The Maturity of the Legal and Regulatory Framework in the Field of Cybersecurity in Latin America according to the Capability Maturity Model

Cover Page

Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription or Fee Access

Abstract

In 2016, Mexico, Argentina and Chile joined the Cancun Declaration «Ministerial Declaration on the Digital Economy: Innovation, Growth and Social Prosperity», in which ministers and representatives from 41 countries and the European Union committed to work together to reinforce the Internet’s openness, bridge digital divide, develop digital skills and strengthen the potential of the digital economy. However, with the exponential increase in the amount of digital data in cyber environments, security measures are becoming increasingly important. National and international entities are identifying cybersecurity threats, and the number of these threats is increasing daily. Addressing cybersecurity risks is possible if a productive and enforceable legal policy in the field of cybersecurity is in place. Therefore, in order to analyze the effectiveness of the regulatory framework, we use one aspect of the CMM model “Cybersecurity Capability Maturity Model for States”. Admittedly, for a number of countries, the development of the digital economy has become an impetus for the development of new legal mechanisms and practices to protect the rights of individuals, companies, institutions; rights and sovereignty of states from cyber threats and cyber terrorism.

Full Text

Restricted Access

About the authors

Anna V. Yakovleva

The Herzen State Pedagogical University of Russia

Email: yeif@mail.ru
Dr. Sci. (Econ.), full professor, senior lecturer Saint Petersburg, Russian Federation

