The Maturity of the Legal and Regulatory Framework in the Field of Cybersecurity in Latin America according to the Capability Maturity Model
- Authors: Yakovleva A.V.1
-
Affiliations:
- The Herzen State Pedagogical University of Russia
- Issue: Vol 18, No 4 (2022)
- Pages: 20-29
- Section: Articles
- URL: https://bakhtiniada.ru/2541-8025/article/view/147179
- ID: 147179
Cite item
Abstract
Full Text
##article.viewOnOriginalSite##About the authors
Anna V. Yakovleva
The Herzen State Pedagogical University of Russia
Email: yeif@mail.ru
Dr. Sci. (Econ.), full professor, senior lecturer Saint Petersburg, Russian Federation
References
- How we got from VUCA world to BANI world and what we should do there. [Electronic resource]. -Available at: URL: https://netology.ru/blog/04-2022-bani-world (accessed on: 18.04.2022).
- Minbaleev A.V. Doctrine of information security of the Russian Federation: current state and development potential / A.V. Minbaleev // Bulletin of the Ural Federal District. Information security. -2016. -№ 3(21). -pp. 62-66.
- Minbaleev A.V. Fundamentals of legal regulation of the Internet / A.V. Minbaleev // Law and cybersecurity. -2014. -№ 1. -pp. 20-26.
- Rassolov I. Legal issues of combating cybercrime. Issues of international jurisdiction / I. Rassolov // Law and legislation. -2007. -№ 10. -pp. 64-66.
- The state of the art in cybersecurity. -United Nations Office on Drugs and Crime. -[Electronic resource] -Available at: URL: https://www.unodc.org/e4j/ru/cybercrime/module-8/key-issues/cybersecurity-posture.html (accessed on: 10.06.2022).
- What is the VUCA world and how to live there? -[Electronic resource] -Available at: URL: https://monocler.ru/chto-takoe-vuca-mir-i-kak-v-nem-zhit/ (accessed on: 21.03.2022).
- Yakovleva A.V. About cooperation in the field of information security, cybersecurity (legal aspect) / A.V. Yakovleva // Problems of economics and legal practice. -2020. -Volume 16, № 6. -pp. 139-147.
- Yakovleva A.V. Cybersecurity and its legal regulation (foreign and Russian experience) / A.V. Yakovleva // Socio-political sciences. -2021. -Volume 11, № 4. -pp. 70-81. -doi: 10.33693/2223-0092-2021-11-4-70-81.
- Yakovleva A.V. Legal enforcement of cybersecurity in China / A.V. Yakovleva // Information law. -2021. -№ 2. -pp. 37-40. -doi: 10.18572/1999-480X-2021-2-37-40.
- Yakovleva A.V. Problems of legal regulation of information security in the context of the development of the digital economy / A.V. Yakovleva. -Saratov: Amiirit, 2021. -272 p.
- Yakovleva A.V., Gorshkova S.B., Vakulenko P.S., Stepanova T.V. Digital economy and formation of the national information security system in Russia / A.V. Yakovleva, S.B. Gorshkova, P.S. Vakulenko, T.V. Stepanova // Financial Economics. -2019. -№ 3. -pp. 551-560.
- Agenda digital Argentina. Decreto 996/2018. DECTO-2018-996-APN-PTE-Apruébanse bases. Ciudad de Buenos Aires, 02/11/2018. -[Electronic resource]-Available at: URL: https://www.boletinoficial.gob.ar/#!DetalleNorma/195154/20181105 (accessed on: 10.06.2021).
- Ciberataques. Guía para la gestión y notificacion de ataques informáticos. -[Electronic resource] -Available at: URL: https://ciberseguridad.com/ciberataques/#Latinoamerica (accessed on: 10.06.2021).
- Cibersegurança riscos, avanços e o caminho a seguir na América Latina e Caribe. Relatório de Cibersegurança 2020. -[Electronic resource] -Available at: URL:https://publications.iadb.org/publications/portuguese/document/Relatorio-de-Ciberseguranca-2020-riscos-avancos-e-o-caminho-a-seguir-na-America-Latina-e-Caribe.pdf (accessed on: 10.09.2021).
- Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (ETS № 108). -Strasbourg 28/01/1981. -01/10/1985 (5 Ratifications). -[Electronic resource] -Available at: URL: https://www.coe.int/en/web/conventions/full-list?module=treaty-detail&treatynum=108 (accessed on: 10.06.2022).
- Coos A. Data Protection Regulations in Latin America / A. Coos. -2019. -March, 28. -[Electronic resource] -Available at: URL: https://www.endpointprotector.com/blog/data-protection-regulations-in-latin-america/ (accessed on: 10.06.2022).
- Cybersecurity Capacity Maturity Model for Nations (CMM). -2021 Edition. -[Electronic resource] -Available at: URL: https://cybilportal.org/wp-content/uploads/2021/03/CMM2021-Edition-March-2021.pdf (accessed on: 10.06.2022).
- Decreto 378/2005. Poder ejecutivo nacional (P.E.N.). Plan nacional gobierno electronico y planes sectoriales. Ciudad de Buenos Aires, 27/04/2005. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-378-2005-105829/texto (accessed on: 10.06.2022).
- Decreto 577/2017. Comité de ciberseguridad. Ciudad de Buenos Aires, 28/07/2017. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-577-2017-277518/texto (accessed on: 10.06.2022).
- Decreto 87/2017. Poder ejecutivo nacional (P.E.N.). Plataforma digital del sector público nacional. Ciudad de Buenos Aires, 02/02/2017. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-87-2017-271486/texto (accessed on: 10.06.2022).
- Decreto 996/2018. Poder ejecutivo nacional (P.E.N.). Agenda digital Argentina. Ciudad de Buenos Aires, 02/11/2018. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-996-2018-316036/texto (accessed on: 10.06.2022).
- En América Latina las empresas son víctimas de ciberataques 1.586 veces por semana. -27 de Mayo de 2022. -[Electronic resource] -Available at: URL: https://www.infobae.com/america/tecno/2022/05/27/en-america-latina-las-empresas-son-victimas-de-ciberataques-1586-veces-por-semana/ (accessed on: 10.06.2022).
- Estrategia Nacional de Ciberseguridad de la República Argentina. -[Electronic resource] -Available at: URL: https://www.actualidadenseguridad.com/normativacomentada/estrategia-nacional-de-ciberseguridad-de-la-republica-argentina/ (accessed on: 10.09.2021).
- Gläser W. Where does the term «VUCA» come from? / W. Gläser. -New, VUCA Blog. -2021. -November, 9. -[Electronic resource] -Available at: URL: https://www.vuca-world.org/where-does-the-term-vuca-come-from/ (accessed on: 21.03.2022).
- Ley 25.326. Proteccion de los datos personales. Honorable Congreso de la Nacion Argentina. 2000-11-02. -[Electronic resource] -Available at: URL: https://www-argentina-gob-ar.translate.goog/normativa/nacional/ley-25326-64790/texto?_x_tr_sl=es&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=op,sc (accessed on: 10.06.2022).
- Nueva Estrategia Nacional de Ciberseguridad en Argentina. 11 junio, 2019. -[Electronic resource] -Available at: URL: https://u-gob.com/nueva-estrategia-nacional-de-ciberseguridad-en-argentina/ (accessed on: 10.09.2021).
- Resolución 580/2011. Jefatura de Gabinete de Ministros. Créase el Programa Nacional de Infraestructuras Críticas de Información y Ciberseguridad. Objetivos. Ciudad de Buenos Aires, 28/7/2011. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/resoluci%C3%B3n-580-2011-185055/texto (accessed on: 10.06.2022).
- Resolución 829/2019. Jefatura de Gabinete de Ministros. Secretaría de Gobierno de modernización. Ciudad de Buenos Aires, 24/05/2019. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/resoluci%C3%B3n-829-2019-323594/texto (accessed on: 10.06.2022).
- ¿Qué es un ataque ransomware de triple extorsión? -[Electronic resource] -Available at: URL: https://escuda.eu/que-es-un-ataque-ransomware-de-triple-extorsion/#:~:text=Pero%20para%20definir%20claramente% 20en,amenaza%20de%20publicar%20sus%20datos (accessed on: 10.06.2022).
Supplementary files
