen, a no ser que resulte obvio que tal proceso sería demasiada largo;

    6. son presentados dentro de un período de tiempo razonable a partir del momento en que se agotaron los recursos locales o de la fecha en que la Comisión es puesta al corriente del asunto; y

    7. no tratan de casos que ya han sido solucionados por los Estados implicados de conformidad con los principios de la Carta de las Naciones Unidas, la Carta de la Organización para la Unidad Africana o las disposiciones de la presente Carta.

    Artículo 57.

    Con anterioridad a cualquier consideración importante todos los comunicados serán transmitidos al Estado implicado por el presidente de la Comisión.

    Artículo 58.

    1. Cuando, tras someterlos a las deliberaciones de la Comisión, parece que uno o más comunicados se refieren a casos especiales que revelan la existencia de una serie de violaciones graves o masivas de los derechos humanos y de los pueblos, la Comisión llamará la atención de la Asamblea de jefes de Estado y de gobierno respecto a esos casos.

    3. La Asamblea de jefes de Estado y de gobierno puede solicitar entonces de la Comisión que emprenda la realización de un estudio a fondo de esos casos y que elabore un informe factual, el cual acompañará de su conclusión y recomendaciones.

    4. Un caso urgente que haya sido detectado por la Comisión será presentado por ésta al presidente de la Asamblea de jefes de Estado y de gobierno, la cual podrá solicitar la realización de un estudio en profundidad.

    Artículo 59.

    1. Todas las medidas tomadas de conformidad con las disposiciones de la presente Carta serán confidenciales hasta que la Asamblea de jefes de Estado y de gobierno decidan lo contrario.

    2. Sin embargo, el informe será hecho público por el presidente de la Comisión por decisión de la Asamblea de jefes de Estado y de gobierno.

    3. El informe de las actividades de la Comisión será hecho público por su presidente tras ser considerado por la Asamblea de jefes de Estado y de gobierno. 

    CAPITULO IV. PRINCIPIOS APLICABLES 

    Artículo 60. 

    La Comisión se basará en la legislación internacional sobre derechos humanos y de los pueblos, especialmente en las disposiciones de los diversos instrumentos africanos referentes a los derechos humanos y de los pueblos, la Carta de las Naciones Unidas, la Carta de la Organización para la Unidad Africana, la Declaración universal de los derechos humanos, otros instrumentos adoptados por las Naciones Unidas y por los países africanos en materia de derechos humanos y de los pueblos, así como en las disposiciones de los diversos instrumentos adoptados por departamentos especializados de las Naciones Unidas de los cuales los firmantes de la presente Carta sean miembros.

    Artículo 61. 

    La Comisión también tomará en consideración como medidas subsidiarias para determinar los principios del derecho aplicables, otros convenios generales o especiales que establezcan normas expresamente reconocidas por los Estados miembros de la Organización para la Unidad Africana, prácticas africanas que concuerdan con las normas internacionales relativas a los derechos humanos y de los pueblos, costumbres generalmente aceptadas como normas, principios generales del derecho reconocidos por los Estados africanos, así como precedentes legales y creencias.

    Artículo 62.

    Todo Estado miembro se comprometerá a presentar cada dos años, a partir de la fecha en que la presente Carta entre en vigor, un informe sobre las medidas legislativas o de otra índole tomadas con el fin de hacer efectivos los derechos y libertades reconocidos y garantizados por la presente Carta.

    Artículo 63.

    1. La presente Carta estará abierta a la firma, ratificación o adhesión de los Estados miembros de la Organización para la Unidad Africana.

    2. Los instrumentos de ratificación o adhesión a la presente Carta deberán serle presentados al secretario general de la Organización para la Unidad Africana.

    3. La presente Carta entrará en vigor tres meses después de la recepción por parte del secretario general de los instrumentos de ratificación o adhesión de una mayoría simple de los Estados miembros de la Organización para la Unidad Africana. 

    PARTE III. DISPOSICIONES GENERALES 

    Artículo 64.

    1. Tras la entrada en vigor de la presente Carta, se elegirán, de conformidad con los artículos relevantes de la misma, los miembros de la Comisión.

    2. El secretario general de la Organización para la Unidad Africana convocará la primera reunión de la Comisión en la sede de la Organización dentro de un período de tres meses a partir de la constitución de la Comisión. De ese momento en adelante, la Comisión será convocada por su presidente cuando sea necesario, pero al menos una vez al año.

    Artículo 65.

    Cada vez que un Estado ratifique o se adhiera a la presente Carta con posterioridad a su entrada en vigor, ésta será efectiva para ese Estado tres meses después de la fecha de presentación del instrumento de ratificación o adhesión por parte de ese Estado.

    Artículo 66.

    Si fuera necesario, la presente Carta se complementaría mediante protocolos o acuerdos especiales.

    Artículo 67.

    El secretario general de la Organización para la Unidad Africana informará a los Estados miembros de la Organización de la presentación de cada instrumento de ratificación o adhesión.

    Artículo 68.

    La presente Carta podrá ser enmendada si un Estado firmante presenta una solicitud escrita a tal efecto al secretario general de la Organización para la Unidad Africana. La Asamblea de jefes de Estado y de gobierno sólo considerará el proyecto de enmienda después de que todos los Estados firmantes hayan sido informados debidamente de él y la Comisión haya dado su opinión a petición del Estado promotor. La enmienda será aprobada por mayoría simple de los Estados firmantes. Esta será efectiva para todos los Estados que la hayan aceptado, de conformidad con su procedimiento constitucional, tres meses después de la recepción por parte del secretario general de la nota de aceptación.

    24Abr/21

    Acta Constitutiva de la Unión Africana, del 12 de julio de 2000

    Acta fundacional de la Unión Africana

    Adoptada el 12 de Julio de 2000 en Lome (Togo) por la 36a Conferencia de los Jefes de Estado y de Gobierno de la Organización de la Unidad Africana (OUA)

    Nosotros, los Jefes de Estado y de Gobierno de los Estados miembros de la Organización de la Unidad Africana (OUA):

    El Presidente de la República Sudafricana

    El Presidente de la República Argelina Democrática y Popular

    El Presidente de la República de Angola

    El Presidente de la República de Benín

    El Presidente de la República de Botswana

    El Presidente de la República de Burkina Faso

    El Presidente de la República de Burundi

    El Presidente de la República de Camerún

    El Presidente de la República de Cabo Verde

    El Presidente de la República Centroafricana

    El Presidente de la República Federal Islámica de las Comores

    El Presidente de la República del Congo

    El Presidente de la República de Costa de Marfil

    El Presidente de la República de Yibuti

    El Presidente de la República Árabe de Egipto

    El Primer Ministro de la República Democrática Federal de Etiopía

    El Presidente del Estado de Eritrea El Presidente de la República de Gabón

    El Presidente de la República de Gambia

    El Presidente de la República de Ghana

    El Presidente de la República de Guinea

    El Presidente de la República de Guinea-Bissau

    El Presidente de la República de Guinea Ecuatorial

    El Presidente de la República de Kenia

    El Primer Ministro del Reino de Lesotho

    El Presidente de la República de Liberia

    El Guía de la Revolución del 1º de Septiembre de la Gran Jamahiriya Árabe Libia Popular y Socialista

    El Presidente de la República de Madagascar

    El Presidente de la República de Malawi

    El Presidente de la República de Malí

    El Primer Ministro de la República de Mauricio

    El Presidente de la República Islámica de Mauritania

    El Presidente de la República de Mozambique

    El Presidente de la República de Namibia

    El Presidente de la República de Níger

    El Presidente de la República Federal de Nigeria

    El Presidente de la República de Uganda

    El Presidente de la República de Ruanda

    El Presidente de la República Democrática de Congo

    El Presidente de la República Árabe Saharaui Democrática

    El Presidente de la República de Sao Tomé y Príncipe

    El Presidente de la República de Senegal

    El Presidente de la República de las Seychelles

    El Presidente de la República de Sierra Leona

    El Presidente de la República de Somalia

    El Presidente de la República de Sudán

    El Rey de Swazilandia

    El Presidente de la República Unida de Tanzania

    El Presidente de la República del Chad

    El Presidente de la República de Togo

    El Presidente de la República deTunicia

    El Presidente de la República de Zambia

    El Presidente de la República de Zimbabwe

    Inspirados por los nobles ideales que han guiado a los Padres Fundadores de nuestra Organización Continental y a las generaciones de panafricanistas en su determinación a promover la unidad, la solidaridad y la cohesión, y a promover la cooperación entre los pueblos de África y entre los Estados Africanos,

    Considerando los principios y los objetivos enunciados en la Carta de la Organización de la Unidad Africana y el Tratado que instituye la Comunidad económica africana;

    Recordando las luchas heroicas hechas por nuestros pueblos y nuestros países por la independencia política, la dignidad humana y la emancipación económica;

    Considerando que desde su creación, la Organización de la Unidad Africana ha desempeñado un papel determinante y precioso en la liberación del Continente, la afirmación de una identidad común y la realización de la unidad de nuestro continente, y ha constituido un marco único para nuestra acción colectiva en África y en nuestras relaciones con el resto del mundo;

    Resueltos a aceptar los desafíos multiformes con los cuales están enfrentados nuestro Continente y nuestros pueblos, a la luz de los cambios sociales, económicos y políticos que se producen en África y en el mundo;

    Convencidos de la necesidad de acelerar el proceso de la implementación del Tratado que instituye la Comunidad económica africana a fin de promover el desarrollo socioeconómico de África y hacer frente de manera más eficaz a los retos de la globalización;

    Guiados por nuestra visión común de una África unida y fuerte, así como por la necesidad de instaurar una colaboración entre los Gobiernos y todas las componentes de la sociedad civil, en particular las mujeres, los jóvenes y el sector privado, a fin de reforzar la solidaridad y la cohesión entre nuestros pueblos;

    Conscientes del hecho de que la plaga de los conflictos en África obstaculiza ahincadamente el desarrollo socioeconómico del continente, y de la necesidad de promover la paz, la seguridad y la estabilidad, condición previa a la ejecución de nuestra agenda por lo que al desarrollo y a la integración se refiere;

    Resueltos a promover y a proteger los derechos del hombre y de los pueblos, a consolidar las instituciones y la cultura democráticas, a promover el buen Gobierno y el Estado de derecho;

    Resueltos asimismo a tomar todas las medidas necesarias para fortalecer nuestras instituciones comunes y a dotarlas de los poderes y recursos necesarios para que puedan cumplir sus misiones con eficacia;

    Recordando la Declaración que hemos adoptado durante el cuarto período de sesiones de nuestra Conferencia en Sirt, en la Gran Jamahiriya Árabe Libia popular socialista, el 09 de septiembre de 1999, y por el cual hemos decidido crear la Unión africana, en consonancia con los objetivos fundamentales de la Carta de la Organización de la Unidad Africana (OUA) y del tratado que instituye la Comunidad económica africana

    HEMOS CONVENIDO EN LO SIGUIENTE:

    Artículo Primero. Definiciones

    En la presente Acta fundacional, se comprende por

    “AEC”, la Comunidad económica africana

    “ACTE”, la presente Acta fundacional; “Conferencia de la Unión”,

    la Conferencia de los Jefes de Estado y de Gobierno de la Unión

    “Carta”, la Carta de la OUA

    “Consejo”, el Consejo económico, social y cultural de la Unión

    “Comité”, un comité técnico especializado

    “Comisión ejecutiva”, la secretaría de la Unión

    “Consejo Ejecutivo”, el Consejo de los Ministros de la Unión

    “Tribunal”, El Tribunal de la Unión;

    “Estado Miembro”, un Estado Miembro de la Unión;

    “OUA”, la Organización de la Unidad Africana;

    “Parlamento”, El Parlamento panafricano de la Unión;

    “Unión”, La Unión Africana creada por la presente Acta Fundacional.

    Artículo 2. Instituciones de la Unión Africana

    Se instituye por las presentes una unión Africana en conformidad con las disposiciones de la presente Acta.

    Artículo 3. Objetivos

    Los objetivos de la Unión son los siguientes:

    a) Realizar una mayor unidad y solidaridad entre los países africanos y entre los pueblos de África;

    b) Defender la soberanía, la integridad territorial y la independencia de sus Estados miembros;

    c) Acelerar la integración política y socioeconómica del continente;

    d) Promover y defender las posiciones africanas colunes sobre asuntos de interés para el continente y sus pueblos;

    e) Fomentar la cooperación internacional, teniendo en cuenta en debida forma la Carta de las Naciones Unidas y de la Declaración universal de los derechos humanos;

    f) Promover la paz, la seguridad y la estabilidad en el continente;

    g) Promover los principios y las instituciones democráticas, la participación popular y el buen gobierno;

    h) Promover y proteger los derechos del hombre y de los pueblos de conformidad con la Carta africana de los derechos del hombre y de los pueblos y con los otros instrumentos pertinentes relativos a los derechos del hombre;

    i) Crear las condiciones idóneas que le permitan al continente desempeñar el papel que es el suyo en la economía mundial y en las negociaciones internacionales;

    j) Promover el desarrollo sostenible en lo económico, lo social y lo cultural, así como la integración de las economías africanas;

    k) Promover la cooperación y el desarrollo en todos los ámbitos de la actividad humana con vistas a mejorar el nivel de vida de los pueblos africanos, mantener y promover la estabilidad económica;

    l) Coordinar y armonizar las políticas entre las Comunidades económicas regionales existentes y futuras con objeto de una realización gradual de los objetivos de la Unión;

    m) Acelerar el desarrollo del continente mediante la promoción de la investigación en todos los sectores, en particular en la ciencia y en la tecnología;

    n) Obrar de común acuerdo con los aliados internacionales pertinentes para la erradicación de las enfermedades evitables y la promoción de la sanidad en el continente.

    Artículo 4. Principios

    Funciona la Unión Africana de conformidad con los principios fundamentales siguientes:

    a) Igualdad soberana y e interdependencia de todos los Estados miembros de la Unión;

    b) Respeto de las fronteras existentes en el momento de la accesión a la independencia

    c) Participación de los pueblos africanos a las actividades de la Unión;

    d) Instauración de una política de defensa común para el continente africano y sus Estados miembros;

    e) Arreglo pacífico de los conflictos entre los Estados miembros de la Unión por medios apropiados que pueden ser decididos por la Conferencia de la Unión;

    f) Prohibición de emplear la fuerza o de amenazar con emplear la fuerza entre los Estados miembros de la Unión;

    g) No injerencia de un Estado miembro en los asuntos interiores de otro Estado miembro;

    h) El derecho de la Unión de intervenir en un Estado miembro por decisión de la conferencia, en algunas circunstancias graves, tales como el genocidio;

    i) Coexistencia pacífica entre los Estados miembros de la Unión y su derecho para vivir en la paz y la seguridad;

    j) Derecho de los Estados miembros de solicitar la intervención de la Unión para restaurar la paz y la seguridad;

    k) Promoción de la autodependencia colectiva, en el marco de la Unión;

    l) Promoción de la igualdad entre los hombres y las mujeres;

    m) Respeto de los principios democráticos, de los derechos del hombre, del Estado de derecho y del buen gobierno;

    n) Promoción de la justicia social para asegurar el desarrollo económico equilibrado;

    o) Respeto del carácter sacrosanto de la vida humana y rechazo de la impunidad, de los asesinatos políticos, los actos de terrorismo y las actividades subversivas;

    p) Condenación y rechazo de los cambios anticonstitucionales de gobierno.

    Artículo 5. Órganos de la Unión

    1.Los órganos de la Unión son los siguientes:

    a) La Conferencia de la Unión;

    b) El Consejo ejecutivo;

    c) El Parlamento panafricano;

    d)El tribunal;

    e) Comisión ejecutiva;

    f) El Comité de los representantes permanentes;

    g) Los Comités técnicos especializados;

    h) El Consejo económico, social y cultural;

    i) Las instituciones financieras.

    2.Puede la Conferencia decidir la creación de otros órganos.

    Artículo 6. La Conferencia de la Unión

    1. Consta la Conferencia de los Jefes de Estado y de Gobierno o de sus representantes debidamente acreditados

    2. La Conferencia es el órgano supremo de la Unión.

    3. La Conferencia se reúne por lo menos una vez al año en sesión ordinaria. A petición de un Estado miembro y por aprobación de los dos tercios de los Estados miembros, ella se reúne en sesión extraordinaria.

    4. La presidencia de la Conferencia la ejerce durante un año un Jefe de Estado o de gobierno elegido, tras consultas entre los Estados miembros.

    Artículo 7. Decisiones de la Conferencia

    1. La Conferencia toma sus decisiones por consenso o, si ello faltare, a la mayoría de los tercios de los Estados miembros de la Unión. No obstante, las decisiones de procedimiento, incluso para determinar si un tema es un tema de procedimiento o no lo es, están tomadas a la mayoría simple

    2. El quórum lo constituyen los dos tercios de los Estados miembros de la Unión para cualquier sesión de la Conferencia

    Artículo 8. Reglamento interior de la Conferencia

    La Conferencia su propio Reglamento interior

    Artículo 9. Poderes y atribuciones de la Conferencia

    1. Los poderes y las atribuciones de la Conferencia son los siguientes:

    a) Definir las políticas comunes de la Unión;

    b) Recibir, examinar y tomar decisiones a partir de los informes y las recomendaciones de los otros órganos de la Unión y tomar decisiones a este respecto

    c) Examinar las solicitudes de adhesión a la Unión;

    d)Crear cualquier órgano de la Unión;

    e) Asegurar el control de la ejecución de las políticas y decisiones de la Unión, y cuidar de su aplicación por todos los Estados miembros;

    f) Adoptar el presupuesto de la Unión;

    g) Dar directrices al Consejo Ejecutivo sobre la gestión de los conflictos y otras situaciones de urgencia así como sobre la restauración de la paz;

    h) Nombrar y revocar a los jueces del Tribunal;

    i) Nombrar el Presidente, el o los vicepresidentes y los Comisarios de la Comisión ejecutiva y determinar sus cargos y sus mandatos;

    2. La Conferencia puede delegar algunos de sus poderes y atribuciones al uno o al otro de los órganos de la Unión.

    Artículo 10. Consejo Ejecutivo

    1. El Consejo ejecutivo está integrado por los Ministros de los Asuntos Exteriores o por cualquier ministro o autoridad designados por los gobiernos de los Estados miembros

    2. El Consejo Ejecutivo se reúne en sesión ordinaria dos veces al año por lo menos. Se reúne asimismo en sesión extraordinaria a petición de un Estado miembro y a reserva de la aprobación de los dos tercios de todos los Estados miembros.

    Artículo 11. Decisiones del Consejo Ejecutivo

    El Consejo ejecutivo toma sus decisiones por consenso o, si ello faltare, a la mayoría de los dos tercios de los Estados miembros de la Unión. No obstante, las decisiones de procedimiento, incluso para determinar si un tema es un tema de procedimiento o no lo es, están tomadas a la mayoría simple.

    El quórum lo constituyen los dos tercios de los Estados miembros para cualquier sesión de Consejo ejecutivo.

    Artículo 12. Reglamento interior del Consejo Ejecutivo

    El Consejo ejecutivo adopta su propia Reglamento interior

    Artículo 13. Atribuciones del Consejo Ejecutivo

    El Consejo Ejecutivo asegura la coordinación y determina las políticas en los ámbitos de interés común para los Estados miembros, especialmente en los sectores siguientes:

    a) Comercio exterior;

    b) Energía, industria y recursos minerales;

    c) Alimentación, agricultura, recursos animales, ganadería y selvas;

    d) Transporte y comunicación;

    e) Seguros;

    f) Recursos hídricos e irrigación;

    g) Educación, sanidad, cultura y revalorización de los recursos humanos;

    h) Protección del medioambiente;

    i) Ciencia y tecnología;

    j) Nacionalidad, residencia de los extranjeros y tema de inmigración;

    k) Seguridad social y elaboración de políticas de protección de la madre y del niño, así como de políticas en beneficio de los minusválidos;

    l) Institución de un sistema de medallas y de premios africanos;

    El Consejo Ejecutivo es responsable ante la Conferencia. Se reúne para examinar los temas que le someten y controlar la ejecución de las políticas decididas por la Conferencia

    El Consejo puede delegar todo o parte de sus poderes y atribuciones mencionados en el párrafo 1 del presente artículo a los Comités técnicos especializados creados en los términos previstos por el artículo 14 de la presente Acta.

    Artículo 14. Los Comités Técnicos Especializados

    Creación y Composición

    Están creados los Comités técnicos especializados siguientes:

    a) El Comité encargado de las cuestiones de Economía Rural y de Agricultura;

    b) El Comité encargado de los Asuntos Monetarios y Financieros;

    c) El Comité encargado de las Cuestiones comerciales, aduaneras y de inmigración;

    d) El Comité encargado de la industria, de la Ciencia y de la Tecnología, de la Energía, de los Recursos Naturales y del medioambiente;

    e) El Comité encargado de los transportes, de las comunicaciones y del Turismo

    f) El Comité encargado de la Sanidad, del Trabajo y de los Asuntos Sociales;

    g) El Comité encargado de la Educación, d la Cultura y de los Recursos Humanos

    La Conferencia puede, en caso necesario, reestructurar los Comités existentes o crear nuevos.

    Cada Comité está integrado por un representante de cada uno de los Estados miembros. Los representantes pueden estar asesorados por Consejeros.

    Artículo 15. Atribuciones de los Comités técnicos especializados

    Cada uno de los Comités, de conformidad con su competencia, tiene mandato para:

    a) Preparar proyectos y programas de la Unión y someterlos al Consejo ejecutivo;

    b) Asegurar el seguimiento y la evaluación de la aplicación de las decisiones tomadas por los órganos de la Unión;

    c) Asegurar la coordinación y la armonización de los proyectos y programas de la Unión;

    d) Presentar informes y recomendaciones al Consejo ejecutivo, sea por propia iniciativa, sea a petición del Consejo Ejecutivo, sobre la ejecución de las disposiciones de la presente Acta; y

    e) Llevar a cabo cualquier tarea que podría serle confiada, en cumplimiento de lo dispuesto en la presente Acta.

    Artículo 16. Reuniones

    A reserva de las directrices que pueden ser dadas por el Consejo ejecutivo, cada comité se reúne lo más frecuentemente que sea necesario y establece su reglamento interior que somete al Consejo ejecutivo para aprobación.

    Artículo 17. El Parlamento

    Con objeto de asegurar la plena participación de los pueblos africanos al desarrollo y a la integración económica del continente, está creado un Parlamento panafricano.

    La composición, los poderes, las atribuciones y la organización del Parlamento panafricano están definidos en un protocolo correspondiente.

    Artículo 18. Tribunal

    Está creado un Tribunal de la Unión.

    Los estatutos, la composición y los poderes del Tribunal están definidos en un protocolo correspondiente.

    Artículo 19. Instituciones Financieras

    La Unión Africana está dotada de las instituciones financieras siguientes, cuyos estatutos están definidos en protocolos correspondientes:

    a) El Banco Central Africano;

    b) El Fondo monetario Africano;

    c) El Banco Africano de inversión.

    Artículo 20. Comisión Ejecutiva

    Está creada una Comisión ejecutiva que es la Secretaría de la Unión.

    La Comisión ejecutivo está integrada por el Presidente, el o los Vicepresidentes y los Comisarios. Les asesora el personal necesario para el buen funcionamiento de la Comisión.

    La estructura, las atribuciones y los reglamentos de la Comisión ejecutiva son determinados por la Conferencia.

    Artículo 21. Comité de los representantes permanentes

    Está creado, ante la Unión, un Comité de los representantes permanentes. Está integrado por los representantes permanentes y los otros plenipotenciarios de los Estados miembros.

    El Comité de los Representantes permanentes es responsable de la preparación de los trabajos del Consejo ejecutivo y obra por mandato del Consejo. Puede instituir cualquier subcomité o grupo de trabajo que fuere necesario.

    Artículo 22. El Consejo económico, social y cultural

    El Consejo económico, social y cultural es un órgano consultivo integrado por los representantes de las diferentes categorías socio profesionales de los Estados miembros de la Unión.

    Las atribuciones, los poderes, la composición y la organización del Consejo económico, social y cultural son determinados por la Conferencia.

    La estructura, las atribuciones y los reglamentos de la Comisión ejecutiva son determinados por la Conferencia.

    Artículo 23. Imposición de sanciones

    La Conferencia determina las sanciones apropiadas que se imponen a cualquier Estado miembro culpable de impago de sus contribuciones al presupuesto de la Unión así: privación del derecho de tomar la palabra durante las reuniones, de voto, de derecho para los naturales del Estado miembro incriminado de ocupar un puesto o un cargo en el seno de los órganos de la Unión, de beneficiar de cualquier actividad o de la ejecución de cualquier compromiso en el marco de la Unión.

    Además, cualquier Estado miembro que no se conformaría con las decisiones y políticas de la Unión puede estar sancionado en particular en lo que se refiere a los transportes y a las comunicaciones y en los ámbitos político y económico.

    Artículo 24. Sede de la Unión

    La Sede de la Unión Africana está en Addis-Abeba (República Federal Democrática de Etiopía)

    La Conferencia puede, por recomendación del Consejo ejecutivo, crear donde ella lo juzgare necesario, oficinas de la Unión africana y relativas a los papeles de la Unión en los Estados miembros.

    Artículo 25. Lenguas de Trabajo

    Las lenguas de Trabajo de la Unión y de todas sus instituciones son, si posible, las lenguas africanas, el árabe, el inglés, el francés y el portugués.

    Artículo 26. Interpretación

    Cualquier asunto que se originare en la interpretación de la presente Acta está sometido al Tribunal. Hasta la instalación de éste, el asunto está sometido a la Conferencia que lo resuelve a la mayoría de los dos tercios.

    Artículo 27. Firma y ratificación

    1. La presente Acta está abierta a la firma y a la ratificación de los Estados miembros de la OUA, de conformidad con sus procedimientos constitucionales respectivos.

    2. Los instrumentos de ratificación están depositados en la Secretaría General de la OUA

    Artículo 28. Entrada en vigor

    La presente Acta entra en vigor treinta (30) días después del depósito de los instrumentos de ratificación por los dos tercios de los Estados miembros de la OUA.

    Artículo 29. Adhesión a la presente Acta y admisión como miembro de la Unión.

    1. Cualquier Estado Africano puede, en cualquier momento después de la entrada en vigor de la presente Acta, notificar al Presidente de la Comisión ejecutivo su intención de adherir a la presente Acta y de estar admitido como miembro de la Unión.

    El Presidente de la Comisión ejecutiva, al recibir tal notificación, comunica copias de ésta a todos los Estados miembros. La admisión está decidida a la mayoría simple de los Estados miembros. La decisión de cada Estado miembro está transmitida al Presidente de la Comisión Ejecutiva quien comunica la decisión de admisión al Estado candidato, después de recibir el número de votos necesarios.

    Artículo 30. Suspensión

    Los Gobiernos que acceden al poder por medios anticonstitucionales no están admitidos a participar a las actividades de la Unión.

    Artículo 31. Pérdida de la calidad de miembro

    1. Cualquier Estado que quiere retirarse de la Unión lo notifica por escrito al Presidente de la Comisión ejecutiva, el cual informa los Estados miembros. Un año después de la notificación, si ésta no está retirada, la presente Acta deja de aplicarse al Estado concernido, que, por esto, deja de ser miembro de la Unión

    2. Durante el período de un año aludido en el párrafo 1 de la presente Acta, cualquier Estado miembro que desea retirarse de la Unión debe conformarse con las disposiciones de la presente Acta y se ve precisado a cumplir con sus obligaciones según la presente Acta hasta el día de su retirada.

    Artículo 32. Enmienda y revisión

    Cualquier Estado miembro puede presentar propuestas de enmienda o de revisión de la presente Acta.

    Las propuestas de enmienda o de revisión están sometidas al Presidente de la Comisión ejecutiva quien comunica copias a los Estados miembros en los treinta (30) días que siguen la fecha de recepción.

    La Conferencia de la Unión, por aviso del Consejo ejecutivo, examina estas propuestas en un plazo de un año después de la notificación de los Estados Miembros, en conformidad con las disposiciones del párrafo (2) del presente artículo.

    Las enmiendas o revisiones son adoptadas por la Conferencia de la Unión por consenso o, si ello faltare, a la mayoría de los dos tercios, y sometidas a la ratificación de todos los Estados miembros en conformidad con sus procedimientos constitucionales respectivos. Las enmiendas o revisiones entran en vigor treinta (30) días después del depósito, ante el Presidente de la Comisión Ejecutiva, de los instrumentos de ratificación por los dos tercios de sus Estados miembros.

    Artículo 33. Disposiciones finales y avenencias transitorias

    La presente Acta reemplaza la Carta de la Organización de la Unidad Africana. No obstante, dicha Carta queda vigente durante un período transitorio que no excede un año o cualquier otro plazo fijado por la Conferencia, después de la entrada en vigor de la presente Acta, para permitirle a la OUA/AEC tomar las medidas apropiadas para la transmisión de su activo y de su pasivo a la Unión, en lo posible, y de todos los asuntos correspondientes

    Las disposiciones de la presente Acta tienen también precedencia y reemplazan las disposiciones del Tratado de Abuja que instituye la Comunidad económica africana, las cuales podrían ser contrarias a la presente Acta.

    Desde la entrada en vigor de la presente Acta, todas las medidas idóneas están tomadas para implementar sus decisiones y crear los órganos previstos por la presente Acta, en conformidad con las directrices o decisiones que podrían ser adoptadas a este respecto por los Estados Partes a la presente Acta durante el período de transición estipulada arriba.

    Mientras se espere la creación de la Comisión ejecutiva, la Secretaría general de la OUA es la Secretaría interina de la Unión.

    Y PARA QUE CONSTE, hemos adoptado la presente Acta.

    Expedida en Lome, TOGO el 12 de Julio de 2000.

    22Abr/21

    Resolución Propuesta de Principios de la OEA sobre la privacidad y la protección de datos personales con anotaciones, CJI/Res. 212/15, aprobada en marzo de 2015.

    Resolución Propuesta de Principios de la OEA sobre la privacidad y la protección de datos personales con anotaciones, CJI/Res. 212/15, aprobada en marzo de 2015.

    86º PERÍODO ORDINARIO DE SESIONES OEA/Ser.Q
    23 – 27 marzo 2015 CJI/RES. 212 (LXXXVI-O/15)

    Rio de Janeiro, Brasil 27 de marzo 2015
    CJI/RES. 212 (LXXXVI-O/15)

    PROTECCIÓN DE DATOS PERSONALES

    EL COMITÉ JURÍDICO INTERAMERICANO,

    CONSIDERANDO

    el mandato acordado por la Asamblea General en junio del 2013, por medio de la resolución AG/RES. 2811 (XLIII-O/13), que encomendó al Comité Jurídico Interamericano que “formule propuestas a la Comisión de Asuntos Jurídicos y Políticos sobre las
    distintas formas de regular la protección de datos personales, incluyendo un proyecto de Ley Modelo sobre Protección de Datos Personales, tomando en cuenta los estándares internacionales alcanzados en la materia”;


    VISTO

    el informe presentado por el relator del tema, doctor David P. Stewart el 24 de marzo de 2015, “Privacidad y protección de datos personales”, documento CJI/doc.474/15 rev.1, que contiene una guía legislativa para los Estados Miembros compuesta de doce “Principios de la OEA sobre protección de la privacidad y los datos personales con anotaciones”,

    RESUELVE:

    1. Agradecer al relator del tema doctor David P. Stewart por la presentación del documento “Privacidad y protección de datos personales”, documento CJI/doc.474/15 rev.1.
    2. Aprobar el Informe del Comité Jurídico Interamericano, “Privacidad y protección de datos personales”, documento CJI/doc.474/15 rev.2, anexo a la presente resolución.
    3. Transmitir esta resolución al Consejo Permanente de la Organización de los Estados Americanos.
    4. Dar por concluido los trabajos del Comité Jurídico Interamericano sobre este tema.

    La presente resolución fue aprobada por unanimidad en la sesión celebrada el 27 de marzo de 2015, por los siguientes miembros:

    doctores

    Miguel Aníbal Pichardo Olivier,

    Ana Elizabeth Villalta Vizcarra,

    Joel Hernández García,

    José Luis Moreno Guerra,

    Fabián Novak Talavera,

    João Clemente Baena Soares,

    Gélin Imanès Collot,

    Hernán Salinas Burgos,

    Ruth Stella Correa Palacio,

    David P. Stewart y

    Carlos Alberto Mata Prates.

    21Abr/21

    Ley nº 19.983, de 12 de noviembre de 2004

    Ley nº 19.983, de 12 de noviembre de 2004. Regula la transferencia y otorga mérito ejecutivo a copia de la factura. (Publicada el 15 de diciembre de 2004).

    Teniendo presente que el H. Congreso Nacional ha dado su aprobación al siguiente

     Proyecto de ley:

    Artículo 1º.- En toda operación de compraventa, de prestación de servicios, o en aquellas que la ley asimile a tales operaciones, en que el vendedor o prestador del servicio esté sujeto a la obligación de emitir factura, deberá emitir una copia, sin valor tributario, de la factura original, para los efectos de su transferencia a terceros o cobro ejecutivo, según lo dispuesto en esta ley.

    El vendedor o prestador del servicio deberá dejar constancia en el original de la factura y en la copia indicada en el inciso anterior, del estado de pago del precio o remuneración de las modalidades de solución del saldo insoluto, en su caso, y del plazo de pago.

    (Artículo 1, nº 1 de la Ley 21.131, D.O. 16 de enero de 2019)

    Artículo 2º.- La obligación de pago del saldo insoluto contenido en la factura deberá ser cumplida de manera efectiva en el plazo máximo de treinta días corridos contado desde la recepción de la factura.

    (Artículo 1, nº 2, Ley 21.131, D.O. 16 de enero de 2019)

    En casos excepcionales, las partes podrán establecer de común acuerdo un plazo que exceda el referido en el inciso anterior, siempre que dicho acuerdo conste por escrito, sea suscrito por quienes concurran a él y no constituya abuso para el acreedor.

    (Artículo único a) de la Ley 21.217, D.O. 3 de abril de 2020)

    Sin perjuicio de lo anterior, dichos acuerdos no podrán celebrarse en casos en que participen, por una parte, empresas de menor tamaño, según se definen en la ley N° 20.416, como vendedoras o prestadoras de servicios y, por otra, empresas que superen el valor más alto de los ingresos anuales indicados en la referida ley, como compradoras o beneficiarias del bien o servicio. Excepcionalmente, estos acuerdos podrán pactarse, si el plazo de pago de la factura que exceda el establecido en el inciso primero, es en beneficio de la empresa de menor tamaño acreedora, y solo en aquellos casos que contemplen realización de pruebas, pagos anticipados, parcializados o por avances.

    Estos acuerdos deberán ser inscritos dentro del plazo de cinco días hábiles siguientes a la celebración del mismo, en un registro que llevará al efecto el Ministerio de Economía, Fomento y Turismo, identificando a los contratantes, su rubro o actividad económica, fecha de celebración y plazo de pago, en la forma que establezca el reglamento. La información contenida en el registro, en lo que se refiere a los compradores o beneficiarios del servicio, la existencia del acuerdo y el plazo de pago, será de carácter y acceso público.

    (Artículo único b) de la Ley 21.217, D.O. 3 de abril de 2020)

    Las estipulaciones referentes al plazo de pago excepcional o que no cumplan con todos los requisitos exigidos por esta norma, contenidas en los acuerdos que no hayan sido inscritos en conformidad al inciso anterior, se tendrán por no escritas y regirá como plazo de pago el de treinta días establecido en el inciso primero.

    En todo caso, cualquiera sea el plazo convenido por las partes, no producirán efecto alguno las cláusulas o estipulaciones que intenten demorar indebidamente el pago de la factura al vendedor o prestador del servicio. En especial, las cláusulas o estipulaciones que:

    1. Otorguen al comprador o beneficiario del servicio la facultad de dejar sin efecto o modificar a su solo arbitrio el contrato, sin requerir del consentimiento previo y expreso del vendedor o prestador del servicio, sin perjuicio de las excepciones que las leyes contemplen.

    2. Contengan limitaciones absolutas de responsabilidad que puedan privar al vendedor o prestador del servicio de su derecho de resarcimiento frente a incumplimientos contractuales.

    3. Establezcan intereses por no pago inferiores a los que se establecen en el artículo siguiente.

    4. Establezcan un plazo de pago contado desde una fecha distinta de la recepción de la factura.

    5. Tengan por objetivo retrasar el plazo de pago de la factura, estableciendo pagos parcializados, salvo en las operaciones a que se refiere el inciso tercero.

    6. Las demás que establezcan las leyes.

    (Artículo único c) de la Ley 21.217, D.O. 3 de abril de 2020)

    En ausencia de mención expresa en la factura y su copia transferible del plazo de pago, se entenderá que debe ser pagada dentro de los treinta días corridos siguientes a la recepción de la factura.

    —————————————————————–

    NOTA

        El artículo 2° de la ley 21.193, publicada el 12.12.2019, establece que el plazo máximo de pago establecido en el inciso primero del presente artículo, será de sesenta días corridos contados desde la recepción de la factura, por el tiempo que medie hasta el último día del tercer mes contado desde la publicación de la referida ley. Transcurridos los tres meses antes señalados, el plazo máximo de pago será el establecido en el inciso primero de este artículo.

    ——————————————————————

    Artículo 2º bis.- Si no se verificare el pago dentro de los plazos señalados en el artículo anterior, se entenderá, para todos los efectos legales, que el deudor ha incurrido en mora, devengándose desde el primer día de mora o simple retardo y hasta la fecha del pago efectivo, un interés igual al interés corriente para operaciones no reajustables en moneda nacional de más de noventa días, por montos superiores al equivalente a 200 unidades de fomento e inferiores o iguales al equivalente de 5.000 unidades de fomento, que rija durante dicho período, en conformidad a la ley Nº 18.010, sobre las operaciones de crédito y otras obligaciones de dinero. En el caso de los órganos del Estado, este interés será pagado con cargo a sus respectivos presupuestos.

    (Artículo 1, nº 3 de la Ley 21.131, D.O. 16 de enero de 2019)  

    Artículo 2º ter.- El comprador o beneficiario del bien o servicio que esté en mora deberá pagar una comisión fija por recuperación de pagos equivalente al 1% del saldo insoluto adeudado.

    (Artículo 1 nº 3 de la Ley 21.131, D.O. 16 de enero de 2019)

    Artículo 2º quáter.- Respecto de los contratos de suministro y prestación de servicios que se celebren por los organismos públicos afectos a las normas de la ley Nº 19.886, los pagos a sus proveedores deberán efectuarse dentro de los treinta días corridos siguientes a la recepción de la factura o del respectivo instrumento tributario de cobro, salvo en el caso de las excepciones legales que establezcan un plazo distinto. Sin perjuicio de lo anterior, dichas entidades podrán establecer un plazo de hasta sesenta días corridos en las bases de licitación respectivas, tratándose de licitaciones públicas o privadas, o en los contratos, tratándose de contratación directa, circunstancia que deberá sustentarse en motivos fundados. En este caso, deberán informar a través del Sistema de Información de Compras y Contrataciones de la Administración, establecido en el Capítulo IV de la ley Nº 19.886.

    (Artículo 1 nº 3 de la Ley 21.131, D.O. 16 de enero de 2019)

    Con todo, para proceder a los mencionados pagos se requerirá que previamente la respectiva entidad certifique la recepción conforme de los bienes o servicios adquiridos por aquella dentro del plazo establecido en el artículo 3º de esta ley. No obstante, en las contrataciones de montos inferiores al límite fijado por la ley Nº 19.886 y su reglamento, que hayan sido celebradas por medios electrónicos, de acuerdo al artículo 12 A de la ley Nº 19.496, que establece normas sobre protección de los derechos de los consumidores, se podrá efectuar el pago en forma previa a la recepción conforme del producto, manteniendo el respectivo organismo público contratante su derecho de retracto, así como los derechos y deberes del consumidor, establecidos en el Párrafo 1º del Título II de dicha ley.

    El cumplimiento de lo dispuesto en este artículo será verificado por la unidad de auditoría interna de cada organismo público o por aquella que cumpla tales funciones.

    (Artículo 1 nº 3 de la Ley 21.131, D.O. 16 de enero de 2019)

    Artículo 2º quinquies.- Si no se efectuare el pago dentro de los plazos dispuestos en las respectivas bases de licitación o en el contrato, de acuerdo a lo preceptuado en el artículo anterior, se generarán las responsabilidades administrativas de los funcionarios que pudieran corresponder, sin perjuicio de lo establecido en los artículos 2º bis y 2º ter.

    Las sanciones administrativas previstas en este artículo serán aplicadas por la autoridad competente, previa instrucción de una investigación sumaria o sumario administrativo, ajustándose a las normas pertinentes. Con todo, la Contraloría General de la República, de acuerdo a las normas de su ley orgánica, podrá incoar el sumario y establecer las sanciones que correspondan.

    (Artículo 1 nº 3 de la Ley 21.131, D.O. 16 de enero de 2019)

    Artículo 3º.- Para los efectos de esta ley, se tendrá por irrevocablemente aceptada la factura si no se reclamara en contra de su contenido o de la falta total o parcial de la entrega de las mercaderías o de la prestación del servicio, mediante alguno de los siguientes procedimientos:

    (Artículo 4 nº 1 a) de la Ley 20.956, D.O. 26 de octubre de 2016)

    1. Devolviendo la factura y la guía o guías de despacho, en su caso, al momento de la entrega, o

    (Artículo 4 nº 1 b) de la Ley 20.956, D.O. 26 de octubre de 2016)

    2. Reclamando en contra de su contenido o de la falta total o parcial de la entrega de las mercaderías o de la prestación del servicio, dentro de los ocho días corridos siguientes a su recepción. En este caso, el reclamo deberá ser puesto en conocimiento del emisor de la factura por carta certificada, o por cualquier otro modo fehaciente, conjuntamente con la devolución de la factura y la guía o guías de despacho, o bien junto con la solicitud de emisión de la nota de crédito correspondiente. El reclamo se entenderá practicado en la fecha de envío de la comunicación.

    La factura también se tendrá por irrevocablemente aceptada cuando el deudor, dentro del plazo de ocho días señalado anteriormente, declare expresamente aceptarla, no pudiendo con posterioridad reclamar en contra de su contenido o de la falta total o parcial de entrega de las mercaderías o de la prestación del servicio, o del plazo de pago.

    (Artículo 4 nº 1 c) de la Ley 20.956, D.O. 26 de octubre de 2016)

    (Artículo 1 nº 4 a) de la Ley 21.131, D.O. 16 de enero de 2019)

    Serán inoponibles a los cesionarios de una factura irrevocablemente aceptada, las excepciones personales que hubieren podido oponerse a los cedentes de la misma, así como aquellas fundadas en la falta total o parcial de entrega de las mercaderías o de la prestación del servicio, sin perjuicio de las acciones civiles y penales que correspondan contra el emisor.

    (Artículo único nº 1 de la Ley 20.323, D.O. 29 de enero de 2009)

    (Artículo 4, nº 1 d) de la Ley 20.956, D.O. 26 de octubre de 2016)

    (Artículo 1 nº 4 b) de la Ley 21.131, D.O. de 16 de enero de 2019)

    Asimismo, serán inoponibles a los cesionarios las notas de crédito y débito emitidas respecto de facturas irrevocablemente aceptadas.

    Artículo 4º.- La copia de la factura señalada en el artículo 1º, quedará apta para su cesión al reunir las siguientes condiciones:

    a) Que haya sido emitida de conformidad a las normas que rijan la emisión de la factura original, incluyendo en su cuerpo en forma destacada la mención “cedible”, y

    b) Que en la misma conste el recibo de las mercaderías entregadas o del servicio prestado, con indicación del recinto y fecha de la entrega o de la prestación del servicio y del nombre completo, rol único tributario y domicilio del comprador o beneficiario del servicio e identificación de la persona que recibe, más la firma de este último. En el evento que se omitiere consignar en el acto de recibo el nombre completo, rol único tributario o domicilio del comprador o beneficiario del servicio, se presumirá que son los que se consignan en la factura. Si se omitiere consignar el recinto de entrega, se presumirá entregado en el domicilio del comprador o beneficiario del servicio señalado en la factura.

    (Artículo único nº 2, a) de la Ley 20.323, D.O. 29 enero 2019)

    En caso de que en la copia de la factura no conste el recibo mencionado, será cedible cuando se acompañe una copia de la guía o guías de despacho emitida o emitidas de conformidad a la ley, en las que conste el recibo correspondiente. Para estos efectos, el emisor de la guía o guías de despacho deberá extender una copia adicional a las que la ley exige, con la mención “cedible con su factura”.

    (Artículo 4 nº 2 a) de la Ley 20.956. D.O. 26 octubre 2016)

    Para los efectos previstos en la letra b) y en el inciso anterior, se presume que representa al comprador o beneficiario del servicio la persona adulta que reciba a su nombre los bienes adquiridos o los servicios prestados.

    (Artículo 4 nº 2 b) de la Ley 20.956, D.O. 26 de octubre de 2016)

    El recibo a que se refiere el literal b) del inciso primero deberá efectuarse dentro de los ocho días corridos siguientes a la recepción de la factura. En caso que el recibo no haya sido efectuado en el plazo señalado y tampoco haya existido reclamo en contra de su contenido o de la falta total o parcial de entrega de las mercaderías o de la prestación del servicio mediante alguno de los procedimientos establecidos en el artículo 3°, se presumirá que las mercaderías han sido entregadas o el servicio ha sido prestado. En este último caso, la factura quedará apta para su cesión, sin necesidad de que el recibo conste en la misma.

    (Artículo 4 nº 2 b) de la Ley 20.956, D.O. 26 octubre 2016)

    En caso de otorgarse el recibo a que se refiere el literal b) del inciso primero o haber transcurrido el plazo indicado en el inciso precedente, sin que haya existido reclamo en contra del contenido de la factura o de la falta total o parcial de entrega de las mercaderías o de la prestación del servicio mediante alguno de los procedimientos establecidos en el artículo 3°, se presumirá de derecho que son válidas las cesiones de que hubiere sido objeto la factura a la fecha del recibo o del vencimiento del plazo, siempre que ésta cumpliera, al momento de la cesión, con lo indicado en el literal a) del inciso primero.

    (Artículo único nº 2 b) de la Ley 20.323, D.O. 29 enero 2009)

    Se prohíbe todo acuerdo, convenio, estipulación o actuación de cualquier naturaleza que limite, restrinja o prohíba la libre circulación de un crédito que conste en una factura. Asimismo, queda prohibida la retención, destrucción, inutilización u ocultamiento de la copia cedible de la factura, así como la no entrega del recibo señalado en la letra c) del artículo 5°. En caso de infracción, el juzgado de policía local correspondiente al domicilio del infractor aplicará una indemnización en favor del requirente, por el monto equivalente a dos y hasta cinco veces el valor de la o las facturas objeto de la infracción. El propio afectado, cualquier interesado, y las asociaciones gremiales u otras que representen a empresarios de cualquier tipo, siempre que gocen de personalidad jurídica, podrán incoar la acción judicial tendiente a la aplicación de esta sanción, la que será conocida por el tribunal conforme a las disposiciones de la ley Nº 18.287. Para efectos de la percepción de la indemnización, el afectado requirente preferirá a cualquier interesado y éste, si tuviera interés económico comprometido previo al reclamo, a las referidas asociaciones.

    Artículo 5º.- La misma copia referida en el artículo anterior tendrá mérito ejecutivo para su cobro, si cumple los siguientes requisitos:

    a) Que la factura correspondiente no haya sido reclamada de conformidad al artículo 3º de esta ley;

    b) Que su pago sea actualmente exigible y la acción para su cobro no esté prescrita;

    c) Que en la misma conste el recibo de las mercaderías entregadas o del servicio prestado, con indicación del recinto y fecha de la entrega de las mercaderías o de la prestación del servicio e identificación de la persona que recibe las mercaderías o el servicio, más la firma de este último, o que haya transcurrido el plazo establecido en el inciso cuarto del artículo 4° precedente sin haber sido las facturas reclamadas conforme al artículo 3°.

    (Artículo único nº 3 a) de la Ley 20.323, D.O. 29 enero 2009)

    (Artículo 4 nº 3 a) de la Ley 20.956, D.O. 26 octubre 2016)

    En todo caso, si en la copia de la factura no consta el recibo mencionado, ella podrá tener mérito ejecutivo cuando se la acompañe de una copia de la guía o guías de despacho emitida o emitidas de conformidad a la ley, en las que conste el recibo correspondiente.

    Será obligación del comprador o beneficiario del servicio otorgar el recibo a que se refieren los párrafos precedentes y la letra b) del artículo 4°, en el momento de la entrega real o simbólica de las mercaderías o, tratándose de servicios, al momento de recibir la factura.

    PÁRRAFO ELIMINADO

    (Artículo único nº 3 b) de la Ley 20.323, D.O. 29 enero 2009)

    (Artículo 4 nº 3 b) de la Ley 20.956, D.O. 26 octubre 2016)

    d) Que, puesta en conocimiento del obligado a su pago mediante notificación judicial, aquél no alegare en el mismo acto, o dentro de tercero día, la falsificación material de la factura o guía o guías de despacho respectivas, o del recibo a que se refiere el literal precedente, o que, efectuada dicha alegación, ella fuera rechazada por resolución judicial. La impugnación se tramitará como incidente y, en contra de la resolución que la deniegue, procederá el recurso de apelación en el solo efecto devolutivo.

    El que dolosamente impugne de falsedad cualquiera de los documentos mencionados en la letra c) y sea vencido totalmente en el incidente respectivo, será condenado al pago del saldo insoluto y, a título de indemnización de perjuicios, al de una suma igual al referido saldo, más el interés máximo convencional calculado sobre dicha suma, por el tiempo que corra entre la fecha de la notificación y la del pago.

    Artículo 6°.- Será, asimismo, cedible y tendrá mérito ejecutivo, la copia de la factura extendida por el comprador o beneficiario del servicio, en la medida en que cumpla con los requisitos señalados en las letras b) y d) del artículo anterior, en los casos en que éstos deban emitirla en conformidad a la ley.

    (Artículo único nº 4 de la Ley 20.323, D.O. 29 enero 2009)

    Artículo 7º.- La cesión del crédito expresada en la factura será traslaticia de dominio, para lo cual el cedente deberá estampar su firma en el anverso de la copia cedible a que se refiere la presente ley, agregar el nombre completo, rol único tributario y domicilio del cesionario y proceder a su entrega.

    Esta cesión deberá ser puesta en conocimiento del obligado al pago de la factura, por un notario público o por el oficial de Registro Civil en las comunas donde no tenga su asiento un notario, sea personalmente, con exhibición de copia del respectivo título, o mediante el envío de carta certificada, por cuenta del cesionario de la factura, adjuntando copias del mismo certificadas por el ministro de fe. En este último caso, la cesión producirá efectos respecto del deudor, a contar del sexto día siguiente a la fecha del envío de la carta certificada dirigida al domicilio del deudor registrado en la factura.

    La cesión señalada en el presente artículo no constituye operación de crédito de dinero para ningún efecto legal.

    Artículo 8º.- La copia de la factura a que se refiere la presente ley podrá ser entregada en cobranza a un tercero. Para ello, bastará la firma del cedente en el anverso de la copia cedible de la factura, seguida de la expresión “en cobranza” o “valor en cobro” y la entrega respectiva. En tal caso, produce los efectos de un mandato para su cobro, en virtud del cual su portador está facultado para cobrar y percibir su valor insoluto, incluso judicialmente, y tiene todas las atribuciones propias del mandatario judicial, comprendidas también aquellas que conforme a la ley requieren mención expresa.

    Artículo 9º.- Las normas de la presente ley serán igualmente aplicables en caso que la factura sea un documento electrónico emitido de conformidad a la ley por un contribuyente autorizado por el Servicio de Impuestos Internos. En tal caso, el recibo de todo o parte del precio o remuneración deberá ser suscrito por el emisor con su firma electrónica, y la recepción de las mercaderías o servicios que consten en la factura podrá verificarse con el acuse de recibo electrónico del receptor. No obstante, si se ha utilizado guía de despacho, la recepción de las mercaderías podrá constar en ella, por escrito, de conformidad con lo establecido en esta ley. Tratándose de receptores de mercaderías o servicios que no sean contribuyentes obligados a emitir documentos tributarios electrónicos, el acuse de recibo debe constar en la representación impresa del documento que se trate. Asimismo, habiendo transcurrido el plazo establecido en el inciso cuarto del artículo 4°, sin haber sido reclamada la factura conforme al artículo 3°, la factura electrónica o la guía de despacho electrónica, con su correspondiente factura, será cedible y podrá contar con mérito ejecutivo, entendiéndose recibidas las mercaderías entregadas o el servicio prestado, sin necesidad que el recibo sea otorgado en las formas indicadas en el presente inciso.

    (Artículo 4 nº 4, de la Ley 20.956, D.O. 26 octubre 2016)

    Sin perjuicio de lo señalado en el artículo 7°, la cesión del crédito expresado en estas facturas solamente podrá efectuarse mediante medios electrónicos y se pondrá en conocimiento del obligado al pago de ellas, mediante su anotación en un registro público electrónico de transferencias de créditos contenidos en facturas electrónicas que llevará el Servicio de Impuestos Internos. Se entenderá que la transferencia ha sido puesta en conocimiento del deudor el día hábil siguiente a aquel en que ella aparezca anotada en el registro señalado. El Servicio de Impuestos Internos podrá encargar a terceros la administración del registro.

    (Artículo 5º de la Ley 20.219, D.O. 3 octubre 2007)

    El reglamento para la ejecución de este artículo deberá ser dictado dentro del plazo de dos meses, contados desde la publicación de la presente ley.

    ————————————————————————–

    NOTA:

    El Art. 1º Transitorio de la LEY 20219, publicada el 03.10.2007, dispuso que la modificación introducida en el presente artículo rige a contar del primer día del mes subsiguiente al de su publicación.

    —————————————————————————

    Artículo 10.- En lo no previsto por esta ley, serán aplicables a la cesión de créditos que consten en facturas las disposiciones establecidas en el Título XXV del Libro IV del Código Civil o en el Título IV del Libro II del Código de Comercio, según sea la naturaleza de la operación. A las mismas normas se sujetará la cesión del crédito contenido en las facturas que no cumplan las condiciones señaladas en el artículo 4° de la presente ley, en cuyo caso, la comunicación al deudor se practicará mediante el procedimiento establecido en el artículo 7º de la misma.

    En caso de extravío o pérdida de la copia de la factura de que trata esta ley se aplicará lo dispuesto en el Párrafo 9° de la ley N° 18.092.

    El plazo de prescripción de la acción ejecutiva, para el cobro del crédito consignado en la copia de la factura establecida en esta ley, en contra del deudor de la misma, es de un año, contado desde su vencimiento. Si la obligación de pago tuviese vencimientos parciales, el plazo de prescripción correrá respecto de cada vencimiento.

    Artículo 11.- Esta ley entrará en vigencia en el plazo de cuatro meses contados desde su publicación en el Diario Oficial.”.

    Habiéndose cumplido con lo establecido en el Nº 1º del Artículo 82 de la Constitución Política de la República y por cuanto he tenido a bien aprobarlo y sancionarlo; por tanto promúlguese y llévese a efecto como Ley de la República.

     Santiago, 12 de noviembre de 2004

    RICARDO LAGOS ESCOBAR, Presidente de la República

    Nicolás Eyzaguirre Guzmán, Ministro de Hacienda

    Jorge Rodríguez Grossi, Ministro de Economía, Fomento y Reconstrucción

    Luis Bates Hidalgo, Ministro de Justicia.

    Lo que transcribo a Ud. para su conocimiento.

    Saluda atentamente a Ud., María Eugenia Wagner Brizzi, Subsecretaria de Hacienda.

    Tribunal Constitucional

    Proyecto de ley que regula la transferencia y otorga mérito ejecutivo a la copia de la factura

    El Secretario del Tribunal Constitucional, quien suscribe, certifica que la Honorable Cámara de Diputados envió el proyecto de ley enunciado en el rubro, aprobado por el Congreso Nacional, a fin de que este Tribunal ejerciera el control de constitucionalidad respecto del párrafo final de la letra c) del inciso primero del artículo 5º del mismo, y por sentencia de 10 de noviembre de 2004, dictada en los autos rol Nº 426, declaró:

    1.  Que el artículo 5º, inciso primero, letra c), párrafo final, del proyecto remitido es constitucional.

    2.  Que las demás disposiciones comprendidas en el artículo 5º, inciso primero, letra c), del proyecto remitido son igualmente constitucionales.

    Santiago, noviembre 11 de 2004.

    Rafael Larraín Cruz, Secretario.

    21Abr/21

    Ley nº 19.886, de 11 de julio de 2003

    Ley nº 19.886, de 11 de julio de 2003. Ley de bases sobre contratos administrativos de suministro y prestación de servicios. (Publicada el 30 de julio de 2003).

    LEY DE  BASES SOBRE CONTRATOS ADMINISTRATIVOS DE SUMINISTRO Y PRESTACION DE SERVICIOS

    Teniendo presente que el H. Congreso Nacional ha dado su aprobación al siguiente:

    PROYECTO DE LEY:

    CAPITULO I. DISPOSICONES GENERALES

    Artículo 1º.- Los contratos que celebre la Administración del Estado, a título oneroso, para el suministro de bienes muebles, y de los servicios que se requieran para el desarrollo de sus funciones, se ajustarán a las normas y principios del presente cuerpo legal y de su reglamentación. Supletoriamente, se les aplicarán las normas de Derecho Público y, en defecto de aquéllas, las normas del Derecho Privado.

    Para los efectos de esta ley, se entenderán por Administración del Estado los órganos y servicios indicados en el artículo 1º de la ley Nº18.575, salvo las empresas públicas creadas por ley y demás casos que señale la ley.

    Esta ley también será aplicable al Consejo Nacional de Televisión.

    (Artículo 2º de la Ley 21.005, D.O. 7 de abril de 2017)

    Artículo 2º.- Para los efectos de esta ley se entenderá por contrato de suministro el que tiene por objeto la compra o el arrendamiento, incluso con opción de compra, de productos o bienes muebles.

    Se comprenderán dentro del concepto de contrato de suministro, entre otros, los siguientes contratos:

    a) La adquisición y arrendamiento de equipos y sistemas para el tratamiento de la información, sus dispositivos y programas y la cesión de derecho de uso de estos últimos.

    No obstante lo expresado, la adquisición de programas de computación a medida se considerará contratos de servicios;

    b) Los de mantenimiento de equipos y sistemas para el tratamiento de la información, sus dispositivos y programas cuando se contrate conjuntamente con la adquisición o arrendamiento, y

    c) Los de fabricación, por lo que las cosas que hayan de ser entregadas por el contratista deben ser elaboradas con arreglo a las características fijadas previamente por la Administración, aun cuando ésta se obligue a aportar, total o parcialmente, los materiales.

    Artículo 3º.- Quedan excluidos de la aplicación de la presente ley:

    a) Las contrataciones de personal de la Administración del Estado reguladas por estatutos especiales y los contratos a honorarios que se celebren con personas naturales para que presten servicios a los organismos públicos, cualquiera que sea la fuente legal en que se sustenten;

    b) Los convenios que celebren entre sí los organismos públicos enumerados en el artículo 2º, inciso primero, del decreto ley Nº 1.263, de 1975, Ley Orgánica de Administración Financiera del Estado, y sus modificaciones;

    c) Los contratos efectuados de acuerdo con el procedimiento específico de un organismo internacional, asociados a créditos o aportes que éste otorgue;

    d) Los contratos relacionados con la compraventa y la transferencia de valores negociables o de otros instrumentos financieros;

    e) Los contratos relacionados con la ejecución y concesión de obras públicas.

    Asimismo, quedan excluidos de la aplicación de esta ley, los contratos de obra que celebren los Servicios de Vivienda y Urbanización para el cumplimiento de sus fines, como asimismo los contratos destinados a la ejecución, operación y mantención de obras urbanas, con participación de terceros, que suscriban de conformidad a la ley Nº 19.865 que aprueba el Sistema de Financiamiento Urbano Compartido.

    No obstante las exclusiones de que se da cuenta en esta letra, a las contrataciones a que ellos se refieren se les aplicará la normativa contenida en el Capítulo V de esta ley, como, asimismo, el resto de sus disposiciones en forma supletoria, y

    f) Los contratos que versen sobre material de guerra; los celebrados en virtud de las leyes números 7.144, 13.196 y sus modificaciones; y, los que se celebren para la adquisición de las siguientes especies por parte de las Fuerzas Armadas o por las Fuerzas de Orden y Seguridad Pública: vehículos de uso militar o policial, excluidas las camionetas, automóviles y buses; equipos y sistemas de información de tecnología avanzada y emergente, utilizados exclusivamente para sistemas de comando, de control, de comunicaciones, computacionales y de inteligencia; elementos o partes para la fabricación, integración, mantenimiento, reparación, mejoramiento o armaduría de armamentos, sus repuestos, combustibles y lubricantes.

    Asimismo, se exceptuarán las contrataciones sobre bienes y servicios necesarios para prevenir riesgos excepcionales a la seguridad nacional o a la seguridad pública, calificados por decreto supremo expedido por intermedio del Ministerio de Defensa Nacional a proposición del Comandante en Jefe que corresponda o, en su caso, del General Director de Carabineros o del Director de Investigaciones.

    Los contratos indicados en este artículo se regirán por sus propias normas especiales, sin perjuicio de lo establecido en el inciso final del artículo 20 de la presente ley.

    CAPITULO II. DE LOS REQUISITOS PARA CONTRATAR CON LA ADMINISTRACIÓN DEL ESTADO

    Artículo 4º.- Podrán contratar con la Administración las personas naturales o jurídicas, chilenas o extranjeras, que acrediten su situación financiera e idoneidad técnica conforme lo disponga el reglamento, cumpliendo con los demás requisitos que éste señale y con los que exige el derecho común. Quedarán excluidos quienes, dentro de los dos años anteriores al momento de la presentación de la oferta, de la formulación de la propuesta o de la suscripción de la convención, según se trate de licitaciones públicas, privadas o contratación directa, hayan sido condenados por prácticas antisindicales o infracción a los derechos fundamentales del trabajador, o por delitos concursales establecidos en el Código Penal.

    (Artículo único nº 1 a) de la Ley 20.238, D.O. 19 de enero de 2008)

    (Artículo 401 números 1) y 2) de la Ley 20.720, D.O. 9 de enero de 2014)

    (Artículo único nº1 b) de la Ley 20.238, D.O. 19 de enero de 2008)

    En caso de que la empresa que obtiene la licitación o celebre convenio registre saldos insolutos de remuneraciones o cotizaciones de seguridad social con sus actuales trabajadores o con trabajadores contratados en los últimos dos años, los primeros estados de pago producto del contrato licitado deberán ser destinados al pago de dichas obligaciones, debiendo la empresa acreditar que la totalidad de las obligaciones se encuentran liquidadas al cumplirse la mitad del período de ejecución del contrato, con un máximo de seis meses.

    El respectivo servicio deberá exigir que la empresa contratada proceda a dichos pagos y le presente los comprobantes y planillas que demuestren el total cumplimiento de la obligación. El incumplimiento de estas obligaciones por parte de la empresa contratada, dará derecho a dar por terminado el respectivo contrato, pudiendo llamarse a una nueva licitación en la que la empresa referida no podrá participar.

    Si la empresa prestadora del servicio, subcontratare parcialmente algunas labores del mismo, la empresa subcontratista deberá igualmente cumplir con los requisitos señalados en este artículo.

    Cada entidad licitante podrá establecer, respecto del adjudicatario, en las respectivas bases de licitación, la obligación de otorgar y constituir, al momento de la adjudicación, mandato con poder suficiente o la constitución de sociedad de nacionalidad chilena o agencia de la extranjera, según corresponda, con la cual se celebrará el contrato y cuyo objeto deberá comprender la ejecución de dicho contrato en los términos establecidos en esta ley.

    El inciso anterior sólo se aplicará respecto de contratos cuyo objeto sea la adquisición de bienes o la prestación de servicios que el adjudicatario se obligue a entregar o prestar de manera sucesiva en el tiempo.

    (Artículo 13 de la Ley 20.088, D.O. 5 de enero de 2006)

    Ningún órgano de la Administración del Estado y de las empresas y corporaciones del Estado o en que éste tenga participación, podrá suscribir contratos administrativos de provisión de bienes o prestación de servicios con los funcionarios directivos del mismo órgano o empresa, ni con personas unidas a ellos por los vínculos de parentesco descritos en la letra b) del artículo 54 de la ley N° 18.575, ley Orgánica Constitucional de Bases Generales de la Administración del Estado, ni con sociedades de personas de las que aquéllos o éstas formen parte, ni con sociedades comanditas por acciones o anónimas cerradas en que aquéllos o éstas sean accionistas, ni con sociedades anónimas abiertas en que aquéllos o éstas sean dueños de acciones que representen el 10% o más del capital, ni con los gerentes, administradores, representantes o directores de cualquiera de las sociedades antedichas.

    Las mismas prohibiciones del inciso anterior se aplicarán a ambas Cámaras del Congreso Nacional, a la Corporación Administrativa del Poder Judicial y a las Municipalidades y sus Corporaciones, respecto de los Parlamentarios, los integrantes del Escalafón Primario del Poder Judicial y los Alcaldes y Concejales, según sea el caso.

    Los contratos celebrados con infracción a lo dispuesto en el inciso anterior serán nulos y los funcionarios que hayan participado en su celebración incurrirán en la contravención al principio de probidad administrativa descrito en el numeral 6 del inciso segundo del artículo 62 de la ley N° 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado, sin perjuicio de la responsabilidad civil y penal que les corresponda.

    Sin embargo, cuando circunstancias excepcionales lo hagan necesario, los órganos y empresas referidos en el inciso cuarto podrán celebrar dichos contratos, siempre que se ajusten a condiciones de equidad similares a las que habitualmente prevalecen en el mercado. La aprobación del contrato deberá hacerse por resolución fundada, que se comunicará al superior jerárquico del suscriptor, a la Contraloría General de la República y a la Cámara de Diputados. En el caso del Congreso Nacional la comunicación se dirigirá a la Comisión de Ética del Senado o a la Comisión de Conducta de la Cámara de Diputados, según corresponda y, en el caso del Poder Judicial, a su Comisión de Ética.

    ———————————————————————

    NOTA:

    El artículo 2º Transitorio de la LEY 20088, publicada el 05.01.2006, modificatoria de la presente norma, dispone que las modificaciones que introduce a ésta, entrarán en vigencia noventa días después de la publicación del Reglamento que establecerá los requisitos de las declaraciones de patrimonio, según lo dispone el artículo 1º Transitorio de la citada Ley. Dicho reglamento se encuentra contenido en el DTO 45, Secretaría General de la Presidencia, publicado el 22.03.2006.

    ——————————————————————-

    CAPITULO III. DE LAS ACTUACIONES RELATIVAS A LA CONTRATACIÓN

      PARRAFO 1. DE LOS PROCEDIMIENTOS DE CONTRATACIÓN

    Artículo 5º.- La Administración adjudicará los contratos que celebre mediante licitación pública, licitación privada o contratación directa.

    La licitación pública será obligatoria cuando las contrataciones superen las 1.000 unidades tributarias mensuales, salvo lo dispuesto en el artículo 8º de esta ley.

    Artículo 6º.- Las bases de licitación deberán establecer las condiciones que permitan alcanzar la combinación más ventajosa entre todos los beneficios del bien o servicio por adquirir y todos sus costos asociados, presentes y futuros. En el caso de la prestación de servicios habituales, que deban proveerse a través de licitaciones o contrataciones periódicas, se otorgará mayor puntaje o calificación a aquellos postulantes que exhibieren mejores condiciones de empleo y remuneraciones. En las bases de licitación y en la evaluación de las respectivas propuestas se dará prioridad a quien oferte mayores sueldos por sobre el ingreso mínimo mensual y otras remuneraciones de mayor valor, tales como las gratificaciones legales, la duración indefinida de los contratos y condiciones laborales que resulten más ventajosas en atención a la naturaleza de los servicios contratados. Del mismo modo, se dará prioridad a las propuestas que garanticen los pagos a que alude el inciso quinto. Estas condiciones no podrán establecer diferencias arbitrarias entre los proponentes, ni sólo atender al precio de la oferta.

    (Artículo único nº 2 a) de la Ley 20.238, D.O. 19 de enero 2008)

    (Artículo 1 nº 1 de la Ley 20.787, D.O. 30 de octubre de 2014)

    (Artículo único nº 1 de la Ley 21.056, D.O. 2 de enero de 2018)

    (Artículo único nº 2 de la Ley 21.056, D.O. 2 de enero de 2018)

    En las licitaciones que tengan por objeto la contratación por parte de las municipalidades del servicio de recolección, transporte o disposición final de residuos sólidos domiciliarios, barridos y mantención de áreas verdes, la ponderación del criterio referido a las mejores condiciones de empleo y remuneraciones a que se refiere el inciso primero de este artículo no podrá ser inferior al 15% de la ponderación total de la evaluación, y la remuneración íntegra que se ofrezca pagar a cada trabajador no podrá ser inferior al promedio de las remuneraciones devengadas a los trabajadores que cumplían igual función en los tres últimos meses, previos al inicio del proceso licitatorio. El municipio deberá indicar en las bases de licitación el referido promedio de remuneraciones de cada función, concernientes al proceso licitatorio anterior.

    Para la ponderación del criterio señalado en el inciso anterior y el cálculo de las remuneraciones, se considerará únicamente al personal que labore directamente en acciones operativas del servicio.

    El porcentaje mencionado en el inciso segundo se distribuirá en un 70% respecto del monto de las remuneraciones y en un 30% respecto de las condiciones de empleo ofrecidas que superen los mínimos legales, tales como que la oferta comprenda la contratación del mayor número de trabajadores que desempeñe dichas funciones en virtud del contrato anterior, condiciones de bienestar u otras que la municipalidad establezca en cada caso. Será requisito de admisibilidad de la oferta la presentación, por parte de la empresa postulante, de una dotación suficiente de trabajadores que impida exceder los límites legales establecidos para la jornada de trabajo, incluidas las horas extraordinarias, y de un programa de gestión de los riesgos presentes en el trabajo, el que deberá observar las disposiciones legales y demás normas que regulen estos riesgos, así como los criterios de gestión definidos en la Política Nacional de Seguridad y Salud en el Trabajo.

    (Artículo Único nº 3 de la Ley 21.056, D.O. 2 de enero de 2.018)

    (Artículo 1 nº 2 de la Ley 20.787, D.O. 30 de octubre de 2014)

    (Artículo 13 de la Ley 20.940, D.O. 8 de septiembre de 2016)

    En los contratos de prestación de servicios para establecimientos de educación parvularia, escolar y preescolar, los contratos de trabajo del personal que se desempeña en la manipulación de alimentos deberán contemplar el pago de las remuneraciones de los meses de diciembre, enero y febrero en las mismas condiciones de los meses precedentes, de conformidad con lo dispuesto en el inciso primero del artículo 75 bis del Código del Trabajo.

    También se dará prioridad, en los términos del inciso primero, a las empresas que mantengan vigentes convenios colectivos con las organizaciones sindicales representativas de sus trabajadores o que le hagan aplicables a estos convenios colectivos acordados por otros empleadores u organizaciones gremiales de empleadores, suscritos de conformidad a las reglas del Título X del Libro IV del Código del Trabajo.

    En todo caso, la Administración deberá propender a la eficacia, eficiencia y ahorro en sus contrataciones.

    Artículo 7º.- Para efectos de esta ley se entenderá por:

    a) Licitación o propuesta pública: el procedimiento administrativo de carácter concursal mediante el cual la Administración realiza un llamado público, convocando a los interesados para que, sujetándose a las bases fijadas, formulen propuestas, de entre las cuales seleccionará y aceptará la más conveniente.

    En las licitaciones públicas cualquier persona podrá presentar ofertas, debiendo hacerse el llamado a través de los medios o sistemas de acceso público que mantenga disponible la Dirección de Compras y Contratación Pública, en la forma que establezca el reglamento. Además, con el objeto de aumentar la difusión del llamado, la entidad licitante podrá publicarlo por medio de uno o más avisos, en la forma que lo establezca el reglamento.

    b) Licitación o propuesta privada: el procedimiento administrativo de carácter concursal, previa resolución fundada que lo disponga, mediante el cual la Administración invita a determinadas personas para que, sujetándose a las bases fijadas, formulen propuestas, de entre las cuales seleccionará y aceptará la más conveniente.

    c) Trato o contratación directa: el procedimiento de contratación que, por la naturaleza de la negociación que conlleva, deba efectuarse sin la concurrencia de los requisitos señalados para la licitación o propuesta pública y para la privada. Tal circunstancia deberá, en todo caso, ser acreditada según lo determine el reglamento.

    La Administración no podrá fragmentar sus contrataciones con el propósito de variar el procedimiento de contratación.

    Artículo 8º.- Procederá la licitación privada o el trato o contratación directa en los casos fundados que a continuación se señalan:

    a) Si en las licitaciones públicas respectivas no se hubieren presentado interesados. En tal situación procederá primero la licitación o propuesta privada y, en caso de no encontrar nuevamente interesados, será procedente el trato o contratación directa.

    Las bases que se fijaron para la licitación pública deberán ser las mismas que se utilicen para contratar directamente o adjudicar en licitación privada. Si las bases son modificadas, deberá procederse nuevamente como dispone la regla general;

    b) Si se tratara de contratos que correspondieran a la realización o terminación de un contrato que haya debido resolverse o terminarse anticipadamente por falta de cumplimiento del contratante u otras causales y cuyo remanente no supere las 1.000 unidades tributarias mensuales;

    c) En casos de emergencia, urgencia o imprevisto, calificados mediante resolución fundada del jefe superior de la entidad contratante, sin perjuicio de las disposiciones especiales para casos de sismos y catástrofes contenidas en la legislación pertinente.

    Sin perjuicio de la validez o invalidez del contrato, el jefe superior del servicio que haya calificado indebidamente una situación como de emergencia, urgencia o imprevisto, será sancionado con una multa a beneficio fiscal de diez a cincuenta unidades tributarias mensuales, dependiendo de la cuantía de la contratación involucrada. Esta multa será compatible con las demás sanciones administrativas que, de acuerdo a la legislación vigente, pudiera corresponderle, y su cumplimiento se efectuará de conformidad a lo dispuesto en el artículo 35 del decreto ley Nº 1.263, de 1975;

    d) Si sólo existe un proveedor del bien o servicio;

    e) Si se tratara de convenios de prestación de servicios a celebrar con personas jurídicas extranjeras que deban ejecutarse fuera del territorio nacional;

    f) Si se trata de servicios de naturaleza confidencial o cuya difusión pudiere afectar la seguridad o el interés nacional, los que serán determinados por decreto supremo;

    g) Cuando, por la naturaleza de la negociación, existan circunstancias o características del contrato que hagan del todo indispensable acudir al trato o contratación directa, según los criterios o casos que señale el reglamento de esta ley, y

    h) Cuando el monto de la adquisición sea inferior al límite que fije el reglamento.

    En todos los casos señalados anteriormente, deberá acreditarse la concurrencia de tal circunstancia, la que contará con las cotizaciones en los casos que señale el reglamento.

    En los casos previstos en las letras señaladas anteriormente, salvo lo dispuesto en la letra f), las resoluciones fundadas que autoricen la procedencia del trato o contratación directa, deberán publicarse en el Sistema de Información de Compras y Contratación Pública, a más tardar dentro de las 24 horas de dictadas. En igual forma y plazo deberán publicarse las resoluciones o acuerdos emanados de los organismos públicos regidos por esta ley, que autoricen la procedencia de la licitación privada.

    Siempre que se contrate por trato o contratación directa se requerirá un mínimo de tres cotizaciones previas, salvo que concurran las causales de las letras c), d), f) y g) de este artículo.

    Artículo 9º.- El órgano contratante declarará inadmisibles las ofertas cuando éstas no cumplieren los requisitos establecidos en las bases. Declarará desierta una licitación cuando no se presenten ofertas, o bien, cuando éstas no resulten convenientes a sus intereses.

    En ambos casos la declaración deberá ser por resolución fundada.

    Artículo 10.- El contrato se adjudicará mediante resolución fundada de la autoridad competente, comunicada al proponente.

    El adjudicatario será aquel que, en su conjunto, haga la propuesta más ventajosa, teniendo en cuenta las condiciones que se hayan establecido en las bases respectivas y los criterios de evaluación que señale el reglamento.

    Los procedimientos de licitación se realizarán con estricta sujeción, de los participantes y de la entidad licitante, a las bases administrativas y técnicas que la regulen. Las bases serán siempre aprobadas previamente por la autoridad competente.

    El reglamento determinará las características que deberán reunir las bases de las licitaciones                     

    PARRAFO 2.  DE LAS GARANTÍAS EXIGIDAS PARA CONTRATAR

    Artículo 11.- La respectiva entidad licitante requerirá, en conformidad al reglamento, la constitución de las garantías que estime necesarias para asegurar la seriedad de las ofertas presentadas y el fiel y oportuno cumplimiento del contrato definitivo, en la forma y por los medios que lo establezcan las respectivas bases de la licitación. Tratándose de la prestación de servicios, dichas garantías deberán asegurar, además, el pago de las obligaciones laborales y sociales con los trabajadores de los contratantes, sin perjuicio de lo dispuesto en el artículo 20 de la ley N° 17.322, y permanecerán vigentes hasta 60 días hábiles después de recepcionadas las obras o culminados los contratos. Los jefes de servicio serán directamente responsables de la custodia, mantención y vigencia de las garantías solicitadas.

    (Artículo único, nº 3 a) de la Ley 20.238 D.O. 19 de enero de 2008)

    Artículo único nº 3 b) de la Ley 20.238 D.O. 19 de enero de 2008)

    Las garantías que se estimen necesarias para asegurar la seriedad de las ofertas, el cumplimiento de las obligaciones laborales y sociales de los trabajadores y el fiel y oportuno cumplimiento del contrato definitivo, deberán ser fijadas en un monto tal que sin desmedrar su finalidad no desincentiven la participación de oferentes al llamado de licitación o propuesta.

    Con cargo a estas cauciones podrán hacerse efectivas las multas y demás sanciones que afecten a los contratistas.

    Sólo podrán entregarse anticipos a un contratante, si se cauciona debida e íntegramente su valor.

    PARRAFO 3. DE LAS FACULTADES DE LA ADMINISTRACIÓN

    Artículo 12.- Cada institución deberá elaborar y evaluar periódicamente un plan anual de compras y contrataciones, cuyos contenidos mínimos serán definidos en el reglamento.

    Cada institución establecerá una metodología para evaluar anualmente los resultados de los contratos celebrados, así como el rendimiento de los bienes y servicios que adquiere. Toda esta información deberá ser reflejada en el Sistema de Información de las Compras Públicas y en el Registro Nacional de Proveedores, según lo establezca la Dirección de Compras y Contratación Pública.

    Artículo 13.- Los contratos administrativos regulados por esta ley podrán modificarse o terminarse anticipadamente por las siguientes causas:

    a) La resciliación o mutuo acuerdo entre los contratantes.

    b) El incumplimiento grave de las obligaciones contraídas por el contratante.

    c) El estado de notoria insolvencia del contratante, a menos que se mejoren las cauciones entregadas o las existentes sean suficientes para garantizar el cumplimiento del contrato.

    d) Por exigirlo el interés público o la seguridad nacional.

    e) Las demás que se establezcan en las respectivas bases de la licitación o en el contrato. Dichas bases podrán establecer mecanismos de compensación y de indemnización a los contratantes.

    Las resoluciones o decretos que dispongan tales medidas deberán ser fundadas.

    PARRAFO 4. DE LA CESIÓN Y SUBCONTRATACIÓN

    Artículo 14.- Los derechos y obligaciones que nacen con ocasión del desarrollo de una licitación serán intransferibles.

    Lo anterior se entiende sin perjuicio que una norma legal especial permita expresamente la cesión de derechos y obligaciones.

    Los documentos justificativos de los créditos que de ellos emanen serán transferibles de acuerdo con las reglas del derecho común.

    Artículo 15.- El contratante podrá concertar con terceros la ejecución parcial del contrato, sin perjuicio que la responsabilidad y la obligación de su cumplimiento permanecerá en el contratista adjudicado.

    Con todo, no procederá la subcontratación en los casos especialmente previstos en el reglamento o ante una disposición expresa contenida en las respectivas bases de la licitación.

    PARRAFO 5. DEL REGISTRO DE CONTRATISTAS

    Artículo 16.- Existirá un registro electrónico oficial de contratistas de la Administración, a cargo de la Dirección de Compras y Contratación Pública.

    En dicho registro se inscribirán todas las personas naturales y jurídicas, chilenas y extranjeras que no tengan causal de inhabilidad para contratar con los organismos del Estado. La Dirección de Compras y Contratación Pública podrá fijar las tarifas semestrales o anuales de incorporación que deberán pagar los contratistas, con el objeto de poder financiar el costo directo de la operación del registro, velando por que las mismas no impidan o limiten el libre e igualitario acceso de los contratistas al registro.

    Este registro será público y se regirá por las normas de esta ley y de su reglamento.

    Los organismos públicos contratantes podrán exigir a los proveedores su inscripción en el registro de contratistas y proveedores a cargo de la Dirección de Compras y Contratación Pública, para poder suscribir los contratos definitivos.

    La evaluación económica, financiera y legal de los contratistas podrá ser encomendada por la Dirección de Compras y Contratación Pública a profesionales y técnicos, personas naturales o jurídicas, previa licitación pública.

    No obstante lo anterior, la decisión consistente en el rechazo o aprobación de las inscripciones corresponderá a la Dirección de Compras y Contratación Pública y podrá ser reclamable en los términos establecidos en el capítulo V.

    Podrán, asimismo, existir otros registros oficiales de contratistas para órganos o servicios determinados, o para categorías de contratación que así lo requieran, los que serán exigibles para celebrar tales contratos. Dichos registros serán regulados por decreto supremo expedido por el Ministerio respectivo. Estos registros, podrán o no ser electrónicos. Cuando fueren electrónicos, deberán ser compatibles con el formato y las características del Registro a que se refiere el inciso primero. Los registros serán siempre públicos.

    No obstante, las Fuerzas Armadas y las de Orden y Seguridad Pública, podrán mantener registros reservados o secretos, respecto de los bienes y servicios que se exceptúan de esta ley, en conformidad con su legislación.

    Artículo 17.- El Reglamento establecerá el régimen y criterios de clasificación de los contratistas, los requisitos de inscripción en cada categoría y las causales de inhabilidad, incompatibilidad, suspensión y eliminación del registro por incumplimiento de obligaciones u otras causales. El Reglamento deberá cautelar el libre acceso de los contratistas al registro y su evaluación objetiva y fundada.

    CAPITULO IV. DE LAS COMPRAS Y CONTRATACIONES POR MEDIOS ELECTRÓNICOS Y DEL SISTEMA DE INFORMACIÓN DE LAS COMPRAS Y CONTRATACIONES DE LOS ORGANISMOS PÚBLICOS

    Artículo 18.- Los organismos públicos regidos por esta ley deberán cotizar, licitar, contratar, adjudicar, solicitar el despacho y, en general, desarrollar todos sus procesos de adquisición y contratación de bienes, servicios y obras a que alude la presente ley, utilizando solamente los sistemas electrónicos o digitales que establezca al efecto la Dirección de Compras y Contratación Pública. Dicha utilización podrá ser directa o intermediada a través de redes abiertas o cerradas, operando en plataformas de comercio electrónico o mercados digitales de transacciones, sea individualmente o acogiéndose a los beneficios de los contratos marco que celebre la señalada Dirección. Dicha actividad deberá ajustarse a lo dispuesto en sus respectivas leyes orgánicas, en la ley de firma electrónica y en las normas establecidas por la presente ley y su reglamento.

    Los organismos públicos regidos por esta ley no podrán adjudicar contratos cuyas ofertas no hayan sido recibidas a través de los sistemas electrónicos o digitales establecidos por la Dirección de Compras y Contratación Pública. No obstante, el reglamento determinará los casos en los cuales es posible desarrollar procesos de adquisición y contratación sin utilizar los referidos sistemas.

    Artículo 19.- Créase un Sistema de Información de Compras y Contrataciones de la Administración, a cargo de la Dirección de Compras y Contratación Pública, que se aplicará a los organismos señalados en el artículo 1º de la presente ley, y que deberá estar disponible a todo el público, en la forma que regule el reglamento.

    El Sistema de Información será de acceso público y gratuito.

    Artículo 20.- Los órganos de la Administración deberán publicar en el o los sistemas de información que establezca la Dirección de Compras y Contratación Pública, la información básica relativa a sus contrataciones y aquella que establezca el reglamento. Dicha información deberá ser completa y oportuna refiriéndose a los llamados a presentar ofertas, recepción de las mismas; aclaraciones, respuestas y modificaciones a las bases de licitación, así como los resultados de las adjudicaciones relativas a las adquisiciones y contrataciones de bienes, servicios, construcciones y obras, todo según lo señale el reglamento.

    Los organismos públicos regidos por esta ley, estarán exceptuados de publicar en el sistema de información señalado precedentemente, aquella información sobre adquisiciones y contrataciones calificada como de carácter secreto, reservado o confidencial en conformidad a la ley. Las Fuerzas Armadas y las de Orden y Seguridad cumplirán con esta obligación, en conformidad a su legislación vigente sobre manejo, uso y tramitación de documentación.

    Artículo 21.- Los órganos del sector público no regidos por esta ley, con excepción de las empresas públicas creadas por ley, deberán someterse a las normas de los artículos 18, 19 y 20 de esta ley para suministrar la información básica sobre contratación de bienes, servicios y obras y aquella que determine el reglamento.

    CAPITULO V. DEL TRIBUNAL DE CONTRATACIÓN PÚBLICA

    Artículo 22.- Créase un tribunal, denominado “Tribunal de Contratación Pública”, que tendrá su asiento en Santiago.

    El Tribunal estará integrado por tres abogados designados por el Presidente de la República, con sus respectivos suplentes, previas propuestas en terna hechas por la Corte Suprema.

    Las ternas serán formadas sucesivamente, tomando los nombres de una lista, confeccionada especialmente para tal efecto por la Corte de Apelaciones de Santiago, a través de concurso público. En la señalada lista sólo podrán figurar abogados que sean chilenos; se hayan destacado en la actividad profesional o universitaria; acrediten experiencia en la materia, y tengan no menos de diez años de ejercicio profesional o hayan pertenecido al Escalafón Primario del Poder Judicial, siempre y cuando hubieran figurado durante los últimos cinco años en Lista Sobresaliente. En ningún caso, podrán figurar en las ternas aquellos profesionales que hayan sido separados de sus cargos como funcionarios judiciales, sea en la calificación anual o en cualquier otra oportunidad.

    Los integrantes del Tribunal elegirán a uno de sus miembros para que lo presida, por un período de dos años, pudiendo ser reelegido.

    Los integrantes designados en calidad de suplentes ejercerán el cargo que les haya sido asignado en aquellos casos en que, por cualquier circunstancia, no sea desempeñado por el titular. Dicha suplencia no podrá extenderse por más de seis meses continuos, al término de los cuales deberá, necesariamente, proveerse el cargo con un titular, de la manera ya señalada, por el período que reste para el ejercicio del mismo.

    Los integrantes del Tribunal tendrán derecho a que se les pague la suma equivalente a un treintavo de la renta del Grado IV, correspondiente a Ministros de Corte de Apelaciones, por cada sesión a la que asistan, con un máximo de veintiuno sesiones mensuales. Con todo, no podrá celebrarse más de una sesión diariamente.

    (Artículo 41 a) de la Ley 20.883, D.O. 2 de diciembre de 2015)

    (Artículo 41 b) de la Ley 20.883, D.O. 2 de diciembre de 2015)

    En el caso de convocarse a más de doce sesiones en un mismo mes calendario, dichas sesiones se celebrarán preferentemente por los integrantes del Tribunal suplentes.

    Los integrantes del Tribunal permanecerán en el ejercicio de sus cargos por un plazo de cinco años, pudiendo ser nuevamente designados, de la misma forma antes establecida.

    Este Tribunal fallará conforme a derecho y estará sometido a la superintendencia directiva, correccional y económica de la Corte Suprema, de conformidad con lo que establece el artículo 79 de la Constitución Política de la República.

    Un auto acordado, dictado por la Corte Suprema, regulará las materias relativas a su funcionamiento administrativo interno, velando por la eficaz expedición de los asuntos que conozca el Tribunal.

    Artículo 23.- El Tribunal designará mediante concurso público, un abogado, a contrata, de su exclusiva confianza y subordinación, quien tendrá el carácter de ministro de fe del Tribunal y desempeñará las demás funciones que éste le encomiende.

    La Dirección de Compras y Contratación Pública deberá proveer la infraestructura, el apoyo técnico y los recursos humanos y materiales necesarios para el adecuado funcionamiento del Tribunal.

    Artículo 24.- El Tribunal será competente para conocer de la acción de impugnación contra actos u omisiones, ilegales o arbitrarios, ocurridos en los procedimientos administrativos de contratación con organismos públicos regidos por esta ley.

    La acción de impugnación procederá contra cualquier acto u omisión ilegal o arbitrario que tenga lugar entre la aprobación de las bases de la respectiva licitación y su adjudicación, ambos inclusive.

    La demanda mediante la cual se ejerza la acción de impugnación podrá ser interpuesta por toda persona natural o jurídica, que tenga un interés actualmente comprometido en el respectivo procedimiento administrativo de contratación.

    La demanda deberá deducirse dentro del plazo fatal de diez días hábiles, contado desde el momento en que el afectado haya conocido el acto u omisión que se impugna o desde la publicación de aquél. Se presentará directamente ante el Tribunal de Contratación Pública, pero cuando el domicilio del interesado se encontrara ubicado fuera de la ciudad de asiento del Tribunal, podrá presentarse por medio de las Intendencias Regionales o Gobernaciones Provinciales respectivas. En este caso, el Intendente o Gobernador, según corresponda, deberá remitirla al Tribunal el mismo día, o a más tardar el día hábil siguiente, contado desde su recepción.

    La demanda deberá contener la mención de los hechos que constituyen el acto u omisión ilegal o arbitraria, la identificación de las normas legales o reglamentarias que le sirven de fundamento, y las peticiones concretas que se someten al conocimiento del Tribunal.

    El Tribunal podrá declarar inadmisible la impugnación que no cumpla con los requisitos exigidos en los incisos precedentes, teniendo el demandante cinco días contados desde la notificación de la inadmisibilidad para corregir la impugnación.

    Artículo 25.- Acogida a tramitación la impugnación, el Tribunal oficiará al organismo público respectivo, acompañando el texto íntegro de la demanda interpuesta, para que, en el plazo fatal de diez días hábiles, contado desde la recepción del oficio, informe sobre la materia objeto de impugnación y las demás sobre las que le consulte el Tribunal.

    El Tribunal podrá decretar, por resolución fundada, la suspensión del procedimiento administrativo en el que recae la acción de impugnación.

    Recibido el informe o transcurrido el plazo fatal de diez días hábiles indicado en el inciso primero, sin que el organismo público haya informado, el Tribunal examinará los autos y, si estima que hay o puede haber controversia sobre algún hecho substancial y pertinente, recibirá la causa a prueba y fijará, en la misma resolución, los hechos sustanciales controvertidos sobre los cuales deba recaer.

    Desde que esta resolución haya sido notificada a todas las partes, se abrirá un término probatorio común de diez días hábiles, dentro del cual deberán rendirse todas las probanzas que se soliciten. Si se ofreciera prueba testimonial, se acompañará la lista de testigos dentro de los dos primeros días hábiles del término probatorio. El Tribunal designará a uno de sus integrantes para la recepción de esta prueba.

    Vencido el término probatorio, el Tribunal citará a las partes a oír sentencia. Efectuada esta citación, no se admitirán escritos ni pruebas de ningún género.

    A partir de la recepción de la causa a prueba, el Tribunal podrá decretar de oficio, para mejor resolver, cualquiera de las medidas a que se refiere el artículo 159 del Código de Procedimiento Civil u otras diligencias encaminadas a comprobar los hechos controvertidos. Estas medidas deberán cumplirse en el plazo de diez días hábiles, contado desde la fecha de la resolución que las decreta. En todo caso, serán decretadas y cumplidas con anterioridad al vencimiento del término para dictar sentencia.

    Los incidentes que se promuevan en el juicio no suspenderán el curso de éste y se substanciarán en ramo separado.

    La sentencia definitiva deberá dictarse en el plazo de diez días hábiles, contado desde la fecha de la resolución que cita a las partes a oír sentencia.

    Artículo 26.- En la sentencia definitiva, el Tribunal se pronunciará sobre la legalidad o arbitrariedad del acto u omisión impugnado y ordenará, en su caso, las medidas que sean necesarias para restablecer el imperio del derecho.

    La sentencia definitiva se notificará por cédula. La parte agraviada con esta resolución podrá, dentro del plazo de cinco días hábiles, contado desde su notificación, deducir ante el Tribunal recurso de reclamación, el que será conocido por la Corte de Apelaciones de Santiago. La reclamación se concederá en el solo efecto devolutivo.

    La reclamación se verá en cuenta, sin oír alegatos, salvo que la Corte así lo acuerde, a solicitud de cualquiera de las partes. En este caso, la causa será agregada en forma extraordinaria a la tabla. No procederá la suspensión de la vista de la causa por el motivo establecido en el Nº 5º del artículo 165 del Código de Procedimiento Civil. En todo caso, el Tribunal de Alzada podrá decretar, fundadamente, orden de no innovar por un plazo de hasta treinta días, renovable.

    La resolución que falle el recurso de reclamación deberá pronunciarse, a más tardar, dentro de los diez días hábiles siguientes a aquél en que la causa se haya visto en cuenta o haya quedado en acuerdo. En su contra no procederá recurso alguno.

    Artículo 27.- La acción de impugnación se tramitará de acuerdo con las normas contenidas en este Capítulo. Supletoriamente, se aplicarán las disposiciones comunes a todo procedimiento establecidas en el Libro I del Código de Procedimiento Civil y las del juicio ordinario civil de mayor cuantía que resulten conformes a la naturaleza breve y sumaria de este procedimiento.

     CAPITULO VI. DE LA DIRECCIÓN DE COMPRAS Y CONTRATACIÓN PÚBLICA

    Artículo 28.- Créase, como servicio público descentralizado, la Dirección de Compras y Contratación Pública, sometido a la supervigilancia del Presidente de la República a través del Ministerio de Hacienda y cuyo domicilio será la ciudad de Santiago.

    Artículo 29.- La dirección superior, la organización y la administración de la Dirección de Compras y Contratación Pública corresponderán a un Director de exclusiva confianza del Presidente de la República, quien será el Jefe Superior del Servicio.

    Artículo 30.- Son funciones del Servicio las siguientes:

    a) Asesorar a los organismos públicos en la planificación y gestión de sus procesos de compras y contrataciones. Para ello podrá celebrar convenios de asesoría para el diseño de programas de capacitación y de calificación y evaluación contractual.

    b) Licitar la operación del sistema de información y de otros medios para la compra y contratación electrónica de los organismos públicos, velar por su correcto funcionamiento y actuar como contraparte del operador de estos sistemas.

    Sin embargo, en aquellos casos que señale el reglamento, la Dirección de Compras y Contratación Pública estará facultada para operar directamente el sistema.

    c) Suscribir convenios con las entidades públicas y privadas que correspondan para los efectos de recabar información para complementar antecedentes del registro de contratistas y proveedores a que se refiere el artículo 16.

    d) De oficio o a petición de uno o más organismos públicos, licitar bienes y servicios a través de la suscripción de convenios marco, los que estarán regulados en el reglamento de la presente ley. Respecto de los bienes y servicios objeto de dicho convenio marco, los organismos públicos afectos a las normas de esta ley estarán obligados a comprar bajo ese convenio, relacionándose directamente con el contratista adjudicado por la Dirección, salvo que, por su propia cuenta obtengan directamente condiciones más ventajosas. En este caso deberán mantener los respectivos antecedentes para su revisión y control posterior por parte de la correspondiente entidad fiscalizadora.

    Los organismos públicos que obtuvieren por su propia cuenta condiciones más ventajosas sobre bienes o servicios respecto de los cuales la Dirección de Compras y Contratación Pública mantiene convenios marco vigentes, deberán informar de tal circunstancia a la Dirección. Con esta información, la Dirección deberá adoptar las medidas necesarias para lograr la celebración de un convenio marco que permita extender tales condiciones al resto de los organismos públicos.

    La suscripción de convenios marco no será obligatoria para las municipalidades, sin perjuicio de que éstas, individual o colectivamente, puedan adherir voluntariamente a los mismos.

    La suscripción de convenios marco no será obligatoria para las Fuerzas Armadas y para las de Orden y Seguridad Pública, respecto de los bienes y servicios que respectivamente determinen el Director de Logística del Ejército, el Director General de los Servicios de la Armada, el Comandante del Comando Logístico de la Fuerza Aérea, el Director de Logística de Carabineros y el Jefe de la Jefatura de Logística de la Policía de Investigaciones, de acuerdo a los criterios que al respecto defina el reglamento.

    e) Representar o actuar como mandatario de uno o más organismos públicos a que se refiere esta ley, en la licitación de bienes o servicios en la forma que establezca el reglamento.

    f) Administrar, mantener actualizado y licitar la operación del Registro de Contratistas y Proveedores a que se refiere el artículo 16, otorgando los certificados técnicos y financieros, según lo establezca el reglamento.

    g) Promover la máxima competencia posible en los actos de contratación de la Administración, desarrollando iniciativas para incorporar la mayor cantidad de oferentes. Además, deberá ejercer una labor de difusión hacia los proveedores actuales y potenciales de la Administración, de las normativas, procedimientos y tecnologías utilizadas por ésta.

    h) Establecer las políticas y condiciones de uso de los sistemas de información y contratación electrónicos o digitales que se mantengan disponibles.

    La Dirección de Compras y Contratación Pública podrá cobrar por la operación de los sistemas de información y de otros medios para la compra y contratación electrónica que debe licitar, de acuerdo a lo establecido en la letra b) de este artículo.

    Las tarifas señaladas precedentemente se fijarán por resolución fundada de la Dirección de Compras y Contratación Pública.

    Las funciones señaladas precedentemente, no podrán en caso alguno limitar o restringir las facultades consagradas por leyes especiales, a los Comandantes en Jefe de las Fuerzas Armadas, al General Director de Carabineros y al Director General de la Policía de Investigaciones.

    Artículo 31.- El patrimonio del Servicio estará constituido por:

    a) Los aportes que se consulten anualmente en la Ley de Presupuestos;

    b) Los  bienes que adquiera y los frutos que ellos produzcan;

    c) Los aportes de otras entidades públicas o privadas, sean nacionales, extranjeras o internacionales, y

    d) Los demás ingresos que generen sus propias operaciones y aquellos que legalmente le correspondan.

    Artículo 32.- El personal del Servicio estará afecto a las disposiciones de la ley Nº 18.834, Estatuto Administrativo de los funcionarios públicos. Los jefes de los departamentos del Servicio serán de la exclusiva confianza del Director.

    El sistema de remuneraciones del personal de planta y a contrata del Servicio corresponderá al de las instituciones fiscalizadoras, en los términos del Título I  del decreto ley Nº 3.551, de 1981, y las normas que lo han modificado, incluyendo la asignación dispuesta en el artículo 17 de la  ley Nº 18.091, sustituido por el artículo 11 de la ley Nº 19.301, que se determinará en la forma que se señala en dicha disposición, informando el Director anualmente al Ministerio de Hacienda sobre esta materia. Se le aplicará, asimismo, la bonificación establecida en el artículo 5º de la ley Nº 19.528.

    Artículo 33.- Fíjanse las siguientes plantas del personal de la Dirección de Compras y Contratación Pública:

    Plantas/Cargo            Grado (Escala de  Nº de cargos Fiscalizadores)

    Planta Directivos

    Director Nacional                                           1                           1

    Jefes de Departamento                                 3                           4

    Planta Profesionales

    Profesionales                                                  4                           3

    Profesionales                                                   6                          3

    Profesional                                                       9                           1

    Planta Técnicos

    Técnico Informático                                       14                          1

    Planta Administrativos

    Administrativo                                                 16                          1

    Administrativos                                              18                           2

    Administrativo                                                 19                          1

    Planta Auxiliares

    Auxiliar                                                               20                        1

    TOTAL PLANTA                                                                            18

    Además de los requisitos generales exigidos por la ley Nº 18.834 para ingresar a la Administración del Estado, para estos cargos se exigirán los siguientes:

    Planta Directivos y Profesionales

    a. Título profesional o grado académico de licenciado, otorgado por una universidad del Estado o reconocida por éste, y

    b. Experiencia en tecnologías de la información, gestión de adquisiciones o derecho administrativo.

    —————————————————————————–

    NOTA

    El artículo 1° del Decreto con Fuerza de Ley 11, Hacienda, publicado el 01.03.2010, crea en la planta de personal de la Dirección de Compras y Contratación Pública, contenida en el presente artículo, el cargo que se indica a continuación:

    Plantas / Cargos            Grados        Número

    E.S.F.

    Directivo de Carrera afecto al artículo 8º del Estatuto Administrativo

    Directivo                    10            1

    Total Planta                                1.

    ————————————————————-

    Artículo 34.- Las modalidades a que deban sujetarse los convenios con personas jurídicas referidos en el artículo 16 del decreto ley Nº 1.608, de 1976, y su reglamento, se contendrán en el reglamento de esta ley. En tanto este reglamento no se dicte, continuará en vigor el decreto supremo Nº 98, de 1991, del Ministerio de Hacienda.

    La contratación de acciones de apoyo a que se refiere la ley Nº 18.803, deberá efectuarse en conformidad a lo dispuesto en el inciso tercero del artículo 8º bis de la ley Nº 18.575, en aquellos casos en que se llame a propuesta privada para la adjudicación de tales contratos.

    Artículo 35.- El sistema de información de compras y contrataciones de la Administración será el continuador legal, para todos los efectos legales, del establecido por el decreto supremo Nº 1.312, de 1999, del Ministerio de Hacienda.

    Artículo 36.- Modifícase el inciso segundo del artículo 3º, letra b), del decreto supremo Nº 104, de 1977, del Ministerio del Interior, que fijó el texto refundido, coordinado y sistematizado de la ley Nº 16.282, que contiene disposiciones permanentes para casos de sismo o catástrofe, intercalando entre la palabra “pública” y la frase “a las reparticiones”, la expresión “o privada”.

    Artículo 37.-  Deróganse el artículo 28 del decreto ley Nº 3.529, de 1980; el artículo 16 del decreto ley Nº 2.879; el artículo 84 de la ley Nº 18.482; y el decreto supremo Nº 404, de 1978, del Ministerio de Hacienda, que fijó el texto refundido, coordinado y  sistematizado del  decreto con fuerza de ley Nº 353, de 1960.

    Sustitúyese el artículo 66 de la Ley Orgánica Constitucional de Municipalidades, por el siguiente:

    “Artículo 66.- La regulación de los procedimientos administrativos de contratación que realicen las municipalidades se  ajustará  a  la Ley de Bases sobre Contratos Administrativos de  Suministro  y  Prestación de Servicios y sus reglamentos.

    Sin perjuicio de lo señalado en el inciso anterior, tratándose de la suscripción de convenios marco, deberá estarse a lo establecido en el inciso tercero de la letra d), del artículo 30 de dicha ley.”.

    Artículo 38.- Efectúanse las siguientes modificaciones y derogaciones en la ley Nº 18.928 que fija normas sobre adquisiciones y enajenaciones de bienes corporales e incorporales muebles y servicios de las Fuerzas Armadas:

    a.- Sustitúyese el inciso primero del artículo 1º por el siguiente:

    “Artículo 1º.- Facúltase al Director de Logística del Ejército, al Director General de los Servicios de la Armada y al Comandante del Comando Logístico de la Fuerza Aérea para efectuar, en representación del Fisco, adquisiciones de bienes corporales e incorporales muebles y contratar o convenir servicios, a título gratuito u oneroso, en la forma establecida por la Ley de Bases  sobre Contratos Administrativos de Suministro y Prestación de Servicios. Asimismo, podrán enajenar bienes corporales e incorporales muebles ya sea a título gratuito u oneroso y celebrar contratos de arrendamiento, comodatos u otros que permitan el uso o goce de dichos bienes por la Institución correspondiente.”.

    b.- Derógase el inciso primero del artículo 3º.

    c.- Sustitúyese el inciso primero del artículo 4º por el siguiente:

    “Artículo 4º.- Los procedimientos a que se sujetarán las adquisiciones serán establecidos en el reglamento especial que al efecto se dictará conjuntamente por los Ministerios de Hacienda y Defensa Nacional. Respecto de las enajenaciones se estará a lo previsto en el reglamento contenido en el decreto Nº 42, del Ministerio de Defensa Nacional, de 1995.”.

    d.- Sustitúyese la letra c) del artículo 4º por la siguiente:

    “c) Autorizar en el último cuatrimestre la adquisición de elementos destinados a la alimentación, vestuario, equipo, forraje, combustible y lubricantes, con cargo a los fondos que se consultan en la Ley de Presupuestos del año siguiente, bajo la condición de que estos bienes sean consumidos durante la vigencia de la correspondiente Ley de Presupuestos y de acuerdo con lo que determine el reglamento que se dicte al efecto, de manera conjunta por los Ministerios de Hacienda y Defensa Nacional. En caso que dichas adquisiciones requieran de anticipos de fondos, deberá darse cumplimiento a lo que se dispone en la letra b) precedente.”.

    e) Derógase el artículo 6º.

    f) Sustitúyese el artículo 11 por el siguiente:

    “Artículo 11.- Las normas de la presente ley y la Ley de Bases sobre Contratos Administrativos de Suministro y Prestación de Servicios serán aplicables, en lo que fueren pertinentes, a las Fuerzas de Orden y Seguridad Pública y las facultades otorgadas a los Comandantes en Jefe de las Fuerzas Armadas y al Director de Logística del Ejército, al Director General de los Servicios de la Armada y al Comandante del Comando Logístico de la Fuerza Aérea, se entenderán conferidas al General Director de Carabineros, al Director General de la Policía de Investigaciones, al Director de Logística de Carabineros y al Jefe de Logística de la Policía de Investigaciones.”.

    g) Sustitúyese el artículo transitorio por el siguiente artículo final:

    “Artículo final.- Las normas sobre adquisiciones de bienes corporales e incorporales muebles y servicios de las Fuerzas Armadas serán complementadas por medio de un reglamento dictado en conjunto por los Ministerios de Hacienda y de Defensa Nacional dentro del plazo de un año contado desde la entrada en vigencia de la Ley de Bases sobre Contratos Administrativos de Suministros y Prestación de Servicios.”.

    Artículo 39.- La presente ley entrará en vigencia 30 días después de la fecha de su publicación.

    En el caso de las municipalidades, la presente ley entrará en vigencia a partir del día 1 de enero de 2004. No obstante, éstas podrán optar voluntariamente por sujetarse a las disposiciones de esta ley con anterioridad a dicha fecha, por acuerdo adoptado por la mayoría de los miembros del Concejo.

    En el caso de las Fuerzas Armadas y de las de Orden y Seguridad Pública, la presente ley entrará en vigencia a partir del 1 de enero de 2005, sin perjuicio de que por decreto supremo expedido por el Ministerio de Defensa Nacional se establezca la incorporación anticipada de tales entidades a esta ley.

    Artículos Transitorios

    Artículo 1º.- El Presidente de la República, dentro del plazo de un año contado desde la fecha de publicación de esta ley, mediante uno o más decretos expedidos a través del Ministerio de Hacienda, dictará la reglamentación que sea necesaria para la aplicación de la misma.

    Las municipalidades que tuvieren vigentes reglamentaciones sobre sus procesos de contratación de bienes y servicios, deberán ajustarlos a la normativa señalada anteriormente a más tardar al día 1 de enero de 2004.

    Artículo 2º.- Los derechos y obligaciones establecidos en el decreto supremo Nº 1.312, de 1999, del Ministerio de Hacienda, para el operador de los procedimientos de apoyo computacional del sistema de información de compras y contrataciones de la Administración, subsistirán de acuerdo a los términos del respectivo contrato.

    Artículo 3º.- Los contratos administrativos que se regulan en esta ley, cuyas bases hayan sido aprobadas antes de su entrada en vigencia, se regularán por la normativa legal vigente a la fecha de aprobación de dichas bases de licitación.

    Artículo 4º.- La primera provisión de los empleos de la Dirección de Compras y Contratación Pública se hará por concurso público, que se efectuará dentro de los 60 días contados desde la fecha de vigencia de la presente ley. En este concurso, el comité de selección estará conformado por los jefes de departamento de dicha Dirección, aplicándose en lo demás lo dispuesto por la ley Nº 18.834.

    Artículo 5º.- Los funcionarios titulares de la Dirección de Aprovisionamiento del Estado que pasen a formar parte de la Dirección de Compras y Contratación Pública conservarán el número de bienios que estuvieren percibiendo, como también el tiempo computable para el caso de uno nuevo, mantendrán el derecho a jubilar en los términos previstos en el artículo 132 del decreto con fuerza de ley Nº 338, de 1960, en relación con lo establecido en los artículos 14 y 15 transitorios de la ley Nº 18.834, y no se verán afectados en el derecho conferido por el artículo 2º transitorio de la ley Nº 18.972, en caso de corresponderles.

    Artículo 6º.- Los funcionarios titulares de la Dirección de Aprovisionamiento del Estado que no pasen a formar parte de la Dirección de Compras y Contratación Pública u otro servicio público y dejen, en consecuencia, de ser funcionarios públicos, tendrán derecho a percibir la indemnización establecida en el artículo 148 de la ley Nº 18.834, sin perjuicio de la jubilación, pensión o renta vitalicia a que puedan optar en el régimen previsional a que se acojan o estén acogidos. Esta indemnización será compatible con el desahucio que pudiere corresponderles.

    Los funcionarios que reciban el beneficio indicado en el inciso anterior no podrán ser nombrados ni contratados, ya sea a contrata o sobre la base de honorarios, en la Dirección de Compras y Contratación Pública, durante los cinco años siguientes al término de su relación laboral, a menos que previamente devuelvan la indemnización percibida, expresada en unidades de fomento más el interés corriente para operaciones reajustables.

    Artículo 7º.- Las obligaciones y derechos derivados de los procedimientos de adquisición efectuados por la Dirección de Aprovisionamiento del Estado, que se encontraren pendientes al entrar en vigencia la presente ley, se entenderán corresponder a la nueva Dirección de Compras y Contratación Pública, la que se entenderá como su continuadora legal para todos los efectos legales, hasta el momento en que finalicen los señalados procedimientos.

    Asimismo, los derechos y obligaciones relativos al sistema de información y demás servicios para la contratación electrónica que licite el Ministerio de Hacienda por intermedio de su Subsecretaría, en virtud de lo previsto en el decreto supremo Nº 1.312, de 1999, modificado por el decreto supremo Nº 826, de 2002, ambos del Ministerio de Hacienda, se entenderá que corresponden a la Dirección de Compras y Contratación Pública.

    Artículo 8º.- El patrimonio de la Dirección de Compras y Contratación Pública estará, además, formado por todos los bienes muebles o inmuebles fiscales que estuvieren destinados exclusivamente al funcionamiento de la Dirección de Aprovisionamiento del Estado, los que se le entenderán transferidos en dominio por el solo ministerio de la ley.

    Con el objeto de practicar las inscripciones y anotaciones que procedieren en los respectivos Registros Conservadores de Bienes Raíces o en el Registro Nacional de Vehículos Motorizados, el Director de Compras y Contratación Pública dictará una resolución en que individualizará los inmuebles y vehículos que en virtud de esta disposición se transfieren, la que se reducirá a escritura pública.

    Artículo 9º.- A contar de la fecha de vigencia de la planta establecida en el artículo 33, fíjase en 22 la dotación máxima de personal autorizada a la Dirección de Compras y Contratación Pública por la Ley de Presupuestos del Sector Público vigente. No regirá la limitación señalada en el inciso segundo del artículo 9º de la ley Nº 18.834, respecto de los empleos a contrata incluidos en esta dotación.

    Artículo 10.- El gasto que represente la aplicación de esta ley para el presente año se financiará con los recursos del presupuesto vigente destinados a la Dirección de Aprovisionamiento del Estado. No obstante lo anterior, el Ministerio de Hacienda, con cargo al ítem 50-01-03-25-33.104 de la partida presupuestaria Tesoro Público, podrá suplementar este presupuesto en la parte que no sea posible financiar con sus recursos.

    Artículo 11.- El Ministerio de Hacienda establecerá, mediante decreto supremo, la gradualidad de incorporación de los organismos públicos regidos por la presente ley a los sistemas a que se refieren los artículos 18, 19 y 20 de este cuerpo legal.

    Habiéndose cumplido con lo establecido en el Nº 1 del artículo 82 de la Constitución Política de la República y por cuanto he tenido a bien aprobarlo y sancionarlo; por tanto promúlguese y llévese a efecto como Ley de la República.

    Santiago, 11 de julio de 2003

    JOSE  MIGUEL INSULZA  SALINAS, Vicepresidente de la República

    María Eugenia Wagner Brizzi, Ministro de Hacienda (S).

    Francisco Huenchumilla Jaramillo, Ministro Secretario General de la Presidencia.

    Lo que transcribo a Ud. para su conocimiento.

    Saluda atentamente a Ud., María Eugenia Wagner Brizzi, Subsecretaria de Hacienda.

    Tribunal Constitucional

    Proyecto de ley de bases sobre contratos administrativos de suministro y prestación de servicios

    El Secretario del Tribunal Constitucional, quien suscribe, certifica que la Honorable Cámara de Diputados envió el proyecto de ley enunciado en el rubro, aprobado por el Congreso Nacional, a fin de que este Tribunal ejerciera el control de constitucionalidad respecto de los artículos 1º, 22, 23, 24, 25, 26, 27, 37 – inciso segundo- y 39 -inciso segundo-, del mismo, y por sentencia de 18 de junio de 2003, declaró:

    1.  Que los artículos 1º, 22, 23, 24, incisos primero y segundo, 26, 37, inciso segundo, y 39, inciso segundo, del proyecto remitido, son constitucionales.

    2.  Que este Tribunal no se pronuncia sobre los artículos 24, incisos tercero, cuarto, quinto y sexto, 25 y 27, del proyecto remitido, por versar sobre materias que no son propias de ley orgánica constitucional.

    Santiago, junio 20 de 2003.

    Rafael Larraín Cruz, Secretario.

    21Abr/21

    Decreto nº 1023 de 6 de diciembre de 2002 

    Decreto nº 1023 de 6 de diciembre de 2002, del Ministerio de Hacienda, Modifica Decreto nº 1.312 de 1999. (Publicación 20 de febrero de 2003). 

    Número 1.023

    Santiago, 6 de diciembre de 2002

    Vistos:

    Las facultades que me confieren los artículos 24, 32 nº 8 y 33, inciso tercero, de la Constitución Política de la República;

    El decreto supremo nº 4.727 (Hacienda) de 1957, Reglamento Orgánico de la Secretaría y Administración General del Ministerio de Hacienda;

    Lo dispuesto en el artículo 5º y 8º del D.F.L. nº 1-19.653, del Ministerio Secretaría General de la Presidencia, de 2000, que fija texto refundido, coordinado y sistematizado de la ley nº 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado;

    Lo previsto en el decreto supremo de Hacienda nº 1.312 de 1999, que establece el Sistema de Información de Compras y Contratación Pública;

    El decreto con fuerza de ley nº 404 de 1978, del Ministerio de Hacienda, que fija el texto refundido, coordinado y sistematizado de la Ley Orgánica de la Dirección de Aprovisionamiento del Estado;

    La resolución nº 520/96, que fija el texto refundido, coordinado y sistematizado de la resolución nº 55/92 de la Contraloría General de la República, y

    Considerando:

    La conveniencia, fundada en los principios de probidad y transparencia, de incorporar al Sistema de Información de Compras Públicas la información relativa a las contrataciones por parte de órganos de la Administración del Estado, regidos por el artículo 1º de la ley 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado, que se estima de toda pertinencia y conveniencia que deban participar en dicho Sistema, dicto el siguiente,

    DECRETO

    Artículo único:

    Suprímese en el inciso segundo del artículo primero, del decreto supremo de Hacienda nº 1.312, de 1999, modificado por el decreto supremo de Hacienda nº 826, de 2002, las expresiones: “las entidades a las que se aplica el decreto ley nº 2.763 de 1979,” y la coma (,) que le antecede.

    Anótese, tómese razón, comuníquese y publíquese

    RICARDO LAGOS ESCOBAR, Presidente de la República

    María Eugenia Wagner Brizzi, Ministro de Hacienda (S)

    Mario Fernández Baeza, Ministro Secretario General de la Presidencia.

    Lo que transcribo a Ud. para su conocimiento.

    Saluda atentamente a Ud., Mario Marcel Cullell, Subsecretario de Hacienda Subrogante.

    21Abr/21

    Decreto nº 826 de 10 de octubre de 2002,

    Decreto nº 826 de 10 de octubre de 2002, del Ministerio de Hacienda, Complementa regulaciones para el Sistema de Compras y Contrataciones Públicas. (Publicado el 11 de diciembre de 2002). 

    Número 826

    Santiago, 10 de octubre de 2002

    Vistos:

    Las facultades que me confieren los artículos 24, 32 nº8 y 33, inciso tercero, de la Constitución Política de la República;

    El decreto supremo nº 4.727 (Hacienda) de 1957, Reglamento Orgánico de la Secretaría y Administración General del Ministerio de Hacienda;

    Lo dispuesto en el artículo 5º y 8º del D.F.L. nº1-19.653, del Ministerio Secretaría General de la Presidencia, de 2000, que fija texto refundido, coordinado y sistematizado de la ley nº 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado;

     Lo previsto en el decreto supremo de Hacienda nº 1.312 de 1999, que establece Sistema de Información de Compras y Contratación Pública;

    El decreto con fuerza de ley nº 404 de 1978, del Ministerio de Hacienda, que fija el texto refundido, coordinado y sistematizado de la Ley Orgánica de la Dirección de Aprovisionamiento del Estado;

    La resolución nº 520/96, que fija el texto refundido, coordinado y sistematizado de la resolución nº 55/92 de la Contraloría General de la República, y

    Considerando:

    La conveniencia de complementar las regulaciones del Sistema de Información de Compras y Contrataciones Públicas, establecido por el decreto supremo de Hacienda nº1.312, de 1999, para que los organismos adscritos a dicho sistema puedan cumplir de mejor manera los principios de transparencia, eficacia y eficiencia en la gestión de la contratación de bienes y servicios;

    Las nuevas facilidades tecnológicas disponibles que permiten automatizar procedimientos y operar en el ámbito internet a través de redes abiertas y accesibles;

    La necesidad de otorgar un trato igualitario y eficiente a los proveedores, que les permita acceder a la información necesaria y a las facilidades electrónicas que se encuentren disponibles, para participar en los procesos de contrataciones públicas de manera expedita y en forma electrónica;

    La ley nº 19.799 sobre “Documentos Electrónicos, Firma Electrónica y Servicios de Certificación de Dicha Firma”;

    La necesidad de radicar en el coordinador en materia de contratación pública, la contratación de los procedimientos computacionales de apoyo para el desarrollo y operación del sistema; y

    Lo establecido en el Instructivo Presidencial de Gobierno Electrónico, de fecha 11 de mayo de 2001, dicto el siguiente,

    DECRETO:

    Artículo único:

    Efectúanse las siguientes modificaciones al decreto supremo de Hacienda nº 1.312, de 1999:

    1) Sustitúyese el artículo primero por el siguiente:

    “Artículo primero: Encomiéndase al Ministerio de Hacienda las labores de coordinación en materia de compras y contrataciones públicas que sean necesarias para los diversos organismos del Sector Público, para lo cual contará con la asesoría de un Consejo Asesor de Compras y Contrataciones Públicas, que integrará con especialistas en la materia, bajo la dirección del Subsecretario de Hacienda quien designará a los consejeros y especialistas que correspondan.

    Establécese un Sistema de Compras y Contrataciones aplicable a los órganos y servicios públicos contemplados en el artículo 1º de la ley nº 18.575, con excepción de la Contraloría General de la República, el Banco Central, las Fuerzas Armadas, las Fuerzas de Orden y Seguridad Pública, el Consejo Nacional de Televisión, las empresas públicas creadas por ley, las entidades a las que se aplica el decreto ley nº 2.763 de 1979, y las Municipalidades. La información y funcionalidades del sistema deberá encontrarse disponible en la red internet.

    El Ministerio de Hacienda, a través de su Subsecretaría tendrá la responsabilidad de contratar los servicios de procedimientos computacionales que se requieran como apoyo para el desarrollo y operación de este Sistema”; y

    2) En el artículo segundo:

    a) Sustitúyese la frase inicial “La información que deberán proporcionar los Servicios Públicos en este sistema, será al menos, la siguiente”, por “Todos los organismos regidos por este decreto, salvo aquellos especialmente exceptuados, deberán informar permanentemente respecto de:”;

    b) Agrégase en la letra a) de dicho artículo segundo, el siguiente inciso segundo nuevo: “Salvo disposición legal o reglamentaria en otro sentido se podrá optar por hacer las publicaciones de los llamados a licitación exclusivamente a través de este sistema, para lo cual se adoptarán las medidas que resguarden adecuadamente los intereses públicos comprometidos, conservando, además, los antecedentes de respaldo del llamado que se publique.”;

    c) Agrégase el siguiente inciso final: “Todos los procesos de contratación efectuados por los organismos regidos por este decreto, deberán publicarse en el Sistema desde su inicio, esto es, desde el llamado en las licitaciones públicas y desde la solicitud de cotización en el resto de las contrataciones.”.

    3) Sustitúyese el Artículo Sexto, por el siguiente:

    “Artículo sexto: Los organismos públicos regidos por el presente decreto, podrán efectuar en el Sistema de Compras sus procesos de contratación administrativa a través de medios electrónicos idóneos, ajustándose para ello a la ley nº 19.799 y demás normativa legal pertinente.

    4) Agréganse los siguientes artículos:

    “Artículo séptimo: La Dirección de Aprovisionamiento del Estado llevará un listado actualizado de antecedentes de aquellas personas naturales o jurídicas, chilenas o extranjeras que manifiesten su voluntad de participar como proveedores del Sistema de Información de Compras y Contratación Pública, el cual estará disponible para los usuarios de dicho Sistema.

    Artículo octavo: Los organismos públicos estarán obligados a remitir de manera continua la información que el presente decreto les requiere, sólo respecto de las contrataciones que superen las U.F. 10 (Diez Unidades de Fomento).”.

    Anótese, tómese razón, comuníquese y publíquese.

    RICARDO LAGOS ESCOBAR, Presidente de la República.

    Nicolás Eyzaguirre Guzmán, Ministro de Hacienda.

    Mario Fernández Baeza, Ministro  Secretario General de la Presidencia.

    Lo que transcribo a Ud. para su conocimiento.

    Saluda atentamente a Ud., María Eugenia Wagner Brizzi, Subsecretaria de Hacienda.

    21Abr/21

    Decreto nº 1.312, de 22 de septiembre de 1999

    Decreto nº 1.312, de 22 de septiembre de 1999. Establece sistema de información de compras y contrataciones públicas. (Publicado el 26 de noviembre de 1999).

    Número 1.312

    Santiago, 22 de septiembre de 1999

    Vistos:

    Las facultades que me confieren los artículos 24, 32 nº 8 y 33, inciso tercero, de la Constitución Política.

    El artículo 2º, letra a) y b) de la ley 18.993, que crea el Ministerio Secretaría General de la Presidencia, y su Reglamento Orgánico, contenido en el decreto supremo nº 7, de 1991, de dicho Ministerio.

    El decreto supremo nº 7.912 (Interior), de 1927, que reorganiza las Secretarías de Estado y el decreto supremo nº 4.727 (Hacienda), de 1957, Reglamento Orgánico de la Secretaría y Administración General del Ministerio de Hacienda.

    La resolución nº 520/96, que fija el texto refundido, coordinado y sistematizado de la resolución nº 55/92, de la Contraloría General de la República.

    Considerando :

    Lo señalado en el Programa de Reforma al Sistema de Compras y Contrataciones del Sector Público, aprobado por el Comité Interministerial de Modernización de la Gestión Pública en enero de 1998, y que se enmarca en la línea de acción ”Transparencia y Probidad de la Gestión Pública” del Plan Estratégico 1997-2000 de Modernización de la Gestión Pública sancionado por el mismo Comité en enero de 1997.

    El proceso de modernización de la gestión del Estado, actualmente en marcha, que entre sus objetivos persigue lograr la mayor transparencia y eficiencia en la gestión de la Administración, como una condición indispensable en la modernización de los procesos de ejecución.

    La necesaria incorporación y aprovechamiento de nuevas tecnologías para el logro de los objetivos programados en materia de gestión de adquisiciones y contrataciones.

    DECRETO

    Artículo primero:

    Encomiéndase al Ministerio de Hacienda las labores de coordinación en materia de compras y contrataciones públicas que sean necesarias para los diversos organismos del Sector Público, para lo cual contará con la asesoría de un Consejo Asesor de Compras y Contrataciones Públicas, que integrará con especialistas en la materia, bajo la dirección del Subsecretario de Hacienda quien designará a los consejeros y especialistas que correspondan.

    (Artículo único, nº 1 del Decreto nº 826, Hacienda, D.0. 11 de diciembre de 2002)

    Establécese un Sistema de Compras y Contrataciones aplicable a los órganos y servicios públicos contemplados en el artículo 1º de la ley nº 18.575, con excepción de la Contraloría General de la República, el Banco Central, las Fuerzas Armadas, las Fuerzas de Orden y Seguridad Pública, el Consejo Nacional de Televisión, las empresas públicas creadas por ley y las Municipalidades. La información y funcionalidades del sistema deberá encontrarse disponible en la red internet.

    (Artículo Único, Decreto nº 1023, Hacienda, D.O. 20 de febrero de 2003)

    El Ministerio de Hacienda, a través de su Subsecretaría tendrá la responsabilidad de contratar los servicios de procedimientos computacionales que se requieran como apoyo para el desarrollo y operación de este Sistema.

    Artículo segundo:

    Todos los organismos regidos por este decreto, salvo aquellos especialmente exceptuados, deberán informar permanentemente respecto de:

    (Artículo único, nº 2, a) del Decreto nº 826, Hacienda, D.O. 11 de diciembre de 2002)

    a) Los llamados a licitaciones públicas. Para estos efectos deberán entregar la misma información que contengan los avisos publicados en los medios de prensa para convocar la licitación respectiva, en la misma oportunidad en que se efectúe dicha publicación.

    Salvo disposición legal o reglamentaria en otro sentido se podrá optar por hacer las publicaciones de los llamados a licitación exclusivamente a través de este sistema, para lo cual se adoptarán las medidas que resguarden adecuadamente los intereses públicos comprometidos, conservando, además, los antecedentes de respaldo del llamado que se publique.

    (Artículo único, nº 2, b) del Decreto nº 826, Hacienda, D.O. 11 de diciembre de 2002)

    b) Las bases de las licitaciones públicas, y las consultas y aclaraciones que se hicieren respecto de su contenido;

    c) El acta de adjudicación de las licitaciones públicas y privadas que se efectúen, indicando qué oferentes se presentaron y a cuál de ellos se adjudicó el contrato. De existir puntajes y ponderaciones se mencionarán; en caso contrario, se dejará constancia de la o las razones que motivaron la selección del contratante. Tratándose de licitaciones privadas deberá informarse, además, qué personas fueron invitadas a participar en ellas.

    d) Otras observaciones acerca de la licitación que el Servicio considere de interés, como la existencia de oferentes descalificados por encontrarse fuera de bases, y

    e) Todas las contrataciones que efectúen, sea que el contrato haya sido adjudicado en virtud de una licitación pública o privada o sea que se trate de una contratación directa. Deberá informarse, al menos, el precio convenido, las prestaciones contratadas, el plazo de ejecución y la individualización del contratante.

    Todos los procesos de contratación efectuados por los organismos regidos por este decreto, deberán publicarse en el Sistema desde su inicio, esto es, desde el llamado en las licitaciones públicas y desde la solicitud de cotización en el resto de las contrataciones.

    (Artículo único, nº 2, c) del Decreto nº 826, Hacienda, D.O. 11 de diciembre de 2002)

    Artículo tercero:

    Será responsabilidad de cada Ministerio controlar el cumplimiento de las disposiciones del presente decreto, respecto de los Servicios Públicos de su dependencia o relacionados, según las instrucciones que dispondrá el Ministerio de Hacienda. En las mismas instrucciones se establecerán los mecanismos para enviar la información señalada en el artículo precedente y dar cumplimiento a las tareas de coordinación a que se refiere el artículo primero de este decreto.

    Artículo cuarto:

    Los órganos exceptuados en el artículo primero podrán acogerse voluntariamente a las normas del presente decreto, mediante una comunicación escrita en tal sentido, dirigida al Ministerio de Hacienda.

    De incorporarse voluntariamente a este sistema las Fuerzas Armadas y/o las Fuerzas de Orden y Seguridad Pública, no estarán obligadas a informar las contrataciones relativas a temas que puedan afectar la defensa nacional o la seguridad pública.

    Artículo quinto:

    El Ministerio de Hacienda podrá concordar con otros órganos y servicios la forma de financiamiento de este sistema.

    Artículo sexto:

    Los organismos públicos regidos por el presente decreto, podrán efectuar en el Sistema de Compras sus procesos de contratación administrativa a través de medios electrónicos idóneos, ajustándose para ello a la ley nº19.799 y demás normativa legal pertinente.

    (Artículo único, nº 3, del Decreto nº 826, Hacienda, D.O. 11 de diciembre de 2002)

    Artículo séptimo:

    La Dirección de Aprovisionamiento del Estado llevará un listado actualizado de antecedentes de aquellas personas naturales o jurídicas, chilenas o extranjeras que manifiesten su voluntad de participar como proveedores del Sistema de Información de Compras y Contratación Pública, el cual estará disponible para los usuarios de dicho Sistema.

    (Artículo único, nº 4, del Decreto nº 826, Hacienda, D.O. 11 de diciembre de 2002)

    Artículo octavo:

    Los organismos públicos estarán obligados a remitir de manera continua la información que el presente decreto les requiere, sólo respecto de las contrataciones que superen las U.F. 10 (Diez Unidades de Fomento).

    (Artículo único, nº 4, del Decreto nº 826, Hacienda, D.O. 11 de diciembre de 2002)

    Anótese, tómese razón, comuníquese y publíquese.

    EDUARDO FREI RUIZ-TAGLE, Presidente de la República.

    Eduardo Aninat Ureta, Ministro de Hacienda.

    José Miguel Insulza Varas, Ministro Secretario General de la Presidencia.

    Lo que transcribo a Ud. para su conocimiento.- Saluda a Ud., Manuel Marfán Lewis, Subsecretario de Hacienda.

    21Abr/21

    Decreto nº 24 de 22 de febrero de 2019

    Decreto nº 24 de 22 de febrero de 2019, del Ministerio de Economía, Fomento y Turismo; Subsecretaria de Economía y Empresas de menor tamaño, que aprueba Norma Técnica para la prestación del Servicio de Certificación de Firma Electrónica Avanzada. (Publicado el 9 de abril de 2019). 

    Número 24

    Santiago, 22 de febrero de 2019.

    Visto:

    Lo dispuesto en el artículo 32 nº 6 de la Constitución Política de la República; en el decreto con fuerza de ley nº 1-19.653, de 2001, del Ministerio Secretaría General de la Presidencia, que fija el texto refundido, coordinado y sistematizado de la ley nº 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado; en la ley nº 19.880, que establece bases de los procedimientos administrativos que rigen los actos de los Órganos de la Administración del Estado; en la ley nº 19.477, ley orgánica del Servicio de Registro Civil e Identificación; la ley nº 7.200; el decreto con fuerza de ley nº 88, de 12 de mayo de 1953, del Ministerio de Hacienda, que adopta las medidas que indica en relación con el Ministerio de Economía y Comercio y sus atribuciones y actividades; en la ley nº 19.799 sobre documentos electrónicos, firma electrónica y la certificación de dicha firma; en el decreto supremo nº 181, de 2002, y sus modificaciones contenidas en el decreto supremo nº 154, de 2011 y en el decreto supremo nº 14, de 2014, todos del Ministerio de Economía, Fomento y Turismo; en el decreto exento n° 2.466, de 8 de julio de 2013, que aprueba el Convenio de Cooperación para la implementación del sistema “ClaveÚnica” suscrito entre el Ministerio Secretaría General de la Presidencia y el Servicio de Registro Civil e Identificación; y lo dispuesto en la resolución nº 1.600, de 2008, de la Contraloría General de la República, que fijó normas sobre exención del trámite de toma de razón.

    Considerando:

    1.- Que, la letra e) del artículo 12 de la ley nº 19.799, sobre documentos electrónicos, firma electrónica y servicios de certificación de dicha firma, dispone que es obligación del prestador de servicios de certificación de firma electrónica en el otorgamiento de certificados de firma electrónica avanzada, comprobar fehacientemente la identidad del solicitante, para lo cual el prestador requerirá previamente, ante sí o ante notario público u oficial del Registro Civil, la comparecencia personal y directa del solicitante o de su representante legal si se tratare de persona jurídica.

    2.- Que, el artículo 5º del decreto supremo nº 181, de 2002, del Ministerio de Economía, Fomento y Reconstrucción, actual Ministerio de Economía, Fomento y Turismo, que contiene el reglamento de la ley nº 19.799, en adelante el “Reglamento”, dispone que la Entidad Acreditadora podrá iniciar un procedimiento de fijación, modificación o derogación de normas técnicas para la prestación del servicio de certificación de firma electrónica avanzada, las que deberán ser aprobadas mediante decreto supremo del Ministerio de Economía, Fomento y Turismo.

    3.- Que, la denominada “ClaveÚnica” es un mecanismo de identificación digital que permite a los usuarios demostrar su identidad en plataformas digitales, ya que el Servicio de Registro Civil e Identificación verifica que la identidad digital corresponde a determinada persona, validándola contra su base de datos.

    4.- Que, actualmente más de cuatro millones de chilenos cuenta con dicha clave, la que les permite acceder a más de trescientos trámites de manera no presencial ante Órganos del Estado.

    5.- Que, con el objeto de permitir que más ciudadanos puedan acceder a la firma electrónica avanzada, es que se ha identificado que los prestadores de servicios de certificación pueden comprobar fehacientemente la identidad de un solicitante de firma electrónica avanzada a través del sistema de “ClaveÚnica“, cumpliendo con lo dispuesto en la letra e) del artículo 12 de la ley nº 19.799, al que se hace referencia en el considerando primero del presente acto administrativo.

    6.- Que, atendido lo señalado en los considerandos precedentes, se consideró necesario aprobar una norma técnica que permita fijar las condiciones técnico-operacionales bajo las cuales el prestador de servicios de certificación podrá comprobar fehacientemente la identidad de un solicitante de firma electrónica avanzada a través del sistema de “ClaveÚnica“.

    7.- Que, el artículo 5º del Reglamento dispone que la Entidad Acreditadora podrá iniciar el procedimiento de fijación de normas técnicas para la prestación del servicio de certificación de firma electrónica avanzada, notificando a los prestadores de servicios de certificación acreditados respecto del objeto y propuestas de fijación de normas técnicas, otorgando un plazo no inferior a 30 días hábiles para que aquellas efectúen las observaciones que estimen pertinentes. Asimismo, establece que la Entidad Acreditadora deberá publicar en su sitio web, por igual período, el objeto y propuesta de normas técnicas. Vencido el plazo para las observaciones, la Entidad Acreditadora evaluará las observaciones recibidas y determinará las normas técnicas que serán fijadas, modificadas o derogadas, las que serán aprobadas mediante decreto del Ministro de Economía, Fomento y Turismo.

    8.- Que, con fecha 20 de noviembre de 2018, se inició el procedimiento a que se refiere el considerando precedente, notificando a las certificadoras de firma electrónica acreditadas acerca del objeto y propuestas de fijación de esta norma técnica, otorgándoles el plazo de 30 días hábiles para que efectuaran las observaciones que estimaran pertinentes. Asimismo, durante igual período se mantuvo publicado el objeto y propuesta de norma en el sitio web de la Entidad Acreditadora, y en el sitio web institucional y en el de participación ciudadana del Ministerio de Economía, Fomento y Turismo para que los interesados formularan sus observaciones.

     9.- Que, durante el procedimiento a que se refiere el considerando precedente, se recibieron observaciones formuladas por algunas de las empresas certificadoras y por terceros, las que fueron evaluadas por este Ministerio.

    10.- Que, habiendo dado cumplimiento a lo requerido por el Reglamento de la ley nº 19.799, es necesario fijar la norma técnica mediante la dictación del presente acto administrativo.

    Decreto:

    Artículo único:

    Apruébase la siguiente norma técnica, que permitirá a los Certificadores o Prestadores de Servicios de Certificación, acreditados ante la Subsecretaría de Economía y Empresas de Menor Tamaño, utilizar el sistema de “ClaveÚnica“, para verificar la identidad de los solicitantes de un certificado de firma electrónica avanzada.

    “Norma Técnica de Seguridad”

    Artículo 1°

    La presente norma establece las condiciones bajo las cuales el Certificador o Prestador de Servicios de Certificación de Firma Electrónica Acreditado reconocerá el sistema denominado “ClaveÚnica“, como medio de comprobación fehaciente de la identidad del solicitante de un certificado de firma electrónica avanzada, en los términos exigidos por el artículo 12 letra e) de la ley nº19.799.

    Artículo 2°

    Para que el Certificador o Prestador de Servicios de Certificación pueda utilizar el sistema denominado “ClaveÚnica” será obligación adherir a las condiciones y términos establecidos en dicha plataforma.

    Artículo 3°

    El Certificador o Prestador de Servicios de Certificación de firma electrónica avanzada una vez integrado al sistema denominado “ClaveÚnica” deberá, además, implementar un mecanismo complementario digital de comprobación de identidad del solicitante para la emisión de un certificado de firma electrónica avanzada.

     El o los mecanismos complementarios que decida implementar el Certificador o Prestador de Servicios de Certificación deberán declararse en las Políticas y Prácticas de Certificación, conforme a lo dispuesto en el artículo 6º del decreto supremo nº 181, de 2002, del Ministerio de Economía, Fomento y Turismo, con expresa mención de la fiabilidad que estos mecanismos tienen.

    Artículo 4°

    Una vez que el Certificador o Prestador de Servicios de Certificación se haya adherido a los términos y condiciones del sistema denominado “ClaveÚnica” y haya implementado el mecanismo complementario establecido en el artículo precedente, podrá comenzar a emitir certificados de firma electrónica avanzada a los solicitantes que sean titulares de una “ClaveÚnica” cuya obtención cumpla con lo dispuesto en el artículo 12 letra e) de la ley nº 19.799.

    Artículo 5°

    Los certificados de firma electrónica avanzada, que se emitan utilizando el medio de comprobación de identidad referido en esta norma técnica, podrán ser almacenados en dispositivos, individuales o masivos, que cumplan con el estándar FIPS PUB 140-2: Security Requirements for Cryptographic Modules (mayo 2001).

    Los datos de creación de firma, almacenados en dispositivos masivos, deberán encontrarse protegidos mediante un segundo factor de seguridad que permita al titular controlar que el acceso y utilización de éstos únicamente pueda ser realizado por él. Estos factores de seguridad deberán encontrarse declarados de manera clara en las Políticas y Prácticas de Certificación, con expresa mención de la fiabilidad que éstos tienen.

    Artículo 6°

    Los Certificadores o Prestadores de Servicios de Certificación deberán tomar todas las medidas para adecuarse a la presente norma técnica en un plazo máximo de 90 días corridos.

    Anótese, tómese razón y publíquese

    SEBASTIÁN PIÑERA ECHENIQUE, Presidente de la República

    José Ramón Valente Vias, Ministro de Economía, Fomento y Turismo.

    Lo que transcribe para su conocimiento.

    Saluda atentamente a usted, Ignacio Guerrero Toro, Subsecretario de Economía y Empresas de Menor Tamaño.

    21Abr/21

    Decreto nº 14 de 15 de enero de 2014

    Decreto nº 14 de 15 de enero de 2014 del Ministerio de Economía, Fomento y Turismo; Subsecretaría de Economía, Fomento y Turismo, que modifica Decreto nº 181, de 2002, que aprueba Reglamento de la Ley 19.799 sobre Documentos Electrónicos, Firma Electrónica y la Certificación de dicha Firma, y deroga los Decretos que indica, del Ministerio de Economía, Fomento y Turismo; Subsecretaría de Economía y Empresas de menor tamaño. (Publicado el 27de febrero de 2014).

    Número 14

    Santiago, 15 de enero de 2014

    Vistos:

    Lo dispuesto en el artículo 32º nº6 de la Constitución Política de la República; en el decreto con fuerza de ley nº 1-19.653, de 2001, del Ministerio Secretaría General de la Presidencia que fija el texto refundido, coordinado y sistematizado de la ley nº 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado, en especial lo prescrito en sus artículos 2º y 5º; en la ley nº 18.993 que crea el Ministerio Secretaría General de la Presidencia; en la ley nº 19.880 que establece Bases de los Procedimientos Administrativos que rigen los actos de los órganos de la Administración del Estado; en la ley nº 19.799 sobre documentos electrónicos, firma electrónica y la certificación de dicha firma; en el decreto supremo nº 181, de 2002, del Ministerio de Economía, Fomento y Reconstrucción; en los decretos Supremos nº 77 y nº 81, de 2004, del Ministerio Secretaría General de la Presidencia; en el decreto supremo nº 100, de 2006, del Ministerio Secretaría General de la Presidencia; en el decreto supremo nº 271, de 2009, del Ministerio de Economía Fomento y Reconstrucción; y lo dispuesto en la resolución nº 1600, de 2008, de la Contraloría General de la República, que fija normas sobre exención del trámite de toma de razón;

    Considerando:

    1) Que, las tecnologías y estándares que le dan sustento a los documentos electrónicos están permanentemente evolucionando;

    2) Que, se hace necesario generar condiciones de mayor flexibilidad para la adopción de estándares comunes e internacionalmente aceptados para el desarrollo del uso de documentos electrónicos por los órganos de la Administración del Estado;

    3) Que, para que ello sea posible, se hace necesario que la Administración del Estado se encuentre preparada para actuar con la máxima celeridad y a través de un organismo técnico altamente especializado;

    4) Que, en este sentido, la correcta implementación de políticas de gobierno electrónico que permitan un eficaz empleo de las tecnologías de la información al interior de la Administración del Estado exige importantes esfuerzos de coordinación y un constante seguimiento;

    5) Que, en este sentido, el Comité de Normas para el Documento Electrónico creado por el decreto supremo nº 181, de 2002, del Ministerio de Economía, Fomento y Reconstrucción, durante los años ha mostrado no poder cumplir con dicha función dado que, en su calidad de comité ad hoc, sólo funciona de forma esporádica;

    6) Que, el Ministerio Secretaría General de la Presidencia, de conformidad a la ley 18.993, es la Cartera de Estado encargada de realizar las funciones de coordinación en la gestión del Gobierno;

    7) Que, en mérito de lo anterior, se hace necesario dotar al Ministerio Secretaría General de la Presidencia de la facultad de fijar las normas técnicas que permitan normalizar el expedito y eficiente desarrollo e implementación del Gobierno Electrónico, a fin de lograr cumplir los objetivos de la ley nº 19.799, esto es, entre otros la interoperabilidad de la documentación electrónica de los órganos de la Administración del Estado;

    8) Que, por otra parte, se hace necesaria la debida actualización de la normativa técnica que se dispone en materia de Gobierno Electrónico a fin de que ésta refleje los estándares tecnológicos que se emplean presentemente.

    Decreto:

    Artículo 1º:

    Modifícase el decreto supremo nº 181, de 2002, del Ministerio de Economía, Fomento y Reconstrucción, del siguiente modo:

    1) Reemplázase el inciso final del Artículo 5º, por el siguiente nuevo:

    “Si la fijación o modificación de normas técnicas tratadas en este artículo requieren recursos adicionales o la coordinación de diversas entidades para su implementación, el decreto que aprueba las normas técnicas deberá ser firmado, además, por los Ministros de Hacienda y de Secretaría General de la Presidencia.”

    2) Reemplázase íntegramente el actual artículo 47º, por el siguiente nuevo:

    “Artículo 47º. El Ministerio Secretaría General de la Presidencia propondrá al Presidente de la República las normas técnicas que deberán seguir los órganos de la Administración del Estado para garantizar la publicidad, integridad, eficacia, interoperabilidad y seguridad en el uso de los documentos electrónicos, las que serán aprobadas mediante uno o más decretos supremos, expedidos por dicha Cartera de Estado. Asimismo, deberá establecer las normas técnicas que permitan estandarizar la atención al ciudadano a través de técnicas y medios electrónicos. Si la fijación o modificación de las normas técnicas a las que se refiere este inciso requieren de recursos adicionales, el decreto supremo que las aprueba deberá ser firmado también por el Ministro de Hacienda.

    El Ministerio podrá dictar, a través de resolución, guías técnicas para facilitar la comprensión e implementación de las normas técnicas antes aludidas.

    El Ministerio deberá revisar al menos cada dos años las normas técnicas señaladas en el presente artículo a fin de determinar si éstas requieren o no de actualización. El plazo antes indicado se contará desde la entrada en vigencia de la norma técnica respectiva.

    Finalmente, dicho Ministerio deberá publicar en su sitio Web, semestralmente, el nivel de cumplimiento de las normas fijadas en virtud de la presente disposición.

    Lo establecido en la presente disposición es sin perjuicio de las normas técnicas determinadas en virtud del artículo 5º de este reglamento.”

    3) Reemplázase íntegramente el actual artículo 48º, por el siguiente nuevo:

    “Artículo 48º. El Ministerio Secretaría General de la Presidencia deberá considerar al menos los siguientes criterios para elaborar la propuesta de las normas técnicas a que se refiere el artículo anterior:

    a) Adoptar los estándares internacionales emitidos por organismos reconocidos en la materia, en su ausencia considerará los de carácter regional y, sólo cuando ninguno de ellos se encuentre disponible, observará los de desarrollo nacional.

    b) Propender a que la determinación de normas técnicas sea sometida a consulta ciudadana, de conformidad con lo dispuesto en la Ley 20.500 sobre asociaciones y participación ciudadana en la gestión pública y a la consulta de otros órganos de la Administración del Estado, tales como el Ministerio Economía, Fomento y Turismo, Ministerio del Interior y Seguridad Pública y Ministerio de Transportes y Telecomunicaciones.

    c) Adoptar las normas técnicas que sean de uso frecuente en el país.

    d) Realizar los procesos de adopción de normas con la gradualidad necesaria, que permita a los órganos de la Administración del Estado adecuarse a los cambios y su correcta implementación.

    4) Derógase el artículo 49º.

    5) Derógase el artículo 50º.

    6) Reemplázase el actual inciso final del Artículo 51º, por el siguiente nuevo:

    “Con la finalidad de garantizar dicha compatibilidad se estará a las normas técnicas fijadas por el Ministerio Secretaría General de la Presidencia de conformidad a lo dispuesto en el artículo 47º.”

    7) Derógase el artículo 54º.

    Artículo 2º:

    Derógase el decreto supremo nº 77, de 2004, del Ministerio Secretaría General de la Presidencia.

    Artículo 3º:

    Derógase el decreto supremo nº 81, de 2004, del Ministerio Secretaría General de la Presidencia.

    Artículo 4º:

    Derógase el decreto supremo nº 100, de 2006, del Ministerio Secretaría General de la Presidencia.

    Artículo 5º:

    Derógase el decreto supremo nº 271, de 2009, del Ministerio de Economía Fomento y Reconstrucción.

    DISPOSICIONES TRANSITORIAS

    Artículo primero:

    En tanto no se aprueben las normas a que se alude en el numeral 2) del artículo 1º del presente decreto, se fijan como normas técnicas las siguientes:

    1) Normas técnicas sobre documentos electrónicos, comunicaciones electrónicas e interoperabilidad.

    Los órganos de la Administración del Estado, con excepción de las municipalidades, empresas del Estado y Universidades Públicas, que utilicen técnicas y medios electrónicos darán cumplimiento a las siguientes normas técnicas, con el objeto de resguardar la debida interoperabilidad entre éstos:

    1.1) Normas Técnicas y estándares para los Documentos Electrónicos e interoperabilidad de los mismos:

    a) Con miras a facilitar la publicidad, integridad, eficacia, flexibilidad, extensibilidad, permanencia e interoperabilidad de los documentos electrónicos, se deberán seguir las normas y/o estándares técnicos que a continuación se enuncian:

    b) En caso que se desee obtener una representación impresa de un documento electrónico suscrito con firma electrónica, dicho documento deberá contener además, un mecanismo que permita verificar la integridad y autenticidad del mismo.

    c) Los documentos electrónicos deberán adoptar los esquemas y metadatos que correspondan según lo establecido en el presente decreto.

    d) El manejo de los documentos electrónicos deberá hacerse de conformidad a las normas técnicas sobre seguridad y confidencialidad establecidas en el decreto supremo nº 83, de 2005, del Ministerio Secretaría General de la Presidencia, o las normas que lo reemplacen.

    e) En la confección de los expedientes electrónicos se deberá garantizar la autenticidad, integridad y disponibilidad de los mismos. Asimismo, se estará a lo dispuesto en la ley nº 19.880.

    f) Cada institución deberá mantener un repositorio de documentos electrónicos, el cual será accesible por medios electrónicos.

    Las implementaciones de los repositorios considerarán los siguientes tipos de búsqueda de información: texto completo, navegación y búsqueda avanzada.

    En este sentido, se deberán establecer identificadores para hacer referencias a documentos en los repositorios.

    1.2) Normas Técnicas para las Comunicaciones Electrónicas:

    a) Para los efectos de la presente norma técnica, se deberán seguir las especificaciones técnicas que a continuación se enuncian:

    b) Los órganos de la Administración del Estado deberán tomar las medidas de seguridad tendientes a evitar la interceptación, obtención, alteración y otras formas de acceso no autorizado a sus comunicaciones electrónicas.

    Para lo anterior se estará a lo dispuesto en las normas técnicas establecidas en el decreto supremo nº 83, de 2005, del Ministerio Secretaría General de la Presidencia, o las normas que lo reemplacen, y a las especificaciones técnicas establecidas en el presente decreto.

    2) Normas sobre la fijación de esquemas y metadatos de los documentos electrónicos empleados por los órganos de la Administración del Estado.

    Con miras a estandarizar los esquemas y metadatos de los documentos electrónicos empleados por los órganos de la Administración del Estado, el Ministerio Secretaría General de la Presidencia implementará y establecerá un catálogo abierto de esquemas y metadatos.

    En dicho catálogo, se pondrán a disposición un conjunto de esquemas y metadatos para documentos de uso común de los órganos de la Administración del Estado, componentes comunes, acceso a interfaces de programación de aplicaciones (API) y documentación técnica de implementación de estos servicios de información.

    Una vez que el Ministerio haya creado los esquemas y metadatos, su uso será obligatorio para todos los órganos de la Administración del Estado.

    En caso que un esquema o metadato no se encuentre creado y disponible, el servicio que lo requiera, deberá elevar una solicitud de creación al Ministerio Secretaría General de la Presidencia, el que deberá proceder a analizar la factibilidad de su creación. Dicho análisis se realizará dentro de los 30 días contados desde la solicitud y se traducirá en la emisión de una resolución fundada del Ministerio, en donde se accederá o negará la creación del esquema o metadato.

    En caso que se acceda a la creación del esquema o metadato solicitado, el Ministerio procederá a crear y poner a disposición de todos los órganos de la Administración del Estado el nuevo esquema o metadato. Lo anterior se realizará dentro de los 20 días siguientes a la fecha en que se realice.

    Sin perjuicio de lo establecido en los párrafos anteriores, el Ministerio podrá, de oficio, crear nuevos esquemas y metadatos, reemplazar y modificar los existentes si estima que lo anterior es necesario para asegurar la interoperabilidad de los documentos electrónicos.

    Los atributos y forma que adoptarán los esquemas y metadatos serán detallados por el Ministerio.

    3) Normas técnicas sobre sitios electrónicos y plataformas web abiertas.

    Los sitios electrónicos y plataformas web abiertas de los órganos de la Administración del Estado deben seguir las directrices que a continuación se enuncian:

    a) Los sitios electrónicos y plataformas web abiertas deberán ser desarrollados de manera tal que garanticen la disponibilidad y la accesibilidad de la información, así como el debido resguardo a los derechos de los titulares de datos personales, y asegurando la interoperabilidad de los contenidos, funciones y prestaciones ofrecidas por el respectivo órgano de la Administración del Estado, con prescindencia de las plataformas, hardware y software que sean utilizados.

    b) Los sitios electrónicos y plataformas web abiertas deberán ser desarrollados para que las personas que utilizan los sitios web accedan de manera rápida, efectiva y eficiente a los servicios, funciones y prestaciones ofrecidas por éstos.

    c) Para el desarrollo de sitios electrónicos y plataformas web abiertas, deberán implementarse estándares de desarrollo, compatibilidad y las directrices principales de las normas internacionales y nacionales sobre accesibilidad, de manera de permitir su acceso a personas con discapacidad. Para dichos los efectos, se asumirán los estándares internacionales definidos por la W3C.

    d) Los sitios electrónicos y plataformas web abiertas deberán utilizar estándares actualizados de desarrollo web recomendados por la W3C, asegurando su acceso en cualquier momento, lugar y en todo tipo de dispositivo electrónico que permita su visualización.

    e) Adicionalmente, se deberá avanzar en el soporte a la web semántica para el desarrollo de sitios electrónicos y plataformas web, basadas en datos abiertos, semánticos y vinculados.

    En este sentido, los sitios electrónicos y plataformas web abiertas, deberán emplear estándares y formatos abiertos que permitan su reutilización y procesamiento automatizado. Asimismo, la información publicada en tales los sitios y plataformas dirigidas al público en general deberá ser puesta a disposición del público bajo un sistema de licenciamiento abierto que permita su empleo sin mayores restricciones (por ejemplo, la licencia “Creative Commons Atribución“).

    f) Para asegurar la compatibilidad en la codificación de caracteres en sistemas digitales se utilizará preferentemente la codificación UTF-8.

    g) El administrador de los sitios electrónicos y plataformas web abiertas de la institución deberá monitorear regularmente la actividad de estas plataformas utilizando herramientas que permitan analizar el comportamiento de uso del mismo, así como la gestión de errores e indisponibilidad, a fin de adoptar las medidas preventivas y correctivas oportunas, en aras de mejorar la calidad de las prestaciones e información que se brindan por su intermedio.

    h) Los órganos de la Administración del Estado deberán tener un plan de contingencia para cada sitio electrónico o plataforma web abierta que administren, el cual contemplará las medidas a ser ejecutadas en el caso que la plataforma deje de estar disponible para el público, o que el nivel de acceso disminuya o sea intermitente, o que se vea comprometido por ataques externos.

    i) Los órganos de la Administración del Estado deberán adoptar, mantener y declarar una política de privacidad de sus respectivos sitios electrónicos y plataformas web abiertas, la que deberá encontrarse accesible desde su primera página e incluir las menciones que indique la guía de privacidad que se dicte especialmente al efecto.

    j) Todo sitio web deberá hacer uso del dominio .gob.cl o .gov.cl, registrándolos previamente ante la División de Informática del Ministerio del Interior.

    De igual modo, los sitios web deberán registrar en sus servicios de nombres las tablas reversas de la o las direcciones IP asociadas a los dominios .gob.cl o .gov.cl correspondientes.

    k) Todo sitio electrónico dirigido al público en general deberá poner a disposición un medio que permita la comunicación electrónica entre las personas y el órgano titular del sitio.

    En este sentido, se deberá preferir, por sobre el despliegue de identificadores de casillas electrónicas de contacto, el uso de formularios web o equivalente funcional, para que los interesados establezcan contacto con el servicio.

    l) En caso de recibirse alguna comunicación electrónica por parte de un interesado a través de los medios de comunicación señalados en el literal anterior, el administrador del sitio enviará de inmediato los antecedentes al funcionario o la autoridad que corresponda, informando de ello al interesado. En este sentido, se dará cumplimiento a lo dispuesto en el artículo 24 de la ley nº 19.880.

    m) Los jefes de servicio deberán designar a uno o más funcionarios que serán los responsables de administrar los sitios electrónicos y/o plataformas web abiertas de la institución.

    Asimismo, dichas personas serán responsables de velar por el cumplimiento de lo dispuesto en la presente norma técnica y las guías que se dicten en virtud de la misma.

    Dicho administrador deberá ser designado dentro de los 30 días contados desde la publicación de este decreto. En aquellos órganos en que no se designe, actuará como administrador el Jefe de Servicio.

    4) Guías técnicas y de implementación.

    El Ministerio deberá publicar las guías que sean necesarias para la adecuada comprensión, implementación y especificación de las normas técnicas singularizadas en el presente artículo transitorio.

    Dichas guías especificarán, al menos, las siguientes materias: 

    a) Desarrollo de plataformas web abiertas seguras;

    b) Publicación de esquemas y metadatos;

    c) Publicación de datos abiertos;

    d) Accesibilidad y despliegue de contenidos digitales web;

    e) Desarrollo e implementación de la interoperabilidad en el Estado;

    f) Sobre confección y administración de expedientes electrónicos;

    g) Seguridad de las comunicaciones electrónicas;

    h) Privacidad en los sitios electrónicos y plataformas web abiertas.

    Las guías que se dicten sobre las materias indicadas en los literales precedentes deberán ser puestas a disposición del público en el sitio www.guiadigital.gob.cl.

    5) Glosario de términos.

    Para los efectos de las normas técnicas establecidas en este artículo, se entenderá por:

    a) API (Application program interface o interfaces de programación de aplicaciones): conjunto de funciones y procedimientos (o métodos, en la programación orientada a objetos) que ofrece una biblioteca para ser utilizada por otro software como una capa de abstracción.

    b) Creative Commons: es una organización sin fines de lucro, cuya finalidad es ofrecer un modelo legal de licencias que facilitan la distribución y uso de contenidos protegidos por derechos de autor;

    c) Dirección IP: etiqueta numérica que identifica, de manera lógica y jerárquica, a una interfaz de un dispositivo dentro de una red IP, corresponde al nivel de red del Modelo OSI (Capa 3).

    d) Documento electrónico: toda representación de un hecho, imagen o idea que sea creada, enviada, comunicada o recibida por medios electrónicos y almacenada de un modo idóneo para permitir su uso posterior.

    e) Esquema: la estructura de un documento XML, expresada a través de la especificación XML Schema.

    f) FTP (File Transfer Protocol): protocolo de red para la transferencia de archivos entre sistemas conectados a una red TCP (Transmission Control Protocol), basado en la arquitectura cliente-servidor.

    g) TCP (Transmission Control Protocol): protocolo de comunicación orientado a conexión fiable del nivel de transporte, documentado por IETF en el RFC 793. Es un protocolo de capa 4 según el modelo OSI.

    h) Plataforma web abierta: tecnologías que ofrecen la posibilidad de una Web ágil y fácil de utilizar para las personas, además de dotarla de mecanismos que permitan transformarla en una gran base de datos abierta, distribuida y enlazada.

    i) HTML 5: especificación que define la quinta revisión del lenguaje Hypertext Markup Language (HTML), regulado por el Consorcio W3C.

    j) HTTP (Hypertext Transfer Protocol): protocolo de transferencia de hipertexto, orientado a transacciones que sigue el esquema petición-respuesta entre un cliente y un servidor documentado por IETF en el RFC 2616.

    k) HTTPS (Hypertext Transfer Protocol Secure): Protocolo seguro de transferencia de hipertexto basado en el protocolo http que utiliza cifrado basado en SSL/TLS para crear un canal seguro de transmisión de información, documentado por IETF en el RFC 2819.

    l) IETF (Internet Engineering Task Force): organización internacional abierta de estandarización de la arquitectura e ingeniería de Internet (http://www.ietf.org)

    m) Interoperabilidad: capacidad que permite a sistemas heterogéneos, operar y comunicarse entre sí.

    n) ISO (International Organization for Standardization): organización internacional dedicada al establecimiento de normas técnicas internacionales en materia de productos, servicios y buenas prácticas(http://www.iso.org)

    o) JSON (JavaScript Object Notation): formato de texto para el intercambio ligero de datos estructurados.

    p) Metadatos: datos que proporcionan información o documentación acerca de otros datos administrados en alguna aplicación o ambiente.

    q) MIME (Multipurpose Internet Mail Extensions): serie de convenciones o especificaciones dirigidas al intercambio a través de Internet (Mensajería electrónica) de todo tipo de archivos (texto, audio, vídeo, etc.) de forma transparente para el usuario, documentado por IETF en los RFC 2045, RFC 2046, RFC 2047, RFC 4288, RFC 4289 y RFC 2077.

    r) Repositorio: estructura electrónica donde se almacenan los documentos electrónicos.

    s) SFTP: protocolo que proporciona la funcionalidad necesaria para la transferencia y manipulación de archivos sobre un flujo de datos seguro sobre una red TCP.

    t) S/MIME (Secure/ Multipurpose Internet Mail Extensions): provee servicios de seguridad criptográfica para aplicaciones de mensajería electrónica y se considera estándar para criptografía de clave pública y firmado de correo electrónico encapsulado en MIME.

    u) Sistema: conjunto de uno o más computadores, software asociado, periféricos, terminales, operadores humanos, procesos físicos, medio de transferencia de información y otros, que forman un todo autónomo capaz de realizar procesamiento de información y/o transferencia de información.

    v) Sitio electrónico: software de aplicación que los usuarios pueden utilizar accediendo a un servidor web a través de internet o de una intranet mediante un navegador.

    w) Sitio web: Colección de páginas de internet relacionadas y comunes a un dominio o subdominio de Internet, accesible frecuentemente a través de una URL.

    x) SMTP (Simple Mail Transport Protocol): Protocolo de la capa de aplicación para la transferencia simple de correo electrónico, está definido en el RFC 2821 y es un estándar oficial de Internet.

    y) SSH (Secure Shell): protocolo y programa que sirve para acceder a máquinas remotas a través de una red de forma segura, utilizando técnicas de cifrado que hacen que la información que viaja por el medio de comunicación vaya de manera no legible, RFC 4251.

    z) Unicode: sistema de código que provee un número único para cada carácter, independiente de la plataforma o el idioma.

    aa) URI (Universal Resource Identifier): identificador único de recursos, utilizado para identificar un recurso en Internet. Un caso particular son los URL que son localizadores de recursos (por ejemplo archivos html, o elementos multimediales) en la Web.

    bb) UTF-8 (UCS Transformation Format 8): formato de codificación de caracteres Unicode e ISO 10646 utilizando símbolos de longitud variable, RFC 3629.

    cc) W3C: World Wide Web Consortium, organización sin fines de lucro dedicada a la generación de los estándares utilizados en Internet (http://www.w3.org).

    dd) XHTML: lenguaje de marcado para hipertexto extensibles. Una versión XML del lenguaje original HTML para documentos en la Web;

    ee) XML (Extensible Markup Language): lenguaje que permite crear etiquetas para organizar e intercambiar contenidos más eficientemente. Corresponde a una versión simplificada de SGML (Standard Generalized Markup Language).

    ff) XML Schema: lenguaje (gramática) para especificar esquemas de XML.

    gg) XML Signature: especificación para implementar firma electrónica en documentos vinculados con XML.

    hh) RDF: Marco de Descripción de Recursos (del inglés Resource Description Framework, RDF) especificación W3C diseñado como un marco para la representación de la información en la Web (Metadatos).

    ii) XSL (Extensible Stylesheet Language): es una familia de recomendaciones de la W3C para definir la transformación y presentación de XML.

    Artículo segundo:

    Los esquemas y metadatos creados en virtud del procedimiento establecido en el Decreto Supremo nº 271, de 2009, del Ministerio de Economía Fomento y Reconstrucción, se mantendrán vigentes, sin perjuicio de lo establecido en inciso final del numeral 2) del artículo primero transitorio.

    Tómese razón, regístrese, comuníquese y publíquese

    SEBASTIÁN PIÑERA ECHENIQUE, Presidente de la República

    Félix De Vicente Mingo, Ministro de Economía, Fomento y Turismo

    Andrés Chadwick Piñera, Ministro del Interior y Seguridad Pública

    Cristián Larroulet Vignau, Ministro Secretario General de la Presidencia

    Pedro Pablo Errázuriz Domínguez, Ministro de Transportes y Telecomunicaciones.

    Lo que transcribe, para su conocimiento.

    Saluda atentamente a Usted, Tomás Flores Jaña, Subsecretario de Economía, y Empresas de Menor Tamaño.

    20Abr/21

    Decreto nº 154 de 11 de noviembre de 2011

    Decreto nº 154 de 11 de noviembre de 2011, que modifica Decreto nº 181, de 2002, que aprueba Reglamento de la Ley nº 19.799 sobre Documentos Electrónicos, Firma Electrónica y la Certificación de dicha Firma, del Ministerio de Economía, Fomento y Turismo; Subsecretaria de Economía y Empresas de menor tamaño. (Publicado el 11 de agosto de 2012).

    Número 154

    Santiago, 18 de noviembre de 2011

    Vistos:

    Lo dispuesto en el artículo 32º nº 6 de la Constitución Política de la República; en la ley 19.799 sobre documentos electrónicos, firma electrónica y la certificación de dicha firma; en el decreto supremo 181, de 9 de julio de 2002, del Ministerio de Economía, Fomento y Reconstrucción, que aprueba el Reglamento de la Ley nº 19.799 sobre Documentos Electrónicos, Firma Electrónica y la Certificación de dicha Firma (en adelante “el Reglamento”); y en la resolución nº 1.600, de 2008, de la Contraloría General de la República, que fija normas sobre exención del trámite de toma de razón.

    Considerando:

    1. Que, desde la dictación del Reglamento, el desarrollo tecnológico que ha experimentado la firma electrónica avanzada ha producido la obsolescencia de parte importante de las normas técnicas establecidas reglamentariamente.

    2. Que lo anterior ha generado dos efectos no deseados por la normativa reglamentaria: Por una parte, el mantenimiento de bajos estándares de seguridad y calidad del servicio en comparación a los patrones internacionales, lo cual ha provocado una desconfianza en el sistema; y por la otra, la imposibilidad de incorporar nuevos dispositivos de firma electrónica avanzada a precios más bajos, impidiendo la masificación del uso de dicha firma.

    3. Que, en virtud de los principios de Neutralidad Tecnológica y Compatibilidad Internacional contenidos en el artículo 1º de la ley nº 19.799, se hace necesario actualizar las normas técnicas que regulan la firma electrónica, documentos electrónicos y la certificación de dicha firma, a fin de equipararlas a los estándares internacionales en la materia.

    4. Que, asimismo, se requiere establecer procedimiento expedito para la fijación, modificación o derogación de normas técnicas que materialicen los objetivos de la ley nº 19.799, y permita al sistema reaccionar eficazmente a la evolución tecnológica, otorgando una mayor seguridad y confianza a sus usuarios.

    5. Que, en mérito de lo anterior, se hace necesario dotar a la Subsecretaría de Economía y Empresas de Menor Tamaño, en cuanto Entidad Acreditadora, de la facultad para fijar, modificar o derogar las normas técnicas aplicables a los prestadores de servicios de certificación, sean públicos o privados, a fin de lograr cumplir los objetivos de la ley nº 19.799, esto es, entre otros: otorgar altos niveles de seguridad y eficiencia al sistema, y eliminar las barreras que actualmente han impedido la masificación de la firma electrónica avanzada.

    Decreto:

    Artículo primero:

    Modifícase el Reglamento en los términos que siguen:

    1. Reemplázase íntegramente el actual artículo 5º, por el siguiente nuevo:

    “Artículo 5º. A petición de parte o de oficio, la Entidad Acreditadora podrá iniciar el procedimiento de fijación, modificación o derogación de normas técnicas para la prestación del servicio de certificación de firma electrónica avanzada.

    Dicho procedimiento se iniciará notificando a cada uno de los prestadores de servicios de certificación acreditados acerca del objeto y propuestas de modificación o fijación de normas técnicas, otorgando un plazo no inferior a 30 días hábiles para que aquellas efectúen las observaciones que estimen pertinentes. Además, la Entidad Acreditadora deberá publicar en su sitio web, por igual período, el objeto y propuesta de normas técnicas.

    Las observaciones efectuadas por los prestadores de servicios de certificación acreditados no serán vinculantes para la Entidad Acreditadora.

    Vencido el plazo para las observaciones, la Entidad Acreditadora evaluará las observaciones recibidas y determinará las normas técnicas que serán fijadas, modificadas o derogadas, las que serán aprobadas mediante decreto del Ministro de Economía, Fomento y Turismo.

    De ser necesario, se podrán fijar conjuntos alternativos de normas técnicas para la prestación del servicio con el objeto de permitir el uso de diversas tecnologías y medios electrónicos, en conformidad a la ley y el presente reglamento.

    Si la fijación o modificación de normas técnicas relativas a documentos electrónicos aplicables a los órganos del Estado requiere recursos adicionales o la coordinación de diversas entidades para su implementación, el decreto que aprueba las normas técnicas deberá ser firmado, además, por los Ministros de Hacienda y de Secretaría General de la Presidencia.”.

    2. Reemplázase en el actual inciso primero del artículo 15 la frase “y este Reglamento“, por la frase “, este Reglamento y las normas técnicas“.

     3. Reemplázase en el actual artículo 35 la frase “a las establecidas en este Reglamento“, por la frase “a las aprobadas de acuerdo al artículo 5º“.

    4. Reemplázase en el actual artículo 44 la frase “con normas técnicas equivalentes a aquellas fijadas para los prestadores de servicios de certificación acreditados para el desarrollo de la actividad”, por la frase “las normas técnicas aprobadas de acuerdo al artículo 5º”.

    5. Reemplázase en el actual artículo 51 la frase “fijadas a instancia del Comité creado en el artículo 47 del presente Reglamento”, por la frase “aprobadas de acuerdo al artículo 5º”.

    Artículo segundo:

    Reemplázase la disposición primera transitoria del Reglamento, por la siguiente nueva:

    “Primera. En tanto no sean aprobadas las normas técnicas a que se refiere el artículo 5º, se fijan como normas técnicas para todos los fines previstos en este Reglamento las siguientes:

    a) Prácticas de Certificación:

    ETSI TS 102 042 V1.1.1 (2002-04). Technical Specification. Policy requirements for certification authorities issuing public key certificates.

    NCh2805.Of2003 Tecnología de la Información – Requisitos de las políticas de las autoridades certificadoras que emiten certificados de claves públicas.

    ETSI TS 102 042 V1.2.2 (2005-06). RTS/ESI-000043. Keywords e-commerce, electronic signature, public key, security.

    ETSI TS 102 042 V2.1.1 (2009-05). Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates.

    ETSI TS 102 042 V2.1.2 (2010-04). Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates.

    b) Seguridad:

    NCh27002.Of2009 Tecnología de la información – Código de práctica para la gestión de seguridad de la información.

    ISO/IEC 15408-1:2009 Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model

    FIPS PUB 140-2: Security Requirements for Cryptographic Modules (mayo 2001).

    NCh.2820/1.Of2003 Tecnología de la información – Técnica de seguridad – Criterio de evaluación de la seguridad de TI – Parte 1: Introducción y modelo general.

    NCh2829.Of.2003 Tecnología de la Información – Requisitos de Seguridad para Módulos Criptográficos.

    c) Estructura de Certificados:

    ISO/IEC 9594-8: 2005 Information Technology – Open Systems Interconnection – The Directory Attribute Certificate Framework. Correccion 2:2009.

    ITU – T Rec.X.690 (2002) / ISO/IEC 8825-1:2002. ASN.1 Basic Encoding Rules.

    NCh2798.Of2003 Tecnología de la Información – Reglas de codificación ASN.1 “Especificación de las reglas de codificación básica (BER) de las reglas de codificación canónica (CER) y de las reglas de codificación distinguida (DER).

    d) Repositorio de Información:

    NCh2832.Of2003 Tecnología de la información – Protocolos operacionales de infraestructura de clave pública LDAPv2 para Internet X.509.

    RFC 2559 Boeyen, S. et al., “Internet X.509 Public Key Infrastructure. Operational Protocols LDAPv2”, abril 1999.

    RFC 3377 LDAPv3: Technical Specification, September 2002, Lightweight Directory Access Protocol (v3): Technical.

    e) Sellado de Tiempo/Time stamping:

    ETSI TS 102 023, v.1.2.1 y v.1.2.2. Electronic Signatures and Infrastructures (ESI); Policy requirements for time-stamping authorities.

    ETSI TS 101 861 V1.3.1 Time-stamping profile.

    ISO/IEC 18014-1:2008 Information technology – Security techniques – Time-stamping services – Part 1: Framework.

    ISO/IEC 18014-2:2009 Information technology – Security techniques – Time-stamping services – Part 2: Mechanism producing independent tokens.

    ISO/IEC 18014-3:2009 Information technology – Security techniques – Time-stamping services – Part 3: Mechanisms producing linked tokens.

    RFC 3161 Internet X.509 Public Key Infrastructure Time – Stamp Protocol (TSP) (2001), RFC 5816 (update), ANSI ASC X 9.95.

    RFC 3628 Requirements for Times Stamping Authorities.

    NIST Special publication 800-102, Sept. 2009.

    f) DNI Electrónico y su Identidad Biométrica:

    ISO/ 19.785, ISO 19.794-2 Formatos de cabecera y datos de referencia.

    ISO 7816-4, ISO 7816-11 Para la definición de los comandos de la tarjeta.

    ANSI X.9.84 – 2003 – Reconocimiento de firmas, huellas digitales.

    ISO/IEC 27N2949 – Condiciones de los sistemas biométricos para la industria de servicios financieros.

    ISO/IEC 19784-1:2005, también conocido como BioAPI 2.0. Conexión entre dispositivos biométricos y diferentes tipos de aplicaciones, interfaz de programación de aplicaciones biométricas (API).

    Common Biometric Exchange Fice Format – formatos comunes de intercambio de archivos biométricos.

    g) Servicios de firma móvil:

    ETSI TS 102 207 V1.1.3 (2003-08) Mobile Commerce (M-COMM); Mobile Signature Service; Specifications for Roaming in Mobile Signature Services.

    ETSI TR 102 206 V.1.1.3 (2003-08) Mobile Commerce (M-COMM); Mobile Signature Service; Security Framework.

    ETSI TR 102 203 V1.1.1 (2003-05) Mobile Signatures; Business and functional Requirements.

    ETSI TS 102 204 V1.1.4 (2003-08) Mobile Signature Service; Web Service Interface.

    Además, para el buen uso de las políticas de firma electrónica basada en certificados, se deberán tener en cuenta las siguientes especificaciones técnicas:

    ETSI TS 101 733, v.1.6.3, v1.7.3 y v.1.8.1. Electronic Signatures and Infrastructures (SEI); CMS Advanced Electronic Signatures (CAdES).

    ETSI TS 101 903, v.1.2.2, v.1.3.2 y 1.4.1. Electronic Signatures and Infrastructures (SEI); XML Advanced Electronic Signatures (XAdES).

    ETSI TS 102 778, v 1.1.2. Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles;

    Part 1: PAdES Overview,

    Part 2: PAdES Basic – Profile based on ISO 32000-1,

    Part 3: PAdES Enhanced – PAdES-BES and PAdESEPES Profiles;

    Part 4: Long-term validation

    ETSI TS 102 176-1 V2.0.0 Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms.

    ETSI TR 102 038, v.1.1.1. Electronic Signatures and Infrastructures (SEI); XML format for signature policies.

    ETSI TR 102 041, v.1.1.1. Electronic Signatures and Infrastructures (SEI); Signature policies report.

    ETSI TR 102 045, v.1.1.1. Electronic Signatures and Infrastructures (SEI); Signature policy for extended business model.

    ETSI TR 102 272, v.1.1.1. Electronic Signatures and Infrastructures (SEI); ASN.1 format for signature policies.

    IETF RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol – OCSP.

    IETF RFC 3125, Electronic Signature Policies.

    IETF RFC 3161 actualizada por RFC 5816, Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP).

    IETF RFC 5280, RFC 4325 y RFC 4630, Internet X.509 Public Key Infrastructure; Certificate and Certificate Revocation List (CRL) Profile.

    IETF RFC 5652, RFC 4853 y RFC 3852, Cryptographic Message Syntax (CMS).

    ITU-T Recommendation X.680 (1997): “Information technology – Abstract Syntax Notation One (ASN.1): Specification of basic notation”

    Artículo transitorio

    Único:

    Las disposiciones del presente decreto entrarán en vigencia 180 días después de su publicación en el Diario Oficial.

    Anótese, tómese razón, comuníquese y publíquese

    SEBASTIÁN PIÑERA ECHENIQUE, Presidente de la República

    Pablo Longueira Montes, Ministro de Economía, Fomento y Turismo

    Cristian Larroulet Vignau, Ministro Secretario General de la Presidencia

    Pedro Pablo Errázuriz Domínguez, Ministro de Transportes y Telecomunicaciones.

    Lo que transcribe para su conocimiento

    Saluda atentamente a usted, Tomás Flores Jaña, Subsecretario de Economía y Empresas de Menor Tamaño.

    CONTRALORÍA GENERAL DE LA REPÚBLICA

    División Jurídica

    Cursa con alcances el decreto nº 154, de 2011, del Ministerio de Economía, Fomento y Turismo

    nº 47.490

    Santiago, 6 de agosto de 2012.

    Esta Entidad de Control ha dado curso al documento del rubro, mediante el cual se modifica el decreto nº 181, de 2002, del entonces Ministerio de Economía, Fomento y Reconstrucción -que aprobó el reglamento de la ley nº 19.799, sobre documentos electrónicos, firma electrónica y certificación de dicha firma- por cuanto se ajusta a derecho.

    No obstante, cumple hacer presente que esta Contraloría General entiende que la fijación, modificación o derogación de las normas técnicas a que se refiere el inciso cuarto del nuevo artículo 5º que se incorpora al citado decreto nº 181, de 2002, en virtud de lo establecido en el artículo primero, nº 1, del instrumento en examen, será aprobada mediante decreto supremo expedido a través del Ministerio de Economía, Fomento y Turismo.

    En el mismo orden de ideas, se considera que cuando se trate de los supuestos a que alude el inciso sexto del mencionado artículo 5º, esto es, de aquellos en que la fijación o modificación de normas técnicas relativas a documentos electrónicos aplicables a los órganos del Estado requiere de recursos adicionales o de la coordinación de diversas entidades para su implementación, la respectiva fijación o modificación también ha de ser sancionada mediante decreto supremo expedido a través del Ministerio de Economía, Fomento y Turismo, acto que, en tales casos, junto con ser suscrito por el Presidente de la República y el Secretario de Estado de la referida Cartera, deberá ser firmado por el Ministro de Hacienda y el Ministro Secretario General de la Presidencia.

    Con los alcances que anteceden se ha tomado razón del documento del epígrafe.

    Saluda atentamente a Ud., Ramiro Mendoza Zúñiga, Contralor General de la República.

    Al señor

    Ministro de Economía, Fomento y Turismo

    Presente.

    20Abr/21

    Ley nº 20.217 de 5 de octubre de 2007

    Ley nº 20.217 de 5 de octubre de 2007 del Ministerio de Economía, Fomento y Reconstrucción, Subsecretaría de Economía, Fomento y Reconstrucción. Modifica el Código de Procedimiento y la Ley nº 19.799 sobre documento electrónico, firma electrónica y servicios de certificación de dicha firma. (Publicada el 12 de noviembre de 2007).

    Teniendo presente que el H. Congreso Nacional ha dado su aprobación al siguiente:

    Proyecto de ley:

    Artículo 1°

    Introdúcense las siguientes modificaciones en el Código de Procedimiento Civil.

    1) Agrégase el siguiente número 6, nuevo, en el artículo 342:

     “6. Los documentos electrónicos suscritos mediante firma electrónica avanzada.”.

    2) Agrégase el siguiente artículo 348 bis nuevo:

    “Artículo 348 bis. Presentado un documento electrónico, el Tribunal citará para el 6° día a todas las partes a una audiencia de percepción documental. En caso de no contar con los medios técnicos electrónicos necesarios para su adecuada percepción, apercibirá a la parte que presentó el documento con tenerlo por no presentado de no concurrir a la audiencia con dichos medios.

    Tratándose de documentos que no puedan ser transportados al tribunal, la audiencia tendrá lugar donde éstos se encuentren, a costa de la parte que los presente.

    En caso que el documento sea objetado, en conformidad con las reglas generales, el Tribunal podrá ordenar una prueba complementaria de autenticidad, a costa de la parte que formula la impugnación, sin perjuicio de lo que se resuelva sobre pago de costas. El resultado de la prueba complementaria de autenticidad será suficiente para tener por reconocido o por objetado el instrumento, según corresponda.

    Para los efectos de proceder a la realización de la prueba complementaria de autenticidad, los peritos procederán con sujeción a lo dispuesto por los artículos 417 a 423.

    En el caso de documentos electrónicos privados, para los efectos del artículo 346, n°3, se entenderá que han sido puestos en conocimiento de la parte contraria en la audiencia de percepción.”.

    Artículo 2°

    Introdúcense las siguientes modificaciones en la ley nº 19.799.

    1) Agrégase en el artículo 2° la siguiente letra i), nueva:

    “i). Fecha electrónica: conjunto de datos en forma electrónica utilizados como medio para constatar el momento en que se ha efectuado una actuación sobre otros datos electrónicos a los que están asociados.”.

    2) Reemplázase el número 2 del artículo 5º de la ley nº 19.799, por el siguiente:

    “2. Los que posean la calidad de instrumento privado, en cuanto hayan sido suscritos con firma electrónica avanzada, tendrán el mismo valor probatorio señalado en el número anterior. Sin embargo, no harán fe respecto de su fecha, a menos que ésta conste a través de un fechado electrónico otorgado por un prestador acreditado.

    En el caso de documentos electrónicos que posean la calidad de instrumento privado y estén suscritos mediante firma electrónica, tendrán el valor probatorio que corresponda, de acuerdo a las reglas generales.”.

    Y por cuanto he tenido a bien aprobarlo y sancionarlo; por tanto promúlguese y llévese a efecto como Ley de la República.

    Santiago, 5 de octubre de 2007

    MICHELLE BACHELET JERIA, Presidenta de la República

    Alejandro Ferreiro Yazigi, Ministro de Economía, Fomento y Reconstrucción

    Carlos Maldonado Curti, Ministro de Justicia.

    Lo que transcribe para su conocimiento

    Saluda atentamente a usted, Ana María Correa López, Subsecretaria de Economía.

    20Abr/21

    Decreto nº 83, junio de 2004

    Decreto nº 83, junio de 2004 del Ministerio Secretaría General de la Presidencia. Aprueba norma técnica para los órganos de la administración del Estado sobre seguridad y confidencialidad de los documentos electrónicos. (Publicado el 12 de enero de 2005).

    APRUEBA NORMA TECNICA PARA LOS ORGANOS DE LA ADMINISTRACION DEL ESTADO SOBRE SEGURIDAD Y CONFIDENCIALIDAD DE LOS DOCUMENTOS ELECTRONICOS

    Núm 83

    Santiago, 3 de junio de 2004

    Vistos: Lo dispuesto en el artículo 32º nº 8 de la Constitución Política de la República; el artículo 3º letra a) del DFL nº 7.912, de 1927; la ley nº 19.799, sobre documentos electrónicos, firma electrónica y la certificación de dicha firma; el decreto supremo nº 181, de 2002, del Ministerio de Economía, Fomento y Reconstrucción; y lo dispuesto en la resolución nº 520, de 1996, que fija el texto refundido, coordinado y sistematizado de la resolución nº 55, de 1992, ambas de la Contraloría General de la República.

    Considerando:

    1.- Que, el artículo 47 del DS. nº 181 de 2002, del Ministerio de Economía, Fomento y Reconstrucción, Reglamento de la ley nº 19.799 sobre documentos electrónicos, firma electrónica y servicios de certificación de dicha firma, en adelante el Reglamento, creó el Comité de Normas para el Documento Electrónico.

    2.- Que, el Comité, en su agenda de trabajo fijada en sesión de fecha 8 de enero de 2003, estableció la determinación de una norma técnica para la seguridad y confidencialidad del documento electrónico y los repositorios en que se almacenan, como una de sus tareas inmediatas.

    3.- Que, para el desarrollo de la referida tarea, la Secretaría Técnica del Comité creó un grupo de trabajo sobre seguridad y confidencialidad del documento electrónico, en el que participaron representantes de los miembros del Comité de Normas para el Documento Electrónico, del Ministerio del Interior, de la Contraloría General de la República, del Instituto Nacional de Normalización, del Servicio de Impuestos Internos, del Servicio Nacional de Aduanas, de la Armada de Chile, del Banco Central de Chile, del Banco Estado, de Microsoft, de Orion 2000, de Neosecure, de Sinacofi, y de American Telecommunication, y que fue asesorado técnicamente por la Universidad de Chile a través de CLCERT.

    4.- Que el trabajo se realizó de conformidad con la política gubernamental orientada a la incorporación de las Tecnologías de la Información y Comunicaciones en los órganos de la Administración del Estado, para mejorar los servicios e información ofrecidos a los ciudadanos y la eficiencia y la eficacia de la gestión pública, e incrementar sustantivamente la transparencia del sector público y la participación de los ciudadanos.

    DECRETO:

    Artículo primero

    Apruébase la siguiente norma técnica sobre seguridad y confidencialidad del documento electrónico para los órganos de la Administración del Estado.

    ”NORMA TECNICA SOBRE SEGURIDAD Y CONFIDENCIALIDAD DEL DOCUMENTO ELECTRONICO”

    TITULO I. AMBITO DE APLICACIÓN

    Artículo 1º

    La presente norma técnica establece las características mínimas obligatorias de seguridad y confidencialidad que deben cumplir los documentos electrónicos de los órganos de la Administración del Estado, y las demás cuya aplicación se recomienda para los mismos fines.

    Las exigencias y recomendaciones previstas en esta norma, tienen por finalidad garantizar estándares mínimos de seguridad en el uso, almacenamiento, acceso y distribución del documento electrónico; facilitar la relación electrónica entre los órganos de la Administración del Estado y entre éstos y la ciudadanía y el sector privado en general; y salvaguardar el uso del documento electrónico de manera segura, confiable y en pleno respeto a la normativa vigente sobre confidencialidad de la información intercambiada.

    Artículo 2º

    Las disposiciones de la presente norma técnica se aplicarán a los documentos electrónicos que se generen, intercambien, transporten y almacenen en o entre los diferentes organismos de la Administración del Estado y en las relaciones de éstos con los particulares, cuando éstas tengan lugar utilizando técnicas y medios electrónicos.

    Artículo 3º

    Para los efectos de esta norma, los documentos electrónicos constituyen un activo para la entidad que los genera y obtiene. La información que contienen es resultado de una acción determinada y sustenta la toma de decisiones por parte de quien la administra y accede a ella.

    Artículo 4º

    Esta norma se cumplirá en dos etapas, de conformidad con los siguientes niveles:

    Nivel 1. Nivel básico de seguridad para el documento electrónico.

    Nivel 2. Nivel avanzado de seguridad para el documento electrónico.

    TITULO II. DEFINICIONES

    Artículo 5º

    Para los propósitos de esta norma, se entenderá por:

    a)  Autenticación: proceso de confirmación de la identidad del usuario que generó un documento electrónico y/o que utiliza un sistema informático.

    b)  Confidencialidad: aseguramiento de que el documento electrónico sea conocido sólo por quienes están autorizados para ello.

    c)  Contenido del documento electrónico: información, ideas y conceptos que un documento expresa.

    d)  Continuidad del negocio: continuidad de las operaciones de la institución.

    e)  Disponibilidad: aseguramiento de que los usuarios autorizados tengan acceso oportuno al documento electrónico y sus métodos de procesamiento.

    f)  Documento electrónico: toda representación de un hecho, imagen o idea que sea creada, enviada, comunicada o recibida por medios electrónicos y almacenada de un modo idóneo para permitir su uso posterior.

    g)  Documentos públicos: aquellos documentos que no son ni reservados ni secretos y cuyo conocimiento no está circunscrito.

    h)  Documentos reservados: aquellos documentos cuyo conocimiento está circunscrito al ámbito de la respectiva unidad del órgano a que sean remitidos, en virtud de una ley o de una norma administrativa dictada en conformidad a ella, que les confiere tal carácter.

    i)  Documentos secretos: los documentos que tienen tal carácter de conformidad al artículo 13 de la Ley Orgánica Constitucional de Bases Generales de la Administración del Estado y su Reglamento.

    j)  Ejecutivo: autoridad dentro de la institución.

    k)  Identificador formal de autenticación: mecanismo tecnológico que permite que una persona acredite su identidad utilizando técnicas y medios electrónicos.

    l)  Incidentes de seguridad: situación adversa que amenaza o pone en riesgo un sistema informático.

    m)  Información: contenido de un documento electrónico.

    n)  Integridad: salvaguardia de la exactitud y totalidad de la información y de los métodos de procesamiento del documento electrónico, así como de las modificaciones realizadas por entes debidamente autorizados.

    o)  Negocio: función o servicio prestado por la organización.

    p)  Política de seguridad: conjunto de normas o buenas prácticas, declaradas y aplicadas por una organización, cuyo objetivo es disminuir el nivel de riesgo en la realización de un conjunto de actividades de interés, o bien garantizar la realización periódica y sistemática de este conjunto.

    q)  Repositorio: estructura electrónica donde se almacenan documentos electrónicos.

    r)  Riesgos: amenazas de impactar y vulnerar la seguridad del documento electrónico y su posibilidad de ocurrencia.

    s)  Sistema informático: conjunto de uno o más computadores, software asociado, periféricos, terminales, usuarios, procesos físicos, medios de transferencia de información y otros, que forman un todo autónomo capaz de realizar procesamiento de información y/o transferencia de información.

    t)  Usuario: entidad o individuo que utiliza un sistema informático.

    TITULO III. DE LA SEGURIDAD DEL DOCUMENTO ELECTRÓNICO EN GENERAL

    Artículo 6º

    La seguridad del documento electrónico se logra garantizando los siguientes atributos esenciales del documento:

    a)  Confidencialidad;

    b)  Integridad;

    c)  Factibilidad de autenticación, y

    d)  Disponibilidad.

    Artículo 7º

    Los atributos esenciales que aportan seguridad al documento electrónico se obtienen y sostienen mediante la ejecución permanente de las siguientes acciones:

    a)  Desarrollar y documentar políticas de seguridad de uso, almacenamiento, acceso y distribución del documento electrónico y de los sistemas informáticos utilizados en su procesamiento;

    b)  Diseñar y documentar los procesos y procedimientos para poner en práctica las políticas de seguridad;

    c)  Implementar los procesos y procedimientos señalados precedentemente;

    d)  Monitorear el cumplimiento de los procedimientos establecidos y revisarlos de manera de evitar incidentes de seguridad;

    e)  Concientizar, capacitar y educar a los usuarios para operar los sistemas informáticos de acuerdo a las exigencias establecidas;

    f)  Definir y documentar los roles y responsabilidad de las entidades e individuos involucrados en cada una de las letras anteriores.

    Artículo 8º

    Los órganos de la Administración regidos por esta norma deberán aplicar sus disposiciones para garantizar los atributos esenciales que confieren seguridad al documento electrónico, definidos en el artículo 6.

    No obstante, la consecución y mantención de tales atributos por parte de cada órgano de la Administración del Estado estarán sujetas a la consideración de factores de riesgo y factores de costo/beneficio. Estos últimos podrán invocarse mediante una resolución fundada del jefe de servicio correspondiente, basada en un estudio de análisis de riesgo y/o costo/beneficio.

    TITULO IV. DEL NIVEL BÁSICO DE SEGURIDAD DEL DOCUMENTO ELECTRÓNICO

    Párrafo 1º. Normas generales

    Artículo 9º

    Durante la primera etapa de aplicación de esta norma, los órganos de la Administración del Estado desarrollarán las políticas, procedimientos, acciones y medidas tendientes a obtención del Nivel Básico de Seguridad de los documentos electrónicos que se establecen en este Título.

    Artículo 10º

    El Nivel Básico de Seguridad para el documento electrónico tiene por objeto:

    a)  Garantizar condiciones mínimas de seguridad y confidencialidad en los documentos electrónicos que se generan, envían, reciben, procesan y almacenan entre los órganos de la Administración del Estado;

    b)  Facilitar la adopción de requerimientos de seguridad más estrictos por parte de aquellos organismos y en aquellos tópicos que se estimen necesarios, y

    c)  Facilitar el Nivel avanzado de seguridad para el documento electrónico, en aquellos organismos cuyo desarrollo institucional lo requiera.

    Párrafo 2º. Política de seguridad

    Artículo 11

    Deberá establecerse una política que fije las directrices generales que orienten la materia de seguridad dentro de cada institución, que refleje claramente el compromiso, apoyo e interés en el fomento y desarrollo de una cultura de seguridad institucional.

    La política de seguridad deberá incluir, como mínimo, lo siguiente:

    a)  Una definición de seguridad del documento electrónico, sus objetivos globales, alcance e importancia.

    b)  La difusión de sus contenidos al interior de la organización.

    c)  Su reevaluación en forma periódica, a lo menos cada 3 años.

    Las políticas de seguridad deberán documentarse y explicitar la periodicidad con que su cumplimiento será revisado.

    Párrafo 3º. Seguridad organizacional

    Artículo 12

    En cada organismo regido por esta norma deberá existir un encargado de seguridad, que actuará como asesor del Jefe de Servicio correspondiente en las materias relativas a seguridad de los documentos electrónicos.

    Las funciones específicas que desempeñe internamente el encargado de seguridad serán establecidas en la resolución que lo designe. En todo caso, deberá tener, a lo menos, las siguientes funciones:

    a)  Tener a su cargo el desarrollo inicial de las políticas de seguridad al interior de su organización y el control de su implementación, y velar por su correcta aplicación.

    b)  Coordinar la respuesta a incidentes computacionales.

    c)  Establecer puntos de enlace con encargados de seguridad de otros organismos públicos y especialistas externos que le permitan estar al tanto de las tendencias, normas y métodos de seguridad pertinentes.

    Párrafo 4º. Clasificación, control y etiquetado de bienes

    Artículo 13

    Los documentos electrónicos y sistemas informáticos deberán clasificarse y etiquetarse para indicar la necesidad, prioridad y grado de protección.

    La clasificación de un sistema informático debe corresponder a la clasificación más estricta aplicable al documento electrónico que almacene o procese, de conformidad con el decreto supremo 26 de 2001, del Ministerio Secretaría General de la Presidencia.

    A cada sistema informático, deberá asignársele un responsable quien velará por su debida clasificación y etiquetado.

    Artículo 14

    Todo documento electrónico deberá ser asignado, explícita o implícitamente, a un responsable. En este último caso, el encargado de seguridad deberá proponer quién será responsable por omisión, sea asignando tal responsabilidad al usuario que lo crea, sea atribuyéndosela al responsable por el sistema informático que lo generó, u otra modalidad.

    Artículo 15

    Para cada clasificación, el encargado de seguridad deberá proponer los procedimientos de manipulación requeridos para cubrir las siguientes actividades de procesamiento de un documento electrónico:

    a)  Copiado;

    b)  Almacenamiento;

    c)  Transmisión por correo electrónico y sistemas protocolarizados de transmisión de datos digitales;

    d)  Destrucción.

    Artículo 16

    La salida desde un sistema de un documento electrónico que está clasificado como reservado o secreto, deberá tener una etiqueta apropiada de clasificación en la salida.

    Para estos efectos, deberá considerarse, entre otros, los informes impresos, pantallas de computador, medios magnéticos (cintas, discos, CDs, cassettes), mensajes electrónicos y transferencia de archivos.

    Párrafo 5º. Seguridad física y del ambiente

    Artículo 17

    Los equipos deberán protegerse físicamente de las amenazas de riesgos del ambiente externo, pérdida o daño, incluyendo las instalaciones de apoyo tales como el suministro eléctrico y la infraestructura de cables.

    En particular, la ubicación del equipamiento de la institución deberá minimizar el acceso innecesario a las áreas de trabajo y disminuir las posibilidades de amenazas de humo y fuego, humedad y agua, inestabilidad en el suministro eléctrico, hurto y robo.

    Artículo 18

    Para los efectos del artículo anterior, cada órgano deberá impartir y publicitar instrucciones relativas a los siguientes aspectos del ambiente externo:

    a)  Consumo de alimentos, bebidas y tabaco en las cercanías de sistemas informáticos.

    b)  Condiciones climatológicas y ambientales que pueden afectar sistemas informáticos o entornos cercanos.

    c)  Promoción de una práctica de escritorio limpio.

    Artículo 19

    Respecto de los documentos electrónicos de la organización clasificados como reservados o secretos, se aplicarán las siguientes normas de seguridad ambiental:

    a)  Deberán almacenarse en áreas seguras, protegidos por un perímetro de seguridad definido, con barreras apropiadas de resguardo y controles de entrada. Estos deberán estar físicamente protegidos del acceso no autorizado, daño e interferencia. La protección provista deberá guardar relación con los riesgos identificados.

    b)  Deberán disponerse de manera que se minimicen las posibilidades de percances y descuidos durante su empleo.

    Párrafo 6º. Seguridad del personal

    Artículo 20.- El Jefe de Servicio deberá impartir instrucciones para la seguridad de los documentos electrónicos y los sistemas informáticos, respecto de las siguientes materias:

    a)  Uso de sistemas informáticos, con énfasis en prohibición de instalación de software no autorizado, documentos y archivos guardados en el computador.

    b)  Uso de la red interna, uso de Internet, uso del correo electrónico, acceso a servicios públicos, recursos compartidos, servicios de mensajería y comunicación remota, y otros.

    c)  Generación, transmisión, recepción, procesamiento y almacenamiento de documentos electrónicos.

    d)  Procedimientos para reportar incidentes de seguridad.

    Artículo 21

    Las responsabilidades de seguridad aplicables al personal deberán ser explicitadas en la etapa de selección e incluirse expresamente en los decretos o resoluciones de nombramiento o en las contrataciones respectivas.

    Párrafo 7º. Gestión de las operaciones y las comunicaciones

    Artículo 22

    En todos los organismos sujetos a la presente norma, deberán explicitarse y difundirse los siguientes antecedentes e información:

    a)  Los contactos de apoyo ante dificultades técnicas u operacionales inesperadas de sistemas informáticos;

    b)  Las exigencias relativas al cumplimiento con las licencias de software y la prohibición del uso de software no autorizado;

    c)  Las buenas prácticas para protegerse de los riesgos asociados a la obtención de archivos y software a través de las redes de telecomunicaciones, o por otros medios, indicando qué medidas de protección se deberán aplicar.

    Artículo 23

    Para los efectos de reducir el riesgo de negligencia o mal uso deliberado de los sistemas, deberán aplicarse políticas de segregación de funciones. Asimismo, deberán documentarse los procedimientos de operación de sistemas informáticos e incorporarse mecanismos periódicos de auditorías de la integridad de los registros de datos almacenados en documentos electrónicos.

    Artículo 24

    En los órganos regidos por la presente norma, deberán realizarse copias de respaldo de la información y las aplicaciones críticas para la misión de la institución en forma periódica, en conformidad con las siguientes reglas:

    a)  La periodicidad con que se realizarán los respaldos de los computadores personales de la institución que estén asignados a usuarios, deberá explicitarse y no podrá ser menor a 1 respaldo anual;

    b)  La periodicidad con que se realizarán los respaldos de los sistemas informáticos y los equipos no contemplados en el punto anterior, utilizados en el procesamiento o almacenamiento de documentos electrónicos, deberá explicitarse y no podrá ser menor a 1 respaldo mensual;

    c)  Deberá garantizarse la disponibilidad de infraestructura adecuada de respaldo, para asegurar que éstos estén disponibles incluso después de un desastre o la falla de un dispositivo. Las configuraciones de respaldo para los sistemas individuales deberán ser probadas con regularidad, a lo menos cada 2 años, para asegurar que ellas satisfacen los requisitos estipulados en los planes de continuidad institucionales;

    d)  Deberá almacenarse en una ubicación remota, un nivel mínimo de información de respaldo, junto con registros exactos y completos de las copias de respaldo y los procedimientos documentados de restablecimiento. Esta instalación deberá estar emplazada a una distancia tal que escape de cualquier daño producto de un desastre en el sitio principal. En ámbitos críticos para la institución, se deberán almacenar al menos tres generaciones o ciclos de información de respaldo;

    e)  Los respaldos deberán cumplir con un nivel apropiado de protección física de los medios, consistente con las prácticas aplicadas en el sitio principal. Los controles asociados a los dispositivos del sitio de producción deberán extenderse para abarcar el sitio de respaldo.

    f)  Deberán consignarse plazos de retención de los respaldos de la institución, así como cualquier necesidad de realización de respaldos que estén permanentemente guardados, y

    g)  Deberán utilizarse medios y condiciones físicas de almacenamiento que garanticen una vida útil concordante con los plazos definidos en el punto precedente.

    Artículo 25

    Las instituciones regidas por la presente norma deberán impartir instrucciones respecto al uso seguro del correo electrónico. Esas instrucciones deberán incluir al menos:

    a)  Una advertencia sobre la vulnerabilidad del correo electrónico a modificaciones o accesos no autorizados;

    b)  Una advertencia sobre los peligros asociados a la apertura de archivos adjuntos y/o a la ejecución de programas que se reciban vía correo electrónico;

    c)  La responsabilidad de no divulgar contraseñas de acceso al correo electrónico;

    d)  Una advertencia sobre la inconveniencia de almacenar contraseñas de acceso al correo electrónico en el mismo computador desde el cual se accede el correo electrónico;

    e)  Indicaciones sobre la elección de contraseñas seguras de acceso al correo electrónico;

    f)  Una recomendación sobre la conveniencia de que los usuarios tengan cuentas de correo electrónico distintas para efectos de su uso personal;

    g)  Un instructivo de cuándo no usar el correo electrónico;

    h)  Una prevención sobre la necesidad de comprobar el origen, despacho, entrega y aceptación mediante firma electrónica, e

    i)  Una precisión de las responsabilidades que corresponden a los usuarios en caso de comprometer a la institución, por ejemplo, con el envío de correos electrónicos difamatorios, uso para hostigamiento o acoso, compras no autorizadas, etc.

    Artículo 26

    Los organismos sujetos a la presente norma, en la medida de sus posibilidades, deberán:

    a)  Instalar un antivirus que proteja frente a la posibilidad de obtener vía correo electrónico software malicioso;

    b)  Proveer mecanismos que mediante el uso de técnicas de cifrado, permitan proteger la confidencialidad e integridad de los documentos electrónicos;

    c)  Evitar el uso de cuentas de correo grupales;

    d)  Disponer controles adicionales para la verificación de mensajes que no se pueden autenticar;

    e)  Verificar que todos los equipos informáticos y medios digitales que sean usados en el almacenamiento y/o procesamiento de documentos electrónicos, de ser posible, sean reformateados previo a ser dados de baja.

    Párrafo 8º. Control de acceso

    Artículo 27

    El empleo de identificador formal de autenticación constituye un mecanismo básico para el uso de firma electrónica.

    Los identificadores son un esquema de validación de la identidad del usuario para acceder a un sistema informático.

    Un identificador temporal es aquel que se asigna a un usuario la primera vez que accede a un sistema, y que debe ser cambiado por éste en su primer acceso.

    Artículo 28

    La asignación de los identificadores se deberá controlar mediante un proceso formal de gestión, en que el jefe directo del usuario peticionario será el responsable de la respectiva solicitud.

    Para los efectos del referido control, en cada institución se impartirán instrucciones sobre la forma de asignación de identificadores que se aplicará. Dichas instrucciones deberán incluir a lo menos, lo siguiente:

    a)  La obligación de mantener en forma confidencial de los identificadores que se asignen;

    b)  La obligación de no registrar los identificadores en papel;

    c)  La prohibición de almacenar identificadores en un computador de manera desprotegida;

    d)  El deber de no compartir los identificadores de usuarios individuales;

    e)  El mandato de no incluir el identificador en cualquier proceso de inicio de sesión automatizado, por ejemplo, almacenado en una macro;

    f)  La indicación de cambiar los identificadores cuando hayan indicios de un posible compromiso del identificador o del sistema;

    g)  La recomendación de elegir identificadores que tengan una longitud mínima de ocho caracteres; sean fáciles de recordar; contengan letras, mayúsculas, dígitos, y caracteres de puntuación; no estén basados en cosas obvias o de fácil deducción a partir de datos relacionados con la persona, por ejemplo, nombres, números telefónicos, cédula de identidad, fecha de nacimiento; estén libres de caracteres idénticos consecutivos o grupos completamente numéricos o alfabéticos; y no sean palabras de diccionario o nombres comunes;

    h)  La indicación de cambiar los identificadores a intervalos regulares. Las contraseñas de accesos privilegiados se deberán cambiar más frecuentemente que los identificadores normales;

    i)  Normas para evitar el reciclaje de identificadores viejos, y

    j)  La indicación de cambiar el identificador temporal al iniciar la primera sesión.

    Los sistemas informáticos deberán configurarse de manera que los usuarios se vean compelidos a cumplir con las obligaciones detalladas en los puntos anteriores.

    Artículo 29

    Se deberá entregar a los usuarios identificadores temporales de una manera segura. Específicamente, se deberá evitar el uso de terceras partes o mensajes de correo electrónico no protegido (texto en claro) para comunicar el identificador.

    Los usuarios deberán dar un acuso recibo de recepción del identificador.

    Artículo 30

    En caso que los usuarios necesiten acceder a múltiples servicios o plataformas y sea necesario que mantengan múltiples identificadores, deberán ser notificados de que éstos deben ser distintos. Asimismo, se incentivará y facilitará el uso de certificados de firma electrónica.

    Artículo 31

    Para reducir el riesgo de acceso no autorizado a documentos electrónicos o sistemas informáticos, se deberá promover buenas prácticas, como las de pantalla limpia.

     En particular, se incentivará a los usuarios o configurar los sistemas de manera que se dé cumplimiento a los siguientes estándares:

    a)  Cerrar las sesiones activas en el computador cuando se finaliza la labor, a menos que éstas se puedan asegurar mediante un sistema apropiado de control de acceso, por ejemplo, con protector de pantalla con una contraseña protegida;

    b)  Cerrar las sesiones de los computadores principales cuando la sesión finaliza, lo que no significa, necesariamente, apagar el terminal o los equipos, y

    c)  Asegurar los terminales o equipos frente al uso no autorizado, mediante una contraseña de traba o de un control equivalente, por ejemplo, una contraseña de acceso cuando no se use.

    Artículo 32

    Se deberá controlar el acceso a los servicios de red internos y externos mediante el uso de identificadores o certificados digitales.

    Para tal efecto, los órganos de la Administración del Estado sujetos a la presente normativa deberán ajustarse a las siguientes exigencias:

    a)  Restringir la instalación de equipamiento personal que dificulte el control de acceso a documentos electrónicos y sistemas informáticos, de manera acorde a las políticas de seguridad de la institución, y

    b)  Mantener un catastro del equipamiento que permita la reproducción, distribución o transmisión masiva de información, y de las personas con privilegios de acceso a ellos.

    Artículo 33

    Las instituciones regidas por la presente norma impartirán instrucciones relativas al uso de redes y servicios en red que, al menos, especifiquen lo siguiente:

    a)  Las redes y servicios de red a las que el acceso está permitido;

    b)  Los procedimientos de autorización para determinar quién tiene permitido acceder a las distintas redes y servicios de red, y

    c)  Los controles de gestión y procedimientos para proteger el acceso a las conexiones de la red y servicios de red.

    Párrafo 9º. Desarrollo y mantenimiento de sistemas

    Artículo 34

    Aquellos organismos que requieran precaver que la seguridad esté incorporada en los sistemas en la etapa de diseño, se entenderán como organismos complejos y para tal efecto, deberán adoptar las indicaciones contenidas en la sección correspondiente del Título V de esta norma, sobre ”Nivel Avanzado de Seguridad para el Documento Electrónico”.

    Párrafo 10. Gestión de la continuidad del negocio

    Artículo 35

    El encargado de seguridad deberá formular un plan de contingencia para asegurar la continuidad de operaciones críticas para la institución.

    Este plan deberá, como mínimo, disponer la efectiva gestión de las relaciones públicas, la eficiente coordinación con las autoridades apropiadas, como policía, bomberos, autoridades directivas, etc., y mecanismos eficaces para convocar a quienes sean los responsables de los documentos electrónicos y sistemas informáticos afectados.

    TÍTULO V. DEL NIVEL AVANZADO DE SEGURIDAD DEL DOCUMENTO ELECTRÓNICO

    Artículo 36

    Durante la segunda etapa de aplicación de esta norma, los órganos de la Administración del Estado deberán desarrollar las políticas, procedimientos, acciones y medidas tendientes a obtención del Nivel Avanzado de Seguridad de los documentos electrónicos que se establecen en este Título.

     Artículo 37

    El Nivel Avanzado de seguridad para el documento electrónico exige el cumplimiento de las exigencias y condiciones reguladas en el Título IV para el Nivel Básico de seguridad, y las previstas en la Norma NCh2777, que se entiende parte integrante del presente decreto, con los ajustes que se establecen en este artículo.

    a)  Política de Seguridad:

    Se aplicarán las disposiciones contenidas en el capítulo 3 de la norma NCh2777, con la siguiente adecuación:

     –  Las instituciones deberán tener las políticas de seguridad descritas en la sección 3.1 para los repositorios de documentos electrónicos. En particular, estas políticas deberán contener lo siguiente:

    i.  Indicaciones respecto de los sistemas informáticos, con énfasis en el procedimiento de autorización de instalación o modificación de software y archivos de configuración de los sistemas;

    ii.  Indicaciones de uso de la red;

    iii. Procedimientos de respuesta a incidentes de seguridad;

    iv.  Procedimientos de delegación de autoridad para ejecutar acciones de emergencia en los sistemas y los procedimientos correspondientes.

    b)  Seguridad organizacional:

      Se aplicará la sección 4.1 del capítulo 4 de la norma NCh2777, con excepción de sus puntos 4.1.5 y 4.1.7 que se adoptarán como recomendaciones, y las secciones 4.2 y 4.3 de dicho capítulo.

    c)  Clasificación y control de bienes:

    Se aplicará la sección 5.1 del capítulo 5 de la norma NCh2777, en lo referido a bienes relacionados con el Documento Electrónico. Asimismo, se aplicará el punto 5.2.1 de la sección 5.2.

    El punto 5.1.2 de dicha sección se aplicará con las siguientes adecuaciones:

    –  Los procedimientos de etiquetado y manipulación de la información se entienden referidos al Documento Electrónico.

    –  Se excluyen las normas contenidas en las letras (c) y (d).

    d)  Seguridad del personal:

    Se aplicarán las secciones 6.1 y 6.3 del capítulo 6 de la norma NCh2777. La sección 6.2 se adoptará como recomendación.

    e)  Seguridad física y del ambiente:

    Se aplicarán las secciones 7.1 y 7.2 del capítulo 7 de la norma NCh2777, para repositorios de documentos electrónicos, con las siguientes adecuaciones:

    –  Para la sección 7.1:

    i.  Los controles físicos de entrada en el perímetro de seguridad deberán utilizar el carné de identidad como identificación válida en el caso de los chilenos, y el pasaporte en el caso de los extranjeros.

    ii.  Todo ingreso de visitas al perímetro de seguridad deberá ser autorizado por escrito, quedando constancia del propósito y duración de ella. Los visitantes serán acompañados en todo momento por alguna persona autorizada de la organización hasta que abandonen el recinto.

    –  Para la sección 7.2:

    Se deberá velar para que los equipos computacionales en los que se almacenen documentos electrónicos y sistemas informáticos que los procesen, tengan un adecuado suministro de energía eléctrica, incluyendo no sólo el flujo de energía suministrado, sino también la ”tierra eléctrica” de las instalaciones.

    La sección 7.3 se adoptará como recomendación.

    f)  Gestión de las operaciones y comunicaciones:

    Se aplicarán las normas del capítulo 8 de la norma NCh2777, en su integridad.

    g)  Control de acceso:

    Se aplicarán las normas del capítulo 9 de la norma NCh2777, con excepción de sus secciones 9.5, 9.6, 9.7 y 9.8 que se adoptarán como recomendaciones, y con los siguientes ajustes:

    –  Los registros de privilegios asignados, a los que hace referencia la sección 9.2.2, deberán tener un carácter histórico, es decir, no sólo se deben registrar los privilegios en aplicación. El período de conservación de estos registros será al menos el que las leyes vigentes indiquen para los documentos electrónicos a los que se pudo tener acceso con dichos privilegios.

    –  Las estipulaciones de la sección 9.4 deberán formalizarse en una política de uso correspondiente, de acuerdo a lo expresado en la sección ”Política de Seguridad”.

    h)  Desarrollo y mantenimiento de sistemas:

    Se aplicarán únicamente las normas de la sección 10.3 del capítulo 10 de la norma NCh2777, con la siguiente adecuación:

    –  En las secciones referidas a firma electrónica, se adoptará lo establecido por la ley 19.799, sobre documentos electrónicos, firma electrónica y los servicios de certificación para dicha firma.

    i)  Gestión de la continuidad del negocio: Se aplicarán las estipulaciones del capítulo 11 de la norma NCh2777, en su integridad.

    —————————————————————————————————————————-

    NOTA

     El Artículo 2° de la Resolución 1535 Exenta, Economía, publicada el 02.09.2009, anula y reemplaza la Norma NCh2777 por la Norma NCh-ISO 27002, que el Artículo 1° de la mencionada Resolución, declara como Norma Oficial de la República de Chile, con su respectivo código y título de identificación como Tecnología de la información, Códigos de prácticas para la gestión de la seguridad de la información.

    —————————————————————————————————————————–

    Artículo Segundo

    La presente norma deberá ser implementada por los diferentes órganos de la Administración del Estado dentro de los siguientes plazos:

    –  El Nivel 1, a más tardar en el año 2004.

    –  El Nivel 2, a más tardar en el año 2009.

    Con la finalidad de lograr la debida implementación de esta norma en los plazos señalados, los servicios públicos deberán contemplar acciones adecuadas en sus respectivos planes de desarrollo informático. Los niveles de cumplimiento de la presente norma por parte de los servicios públicos se determinarán mediante la aplicación de un instrumento de evaluación que elaborará el Comité de Normas.

    Artículo Tercero

    Créase el Subcomité de Gestión de Seguridad y Confidencialidad del Documento Electrónico como organismo asesor del Comité de Normas para el Documento Electrónico.

    El Subcomité será coordinado por el Ministerio del Interior y tendrá entre sus funciones, proponer el Nivel de cumplimiento de la presente norma técnica por parte de los órganos de la Administración del Estado y el cronograma de implementación de la Norma en su nivel 2 por parte de los diferentes órganos de la Administración del Estado.

    Artículo Cuarto

    Los Subsecretarios y Jefes de Servicio deberán designar, dentro del plazo de 30 días contados desde la fecha de total tramitación del presente decreto, un Encargado de Seguridad, para que desarrolle e implemente las políticas de seguridad en forma conjunta con el Comité de Gestión de Seguridad y Confidencialidad. En aquellos órganos en que no se designe dentro de plazo, actuará como Encargado de Seguridad el Auditor Interno de cada servicio.

    Artículo Quinto

    El Comité de Normas para el Documento Electrónico podrá iniciar, de oficio o a petición de parte, un procedimiento de normalización con el objeto de sugerir al Presidente de la República la actualización de la norma técnica fijada por este decreto. En dicho procedimiento se tendrán en consideración los planteamientos del sector público y privado y de las Universidades.

    Anótese, tómese razón y publíquese

    RICARDO LAGOS ESCOBAR, Presidente de la República

    Francisco Huenchumilla Jaramillo, Ministro Secretario General de la Presidencia

    José Miguel Insulza Salinas, Ministro del Interior.

    Lo que transcribo a Ud. para su conocimiento.-

    Saluda Atte. a Ud., Rodrigo Egaña Baraona, Subsecretario General de la Presidencia.

    19Abr/21

    Decreto nº 181, de 09 de julio de 2002

    Decreto nº 181, de 09 de julio de 2002, del Ministerio de Economía; Fomento y Reconstrucción; Subsecretaría de Economía; Fomento y Reconstrucción, que aprueba reglamento de la Ley 19.799 sobre documentos electrónicos, firma electrónica y servicios de certificación de dicha firma.

    Decreto nº 181 de 9 de julio de 2002

    REGLAMENTO DE LA LEY 19.799 SOBRE DOCUMENTOS ELECTRONICOS, FIRMA ELECTRONICA Y LA CERTIFICACION DE DICHA FIRMA

    Núm. 181.- Santiago, 9 de julio de 2002.

    Vistos:

    a) Lo dispuesto en el artículo 32º nº 8 de la Constitución Política de la República;

    b) La ley 19.799 sobre documentos electrónicos, firma electrónica y la certificación de dicha firma;

    c) Lo dispuesto en la resolución nº 520, de 1996, que fija el texto refundido, coordinado y sistematizado de la resolución nº 55, de 1992, ambas de la Contraloría General de la República.

    Considerando:

    Que en fecha 12 de abril de 2002 se publicó en el Diario Oficial la ley nº 19.799 sobre documento electrónico, firma electrónica y la certificación de dicha firma, cuyo artículo 25 autoriza al Presidente de la República a dictar el reglamento correspondiente, en el plazo de 90 días contados desde la referida publicación,

    DECRETO:

    Artículo primero

    Apruébase el siguiente Reglamento de la ley nº 19.799 sobre documentos electrónicos, firma electrónica y la certificación de dicha firma.

    Artículo 1º

    Los documentos electrónicos, la certificación y uso de la firma electrónica por las personas naturales y jurídicas de derecho privado y la administración del Estado, la prestación de los servicios de certificación, la acreditación de los certificadores, y los derechos y obligaciones de los usuarios se regirá por lo dispuesto en la ley nº 19.799, el presente Reglamento y las normas técnicas que se dicten al efecto.

     TITULO PRIMERO. DE LOS PRESTADORES DE SERVICIOS DE CERTIFICACIÓN

    Artículo 2º

    Son prestadores de servicios de certificación las personas jurídicas nacionales o extranjeras, públicas o privadas, que otorguen certificados de firma electrónica, sin perjuicio de los demás servicios que puedan realizar.

     Son prestadores acreditados de servicios de certificación las personas jurídicas nacionales o extranjeras, públicas o privadas, domiciliadas en Chile y acreditadas en conformidad con la Ley y este Reglamento, que otorguen certificados de firma electrónica, sin perjuicio de los demás servicios que puedan realizar.

    Artículo 3º

    El cumplimiento de las normas técnicas fijadas para la aplicación del presente Reglamento es obligatorio para los prestadores acreditados de servicios de certificación.

    Artículo 4º

    Los actos administrativos que impliquen la modificación de normas técnicas para la prestación del servicio establecerán los plazos en los cuales un prestador acreditado de servicios de certificación deberá adecuarse a las mismas. El incumplimiento en la adecuación a las nuevas normas técnicas será calificado como incumplimiento grave y facultará a la Entidad Acreditadora a dejar sin efecto la acreditación, de conformidad con el artículo 19 de la Ley y el presente Reglamento.

    Artículo 5º

    A petición de parte o de oficio, la Entidad Acreditadora podrá iniciar el procedimiento de fijación, modificación o derogación de normas técnicas para la prestación del servicio de certificación de firma electrónica avanzada.

    (Artículo Primero, 1º del Decreto 154, Publicado 11.08.2012)

    Dicho procedimiento se iniciará notificando a cada uno de los prestadores de servicios de certificación acreditados acerca del objeto y propuestas de modificación o fijación de normas técnicas, otorgando un plazo no inferior a 30 días hábiles para que aquellas efectúen las observaciones que estimen pertinentes. Además, la Entidad Acreditadora deberá publicar en su sitio web, por igual período, el objeto y propuesta de normas técnicas.

    Las observaciones efectuadas por los prestadores de servicios de certificación acreditados no serán vinculantes para la Entidad Acreditadora.

    Vencido el plazo para las observaciones, la Entidad Acreditadora evaluará las observaciones recibidas y determinará las normas técnicas que serán fijadas, modificadas o derogadas, las que serán aprobadas mediante decreto del Ministro de Economía, Fomento y Turismo.

    De ser necesario, se podrán fijar conjuntos alternativos de normas técnicas para la prestación del servicio con el objeto de permitir el uso de diversas tecnologías y medios electrónicos, en conformidad a la ley y el presente reglamento.

    Si la fijación o modificación de normas técnicas tratadas en este artículo requieren recursos adicionales o la coordinación de diversas entidades para su implementación, el decreto que aprueba las normas técnicas deberá ser firmado, además, por los Ministros de Hacienda y de Secretaría General de la Presidencia.

    (Artículo Primero, 1º del Decreto 14, Publicado 27.02.2014)

    Artículo 6º

    Es obligación de los prestadores de servicios de certificación contar con reglas sobre prácticas de certificación consistentes en una descripción detallada de las políticas, procedimientos y mecanismos que el certificador se obliga a cumplir en la prestación de sus servicios de certificación y homologación. Las Prácticas de Certificación deben declarar el cumplimiento de los requisitos señalados en el artículo 17 de este Reglamento, con excepción de la póliza de seguro que se acredita por medio de la presentación de la misma.

    Las Prácticas de Certificación deben ser objetivas y no discriminatorias, y se deben comunicar a los usuarios de manera sencilla y en idioma castellano.

    Dichas prácticas deberán contener al menos:

    a.  Una introducción, que deberá contener un resumen de las prácticas de certificación de que se trate, mencionando tanto la entidad que suscribe el documento, como el tipo de usuarios a los que son aplicables.

    b.  Consideraciones generales, debiendo contener información sobre obligaciones, responsabilidades, cumplimiento de auditorías, confidencialidad, y derechos de propiedad intelectual, con relación a todas las partes involucradas.

    c.  Identificación y autenticación, debiendo describirse tanto los procesos de autenticación aplicados a los solicitantes de certificados, como los procesos para autenticar a los mismos cuando piden suspensión o revocación de certificado.

    d.  Requerimientos operacionales, debiendo contener información operacional para los procesos de solicitud de certificado, emisión de certificados, suspensión y revocación de certificados, procesos de auditoría de seguridad, almacenamiento de información relevante, cambio de datos de creación de firma electrónica, superación de situaciones críticas, casos de fuerza mayor y caso fortuito, y procedimiento de término del servicio de certificación.

    e.  Controles de procedimiento, personal y físicos, debiendo describir los controles de seguridad no técnicos utilizados por el prestador de servicios de certificación para asegurar las funciones de generación de datos de creación de firma electrónica, autenticación de usuarios, emisión de certificados, suspensión y revocación de certificados, auditoría y almacenamiento de información relevante.

    f.  Controles de seguridad técnica, debiendo señalar las medidas de seguridad adoptadas por el prestador de servicios de certificación para proteger los datos de creación de su propia firma electrónica.

    g.  Perfiles de certificados y del registro de acceso público, debiendo especificar el formato del certificado y del registro de acceso público.

    h.  Especificaciones de administración de la política de certificación, debiendo señalar la forma en que la misma está contenida en la Práctica, los procedimientos para cambiar, publicar y notificar la política.

    Artículo 7º

    El prestador de servicios de certificación deberá mantener un registro de certificados de acceso público, en el que se garantice la disponibilidad de la información contenida en él de manera regular y continua.

    A dicho registro se podrá acceder por medios electrónicos y en él deberán constar los certificados emitidos por el certificador, indicando si los mismos se encuentran vigentes, revocados, suspendidos, traspasados de otro prestador de servicios de certificación u homologados.

    Artículo 8º

    En caso que un prestador de servicios de certificación cese en la prestación del servicio, deberá comunicar tal situación a los titulares de los certificados por ella emitidos en la siguiente forma:

    a)  Si el cese es voluntario, con una antelación de a lo menos dos meses y señalando al titular que de no existir objeción a la transferencia de los certificados a otro prestador de servicios de certificación, dentro del plazo de 15 días hábiles contados desde la fecha de la comunicación, se entenderá que el usuario ha consentido en la transferencia de los mismos. En este caso, si el prestador es acreditado, deberá traspasar los certificados, necesariamente, a un certificador acreditado.

    b)  Si el cese no es voluntario, la cancelación de la acreditación deberá comunicarse inmediatamente a los titulares. En caso que el prestador de servicios de certificación esté en situación de traspasar los certificados a otro prestador acreditado, deberá informar tal situación en la forma y plazo señalado en la letra a).

    Si el titular del certificado se opone a la transferencia, el certificado quedará sin efecto sin más trámite, sin perjuicio de lo dispuesto en el artículo 11 de este Reglamento.

    Artículo 9º

    En caso que el cese en la prestación del servicio sea por voluntad del prestador acreditado de servicios de certificación, deberá solicitar a la Entidad Acreditadora, con al menos un mes de anticipación, la cancelación de su inscripción en el registro público a que hace referencia el artículo 16 de este Reglamento, comunicándole el destino que dará a los datos de los certificados, especificando, en su caso, los que va a transferir y a quién, cuando proceda.

    Artículo 10

    El cese de la actividad del prestador acreditado de servicios de certificación será registrado como nota de cancelación de la inscripción de la acreditación por la Entidad Acreditadora en el registro público a que se refiere el artículo 16 de este Reglamento.

    Artículo 11

    Los datos proporcionados por el titular del certificado deberán ser conservados por el prestador de servicios de certificación a lo menos durante seis años desde la emisión inicial de los certificados, cualquiera sea el estado en que se encuentre el certificado.

    En caso que el prestador de servicios de certificación cese en su actividad, deberá transferir dichos datos a un prestador de servicios de certificación, que deberá estar acreditado si aquel lo fuera, o a una empresa especializada en la custodia de datos electrónicos, por el tiempo faltante para completar los 6 años desde la emisión de cada certificado. Esta situación deberá verse reflejada en el registro público que señala el artículo 16 de este Reglamento.

    Artículo 12

    Los prestadores de servicios de certificación acreditados deberán contratar y mantener vigente un seguro de responsabilidad civil, que cubra los daños y perjuicios que ocasionen, con motivo de la certificación y homologación de firmas electrónicas, el que deberá contener las siguientes estipulaciones mínimas:

    a)  Una suma asegurada de al menos el equivalente de cinco mil unidades de fomento;

    b)  La ausencia de deducibles o franquicias, en la parte de la indemnización que no exceda el equivalente de cinco mil unidades de fomento;

    c)  La responsabilidad civil asegurada, que comprenderá la originada en hechos acontecidos durante la vigencia de la póliza, no obstante sea reclamada con posterioridad a ella.

    TITULO SEGUNDO. DE LA ACREDITACIÓN DE LOS PRESTADORES DE SERVICIOS DE CERTIFICACIÓN

    Artículo 13

    La acreditación es el procedimiento en virtud del cual el prestador de servicios de certificación demuestra a la Entidad Acreditadora que cuenta con las instalaciones, sistemas, programas informáticos y los recursos humanos necesarios para otorgar los certificados en los términos que se establecen en la Ley y en este Reglamento, permitiendo su inscripción en el registro que se señala en el artículo 16.

    Artículo 14

    Las funciones correspondientes a la Entidad Acreditadora serán desarrolladas por la Subsecretaría de Economía, Fomento y Reconstrucción, la que, a efectos de su cumplimiento, podrá contratar expertos, a cuyos contratos se incorporarán normas sobre probidad administrativa.

    Artículo 15

    La Entidad Acreditadora ejercerá la facultad inspectora sobre los prestadores acreditados de servicios de certificación y, a tal efecto, velará porque los requisitos que se observaron al momento de otorgarse la acreditación y las obligaciones que impone la Ley, este Reglamento y las normas técnicas se cumplan durante la vigencia de la acreditación.

    (Artículo Primero, nº 2 del Decreto 154, Publicado 11.08.2012)

    La facultad inspectora comprende tanto inspección ordinaria como la extraordinaria. La inspección ordinaria consiste en la facultad de practicar una visita anual a las instalaciones del prestador acreditado de servicios de certificación, como asimismo requerir, en forma semestral, información sobre el desarrollo de la actividad. La inspección extraordinaria será practicada de oficio o por denuncia motivada sobre la prestación del servicio, ordenada por el Subsecretario mediante resolución fundada.

     Las inspecciones podrán ser practicadas por medio de funcionarios o peritos especialmente contratados y habilitados para estos fines, los que en el ejercicio de sus funciones podrán requerir al certificador información adicional a la proporcionada por él.

    La información solicitada por la Entidad Acreditadora deberá ser proporcionada dentro del plazo de 5º día, contado desde la fecha de la solicitud, sin perjuicio del otorgamiento de plazos especiales atendida la información requerida.

    Artículo 16

    La Entidad Acreditadora mantendrá un registro público de prestadores acreditados de servicios de certificación, el que deberá contener el número de la resolución que concede la acreditación, el nombre o razón social del certificador, la dirección social, el nombre de su Representante Legal, el número de su teléfono, su sitio de dominio electrónico y correo electrónico así como la compañía de seguros con que ha contratado la póliza de seguros que exige el artículo 14 de la Ley.

    El referido registro público deberá permitir su acceso por medios electrónicos, sin perjuicio de la mantención del mismo en soporte de papel en la Entidad Acreditadora. Este Registro deberá ser actualizado permanentemente, manteniendo un acceso regular y continuo.

    Artículo 17

    La acreditación es voluntaria, sin perjuicio de lo cual para obtenerla el prestador de servicios de certificación deberá cumplir, al menos, con las siguientes condiciones:

    a.  Demostrar la fiabilidad necesaria de sus servicios.

    b.  Garantizar la existencia de un servicio seguro de consulta del registro de certificados emitidos.

    c.  Emplear personal calificado para la prestación de los servicios ofrecidos, en el ámbito de la firma electrónica y los procedimientos de seguridad y gestión adecuados.

    d.  Utilizar sistemas y productos confiables que garanticen la seguridad de sus procesos de certificación.

    e.  Haber contratado un seguro apropiado en los términos que señala el artículo 12 de este Reglamento, y

    f.  Contar con la capacidad tecnológica necesaria para el desarrollo de la actividad de certificación.

    El cumplimiento de dichas condiciones será evaluado por la Entidad Acreditadora de conformidad con las normas técnicas aplicables a la prestación del servicio, durante el procedimiento de acreditación.

    Artículo 18

    El procedimiento de acreditación de los prestadores de servicios de certificación se iniciará por medio de una solicitud presentada a la Entidad Acreditadora, acompañada del comprobante de pago de los costos de la acreditación y de los antecedentes que permitan verificar el cumplimiento de los requisitos de acreditación, con excepción de la póliza de seguro a que hace referencia el artículo 14 de la Ley.

    En la solicitud que presente el interesado deberá individualizarse debidamente y para ello señalará su nombre o razón social, su RUT, el nombre y RUT del Representante Legal, su domicilio social y dirección de correo electrónico, aceptando expresamente dicho medio electrónico como forma de comunicación.

    Artículo 19

    Recibida la solicitud, la Entidad Acreditadora procederá a verificar la admisibilidad de la misma mediante la verificación de los antecedentes requeridos, dentro de 5º día hábil.

    De ser inadmisible la solicitud, dentro de 3º día hábil se procederá a comunicar al interesado tal situación, el que podrá completar los antecedentes dentro del plazo de 15 días, bajo apercibimiento de ser rechazada la solicitud.

    Admitida a trámite la solicitud, la Entidad Acreditadora procederá a un examen sobre el cumplimiento de los requisitos y obligaciones exigidas por la Ley y este Reglamento para obtener la acreditación, certificando dentro del plazo de 90 días contados desde la fecha de la admisibilidad de la solicitud, prorrogables por una vez e igual período y por motivos fundados, que el interesado cumple los requisitos y obligaciones para ser acreditado y que dispone de un plazo de 20 días para presentar la póliza de seguros que exige el artículo 14 de la Ley, bajo apercibimiento de ser rechazada la solicitud.

    Artículo 20

    En caso que la Entidad Acreditadora determine que el prestador de servicios de certificación no cumple con las normas técnicas fijadas para el desarrollo de la actividad, señalará si los incumplimientos son subsanables, y si no afectan el correcto funcionamiento del sistema ni los fines previstos en la Ley para la firma electrónica avanzada.

     En caso que los incumplimientos no sean subsanables, la Entidad Acreditadora procederá a dictar una resolución en la que rechaza la solicitud de acreditación.

    Si los incumplimientos son subsanables y no afectan el correcto funcionamiento del sistema ni los fines previstos en la Ley para la firma electrónica avanzada, la Entidad Acreditadora podrá acreditar al interesado, previa autorización de un plan de medidas correctivas.

    Artículo 21

    Una vez completados los requisitos exigidos, la Entidad Acreditadora procederá a acreditar al interesado en el plazo de veinte días contados desde que, a petición del interesado, se certifique que la solicitud se encuentra en estado de resolverse.

    Artículo 22

    Durante todo el proceso de acreditación, la Entidad Acreditadora podrá solicitar documentación adicional y/o realizar visitas a las instalaciones del interesado, por intermedio de sus funcionarios o por expertos especialmente contratados para dichos fines.

    Artículo 23

    La acreditación del prestador de servicios de certificación producirá los siguientes efectos:

    a.  La incorporación al registro público de prestadores acreditados que mantiene la Entidad Acreditadora.

    b.  Habilitará al certificador a emitir certificados de firma electrónica avanzada.

    c.  Someterá al certificador a la inspección de la Entidad Acreditadora.

    d.  Los demás que establecen la Ley y este Reglamento.

    Artículo 24

    La Entidad Acreditadora por medio de resolución fijará dentro del primer trimestre de cada año el arancel de los costos de la acreditación y el arancel de supervisión.

    Los costos de acreditación serán pagados por el prestador de servicios de certificación que solicite acreditarse, los que no serán restituidos en el evento que la acreditación no se conceda por incumplimiento de los requisitos y obligaciones legales y reglamentarias exigidos para el desarrollo de la actividad de certificación como acreditado.

    El arancel de supervisión comprenderá los costos correspondientes a las inspecciones, ordinarias y extraordinarias, y del sistema de acreditación. El arancel deberá ser pagado por los prestadores acreditados de servicios de certificación dentro de los 90 días siguientes a la fecha de la resolución que los fija.

    Artículo 25

    La Entidad Acreditadora podrá dejar sin efecto la acreditación mediante resolución fundada, por las causales previstas en el artículo siguiente.

    Dicha resolución deberá ordenar la cancelación de la inscripción del certificador del registro público que lleve la Entidad Acreditadora.

    Artículo 26

    La acreditación de los certificadores se dejará sin efecto por las siguientes causas:

    a)  Por solicitud del prestador acreditado de servicios de certificación, ante la Entidad Acreditadora con una antelación de a lo menos un mes a la fecha del término previsto por el prestador acreditado de servicios de certificación para que se haga efectiva, indicando el destino que dará a los certificados y a los datos de ellos, para lo cual deberá cumplir con lo dispuesto en el artículo 8 letra a) de este Reglamento, y garantizar el pago del aviso que deberá ser publicado de conformidad con lo dispuesto en el artículo siguiente.

    b)  Por pérdida de las condiciones que sirvieron de fundamento a su acreditación, la que será calificada por los funcionarios o expertos que la Entidad Acreditadora ocupe para el cumplimiento de la facultad inspectora.

    c)  Por incumplimiento grave o reiterado de las obligaciones que establece la Ley y este Reglamento.

    En los casos de las letras b) y c), la resolución deberá ser adoptada previo traslado de cargos y audiencia del afectado, para lo cual la Entidad Acreditadora dará un plazo de 5 días hábiles para que éste evacue sus descargos. Recibidos éstos, la Entidad Acreditadora deberá resolver fundadamente dentro del plazo de 15 días, prorrogables por el mismo período por motivos fundados.

    Artículo 27

    Los certificadores cuya inscripción haya sido cancelada, deberán comunicar inmediatamente este hecho a los titulares de las firmas certificadas por ellos. Sin perjuicio de ello, la Entidad Acreditadora publicará, a costa del certificador, un aviso dando cuenta de la cancelación.

    Dicho aviso deberá ser publicado en un medio de prensa escrito de circulación nacional, sin perjuicio de la publicación de la resolución en el registro público que señala el artículo 16 de este Reglamento. El aviso deberá señalar que desde esta publicación los certificados quedarán sin efecto, a menos que hayan sido transferidos a otro certificador acreditado.

    TITULO TERCERO. DE LOS CERTIFICADOS DE FIRMA ELECTRÓNICA

    Artículo 28.

    El certificado de firma electrónica es la certificación electrónica que da fe del vínculo entre el firmante o titular del certificado y los datos de creación de firma electrónica.

    Los certificados de firma electrónica deben contener, al menos, las siguientes menciones:

    a.  Un código de identificación único del certificado.

    b.  Identificación del prestador de servicio de certificación, con indicación de su nombre o razón social, rol único tributario, dirección de correo electrónico, y, en su caso, los antecedentes de su acreditación y su propia firma electrónica avanzada.

    c.  Los datos de la identidad del titular, entre los cuales deben incluir su nombre, dirección de correo electrónico y su rol único tributario.

    d.  Su plazo de vigencia.

    Artículo 29

    Los prestadores de servicios de certificación deberán introducir en los certificados de firma electrónica que emitan, las menciones señaladas en el artículo 15 de la Ley, de acuerdo con las normas fijadas por este Reglamento para el desarrollo de la actividad.

     Los atributos adicionales que los prestadores de servicios de certificación introduzcan con la finalidad de incorporar límites al uso del certificado, no deberán dificultar o impedir la lectura de las menciones señaladas en el inciso anterior ni su reconocimiento por terceros.

    Artículo 30

    Tratándose de un certificado de firma electrónica avanzada, deberá el prestador de servicios de certificación comprobar fehacientemente la identidad del solicitante antes de la emisión del mismo, de conformidad con las normas técnicas.

    Dicha comprobación la hará el prestador de servicios de certificación, ante sí o ante notario u oficial del Registro Civil, requiriendo la comparecencia personal y directa del solicitante o de su representante legal si se tratare de una persona jurídica.

    Artículo 31

    Los datos de creación de firma, cuando sean generados por el prestador de servicios de certificación, deben ser entregados al usuario o titular del certificado de manera de garantizar la recepción de los mismos en forma personal.

    Queda prohibido al prestador de servicios de certificación mantener copia de los datos de creación de firma electrónica una vez que éstos hayan sido entregados a su titular, momento desde el cual éste comenzará a ser responsable de mantenerlos bajo su exclusivo control.

    Artículo 32

    El certificado de firma electrónica podrá ser usado por su titular de conformidad con las operaciones que han sido autorizadas a realizar en las prácticas de certificación del prestador de servicios de certificación con quien se ha contratado.

    El certificado de firma electrónica avanzada deberá permitir a quien lo reciba verificar, en forma directa o mediante consulta electrónica, que ha sido emitido por un prestador acreditado de servicios de certificación, con la finalidad de comprobar la validez del mismo.

    Artículo 33

    Procederá la suspensión de la vigencia del certificado cuando se verifique alguna de las siguientes circunstancias:

    a.  Solicitud del titular del certificado.

    b.  Decisión del prestador de servicios de certificación en virtud de razones técnicas.

    El efecto de la suspensión del certificado es el cese temporal de los efectos jurídicos del mismo conforme a los usos que le son propios e impide el uso legítimo del mismo por parte del titular.

    La suspensión del certificado terminará por cualquiera de las siguientes causas:

    a.  Por la decisión del prestador de servicios de certificación de revocar el certificado, en los casos previstos en la Ley.

    b.  Por la decisión del prestador de servicios de certificación de levantar la suspensión del certificado, una vez que cesen las causas técnicas que la originaron.

    c.  Por la decisión del titular del certificado, cuando la suspensión haya sido solicitada por éste.

    Artículo 34

    Los certificados de firma electrónica quedarán sin efecto por la revocación practicada por el prestador de servicios de certificación.

    La revocación tendrá lugar cuando el prestador de servicios de certificación constate alguna de las siguientes circunstancias:

    a)  Solicitud del titular del certificado.

    b)  Fallecimiento del titular o disolución de la persona jurídica que represente, en su caso.

    c)  Resolución judicial ejecutoriada.

    d)  Que el titular del certificado al momento de solicitarlo no proporcionó los datos de la identidad personal u otras circunstancias objeto de certificación, en forma exacta y completa.

    e)  Que el titular del certificado no ha custodiado adecuadamente los mecanismos de seguridad del funcionamiento del sistema de certificación que le proporcione el certificador.

    f)  Que el titular del certificado no ha actualizado sus datos al cambiar éstos.

    g)  Las demás causas que convengan el prestador de servicios de certificación con el titular del certificado.

    El efecto de la revocación del certificado es el cese permanente de los efectos jurídicos de éste conforme a los usos que le son propios e impide el uso legítimo del mismo.

    Artículo 35

    Los prestadores acreditados de servicios de certificación podrán homologar los certificados de firma electrónica avanzada emitidos por certificadores no establecidos en Chile, bajo su responsabilidad. Para ello el prestador acreditado de servicios de certificación deberá demostrar a la Entidad Acreditadora que los certificados por ella homologados han sido emitidos por un prestador de servicios de certificación no establecido en Chile que cumple con normas técnicas equivalentes a las aprobadas de acuerdo al artículo 5º para el desarrollo de la actividad. Una vez practicada la homologación de un certificado o de un grupo de certificados de firma electrónica avanzada el prestador acreditado de servicios de certificación deberá, dentro del plazo de tercero día, comunicar tal situación a la Entidad Acreditadora y se deberá publicar, inmediatamente, en el registro de acceso público señalado en el artículo 7 de este Reglamento. Las prácticas de homologación deberán estar declaradas en las Prácticas de Certificación.

    (Artículo Primero, nº 3 del Decreto 154, publicado el 11.08.2012)

    Artículo 36

    La revocación de un certificado de firma electrónica podrá producirse de oficio o a petición de su titular por la concurrencia de algunas de las causales previstas en la Ley o en este Reglamento. La solicitud de suspensión o revocación, según corresponda, se podrá dirigir al prestador de servicios de certificación en cualquiera de las formas que prevean sus prácticas de certificación. La suspensión o revocación del certificado deberá ser comunicada inmediatamente a su titular, sin perjuicio que deba publicarse en el registro de acceso público que señala el artículo 7 de este Reglamento. Tratándose de la suspensión por razones técnicas o revocación del certificado de firma electrónica por las causales de las letras d), e) o f) del artículo 34, dicha decisión deberá ser comunicada al titular con anterioridad a su puesta en práctica, indicando la causa que la provoca y el momento en que se hará efectiva.

    El término de la vigencia del certificado será oponible a terceros desde el momento de la publicación de ésta en el registro de acceso público que señala el artículo 7 de este Reglamento.

    TITULO CUARTO. PROTECCIÓN DE LOS DERECHOS DE LOS USUARIOS

     Artículo 37

    De acuerdo con el artículo 13 de la Ley el cumplimiento por parte de los prestadores no acreditados de servicios de certificación de las obligaciones que impone la Ley, en la forma que lo hacen los prestadores acreditados, servirá como antecedente para determinar la debida diligencia en la prestación del servicio, para los efectos de hacer efectiva la responsabilidad del artículo 14 de la Ley.

    Artículo 38

    De acuerdo con el artículo 23 de la Ley los usuarios podrán ejercer los derechos señalados en dicho artículo 23 de conformidad con el procedimiento establecido en la Ley 19.496 sobre protección de los derechos de los consumidores, salvo en lo que diga relación con el derecho a ser indemnizado y hacer valer los seguros comprometidos, situación en la cual se regirá por el derecho común.

    TÍTULO QUINTO. SOBRE LA UTILIZACIÓN DE LA FIRMA ELECTRÓNICA POR LOS ÓRGANOS DE LA ADMINISTRACIÓN DEL ESTADO

    Párrafo 1º: Reglas comunes

    Artículo 39

    Los órganos de la Administración del Estado podrán ejecutar o realizar actos, celebrar contratos y expedir cualquier documento, dentro de su ámbito de competencia, suscribiéndolos por medio de firma electrónica.

    Para tal efecto, los actos administrativos, formalizados por medio de documentos electrónicos y que consten en decretos o resoluciones, en acuerdos de órganos colegiados, así como la celebración de contratos, la emisión de cualquier otro documento que exprese la voluntad de un órgano o servicio público de la Administración del Estado en ejercicio de sus potestades legales y, en general, todo documento que revista la naturaleza de instrumento público o aquellos que deban producir los efectos jurídicos de éstos, deberán suscribirse mediante firma electrónica avanzada.

    Artículo 40

    La certificación de las firmas electrónicas avanzadas de las autoridades o funcionarios de los órganos y servicios públicos de la Administración del Estado se realizará por los respectivos ministros de fe. En aquellos órganos en que el ministro de fe no se encuentre expresamente establecido, el jefe superior del servicio deberá designar un funcionario público de planta, por resolución, para que actúe como certificador.

    Artículo 41

    Los órganos de la Administración del Estado podrán contratar, de acuerdo con las normas que rigen la contratación administrativa, los servicios de certificación de firma electrónica con un prestador acreditado de servicios de certificación, cuando mediante resolución fundada constaten su conveniencia técnica y económica. La estimación de dicha conveniencia estará basada en criterios de calidad de servicio y precio de éste.

    Artículo 42

    Los órganos de la Administración del Estado que utilicen documentos electrónicos deberán contar con un Repositorio o archivo electrónico a los efectos de su archivo una vez que haya finalizado su tramitación, de conformidad con las normas que regulan a su respectiva oficina de partes.

    El Repositorio será responsabilidad del respectivo funcionario a cargo del archivo, sin perjuicio de la celebración de convenios de cooperación entre diferentes órganos o de la contratación de una empresa privada para que preste el servicio.

    El Repositorio deberá garantizar que se respeten las normas sobre publicidad de los documentos, contenidas en la Ley 18.575 sobre Bases de la Administración del Estado y otras leyes especiales.

    Artículo 43

    El Repositorio deberá garantizar la seguridad, integridad y disponibilidad de la información en él contenida.

    Para ello la información deberá ser respaldada en copias de seguridad, bajo las siguientes características:

    a.  La información deberá ser respaldada con cada proceso de actualización de documentos.

    b.  Se deberá mantener una copia de seguridad en el lugar de operación de los sistemas de información y otra en un centro de almacenamiento de datos electrónicos especializado. Este centro de almacenamiento de datos electrónicos, que puede ser propio o provisto por terceros, deberá cumplir con condiciones tales como un estricto control de acceso, un completo y detallado registro de entrada y salida de respaldos, resguardo de la humedad, temperatura adecuada, control del riesgo de incendio y otras.

    c.  El esquema de respaldo deberá ser simple, basado en generación de copias acumulativas, con el objeto de mantener la historia de la información en el mínimo de versiones posibles.

    La seguridad, integridad y disponibilidad del Repositorio deberán estar caracterizadas por:

    a.  Medidas de seguridad y barreras de protección, frente al acceso no autorizado de usuarios.

    b.  Contar con monitoreo y alarmas que se activen cuando ocurra un evento no autorizado o fuera de programación, para el caso de eventuales fallas de las medidas de seguridad al acceso.

    c.  La sustitución de la información, por la versión más reciente que se disponga, en el menor tiempo posible, en casos de alteración no programada de aquella.

    d.  La existencia de un programa alternativo de acción que permita la restauración del servicio en el menor tiempo posible, en caso que el Repositorio deje de operar por razones no programadas.

    Artículo 44

    Para los efectos de garantizar la publicidad, seguridad, integridad y eficacia en el uso de las firmas electrónicas, los certificadores de los órganos y servicios públicos de la Administración del Estado deberán cumplir las normas técnicas aprobadas de acuerdo al artículo 5º.

    (Artículo Primero, nº 4 del Decreto 154, publicado el 11.08.2012)

    Artículo 45

    Los documentos electrónicos suscritos por medio de firma electrónica avanzada deberán contener un mecanismo que permita verificar la integridad y autenticidad de los mismos al ser impresos.

    Artículo 46

    La certificación de las firmas electrónicas avanzadas de las autoridades o funcionarios de los órganos y servicios públicos de la Administración del Estado deberá contener, además de las menciones propias de todo certificado, la fecha y hora de emisión del documento.

    Artículo 47

    El Ministerio Secretaría General de la Presidencia propondrá al Presidente de la República las normas técnicas que deberán seguir los órganos de la Administración del Estado para garantizar la publicidad, integridad, eficacia, interoperabilidad y seguridad en el uso de los documentos electrónicos, las que serán aprobadas mediante uno o más decretos supremos, expedidos por dicha Cartera de Estado. Asimismo, deberá establecer las normas técnicas que permitan estandarizar la atención al ciudadano a través de técnicas y medios electrónicos. Si la fijación o modificación de las normas técnicas a las que se refiere este inciso requieren de recursos adicionales, el decreto supremo que las aprueba deberá ser firmado también por el Ministro de Hacienda.

    (Artículo Primero, nº 2 del Decreto 14, publicado 27.02.2014)

    El Ministerio podrá dictar, a través de resolución, guías técnicas para facilitar la comprensión e implementación de las normas técnicas antes aludidas.

    El Ministerio deberá revisar al menos cada dos años las normas técnicas señaladas en el presente artículo a fin de determinar si éstas requieren o no de actualización. El plazo antes indicado se contará desde la entrada en vigencia de la norma técnica respectiva.

    Finalmente, dicho Ministerio deberá publicar en su sitio Web, semestralmente, el nivel de cumplimiento de las normas fijadas en virtud de la presente disposición.

    Lo establecido en la presente disposición es sin perjuicio de las normas técnicas determinadas en virtud del artículo 5º de este reglamento.

    Artículo 48

    El Ministerio Secretaría General de la Presidencia deberá considerar al menos los siguientes criterios para elaborar la propuesta de las normas técnicas a que se refiere el artículo anterior:

    (Artículo Primero, nº 3 del Decreto 14, publicado 27.02.2014)

    a) Adoptar los estándares internacionales emitidos por organismos reconocidos en la materia, en su ausencia considerará los de carácter regional y, sólo cuando ninguno de ellos se encuentre disponible, observará los de desarrollo nacional.

    b) Propender a que la determinación de normas técnicas sea sometida a consulta ciudadana, de conformidad con lo dispuesto en la Ley 20.500 sobre asociaciones y participación ciudadana en la gestión pública y a la consulta de otros órganos de la Administración del Estado, tales como el Ministerio Economía, Fomento y Turismo, Ministerio del Interior y Seguridad Pública y Ministerio de Transportes y Telecomunicaciones.

    c) Adoptar las normas técnicas que sean de uso frecuente en el país.

    d) Realizar los procesos de adopción de normas con la gradualidad necesaria, que permita a los órganos de la Administración del Estado adecuarse a los cambios y su correcta implementación.

    Artículo 49

    (Derogado Artículo Primero, nº 4 del Decreto 14, publicado 27.02.2014).

    Artículo 50

    (Derogado Artículo Primero, nº 5 del Decreto 14, publicado 27.02.2014).

    Párrafo 2º: Sobre el uso de firmas electrónicas en la relación con los particulares

    Artículo 51

    Las personas podrán relacionarse con los órganos de la Administración del Estado a través de técnicas y medios electrónicos con firma electrónica, siempre que se ajusten al procedimiento descrito en la Ley y que tales técnicas y medios sean compatibles con los que utilicen dichos órganos.

    Con la finalidad de garantizar dicha compatibilidad se estará a las normas técnicas fijadas por el Ministerio Secretaría General de la Presidencia de conformidad a lo dispuesto en el artículo 47º.

    Artículo 52

    Las personas que se relacionen con la Administración del Estado por medios electrónicos, podrán utilizar firma electrónica, sin perjuicio de aquellos casos en que se haga necesaria la comprobación fehaciente de su identidad, en los cuales deberán emplear firma electrónica avanzada.

    Artículo 53

    Los órganos de la Administración del Estado podrán relacionarse por medios electrónicos con los particulares, cuando éstos hayan consentido expresamente en esta forma de comunicación.

    Artículo 54

    (Derogado Artículo Primero, nº 7 del Decreto 14, publicado 27.02.2014).).

    Artículo 55

    Lo dispuesto en este Título no se aplicará a las empresas públicas creadas por Ley, las que se regirán por las normas previstas para la emisión de documentos y firmas electrónicas por particulares.

    DISPOSICIONES TRANSITORIAS

    Primera

    En tanto no sean aprobadas las normas técnicas a que se refiere el artículo 5º, se fijan como normas técnicas para todos los fines previstos en este Reglamento las siguientes:

    (Artículo Segundo del Decreto 154, publicado el 11.08.2012)

    a) Prácticas de Certificación:

    ETSI TS 102 042 V1.1.1 (2002-04). Technical Specification. Policy requirements for certification authorities issuing public key certificates.

    NCh2805.Of2003 Tecnología de la Información – Requisitos de las políticas de las autoridades certificadoras que emiten certificados de claves públicas.

    ETSI TS 102 042 V1.2.2 (2005-06). RTS/ESI-000043. Keywords e-commerce, electronic signature, public key, security.

    ETSI TS 102 042 V2.1.1 (2009-05). Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates.

    ETSI TS 102 042 V2.1.2 (2010-04). Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates.

    b) Seguridad:

    NCh27002.Of2009 Tecnología de la información – Código de práctica para la gestión de seguridad de la información.

    ISO/IEC 15408-1:2009 Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model

    FIPS PUB 140-2: Security Requirements for Cryptographic Modules (mayo 2001).

    NCh.2820/1.Of2003 Tecnología de la información – Técnica de seguridad – Criterio de evaluación de la seguridad de TI – Parte 1: Introducción y modelo general.

    NCh2829.Of.2003 Tecnología de la Información – Requisitos de Seguridad para Módulos Criptográficos.

    c) Estructura de Certificados:

    ISO/IEC 9594-8: 2005 Information Technology – Open Systems Interconnection – The Directory Attribute Certificate Framework. Correccion 2:2009.

    ITU – T Rec.X.690 (2002) / ISO/IEC 8825-1:2002. ASN.1 Basic Encoding Rules.

    NCh2798.Of2003 Tecnología de la Información – Reglas de codificación ASN.1 “Especificación de las reglas de codificación básica (BER) de las reglas de codificación canónica (CER) y de las reglas de codificación distinguida (DER).

    d) Repositorio de Información:

    NCh2832.Of2003 Tecnología de la información – Protocolos operacionales de infraestructura de clave pública LDAPv2 para Internet X.509.

    RFC 2559 Boeyen, S. et al., “Internet X.509 Public Key Infrastructure. Operational Protocols LDAPv2”, abril 1999.

    RFC 3377 LDAPv3: Technical Specification, September 2002, Lightweight Directory Access Protocol (v3): Technical.

    e) Sellado de Tiempo/Time stamping:

    ETSI TS 102 023, v.1.2.1 y v.1.2.2. Electronic Signatures and Infrastructures (ESI); Policy requirements for time-stamping authorities.

    ETSI TS 101 861 V1.3.1 Time-stamping profile.

    ISO/IEC 18014-1:2008 Information technology – Security techniques – Time-stamping services – Part 1: Framework.

    ISO/IEC 18014-2:2009 Information technology – Security techniques – Time-stamping services – Part 2: Mechanism producing independent tokens.

    ISO/IEC 18014-3:2009 Information technology – Security techniques – Time-stamping services – Part 3: Mechanisms producing linked tokens.

    RFC 3161 Internet X.509 Public Key Infrastructure Time – Stamp Protocol (TSP) (2001), RFC 5816 (update), ANSI ASC X 9.95.

    RFC 3628 Requirements for Times Stamping Authorities.

    NIST Special publication 800-102, Sept. 2009.

    f) DNI Electrónico y su Identidad Biométrica:

    ISO/ 19.785, ISO 19.794-2 Formatos de cabecera y datos de referencia.

    ISO 7816-4, ISO 7816-11 Para la definición de los comandos de la tarjeta.

    ANSI X.9.84 – 2003 – Reconocimiento de firmas, huellas digitales.

    ISO/IEC 27N2949 – Condiciones de los sistemas biométricos para la industria de servicios financieros.

    ISO/IEC 19784-1:2005, también conocido como BioAPI 2.0. Conexión entre dispositivos biométricos y diferentes tipos de aplicaciones, interfaz de programación de aplicaciones biométricas (API).

    Common Biometric Exchange Fice Format – formatos comunes de intercambio de archivos biométricos.

    g) Servicios de firma móvil:

    ETSI TS 102 207 V1.1.3 (2003-08) Mobile Commerce (M-COMM); Mobile Signature Service; Specifications for Roaming in Mobile Signature Services.

    ETSI TR 102 206 V.1.1.3 (2003-08) Mobile Commerce (M-COMM); Mobile Signature Service; Security Framework.

    ETSI TR 102 203 V1.1.1 (2003-05) Mobile Signatures; Business and functional Requirements.

    ETSI TS 102 204 V1.1.4 (2003-08) Mobile Signature Service; Web Service Interface.

    Además, para el buen uso de las políticas de firma electrónica basada en certificados, se deberán tener en cuenta las siguientes especificaciones técnicas:

    ETSI TS 101 733, v.1.6.3, v1.7.3 y v.1.8.1. Electronic Signatures and Infrastructures (SEI); CMS Advanced Electronic Signatures (CAdES).

    ETSI TS 101 903, v.1.2.2, v.1.3.2 y 1.4.1. Electronic Signatures and Infrastructures (SEI); XML Advanced Electronic Signatures (XAdES).

    ETSI TS 102 778, v 1.1.2. Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles;

    Part 1: PAdES Overview,

    Part 2: PAdES Basic – Profile based on ISO 32000-1,

    Part 3: PAdES Enhanced – PAdES-BES and PAdESEPES Profiles;

    Part 4: Long-term validation

    ETSI TS 102 176-1 V2.0.0 Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric algorithms.

    ETSI TR 102 038, v.1.1.1. Electronic Signatures and Infrastructures (SEI); XML format for signature policies.

    ETSI TR 102 041, v.1.1.1. Electronic Signatures and Infrastructures (SEI); Signature policies report.

    ETSI TR 102 045, v.1.1.1. Electronic Signatures and Infrastructures (SEI); Signature policy for extended business model.

    ETSI TR 102 272, v.1.1.1. Electronic Signatures and Infrastructures (SEI); ASN.1 format for signature policies.

    IETF RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol – OCSP.

    IETF RFC 3125, Electronic Signature Policies.

    IETF RFC 3161 actualizada por RFC 5816, Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP).

    IETF RFC 5280, RFC 4325 y RFC 4630, Internet X.509 Public Key Infrastructure; Certificate and Certificate Revocation List (CRL) Profile.

    IETF RFC 5652, RFC 4853 y RFC 3852, Cryptographic Message Syntax (CMS).

    ITU-T Recommendation X.680 (1997): “Information technology – Abstract Syntax Notation One (ASN.1): Specification of basic notation”

    Segunda. Se define la siguiente gramática para incluir el RUT de empresas o personas en las extensiones ISSUER_ALT_NAME Y SUBJECT_ALT_NAME.

    Según aparece en el documento de la IETF RFC 2594 la extensión Subject Alternative Name tiene la siguiente estructura (en formato ASN.1)

    id-ce-subjectAltName OBJECT IDENTIFIER ::= {id-ce 17}

    SubjectAltName ::= GeneralNames

    GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName

    GeneralName ::= CHOICE {

    otherName          [0]          OtherName,

    /* otherName será el campo usado */

    rfc822Name                  [1]  IA5String,

    dNSName                    [2]  IA5String,

    x400Address                [3]  ORAddress,

    directoryName              [4]  Name,

    ediPartyName                [5]  EDIPartyName,

    uniformResourceIdentifier  [6]  IA5String,

    iPAddress                  [7]  OCTET STRING,

    registeredID                [8]  OBJECT IDENTIFIER}

    OtherName ::= SEQUENCE {

    type-id OBJECT IDENTIFIER,

    value [0] EXPLICIT ANY DEFINED BY type-id}

    En este mismo documento se menciona que la opción “otherName”, es el lugar donde se deben especificar otro tipo de identificadores. Esta es la opción que se utilizará para almacenar el Rut.

    Por lo tanto la información a almacenar será la siguiente:

    SubjectAltName.otherName.Type-id = “<Definición de la OID>”

    SubjectAltName.otherName.Value = “99999999-D” (2 tipos de string : IA5String o PrintableString).

    Tercera. La OID a usar por los prestadores de servicios de certificación será la siguiente:

    Prefijo para PRIVATE ENTERPRISE NUMBERS: 1.3.6.1.4.1 Número asignado a la Entidad Acreditadora: 8321 Sufijos:

    RUT del titular del certificado : 1 RUT de la certificadora emisora : 2

    Por lo tanto, el OID completo para cada uno de estos items quedaría:

    RUT del titular del certificado : 1.3.6.1.4.1.8321.1 RUT de la certificadora emisora : 1.3.6.1.4.1.8321.2

    Artículo segundo

    Derógase el decreto nº 81, de 1999, del Ministerio Secretaría General de la Presidencia.

     Anótese, tómese razón, comuníquese y publíquese

    RICARDO LAGOS ESCOBAR, Presidente de la República

    Jorge Rodríguez Grossi, Ministro de Economía, Fomento y Reconstrucción

    Javier Etcheberry Celhay, Ministro de Transportes y Telecomunicaciones

    Mario Fernández Baeza, Ministro Secretario General de la Presidencia.

    Lo que transcribe para su conocimiento.

    Saluda atentamente a usted

    Alvaro Díaz Pérez, Subsecretario de Economía, Fomento y Reconstrucción.

    19Abr/21

    Ley nº 19.799, de 25 de marzo de 2002

    Ley nº 19.799, de 25 de marzo de 2002. Sobre documentos electrónicos, firma electrónica y servicios de certificación de dicha firma.

    Teniendo presente que el H. Congreso Nacional ha dado su aprobación al siguiente

     Proyecto de ley:

    “LEY SOBRE DOCUMENTOS ELECTRONICOS, FIRMA ELECTRONICA Y SERVICIOS  DE  CERTIFICACION DE DICHA FIRMA”

    TITULO I. DISPOSICIONES GENERALES

    Artículo 1º.

    La presente ley regula los documentos electrónicos y sus efectos legales, la utilización en ellos de firma electrónica, la prestación de servicios de certificación de estas firmas y el procedimiento de acreditación al que podrán sujetarse los prestadores de dicho servicio de certificación, con el objeto de garantizar la seguridad en su uso.

    Las actividades reguladas por esta ley se someterán a los principios de libertad de prestación de servicios, libre competencia, neutralidad tecnológica, compatibilidad internacional y equivalencia del soporte electrónico al soporte de papel.

    Toda interpretación de los preceptos de esta ley deberá guardar armonía con los principios señalados.

     Artículo 2º

    Para los efectos de esta ley se entenderá por:

    a) Electrónico: característica de la tecnología que tiene capacidades eléctricas, digitales, magnéticas, inalámbricas, ópticas, electromagnéticas u otras similares;

    b) Certificado de firma electrónica: certificación electrónica que da fe del vínculo entre el firmante o titular del certificado y los datos de creación de la firma electrónica;

    c) Certificador o Prestador de Servicios de Certificación: entidad prestadora de servicios de certificación de firmas electrónicas;

    d) Documento electrónico: toda representación de un hecho, imagen o idea que sea creada, enviada, comunicada o recibida por medios electrónicos y almacenada de un modo idóneo para permitir su uso posterior;

    e) Entidad Acreditadora: la Subsecretaría de Economía, Fomento y Reconstrucción;

    f) Firma electrónica: cualquier sonido, símbolo o proceso electrónico, que permite al receptor de un documento electrónico identificar al menos formalmente a su autor;

    g) Firma electrónica avanzada: aquella certificada por un prestador acreditado, que ha sido creada usando medios que el titular mantiene bajo su exclusivo control, de manera que se vincule únicamente al mismo y a los datos a los que se refiere, permitiendo la detección posterior de cualquier modificación, verificando la identidad del titular e impidiendo que desconozca la integridad del documento y su autoría, y

    h) Usuario o titular: persona que utiliza bajo su exclusivo control un certificado de firma electrónica.

    i). Fecha electrónica: conjunto de datos en forma electrónica utilizados como medio para constatar el momento en que se ha efectuado una actuación sobre otros datos electrónicos a los que están asociados.

    Artículo 3º

    Los actos y contratos otorgados o celebrados por personas naturales o jurídicas, suscritos por medio de firma electrónica, serán válidos de la misma manera y producirán los mismos efectos que los celebrados por escrito y en soporte de papel. Dichos actos y contratos se reputarán como escritos, en los casos en que la ley exija que los mismos consten de ese modo, y en todos aquellos casos en que la ley prevea consecuencias jurídicas cuando constan igualmente por escrito.

    Lo dispuesto en el inciso anterior no será aplicable a los actos o contratos otorgados o celebrados en los casos siguientes:

    a) Aquellos en que la ley exige una solemnidad que no sea susceptible de cumplirse mediante documento electrónico;

    b) Aquellos en que la ley requiera la concurrencia personal de alguna de las partes, y

    c) Aquellos relativos al derecho de familia.

    La firma electrónica, cualquiera sea su naturaleza, se mirará como firma manuscrita para todos los efectos legales, sin perjuicio de lo establecido en los artículos siguientes.

    Artículo 4º

    Los documentos electrónicos que tengan la calidad de instrumento público, deberán suscribirse mediante firma electrónica avanzada.

    Artículo 5º

    Los documentos electrónicos podrán presentarse en juicio y, en el evento de que se hagan valer como medio de prueba, habrán de seguirse las reglas siguientes:

    1. Los señalados en el artículo anterior, harán plena prueba de acuerdo con las reglas generales, y

    2. Los que posean la calidad de instrumento privado, en cuanto hayan sido suscritos con firma electrónica avanzada, tendrán el mismo valor probatorio señalado en el número anterior. Sin embargo, no harán fe respecto de su fecha, a menos que ésta conste a través de un fechado electrónico otorgado por un prestador acreditado.

     En el caso de documentos electrónicos que posean la calidad de instrumento privado y estén suscritos mediante firma electrónica, tendrán el valor probatorio que corresponda, de acuerdo a las reglas generales.

    TITULO II.- USO DE FIRMAS ELECTRÓNICAS POR LOS ÓRGANOS DEL ESTADO

    Artículo 6º

    Los órganos del Estado podrán ejecutar o realizar actos, celebrar contratos y expedir cualquier documento, dentro de su ámbito de competencia, suscribiéndolos por medio de firma electrónica.

    Se exceptúan aquellas actuaciones para las cuales la Constitución Política o la ley exija una solemnidad que no sea susceptible de cumplirse mediante documento electrónico, o requiera la concurrencia personal de la autoridad o funcionario que deba intervenir en ellas.

    Lo dispuesto en este Título no se aplicará a las empresas públicas creadas por ley, las que se regirán por las normas previstas para la emisión de documentos y firmas electrónicas por particulares.

    Artículo 7º

    Los actos, contratos y documentos de los órganos del Estado, suscritos mediante firma electrónica, serán válidos de la misma manera y producirán los mismos efectos que los expedidos por escrito y en soporte de papel.

    Con todo, para que tengan la calidad de instrumento público o surtan los efectos propios de éste, deberán suscribirse mediante firma electrónica avanzada.

    Artículo 8º

    Las personas podrán relacionarse con los órganos del Estado, a través de técnicas y medios electrónicos con firma electrónica, siempre que se ajusten al procedimiento descrito por la ley y que tales técnicas y medios sean compatibles con los que utilicen dichos órganos.

    Los órganos del Estado deberán evitar, al hacer uso de firmas electrónicas, que se restrinja injustificadamente el acceso a las prestaciones que brinden y a la publicidad y transparencia que rijan sus actuaciones y, en general, que se cause discriminaciones arbitrarias.

    Artículo 9º

    La certificación de las firmas electrónicas avanzadas de las autoridades o funcionarios de los órganos del Estado se realizará por los respectivos ministros de fe. Si éste no se encontrare establecido en la ley, el reglamento a que se refiere el artículo 10 indicará la forma en que se designará un funcionario para estos efectos.

    Dicha certificación deberá contener, además de las menciones que corresponda, la fecha y hora de la emisión del documento.

    Los efectos probatorios de la certificación practicada por el ministro de fe competente serán equivalentes a los de la certificación realizada por un prestador acreditado de servicios de certificación.

    Sin perjuicio de lo dispuesto en el inciso primero, los órganos del Estado podrán contratar los servicios de certificación de firmas electrónicas con entidades certificadoras acreditadas, si ello resultare más conveniente, técnica o económicamente, en las condiciones que señale el respectivo reglamento.

    Artículo 10

    Los reglamentos aplicables a los correspondientes órganos del Estado regularán la forma cómo se garantizará la publicidad, seguridad, integridad y eficacia en el uso de las firmas electrónicas, y las demás necesarias para la aplicación de las normas de este Título.

    TITULO III. DE LOS PRESTADORES DE SERVICIOS DE CERTIFICACIÓN

    Artículo 11

    Son prestadores de servicios de certificación las personas jurídicas nacionales o extranjeras, públicas o privadas, que otorguen certificados de firma electrónica, sin perjuicio de los demás servicios que puedan realizar.

    Asimismo, son prestadores acreditados de servicios de certificación las personas jurídicas nacionales o extranjeras, públicas o privadas, domiciliadas en Chile y acreditadas en conformidad al Título V de esta ley, que otorguen certificados de firma electrónica, sin perjuicio de los demás servicios que puedan realizar.

    Artículo 12

    Son obligaciones del prestador de servicios de certificación de firma electrónica:

    a) Contar con reglas sobre prácticas de certificación que sean objetivas y no discriminatorias y comunicarlas a los usuarios de manera sencilla y en idioma castellano;

    b) Mantener un registro de acceso público de certificados, en el que quedará constancia de los emitidos y los que queden sin efecto, en los términos señalados en el reglamento. A dicho registro podrá accederse por medios electrónicos de manera continua y regular. Para mantener este registro, el certificador podrá tratar los datos proporcionados por el titular del certificado que sean necesarios para ese efecto, y no podrá utilizarlos para otros fines. Dichos datos deberán ser conservados a lo menos durante seis años desde la emisión inicial de los certificados. En lo restante se aplicarán las disposiciones de la ley nº 19.628, sobre Protección de la Vida Privada;

    c) En el caso de cesar voluntariamente en su actividad, los prestadores de servicios de certificación deberán comunicarlo previamente a cada uno de los titulares de firmas electrónicas certificadas por ellos, de la manera que establecerá el reglamento y deberán, de no existir oposición de estos últimos, transferir los datos de sus certificados a otro prestador de servicios, en la fecha en que el cese se produzca. En caso de existir oposición, dejarán sin efecto los certificados respecto de los cuales el titular se haya opuesto a la transferencia. La citada comunicación se llevará a cabo con una antelación mínima de dos meses al cese efectivo de la actividad;

    d) Publicar en sus sitios de dominio electrónico las resoluciones de la Entidad Acreditadora que los afecten;

    e) En el otorgamiento de certificados de firma electrónica avanzada, comprobar fehacientemente la identidad del solicitante, para lo cual el prestador requerirá previamente, ante sí o ante notario público u oficial del registro civil, la comparecencia personal y directa del solicitante o de su representante legal si se tratare de persona jurídica;

    f) Pagar el arancel de la supervisión, el que será fijado anualmente por la Entidad Acreditadora y comprenderá el costo del peritaje y del sistema de acreditación e inspección de los prestadores;

    g) Solicitar la cancelación de su inscripción en el registro de prestadores acreditados llevado por la Entidad Acreditadora, con una antelación no inferior a un mes cuando vayan a cesar su actividad, y comunicarle el destino que dará a los datos de los certificados, especificando, en su caso, si los va a transferir y a quién, o si los certificados quedarán sin efecto;

    h) En caso de cancelación de la inscripción en el registro de prestadores acreditados, los certificadores comunicarán inmediatamente esta circunstancia a cada uno de los usuarios y deberán, de la misma manera que respecto al cese voluntario de actividad, traspasar los datos de sus certificados a otro prestador, si el usuario no se opusiere;

    i) Indicar a la Entidad Acreditadora cualquier otra circunstancia relevante que pueda impedir la continuación de su actividad. En especial, deberá comunicar, en cuanto tenga conocimiento de ello, el inicio de un procedimiento concursal de liquidación o que se encuentre en cesación de pagos, y

    j) Cumplir con las demás obligaciones legales, especialmente las establecidas en esta ley, su reglamento, y las leyes nº 19.496, sobre Protección de los Derechos de los Consumidores, y nº 19.628, sobre Protección de la Vida Privada.

    Artículo 13

    El cumplimiento por parte de los prestadores no acreditados de servicios de certificación de firma electrónica, de las obligaciones señaladas en las letras a), b), c) y j) del artículo anterior, será considerado por el juez como un antecedente para determinar si existió la debida diligencia, para los efectos previstos en el inciso primero del artículo siguiente.

    Artículo 14

    Los prestadores de servicios de certificación serán responsables de los daños y perjuicios que en el ejercicio de su actividad ocasionen por la certificación u homologación de certificados de firmas electrónicas. En todo caso, corresponderá al prestador de servicios demostrar que actuó con la debida diligencia.

    Sin perjuicio de lo dispuesto en el inciso anterior, los prestadores no serán responsables de los daños que tengan su origen en el uso indebido o fraudulento de un certificado de firma electrónica.

    Para los efectos de este artículo, los prestadores acreditados de servicios de certificación de firma electrónica deberán contratar y mantener un seguro, que cubra su eventual responsabilidad civil, por un monto equivalente a cinco mil unidades de fomento, como mínimo, tanto por los certificados propios como por aquellos homologados en virtud de lo dispuesto en el inciso final del artículo 15.

    El certificado de firma electrónica provisto por una entidad certificadora podrá establecer límites en cuanto a sus posibles usos, siempre y cuando los límites sean reconocibles por tercero. El proveedor de servicios de certificación quedará eximido de responsabilidad por los daños y perjuicios causados por el uso que exceda de los límites indicados en el certificado.

     En ningún caso la responsabilidad que pueda emanar de una certificación efectuada por un prestador privado acreditado comprometerá la responsabilidad pecuniaria del Estado.

    TITULO IV. DE LOS CERTIFICADOS DE FIRMA ELECTRÓNICA

    Artículo 15

    Los certificados de firma electrónica, deberán contener, al menos, las siguientes menciones:

    a) Un código de identificación único del certificado;

    b) Identificación del prestador de servicio de certificación, con indicación de su nombre o razón social, rol único tributario, dirección de correo electrónico, y, en su caso, los antecedentes de su acreditación y su propia firma electrónica avanzada;

    c) Los datos de la identidad del titular, entre los cuales deben necesariamente incluirse su nombre, dirección de correo electrónico y su rol único tributario, y

    d) Su plazo de vigencia.

    Los certificados de firma electrónica avanzada podrán ser emitidos por entidades no establecidas en Chile y serán equivalentes a los otorgados por prestadores establecidos en el país, cuando fueren homologados por estos últimos, bajo su responsabilidad, y cumpliendo los requisitos fijados en esta ley y su reglamento, o en virtud de convenio internacional ratificado por Chile y que se encuentre vigente.

    Artículo 16

    Los certificados de firma electrónica quedarán sin efecto, en los siguientes casos:

    1) Por extinción del plazo de vigencia del certificado, el cual no podrá exceder de tres años contados desde la fecha de emisión;

    2) Por revocación del prestador, la que tendrá lugar en las siguientes circunstancias:

    a) A solicitud del titular del certificado;

    b) Por fallecimiento del titular o disolución de la persona jurídica que represente, en su caso;

    c) Por resolución judicial ejecutoriada, o d) Por incumplimiento de las obligaciones del usuario establecidas en el artículo 24;

    3) Por cancelación de la acreditación y de la inscripción del prestador en el registro de prestadores acreditados que señala el artículo 18, en razón de lo dispuesto en el artículo 19 o del cese de la actividad del prestador, a menos que se verifique el traspaso de los datos de los certificados a otro prestador, en conformidad con lo dispuesto en las letras c) y h) del artículo 12, y

    4) Por cese voluntario de la actividad del prestador no acreditado, a menos que se verifique el traspaso de los datos de los certificados a otro prestador, en conformidad a la letra c) del artículo 12.

    La revocación de un certificado en las circunstancias de la letra d) del número 2) de este artículo, así como la suspensión cuando ocurriere por causas técnicas, será comunicada previamente por el prestador al titular del certificado, indicando la causa y el momento en que se hará efectiva la revocación o la suspensión. En cualquier caso, ni la revocación ni la suspensión privarán de valor a los certificados antes del momento exacto en que sean verificadas por el prestador.

    El término de vigencia de un certificado de firma electrónica por alguna de las causales señaladas precedentemente será inoponible a terceros mientras no sea eliminado del registro de acceso público.

    TITULO V. DE LA ACREDITACIÓN E INSPECCIÓN DE LOS PRESTADORES DE SERVICIOS DE CERTIFICACIÓN

    Artículo 17

    La acreditación es el procedimiento en virtud del cual el prestador de servicios de certificación demuestra a la Entidad Acreditadora que cuenta con las instalaciones, sistemas, programas informáticos y los recursos humanos necesarios para otorgar los certificados en los términos que se establecen en esta ley y en el reglamento, permitiendo su inscripción en el registro que se señala en el artículo 18.

    Para ser acreditado, el prestador de servicios de certificación deberá cumplir, al menos, con las siguientes condiciones:

    a) Demostrar la fiabilidad necesaria de sus servicios;

    b) Garantizar la existencia de un servicio seguro de consulta del registro de certificados emitidos;

    c) Emplear personal calificado para la prestación de los servicios ofrecidos, en el ámbito de la firma electrónica y los procedimientos de seguridad y de gestión adecuados;

    d) Utilizar sistemas y productos confiables que garanticen la seguridad de sus procesos de certificación;

    e) Haber contratado un seguro apropiado en los términos que señala el artículo 14, y

    f) Contar con la capacidad tecnológica necesaria para el desarrollo de la actividad de certificación.

    Artículo 18

    El procedimiento de acreditación se iniciará mediante solicitud ante la Entidad Acreditadora, a la que se deberá acompañar los antecedentes relativos a los requisitos del artículo 17 que señale el reglamento y el comprobante de pago de los costos de la acreditación. La Entidad Acreditadora deberá resolver fundadamente sobre la solicitud en el plazo de veinte días contados desde que, a petición del interesado, se certifique que la solicitud se encuentra en estado de resolverse. Si el interesado denunciare el incumplimiento de ese plazo ante la propia autoridad y ésta no se pronunciare dentro del mes siguiente, la solicitud se entenderá aceptada.

    La Entidad Acreditadora podrá contratar expertos con el fin de verificar el cumplimiento de los requisitos señalados en el artículo 17.

    Otorgada la acreditación, el prestador será inscrito en un registro público que a tal efecto llevará la Entidad Acreditadora. Durante la vigencia de su inscripción en el registro, el prestador acreditado deberá informar a la Entidad Acreditadora cualquier modificación de las condiciones que permitieron su acreditación.

    Artículo 19

    Mediante resolución fundada de la Entidad Acreditadora se podrá dejar sin efecto la acreditación y cancelar la inscripción en el registro señalado en el artículo 18 por alguna de las siguientes causas:

    a) Solicitud del prestador acreditado;

    b) Pérdida de las condiciones que sirvieron de fundamento a su acreditación, la que será calificada por los funcionarios o peritos que la Entidad Acreditadora ocupe en la inspección a que se refiere el artículo 20, y

    c) Incumplimiento grave o reiterado de las obligaciones que establece esta ley y su reglamento.

    En los casos de las letras b) y c), la resolución será adoptada previa audiencia del afectado y se podrá reclamar de ella ante el Ministro de Economía, Fomento y Reconstrucción, dentro del plazo de cinco días contados desde su notificación. El Ministro tendrá un plazo de treinta días para resolver. Dentro de los diez días siguientes a la fecha en que se notifique la resolución que éste dicte o, en su caso, desde que se certifique que la reclamación administrativa no fue resuelta dentro de plazo, el interesado podrá interponer reclamación jurisdiccional, para ante la Corte de Apelaciones de su domicilio. La reclamación deberá ser fundada y para su agregación a la tabla, vista y fallo, se regirá por las normas aplicables al recurso de protección. La resolución de la Corte de Apelaciones no será susceptible de recurso alguno.

    Los certificadores cuya inscripción haya sido cancelada, deberán comunicar inmediatamente este hecho a los titulares de firmas electrónicas certificadas por ellos. Sin perjuicio de ello, la Entidad Acreditadora publicará un aviso dando cuenta de la cancelación, a costa del certificador. A partir de la fecha de esta publicación, quedarán sin efecto los certificados, a menos que los datos de los titulares sean transferidos a otro certificador acreditado, en conformidad con lo dispuesto en la letra h) del artículo 12. Los perjuicios que pueda causar la cancelación de la inscripción del certificador para los titulares de los certificados que se encontraban vigentes hasta la cancelación, serán de responsabilidad del prestador.

    Artículo 20

    Con el fin de comprobar el cumplimiento de las obligaciones de los prestadores acreditados, la Entidad Acreditadora ejercerá la facultad inspectora sobre los mismos y podrá, a tal efecto, requerir información y ordenar visitas a sus instalaciones mediante funcionarios o peritos especialmente contratados, de conformidad al reglamento.

    Artículo 21

    La Entidad Acreditadora, así como el personal que actúe bajo su dependencia o por cuenta de ella, deberá guardar la confidencialidad y custodia de los documentos y la información que le entreguen los certificadores acreditados.

    Artículo 22

    Los recursos que perciba la Entidad Acreditadora por parte de los prestadores acreditados de servicios de certificación constituirán ingresos propios de dicha entidad y se incorporarán a su presupuesto.

    TITULO VI. DERECHOS Y OBLIGACIONES DE LOS USUARIOS DE FIRMAS ELECTRÓNICAS

     Artículo 23

    Los usuarios o titulares de firmas electrónicas tendrán los siguientes derechos:

    1º. A ser informado por el prestador de servicios de certificación, de las características generales de los procedimientos de creación y de verificación de firma electrónica, así como de las reglas sobre prácticas de certificación y las demás que éstos se comprometan a seguir en la prestación del servicio, previamente a que se empiece a efectuar;

    2º. A la confidencialidad en la información proporcionada a los prestadores de servicios de certificación. Para ello, éstos deberán emplear los elementos técnicos disponibles para brindar seguridad y privacidad a la información aportada, y los usuarios tendrán derecho a que se les informe, previamente al inicio de la prestación del servicio, de las características generales de dichos elementos;

    3º. A ser informado, antes de la emisión de un certificado, del precio de los servicios de certificación, incluyendo cargos adicionales y formas de pago, en su caso; de las condiciones precisas para la utilización del certificado y de sus limitaciones de uso, y de los procedimientos de reclamación y de resolución de litigios previstos en las leyes o que se convinieren;

    4º. A que el prestador de servicios o quien homologue sus certificados le proporcionen la información sobre sus domicilios en Chile y sobre todos los medios a los que el usuario pueda acudir para solicitar aclaraciones, dar cuenta del mal funcionamiento del sistema, o presentar sus reclamos;

    5º. A ser informado, al menos con dos meses de anticipación, por los prestadores de servicios de certificación, del cese de su actividad, con el fin de hacer valer su oposición al traspaso de los datos de sus certificados a otro certificador, en cuyo caso dichos certificados se extinguirán de conformidad con el numeral 4° del artículo 16 de la presente ley, o bien, para que tomen conocimiento de la extinción de los efectos de sus certificados, si no existiere posibilidad de traspaso a otro certificador;

    6º. A ser informado inmediatamente de la cancelación de la inscripción en el registro de prestadores acreditados, con el fin de hacer valer su oposición al traspaso de los datos de sus certificados a otro certificador, en cuyo caso dichos certificados se extinguirán de conformidad con el numeral 3º del artículo 16 de la presente ley, o bien, para tomar conocimiento de la extinción de los efectos de sus certificados, si no existiere posibilidad de traspaso a otro certificador;

    7º. A traspasar sus datos a otro prestador de servicios de certificación;

    8º. A que el prestador no proporcione más servicios y de otra calidad que los que haya pactado, y a no recibir publicidad comercial de ningún tipo por intermedio del prestador, salvo autorización expresa del usuario;

    9º. A acceder, por medios electrónicos, al registro de prestadores acreditados que mantendrá la Entidad Acreditadora, y

    10º. A ser indemnizado y hacer valer los seguros comprometidos, en conformidad con el artículo 14 de la presente ley.

    Los usuarios gozarán de estos derechos, sin perjuicio de aquellos que deriven de la ley nº 19.628, sobre Protección de la Vida Privada y de la ley nº 19.496, sobre Protección a los Derechos de los Consumidores y podrán, con la salvedad de lo señalado en el número 10° de este artículo, ejercerlos conforme al procedimiento establecido en esa última normativa.

    Artículo 24

    Los usuarios de los certificados de firma electrónica quedarán obligados, en el momento de proporcionar los datos de su identidad personal u otras circunstancias objeto de certificación, a brindar declaraciones exactas y completas. Además, estarán obligados a custodiar adecuadamente los mecanismos de seguridad del funcionamiento del sistema de certificación que les proporcione el certificador, y a actualizar sus datos en la medida que éstos vayan cambiando.

    TITULO VII. REGLAMENTOS

    Artículo 25

    El Presidente de la República reglamentará esta ley en el plazo de noventa días contados desde su publicación, mediante uno o más decretos supremos del Ministerio de Economía, Fomento y Reconstrucción, suscritos también por los Ministros de Transportes y Telecomunicaciones y Secretario General de la Presidencia.

    Lo anterior es sin perjuicio de los demás reglamentos que corresponda aprobar, para dar cumplimiento a lo previsto en el artículo 10.

    Artículo transitorio

    El mayor gasto que irrogue a la Subsecretaría de Economía, Fomento y Reconstrucción las funciones que le asigna esta ley, durante el año 2002, se financiará con los recursos consultados en su presupuesto.

    Habiéndose cumplido con lo establecido en el nº 1º del Artículo 82 de la Constitución Política de la República y por cuanto he tenido a bien aprobarlo y sancionarlo; por tanto promúlguese y llévese a efecto como Ley de la República.

    Santiago, 25 de marzo de 2002

    RICARDO LAGOS ESCOBAR, Presidente de la República

    Jorge Rodríguez Grossi, Ministro de Economía, Fomento y Reconstrucción

    Nicolás Eyzaguirre Guzmán, Ministro de Hacienda.

    Lo que transcribe para su conocimiento.

    Saluda atentamente a usted, Alvaro Díaz Pérez, Subsecretario de Economía, Fomento y Reconstrucción.

    Tribunal Constitucional

    Proyecto de ley sobre firma electrónica y los servicios de certificación de firma electrónica

    El Secretario del Tribunal Constitucional, quien suscribe, certifica que la Honorable Cámara de Diputados envió el proyecto de ley enunciado en el rubro, aprobado por el Congreso Nacional, a fin de que este Tribunal ejerciera el control de constitucionalidad respecto de su artículo 19, y por sentencia de 13 de marzo de 2002, lo declaró constitucional.

    Santiago, marzo 14 de 2002

    Rafael Larraín Cruz, Secretario.

    19Abr/21

    Decreto 100 de 22 de septiembre de 2005. Fija el Texto Refundido, Coordinado y Sistematizado de la Constitución Política de Chile

    Decreto 100 de 22 de septiembre de 2005. Fija el Texto Refundido, Coordinado y Sistematizado de la Constitución Política de Chile

    CONSTITUCIÓN POLÍTICA DE LA REPUBLICA DE CHILE 1

    Santiago, 17 de septiembre de 2005

    DECRETO SUPREMO N° 100

    VISTO: En uso de las facultades que me confiere el artículo 2° de la Ley Nº 20.050, y teniendo presente lo dispuesto en el artículo 32 N° 8 de la Constitución Política de 1980.

    DECRETO: Fíjase el siguiente texto refundido, coordinado y sistematizado de la Constitución Política de la República:

    CAPITULO I. BASES DE LA INSTITUCIONALIDAD

    Artículo 1° Las personas nacen libres e iguales en dignidad y derechos. 2

    La familia es el núcleo fundamental de la sociedad.

    El Estado reconoce y ampara a los grupos intermedios a través de los cuales se organiza y estructura la sociedad y les garantiza la adecuada autonomía para cumplir sus propios fines específicos.

    El Estado está al servicio de la persona humana y su finalidad es promover el bien común, para lo cual debe contribuir a crear las condiciones sociales que permitan a todos y a cada uno de los integrantes de la comunidad nacional su mayor realización espiritual y material posible, con pleno respeto a los derechos y garantías que esta Constitución establece.

    Es deber del Estado resguardar la seguridad nacional, dar protección a la población y a la familia, propender al fortalecimiento de ésta, promover la integración armónica de todos los sectores de la Nación y asegurar el derecho de las personas a participar con igualdad de oportunidades en la vida nacional.

    Artículo 2° Son emblemas nacionales la bandera nacional, el escudo de armas de la República y el himno nacional.

    Artículo 3º El Estado de Chile es unitario.

    La administración del Estado será funcional y territorialmente descentralizada, o desconcentrada en su caso, de conformidad a la ley.

    Los órganos del Estado promoverán el fortalecimiento de la regionalización del país y el desarrollo equitativo y solidario entre las regiones, provincias y comunas del territorio nacional. 3

    Artículo 4° Chile es una república democrática.

    Artículo 5° La soberanía reside esencialmente en la Nación. Su ejercicio se realiza por el pueblo a través del plebiscito y de elecciones periódicas y, también, por las autoridades que esta Constitución establece. Ningún sector del pueblo ni individuo alguno puede atribuirse su ejercicio.

    El ejercicio de la soberanía reconoce como limitación el respeto a los derechos esenciales que emanan de la naturaleza humana. Es deber de los órganos del Estado respetar y promover tales derechos, garantizados por esta Constitución, así como por los tratados internacionales ratificados por Chile y que se encuentren vigentes. 4

    Artículo 6° Los órganos del Estado deben someter su acción a la Constitución y a las normas dictadas conforme a ella, y garantizar el orden institucional de la República. 5

    Los preceptos de esta Constitución obligan tanto a los titulares o integrantes de dichos órganos como a toda persona, institución o grupo.

    La infracción de esta norma generará las responsabilidades y sanciones que determine la ley.

    Artículo 7° Los órganos del Estado actúan válidamente previa investidura regular de sus integrantes, dentro de su competencia y en la forma que prescriba la ley.

    Ninguna magistratura, ninguna persona ni grupo de personas pueden atribuirse, ni aun a pretexto de circunstancias extraordinarias, otra autoridad o derechos que los que expresamente se les hayan conferido en virtud de la Constitución o las leyes.

    Todo acto en contravención a este artículo es nulo y originará las responsabilidades y sanciones que la ley señale.

    Artículo 8° El ejercicio de las funciones públicas obliga a sus titulares a dar estricto cumplimiento al principio de probidad en todas sus actuaciones.

    Son públicos los actos y resoluciones de los órganos del Estado, así como sus               fundamentos y los procedimientos que utilicen. Sin embargo, sólo una ley de quórum calificado podrá establecer la reserva o secreto de aquéllos o de éstos, cuando la publicidad afectare el debido cumplimiento de las funciones de dichos órganos, los derechos de las personas, la seguridad de la Nación o el interés nacional. 6

    El Presidente de la República, los Ministros de Estado, los diputados y senadores, y las demás autoridades y funcionarios que una ley orgánica constitucional señale, deberán declarar sus intereses y patrimonio en forma pública.

    Dicha ley determinará los casos y las condiciones en que esas autoridades delegarán a terceros la administración de aquellos bienes y obligaciones que supongan conflicto de interés en el ejercicio de su función pública. Asimismo, podrá considerar otras medidas apropiadas para resolverlos y, en situaciones calificadas, disponer la enajenación de todo o parte de esos bienes. 7

    Artículo 9° El terrorismo, en cualquiera de sus formas, es por esencia contrario a los derechos humanos.

    Una ley de quórum calificado determinará las conductas terroristas y su penalidad. Los responsables de estos delitos quedarán inhabilitados por el plazo de quince años para ejercer funciones o cargos públicos, sean o no de elección popular, o de rector o director de establecimiento de educación, o para ejercer en ellos funciones de enseñanza; para explotar un medio de comunicación social o ser director o administrador del mismo, o para desempeñar en él funciones relacionadas con la emisión o difusión de opiniones o informaciones; ni podrán ser dirigentes de organizaciones políticas o relacionadas con la educación o de carácter vecinal, profesional, empresarial, sindical, estudiantil o gremial en general, durante dicho plazo. Lo anterior se entiende sin perjuicio de otras inhabilidades o de las que por mayor tiempo establezca la ley. 8- 9

    Los delitos a que se refiere el inciso anterior serán considerados siempre comunes y no políticos para todos los efectos legales y no procederá respecto de ellos el indulto particular, salvo para conmutar la pena de muerte por la de presidio perpetuo. 10

    CAPITULO II.- NACIONALIDAD Y CIUDADANÍA

    Artículo 10. Son chilenos:

    1º. Los nacidos en el territorio de Chile, con excepción de los hijos de extranjeros que se encuentren en Chile en servicio de su Gobierno, y de los hijos de extranjeros transeúntes, todos los que, sin embargo, podrán optar por la nacionalidad chilena;

    2º Los hijos de padre o madre chilenos, nacidos en territorio extranjero. Con todo, se requerirá que alguno de sus ascendientes en línea recta de primer o segundo grado, haya adquirido la nacionalidad chilena en virtud de lo establecido en los números 1º, 3º ó 4º; 11

    3º Los extranjeros que obtuvieren carta de nacionalización en conformidad a la ley. 12

    4º Los que obtuvieren especial gracia de nacionalización por ley.

    La ley reglamentará los procedimientos de opción por la nacionalidad chilena; de otorgamiento, negativa y cancelación de las cartas de nacionalización, y la formación de un registro de todos estos actos. 13

    Artículo 11. La nacionalidad chilena se pierde:

     1º. Por renuncia voluntaria manifestada ante autoridad chilena competente. Esta renuncia sólo producirá efectos si la persona, previamente, se ha nacionalizado en país extranjero; 14

    2º. Por decreto supremo, en caso de prestación de servicios durante una guerra exterior a enemigos de Chile o de sus aliados;

    3º. Por cancelación de la carta de nacionalización, y 15

    4º. Por ley que revoque la nacionalización concedida por gracia.

    Los que hubieren perdido la nacionalidad chilena por cualquiera de las causales establecidas en este artículo, sólo podrán ser rehabilitados por ley.

    Artículo 12. La persona afectada por acto o resolución de autoridad administrativa que la prive de su nacionalidad chilena o se la desconozca, podrá recurrir, por sí o por cualquiera a su nombre, dentro del plazo de treinta días, ante la Corte Suprema, la que conocerá como jurado y en tribunal pleno. La interposición del recurso suspenderá los efectos del acto o resolución recurridos.

    Artículo 13. Son ciudadanos los chilenos que hayan cumplido dieciocho años de edad y que no hayan sido condenados a pena aflictiva.

    La calidad de ciudadano otorga los derechos de sufragio, de optar a cargos de elección popular y los demás que la Constitución o la ley confieran.

    Tratándose de los chilenos a que se refieren los números 2º y 4º del artículo 10, el ejercicio de los derechos que les confiere la ciudadanía estará sujeto a que hubieren estado avecindados en Chile por más de un año. 16

    Artículo 14. Los extranjeros avecindados en Chile por más de cinco años, y que cumplan con los requisitos señalados en el inciso primero del artículo 13, podrán ejercer el derecho de sufragio en los casos y formas que determine la ley.

    Los nacionalizados en conformidad al Nº 3º del artículo 10, tendrán opción a cargos públicos de elección popular sólo después de cinco años de estar en posesión de sus cartas de nacionalización. 17

    Artículo 15. En las votaciones populares, el sufragio será personal, igualitario, secreto y voluntario. 18

    Sólo podrá convocarse a votación popular para las elecciones y plebiscitos expresamente previstos en esta Constitución.

    Artículo 16. El derecho de sufragio se suspende:

    1º. Por interdicción en caso de demencia;

    2º. Por hallarse la persona acusada por delito que merezca pena aflictiva o por delito que la ley califique como conducta terrorista, y 19

    3º. Por haber sido sancionado por el Tribunal Constitucional en conformidad al inciso séptimo del número 15º del artículo 19 de esta Constitución. Los que por esta causa se hallaren privados del ejercicio del derecho de sufragio lo recuperarán al término de cinco años, contado desde la declaración del Tribunal. Esta suspensión no producirá otro efecto legal, sin perjuicio de lo dispuesto en el inciso séptimo del número 15º del artículo 19. 20

    Artículo 17. La calidad de ciudadano se pierde:

    1º. Por pérdida de la nacionalidad chilena;

    2º. Por condena a pena aflictiva, y 21

    3º. Por condena por delitos que la ley califique como conducta terrorista y los relativos al tráfico de estupefacientes y que hubieren merecido, además, pena aflictiva.22

    Los que hubieren perdido la ciudadanía por la causal indicada en el número 2º, la recuperarán en conformidad a la ley, una vez extinguida su responsabilidad penal. Los que la hubieren perdido por las causales previstas en el número 3º podrán solicitar su rehabilitación al Senado una vez cumplida la condena. 23

    Artículo 18. Habrá un sistema electoral público. Una ley orgánica constitucional determinará su organización y funcionamiento, regulará la forma en que se realizarán los procesos electorales y plebiscitarios, en todo lo no previsto por esta Constitución y garantizará siempre la plena igualdad entre los independientes y los miembros de partidos políticos tanto en la presentación de candidaturas como en su participación en los señalados procesos. Dicha ley establecerá también un sistema de financiamiento, transparencia, límite y control del gasto electoral. 24

    Una ley orgánica constitucional contemplará, además, un sistema de registro electoral, bajo la dirección del Servicio Electoral, al que se incorporarán, por el solo ministerio de la ley, quienes cumplan los requisitos establecidos por esta Constitución. 25

    El resguardo del orden público durante los actos electorales y plebiscitarios corresponderá a las Fuerzas Armadas y Carabineros del modo que indique la ley. 26

    CAPITULO III. DE LOS DERECHOS Y DEBERES CONSTITUCIONALES

    Artículo 19. La Constitución asegura a todas las personas:

    1°. El derecho a la vida y a la integridad física y psíquica de la persona.

    La ley protege la vida del que está por nacer. 27

    La pena de muerte sólo podrá establecerse por delito contemplado en ley aprobada con quórum calificado. 28

    Se prohíbe la aplicación de todo apremio ilegítimo;

    2°. La igualdad ante la ley. En Chile no hay persona ni grupos privilegiados. En Chile no hay esclavos y el que pise su territorio queda libre. Hombres y mujeres son iguales ante la ley. 29-30

    Ni la ley ni autoridad alguna podrán establecer diferencias arbitrarias;

    3°. La igual protección de la ley en el ejercicio de sus derechos.

    Toda persona tiene derecho a defensa jurídica en la forma que la ley señale y ninguna autoridad o individuo podrá impedir, restringir o perturbar la debida intervención del letrado, si hubiere sido requerida. Tratándose de los integrantes de las Fuerzas Armadas y de Orden y Seguridad Pública, este derecho se regirá en lo concerniente a lo administrativo y disciplinario, por las normas pertinentes de sus respectivos estatutos.

    La ley arbitrará los medios para otorgar asesoramiento y defensa jurídica a quienes no puedan procurárselos por sí mismos.

    Nadie podrá ser juzgado por comisiones especiales, sino por el tribunal que señalare la ley y que se hallare establecido por ésta con anterioridad a la perpetración del hecho. 31

    Toda sentencia de un órgano que ejerza jurisdicción debe fundarse en un proceso previo legalmente tramitado. Corresponderá al legislador establecer siempre las garantías de un procedimiento y una investigación racionales y justos. 32

    La ley no podrá presumir de derecho la responsabilidad penal.

    Ningún delito se castigará con otra pena que la que señale una ley promulgada con anterioridad a su perpetración, a menos que una nueva ley favorezca al afectado.

    Ninguna ley podrá establecer penas sin que la conducta que se sanciona esté expresamente descrita en ella;

    4° El respeto y protección a la vida privada y a la honra de la persona y su familia. 33-34

    5°. La inviolabilidad del hogar y de toda forma de comunicación privada. El hogar sólo puede allanarse y las comunicaciones y documentos privados interceptarse, abrirse o registrarse en los casos y formas determinados por la ley.

    6°. La libertad de conciencia, la manifestación de todas las creencias y el ejercicio libre de todos los cultos que no se opongan a la moral, a las buenas costumbres o al orden público.

    Las confesiones religiosas podrán erigir y conservar templos y sus dependencias bajo las condiciones de seguridad e higiene fijadas por las leyes y ordenanzas.

    Las iglesias, las confesiones e instituciones religiosas de cualquier culto tendrán los derechos que otorgan y reconocen, con respecto a los bienes, las leyes actualmente en vigor. Los templos y sus dependencias, destinados exclusivamente al servicio de un culto, estarán exentos de toda clase de contribuciones; 35

    7°. El derecho a la libertad personal y a la seguridad individual.

    En consecuencia:

    a) Toda persona tiene derecho de residir y permanecer en cualquier lugar de la República, trasladarse de uno a otro y entrar y salir de su territorio, a condición de que se guarden las normas establecidas en la ley y salvo siempre el perjuicio de terceros;

    b) Nadie puede ser privado de su libertad personal ni ésta restringida sino en los casos y en la forma determinados por la Constitución y las leyes;

    c) Nadie puede ser arrestado o detenido sino por orden de funcionario público expresamente facultado por la ley y después de que dicha orden le sea intimada en forma legal. Sin embargo, podrá ser detenido el que fuere sorprendido en delito flagrante, con el solo objeto de ser puesto a disposición del juez competente dentro de las veinticuatro horas siguientes.

    Si la autoridad hiciere arrestar o detener a alguna persona, deberá, dentro de las cuarenta y ocho horas siguientes, dar aviso al juez competente, poniendo a su disposición al afectado. El juez podrá, por resolución fundada, ampliar este plazo hasta por cinco días, y hasta por diez días, en el caso que se investigaren hechos calificados por la ley como conductas terroristas;

    d) Nadie puede ser arrestado o detenido, sujeto a prisión preventiva o preso, sino en su casa o en lugares públicos destinados a este objeto.

    Los encargados de las prisiones no pueden recibir en ellas a nadie en calidad de arrestado o detenido, procesado o preso, sin dejar constancia de la orden correspondiente, emanada de autoridad que tenga facultad legal, en un registro que será público.

    Ninguna incomunicación puede impedir que el funcionario encargado de la casa de detención visite al arrestado o detenido, procesado o preso, que se encuentre en ella.

    Este funcionario está obligado, siempre que el arrestado o detenido lo requiera, a transmitir al juez competente la copia de la orden de detención, o a reclamar para que se le de dicha copia, o a dar él mismo un certificado de hallarse detenido aquel individuo, si al tiempo de su detención se hubiere omitido este requisito;

    e) La libertad del imputado procederá a menos que la detención o prisión preventiva sea considerada por el juez como necesaria para las investigaciones o para la seguridad del ofendido o de la sociedad. La ley establecerá los requisitos y modalidades para obtenerla.

    La apelación de la resolución que se pronuncie sobre la libertad del imputado por los delitos a que se refiere el artículo 9, será conocida por el tribunal superior que corresponda, integrado exclusivamente por miembros titulares. La resolución que la apruebe u otorgue requerirá ser acordada por unanimidad. Mientras dure la libertad, el imputado quedará siempre sometido a las medidas de vigilancia de la autoridad que la ley contemple; 36

    f) En las causas criminales no se podrá obligar al imputado o acusado a que declare bajo juramento sobre hecho propio; tampoco podrán ser obligados a declarar en contra de éste sus ascendientes, descendientes, cónyuge y demás personas que, según los casos y circunstancias, señale la ley; 37

    g) No podrá imponerse la pena de confiscación de bienes, sin perjuicio del comiso en los casos establecidos por las leyes; pero dicha pena será procedente respecto de las asociaciones ilícitas;

    h) No podrá aplicarse como sanción la pérdida de los derechos previsionales, e

    i) Una vez dictado sobreseimiento definitivo o sentencia absolutoria, el que hubiere sido sometido a proceso o condenado en cualquier instancia por resolución que la Corte Suprema declare injustificadamente errónea o arbitraria, tendrá derecho a ser indemnizado por el Estado de los perjuicios patrimoniales y morales que haya sufrido. La indemnización será determinada judicialmente en procedimiento breve y sumario y en él la prueba se apreciará en conciencia; 38

    8°. El derecho a vivir en un medio ambiente libre de contaminación. Es deber del Estado velar para que este derecho no sea afectado y tutelar la preservación de la naturaleza.

    La ley podrá establecer restricciones específicas al ejercicio de determinados derechos o libertades para proteger el medio ambiente; 39

    9°. El derecho a la protección de la salud.

    El Estado protege el libre e igualitario acceso a las acciones de promoción, protección y recuperación de la salud y de rehabilitación del individuo.

    Le corresponderá, asimismo, la coordinación y control de las acciones relacionadas con la salud.

    Es deber preferente del Estado garantizar la ejecución de las acciones de salud, sea que se presten a través de instituciones públicas o privadas, en la forma y condiciones que determine la ley, la que podrá establecer cotizaciones obligatorias.

    Cada persona tendrá el derecho a elegir el sistema de salud al que desee acogerse, sea éste estatal o privado; 40

    10°. El derecho a la educación.

    La educación tiene por objeto el pleno desarrollo de la persona en las distintas etapas de su vida.

    Los padres tienen el derecho preferente y el deber de educar a sus hijos.

    Corresponderá al Estado otorgar especial protección al ejercicio de este derecho.

    Para el Estado es obligatorio promover la educación parvularia y garantizar el acceso gratuito y el financiamiento fiscal al segundo nivel de transición, sin que éste constituya requisito para el ingreso a la educación básica. 41 42

    La educación básica y la educación media son obligatorias, debiendo el Estado financiar un sistema gratuito con tal objeto, destinado a asegurar el acceso a ellas de toda la población. En el caso de la educación media este sistema, en conformidad a la ley, se extenderá hasta cumplir los 21 años de edad.43

    Corresponderá al Estado, asimismo, fomentar el desarrollo de la educación en todos sus niveles; estimular la investigación científica y tecnológica, la creación artística y la protección e incremento del patrimonio cultural de la Nación.

    Es deber de la comunidad contribuir al desarrollo y perfeccionamiento de la educación;

    11°. La libertad de enseñanza incluye el derecho de abrir, organizar y mantener establecimientos educacionales.

    La libertad de enseñanza no tiene otras limitaciones que las impuestas por la moral, las buenas costumbres, el orden público y la seguridad nacional.

    La enseñanza reconocida oficialmente no podrá orientarse a propagar tendencia político partidista alguna.

    Los padres tienen el derecho de escoger el establecimiento de enseñanza para sus hijos.

    Una ley orgánica constitucional establecerá los requisitos mínimos que deberán exigirse en cada uno de los niveles de la enseñanza básica y media y señalará las normas objetivas, de general aplicación, que permitan al Estado velar por su cumplimiento. Dicha ley, del mismo modo, establecer los requisitos para el reconocimiento oficial de los establecimientos educacionales de todo nivel; 44

    12°. La libertad de emitir opinión y la de informar, sin censura previa, en cualquier forma y por cualquier medio, sin perjuicio de responder de los delitos y abusos que se cometan en el ejercicio de estas libertades, en conformidad a la ley, la que deber ser de quórum calificado.

    La ley en ningún caso podrá establecer monopolio estatal sobre los medios de comunicación social.

    Toda persona natural o jurídica ofendida o injustamente aludida por algún medio de comunicación social, tiene derecho a que su declaración o rectificación sea gratuitamente difundida, en las condiciones que la ley determine, por el medio de comunicación social en que esa información hubiera sido emitida.

    Toda persona natural o jurídica tiene el derecho de fundar, editar y mantener diarios, revistas y periódicos, en las condiciones que señale la ley.

    El Estado, aquellas universidades y demás personas o entidades que la ley determine, podrán establecer, operar y mantener estaciones de televisión.

    Habrá un Consejo Nacional de Televisión, autónomo y con personalidad jurídica, encargado de velar por el correcto funcionamiento de este medio de comunicación. Una ley de quórum calificado señalar la organización y demás funciones y atribuciones del referido Consejo. 45

    La ley regulará un sistema de calificación para la exhibición de la producción cinematográfica; 46-47-48

    13°. El derecho a reunirse pacíficamente sin permiso previo y sin armas.

    Las reuniones en las plazas, calles y demás lugares de uso público se regirán por las disposiciones generales de policía; 49

    14°. El derecho de presentar peticiones a la autoridad, sobre cualquier asunto de interés público o privado, sin otra limitación que la de proceder en términos respetuosos y convenientes;

    15°. El derecho de asociarse sin permiso previo.

    Para gozar de personalidad jurídica, las asociaciones deberán constituirse en conformidad a la ley.

    Nadie puede ser obligado a pertenecer a una asociación.

    Prohíbense las asociaciones contrarias a la moral, al orden público y a la seguridad del Estado.

    Los partidos políticos no podrán intervenir en actividades ajenas a las que les son propias ni tener privilegio alguno o monopolio de la participación ciudadana; la nómina de sus militantes se registrará en el Servicio Electoral del Estado, el que guardará reserva de la misma, la cual será accesible a los militantes del respectivo partido; su contabilidad deberá ser pública; las fuentes de su financiamiento no podrán provenir de dineros, bienes, donaciones, aportes ni créditos de origen extranjero; sus estatutos deberán contemplar las normas que aseguren una efectiva democracia interna. Una ley orgánica constitucional establecerá un sistema de elecciones primarias que podrá ser utilizado por dichos partidos para la nominación de candidatos a cargos de elección popular, cuyos resultados serán vinculantes para estas colectividades, salvo las excepciones que establezca dicha ley. Aquellos que no resulten elegidos en las elecciones primarias no podrán ser candidatos, en esa elección, al respectivo cargo. Una ley orgánica constitucional regulará las demás materias que les conciernan y las sanciones que se aplicarán por el incumplimiento de sus preceptos, dentro de las cuales podrá considerar su disolución.50 Las asociaciones, movimientos, organizaciones o grupos de personas que persigan o realicen actividades propias de los partidos políticos sin ajustarse a las normas anteriores son ilícitos y serán sancionados de acuerdo a la referida ley orgánica constitucional. 51

    La Constitución Política garantiza el pluralismo político. Son inconstitucionales los partidos, movimientos u otras formas de organización cuyos objetivos, actos o conductas no respeten los principios básicos del régimen democrático y constitucional, procuren el establecimiento de un sistema totalitario, como asimismo aquellos que hagan uso de la violencia, la propugnen o inciten a ella como método de acción política. Corresponderá al Tribunal Constitucional declarar esta inconstitucionalidad. 52

    Sin perjuicio de las demás sanciones establecidas en la Constitución o en la Ley, las personas que hubieren tenido participación en los hechos que motiven la declaración de inconstitucionalidad a que se refiere el inciso precedente, no podrán participar en la formación de otros partidos políticos, movimientos u otras formas de organización política, ni optar a cargos públicos de elección popular ni desempeñar los cargos que se mencionan en los números 1) a 6) del artículo 54, por el término de cinco años, contado desde la resolución del Tribunal. Si a esa fecha las personas referidas estuvieren en posesión de las funciones o cargos indicados, los perderán de pleno derecho.53

    Las personas sancionadas en virtud de este precepto no podrán ser objeto de rehabilitación durante el plazo señalado en el inciso anterior. La duración de las inhabilidades contempladas en dicho inciso se elevará al doble en caso de reincidencia; 54

    16°. La libertad de trabajo y su protección.

    Toda persona tiene derecho a la libre contratación y a la libre elección del trabajo con una justa retribución.

    Se prohíbe cualquiera discriminación que no se base en la capacidad o idoneidad personal, sin perjuicio de que la ley pueda exigir la nacionalidad chilena o límites de edad para determinados casos.

    Ninguna clase de trabajo puede ser prohibida, salvo que se oponga a la moral, a la seguridad o a la salubridad públicas, o que lo exija el interés nacional y una ley lo declare así. Ninguna ley o disposición de autoridad pública podrá exigir la afiliación a organización o entidad alguna como requisito para desarrollar una determinada actividad o trabajo, ni la desafiliación para mantenerse en éstos. La ley determinará las profesiones que requieren grado o título universitario y las condiciones que deben cumplirse para ejercerlas. Los colegios profesionales constituidos en conformidad a la ley y que digan relación con tales profesiones, estarán facultados para conocer de las reclamaciones que se interpongan sobre la conducta ética de sus miembros. Contra sus resoluciones podrá apelarse ante la Corte de Apelaciones respectiva. Los profesionales no asociados serán juzgados por los tribunales especiales establecidos en la ley. 55

    La negociación colectiva con la empresa en que laboren es un derecho de los trabajadores, salvo los casos en que la ley expresamente no permita negociar. La ley establecerá las modalidades de la negociación colectiva y los procedimientos adecuados para lograr en ella una solución justa y pacífica. La ley señalará los casos en que la negociación colectiva deba someterse a arbitraje obligatorio, el que corresponderá a tribunales especiales de expertos cuya organización y atribuciones se establecerán en ella.

    No podrán declararse en huelga los funcionarios del Estado ni de las municipalidades. Tampoco podrán hacerlo las personas que trabajen en corporaciones o empresas, cualquiera que sea su naturaleza, finalidad o función, que atiendan servicios de utilidad pública o cuya paralización cause grave daño a la salud, a la economía del país, al abastecimiento de la población o a la seguridad nacional. La ley establecerá los procedimientos para determinar las corporaciones o empresas cuyos trabajadores estarán sometidos a la prohibición que establece este inciso;

    17°. La admisión a todas las funciones y empleos públicos, sin otros requisitos que los que impongan la Constitución y las leyes;

    18°. El derecho a la seguridad social.

    Las leyes que regulen el ejercicio de este derecho serán de quórum calificado.

    La acción del Estado estará dirigida a garantizar el acceso de todos los habitantes al goce de prestaciones básicas uniformes, sea que se otorguen a través de instituciones públicas o privadas. La ley podrá establecer cotizaciones obligatorias.

    El Estado supervigilará el adecuado ejercicio del derecho a la seguridad social;

    19°. El derecho de sindicarse en los casos y forma que señale la ley. La afiliación sindical será siempre voluntaria.

    Las organizaciones sindicales gozarán de personalidad jurídica por el solo hecho de registrar sus estatutos y actas constitutivas en la forma y condiciones que determine la ley.

    La ley contemplará los mecanismos que aseguren la autonomía de estas organizaciones. Las organizaciones sindicales no podrán intervenir en actividades político partidistas; 56

    20°. La igual repartición de los tributos en proporción a las rentas o en la progresión o forma que fije la ley, y la igual repartición de las demás cargas públicas.

    En ningún caso la ley podrá establecer tributos manifiestamente desproporcionados o injustos.

    Los tributos que se recauden, cualquiera que sea su naturaleza, ingresarán al patrimonio de la Nación y no podrán estar afectos a un destino determinado.

    Sin embargo, la ley podrá autorizar que determinados tributos puedan estar afectados a fines propios de la defensa nacional. Asimismo, podrá autorizar que los que gravan actividades o bienes que tengan una clara identificación regional o local puedan ser aplicados, dentro de los marcos que la misma ley señale, por las autoridades regionales o comunales para el financiamiento de obras de desarrollo; 57

    21°. El derecho a desarrollar cualquiera actividad económica que no sea contraria a la moral, al orden público o a la seguridad nacional, respetando las normas legales que la regulen.

    El Estado y sus organismos podrán desarrollar actividades empresariales o participar en ellas sólo si una ley de quórum calificado los autoriza. En tal caso, esas actividades estarán sometidas a la legislación común aplicable a los particulares, sin perjuicio de las excepciones que por motivos justificados establezca la ley, la que deberá ser, asimismo, de quórum calificado; 58

    22°. La no discriminación arbitraria en el trato que deben dar el Estado y sus organismos en materia económica.

    Sólo en virtud de una ley, y siempre que no signifique tal discriminación, se podrán autorizar determinados beneficios directos o indirectos en favor de algún sector, actividad o zona geográfica, o establecer gravámenes especiales que afecten a uno u otras. En el caso de las franquicias o beneficios indirectos, la estimación del costo de éstos deberá incluirse anualmente en la Ley de Presupuestos;

    23°. La libertad para adquirir el dominio de toda clase de bienes, excepto aquellos que la naturaleza ha hecho comunes a todos los hombres o que deban pertenecer a la Nación toda y la ley lo declare así Lo anterior es sin perjuicio de lo prescrito en otros preceptos de esta Constitución.

    Una ley de quórum calificado y cuando así lo exija el interés nacional puede establecer limitaciones o requisitos para la adquisición del dominio de algunos bienes;

    24°. El derecho de propiedad en sus diversas especies sobre toda clase de bienes corporales o incorporales. 59

    Sólo la ley puede establecer el modo de adquirir la propiedad, de usar, gozar y disponer de ella y las limitaciones y obligaciones que deriven de su función social. Esta comprende cuanto exijan los intereses generales de la Nación, la seguridad nacional, la utilidad y la salubridad públicas y la conservación del patrimonio ambiental.

    Nadie puede, en caso alguno, ser privado de su propiedad, del bien sobre que recae o de algunos de los atributos o facultades esenciales del dominio, sino en virtud de ley general o especial que autorice la expropiación por causa de utilidad pública o de interés nacional, calificada por el legislador. El expropiado podrá reclamar de la legalidad del acto expropiatorio ante los tribunales ordinarios y tendrá siempre derecho a indemnización por el daño patrimonial efectivamente causado, la que se fijará de común acuerdo o en sentencia dictada conforme a derecho por dichos tribunales. 60

    A falta de acuerdo, la indemnización deberá ser pagada en dinero efectivo al contado.

    La toma de posesión material del bien expropiado tendrá lugar previo pago del total de la indemnización, la que, a falta de acuerdo, será determinada provisionalmente por peritos en la forma que señale la ley. En caso de reclamo acerca de la procedencia de la expropiación, el juez podrá, con el mérito de los antecedentes que se invoquen, decretar la suspensión de la toma de posesión.

    El Estado tiene el dominio absoluto, exclusivo, inalienable e imprescriptible de todas las minas, comprendiéndose en éstas las covaderas, las arenas metalíferas, los salares, los depósitos de carbón e hidrocarburos y las demás sustancias fósiles, con excepción de las arcillas superficiales, no obstante la propiedad de las personas naturales o jurídicas sobre los terrenos en cuyas entrañas estuvieren situadas. Los predios superficiales estarán sujetos a las obligaciones y limitaciones que la ley señale para facilitar la exploración, la explotación y el beneficio de dichas minas.

    Corresponde a la ley determinar qué sustancias de aquellas a que se refiere el inciso precedente, exceptuados los hidrocarburos líquidos o gaseosos, pueden ser objeto de concesiones de exploración o de explotación. Dichas concesiones se constituirán siempre por resolución judicial y tendrán la duración, conferirán los derechos e impondrán las obligaciones que la ley exprese, la que tendrá el carácter de orgánica constitucional.

    La concesión minera obliga al dueño a desarrollar la actividad necesaria para satisfacer el interés público que justifica su otorgamiento. Su régimen de amparo será establecido por dicha ley, tenderá directa o indirectamente a obtener el cumplimiento de esa obligación y contemplará causales de caducidad para el caso de incumplimiento o de simple extinción del dominio sobre la concesión. En todo caso, dichas causales y sus efectos deben estar establecidos al momento de otorgarse la concesión. 61

    Será de competencia exclusiva de los tribunales ordinarios de justicia declarar la extinción de tales concesiones. Las controversias que se produzcan respecto de la caducidad o extinción del dominio sobre la concesión serán resueltas por ellos; y en caso de caducidad, el afectado podrá requerir de la justicia la declaración de subsistencia de su derecho.

    El dominio del titular sobre su concesión minera está protegido por la garantía constitucional de que trata este número.

    La exploración, la explotación o el beneficio de los yacimientos que contengan sustancias no susceptibles de concesión, podrán ejecutarse directamente por el Estado o por sus empresas, o por medio de concesiones administrativas o de contratos especiales de operación, con los requisitos y bajo las condiciones que el Presidente de la República fije, para cada caso, por decreto supremo. Esta norma se aplicará también a los yacimientos de cualquier especie existentes en las aguas marítimas sometidas a la jurisdicción nacional 62 y a los situados, en todo o en parte, en zonas que, conforme a la ley, se determinen como de importancia para la seguridad nacional. El Presidente de la República podrá poner término, en cualquier tiempo, sin expresión de causa y con la indemnización que corresponda, a las concesiones administrativas o a los contratos de operación relativos a explotaciones ubicadas en zonas declaradas de importancia para la seguridad nacional.

    Los derechos de los particulares sobre las aguas, reconocidos o constituidos en conformidad a la ley, otorgarán a sus titulares la propiedad sobre ellos;

    25°.- La libertad de crear y difundir las artes, así como el derecho del autor sobre sus creaciones intelectuales y artísticas de cualquier especie, por el tiempo que señale la ley y que no será inferior al de la vida del titular. 63

    El derecho de autor comprende la propiedad de las obras y otros derechos, como la paternidad, la edición y la integridad de la obra, todo ello en conformidad a la ley.

    Se garantiza, también, la propiedad industrial sobre las patentes de invención, marcas comerciales, modelos, procesos tecnológicos u otras creaciones análogas, por el tiempo que establezca la ley.

    Será aplicable a la propiedad de las creaciones intelectuales y artísticas y a la propiedad industrial lo prescrito en los incisos segundo, tercero, cuarto y quinto del número anterior, y

    26°. La seguridad de que los preceptos legales que por mandato de la Constitución regulen o complementen las garantías que ésta establece o que las limiten en los casos en que ella lo autoriza, no podrán afectar los derechos en su esencia, ni imponer condiciones, tributos o requisitos que impidan su libre ejercicio. 64

    Artículo 20. El que por causa de actos u omisiones arbitrarios o ilegales, sufra privación, perturbación o amenaza en el legítimo ejercicio de los derechos y garantías establecidos en el artículo 19, números 1.º, 2.º, 3.º inciso cuarto, 4.º, 5.º, 6.º, 9.º inciso final, 11.º, 12.º, 13.º, 15.º, 16.º en lo relativo a la libertad de trabajo y al derecho a su libre elección y libre contratación, y a lo establecido en el inciso cuarto, 19.º, 21.º, 22.º, 23.º, 24.º y 25.º podrá ocurrir por sí o por cualquiera a su nombre, a la Corte de Apelaciones respectiva, la que adoptará de inmediato las providencias que juzgue necesarias para restablecer el imperio del derecho y asegurar la debida protección del afectado, sin perjuicio de los demás derechos que pueda hacer valer ante la autoridad o los tribunales correspondientes.

    Procederá también, el recurso de protección en el caso del Nº 8. del artículo 19, cuando el derecho a vivir en un medio ambiente libre de contaminación sea afectado por un acto u omisión ilegal imputable a una autoridad o persona determinada. 65 – 66

    Artículo 21. Todo individuo que se hallare arrestado, detenido o preso con infracción de lo dispuesto en la Constitución o en las leyes, podrá ocurrir por sí, o por cualquiera a su nombre, a la magistratura que señale la ley, a fin de que ésta ordene se guarden las formalidades legales y adopte de inmediato las providencias que juzgue necesarias para restablecer el imperio del derecho y asegurar la debida protección del afectado.

    Esa magistratura podrá ordenar que el individuo sea traído a su presencia y su decreto será precisamente obedecido por todos los encargados de las cárceles o lugares de detención. Instruida de los antecedentes, decretará su libertad inmediata o hará que se reparen los defectos legales o pondrá al individuo a disposición del juez competente, procediendo en todo breve y sumariamente, y corrigiendo por sí esos defectos o dando cuenta a quien corresponda para que los corrija.

    El mismo recurso, y en igual forma, podrá ser deducido en favor de toda persona que ilegalmente sufra cualquiera otra privación, perturbación o amenaza en su derecho a la libertad personal y seguridad individual. La respectiva magistratura dictará en tal caso las medidas indicadas en los incisos anteriores que estime conducentes para restablecer el imperio del derecho y asegurar la debida protección del afectado. 67

    Artículo 22. Todo habitante de la República debe respeto a Chile y a sus emblemas nacionales.

    Los chilenos tienen el deber fundamental de honrar a la patria, de defender su soberanía y de contribuir a preservar la seguridad nacional y los valores esenciales de la tradición chilena.

    El servicio militar y demás cargas personales que imponga la ley son obligatorios en los términos y formas que ésta determine.

    Los chilenos en estado de cargar armas deberán hallarse inscritos en los Registros Militares, si no están legalmente exceptuados.

    Artículo 23. Los grupos intermedios de la comunidad y sus dirigentes que hagan mal uso de la autonomía que la Constitución les reconoce, interviniendo indebidamente en actividades ajenas a sus fines específicos, serán sancionados en conformidad a la ley.

    Son incompatibles los cargos directivos superiores de las organizaciones gremiales con los cargos directivos superiores, nacionales y regionales, de los partidos políticos.68

    La ley establecerá las sanciones que corresponda aplicar a los dirigentes gremiales que intervengan en actividades político partidistas y a los dirigentes de los partidos políticos que interfieran en el funcionamiento de las organizaciones gremiales y demás grupos intermedios que la propia ley señale.69

    CAPITULO IV. GOBIERNO

    Presidente de la República70

    Artículo 24. El Gobierno y la administración del Estado corresponden al Presidente de la República, quien es el Jefe del Estado.

    Su autoridad se extiende a todo cuanto tiene por objeto la conservación del orden público en el interior y la seguridad externa de la República, de acuerdo con la Constitución y las leyes.

    El 21 de mayo de cada año, el Presidente de la República dará cuenta al país del estado administrativo y político de la Nación ante el Congreso Pleno.71

    Artículo 25. Para ser elegido Presidente de la República se requiere tener la nacionalidad chilena de acuerdo a lo dispuesto en los números 1º ó 2º del artículo 10; tener cumplidos treinta y cinco años de edad y poseer las demás calidades necesarias para ser ciudadano con derecho a sufragio.72

    El Presidente de la República durará en el ejercicio de sus funciones por el término de cuatro años y no podrá ser reelegido para el período siguiente.73

    El Presidente de la República no podrá salir del territorio nacional por más de treinta días ni en los últimos noventa días de su período, sin acuerdo del Senado.

    En todo caso, el Presidente de la República comunicará con la debida anticipación al Senado su decisión de ausentarse del territorio y los motivos que la justifican.

    Artículo 26. El Presidente será elegido en votación directa y por mayoría absoluta de los sufragios válidamente emitidos. La elección se efectuará conjuntamente con la de parlamentarios, en la forma que determine la ley orgánica constitucional respectiva, noventa días antes de aquél en que deba cesar en el cargo el que esté en funciones, si ese día correspondiere a un domingo. Si así no fuere, ella se realizará el domingo inmediatamente siguiente.74 75

    Si a al elección del Presidente de la República se presentaren más de dos candidatos y ninguno de ellos obtuviera mas de la mitad de los sufragios válidamente emitidos, se procederá a una segunda votación que se circunscribirá a los candidatos que hayan obtenido las dos más altas mayorías relativas y en ella resultará electo aquel de los candidatos que obtengan mayor número de sufragios. Esta nueva votación se verificará, en la forma que determine la ley, el trigésimo día después de efectuada la primera, si ese día correspondiente a un domingo. Si así no fuere, ella se realizará el domingo inmediatamente siguiente al referido trigésimo día.76

    Para los efectos de lo dispuesto en los dos incisos precedentes, los votos en blanco y los nulos se considerarán como no emitidos.

    En caso de muerte de uno o de ambos candidatos a que se refiere el inciso segundo, el Presidente de la República convocará a una nueva elección dentro del plazo de treinta días, contado desde la fecha del deceso. La elección se celebrará el domingo más cercano al nonagésimo día posterior a la convocatoria. 77

    Si expirase el mandato del Presidente de la República en ejercicio antes de la fecha de asunción del Presidente que se elija en conformidad al inciso anterior, se aplicará, en lo pertinente, la norma contenida en el inciso primero del artículo 28.78  Artículo 27. El proceso de calificación de la elección presidencial deberá quedar concluido dentro de los quince días siguientes a la primera o segunda votación, según corresponda.79

    El Tribunal Calificador de Elecciones comunicará de inmediato al Presidente del Senado la proclamación de Presidente electo que haya efectuado.

    El Congreso Pleno, reunido en sesión pública el día en que deba cesar en su cargo el Presidente en funciones y con los miembros que asistan, tomará conocimiento de la resolución en virtud de la cual el Tribunal Calificador de Elecciones proclama al Presidente electo.80 81

    En este mismo acto, el Presidente electo prestará ante el Presidente del Senado, juramento o promesa de desempeñar fielmente el cargo de Presidente de la República, conservar la independencia de la Nación, guardar y hacer guardar la Constitución y las leyes, y de inmediato asumirá sus funciones.

    Artículo 28. Si el Presidente electo se hallare impedido para tomar posesión del cargo, asumirá, mientras tanto, con el título de Vicepresidente de la República, el Presidente del Senado; a falta de éste, el Presidente de la Cámara de Diputados, y a falta de éste, el Presidente de la Corte Suprema 82

    Con todo, si el impedimento del Presidente electo fuere absoluto o debiere durar indefinidamente, el Vicepresidente, en los diez días siguientes al acuerdo del Senado adoptado en conformidad al artículo 53, Nº 7º, expedirá las órdenes convenientes para que se proceda, dentro del plazo de sesenta días, a nueva elección en la forma prevista por la Constitución y la Ley de Elecciones. La elección deberá efectuarse en un día domingo. 83

    El Presidente de la República así elegido asumirá sus funciones en la oportunidad que señale esa ley, y durará en el ejercicio de ellas hasta el día en que le habría correspondido cesar en el cargo al electo que no pudo asumir y cuyo impedimento hubiere motivado la nueva elección.84

    Artículo 29. Si por impedimento temporal, sea por enfermedad, ausencia del territorio u otro grave motivo, el Presidente de la República no pudiere ejercer su cargo, le subrogará, con el título de Vicepresidente de la República, el Ministro titular a quien corresponda de acuerdo con el orden de precedencia legal. A falta de éste, la subrogación corresponderá al Ministro titular que siga en ese orden de precedencia y, a falta de todos ellos, le subrogarán sucesivamente el Presidente del Senado, el Presidente de la Cámara de Diputados y el Presidente de la Corte Suprema.

    En caso de vacancia del cargo de Presidente de la República, se producirá la subrogación como en las situaciones del inciso anterior, y se procederá a elegir sucesor en conformidad a las reglas de los incisos siguientes.

    Si la vacancia se produjere faltando menos de dos años para la próxima elección presidencial, el Presidente será elegido por el Congreso Pleno por la mayoría absoluta de los senadores y diputados en ejercicio. La elección por el Congreso será hecha dentro de los diez días siguientes a la fecha de la vacancia y el elegido asumirá su cargo dentro de los treinta días siguientes.

    Si la vacancia se produjere faltando dos años o más para la próxima elección presidencial, el Vicepresidente, dentro de los diez primeros días de su mandato, convocará a los ciudadanos a elección presidencial para el sexagésimo día después de la convocatoria, si ese día correspondiere a un domingo. Si así no fuere, ella se realizará el domingo inmediatamente siguiente. 85

    El Presidente que resulte elegido asumirá su cargo el décimo día después de su proclamación.

    El Presidente elegido conforme a alguno de los incisos precedentes durará en el cargo hasta completar el período que restaba a quien se reemplace y no podrá postular como candidato a la elección presidencial siguiente.86

    Artículo 30.- El Presidente cesará en su cargo el mismo día en que se complete su período y le sucederá el recientemente elegido.

    El que haya desempeñado este cargo por el período completo, asumirá, inmediatamente, y de pleno derecho, la dignidad oficial de ex Presidente de la República.87

    En virtud de esta calidad, le serán aplicables las disposiciones de los incisos segundo, tercero y cuarto del artículo 61 y el artículo 62.88

    No la alcanzará el ciudadano que llegue a ocupar el cargo de Presidente de la República por vacancia del mismo ni quien haya sido declarado culpable en juicio político seguido en su contra.  89

    El ex Presidente de la República que asuma alguna función remunerada con fondos públicos, dejará, en tanto la desempeñe, de percibir la dieta, manteniendo, en todo caso, el fuero. Se exceptúan los empleos docentes y las funciones o comisiones de igual carácter de la enseñanza superior, media y especial.90 91

    Artículo 31. El Presidente designado por el Congreso Pleno o, en su caso, el Vicepresidente de la República tendrá todas las atribuciones que esta Constitución confiere al Presidente de la República. 92

    Artículo 32. Son atribuciones especiales del Presidente de la República:

    1º Concurrir a la formación de las leyes con arreglo a la Constitución, sancionarlas y promulgarlas;

    2º Pedir, indicando los motivos, que se cite a sesión a cualquiera de las ramas del Congreso Nacional. En tal caso, la sesión deberá celebrarse a la brevedad posible;93

    3º Dictar, previa delegación de facultades del Congreso, decretos con fuerza de ley sobre las materias que señala la Constitución;

    4º Convocar a plebiscito en los casos del artículo 128; 94

    5º Declarar los estados de excepción constitucional en los casos y formas que se señalan en esta Constitución;95

    6º Ejercer la potestad reglamentaria en todas aquellas materias que no sean propias del dominio legal, sin perjuicio de la facultad de dictar los demás reglamentos, decretos e instrucciones que crea convenientes para la ejecución de las leyes;

    7º Nombrar y remover a su voluntad a los ministros de Estado, subsecretarios, intendentes y gobernadores; 96

    8º. Designar a los embajadores y ministros diplomáticos, y a los representantes ante organismos internacionales. Tanto estos funcionarios como los señalados en el N°. 7º precedente, serán de la confianza exclusiva del Presidente de la República y se mantendrán en sus puestos mientras cuenten con ella;

    9º Nombrar al Contralor General de la República con acuerdo del Senado;

    10º Nombrar y remover a los funcionarios que la ley denomina como de su exclusiva confianza y proveer los demás empleos civiles en conformidad a la ley. La remoción de los demás funcionarios se hará de acuerdo a las disposiciones que ésta determine;

    11º Conceder jubilaciones, retiros, montepíos y pensiones de gracia, con arreglo a las leyes;

    12º. Nombrar a los magistrados y fiscales judiciales de las Cortes de Apelaciones y a los jueces letrados, a proposición de la Corte Suprema y de las Cortes de Apelaciones, respectivamente; al miembro del Tribunal Constitucional que le corresponde designar; y a los magistrados y fiscales judiciales de la Corte Suprema y al Fiscal Nacional, a proposición de dicha Corte y con acuerdo del Senado, todo ello conforme a lo prescrito en esta Constitución;97

    13º. Velar por la conducta ministerial de los jueces y demás empleados del Poder Judicial y requerir, con tal objeto, a la Corte Suprema para que, si procede, declare su mal comportamiento, o al ministerio público, para que reclame medidas disciplinarias del tribunal competente, o para que, si hubiere mérito bastante, entable la correspondiente acusación;

    14º Otorgar indultos particulares en los casos y formas que determine la ley. El indulto será improcedente en tanto no se haya dictado sentencia ejecutoriada en el respectivo proceso. Los funcionarios acusados por la Cámara de Diputados y condenados por el Senado, sólo pueden ser indultados por el Congreso;98

    15º. Conducir las relaciones políticas con las potencias extranjeras y organismos internacionales, y llevar a cabo las negociaciones; concluir, firmar y ratificar los tratados que estime convenientes para los intereses del país, los que deberán ser sometidos a la aprobación del Congreso conforme a lo prescrito en el artículo 54 N°. 1º.

    Las discusiones y deliberaciones sobre estos objetos serán secretas si el Presidente de la República así lo exigiere;

    16º. Designar y remover a los Comandantes en Jefe del Ejército, de la Armada, de la Fuerza Aérea y al General Director de Carabineros en conformidad al artículo 104, y disponer los nombramientos, ascensos y retiros de los Oficiales de las Fuerzas Armadas y de Carabineros en la forma que señala el artículo 105;

    17º. Disponer de las fuerzas de aire, mar y tierra, organizarlas y distribuirlas de acuerdo con las necesidades de la seguridad nacional;

    18º. Asumir, en caso de guerra, la jefatura suprema de las Fuerzas Armadas;

    19º. Declarar la guerra, previa autorización por ley, debiendo dejar constancia de haber oído al Consejo de Seguridad Nacional, y

    20º. Cuidar de la recaudación de las rentas públicas y decretar su inversión con arreglo a la ley. El Presidente de la República, con la firma de todos los Ministros de Estado, podrá decretar pagos no autorizados por la ley, para atender necesidades impostergables derivadas de calamidades públicas, de agresión exterior, de conmoción interna, de grave daño o peligro para la seguridad nacional o del agotamiento de los recursos destinados a mantener servicios que no puedan paralizarse sin serio perjuicio para el país. El total de los giros que se hagan con estos objetos no podrá exceder anualmente del dos por ciento (2%) del monto de los gastos que autorice la Ley de Presupuestos. Se podrá contratar empleados con cargo a esta misma Ley, pero sin que el ítem respectivo pueda ser incrementado ni disminuido mediante traspasos. Los Ministros de Estado o funcionarios que autoricen o den curso a gastos que contravengan lo dispuesto en este número serán responsables solidaria y personalmente de su reintegro, y culpables del delito de malversación de caudales públicos.

    Ministros de Estado

    Artículo 33. Los Ministros de Estado son los colaboradores directos e inmediatos del Presidente de la República en el gobierno y administración del Estado.

    La Ley determinará el número y organización de los Ministerios, como también el orden de precedencia de los Ministros titulares.

    El Presidente de la República podrá encomendar a uno o más Ministros la coordinación de la labor que corresponde a los Secretarios de Estado y las relaciones del Gobierno con el Congreso Nacional.

    Artículo 34. Para ser nombrado Ministro se requiere ser chileno, tener cumplidos veintiún años de edad y reunir los requisitos generales para el ingreso a la Administración Pública.

    En los casos de ausencia, impedimento o renuncia de un Ministro, o cuando por otra causa se produzca la vacancia del cargo, será reemplazado en la forma que establezca la ley.

    Artículo 35. Los reglamentos y decretos del Presidente de la República deberán firmarse por el Ministro respectivo y no serán obedecidos sin este esencial requisito.

    Los decretos e instrucciones podrán expedirse con la sola firma del Ministro respectivo, por orden del Presidente de la República, en conformidad a las normas que al efecto establezca la ley.

    Artículo 36. Los Ministros serán responsables individualmente de los actos que firmaren y solidariamente de los que suscribieren o acordaren con los otros Ministros.

    Artículo 37. Los Ministros podrán, cuando lo estimaren conveniente, asistir a las sesiones de la Cámara de Diputados o del Senado, y tomar parte en sus debates, con preferencia para hacer uso de la palabra, pero sin derecho a voto. Durante la votación podrán, sin embargo, rectificar los conceptos emitidos por cualquier diputado o senador al fundamentar su voto.

    Sin perjuicio de lo anterior, los Ministros deberán concurrir personalmente a las sesiones especiales que la Cámara de Diputados o el Senado convoquen para informarse sobre asuntos que, perteneciendo al ámbito de atribuciones de las correspondientes Secretarías de Estado, acuerden tratar.99

    Artículo 37 bis. A los Ministros les serán aplicables las incompatibilidades establecidas en el inciso primero del artículo 58. Por el solo hecho de aceptar el nombramiento, el Ministro cesará en el cargo, empleo, función o comisión incompatible que desempeñe. Durante el ejercicio de su cargo, los Ministros estarán sujetos a la prohibición de celebrar o caucionar contratos con el Estado, actuar como abogados o mandatarios en cualquier clase de juicio o como procurador o agente en gestiones particulares de carácter administrativo, ser director de bancos o de alguna sociedad anónima y ejercer cargos de similar importancia en estas actividades.100

    Bases generales de la Administración del Estado

    Artículo 38. Una ley orgánica constitucional determinará la organización básica de la Administración Pública, garantizará la carrera funcionaria y los principios de carácter técnico y profesional en que deba fundarse, y asegurará tanto la igualdad de oportunidades de ingreso a ella como la capacitación y el perfeccionamiento de sus integrantes.

    Cualquier persona que sea lesionada en sus derechos por la Administración del Estado, de sus organismos o de las municipalidades, podrá reclamar ante los tribunales que determine la ley, sin perjuicio de la responsabilidad que pudiere afectar al funcionario que hubiere causado el daño. 101 102 103

    Estados de excepción constitucional104

    Artículo 39. El ejercicio de los derechos y garantías que la Constitución asegura a todas las personas sólo puede ser afectado bajo las siguientes situaciones de excepción:

    guerra externa o interna, conmoción interior, emergencia y calamidad pública, cuando afecten gravemente el normal desenvolvimiento de las instituciones del Estado. 105

    Artículo 40. El estado de asamblea, en caso de guerra exterior, y el estado de sitio, en caso de guerra interna o grave conmoción interior, lo declarará el Presidente de la República, con acuerdo del Congreso Nacional. La declaración deberá determinar las zonas afectadas por el estado de excepción correspondiente.

    El Congreso Nacional, dentro del plazo de cinco días contado desde la fecha en que el Presidente de la República someta la declaración de estado de asamblea o de sitio a su consideración, deberá pronunciarse aceptando o rechazando la proposición, sin que pueda introducirle modificaciones. Si el Congreso no se pronunciara dentro de dicho plazo, se entenderá que aprueba la proposición del Presidente.

    Sin embargo, el Presidente de la República podrá aplicar el estado de asamblea o de sitio de inmediato mientras el Congreso se pronuncia sobre la declaración, pero en este último estado sólo podrá restringir el ejercicio del derecho de reunión. Las medidas que adopte el Presidente de la República en tanto no se reúna el Congreso Nacional, podrán ser objeto de revisión por los tribunales de justicia, sin que sea aplicable, entre tanto, lo dispuesto en el artículo 45.

    La declaración de estado de sitio sólo podrá hacerse por un plazo de quince días, sin perjuicio de que el Presidente de la República solicite su prórroga. El estado de asamblea mantendrá su vigencia por el tiempo que se extienda la situación de guerra exterior, salvo que el Presidente de la República disponga su suspensión con anterioridad.106

    Artículo 41. El estado de catástrofe, en caso de calamidad pública, lo declarará el Presidente de la República, determinando la zona afectada por la misma.

    El Presidente de la República estará obligado a informar al Congreso Nacional de las medidas adoptadas en virtud del estado de catástrofe. El Congreso Nacional podrá dejar sin efecto la declaración transcurridos ciento ochenta días desde ésta si las razones que la motivaron hubieran cesado en forma absoluta. Con todo, el Presidente de la República sólo podrá declarar el estado de catástrofe por un período superior a un año con acuerdo del Congreso Nacional. El referido acuerdo se tramitará en la forma establecida en el inciso segundo del artículo 40.

    Declarado el estado de catástrofe, las zonas respectivas quedarán bajo la dependencia inmediata del Jefe de la Defensa Nacional que designe el Presidente de la República. Este asumirá la dirección y supervigilancia de su jurisdicción con las atribuciones y deberes que la ley señale.107

    Artículo 42. El estado de emergencia, en caso de grave alteración del orden público o de grave daño para la seguridad de la Nación, lo declarará el Presidente de la República, determinando las zonas afectadas por dichas circunstancias. El estado de emergencia no podrá extenderse por más de quince días, sin perjuicio de que el Presidente de la República pueda prorrogarlo por igual período. Sin embargo, para sucesivas prórrogas, el Presidente requerirá siempre del acuerdo del Congreso Nacional.

    El referido acuerdo se tramitará en la forma establecida en el inciso segundo del artículo Declarado el estado de emergencia, las zonas respectivas quedarán bajo la dependencia inmediata del Jefe de la Defensa Nacional que designe el Presidente de la República. Este asumirá la dirección y supervigilancia de su jurisdicción con las atribuciones y deberes que la ley señale.

    El Presidente de la República estará obligado a informar al Congreso Nacional de las medidas adoptadas en virtud del estado de emergencia.108

    Artículo 43. Por la declaración del estado de asamblea, el Presidente de la República queda facultado para suspender o restringir la libertad personal, el derecho de reunión y la libertad de trabajo. Podrá, también, restringir el ejercicio del derecho de asociación, interceptar, abrir o registrar documentos y toda clase de comunicaciones, disponer requisiciones de bienes y establecer limitaciones al ejercicio del derecho de propiedad.

    Por la declaración de estado de sitio, el Presidente de la República podrá restringir la libertad de locomoción y arrestar a las personas en sus propias moradas o en lugares que la ley determine y que no sean cárceles ni estén destinados a la detención o prisión de reos comunes. Podrá, además, suspender o restringir el ejercicio del derecho de reunión.

    Por la declaración del estado de catástrofe, el Presidente de la República podrá restringir las libertades de locomoción y de reunión. Podrá, asimismo, disponer requisiciones de bienes, establecer limitaciones al ejercicio del derecho de propiedad y adoptar todas las medidas extraordinarias de carácter administrativo que sean necesarias para el pronto restablecimiento de la normalidad en la zona afectada.

    Por la declaración del estado de emergencia, el Presidente de la República podrá restringir las libertades de locomoción y de reunión.109

    Artículo 44. Una ley orgánica constitucional regulará los estados de excepción, así como su declaración y la aplicación de las medidas legales y administrativas que procediera adoptar bajo aquéllos. Dicha ley contemplará lo estrictamente necesario para el pronto restablecimiento de la normalidad constitucional y no podrá afectar las competencias y el funcionamiento de los órganos constitucionales ni los derechos e inmunidades de sus respectivos titulares.

    Las medidas que se adopten durante los estados de excepción no podrán, bajo ninguna circunstancia, prolongarse más allá de la vigencia de los mismos.110

    Artículo 45. Los tribunales de justicia no podrán calificar los fundamentos ni las circunstancias de hecho invocados por la autoridad para decretar los estados de excepción, sin perjuicio de lo dispuesto en el artículo 39. No obstante, respecto de las medidas particulares que afecten derechos constitucionales, siempre existirá la garantía de recurrir ante las autoridades judiciales a través de los recursos que corresponda.

    Las requisiciones que se practiquen darán lugar a indemnizaciones en conformidad a la ley.

    También darán derecho a indemnización las limitaciones que se impongan al derecho de propiedad cuando importen privación de alguno de sus atributos o facultades esenciales y con ello se cause daño.111

    CAPITULO V. CONGRESO NACIONAL 112

    Artículo 46. El Congreso Nacional se compone de dos ramas: la Cámara de Diputados y el Senado. Ambas concurren a la formación de las leyes en conformidad a esta Constitución y tienen las demás atribuciones que ella establece.

    Composición y generación de la Cámara de Diputados y del Senado.

    Artículo 47. La Cámara de Diputados está integrada por 120 miembros elegidos en votación directa por los distritos electorales que establezca la ley orgánica constitucional respectiva.113

    La Cámara de Diputados se renovará en su totalidad cada cuatro años.114

    Artículo 48. Para ser elegido diputado se requiere ser ciudadano con derecho a sufragio, tener cumplidos veintiún años de edad, haber cursado la Enseñanza Media o equivalente y tener residencia en la región a que pertenezca el distrito electoral correspondiente durante un plazo no inferior a dos años, contando hacia atrás desde el día de la elección.115

    Artículo 49. El Senado se compone de miembros elegidos en votación directa por circunscripciones senatoriales, en consideración a las regiones del país, cada una de las cuales constituirá, a lo menos, una circunscripción.116

    La ley orgánica constitucional respectiva determinará el número de Senadores, las circunscripciones senatoriales y la forma de su elección.

    Los senadores durarán ocho años en su cargo y se renovarán alternadamente cada cuatro años, en la forma que determine la ley orgánica constitucional respectiva.117

    Artículo 50. Para ser elegido senador se requiere ser ciudadano con derecho a sufragio, haber cursado la enseñanza media o equivalente y tener cumplidos treinta y cinco años de edad el día de la elección.118

    Artículo 51. Se entenderá que los diputados tienen por el solo ministerio de la ley, su residencia en la región correspondiente, mientras se encuentren en ejercicio de su cargo.

    Las elecciones de diputados y de senadores que corresponda elegir por votación directa se efectuarán conjuntamente. Los parlamentarios podrán ser reelegidos en sus cargos.

    Las vacantes de diputados y las de senadores se proveerán por el ciudadano que señale el partido político al que pertenecía el parlamentario que produjo la vacante al momento de ser elegido.

    Los parlamentarios elegidos como independientes no serán reemplazados.

    Los parlamentarios elegidos como independientes que hubieren postulado integrando lista en conjunto con uno o más partidos políticos, serán reemplazados con el ciudadano que señale el partido indicado por el respectivo parlamentario al momento de presentar su declaración de candidatura.

    El reemplazante deberá reunir los requisitos para ser elegido diputado o senador, según el caso. Con todo, un diputado podrá ser nominado para ocupar el puesto de un senador, debiendo aplicarse, en ese caso, las normas de los incisos anteriores para llenar la vacante que deja el diputado, quien al asumir su nuevo cargo cesará en el que ejercía.

    El nuevo diputado o senador ejercerá sus funciones por el término que faltaba a quien originó la vacante.

    En ningún caso procederán elecciones complementarias.119

    Atribuciones exclusivas de la Cámara de Diputados

    Artículo 52. Son atribuciones exclusivas de la Cámara de Diputados:

    1) Fiscalizar los actos del Gobierno. Para ejercer esta atribución la Cámara puede:

    a) Adoptar acuerdos o sugerir observaciones, con el voto de la mayoría de los diputados presentes, los que se transmitirán por escrito al Presidente de la República, quien deberá dar respuesta fundada por medio del Ministro de Estado que corresponda, dentro de treinta días.

    Sin perjuicio de lo anterior, cualquier diputado, con el voto favorable de un tercio de los miembros presentes de la Cámara, podrá solicitar determinados antecedentes al Gobierno. El Presidente de la República contestará fundadamente por intermedio del Ministro de Estado que corresponda, dentro del mismo plazo señalado en el párrafo anterior.

    En ningún caso los acuerdos, observaciones o solicitudes de antecedentes afectarán la responsabilidad política de los Ministros de Estado;

    b) Citar a un Ministro de Estado, a petición de a lo menos un tercio de los diputados en ejercicio, a fin de formularle preguntas en relación con materias vinculadas al ejercicio de su cargo. Con todo, un mismo Ministro no podrá ser citado para este efecto más de tres veces dentro de un año calendario, sin previo acuerdo de la mayoría absoluta de los diputados en ejercicio.

    La asistencia del Ministro será obligatoria y deberá responder a las preguntas y consultas que motiven su citación, y

    c) Crear comisiones especiales investigadoras a petición de a lo menos dos quintos de los diputados en ejercicio, con el objeto de reunir informaciones relativas a determinados actos del Gobierno.

    Las comisiones investigadoras, a petición de un tercio de sus miembros, podrán despachar citaciones y solicitar antecedentes. Los Ministros de Estado, los demás funcionarios de la Administración y el personal de las empresas del Estado o de aquéllas en que éste tenga participación mayoritaria, que sean citados por estas comisiones, estarán obligados a comparecer y a suministrar los antecedentes y las informaciones que se les soliciten.

    No obstante, los Ministros de Estado no podrán ser citados más de tres veces a una misma comisión investigadora, sin previo acuerdo de la mayoría absoluta de sus miembros.

    La ley orgánica constitucional del Congreso Nacional regulará el funcionamiento y las atribuciones de las comisiones investigadoras y la forma de proteger los derechos de las personas citadas o mencionadas en ellas.120

    2) Declarar si han o no lugar las acusaciones que no menos de diez ni más de veinte de sus miembros formulen en contra de las siguientes personas:

    a) Del Presidente de la República, por actos de su administración que hayan comprometido gravemente el honor o la seguridad de la Nación, o infringido abiertamente la Constitución o las leyes. Esta acusación podrá interponerse mientras el Presidente esté en funciones y en los seis meses siguientes a su expiración en el cargo. Durante este último tiempo no podrá ausentarse de la República sin acuerdo de la Cámara;

    b) De los Ministros de Estado, por haber comprometido gravemente el honor o la seguridad de la Nación, por infringir la Constitución o las leyes o haber dejado éstas sin ejecución, y por los delitos de traición, concusión, malversación de fondos públicos y soborno;

    c) De los magistrados de los tribunales superiores de justicia y del Contralor General de la República, por notable abandono de sus deberes;

    d) De los generales o almirantes de las instituciones pertenecientes a las Fuerzas de la Defensa Nacional, por haber comprometido gravemente el honor o la seguridad de la Nación, y

    e) De los intendentes, gobernadores y de la autoridad que ejerza el Gobierno en los territorios especiales a que se refiere el artículo 126 bis, por infracción de la Constitución y por los delitos de traición, sedición, malversación de fondos públicos y concusión.121

    La acusación se tramitará en conformidad a la ley orgánica constitucional relativa al Congreso.

    Las acusaciones referidas en las letras b), c), d) y e) podrán interponerse mientras el afectado esté en funciones o en los tres meses siguientes a la expiración en su cargo. Interpuesta la acusación, el afectado no podrá ausentarse del país sin permiso de la Cámara y no podrá hacerlo en caso alguno si la acusación ya estuviere aprobada por ella.

    Para declarar que ha lugar la acusación en contra del Presidente de la República se necesitará el voto de la mayoría de los diputados en ejercicio.

    En los demás casos se requerirá el de la mayoría de los diputados presentes y el acusado quedará suspendido en sus funciones desde el momento en que la Cámara declare que ha lugar la acusación. La suspensión cesará si el Senado desestimare la acusación o si no se pronunciare dentro de los treinta días siguientes.

    Atribuciones exclusivas del Senado

    Artículo 53. Son atribuciones exclusivas del Senado:

    1) Conocer de las acusaciones que la Cámara de Diputados entable con arreglo al artículo anterior.

    El Senado resolverá como jurado y se limitará a declarar si el acusado es o no culpable del delito, infracción o abuso de poder que se le imputa.

    La declaración de culpabilidad deberá ser pronunciada por los dos tercios de los senadores en ejercicio cuando se trate de una acusación en contra del Presidente de la República, y por la mayoría de los senadores en ejercicio en los demás casos.

    Por la declaración de culpabilidad queda el acusado destituido de su cargo, y no podrá desempeñar ninguna función pública, sea o no de elección popular, por el término de cinco años.

    El funcionario declarado culpable será juzgado de acuerdo a las leyes por el tribunal competente, tanto para la aplicación de la pena señalada al delito, si lo hubiere, cuanto para hacer efectiva la responsabilidad civil por los daños y perjuicios causados al Estado o a particulares;

    2) Decidir si ha o no lugar la admisión de las acciones judiciales que cualquier persona pretenda iniciar en contra de algún Ministro de Estado, con motivo de los perjuicios que pueda haber sufrido injustamente por acto de éste en el desempeño de su cargo;

    3) Conocer de las contiendas de competencia que se susciten entre las autoridades políticas o administrativas y los tribunales superiores de justicia;

    4) Otorgar la rehabilitación de la ciudadanía en el caso del artículo 17, número 3° de esta Constitución; 122

    5) Prestar o negar su consentimiento a los actos del Presidente de la República, en los casos en que la Constitución o la ley lo requieran.

    Si el Senado no se pronunciare dentro de treinta días después de pedida la urgencia por el Presidente de la República, se tendrá por otorgado su asentimiento;

    6) Otorgar su acuerdo para que el Presidente de la República pueda ausentarse del país por más de treinta días o en los últimos noventa días de su período;

    7) Declarar la inhabilidad del Presidente de la República o del Presidente electo cuando un impedimento físico o mental lo inhabilite para el ejercicio de sus funciones; y declarar asimismo, cuando el Presidente de la República haga dimisión de su cargo, si los motivos que la originan son o no fundados y, en consecuencia, admitirla o desecharla. En ambos casos deberá oír previamente al Tribunal Constitucional;

    8) Aprobar, por la mayoría de sus miembros en ejercicio, la declaración del Tribunal Constitucional a que se refiere la segunda parte del Nº 10° del artículo 93;123

    9) Aprobar, en sesión especialmente convocada al efecto y con el voto conforme de los dos tercios de los senadores en ejercicio, la designación de los ministros y fiscales judiciales de la Corte Suprema y del Fiscal Nacional, y 124

    10) Dar su dictamen al Presidente de la República en los casos en que éste lo solicite.

    El Senado, sus comisiones y sus demás órganos, incluidos los comités parlamentarios si los hubiere, no podrán fiscalizar los actos del gobierno ni de las entidades que de él dependan, ni adoptar acuerdos que impliquen fiscalización.125

    Atribuciones exclusivas del Congreso

    Artículo 54. Son atribuciones del Congreso:

    1) Aprobar o desechar los tratados internacionales que le presentare el Presidente de la República antes de su ratificación. La aprobación de un tratado requerirá, en cada Cámara, de los quórum que corresponda, en conformidad al artículo 66, y se someterá, en lo pertinente, a los trámites de una ley.

    El Presidente de la República informará al Congreso sobre el contenido y el alcance del tratado, así como de las reservas que pretenda confirmar o formularle.

    El Congreso podrá sugerir la formulación de reservas y declaraciones interpretativas a un tratado internacional, en el curso del trámite de su aprobación, siempre que ellas procedan de conformidad a lo previsto en el propio tratado o en las normas generales de derecho internacional.

    Las medidas que el Presidente de la República adopte o los acuerdos que celebre para el cumplimiento de un tratado en vigor no requerirán de nueva aprobación del Congreso, a menos que se trate de materias propias de ley. No requerirán de aprobación del Congreso los tratados celebrados por el Presidente de la República en el ejercicio de su potestad reglamentaria.

    Las disposiciones de un tratado sólo podrán ser derogadas, modificadas o suspendidas en la forma prevista en los propios tratados o de acuerdo a las normas generales de Derecho Internacional.

    Corresponde al Presidente de la República la facultad exclusiva para denunciar un tratado o retirarse de él, para lo cual pedirá la opinión de ambas Cámaras del Congreso, en el caso de tratados que hayan sido aprobados por éste. Una vez que la denuncia o el retiro produzca sus efectos en conformidad a lo establecido en el tratado internacional, éste dejará de tener efecto en el orden jurídico chileno.

    En el caso de la denuncia o el retiro de un tratado que fue aprobado por el Congreso, el Presidente de la República deberá informar de ello a éste dentro de los quince días de efectuada la denuncia o el retiro.

    El retiro de una reserva que haya formulado el Presidente de la República y que tuvo en consideración el Congreso Nacional al momento de aprobar un tratado, requerirá previo acuerdo de éste, de conformidad a lo establecido en la ley orgánica constitucional respectiva. El Congreso Nacional deberá pronunciarse dentro del plazo de treinta días contados desde la recepción del oficio en que se solicita el acuerdo pertinente. Si no se pronunciare dentro de este término, se tendrá por aprobado el retiro de la reserva.

    De conformidad a lo establecido en la ley, deberá darse debida publicidad a hechos que digan relación con el tratado internacional, tales como su entrada en vigor, la formulación y retiro de reservas, las declaraciones interpretativas, las objeciones a una reserva y su retiro, la denuncia del tratado, el retiro, la suspensión, la terminación y la nulidad del mismo.

    En el mismo acuerdo aprobatorio de un tratado podrá el Congreso autorizar al Presidente de la República a fin de que, durante la vigencia de aquél, dicte las disposiciones con fuerza de ley que estime necesarias para su cabal cumplimiento, siendo en tal caso aplicable lo dispuesto en los incisos segundo y siguientes del artículo 64, y

    2) Pronunciarse, cuando corresponda, respecto de los estados de excepción constitucional, en la forma prescrita por el inciso segundo del artículo 40. 126

    Funcionamiento del Congreso 127

    Artículo 55. El Congreso Nacional se instalará e iniciará su período de sesiones en la forma que determine su ley orgánica constitucional.

    En todo caso, se entenderá siempre convocado de pleno derecho para conocer de la declaración de estados de excepción constitucional.

    La ley orgánica constitucional señalada en el inciso primero, regulará la tramitación de las acusaciones constitucionales, la calificación de las urgencias conforme lo señalado en el artículo 74 y todo lo relacionado con la tramitación interna de la ley 128

    Artículo 56. La Cámara de Diputados y el Senado no podrán entrar en sesión ni adoptar acuerdos sin la concurrencia de la tercera parte de sus miembros en ejercicio.

    Cada una de las Cámaras establecerá en su propio reglamento la clausura del debate por simple mayoría. 129

    Normas comunes para los Diputados y senadores

    Artículo 57. No pueden ser candidatos a diputados ni a senadores:

    1) Los Ministros de Estado;

    2) Los intendentes, los gobernadores, los alcaldes, los consejeros regionales, los concejales y los subsecretarios;130

    3) Los miembros del Consejo del Banco Central;

    4) Los magistrados de los tribunales superiores de justicia y los jueces de letras;131

    5) Los miembros del Tribunal Constitucional, del Tribunal Calificador de Elecciones y de los tribunales electorales regionales;

    6) El Contralor General de la República;

    7) Las personas que desempeñen un cargo directivo de naturaleza gremial o vecinal;132

    8) Las personas naturales y los gerentes o administradores de personas jurídicas que celebren o caucionen contratos con el Estado; 133

    9) El Fiscal Nacional, los fiscales regionales y los fiscales adjuntos del Ministerio Público, y134

    10) Los Comandantes en Jefe del Ejército, de la Armada y de la Fuerza Aérea, el General Director de Carabineros, el Director General de la Policía de Investigaciones y los oficiales pertenecientes a las Fuerzas Armadas y a las Fuerzas de Orden y Seguridad Pública.135

    Las inhabilidades establecidas en este artículo serán aplicables a quienes hubieren tenido las calidades o cargos antes mencionados dentro del año inmediatamente anterior a la elección; excepto respecto de las personas mencionadas en los números 7) y 8), las que no deberán reunir esas condiciones al momento de inscribir su candidatura y de las indicadas en el número 9), respecto de las cuales el plazo de la inhabilidad será de los dos años inmediatamente anteriores a la elección.136 Si no fueren elegidos en una elección no podrán volver al mismo cargo ni ser designados para cargos análogos a los que desempeñaron hasta un año después del acto electoral.137

    Artículo 58. Los cargos de diputados y senadores son incompatibles entre sí y con todo empleo o comisión retribuidos con fondos del Fisco, de las municipalidades, de las entidades fiscales autónomas, semifiscales o de las empresas del Estado o en las que el Fisco tenga intervención por aportes de capital, y con toda otra función o comisión de la misma naturaleza. Se exceptúan los empleos docentes y las funciones o comisiones de igual carácter de la enseñanza superior, media y especial.

    Asimismo, los cargos de diputados y senadores son incompatibles con las funciones de directores o consejeros, aun cuando sean ad honorem, en las entidades fiscales autónomas, semifiscales o en las empresas estatales, o en las que el Estado tenga participación por aporte de capital.

    Por el solo hecho de su proclamación por el Tribunal Calificador de Elecciones, el diputado o senador cesará en el otro cargo, empleo o comisión incompatible que desempeñe.138

    Artículo 59. Ningún diputado o senador, desde el momento de su proclamación por el Tribunal Calificador de Elecciones puede ser nombrado para un empleo, función o comisión de los referidos en el artículo anterior. 139

    Esta disposición no rige en caso de guerra exterior; ni se aplica a los cargos de Presidente de la República, Ministro de Estado y agente diplomático; pero sólo los cargos conferidos en estado de guerra son compatibles con las funciones de diputado o senador.

    Artículo 60. Cesará en el cargo el diputado o senador que se ausentare del país por más de treinta días sin permiso de la Cámara a que pertenezca o, en receso de ella, de su Presidente.

    Cesará en el cargo el diputado o senador que durante su ejercicio celebrare o caucionare contratos con el Estado, el que actuare como procurador o agente en gestiones particulares de carácter administrativo, en la provisión de empleos públicos, consejerías, funciones o comisiones de similar naturaleza. En la misma sanción incurrirá el que acepte ser director de banco o de alguna sociedad anónima, o ejercer cargos de similar importancia en estas actividades. 140

    La inhabilidad a que se refiere el inciso anterior tendrá lugar sea que el diputado o senador actúe por sí o por interpósita persona, natural, o jurídica, o por medio de una sociedad de personas de la que forme parte.

    Cesará en su cargo el diputado o senador que actúe como abogado o mandatario en cualquier clase de juicio, que ejercite influencia ante las autoridades administrativas o judiciales en favor o representación del empleador o de los trabajadores en negociaciones o conflictos laborales, sean del sector público o privado, o que intervengan en ellos ante cualquiera de las partes. Igual sanción se aplicará al parlamentario que actúe o intervenga en actividades estudiantiles, cualquiera que sea la rama de la enseñanza, con el objeto de atentar contra su normal desenvolvimiento. 141

    Sin perjuicio de lo dispuesto en el inciso séptimo del número 15° del artículo 19, cesará asimismo, en sus funciones el diputado o senador que de palabra o por escrito incite a la alteración del orden público o propicie el cambio del orden jurídico institucional por medios distintos de los que establece esta Constitución, o que comprometa gravemente la seguridad o el honor de la Nación.142

    Quien perdiere el cargo de diputado o senador por cualquiera de las causales señaladas precedentemente no podrá optar a ninguna función o empleo público, sea o no de elección popular, por el término de dos años, salvo los casos del inciso séptimo del número 15º del artículo 19, en los cuales se aplicarán las sanciones allí contempladas.143

    Cesará, asimismo, en sus funciones el diputado o senador que, durante su ejercicio, pierda algún requisito general de elegibilidad o incurra en alguna de las causales de inhabilidad a que se refiere el artículo 57, sin perjuicio de la excepción contemplada en el inciso segundo del artículo 59 respecto de los Ministros de Estado.144

    Los diputados y senadores podrán renunciar a sus cargos cuando les afecte una enfermedad grave que les impida desempeñarlos y así lo califique el Tribunal Constitucional.145

    Artículo 61. Los diputados y senadores sólo son inviolables por las opiniones que manifiesten y los votos que emitan en el desempeño de sus cargos, en sesiones de sala o de comisión.

    Ningún diputado o senador, desde el día de su elección o desde su juramento, según el caso, puede ser acusado o privado de su libertad, salvo el caso de delito flagrante, si el Tribunal de Alzada de la jurisdicción respectiva, en pleno, no autoriza previamente la acusación declarando haber lugar a formación de causa. De esta resolución podrá apelarse para ante la Corte Suprema. 146

    En caso de ser arrestado algún diputado o senador por delito flagrante, será puesto inmediatamente a disposición del Tribunal de Alzada respectivo, con la información sumaria correspondiente. El Tribunal procederá, entonces, conforme a lo dispuesto en el inciso anterior.

    Desde el momento en que se declare, por resolución firme, haber lugar a formación de causa, queda el diputado o senador imputado suspendido de su cargo y sujeto al juez competente.147

    Artículo 62. Los diputados y senadores percibirán como única renta una dieta equivalente a la remuneración de un Ministro de Estado incluidas todas las asignaciones que a éstos correspondan.

    Materias de Ley

    Artículo 63. Sólo son materias de ley:

    1) Las que en virtud de la Constitución deben ser objeto de leyes orgánicas constitucionales;

    2) Las que la Constitución exija que sean reguladas por una ley;

    3) Las que son objeto de codificación, sea civil, comercial, procesal, penal u otra;

    4) Las materias básicas relativas al régimen jurídico laboral, sindical, previsional y de seguridad social;

    5) Las que regulen honores públicos a los grandes servidores;

    6) Las que modifiquen la forma o características de los emblemas nacionales;

    7) Las que autoricen al Estado, a sus organismos y a las municipalidades, para contratar empréstitos, los que deberán estar destinados a financiar proyectos específicos.

    La ley deberá indicar las fuentes de recursos con cargo a los cuales deba hacerse el servicio de la deuda. Sin embargo, se requerirá de una ley de quórum calificado para autorizar la contratación de aquellos empréstitos cuyo vencimiento exceda del término de duración del respectivo período presidencial.

    Lo dispuesto en este número no se aplicará al Banco Central;

    8) Las que autoricen la celebración de cualquier clase de operaciones que puedan comprometer en forma directa o indirecta el crédito o la responsabilidad financiera del Estado, sus organismos y de las municipalidades.

    Esta disposición no se aplicará al Banco Central;

    9) Las que fijen las normas con arreglo a las cuales las empresas del Estado y aquellas en que éste tenga participación puedan contratar empréstitos, los que en ningún caso podrán efectuarse con el Estado, sus organismos o empresas;

    10) Las que fijen las normas sobre enajenación de bienes del Estado o de las municipalidades y sobre su arrendamiento o concesión;

    11) Las que establezcan o modifiquen la división política y administrativa del país;

    12) Las que señalen el valor, tipo y denominación de las monedas y el sistema de pesos y medidas;

    13) Las que fijen las fuerzas de aire, mar y tierra que han de mantenerse en pie en tiempo de paz o de guerra, y las normas para permitir la entrada de tropas extranjeras en el territorio de la República, como asimismo, la salida de tropas nacionales fuera de él;148

    14) Las demás que la Constitución señale como leyes de iniciativa exclusiva del Presidente de la República;

    15) Las que autoricen la declaración de guerra, a propuesta del Presidente de la República;

    16) Las que concedan indultos generales y amnistías y las que fijen las normas generales con arreglo a las cuales debe ejercerse la facultad del Presidente de la República para conceder indultos particulares y pensiones de gracia.149

    Las leyes que concedan indultos generales y amnistías requerirán siempre de quórum calificado. No obstante, este quórum será de las dos terceras partes de los diputados y senadores en ejercicio cuando se trate de delitos contemplados en el artículo 9º;150

    17) Las que señalen la ciudad en que debe residir el Presidente de la República, celebrar sus sesiones el Congreso Nacional y funcionar la Corte Suprema y el Tribunal Constitucional;151

    18) Las que fijen las bases de los procedimientos que rigen los actos de la administración pública;

    19) Las que regulen el funcionamiento de loterías, hipódromos y apuestas en general, y

    20) Toda otra norma de carácter general y obligatorio que estatuya las bases esenciales de un ordenamiento jurídico.

    Artículo 64. El Presidente de la República podrá solicitar autorización al Congreso Nacional para dictar disposiciones con fuerza de ley durante un plazo no superior a un año sobre materias que correspondan al dominio de la ley.

    Esta autorización no podrá extenderse a la nacionalidad, la ciudadanía, las elecciones ni al plebiscito, como tampoco a materias comprendidas en las garantías constitucionales o que deban ser objeto de leyes orgánicas constitucionales o de quórum calificado.

    La autorización no podrá comprender facultades que afecten a la organización, atribuciones y régimen de los funcionarios del Poder Judicial, del Congreso Nacional, del Tribunal Constitucional ni de la Contraloría General de la República.

    La ley que otorgue la referida autorización señalará las materias precisas sobre las que recaerá la delegación y podrá establecer o determinar las limitaciones, restricciones y formalidades que se estimen convenientes.

    Sin perjuicio de lo dispuesto en los incisos anteriores, el Presidente de la República queda autorizado para fijar el texto refundido, coordinado y sistematizado de las leyes cuando sea conveniente para su mejor ejecución. En ejercicio de esta facultad, podrá introducirle los cambios de forma que sean indispensables, sin alterar, en caso alguno, su verdadero sentido y alcance.152

    A la Contraloría General de la República corresponderá tomar razón de estos decretos con fuerza de ley, debiendo rechazarlos cuando ellos excedan o contravengan la autorización referida.

    Los decretos con fuerza de ley estarán sometidos en cuanto a su publicación, vigencia y efectos, a las mismas normas que rigen para la ley.

    Formación de la Ley

    Artículo 65. Las leyes pueden tener origen en la Cámara de Diputados o en el Senado, por mensaje que dirija el Presidente de la República o por moción de cualquiera de sus miembros. Las mociones no pueden ser firmadas por más de diez diputados ni por más de cinco senadores.

    Las leyes sobre tributos de cualquiera naturaleza que sean, sobre los presupuestos de la administración pública y sobre reclutamiento, sólo pueden tener origen en la Cámara de Diputados. Las leyes sobre amnistía y sobre indultos generales sólo pueden tener origen en el Senado.

    Corresponderá al Presidente de la República la iniciativa exclusiva de los proyectos de ley que tengan relación con la alteración de la división política o administrativa del país, o con la administración financiera o presupuestaria del Estado, incluyendo las modificaciones de la Ley de Presupuestos, y con las materias señaladas en los números 10 y 13 del artículo 63.

    Corresponderá, asimismo, al Presidente de la República, la iniciativa exclusiva para:

    1º Imponer, suprimir, reducir o condonar tributos de cualquier clase o naturaleza, establecer exenciones o modificar las existentes y determinar su forma, proporcionalidad o progresión;

    2° Crear nuevos servicios públicos o empleos rentados, sean fiscales, semifiscales, autónomos o de las empresas del Estado; suprimirlos y determinar sus funciones o atribuciones.153

    3º Contratar empréstitos o celebrar cualquiera otra clase de operaciones que puedan comprometer el crédito o la responsabilidad financiera del Estado, de las entidades semifiscales, autónomas, de los gobiernos regionales o de las municipalidades, y condonar, reducir o modificar obligaciones, intereses u otras cargas financieras de cualquiera naturaleza, establecidas en favor del Fisco o de los organismos o entidades referidos;154

    4º Fijar, modificar, conceder o aumentar remuneraciones, jubilaciones, pensiones, montepíos, rentas y cualquier otra clase de emolumentos, préstamos o beneficios al personal en servicio o en retiro y a los beneficiarios de montepíos, en su caso, de la administración pública y demás organismos y entidades anteriormente señalados, como asimismo fijar las remuneraciones mínimas de los trabajadores del sector privado, aumentar obligatoriamente sus remuneraciones y demás beneficios económicos o alterar las bases que sirvan para determinarlos; todo ello sin perjuicio de lo dispuesto en los números siguientes;

    5º Establecer las modalidades y procedimientos de la negociación colectiva y determinar los casos en que no se podrá negociar, y

    6º Establecer o modificar las normas sobre seguridad social o que incidan en ella, tanto del sector público como del sector privado.

    El Congreso Nacional sólo podrá aceptar, disminuir o rechazar los servicios, empleos, emolumentos, préstamos, beneficios, gastos y demás iniciativas sobre la materia que proponga el Presidente de la República.

    Artículo 66. Las normas legales que interpreten preceptos constitucionales necesitarán, para su aprobación, modificación o derogación, de las tres quintas partes de los diputados y senadores en ejercicio.

    Las normas legales a las cuales la Constitución confiere el carácter de ley orgánica constitucional requerirán, para su aprobación, modificación o derogación, de las cuatro séptimas partes de los diputados y senadores en ejercicio.

    Las normas legales de quórum calificado se establecerán, modificarán o derogarán por la mayoría absoluta de los diputados y senadores en ejercicio.

    Las demás normas legales requerirán la mayoría de los miembros presentes de cada Cámara, o las mayorías que sean aplicables conforme a los artículos 68 y siguientes.155 – 156

    Artículo 67. El proyecto de Ley de Presupuestos deberá ser presentado por el Presidente de la República al Congreso Nacional, a lo menos con tres meses de anterioridad a la fecha en que debe empezar a regir; y si el Congreso no lo despachare dentro de los sesenta días contados desde su presentación, regirá el proyecto presentado por el Presidente de la República.

    El Congreso Nacional no podrá aumentar ni disminuir la estimación de los ingresos; sólo podrá reducir los gastos contenidos en el proyecto de Ley de Presupuestos, salvo los que estén establecidos por ley permanente.

    La estimación del rendimiento de los recursos que consulta la Ley de Presupuestos y de los nuevos que establezca cualquiera otra iniciativa de ley, corresponderá exclusivamente al Presidente, previo informe de los organismos técnicos respectivos.

    No podrá el Congreso aprobar ningún nuevo gasto con cargo a los fondos de la Nación sin que se indiquen, al mismo tiempo, las fuentes de recursos necesarios para atender dicho gasto.

    Si la fuente de recursos otorgada por el Congreso fuere insuficiente para financiar cualquier nuevo gasto que se apruebe, el Presidente de la República, al promulgar la ley, previo informe favorable del servicio o institución a través del cual se recaude el nuevo ingreso, refrendado por la Contraloría General de la República, deberá reducir proporcionalmente todos los gastos, cualquiera que sea su naturaleza. 157

    Artículo 68. El proyecto que fuere desechado en general en la Cámara de su origen no podrá renovarse sino después de un año. Sin embargo, el Presidente de la República, en caso de un proyecto de su iniciativa, podrá solicitar que el mensaje pase a la otra Cámara y, si ésta lo aprueba en general por los dos tercios de sus miembros presentes, volverá a la de su origen y sólo se considerará desechado si esta Cámara lo rechaza con el voto de los dos tercios de sus miembros presentes.158

    Artículo 69. Todo proyecto puede ser objeto de adiciones o correcciones en los trámites que corresponda, tanto en la Cámara de Diputados como en el Senado; pero en ningún caso se admitirán las que no tengan relación directa con las ideas matrices o fundamentales del proyecto.159

    Aprobado un proyecto en la Cámara de su origen, pasará inmediatamente a la otra para su discusión.

    Artículo 70. El proyecto que fuere desechado en su totalidad por la Cámara revisora será considerado por una comisión mixta de igual número de diputados y senadores, la que propondrá la forma y modo de resolver las dificultades. El proyecto de la comisión mixta volverá a la Cámara de origen y, para ser aprobado tanto en ésta como en la revisora, se requerirá de la mayoría de los miembros presentes en cada una de ellas. Si la comisión mixta no llegare a acuerdo, o si la Cámara de origen rechazare el proyecto de esa comisión, el Presidente de la República podrá pedir que esa Cámara se pronuncie sobre si insiste por los dos tercios de sus miembros presentes en el proyecto que aprobó en el primer trámite. Acordada la insistencia, el proyecto pasará por segunda vez a la Cámara que lo desechó, y sólo se entenderá que ésta lo reprueba si concurren para ello las dos terceras partes de sus miembros presentes.

    Artículo 71. El proyecto que fuere adicionado o enmendado por la Cámara revisora volverá a la de su origen y en ésta se entenderán aprobadas las adiciones y enmiendas con el voto de la mayoría de los miembros presentes.

    Si las adiciones o enmiendas fueren reprobadas, se formará una comisión mixta y se procederá en la misma forma indicada en el artículo anterior. En caso de que en la comisión mixta no se produzca acuerdo para resolver las divergencias entre ambas Cámaras, o si alguna de las Cámaras rechazare la proposición de la comisión mixta, el Presidente de la República podrá solicitar a la Cámara de origen que considere nuevamente el proyecto aprobado en segundo trámite por la revisora. Si la Cámara de origen rechazare las adiciones o modificaciones por los dos tercios de sus miembros presentes, no habrá ley en esa parte o en su totalidad; pero, si hubiere mayoría para el rechazo, menor a los dos tercios, el proyecto pasará a la Cámara revisora, y se entenderá aprobado con el voto conforme de las dos terceras partes de los miembros presentes de esta última.160

    Artículo 72. Aprobado un proyecto por ambas Cámaras será remitido al Presidente de la República, quien, si también lo aprueba, dispondrá su promulgación como ley.

    Artículo 73. Si el Presidente de la República desaprueba el proyecto, lo devolverá a la Cámara de su origen con las observaciones convenientes, dentro del término de treinta días.

    En ningún caso se admitirán las observaciones que no tengan relación directa con las ideas matrices o fundamentales del proyecto, a menos que hubieran sido consideradas en el mensaje respectivo.

    Si las dos Cámaras aprobaren las observaciones, el proyecto tendrá fuerza de ley y se devolverá al Presidente para su promulgación.

    Si las dos Cámaras desecharen todas o algunas de las observaciones e insistieren por los dos tercios de sus miembros presentes en la totalidad o parte del proyecto aprobado por ellas, se devolverá al Presidente para su promulgación.

    Artículo 74. El Presidente de la República podrá hacer presente la urgencia en el despacho de un proyecto, en uno o en todos sus trámites, y en tal caso, la Cámara respectiva deberá pronunciarse dentro del plazo máximo de treinta días.

    La calificación de la urgencia corresponderá hacerla al Presidente de la República de acuerdo a la ley orgánica constitucional relativa al Congreso, la que establecerá también todo lo relacionado con la tramitación interna de la ley.

    Artículo 75. Si el Presidente de la República no devolviere el proyecto dentro de treinta días, contados desde la fecha de su remisión, se entenderá que lo aprueba y se promulgará como ley.161

    La promulgación deberá hacerse siempre dentro del plazo de diez días, contados desde que ella sea procedente.

    La publicación se hará dentro de los cincos días hábiles siguientes a la fecha en que quede totalmente tramitado el decreto promulgatorio.

    CAPITULO VI. PODER JUDICIAL

    Artículo 76. La facultad de conocer de las causas civiles y criminales, de resolverlas y de hacer ejecutar lo juzgado, pertenece exclusivamente a los tribunales establecidos por la ley. Ni el Presidente de la República ni el Congreso pueden, en caso alguno, ejercer funciones judiciales, avocarse causas pendientes, revisar los fundamentos o contenidos de sus resoluciones o hacer revivir procesos fenecidos.

    Reclamada su intervención en forma legal y en negocios de su competencia, no podrán excusarse de ejercer su autoridad, ni aun por falta de ley que resuelva la contienda o asunto sometidos a su decisión.

    Para hacer ejecutar sus resoluciones, y practicar o hacer practicar los actos de instrucción que determine la ley, los tribunales ordinarios de justicia y los especiales que integran el Poder Judicial podrán impartir órdenes directas a la fuerza pública o ejercer los medios de acción conducentes de que dispusieren. Los demás tribunales lo harán en la forma que la ley determine.162

    La autoridad requerida deberá cumplir sin más trámite el mandato judicial y no podrá calificar su fundamento u oportunidad, ni la justicia o legalidad de la resolución que se trata de ejecutar.

    Artículo 77. Una ley orgánica constitucional determinará la organización y atribuciones de los tribunales que fueren necesarios para la pronta y cumplida administración de justicia en todo el territorio de la República. La misma ley señalará las calidades que respectivamente deban tener los jueces y el número de años que deban haber ejercido la profesión de abogado las personas que fueren nombradas ministros de Corte o jueces letrados.

    La ley orgánica constitucional relativa a la organización y atribuciones de los tribunales, sólo podrá ser modificada oyendo previamente a la Corte Suprema de conformidad a lo establecido en la ley orgánica constitucional respectiva.

    La Corte Suprema deberá pronunciarse dentro del plazo de treinta días contados desde la recepción del oficio en que se solicita la opinión pertinente.

    Sin embargo, si el Presidente de la República hubiere hecho presente una urgencia al proyecto consultado, se comunicará esta circunstancia a la Corte.

    En dicho caso, la Corte deberá evacuar la consulta dentro del plazo que implique la urgencia respectiva.

    Si la Corte Suprema no emitiere opinión dentro de los plazos aludidos, se tendrá por evacuado el trámite.163

    La ley orgánica constitucional relativa a la organización y atribuciones de los tribunales, así como las leyes procesales que regulen un sistema de enjuiciamiento, podrán fijar fechas diferentes para su entrada en vigencia en las diversas regiones del territorio nacional. Sin perjuicio de lo anterior, el plazo para la entrada en vigor de dichas leyes en todo el país no podrá ser superior a cuatro años. 164

    Artículo 78. En cuanto al nombramiento de los jueces, la ley se ajustará a los siguientes preceptos generales.

    La Corte Suprema se compondrá de veintiún ministros.165

    Los ministros y los fiscales judiciales de la Corte Suprema serán nombrados por el Presidente de la República, eligiéndolos de una nómina de cinco personas que, en cada caso, propondrá la misma Corte, y con acuerdo del Senado. Este adoptará los respectivos acuerdos por los dos tercios de sus miembros en ejercicio, en sesión especialmente convocada al efecto. Si el Senado no aprobare la proposición del Presidente de la República, la Corte Suprema deberá completar la quina proponiendo un nuevo nombre en sustitución del rechazado, repitiéndose el procedimiento hasta que se apruebe un nombramiento.166

    Cinco de los miembros de la Corte Suprema deberán ser abogados extraños a la administración de justicia, tener a lo menos quince años de título, haberse destacado en la actividad profesional o universitaria y cumplir los demás requisitos que señale la ley orgánica constitucional respectiva.167

    La Corte Suprema, cuando se trate de proveer un cargo que corresponda a un miembro proveniente del Poder Judicial, formará la nómina exclusivamente con integrantes de éste y deberá ocupar un lugar en ella el ministro más antiguo de Corte de Apelaciones que figure en lista de méritos. Los otros cuatro lugares se llenarán en atención a los merecimientos de los candidatos. Tratándose de proveer una vacante correspondiente a abogados extraños a la administración de justicia, la nómina se formará exclusivamente, previo concurso público de antecedentes, con abogados que cumplan los requisitos señalados en el inciso cuarto.168

    Los ministros y fiscales judiciales de las Cortes de Apelaciones serán designados por el Presidente de la República, a propuesta en terna de la Corte Suprema.169

    Los jueces letrados serán designados por el Presidente de la República, a propuesta en terna de la Corte de Apelaciones de la jurisdicción respectiva.

    El juez letrado en lo civil o criminal más antiguo de asiento de Corte o el juez letrado civil o criminal más antiguo del cargo inmediatamente inferior al que se trata de proveer y que figure en lista de méritos y exprese su interés en el cargo, ocupará un lugar en la terna correspondiente. Los otros dos lugares se llenarán en atención al mérito de los candidatos.

    La Corte Suprema y las Cortes de Apelaciones, en su caso, formarán las quinas o las ternas en pleno especialmente convocado al efecto, en una misma y única votación, donde cada uno de sus integrantes tendrá derecho a votar por tres o dos personas, respectivamente. Resultarán elegidos quienes obtengan las cinco o las tres primeras mayorías, según corresponda. El empate se resolverá mediante sorteo.170

    Sin embargo, cuando se trate del nombramiento de ministros de Corte suplentes, la designación podrá hacerse por la Corte Suprema y, en el caso de los jueces, por la Corte de Apelaciones respectiva. Estas designaciones no podrán durar más de sesenta días y no serán prorrogables. En caso de que los tribunales superiores mencionados no hagan uso de esta facultad o de que haya vencido el plazo de la suplencia, se procederá a proveer las vacantes en la forma ordinaria señalada precedentemente.171

    Artículo 79. Los jueces son personalmente responsables por los delitos de cohecho, falta de observancia en materia sustancial de las leyes que reglan el procedimiento, denegación y torcida administración de justicia y, en general, de toda prevaricación en que incurran en el desempeño de sus funciones.

    Tratándose de los miembros de la Corte Suprema, la ley determinará los casos y el modo de hacer efectiva esta responsabilidad.

    Artículo 80. Los jueces permanecerán en sus cargos durante su buen comportamiento; pero los inferiores desempeñarán su respectiva judicatura por el tiempo que determinen las leyes.

    No obstante lo anterior, los jueces cesarán en sus funciones al cumplir 75 años de edad; o por renuncia o incapacidad legal sobreviniente o en caso de ser depuestos de sus destinos, por causa legalmente sentenciada. La norma relativa a la edad no regirá respecto al Presidente de la Corte Suprema, quien continuará en su cargo hasta el término de su período.

    En todo caso, la Corte Suprema por requerimiento del Presidente de la República, a solicitud de parte interesada, o de oficio, podrá declarar que los jueces no han tenido buen comportamiento y, previo informe del inculpado y de la Corte de Apelaciones respectiva, en su caso, acordar su remoción por la mayoría del total de sus componentes. Estos acuerdos se comunicarán al Presidente de la República para su cumplimiento.

    La Corte Suprema, en pleno especialmente convocado al efecto y por la mayoría absoluta de sus miembros en ejercicio, podrá autorizar u ordenar, fundadamente, el traslado de los jueces y demás funcionarios y empleados del Poder Judicial a otro cargo de igual categoría.172

    Artículo 81. Los magistrados de los tribunales superiores de justicia, los fiscales judiciales y los jueces letrados que integran el Poder Judicial, no podrán ser aprehendidos sin orden del tribunal competente, salvo el caso de crimen o simple delito flagrante y sólo para ponerlos inmediatamente a disposición del tribunal que debe conocer del asunto en conformidad a la ley.173

    Artículo 82. La Corte Suprema tiene la superintendencia directiva, correccional y económica de todos los tribunales de la nación. Se exceptúan de esta norma el Tribunal Constitucional, el Tribunal Calificador de Elecciones y los tribunales electorales regionales.174

    Los tribunales superiores de justicia, en uso de sus facultades disciplinarias, sólo podrán invalidar resoluciones jurisdiccionales en los casos y forma que establezca la ley orgánica constitucional respectiva. 175 176 177

    CAPITULO VII178. MINISTERIO PÚBLICO.

    Artículo 83. Un organismo autónomo, jerarquizado, con el nombre de Ministerio Público, dirigirá en forma exclusiva la investigación de los hechos constitutivos de delito, los que determinen la participación punible y los que acrediten la inocencia del imputado y, en su caso, ejercerá la acción penal pública en la forma prevista por la ley. De igual manera, le corresponderá la adopción de medidas para proteger a las víctimas y a los testigos. En caso alguno podrá ejercer funciones jurisdiccionales.

    El ofendido por el delito y las demás personas que determine la ley podrán ejercer igualmente la acción penal.

    El Ministerio Público podrá impartir órdenes directas a las Fuerzas de Orden y Seguridad durante la investigación. Sin embargo, las actuaciones que priven al imputado o a terceros del ejercicio de los derechos que esta Constitución asegura, o lo restrinjan o perturben, requerirán de aprobación judicial previa. La autoridad requerida deberá cumplir sin más trámite dichas órdenes y no podrá calificar su fundamento, oportunidad, justicia o legalidad, salvo requerir la exhibición de la autorización judicial previa, en su caso.

    El ejercicio de la acción penal pública, y la dirección de las investigaciones de los hechos que configuren el delito, de los que determinen la participación punible y de los que acrediten la inocencia del imputado en las causas que sean de conocimiento de los tribunales militares, como asimismo la adopción de medidas para proteger a las víctimas y a los testigos de tales hechos corresponderán, en conformidad con las normas del Código de Justicia Militar y a las leyes respectivas, a los órganos y a las personas que ese Código y esas leyes determinen.

    Artículo 84. Una ley orgánica constitucional determinará la organización y atribuciones del Ministerio Público, señalará las calidades y requisitos que deberán tener y cumplir los fiscales para su nombramiento y las causales de remoción de los fiscales adjuntos, en lo no contemplado en la Constitución. Las personas que sean designadas fiscales no podrán tener impedimento alguno que las inhabilite para desempeñar el cargo de juez. Los fiscales regionales y adjuntos cesarán en su cargo al cumplir 75 años de edad.

    La ley orgánica constitucional establecerá el grado de independencia y autonomía y la responsabilidad que tendrán los fiscales en la dirección de la investigación y en el ejercicio de la acción penal pública, en los casos que tengan a su cargo.

    Artículo 85. El Fiscal Nacional será designado por el Presidente de la República, a propuesta en quina de la Corte Suprema y con acuerdo del Senado adoptado por los dos tercios de sus miembros en ejercicio, en sesión especialmente convocada al efecto.

    Si el Senado no aprobare la proposición del Presidente de la República, la Corte Suprema deberá completar la quina proponiendo un nuevo nombre en sustitución del rechazado, repitiéndose el procedimiento hasta que se apruebe un nombramiento.

    El Fiscal Nacional deberá tener a lo menos diez años de título de abogado, haber cumplido cuarenta años de edad y poseer las demás calidades necesarias para ser ciudadano con derecho a sufragio; durará ocho años en el ejercicio de sus funciones y no podrá ser designado para el período siguiente.179

    Será aplicable al Fiscal Nacional lo dispuesto en el inciso segundo del artículo 80 en lo relativo al tope de edad.180

    Artículo 86. Existirá un Fiscal Regional en cada una de las regiones en que se divida administrativamente el país, a menos que la población o la extensión geográfica de la región hagan necesario nombrar más de uno.

    Los fiscales regionales serán nombrados por el Fiscal Nacional, a propuesta en terna de la Corte de Apelaciones de la respectiva región. En caso que en la región exista más de una Corte de Apelaciones, la terna será formada por un pleno conjunto de todas ellas, especialmente convocado al efecto por el Presidente de la Corte de más antigua creación.

    Los fiscales regionales deberán tener a lo menos cinco años de título de abogado, haber cumplido 30 años de edad y poseer las demás calidades necesarias para ser ciudadano con derecho a sufragio; durarán ocho años en el ejercicio de sus funciones y no podrán ser designados como fiscales regionales por el período siguiente, lo que no obsta a que puedan ser nombrados en otro cargo del Ministerio Público.181

    Artículo 87. La Corte Suprema y las Cortes de Apelaciones, en su caso, llamarán a concurso público de antecedentes para la integración de las quinas y ternas, las que serán acordadas por la mayoría absoluta de sus miembros en ejercicio, en pleno especialmente convocado al efecto. No podrán integrar las quinas y ternas los miembros activos o pensionados del Poder Judicial.

    Las quinas y ternas se formarán en una misma y única votación en la cual cada integrante del pleno tendrá derecho a votar por tres o dos personas, respectivamente.

    Resultarán elegidos quienes obtengan las cinco o las tres primeras mayorías, según corresponda. De producirse un empate, éste se resolverá mediante sorteo.

    Artículo 88. Existirán fiscales adjuntos que serán designados por el Fiscal Nacional, a propuesta en terna del fiscal regional respectivo, la que deberá formarse previo concurso público, en conformidad a la ley orgánica constitucional. Deberán tener el título de abogado y poseer las demás calidades necesarias para ser ciudadano con derecho a sufragio.

    Artículo 89. El Fiscal Nacional y los fiscales regionales sólo podrán ser removidos por la Corte Suprema, a requerimiento del Presidente de la República, de la Cámara de Diputados, o de diez de sus miembros, por incapacidad, mal comportamiento o negligencia manifiesta en el ejercicio de sus funciones. La Corte conocerá del asunto en pleno especialmente convocado al efecto y para acordar la remoción deberá reunir el voto conforme de la mayoría de sus miembros en ejercicio.182

    La remoción de los fiscales regionales también podrá ser solicitada por el Fiscal Nacional.

    Artículo 90. Se aplicará al Fiscal Nacional, a los fiscales regionales y a los fiscales adjuntos lo establecido en el artículo 81.

    Artículo 91. El Fiscal Nacional tendrá la superintendencia directiva, correccional y económica del Ministerio Público, en conformidad a la ley orgánica constitucional respectiva.

    CAPITULO VIII. TRIBUNAL CONSTITUCIONAL183 184

    Artículo 92. Habrá un Tribunal Constitucional integrado por diez miembros, designados de la siguiente forma:

    a) Tres designados por el Presidente de la República.

    b) Cuatro elegidos por el Congreso Nacional. Dos serán nombrados directamente por el Senado y dos serán previamente propuestos por la Cámara de Diputados para su aprobación o rechazo por el Senado. Los nombramientos, o la propuesta en su caso, se efectuarán en votaciones únicas y requerirán para su aprobación del voto favorable de los dos tercios de los senadores o diputados en ejercicio, según corresponda.

    c) Tres elegidos por la Corte Suprema en una votación secreta que se celebrará en sesión especialmente convocada para tal efecto.

    Los miembros del Tribunal durarán nueve años en sus cargos y se renovarán por parcialidades cada tres. Deberán tener a lo menos quince años de título de abogado, haberse destacado en la actividad profesional, universitaria o pública, no podrán tener impedimento alguno que los inhabilite para desempeñar el cargo de juez, estarán sometidos a las normas de los artículos 58, 59 y 81 y no podrán ejercer la profesión de abogado, incluyendo la judicatura, ni cualquier acto de los establecidos en el inciso segundo y tercero del artículo 60.

    Los miembros del Tribunal Constitucional serán inamovibles y no podrán ser reelegidos, salvo aquél que lo haya sido como reemplazante y haya ejercido el cargo por un período menor a cinco años. Cesarán en sus funciones al cumplir 75 años de edad.

    En caso que un miembro del Tribunal Constitucional cese en su cargo, se procederá a su reemplazo por quien corresponda, de acuerdo con el inciso primero de este artículo y por el tiempo que falte para completar el período del reemplazado.

    El Tribunal funcionará en pleno o dividido en dos salas. En el primer caso, el quórum para sesionar será de, a lo menos, ocho miembros y en el segundo de, a lo menos, cuatro. El Tribunal adoptará sus acuerdos por simple mayoría, salvo los casos en que se exija un quórum diferente y fallará de acuerdo a derecho. El Tribunal en pleno resolverá en definitiva las atribuciones indicadas en los números 1º, 3º, 4º, 5º, 6º, 7º, 8º, 9º y 11º del artículo siguiente. Para el ejercicio de sus restantes atribuciones, podrá funcionar en pleno o en sala de acuerdo a lo que disponga la ley orgánica constitucional respectiva.

    Una ley orgánica constitucional determinará su organización, funcionamiento, procedimientos y fijará la planta, régimen de remuneraciones y estatuto de su personal.185

    Artículo 93. Son atribuciones del Tribunal Constitucional:

    1º Ejercer el control de constitucionalidad de las leyes que interpreten algún precepto de la Constitución, de las leyes orgánicas constitucionales y de las normas de un tratado que versen sobre materias propias de estas últimas, antes de su promulgación;

    2º Resolver sobre las cuestiones de constitucionalidad de los auto acordados dictados por la Corte Suprema, las Cortes de Apelaciones y el Tribunal Calificador de Elecciones;

    3º Resolver las cuestiones sobre constitucionalidad que se susciten durante la tramitación de los proyectos de ley o de reforma constitucional y de los tratados sometidos a la aprobación del Congreso;

    4º Resolver las cuestiones que se susciten sobre la constitucionalidad de un decreto con fuerza de ley;

    5º Resolver las cuestiones que se susciten sobre constitucionalidad con relación a la convocatoria a un plebiscito, sin perjuicio de las atribuciones que correspondan al Tribunal Calificador de Elecciones;

    6° Resolver, por la mayoría de sus miembros en ejercicio, la inaplicabilidad de un precepto legal cuya aplicación en cualquier gestión que se siga ante un tribunal ordinario o especial, resulte contraria a la Constitución;

    7º Resolver por la mayoría de los cuatro quintos de sus integrantes en ejercicio, la inconstitucionalidad de un precepto legal declarado inaplicable en conformidad a lo dispuesto en el numeral anterior;

    8º Resolver los reclamos en caso de que el Presidente de la República no promulgue una ley cuando deba hacerlo o promulgue un texto diverso del que constitucionalmente corresponda;

    9º Resolver sobre la constitucionalidad de un decreto o resolución del Presidente de la República que la Contraloría General de la República haya representado por estimarlo inconstitucional, cuando sea requerido por el Presidente en conformidad al artículo 99;

    10° Declarar la inconstitucionalidad de las organizaciones y de los movimientos o partidos políticos, como asimismo la responsabilidad de las personas que hubieran tenido participación en los hechos que motivaron la declaración de inconstitucionalidad, en conformidad a lo dispuesto en los párrafos sexto, séptimo y octavo del Nº 15º del artículo 19 de esta Constitución. Sin embargo, si la persona afectada fuera el Presidente de la República o el Presidente electo, la referida declaración requerirá, además, el acuerdo del Senado adoptado por la mayoría de sus miembros en ejercicio;

    11º Informar al Senado en los casos a que se refiere el artículo 53 número 7) de esta Constitución;

    12º Resolver las contiendas de competencia que se susciten entre las autoridades políticas o administrativas y los tribunales de justicia, que no correspondan al Senado;

    13º Resolver sobre las inhabilidades constitucionales o legales que afecten a una persona para ser designada Ministro de Estado, permanecer en dicho cargo o desempeñar simultáneamente otras funciones;

    14º Pronunciarse sobre las inhabilidades, incompatibilidades y causales de cesación en el cargo de los parlamentarios;

    15º Calificar la inhabilidad invocada por un parlamentario en los términos del inciso final del artículo 60 y pronunciarse sobre su renuncia al cargo, y

    16° Resolver sobre la constitucionalidad de los decretos supremos, cualquiera sea el vicio invocado, incluyendo aquéllos que fueren dictados en el ejercicio de la potestad reglamentaria autónoma del Presidente de la República cuando se refieran a materias que pudieran estar reservadas a la ley por mandato del artículo 63.

    En el caso del número 1º, la Cámara de origen enviará al Tribunal Constitucional el proyecto respectivo dentro de los cinco días siguientes a aquél en que quede totalmente tramitado por el Congreso.

    En el caso del número 2º, el Tribunal podrá conocer de la materia a requerimiento del Presidente de la República, de cualquiera de las Cámaras o de diez de sus miembros.

    Asimismo, podrá requerir al Tribunal toda persona que sea parte en juicio o gestión pendiente ante un tribunal ordinario o especial, o desde la primera actuación del procedimiento penal, cuando sea afectada en el ejercicio de sus derechos fundamentales por lo dispuesto en el respectivo autoacordado.

    En el caso del número 3º, el Tribunal sólo podrá conocer de la materia a requerimiento del Presidente de la República, de cualquiera de las Cámaras o de una cuarta parte de sus miembros en ejercicio, siempre que sea formulado antes de la promulgación de la ley o de la remisión de la comunicación que informa la aprobación del tratado por el Congreso Nacional y, en caso alguno, después de quinto día del despacho del proyecto o de la señalada comunicación.

    El Tribunal deberá resolver dentro del plazo de diez días contado desde que reciba el requerimiento, a menos que decida prorrogarlo hasta por otros diez días por motivos graves y calificados.

    El requerimiento no suspenderá la tramitación del proyecto; pero la parte impugnada de éste no podrá ser promulgada hasta la expiración del plazo referido, salvo que se trate del proyecto de Ley de Presupuestos o del proyecto relativo a la declaración de guerra propuesta por el Presidente de la República.

    En el caso del número 4º, la cuestión podrá ser planteada por el Presidente de la República dentro del plazo de diez días cuando la Contraloría rechace por inconstitucional un decreto con fuerza de ley. También podrá ser promovida por cualquiera de las Cámaras o por una cuarta parte de sus miembros en ejercicio en caso de que la Contraloría hubiere tomado razón de un decreto con fuerza de ley que se impugne de inconstitucional. Este requerimiento deberá efectuarse dentro del plazo de treinta días, contado desde la publicación del respectivo decreto con fuerza de ley.

    En el caso del número 5º, la cuestión podrá promoverse a requerimiento del Senado o de la Cámara de Diputados, dentro de diez días contados desde la fecha de publicación del decreto que fije el día de la consulta plebiscitaria.

    El Tribunal establecerá en su resolución el texto definitivo de la consulta plebiscitaria, cuando ésta fuera procedente.

    Si al tiempo de dictarse la sentencia faltaran menos de treinta días para la realización del plebiscito, el Tribunal fijará en ella una nueva fecha comprendida entre los treinta y los sesenta días siguientes al fallo.

    En el caso del número 6º, la cuestión podrá ser planteada por cualquiera de las partes o por el juez que conoce del asunto. Corresponderá a cualquiera de las salas del Tribunal declarar, sin ulterior recurso, la admisibilidad de la cuestión siempre que verifique la existencia de una gestión pendiente ante el tribunal ordinario o especial, que la aplicación del precepto legal impugnado pueda resultar decisivo en la resolución de un asunto, que la impugnación esté fundada razonablemente y se cumplan los demás requisitos que establezca la ley. A esta misma sala le corresponderá resolver la suspensión del procedimiento en que se ha originado la acción de inaplicabilidad por inconstitucionalidad.

    En el caso del número 7º, una vez resuelta en sentencia previa la declaración de inaplicabilidad de un precepto legal, conforme al número 6º de este artículo, habrá acción pública para requerir al Tribunal la declaración de inconstitucionalidad, sin perjuicio de la facultad de éste para declararla de oficio. Corresponderá a la ley orgánica constitucional respectiva establecer los requisitos de admisibilidad, en el caso de que se ejerza la acción pública, como asimismo regular el procedimiento que deberá seguirse para actuar de oficio.

    En los casos del número 8º, la cuestión podrá promoverse por cualquiera de las Cámaras o por una cuarta parte de sus miembros en ejercicio, dentro de los treinta días siguientes a la publicación del texto impugnado o dentro de los sesenta días siguientes a la fecha en que el Presidente de la República debió efectuar la promulgación de la ley. Si el Tribunal acogiera el reclamo, promulgará en su fallo la ley que no lo haya sido o rectificará la promulgación incorrecta.

    En el caso del número 11º, el Tribunal sólo podrá conocer de la materia a requerimiento del Senado.

    Habrá acción pública para requerir al Tribunal respecto de las atribuciones que se le confieren por los números 10º y 13º de este artículo.

    Sin embargo, si en el caso del número 10º la persona afectada fuera el Presidente de la República o el Presidente electo, el requerimiento deberá formularse por la Cámara de Diputados o por la cuarta parte de sus miembros en ejercicio.

    En el caso del número 12°, el requerimiento deberá ser deducido por cualquiera de las autoridades o tribunales en conflicto.

    En el caso del número 14º, el Tribunal sólo podrá conocer de la materia a requerimiento del Presidente de la República o de no menos de diez parlamentarios en ejercicio.

    En el caso del número 16º, el Tribunal sólo podrá conocer de la materia a requerimiento de cualquiera de las Cámaras efectuado dentro de los treinta días siguientes a la publicación o notificación del texto impugnado. En el caso de vicios que no se refieran a decretos que excedan la potestad reglamentaria autónoma del Presidente de la República también podrá una cuarta parte de los miembros en ejercicio deducir dicho requerimiento.

    El Tribunal Constitucional podrá apreciar en conciencia los hechos cuando conozca de las atribuciones indicadas en los números 10º, 11º y 13º, como, asimismo, cuando conozca de las causales de cesación en el cargo de parlamentario.

    En los casos de los numerales 10º, 13º y en el caso del numeral 2º cuando sea requerido por una parte, corresponderá a una sala del Tribunal pronunciarse sin ulterior recurso, de su admisibilidad.186

    Artículo 94. Contra las resoluciones del Tribunal Constitucional no procederá recurso alguno, sin perjuicio de que puede, el mismo Tribunal, conforme a la ley, rectificar los errores de hecho en que hubiere incurrido.

    Las disposiciones que el Tribunal declare inconstitucionales no podrán convertirse en ley en el proyecto o decreto con fuerza de ley de que se trate.

    En el caso del N° 16 del artículo 93, el decreto supremo impugnado quedará sin efecto de pleno derecho, con el solo mérito de la sentencia del Tribunal que acoja el reclamo. No obstante, el precepto declarado inconstitucional en conformidad a lo dispuesto en los numerales 2, 4 ó 7 del artículo 93, se entenderá derogado desde la publicación en el Diario Oficial de la sentencia que acoja el reclamo, la que no producirá efecto retroactivo.

    Las sentencias que declaren la inconstitucionalidad de todo o parte de una ley, de un decreto con fuerza de ley, de un decreto supremo o autoacordado, en su caso, se publicarán en el Diario Oficial dentro de los tres días siguientes a su dictación.187

    CAPITULO IX. JUSTICIA ELECTORAL

    Artículo 95. Un tribunal especial, que se denominará Tribunal Calificador de Elecciones, conocerá el escrutinio general y de la calificación de las elecciones de Presidente de la República, de diputados y senadores; resolverá las reclamaciones a que dieren lugar y proclamará a los que resulten elegidos. Dicho Tribunal conocerá, asimismo, de los plebiscitos, y tendrá las demás atribuciones que determine la ley.

    Estará constituido por cinco miembros designados en la siguiente forma:

    a) Cuatro ministros de la Corte Suprema, designados por ésta, mediante sorteo, en la forma y oportunidad que determine la ley orgánica respectiva, y

    b) Un ciudadano que hubiere ejercido el cargo de Presidente o Vicepresidente de la Cámara de Diputados o del Senado por un período no inferior a los 365 días, designado por la Corte Suprema en la forma señalada en la letra a) precedente, de entre todos aquellos que reúnan las calidades indicadas. 188

    La designación a que se refiere la letra b) no podrán recaer en personas que sean parlamentario, candidato a cargos de elección popular, ministro de Estado, ni dirigente de partido político. 189

    Los miembros de este Tribunal durarán cuatro años en sus funciones y les serán aplicables las disposiciones de los artículos 58 y 59 de esta Constitución.

    El Tribunal Calificador procederá como jurado en la apreciación de los hechos y sentenciará con arreglo a derecho.

    Una ley orgánica constitucional regulará la organización y funcionamiento del Tribunal Calificador.190

    Artículo 96. Habrá tribunales electorales regionales encargados de conocer el escrutinio general y la calificación de las elecciones que la ley les encomiende, así como de resolver las reclamaciones a que dieren lugar y de proclamar a los candidatos electos. Sus resoluciones serán apelables para ante el Tribunal Calificador de Elecciones en la forma que determine la ley. Asimismo, les corresponderá conocer de la calificación de las elecciones de carácter gremial y de las que tengan lugar en aquellos grupos intermedios que la ley señale. 191

    Estos tribunales estarán constituidos por un ministro de la Corte de Apelaciones respectiva, elegido por ésta, y por dos miembros designados por el Tribunal Calificador de Elecciones de entre personas que hayan ejercido la profesión de abogado o desempeñado la función de ministro o abogado integrante de Corte de Apelaciones por un plazo no inferior a tres años.

    Los miembros de estos tribunales durarán cuatro años en sus funciones y tendrán las inhabilidades e incompatibilidades que determine la ley.

    Estos tribunales procederán como jurado en la apreciación de los hechos y sentenciarán con arreglo a derecho.

    La ley determinará las demás atribuciones de estos tribunales y regulará su organización y funcionamiento.192

    Artículo 97. Anualmente, se destinarán en la Ley de Presupuestos de la Nación los fondos necesarios para la organización y funcionamiento de estos tribunales, cuyas plantas, remuneraciones y estatuto del personal serán establecidos por ley.

    CAPITULO X. CONTRALORÍA GENERAL DE LA REPÚBLICA 193

    Artículo 98. Un organismo autónomo con el nombre de Contraloría General de la República ejercerá el control de la legalidad de los actos de la Administración, fiscalizará el ingreso y la inversión de los fondos del Fisco, de las municipalidades y de los demás organismos y servicios que determinen las leyes; examinará y juzgará las cuentas de las personas que tengan a su cargo bienes de esas entidades; llevará la contabilidad general de la Nación, y desempeñará las demás funciones que le encomiende la ley orgánica constitucional respectiva.

    El Contralor General de la Republica deberá tener a lo menos diez años de título de abogado, haber cumplido cuarenta años de edad y poseer las demás calidades necesarias para ser ciudadano con derecho a sufragio. Será designado por el Presidente de la República con acuerdo del Senado adoptado por los tres quintos de sus miembros en ejercicio, por un período de ocho años y no podrá ser designado para el período siguiente. Con todo, al cumplir 75 años de edad cesará en el cargo. 194

    Artículo 99. En el ejercicio de la función de control de legalidad, el Contralor General tomará razón de los decretos y resoluciones que, en conformidad a la ley, deben tramitarse por la Contraloría o representará la ilegalidad de que puedan adolecer, pero deberá darles curso cuando, a pesar de su representación, el Presidente de la República insista con la firma de todos sus Ministros, caso en el cual deberá enviar copia de los respectivos decretos a la Cámara de Diputados. En ningún caso dará curso a los decretos de gastos que excedan el límite señalado en la Constitución y remitirá copia íntegra de los antecedentes a la misma Cámara.

    Corresponderá, asimismo, al Contralor General de la República tomar razón de los decretos con fuerza de ley, debiendo representarlos cuando ellos excedan o contravengan la ley delegatoria o sean contrarios a la Constitución.

    Si la representación tuviere lugar con respecto a un decreto con fuerza de ley, a un decreto promulgatorio de una ley o de una reforma constitucional por apartarse del texto aprobado, o a un decreto o resolución por ser contrario a la Constitución, el Presidente de la República no tendrá la facultad de insistir, y en caso de no conformarse con la representación de la Contraloría deberá remitir los antecedentes al Tribunal Constitucional dentro del plazo de diez días, a fin de que éste resuelva la controversia.

    En lo demás, la organización, el funcionamiento y las atribuciones de la Contraloría General de la República serán materia de una ley orgánica constitucional.

    Artículo 100. Las Tesorerías del Estado no podrán efectuar ningún pago sino en virtud de un decreto o resolución expedido por autoridad competente, en que se exprese la ley o la parte del presupuesto que autorice aquel gasto. Los pagos se efectuarán considerando, además, el orden cronológico establecido en ella y previa refrendación presupuestaria del documento que ordene el pago.

    CAPITULO XI. FUERZAS ARMADAS, DE ORDEN Y SEGURIDAD PÚBLICA 195

    Artículo 101. Las Fuerzas Armadas dependientes del Ministerio encargado de la Defensa Nacional están constituidas única y exclusivamente por el Ejército, la Armada y la Fuerza Aérea. Existen para la defensa de la patria y son esenciales para la seguridad nacional.

    Las Fuerzas de Orden y Seguridad Pública están integradas sólo por Carabineros e Investigaciones. Constituyen la fuerza pública y existen para dar eficacia al derecho, garantizar el orden público y la seguridad pública interior, en la forma que lo determinen sus respectivas leyes orgánicas. Dependen del Ministerio encargado de la Seguridad Pública.

    Las Fuerzas Armadas y Carabineros, como cuerpos armados, son esencialmente obedientes y no deliberantes. Las fuerzas dependientes de los Ministerios encargados de la Defensa Nacional y de la Seguridad Pública son, además, profesionales, jerarquizadas y disciplinadas.196

    Artículo 102. La incorporación a las plantas y dotaciones de las Fuerzas Armadas y de Carabineros sólo podrá hacerse a través de sus propias Escuelas, con excepción de los escalafones profesionales y de empleados civiles que determine la ley.

    Artículo 103. Ninguna persona, grupo u organización podrá poseer o tener armas u otros elementos similares que señale una ley aprobada con quórum calificado, sin autorización otorgada en conformidad a ésta.

    El Ministerio encargado de la Defensa Nacional o un organismo de su dependencia ejercerá la supervigilancia y control de las armas en la forma que determine la ley.197

    Artículo 104. Los Comandantes en Jefe del Ejército, de la Armada y de la Fuerza Aérea, y el General Director de Carabineros, serán designados por el Presidente de la República de entre los cinco oficiales generales de mayor antigüedad, que reúnan las calidades que los respectivos estatutos institucionales exijan para tales cargos; durarán cuatro años en sus funciones, no podrán ser nombrados para un nuevo período y gozarán de inamovilidad en su cargo.

    El Presidente de la República, mediante decreto fundado e informando previamente a la Cámara de Diputados y al Senado, podrá llamar a retiro a los Comandantes en Jefe del Ejército, de la Armada y de la Fuerza Aérea y al General Director de Carabineros, en su caso, antes de completar su respectivo período.198

    Artículo 105. Los nombramientos, ascensos y retiros de los oficiales de las Fuerzas Armadas y Carabineros, se efectuarán por decreto supremo, en conformidad a la ley orgánica constitucional correspondiente, la que determinará las normas básicas respectivas, así como, las normas básicas referidas a la carrera profesional, incorporación a sus plantas, previsión, antigüedad, mando, sucesión de mando y presupuesto de las Fuerzas Armadas y Carabineros.199

    El ingreso, los nombramientos, ascensos y retiros en Investigaciones se efectuarán en conformidad a su ley orgánica. 200

    CAPITULO XII. CONSEJO DE SEGURIDAD NACIONAL201

    Artículo 106. Habrá un Consejo de Seguridad Nacional encargado de asesorar al Presidente de la República en las materias vinculadas a la seguridad nacional y de ejercer las demás funciones que esta Constitución le encomienda. Será presidido por el Jefe del Estado y estará integrado por los Presidentes del Senado, de la Cámara de Diputados y de la Corte Suprema, por los Comandantes en Jefe de las Fuerzas Armadas, por el General Director de Carabineros y por el Contralor General de la República.

    En los casos que el Presidente de la República lo determine, podrán estar presentes en sus sesiones los ministros encargados del gobierno interior, de la defensa nacional, de la seguridad pública, de las relaciones exteriores y de la economía y finanzas del país.202

    Artículo 107. El Consejo de Seguridad Nacional se reunirá cuando sea convocado por el Presidente de la República y requerirá como quórum para sesionar el de la mayoría absoluta de sus integrantes.

    El Consejo no adoptará acuerdos sino para dictar el reglamento a que se refiere el inciso final de la presente disposición. En sus sesiones, cualquiera de sus integrantes podrá expresar su opinión frente a algún hecho, acto o materia que diga relación con las bases de la institucionalidad o la seguridad nacional.

    Las actas del Consejo serán públicas, a menos que la mayoría de sus miembros determine lo contrario.

    Un reglamento dictado por el propio Consejo establecerá las demás disposiciones concernientes a su organización, funcionamiento y publicidad de sus debates.203

    CAPITULO XIII. BANCO CENTRAL204

    Artículo 108. Existirá un organismo autónomo, con patrimonio propio, de carácter técnico, denominado Banco Central, cuya composición, organización, funciones y atribuciones determinará una ley orgánica constitucional.

    Artículo 109. El Banco Central sólo podrá efectuar operaciones con instituciones financieras, sean públicas o privadas. De manera alguna podrá otorgar a ellas su garantía, ni adquirir documentos emitidos por el Estado, sus organismos o empresas.

    Ningún gasto público o préstamo podrá financiarse con créditos directos o indirectos del Banco Central.

    Con todo, en caso de guerra exterior o de peligro de ella, que calificará el Consejo de Seguridad Nacional, el Banco Central podrá obtener, otorgar o financiar créditos al Estado y entidades públicas o privadas.

    El Banco Central no podrá adoptar ningún acuerdo que signifique de una manera directa o indirecta establecer normas o requisitos diferentes o discriminatorios en relación a personas, instituciones o entidades que realicen operaciones de la misma naturaleza.

    CAPITULO XIV. GOBIERNO Y ADMINISTRACIÓN INTERIOR DEL ESTADO 205

    Artículo 110. Para el gobierno y administración interior del Estado, el territorio de la República se divide en regiones y éstas en provincias. Para los efectos de la administración local, las provincias se dividirán en comunas.

    La creación, supresión y denominación de regiones, provincias y comunas; la modificación de sus límites, así como la fijación de las capitales de las regiones y provincias, serán materia de ley orgánica constitucional.206

    Gobierno y Administración Regional

    Artículo 111. El gobierno de cada región reside en un intendente que será de la exclusiva confianza del Presidente de la República. El intendente ejercerá sus funciones con arreglo a las leyes y a las órdenes e instrucciones del Presidente, de quien es su representante natural e inmediato en el territorio de su jurisdicción.

    La administración superior de cada región radicará en un gobierno regional que tendrá por objeto el desarrollo social, cultural y económico de la región.

    El gobierno regional estará constituido por el intendente y el consejo regional.

    Para el ejercicio de sus funciones, el gobierno regional gozará de personalidad jurídica de derecho público y tendrá patrimonio propio.207

    Artículo 112. Al intendente le corresponderá la coordinación, supervigilancia o fiscalización de los servicios públicos creados por la ley para el cumplimiento de las funciones administrativas que operen en la región208.

    La ley determinará la forma en que el intendente ejercerá estas facultades, las demás atribuciones que le correspondan y los organismos que colaborarán en el cumplimiento de sus funciones.209

    Artículo 113. El consejo regional será un órgano de carácter normativo, resolutivo y fiscalizador, dentro del ámbito propio de competencia del gobierno regional, encargado de hacer efectiva la participación de la ciudadanía regional y ejercer las atribuciones que la ley orgánica constitucional respectiva le encomiende.

    El consejo regional estará integrado por consejeros elegidos por sufragio universal en votación directa, de conformidad con la ley orgánica constitucional respectiva. Durarán cuatro años en sus cargos y podrán ser reelegidos. La misma ley establecerá la organización del consejo regional, determinará el número de consejeros que lo integrarán y su forma de reemplazo, cuidando siempre que tanto la población como el territorio de la región estén equitativamente representados.

    Cesará en su cargo el consejero regional que durante su ejercicio perdiere alguno de los requisitos de elegibilidad o incurriere en alguna de las inhabilidades, incompatibilidades, incapacidades u otras causales de cesación que la ley orgánica constitucional establezca.

    Lo señalado en los incisos precedentes respecto del consejo regional y de los consejeros regionales será aplicable, en lo que corresponda, a los territorios especiales a que se refiere el artículo 126 bis.

    El consejo regional, por mayoría absoluta de sus integrantes en ejercicio, elegirá un presidente de entre sus miembros.

    El presidente del consejo durará cuatro años en su cargo y cesará en él en caso de incurrir en alguna de las causales señaladas en el inciso tercero, por remoción acordada por los dos tercios de los consejeros regionales en ejercicio o por renuncia aprobada por la mayoría de éstos.

    La ley orgánica constitucional determinará las funciones y atribuciones del presidente del consejo regional.

    Corresponderá al consejo regional aprobar el proyecto de presupuesto de la respectiva región considerando, para tal efecto, los recursos asignados a ésta en la Ley de Presupuestos, sus recursos propios y los que provengan de los convenios de programación.

    Los Senadores y Diputados que representen a las circunscripciones y distritos de la región podrán, cuando lo estimen conveniente, asistir a las sesiones del consejo regional y tomar parte en sus debates, sin derecho a voto.210

    Artículo 114. La ley orgánica constitucional respectiva determinará la forma y el modo en que el Presidente de la República podrá transferir a uno o más gobiernos regionales, en carácter temporal o definitivo, una o más competencias de los ministerios y servicios públicos creados para el cumplimiento de la función administrativa, en materias de ordenamiento territorial, fomento de las actividades productivas y desarrollo social y cultural.211

    Artículo 115. Para el gobierno y administración interior del Estado a que se refiere el presente capítulo se observará como principio básico la búsqueda de un desarrollo territorial armónico y equitativo. Las leyes que se dicten al efecto deberán velar por el cumplimiento y aplicación de dicho principio, incorporando asimismo criterios de solidaridad entre las regiones, como al interior de ellas, en lo referente a la distribución de los recursos públicos.

    Sin perjuicio de los recursos que para su funcionamiento se asignen a los gobiernos regionales en la Ley de Presupuestos de la Nación y de aquellos que provengan de lo dispuesto en el No. 20 del artículo 19, dicha ley contemplará una proporción del total de los gastos de inversión pública que determine, con la denominación de fondo nacional de desarrollo regional.

    La Ley de Presupuestos de la Nación contemplará, asimismo, gastos correspondientes a inversiones sectoriales de asignación regional cuya distribución entre regiones responderá a criterios de equidad y eficiencia, tomando en consideración los programas nacionales de inversión correspondientes. La asignación de tales gastos al interior de cada región corresponderá al gobierno regional.

    A iniciativa de los gobiernos regionales o de uno o más ministerios podrán celebrarse convenios anuales o plurianuales de programación de inversión pública entre gobiernos regionales, entre éstos y uno o más ministerios o entre gobiernos regionales y municipalidades, cuyo cumplimiento será obligatorio. La ley orgánica constitucional respectiva establecerá las normas generales que regularán la suscripción, ejecución y exigibilidad de los referidos convenios.212

    La ley podrá autorizar a los gobiernos regionales y a las empresas públicas para asociarse con personas naturales o jurídicas a fin de propiciar actividades e iniciativas sin fines de lucro que contribuyan al desarrollo regional. Las entidades que al efecto se constituyan se regularán por las normas comunes aplicables a los particulares.

    Lo dispuesto en el inciso anterior se entenderá sin perjuicio de lo establecido en el número 21º del artículo 19.213

    Gobierno y Administración Provincial

    Artículo 116. En cada provincia existirá una gobernación que será un órgano territorialmente desconcentrado del intendente. Estará a cargo de un gobernador, quien será nombrado y removido libremente por el Presidente de la República.214

    Corresponde al gobernador ejercer, de acuerdo a las instrucciones del intendente, la supervigilancia de los servicios públicos existentes en la provincia. La ley determinará las atribuciones que podrá delegarle el intendente y las demás que le corresponden.

    Inciso derogado. 215

    Artículo 117. Los gobernadores, en los casos y forma que determine la ley, podrán designar delegados para el ejercicio de sus facultades en una o más localidades.

    Administración Comunal 216- 217

    Artículo 118. La administración local de cada comuna o agrupación de comunas que determine la ley reside en una municipalidad, la que estará constituida por el alcalde, que es su máxima autoridad, y por el concejo.

    La ley orgánica constitucional respectiva establecerá las modalidades y formas que deberá asumir la participación de la comunidad local en las actividades municipales.

    Los alcaldes, en los casos y formas que determine la ley orgánica constitucional respectiva, podrán designar delegados para el ejercicio de sus facultades en una o más localidades.

    Las municipalidades son corporaciones autónomas de derecho público, con personalidad jurídica y patrimonio propio, cuya finalidad es satisfacer las necesidades de la comunidad local y asegurar su participación en el progreso económico, social y cultural de la comuna.

    Una ley orgánica constitucional determinará las funciones y atribuciones de las municipalidades. Dicha ley señalará, además, las materias de competencia municipal que el alcalde, con acuerdo del concejo o a requerimiento de los 2/3 de los concejales en ejercicio, o de la proporción de ciudadanos que establezca la ley, someterá a consulta no vinculante o a plebiscito, así como las oportunidades, forma de la convocatoria y efectos.

    Las municipalidades podrán asociarse entre ellas en conformidad a la ley orgánica constitucional respectiva, pudiendo dichas asociaciones gozar de personalidad jurídica de derecho privado. Asimismo, podrán constituir o integrar corporaciones o fundaciones de derecho privado sin fines de lucro cuyo objeto sea la promoción y difusión del arte, la cultura y el deporte, o el fomento de obras de desarrollo comunal y productivo. La participación municipal en ellas se regirá por la citada ley orgánica constitucional. 218

    Las municipalidades podrán establecer en el ámbito de las comunas o agrupación de comunas, de conformidad con la ley orgánica constitucional respectiva, territorios denominados unidades vecinales, con el objeto de propender a un desarrollo equilibrado y a una adecuada canalización de la participación ciudadana.

    Los servicios públicos deberán coordinarse con el municipio cuando desarrollen su labor en el territorio comunal respectivo, en conformidad con la ley.

    La ley determinará la forma y el modo en que los ministerios, servicios públicos y gobiernos regionales podrán transferir competencias a las municipalidades, como asimismo el carácter provisorio o definitivo de la transferencia.219

    Artículo 119. En cada municipalidad habrá un concejo integrado por concejales elegidos por sufragio universal en conformidad a la ley orgánica constitucional de municipalidades. Durarán cuatro años en sus cargos y podrán ser reelegidos. La misma ley determinará el número de concejales y la forma de elegir al alcalde.

    El concejo será un órgano encargado de hacer efectiva la participación de la comunidad local, ejercerá funciones normativas, resolutivas y fiscalizadoras y otras atribuciones que se le encomienden, en la forma que determine la ley orgánica constitucional respectiva.

    La ley orgánica de municipalidades determinará las normas sobre organización y funcionamiento del concejo y las materias en que la consulta del alcalde al concejo será obligatoria y aquellas en que necesariamente se requerirá el acuerdo de éste. En todo caso, será necesario dicho acuerdo para la aprobación del plan comunal de desarrollo, del presupuesto municipal y de los proyectos de inversión respectivos. 220

    Artículo 120. La ley orgánica constitucional respectiva regulará la administración transitoria de las comunas que se creen, el procedimiento de instalación de las nuevas municipalidades, de traspaso del personal municipal y de los servicios y los resguardos necesarios para cautelar el uso y disposición de los bienes que se encuentren situados en los territorios de las nuevas comunas.

    Asimismo, la ley orgánica constitucional de municipalidades establecerá los procedimientos que deberán observarse en caso de supresión o fusión de una o más comunas.221

    Artículo 121. Las municipalidades, para el cumplimiento de sus funciones, podrán crear o suprimir empleos y fijar remuneraciones, como también establecer los órganos o unidades que la ley orgánica constitucional respectiva permita.

    Estas facultades se ejercerán dentro de los límites y requisitos que, a iniciativa exclusiva del Presidente de la República, determine la ley orgánica constitucional de municipalidades.222

    Artículo 122. Las municipalidades gozarán de autonomía para la administración de sus finanzas. La Ley de Presupuestos de la Nación podrá asignarles recursos para atender sus gastos, sin perjuicio de los ingresos que directamente se les confieran por la ley o se les otorguen por los gobiernos regionales respectivos. Una ley orgánica constitucional contemplará un mecanismo de redistribución solidaria de los ingresos propios entre las municipalidades del país con la denominación de fondo común municipal. Las normas de distribución de este fondo serán materia de ley.223

    Disposiciones Generales

    Artículo 123. La ley establecerá fórmulas de coordinación para la administración de todos o algunos de los municipios, con respecto a los problemas que les sean comunes, así como entre los municipios y los demás servicios públicos.224

    Sin perjuicio de lo dispuesto en el inciso anterior, la ley orgánica constitucional respectiva regulará la administración de las áreas metropolitanas, y establecerá las condiciones y formalidades que permitan conferir dicha calidad a determinados territorios.225

    Artículo 124. Para ser designado intendente o gobernador y para ser elegido consejero regional, alcalde o concejal, se requerirá ser ciudadano con derecho a sufragio, tener los demás requisitos de idoneidad que la ley señale y residir en la región a lo menos en los últimos dos años anteriores a su designación o elección.

    Los cargos de intendente, gobernador, consejero regional, alcalde y concejal serán incompatibles entre sí.

    Ningún intendente, gobernador o presidente del consejo regional, desde el día de su designación o elección, según el caso, puede ser acusado o privado de su libertad, salvo el caso de delito flagrante, si el Tribunal de Alzada de la jurisdicción respectiva, en pleno, no autoriza previamente la acusación declarando haber lugar a la formación de causa. De esta resolución podrá apelarse ante la Corte Suprema.

    En caso de ser arrestado algún intendente, gobernador o presidente de consejo regional por delito flagrante, será puesto inmediatamente a disposición del Tribunal de Alzada respectivo, con la información sumaria correspondiente. El Tribunal procederá, entonces, conforme a lo dispuesto en el inciso anterior.

    Desde el momento en que se declare, por resolución firme, haber lugar a formación de causa, queda el intendente, gobernador o presidente del consejo regional imputado suspendido de su cargo y sujeto al juez competente.226

    Artículo 125. Las leyes orgánicas constitucionales respectivas establecerán las causales de cesación en los cargos de alcalde, consejero regional y concejal.227

    Artículo 126. La ley determinará la forma de resolver las cuestiones de competencia que pudieren suscitarse entre las autoridades nacionales, regionales, provinciales y comunales.

    Asimismo, establecerá el modo de dirimir las discrepancias que se produzcan entre el intendente y el consejo regional, así como entre el alcalde y el concejo.228

    Disposiciones Especiales229

    Artículo 126 bis.- Son territorios especiales los correspondientes a Isla de Pascua y al Archipiélago Juan Fernández. El Gobierno y Administración de estos territorios se regirá por los estatutos especiales que establezcan las leyes orgánicas constitucionales respectivas.

    CAPITULO XV. REFORMA DE LA CONSTITUCIÓN

    Artículo 127. Los proyectos de reforma de la Constitución podrán ser iniciados por mensaje del Presidente de la República o por moción de cualquiera de los miembros del Congreso Nacional, con las limitaciones señaladas en el inciso primero del artículo 65.

    El proyecto de reforma necesitará para ser aprobado en cada Cámara el voto conforme de las tres quintas partes de los diputados y senadores en ejercicio. Si la reforma recayere sobre los capítulos I, III, VII, XI, XII o XV, necesitará, en cada cámara, la aprobación de las dos terceras partes de los diputados y senadores en ejercicio.230

    En lo no previsto en este capítulo, serán aplicables a la tramitación de los proyectos de reforma constitucional las normas sobre formación de la ley, debiendo respetarse siempre los quórum señalados en el inciso anterior.231

    Artículo 128. El proyecto que aprueben ambas Cámaras pasará al Presidente de la República. 232

    Si el Presidente de la República rechazare totalmente un proyecto de reforma aprobado por ambas Cámaras y éstas insistieren en su totalidad por las dos terceras partes de ls miembros en ejercicio de cada Cámara, el Presidente deberá promulgar dicho proyecto, a menos que consulte a la ciudadanía mediante plebiscito.233

    Si el Presidente observare parcialmente un proyecto de reforma aprobado por ambas Cámaras, las observaciones se entenderán aprobadas con el voto conforme de las tres quintas o dos terceras partes de los miembros en ejercicio de cada Cámara, según corresponda de acuerdo con el artículo anterior y se devolverá al Presidente para su promulgación.

    Si el Presidente de la República rechazare totalmente un proyecto de reforma aprobado por ambas Cámaras y éstas insistieren en su totalidad por las dos terceras partes de los miembros en ejercicio de cada Cámara, el Presidente deberá promulgar dicho proyecto, a menos que consulte a la ciudadanía mediante plebiscito.

    Si el Presidente observare parcialmente un proyecto de reforma aprobado por ambas Cámaras, las observaciones se entenderán aprobadas con el voto conforme de las tres quintas o dos terceras partes de los miembros en ejercicio de cada Cámara, según corresponda de acuerdo con el artículo anterior y se devolverá al Presidente para su promulgación.234

    En caso de que las Cámaras no aprueben todas o algunas de las observaciones del Presidente, no habrá reforma constitucional sobre los puntos en discrepancia, a menos que ambas Cámaras insistieren por los dos tercios de sus miembros en ejercicio en la parte del proyecto aprobado por ellas. En este último caso, se devolverá al Presidente la parte del proyecto que haya sido objeto de insistencia para su promulgación, salvo que éste consulte a la ciudadanía para que se pronuncie mediante un plebiscito, respecto de las cuestiones en desacuerdo.

    La ley orgánica constitucional relativa al Congreso regulará en lo demás lo concerniente a los vetos de los proyectos de reforma y a su tramitación en el Congreso.235

    Artículo 129. La convocatoria a plebiscito deberá efectuarse dentro de los treinta días siguientes a aquel en que ambas Cámaras insistan en el proyecto aprobado por ellas, y se ordenará mediante decreto supremo que fijará la fecha de la votación plebiscitaria, la que no podrá tener lugar antes de treinta días ni después de sesenta, contado desde la publicación de dicho decreto. Transcurrido este plazo sin que el Presidente convoque a plebiscito, se promulgará el proyecto que hubiere aprobado el Congreso.

    El decreto de convocatoria contendrá, según corresponda, el proyecto aprobado por el Congreso Pleno y vetado totalmente por el Presidente de la República, o las cuestiones del proyecto en las cuales el Congreso haya insistido. En este último caso, cada una de las cuestiones en desacuerdo deberá ser votada separadamente en el plebiscito.

    El Tribunal Calificador comunicará al Presidente de la República el resultado del plebiscito, y especificará el texto del proyecto aprobado por la ciudadanía, el que deberá ser promulgado como reforma constitucional dentro de los cinco días siguientes a dicha comunicación.

    Una vez promulgado el proyecto y desde la fecha de su vigencia, sus disposiciones formarán parte de la Constitución y se tendrán por incorporadas a ésta.236

    DISPOSICIONES TRANSITORIAS237

    Primera.

    Mientras se dictan las disposiciones que dan cumplimiento a lo prescrito en el inciso tercero del número 1º del artículo 19 de esta Constitución, continuarán rigiendo los preceptos legales actualmente en vigor.

    Segunda.

    Mientras se dicta el nuevo Código de Minería, que deberá regular, entre otras materias, la forma, condiciones y efectos de las concesiones mineras a que se refieren los incisos séptimo al décimo del número 24º del artículo 19 de esta Constitución Política, los titulares de derechos mineros seguirán regidos por la legislación que estuviere en vigor al momento en que entre en vigencia esta Constitución, en calidad de concesionarios.

    Los derechos mineros a que se refiere el inciso anterior subsistirán bajo el imperio del nuevo Código, pero en cuanto a sus goces y cargas y en lo tocante a su extinción, prevalecerán las disposiciones de dicho nuevo Código de Minería. Este nuevo Código deberá otorgar plazo a los concesionarios para cumplir los nuevos requisitos que se establezcan para merecer amparo legal.

    En el lapso que medie entre el momento en que se ponga en vigencia esta Constitución y aquél en que entre en vigor el nuevo Código de Minería, la constitución de derechos mineros con el carácter de concesión señalado en los incisos séptimo al décimo del número 24º del artículo 19 de esta Constitución, continuará regida por la legislación actual, al igual que las concesiones mismas que se otorguen.238

    Tercera.

    La gran minería del cobre y las empresas consideradas como tal, nacionalizadas en virtud de lo prescrito en la disposición 17º transitoria de la Constitución Política de 1925, continuará rigiéndose por las normas constitucionales vigentes a la fecha de promulgación de esta Constitución.

    Cuarta.

    Se entenderá que las leyes actualmente en vigor sobre materias que conforme a esta Constitución deben ser objeto de leyes orgánicas constitucionales o aprobadas con quórum calificado, cumplen estos requisitos y seguirán aplicándose en lo que no sean contrarias a la Constitución, mientras no se dicten los correspondientes cuerpos legales.

    Quinta.

    No obstante lo dispuesto en el número 6º del artículo 32, mantendrán su vigencia los preceptos legales que a la fecha de promulgación de esta Constitución hubieren reglado materias no comprendidas en el artículo 63, mientras ellas no sean expresamente derogadas por ley.

    Sexta.

    Sin perjuicio de lo dispuesto en el inciso tercero del número 20.º del artículo 19, mantendrán su vigencia las disposiciones legales que hayan establecido tributos de afectación a un destino determinado, mientras no sean expresamente derogadas.

    Séptima.

    El indulto particular será siempre procedente respecto de los delitos a que se refiere el artículo 9º cometidos antes del 11 de Marzo de 1990. Una copia del Decreto respectivo se remitirá, en carácter reservado, al Senado.239

    Octava.

    Las normas del capítulo VII “Ministerio Público”, regirán al momento de entrar en vigencia la ley orgánica constitucional del Ministerio Público. Esta ley podrá establecer fechas diferentes para la entrada en vigor de sus disposiciones, como también determinar su aplicación gradual en las diversas materias y regiones del país.

    El capítulo VII “Ministerio Público”, la ley orgánica constitucional del Ministerio Público y las leyes que, complementando dichas normas, modifiquen el Código Orgánico de Tribunales y el Código de Procedimiento Penal, se aplicarán exclusivamente a los hechos acaecidos con posterioridad a la entrada en vigencia de tales disposiciones.240

    Novena.

    No obstante lo dispuesto en el artículo 87, en la quina y en cada una de las ternas que se formen para proveer por primera vez los cargos de Fiscal Nacional y de Fiscales Regionales, la Corte Suprema y las Cortes de Apelaciones podrán incluir, respectivamente, a un miembro activo del Poder Judicial.241

    Décima.

    Las atribuciones otorgadas a las municipalidades en el artículo 121, relativas a la modificación de la estructura orgánica, de personal y de remuneraciones, serán aplicables cuando se regulen en la ley respectiva las modalidades, requisitos y limitaciones para el ejercicio de estas nuevas competencias.242

    Decimoprimera.

    En el año siguiente a la fecha de publicación de la presente ley de reforma constitucional no podrán figurar en las nóminas para integrar la Corte Suprema quienes hayan desempeñado los cargos de Presidente de la República, diputado, senador, Ministro de Estado, intendente, gobernador o alcalde.243

    Decimosegunda.

    El mandato del Presidente de la República en ejercicio será de seis años, no pudiendo ser reelegido para el período siguiente.244

    Decimotercera.

    El Senado estará integrado únicamente por senadores electos en conformidad con el artículo 49 de la Constitución Política de la República y la Ley Orgánica Constitucional sobre Votaciones Populares y Escrutinios actualmente vigentes.

    Las modificaciones a la referida Ley Orgánica sobre Votaciones Populares y Escrutinios que digan relación con el número de senadores, las circunscripciones existentes y el sistema electoral vigente, requerirán del voto conforme de las tres quintas partes de los diputados y senadores en ejercicio.

    Los senadores en actual ejercicio incorporados o designados en conformidad a las letras a), b), c), d), e) y f) del artículo 49 que se derogan, continuarán desempeñando sus funciones hasta el 10 de marzo de 2006. 245

    Decimocuarta.

    El reemplazo de los actuales Ministros y el nombramiento de los nuevos integrantes del Tribunal Constitucional, se efectuará conforme a las reglas siguientes:

    Los actuales Ministros nombrados por el Presidente de la República, el Senado, la Corte Suprema y el Consejo de Seguridad Nacional se mantendrán en funciones hasta el término del período por el cual fueron nombrados o hasta que cesen en sus cargos.

    El reemplazo de los Ministros designados por el Consejo de Seguridad Nacional corresponderá al Presidente de la República.

    El Senado nombrará tres Ministros del Tribunal Constitucional, dos directamente y el tercero previa propuesta de la Cámara de Diputados. Éste último durará en el cargo hasta el mismo día en que cese el actualmente nombrado por el Senado o quién lo reemplace en conformidad al inciso séptimo de este artículo, y podrá ser reelegido.

    Los actuales Ministros de la Corte Suprema que lo sean a su vez del Tribunal Constitucional, quedarán suspendidos temporalmente en el ejercicio de sus cargos en dicha Corte, seis meses después que se publique la presente reforma constitucional y sin afectar sus derechos funcionarios. Reasumirán esos cargos al término del período por el cual fueron nombrados en el Tribunal Constitucional o cuando cesen en este último por cualquier motivo.

    La Corte Suprema nominará, en conformidad a la letra c) del artículo 92, los abogados indicados en la medida que se vayan generando las vacantes correspondientes. No obstante, el primero de ellos será nombrado por tres años, el segundo por seis años y el tercero por nueve años. El que haya sido nombrado por tres años podrá ser reelegido.

    Si alguno de los actuales Ministros no contemplados en el inciso anterior cesare en su cargo, se reemplazará por la autoridad indicada en las letras a) y b) del artículo 92, según corresponda, y su período durará por lo que reste a su antecesor, pudiendo éstos ser reelegidos.

    Los Ministros nombrados en conformidad a esta disposición deberán ser designados con anterioridad al 11 de diciembre de 2005 y entrarán en funciones el 1 de enero de 2006. 246

    Decimoquinta.

    Los tratados internacionales aprobados por el Congreso Nacional con anterioridad a la entrada en vigor de la presente reforma constitucional, que versen sobre materias que conforme a la Constitución deben ser aprobadas por la mayoría absoluta o las cuatro séptimas partes de los diputados y senadores en ejercicio, se entenderá que han cumplido con estos requisitos.

    Las contiendas de competencia actualmente trabadas ante la Corte Suprema y las que lo sean hasta la entrada en vigor de las modificaciones al Capítulo VIII, continuarán radicadas en dicho órgano hasta su total tramitación.

    Los procesos iniciados, de oficio o a petición de parte, o que se iniciaren en la Corte Suprema para declarar la inaplicabilidad de un precepto legal por ser contrario a la Constitución, con anterioridad a la aplicación de las reformas al Capítulo VIII, seguirán siendo de conocimiento y resolución de esa Corte hasta su completo término.247

    Decimosexta.

    Las reformas introducidas al Capítulo VIII entran en vigor seis meses después de la publicación de la presente reforma constitucional con la excepción de lo regulado en la Disposición Decimocuarta.248

    Decimoséptima.

    Las Fuerzas de Orden y Seguridad Pública seguirán siendo dependientes del Ministerio encargado de la Defensa Nacional hasta que se dicte la nueva ley que cree el Ministerio encargado de la Seguridad Pública.249

    Decimoctava.

    Las modificaciones dispuestas en el artículo 57, Nº 2, comenzarán a regir después de la próxima elección general de parlamentarios.250

    Decimonovena.

    No obstante, la modificación al artículo 16, N° 2, de esta Constitución, también se suspenderá el derecho de sufragio de las personas procesadas por hechos anteriores al 16 de junio de 2005, por delitos que merezcan pena aflictiva o por delito que la ley califique como conducta terrorista.251

    Vigésima.

    En tanto no se creen los tribunales especiales a que alude el párrafo cuarto del número 16 del artículo 19, las reclamaciones motivadas por la conducta ética de los profesionales que no pertenezcan a colegios profesionales, serán conocidas por los tribunales ordinarios.252

    Vigésimo primera.

    La reforma introducida al numeral 10º del artículo 19 en relación al segundo nivel de transición de la educación parvularia, entrará en vigencia gradualmente, en la forma que disponga la ley. 253

    Vigésimo segunda.

    Mientras no entren en vigencia los estatutos especiales a que se refiere el artículo 126 bis, los territorios especiales de Isla de Pascua y Archipiélago Juan Fernández continuarán rigiéndose por las normas comunes en materia de división político-administrativa y de gobierno y administración interior del Estado. 254

    Vigésima tercera.

    Las reformas introducidas a los artículos 15 y 18 sobre voluntariedad del voto e incorporación al registro electoral por el solo ministerio de la ley, regirán al momento de entrar en vigencia la respectiva ley orgánica constitucional a que se refiere el inciso segundo del artículo 18 que se introduce mediante dichas reformas. 255

    Vigésimo cuarta.

    El Estado de Chile podrá reconocer la jurisdicción de la Corte Penal Internacional en los términos previstos en el tratado aprobado en la ciudad de Roma, el 17 de julio de 1998, por la Conferencia Diplomática de Plenipotenciarios de las Naciones Unidas sobre el establecimiento de dicha Corte.

    Vigésimo quinta.

    La modificación introducida en el inciso cuarto del artículo 60, entrará en vigencia transcurridos ciento ochenta días a contar de la publicación de esta ley en el Diario Oficial. 256

    Al efectuar ese reconocimiento, Chile reafirma su facultad preferente para ejercer su jurisdicción penal en relación con la jurisdicción de la Corte. Esta última será subsidiaria de la primera, en los términos previstos en el Estatuto de Roma que creó la Corte Penal Internacional.

    La cooperación y asistencia entre las autoridades nacionales competentes y la Corte Penal Internacional, así como los procedimientos judiciales y administrativos a que hubiere lugar, se sujetarán a lo que disponga la ley chilena.

    La jurisdicción de la Corte Penal Internacional, en los términos previstos en su Estatuto, sólo se podrá ejercer respecto de los crímenes de su competencia cuyo principio de ejecución sea posterior a la entrada en vigor en Chile del Estatuto de Roma. 257

    ANÓTESE, TÓMESE RAZÓN Y PUBLÍQUESE.

    RICARDO LAGOS ESCOBAR, Presidente de la República;

    FRANCISCO VIDAL SALINAS, Ministro del Interior;

    IGNACIO WALKER PRIETO, Ministro de Relaciones Exteriores;

    JAIME RAVINET DE LA FUENTE, Ministro de Defensa Nacional;

    NICOLÁS EYZAGUIRRE GUZMÁN, Ministro de Hacienda;

    EDUARDO DOCKENDORFF VALLEJOS, Ministro Secretario General de la Presidencia;

    OSVALDO PUCCIO HUIDOBRO, Ministro Secretario General de Gobierno;

    JORGE RODRÍGUEZ GROSSI, Ministro de Economía, Fomento y Reconstrucción y Presidente de la Comisión Nacional de Energía;

    YASNA PROVOSTE CAMPILLAY, Ministra de Planificación y Cooperación;

    SERGIO BITAR CHACRA, Ministro de Educación;

    LUIS BATES HIDALGO, Ministro de Justicia;

    YERKO LJUBETIC GODOY, Ministro del Trabajo y Previsión Social;

    JAIME ESTEVEZ VALENCIA, Ministro de Obras Públicas y de Transportes y Telecomunicaciones;

    PEDRO GARCÍA ASPILLAGA, Ministro de Salud;

    SONIA TSCHORNE BERESTESY, Ministra de Vivienda y Urbanismo y de Bienes Nacionales;

    JAIME CAMPOS QUIROGA, Ministro de Agricultura;

    ALFONSO DULANTO RENCORET, Ministro de Minería.

    ————————————————————————-

    1 Texto actualizado al 1 de octubre de 2005. Incluye las reformas introducidas por las leyes 18.825, 19.055, 19.097, 19.295,19.448 , 19.519, 19.526 , 19.541, 19.597, 19.611, 19.634, 19.643 , 19.671, 19.672, 19.742 ; 19.876, 20.050, 20.162, 20.193, 20.245, 20.337, 20.346, 20.352, 20.354 y 20.390 y 20.414.

    2 Inciso modificado por el artículo único, N° 1 de la ley de Reforma Constitucional N° 19.611.

    3 Artículo sustituido por el artículo 1°, N° 1, de la ley de Reforma Constitucional N° 20.050. Anteriormente había sido sustituido por el artículo 1° de la ley de Reforma Constitucional N° 19.097.

    4 Inciso modificado por el artículo único, N° 1 de la ley de Reforma Constitucional N° 18.825. Ver, además, Pacto Internacional de Derechos Civiles y Políticos de 1966 (Decreto N° 778, D.O. 29 de abril de 1989; Pacto Internacional de Derechos Económicos, Sociales y Culturales de 1966 (Decreto N° 326, D.O. 27 de mayo de 1989; Convención Americana sobre Derechos Humanos (Pacto de San José de Costa Rica, Decreto N° 873, D.O. 5 de enero de 1991).

    5 Inciso modificado por el artículo 1°, N° 1, de la ley de Reforma Constitucional N° 20.050.

    6 Artículo incorporado por el artículo 1°, N° 3, de la ley de Reforma Constitucional N° 20.050. Anteriormente había sido derogado por el artículo único, N° 2, de la ley de Reforma Constitucional N° 18.825.

    7 Incisos tercero y cuarto agregados por el artículo único, N° 1, de la ley de Reforma Constitucional N° 20.414.

    8 Inciso modificado por el artículo único, Nº 3 de la ley de Reforma Constitucional Nº 18.825.

    9 Véase la ley Nº 18.314, que determina las conductas terroristas y fija su penalidad. Véase el decreto Nº 263, del 2004, del Ministerio de Relaciones Exteriores que promulga la Convención Interamericana contra el Terrorismo.

    10 Inciso sustituido por el artículo único, Nº 1, de la ley de Reforma Constitucional Nº 19.055. Véase la ley Nº 19.734, que reemplazó la pena de muerte por la presidio perpetuo calificado en diversos textos legales.

    11 Número sustituido por el artículo 1º, Nº 4, letra b) de la ley de Reforma Constitucional Nº 20.050.  El primitivo número 2º fue eliminado por el artículo 1º, Nº 4, letra b) de la ley de Reforma Constitucional Nº 20.050.

    12 Número reemplazado por el artículo 1º, Nº 4, letra c) de la ley de Reforma Constitucional Nº 20.050.

    13 Véase el Decreto Supremo Nº 5.142, de 1960, que fija el texto refundido de las disposiciones sobre nacionalización de extranjeros.

    14 Número sustituido por el artículo 1º, Nº 5, letra a) de la ley de Reforma Constitucional Nº 20.050.

    15 El primitivo Nº 3º fue derogado por el artículo 1º, Nº 5, letra b) de la Ley de Reforma Constitucional Nº 20.050.

    16 Inciso agregado por el artículo 1º, Nº 6, de la ley de Reforma Constitucional Nº 20.050.

    17 Inciso agregado por el artículo 1º, Nº 7 de la ley de Reforma Constitucional Nº 20.050.

    18 Inciso sustituido por el artículo único, N° 1 de la ley de Reforma Constitucional N° 20.337.

    19 Número modificado por el artículo 1º, Nº 8 de la ley de Reforma Constitucional Nº 20.050.

    20 Número modificado por el artículo único, Nº 4 de la ley de Reforma Constitucional Nº 18.825.

    21 Véase el Reglamento para otorgar el beneficio de rehabilitación de la ciudadanía, de 1989.

    22 Número modificado por el artículo 1°, Nº 9 letra a) de la ley de Reforma Constitucional Nº 20.050.

    23 Inciso reemplazado por el artículo 1º, Nº 9, letra b) de la ley de Reforma Constitucional Nº 20.050.

    24 Inciso modificado por el artículo único, N° 2, letra a) de la ley de Reforma Constitucional N° 20.337.

    25 Inciso agregado por el artículo único, N° 2, letra b) de la ley de Reforma Constitucional N° 20.337.

    26 Véanse la ley Nº 18.556, Orgánica Constitucional sobre sistema de inscripciones electorales y servicio electoral, y la ley Nº 18.700, Orgánica Constitucional sobre votaciones populares ye escrutinios. Véase además la ley Nº 19.884, sobre transparencia, límite y control del gasto electoral.

    27 Véase el artículo único de la ley Nº 18.826, que reemplazó el artículo 119 del Código Sanitario estableciendo: “No podrá ejecutarse ninguna acción cuyo fin sea provocar un aborto”.

    28 Véase la primera disposición transitoria de esta Constitución Política.  Véase además la ley Nº 19.734, que reemplazó la pena de muerte por la de presidio perpetuo calificado en diversos textos legales.

    29 Párrafo modificado, por el artículo único, Nº 2 de la ley de Reforma Constitucional Nº 19.611.

    30 Véase el Decreto Nº 789, de 1989, que promulga la convención sobre eliminación de todas las formas de discriminación contra la mujer, adoptada por la Asamblea Nacional de Las Naciones Unidas de 18 de diciembre de 1979.

    31 Párrafo sustituido por el artículo 1º, Nº 10, letra a) de la ley de Reforma Constitucional Nº 20.050.

    32 Frase reemplazada por el artículo único, Nº 1, de la ley de Reforma Constitucional Nº 19.519.

    33 Número sustituido por el artículo 1º, Nº 10, letra b) de la ley de Reforma Constitucional Nº 20.050.

    34 Véase el artículo único de la ley Nº 19.423, que incorpora un párrafo 5 al Título III del Libro II del Código Penal que trata de los delitos contra el respeto y protección a la vida privada y pública de la persona y familia. Véase además la ley Nº 19.628, sobre protección de datos de carácter personal.

    35 Véase la ley Nº 19.638 que establece normas sobre la constitución jurídica de las iglesias y organizaciones religiosas.

    36 Letra sustituida por el artículo 1º, Nº 10, letra c), Nº 1 de la ley de Reforma Constitucional Nº 20.050.Anteriormente había sido modificada por la ley de Reforma Constitucional Nº 19.055.

    37 Letra modificada por el artículo 1º, Nº 10, letra c), Nº 2 de la ley de Reforma Constitucional Nº 20.050.

    38 Véase el auto acordado que reglamenta el procedimiento para obtener la declaración previa de la acción indemnizatoria que concede esta letra de 24 de mayo de 1996.

    39 Véase la ley Nº 19.300, que aprueba la ley sobre bases generales del medio ambiente.

    40 Véase la ley Nº 18.469, que regula el ejercicio del derecho constitucional a la protección de la salud.

    41 Párrafo agregado por el artículo único de la ley de Reforma Constitucional Nº 19.634.

    42 Sustituido el párrafo anterior por la ley de Reforma Constitucional N° 20.162

    43 Inciso sustituido por el artículo único de la ley de Reforma Constitucional Nº 19.876.

    44 Véase la ley Nº 18.962 Orgánica Constitucional de Enseñanza.

    45 Inciso modificado por el artículo único, Nº 5, de la ley de Reforma Constitucional Nº 18.825.  Véase la ley Nº 18.838, que crea el Consejo Nacional de Televisión.

    46 Párrafo reemplazado por el artículo único, letra a) de la ley de Reforma Constitucional Nº 19.742.

    47 Véase la ley Nº 19.733, sobre libertad de opinión e información y ejercicio del periodismo.

    48 Véase la ley Nº 19.846, sobre Calificación de la Producción Cinematográfica. Véase el Decreto Supremo Nº 18 del Ministerio de Educación que aprueba el Reglamento sobre Calificación de la Producción Cinematográfica.

    49 Véase el secreto Supremo Nº 1.086, del Ministerio del Interior.

    50 Oración que reemplaza la segunda oración del párrafo quinto del número 15°, del artículo 19, agregada por el artículo único, N° 2, de la ley de Reforma Constitucional N° 20.414.

    51 Inciso modificado por el artículo único, Nº 7, de la ley de Reforma Constitucional Nº 18.825. Véase la ley Nº 18.603 Orgánica Constitucional sobre partidos políticos.

    52 Inciso agregado por el artículo único, Nº 8 de la ley de Reforma Constitucional Nº 18.825.

    53 Inciso agregado por el artículo único, Nº 8 de la ley de Reforma Constitucional Nº 18.825.

    54 Inciso agregado por el artículo único, Nº 8 de la ley de Reforma Constitucional Nº 18.825.

    55 Párrafo agregado por el artículo 1º, Nº 10, letra d) de la ley de Reforma Constitucional Nº 20.050.

    56 Inciso modificado por el artículo único Nº 9 de la ley de Reforma Constitucional Nº 18.825.

    57 Inciso reemplazado por el artículo 2º de la ley de Reforma Constitucional Nº 19.097.

    58 Véase la ley Nº 18.971 que establece que cualquier persona podrá denunciar las infracciones al artículo 19 Nº 21 de la Constitución Política.

    59 Véase la ley Nº 18152 que declara el alcance de esta garantía constitucional, en materia de pensiones integrantes de un sistema de seguridad social.

    60 Véase el Decreto Ley Nº 2.186, de 1978, que aprueba la ley Orgánica de Procedimientos de Expropiaciones.

    61 Véase la ley Nº 18.097 Orgánica Constitucional sobre Concesiones Mineras.

    62 Véase la “Convención de las Naciones Unidas sobre el Derecho del Mar”, sus Anexos III y IV, el Acuerdo relativo a la aplicación de la parte XI de la Convención, y la Declaración Interpretativa del Gobierno de Chile, depositada junto con el instrumento de ratificación de la referida Convención. Promulgados mediante Decreto Supremo Nº 1.393, de 1997, del Ministerio de Relaciones Exteriores.

    63 Párrafo sustituido por el artículo único, letra b) de la ley de Reforma Constitucional Nº 19.742.

    64 El inciso segundo de este número fue derogado por el artículo único, Nº 10 de la ley de Reforma Constitucional Nº 18.825.

    65 Inciso modificado por el artículo 1º, Nº 11 de la ley de Reforma Constitucional Nº 20.050.

    66 Véase el Auto Acordado de la Corte Suprema, de 24 de junio de 1992, sobre Tramitación del Recurso de Protección de Garantías Constitucionales.

    67 Véase el Auto Acordado de la Corte Suprema, de 19 de diciembre de 1932, sobre tramitación y Fallo del Recurso de Amparo.

    68 Inciso modificado por el artículo único, Nº 11 de la ley de Reforma Constitucional Nº 18.825.

    69 Véase el artículo 10, Nº 3 de la ley Nº 18.593, de los Tribunales Electorales Regionales.

    70 Véase el Decreto Supremo Nº 447, de 1984, del Ministerio del Interior, que crea el Consejo Asesor Económico y Social, dependiente del Ministerio de Interior, presidido por el Ministro del Interior.

    71 Inciso sustituido por el artículo 1º, Nº 12 de la ley de Reforma Constitucional Nº 20.050.

    72 Inciso sustituido por el artículo 1º, Nº 13 de la ley de Reforma Constitucional Nº 20.050.

    73 Inciso sustituido por el artículo 1º, Nº 13 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único de la ley de Reforma Constitucional Nº 18.825.

    74 Inciso modificado por el artículo 1º, Nº 14, letra a) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido reemplazado por el artículo único, Nº 1 de la ley de Reforma Constitucional Nº 19.643.

    75 Inciso modificado por el artículo único, letra a), de la ley de Reforma Constitucional N°20.354.

    76 Inciso reemplazado por el artículo único Nº 1 de la ley de Reforma Constitucional Nº 19.643.

    77 Inciso agregado por el artículo 1º, Nº 14, letra b) de la ley de Reforma Constitucional Nº 20.050.

    78 Inciso agregado por el artículo 1º, Nº 14, letra b) de la ley de Reforma Constitucional Nº 20.050

    79 Inciso reemplazado por el artículo único, Nº 2, letra a) de la ley de Reforma Constitucional Nº 19.643.

    80 Inciso modificado por el artículo único, Nº 2, letra b) de la ley de Reforma Constitucional Nº 19.643.

    81 Inciso reemplazado por el artículo único, letra b), de la ley de Reforma Constitucional N° 20.354.

    82 Inciso sustituido por el artículo 1º, Nº 15 de la ley de Reforma Constitucional Nº 20.050.

    83 Frase intercalada por el artículo único, letra c) de la ley de Reforma Constitucional N° 20.354.

    84 Inciso modificado por el artículo único, Nº 12 de la ley de Reforma Constitucional Nº 18.825.

    85 Inciso modificado por el artículo único, letra d), de la ley de Reforma Constitucional N° 20.354.

    86 Artículo sustituido por el artículo 1º, Nº 16 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido odificado por el artículo único, Nº 13 de la ley de Reforma Constitucional Nº 18.825.

    87 Inciso agregado por el artículo único de la ley de Reforma Constitucional Nº 19.672.

    88 Inciso agregado por el artículo único de la ley de Reforma Constitucional Nº 19.672.

    89 Inciso agregado por el artículo único de la ley de Reforma Constitucional Nº 19.672.

    90 Inciso agregado por el artículo único de la ley de Reforma Constitucional Nº 19.672.

    91 El inciso cuarto de este artículo fue suprimido por el artículo 1º, Nº 17 de la ley de Reforma Constitucional Nº 20.050.

    92 Artículo modificado por el artículo único, Nº 14 de la ley de Reforma Constitucional Nº 18.825.

    93 Número reemplazado por el artículo 1º, Nº 18, letra a) de la ley de Reforma Constitucional Nº 20.050.

    94 Número modificado por el artículo único, Nº 15 de la ley de Reforma Constitucional Nº 18.825.

    95 Los primitivos números 5º y 6º fueron derogados por el artículo único, Nº 16 de la ley de Reforma Constitucional 18.825, y por el artículo 1º, Nº 18, letra b) de la ley de Reforma Constitucional Nº 20.050, respectivamente.

    96 Número modificado por el artículo 3º de la ley de Reforma Constitucional Nº 19.097.

    97 Modificado conforme al artículo 1º, Nº 41 de la Ley de Reforma Constitucional Nº 20.050. Anteriormente había sido sustituido por el artículo único, Nº 1 de la ley de Reforma Constitucional Nº 19.541 y por la ley de Reforma Constitucional Nº 19.519.

    98 Véase la ley Nº 18.050 que fija normas generales para la concesión de indultos.

    99 Inciso agregado por el artículo 1º, Nº 19 de la Ley de Reforma Constitucional Nº 20.050.

    100 Artículo agregado por el artículo único, N° 3, de la ley de Reforma Constitucional N° 20.414.

    101 Inciso modificado por el artículo único Nº 17 de la ley de Reforma Constitucional Nº 18.825.

    102 La ley orgánica constitucional a que hace mención este artículo es la ley Nº 18.575, cuyo texto refundido, coordinado y sistematizado, fue fijado por el decreto con fuerza de ley Nº 1/19.653, de 2001.

    103 Véase la ley Nº 19.880 que establece las bases de los procedimientos administrativos que rigen los actos de los órganos Administración del Estado.

    104 Véase la ley Nº 18.415 Orgánica Constitucional de los Estados de Excepción.

    105 Artículo sustituido por el artículo 1º Nº 20 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido sustituido por el artículo único Nº 18 de la ley de Reforma Constitucional Nº 18.825.

    106 Artículo sustituido por el artículo 1º, Nº 20 de la ley de Reforma Constitucional Nº 20.050.

    107 Artículo sustituido por el artículo 1º, Nº 20 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único Nº 19, 20, 21 y 22 de la ley de Reforma Constitucional Nº 18.825.

    108 Artículo sustituido por el artículo 1º, Nº 20 de la ley de Reforma Constitucional Nº 20.050.

    109 Artículo sustituido por el artículo 1º, Nº 20 de la ley de Reforma Constitucional Nº 20.050.

    110 Artículo sustituido por el artículo 1º, Nº 20 de la ley de Reforma Constitucional Nº 20.050.

    111 Artículo sustituido por el artículo 1º, Nº 20 de la ley de Reforma Constitucional Nº 20.050.

    112 Véase la ley Orgánica Constitucional del Congreso Nacional Nº 18.918.

    113 Véase el Título Final de la ley Nº 18.700 Orgánica Constitucional sobre Votaciones Populares y Escrutinios.

    114 Inciso modificado por el artículo único Nº 23 de la ley de Reforma Constitucional Nº 18.825.

    115 Artículo modificado por el artículo único Nº 24 de la ley de Reforma Constitucional Nº 18.825.

    116 Inciso modificado por el artículo único, N° 1, letra a) de la ley de Reforma Constitucional N° 20.390.

    117 Inciso reemplazado por el artículo 1º, Nº 1, letra b) de la ley de Reforma Constitucional Nº 20.390.

    118 Artículo sustituido por el artículo 1º, Nº 22 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 27 de la ley de Reforma Constitucional Nº 18.825.

    119 Artículo modificado por el artículo 1º, Nº 23 letras a), b) y c) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 28 de la ley de Reforma Constitucional Nº 18.825.

    120 Número sustituido por el artículo 1º, Nº 24 de la ley de Reforma Constitucional Nº 20.050.

    121 Sustituida esta letra por el artículo único, N° 2 de la ley de Reforma Constitucional N° 20.390.

    122 Número modificado por el artículo 1º, Nº 25 letra a) de la ley de Reforma Constitucional Nº 20.050.

    123 Número modificado por el artículo 1º, Nº 25 letra a) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único Nº 3, letra a) de la ley de Reforma Constitucional Nº 19.519 y por el artículo único, Nº 29 de la ley de Reforma Constitucional Nº 18.825.

    124 Número sustituido por el artículo único, Nº 2, de la ley de Reforma Constitucional Nº 19.541. Anteriormente había sido agregado por el artículo único, Nº 3, letra b) de la ley de Reforma Constitucional Nº 19.519.

    125 Inciso reemplazado por el artículo único, Nº 30 de la ley de Reforma Constitucional Nº 18.825.

    126 Artículo sustituido por el artículo 1º, Nº 26 de la ley de Reforma Constitucional Nº 20.050.

    127 El anterior artículo 51 de este párrafo, fue derogado por la ley de Reforma Constitucional Nº 20.050.

    128 Artículo reemplazado por el artículo 1º, Nº 28 de la ley de Reforma Constitucional Nº 20.050.

    129 Véase el Reglamento del Senado y de la Cámara de Diputados aprobados por Resolución del 9 de febrero de 1998 (Diario Oficial del 23 de febrero de 1998).

    130 Número modificado por el artículo 1º, Nº 29, letra a) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido sustituido por el artículo 4º de la ley de Reforma Constitucional Nº 19.097. Modificado, a su vez, por el artículo único, N° 3 de la ley de Reforma Constitucional N° 20.390

    131 Número modificado por el artículo único Nº 4, letra a) de la ley de Reforma Constitucional Nº 19.519.

    132 Número modificado por el artículo único Nº 4, letra b) de la ley de Reforma Constitucional Nº 19.519.

    133 Número modificado por le artículo 1º, Nº 29 , letra b) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 4, letra c) de la ley de Reforma Constitucional Nº 19.519.

    134 Número modificado por el artículo 1º, Nº 29, letra c) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido agregado por el artículo único, Nº 4, letra d) de la ley de Reforma Constitucional Nº 19.519.

    135 Número agregado por el artículo 1º, Nº 29 letra d) de la ley de Reforma Constitucional Nº 20.050.

    136 Frase incorporada por el artículo único, Nº 4, letra e) de la ley de Reforma Constitucional Nº 19.519.

    137 Inciso reemplazado por el artículo único, Nº 31 de la ley de Reforma Constitucional Nº 18.825.

    138 Inciso reemplazado por el artículo 1º, Nº 30 de la ley de Reforma Constitucional Nº 20.050.

    139 Inciso sustituido por el artículo 1º, Nº 31 de la ley de Reforma Constitucional Nº 20.050.

    140 Inciso modificado por el artículo único, N° 4, de la ley de Reforma Constitucional N° 20.414.

    141 Inciso modificado por el artículo único, N° 4, de la ley de Reforma Constitucional N° 20.414.

    142 Inciso modificado por el artículo único, Nº 32 de la ley de Reforma Constitucional Nº 18.825.

    143 Inciso modificado por el artículo único, Nº 34 de la ley de Reforma Constitucional Nº 18.825.

    144 El primitivo inciso 6º de este artículo fue derogado por el artículo único, Nº 33 de la ley de Reforma Constitucional Nº 18.825.

    145 Inciso agregado por el artículo 1º, Nº 32 de la ley de Reforma Constitucional Nº 20.050.

    146 Inciso modificado por el artículo 1º, Nº 33 de la ley de Reforma Constitucional Nº 20.050.

    147 Inciso modificado por el artículo 1º, Nº 33 de la ley de Reforma Constitucional Nº 20.050.

    148 Véase la ley Nº 19.067 que establece normas permanentes sobre entrada de tropas extranjeras en el territorio de la República y salida de tropas nacionales del mismo.

    149 Véase la ley Nº 18.050 que fija normas generales para la concesión de indultos.

    150 Párrafo 2º agregado por el artículo único, Nº 3 de la ley de Reforma Constitucional Nº 19.055.

    151 Véase la ley Nº 18.678 que dispone que el Congreso Nacional tendrá su sede y celebrará sus sesiones en la ciudad de Valparaíso.

    152 Inciso intercalado por el artículo 1º, Nº 34 de la ley de Reforma Constitucional Nº 20.050.

    153 Número sustituido por el artículo único Nº 1 de la ley de Reforma Constitucional Nº19.526.

    154 Número modificado por el artículo 5º de la ley de Reforma Constitucional Nº 19.097.

    155 Artículo reemplazado por el artículo único, Nº 35 de la ley de Reforma Constitucional Nº 18.825.

    156 Véase la ley de 6 de julio de 1878, que determina cómo deben computarse las fracciones en votaciones o quórum de corporaciones, sea para tomar acuerdos o celebrar sesiones.

    157 Véase el decreto ley Nº 1.263, de 1975, ley Orgánica de Administración Financiera del Estado.

    158 Artículo modificado por el artículo único, Nº 36 de la ley de Reforma Constitucional Nº 18.825.

    159 Inciso modificado por el artículo único, Nº 37 de la ley de Reforma Constitucional Nº 18.825.

    160 Inciso modificado por el artículo único, Nº 38 de la ley de Reforma Constitucional Nº 18.825.

    161 Inciso reemplazado por el artículo 1º, Nº 35 de la ley de Reforma Constitucional Nº 20.050.

    162 Inciso modificado por el artículo único, Nº 5 de la ley de Reforma Constitucional Nº 19.519.

    163 El inciso 2º de este artículo fue reemplazado por los actuales incisos 2º, 3º, 4º, 5º y 6º conforme a lo dispuesto por el artículo único de la ley de Reforma Constitucional Nº 19.597.

    164 Inciso agregado por el artículo único de la ley de Reforma Constitucional N° 20.245.

    165 El inciso segundo de este artículo fue reemplazado por los actuales incisos 2º, 3º, 4º y 5º conforme a lo dispuesto por el artículo único, Nº 3, letra a) de la ley de Reforma Constitucional Nº 19.541. Anteriormente el inciso 2º de este artículo había sido modificado por el artículo único, Nº 6 de la ley de Reforma Constitucional Nº 19.519.

    166 El inciso 2º de este artículo fue reemplazado por los actuales incisos 2º, 3º, 4º y 5º conforme a lo dispuesto en el artículo único, Nº 3, letra a) de la ley de Reforma Constitucional Nº 19.541.

    167 El inciso 2º de este artículo fue reemplazado por los actuales incisos 2º, 3º, 4º y 5º conforme a lo dispuesto en el artículo único, Nº 3, letra a) de la ley de Reforma Constitucional Nº 19.541.

    168 El inciso 2º de este artículo fue reemplazado por los actuales incisos 2º, 3º, 4º y 5º conforme a lo dispuesto en el artículo único, Nº 3, letra a) de la ley de Reforma Constitucional Nº 19.541.

    169 Inciso modificado por el artículo único, Nº 6 de la ley de Reforma Constitucional Nº 19.519.

    170 Inciso agregado por el artículo único, Nº 3, letra b) de la ley de Reforma Constitucional Nº 19.541.

    171 Inciso modificado por el artículo único, Nº 3, letra c) de la ley de Reforma Constitucional Nº 19.541.

    172 Inciso sustituido por el artículo único, Nº 4 de la ley de Reforma Constitucional Nº 19.541.

    173 Artículo modificado por el artículo único, Nº 6 de la ley de Reforma Constitucional Nº 19.519.

    174 Inciso modificado por el artículo 1º, Nº 36, letra a) de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 39 de la ley de Reforma Constitucional Nº 18.825.

    175 Inciso agregado por el artículo único, Nº 5 de la ley de Reforma Constitucional Nº 19.541.

    176 El inciso final de este artículo fue eliminado por el artículo 1º, Nº 36, letra b) de la ley de Reforma Constitucional Nº 20.050.

    177 El artículo final de este capítulo fue derogado por el artículo 1º, Nº 37 de la ley de Reforma Constitucional Nº 20.050.

    178 Capítulo agregado por el artículo único, Nº 7 de la ley de Reforma Constitucional Nº 19.519.

    179 Inciso modificado por el artículo 1º, Nº 38, letra a) de la ley de Reforma Constitucional Nº 20.050.

    180 Inciso agregado por el artículo 1º, Nº 38, letra b) de la ley de Reforma Constitucional Nº 20.050.

    181 Inciso modificado por el artículo 1º, Nº 39 de la ley de Reforma Constitucional Nº 20.050.

    182 Inciso modificado por el artículo 1º, Nº 40 de la ley de Reforma Constitucional Nº 20.050.

    183 Véase la ley Nº 17.997 Orgánica Constitucional del Tribunal Constitucional.

    184 Véase la disposición decimosexta transitoria de este texto.

    185 Artículo sustituido por el artículo 1º, Nº 41 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 6 de la ley de Reforma Constitucional Nº 19.541.

    186 Artículo reemplazado por el artículo 1º, Nº 42 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 40,41 y 42 de la ley de Reforma Constitucional Nº 18.825.

    187 Artículo sustituido por el artículo 1º, Nº 43 de la ley de Reforma Constitucional Nº 20.050.

    188 Inciso sustituido por el artículo único, Nº 3, letra a) de la ley de Reforma Constitucional Nº 19.643.

    189 Inciso modificado por el artículo único, Nº 3, letra b) de la ley de Reforma Constitucional Nº 19.643., cuyo artículo transitorio establece: “Las normas referidas a la integración del Tribunal Calificador de Elecciones regirán a partir del 31 de enero del año 2000.”.

    190 La ley a la que hace mención este inciso es la ley Nº 18.460. Véase el artículo final de la ley Nº 18.460, agregado por el artículo 1º, Nº 2 de la ley Nº 18.604 que fija la vigencia de este artículo.

    191 Inciso sustituido por el artículo 6º de la ley de Reforma Constitucional Nº 19.097.

    192 Los Tribunales Electorales Regionales a que se refiere este artículo se rigen por la ley Nº 18.593.

    193 Véase la ley Nº 10.336 Orgánica de la Contraloría General de la República, cuyo texto coordinado, sistematizado y refundido fue fijado por Decreto Nº 2421, de 1964, del Ministerio de Hacienda.

    194 Inciso sustituido por el artículo 1º, Nº 44 de la ley de Reforma Constitucional Nº 20.050.

    195 Véase la ley Nº 18.948, Orgánica Constitucional de las Fuerzas Armadas y la ley Nº 18.961 Orgánica Constitucional de Carabineros.

    196 Artículo sustituido por el artículo 1º, Nº 45 de la ley de Reforma Constitucional Nº 20.050.

    197 Véase el Decreto Supremo Nº 400, de 1978, del Ministerio de Defensa, que fija el texto refundido, coordinado y sistematizado de la ley Nº 17.798 sobre Control de Armas.

    198 Inciso sustituido por el artículo 1º, Nº 46 de la ley de Reforma Constitucional Nº 20.050.

    199 Inciso sustituido por el artículo único, Nº 43, de la ley de Reforma Constitucional Nº 18.825.

    200 Véase el decreto ley Nº 2.460, de 1979, Ley Orgánica de Policía de Investigaciones de Chile.

    201 Véase el Reglamento de Organización y Funcionamiento del Consejo de Seguridad Nacional.

    202 Artículo reemplazado por el artículo 1º, Nº 47 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nos 44 y 45 de la ley de Reforma Constitucional Nº 18.825.

    203 Artículo sustituido por el artículo 1º, Nº 48 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 46 de la ley de Reforma Constitucional Nº 18.825.

    204 Véase la ley Nº 18.840, Orgánica Constitucional del Banco Central de Chile.

    205 Véase el decreto con fuerza de ley Nº 1/19.653, de 2001, que fija que fija el texto refundido, coordinado y sistematizado de la ley Nº 18.575, Orgánica Constitucional de Bases Generales de la Administración del Estado; y la ley Nº 19.175, Orgánica Constitucional sobre Gobierno y Administración Regional, cuyo texto refundido fue fijado por decreto supremo Nº 291 de 1993.

    206 Inciso sustituido por el artículo 1º, Nº 49 de la ley de Reforma Constitucional Nº 20.050. Anteriormente había sido modificado por el artículo único, Nº 47 de la ley de Reforma Constitucional Nº 18.825.

    207 Artículo sustituido por el artículo 7º de la ley de Reforma Constitucional Nº 19.097.

    208 Inciso modificado por el artículo único, N° 4 de la ley de Reforma Constitucional N° 20.390.

    209 Artículo sustituido por el artículo 7º de la ley de Reforma Constitucional Nº 19.097.

    210 Artículo sustituido por el artículo único, N° 5 de la ley de reforma constitucional N° 20.390.

    211 Artículo sustituido por el artículo 7º de la ley de Reforma Constitucional Nº 19.097. Y, posteriormente, por el artículo único, N° 6 de la de Reforma Constitucional N° 20.390

    212 Inciso sustituido por el artículo único, N° 7 de la ley de Reforma Constitucional N° 20.390.

    213 Artículo sustituido por el artículo 7º de la ley de Reforma Constitucional Nº 19.097.

    214 Inciso reemplazado por el artículo 8º de la ley de Reforma Constitucional Nº 19.097.

    215 Inciso derogado por el artículo único, N° 8 de la ley de Reforma Constitucional N° 20.390.

    216 Véase el decreto con fuerza de ley Nº 1/19.704, publicado en el Diario Oficial de 3 de mayo 2002, que fija el texto refundido de la ley Nº 18.695, Orgánica Constitucional de Municipalidades.

    217 Véase el decreto supremo Nº 2.385, de 1996, del Ministerio del Interior, que fija el texto refundido y sistematizado del decreto ley Nº 3.063, de 1979, sobre Rentas Municipales.

    218 Inciso sustituido por el artículo único de la ley de Reforma Constitucional N° 20.346.

    219 Artículo sustituido por el artículo único, Nº 2 de la ley de Reforma Constitucional Nº 19.526. Anteriormente, había sido sustituido por el artículo 10 de la ley de Reforma Constitucional Nº 19.097, modificado por el artículo único, Nº 48 de la ley de Reforma Constitucional Nº 18.825.

    220 Artículo sustituido por el artículo 10 de la ley de Reforma Constitucional Nº 19.097.

    221 Artículo reemplazado por el artículo único, Nº 3 de la ley de Reforma Constitucional Nº 19.526. Anteriormente, había sido sustituido por el artículo 10 de la ley de Reforma Constitucional Nº 19.097.

    222 Artículo incorporado por el artículo único, Nº 4 de la ley de Reforma Constitucional Nº 19.526. Anteriormente, había sido derogado por el artículo 11 de la ley de Reforma Constitucional Nº 19.097.  Véase la disposición décima transitoria de este texto.

    223 Artículo sustituido por el artículo 10 de la ley de Reforma Constitucional Nº 19.097.

    224 Artículo sustituido por el artículo 12 de la ley de Reforma Constitucional Nº 19.097.

    225 Inciso agregado por el artículo único, N° 9 de la ley de Reforma Constitucional N° 20.390.

    226 Artículo reemplazado por el artículo único, N° 10 de la ley de Reforma Constitucional N° 20.390.

    227 Inciso modificado por el artículo único, N° 11 de la ley de Reforma Constitucional N° 20.390.

    228 Artículo sustituido por el artículo 12 de la ley de Reforma Constitucional Nº 19.097.

    229 Párrafo y artículo agregados por la Ley de Reforma Constitucional Nº20.193.

    230 Inciso modificado por el artículo único, Nº 49 de la ley de Reforma Constitucional Nº 18.825.

    231 Inciso sustituido por el artículo 1º, Nº 50 de la ley de Reforma Constitucional Nº 20.050.

    232 Inciso modificado por el artículo 1º, Nº 51, Nº 2 de la ley de Reforma Constitucional Nº 20.050.

    233 Inciso modificado por el artículo 1º, Nº 51, Nº 3 de la ley de Reforma Constitucional Nº 20.050. Anteriormente, había sido modificado por el artículo único, Nº 50 de la ley de Reforma Constitucional Nº 18.825.

    234 Inciso modificado por el artículo 1º, Nº 51, Nº 3 de la ley de Reforma Constitucional Nº 20.050. Anteriormente, había sido modificado por el artículo único, Nº 51 de la ley de Reforma Constitucional Nº 18.825.

    235 Los primitivos incisos 1º y 2º fueron suprimidos por el artículo 1º, Nº 51, Nº 1 de la ley de Reforma Constitucional Nº 20.050. Anteriormente estos incisos habían sido sustituidos por el artículo único de la ley de Reforma Constitucional Nº 19.671.

    236 Los artículos penúltimo y final de este capítulo fueron derogados por el artículo 1º, Nº 52 de la ley de Reforma Constitucional Nº 20.050.

    237 Las primitivas disposiciones cuarta, octava a trigésima, trigésima segunda a trigésima quinta y cuadragésima transitorias fueron derogadas por el artículo 1º, Nº 53 de la ley de Reforma Constitucional Nº 20.050.

    238 Véase el Código de Minería aprobado por la ley Nº 18.248.

    239 Disposición transitoria agregada por el artículo único, Nº 4 de la ley de Reforma Constitucional Nº 19.055.

    240 Disposición transitoria agregada por el artículo único, Nº 8 de la ley de Reforma Constitucional Nº 19.519.

    241 Disposición transitoria agregada por el artículo único, Nº 8 de la ley de Reforma Constitucional Nº 19.519.

    242 Disposición agregada por el artículo único, Nº 5 de la ley de Reforma Constitucional Nº 19.526.

    243 Disposición agregada por el artículo único, Nº 8 de la ley de Reforma Constitucional Nº 19.541.

    244 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050.

    245 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050.

    246 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    247 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    248 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    249 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    250 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    251 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    252 Disposición incorporada por el artículo 1º, Nº 54 de la ley de Reforma Constitucional Nº 20.050

    253 Esta disposición fue agregada por la ley de Reforma Constitucional N° 20.162.

    254 Disposición agregada por la ley de Reforma Constitucional N° 20.193.

    255 Disposición incorporada por el artículo único, N° 3 de la ley de Reforma Constitucional N° 20.337.

    256 Disposición incorporada por el artículo único, N° 4, de la la ley de Reforma Constitucional N° 20.414.

    257 Disposición incorporada por el artículo único de la la ley de Reforma Constitucional N° 20.352.