References

  1. How we got from VUCA world to BANI world and what we should do there. [Electronic resource]. -Available at: URL: https://netology.ru/blog/04-2022-bani-world (accessed on: 18.04.2022).
  2. Minbaleev A.V. Doctrine of information security of the Russian Federation: current state and development potential / A.V. Minbaleev // Bulletin of the Ural Federal District. Information security. -2016. -№ 3(21). -pp. 62-66.
  3. Minbaleev A.V. Fundamentals of legal regulation of the Internet / A.V. Minbaleev // Law and cybersecurity. -2014. -№ 1. -pp. 20-26.
  4. Rassolov I. Legal issues of combating cybercrime. Issues of international jurisdiction / I. Rassolov // Law and legislation. -2007. -№ 10. -pp. 64-66.
  5. The state of the art in cybersecurity. -United Nations Office on Drugs and Crime. -[Electronic resource] -Available at: URL: https://www.unodc.org/e4j/ru/cybercrime/module-8/key-issues/cybersecurity-posture.html (accessed on: 10.06.2022).
  6. What is the VUCA world and how to live there? -[Electronic resource] -Available at: URL: https://monocler.ru/chto-takoe-vuca-mir-i-kak-v-nem-zhit/ (accessed on: 21.03.2022).
  7. Yakovleva A.V. About cooperation in the field of information security, cybersecurity (legal aspect) / A.V. Yakovleva // Problems of economics and legal practice. -2020. -Volume 16, № 6. -pp. 139-147.
  8. Yakovleva A.V. Cybersecurity and its legal regulation (foreign and Russian experience) / A.V. Yakovleva // Socio-political sciences. -2021. -Volume 11, № 4. -pp. 70-81. -doi: 10.33693/2223-0092-2021-11-4-70-81.
  9. Yakovleva A.V. Legal enforcement of cybersecurity in China / A.V. Yakovleva // Information law. -2021. -№ 2. -pp. 37-40. -doi: 10.18572/1999-480X-2021-2-37-40.
  10. Yakovleva A.V. Problems of legal regulation of information security in the context of the development of the digital economy / A.V. Yakovleva. -Saratov: Amiirit, 2021. -272 p.
  11. Yakovleva A.V., Gorshkova S.B., Vakulenko P.S., Stepanova T.V. Digital economy and formation of the national information security system in Russia / A.V. Yakovleva, S.B. Gorshkova, P.S. Vakulenko, T.V. Stepanova // Financial Economics. -2019. -№ 3. -pp. 551-560.
  12. Agenda digital Argentina. Decreto 996/2018. DECTO-2018-996-APN-PTE-Apruébanse bases. Ciudad de Buenos Aires, 02/11/2018. -[Electronic resource]-Available at: URL: https://www.boletinoficial.gob.ar/#!DetalleNorma/195154/20181105 (accessed on: 10.06.2021).
  13. Ciberataques. Guía para la gestión y notificacion de ataques informáticos. -[Electronic resource] -Available at: URL: https://ciberseguridad.com/ciberataques/#Latinoamerica (accessed on: 10.06.2021).
  14. Cibersegurança riscos, avanços e o caminho a seguir na América Latina e Caribe. Relatório de Cibersegurança 2020. -[Electronic resource] -Available at: URL:https://publications.iadb.org/publications/portuguese/document/Relatorio-de-Ciberseguranca-2020-riscos-avancos-e-o-caminho-a-seguir-na-America-Latina-e-Caribe.pdf (accessed on: 10.09.2021).
  15. Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (ETS № 108). -Strasbourg 28/01/1981. -01/10/1985 (5 Ratifications). -[Electronic resource] -Available at: URL: https://www.coe.int/en/web/conventions/full-list?module=treaty-detail&treatynum=108 (accessed on: 10.06.2022).
  16. Coos A. Data Protection Regulations in Latin America / A. Coos. -2019. -March, 28. -[Electronic resource] -Available at: URL: https://www.endpointprotector.com/blog/data-protection-regulations-in-latin-america/ (accessed on: 10.06.2022).
  17. Cybersecurity Capacity Maturity Model for Nations (CMM). -2021 Edition. -[Electronic resource] -Available at: URL: https://cybilportal.org/wp-content/uploads/2021/03/CMM2021-Edition-March-2021.pdf (accessed on: 10.06.2022).
  18. Decreto 378/2005. Poder ejecutivo nacional (P.E.N.). Plan nacional gobierno electronico y planes sectoriales. Ciudad de Buenos Aires, 27/04/2005. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-378-2005-105829/texto (accessed on: 10.06.2022).
  19. Decreto 577/2017. Comité de ciberseguridad. Ciudad de Buenos Aires, 28/07/2017. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-577-2017-277518/texto (accessed on: 10.06.2022).
  20. Decreto 87/2017. Poder ejecutivo nacional (P.E.N.). Plataforma digital del sector público nacional. Ciudad de Buenos Aires, 02/02/2017. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-87-2017-271486/texto (accessed on: 10.06.2022).
  21. Decreto 996/2018. Poder ejecutivo nacional (P.E.N.). Agenda digital Argentina. Ciudad de Buenos Aires, 02/11/2018. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/decreto-996-2018-316036/texto (accessed on: 10.06.2022).
  22. En América Latina las empresas son víctimas de ciberataques 1.586 veces por semana. -27 de Mayo de 2022. -[Electronic resource] -Available at: URL: https://www.infobae.com/america/tecno/2022/05/27/en-america-latina-las-empresas-son-victimas-de-ciberataques-1586-veces-por-semana/ (accessed on: 10.06.2022).
  23. Estrategia Nacional de Ciberseguridad de la República Argentina. -[Electronic resource] -Available at: URL: https://www.actualidadenseguridad.com/normativacomentada/estrategia-nacional-de-ciberseguridad-de-la-republica-argentina/ (accessed on: 10.09.2021).
  24. Gläser W. Where does the term «VUCA» come from? / W. Gläser. -New, VUCA Blog. -2021. -November, 9. -[Electronic resource] -Available at: URL: https://www.vuca-world.org/where-does-the-term-vuca-come-from/ (accessed on: 21.03.2022).
  25. Ley 25.326. Proteccion de los datos personales. Honorable Congreso de la Nacion Argentina. 2000-11-02. -[Electronic resource] -Available at: URL: https://www-argentina-gob-ar.translate.goog/normativa/nacional/ley-25326-64790/texto?_x_tr_sl=es&_x_tr_tl=ru&_x_tr_hl=ru&_x_tr_pto=op,sc (accessed on: 10.06.2022).
  26. Nueva Estrategia Nacional de Ciberseguridad en Argentina. 11 junio, 2019. -[Electronic resource] -Available at: URL: https://u-gob.com/nueva-estrategia-nacional-de-ciberseguridad-en-argentina/ (accessed on: 10.09.2021).
  27. Resolución 580/2011. Jefatura de Gabinete de Ministros. Créase el Programa Nacional de Infraestructuras Críticas de Información y Ciberseguridad. Objetivos. Ciudad de Buenos Aires, 28/7/2011. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/resoluci%C3%B3n-580-2011-185055/texto (accessed on: 10.06.2022).
  28. Resolución 829/2019. Jefatura de Gabinete de Ministros. Secretaría de Gobierno de modernización. Ciudad de Buenos Aires, 24/05/2019. -[Electronic resource] -Available at: URL: https://www.argentina.gob.ar/normativa/nacional/resoluci%C3%B3n-829-2019-323594/texto (accessed on: 10.06.2022).
  29. ¿Qué es un ataque ransomware de triple extorsión? -[Electronic resource] -Available at: URL: https://escuda.eu/que-es-un-ataque-ransomware-de-triple-extorsion/#:~:text=Pero%20para%20definir%20claramente% 20en,amenaza%20de%20publicar%20sus%20datos (accessed on: 10.06.2022).

Supplementary files

Supplementary Files
Action
1. JATS XML


This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies