{"id":10969,"date":"2022-03-16T17:28:34","date_gmt":"2022-03-16T22:28:34","guid":{"rendered":"https:\/\/citylaws.com.mx\/?p=10969"},"modified":"2022-09-08T15:30:01","modified_gmt":"2022-09-08T20:30:01","slug":"que-es-un-delito-cibernetico","status":"publish","type":"post","link":"https:\/\/citylaws.com.mx\/en\/abogado-penal\/que-es-un-delito-cibernetico\/","title":{"rendered":"What is a Cyber Crime?"},"content":{"rendered":"<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-ba6c29ad\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-fec6b79c\">\n<h1 class=\"has-text-align-center has-black-color has-text-color has-large-font-size wp-block-heading\">What is a Crime?<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">According to the Federal Penal Code, the Crime is:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><em>\u201cAn act or omission sanctioned by criminal law<\/em>.<em>&#8220;<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n<\/div>\n\n\n\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-4ec7f125\">\n<lottie-player id=\"wp-block-themeisle-blocks-lottie-903b1e46\" class=\"wp-block-themeisle-blocks-lottie aligncenter\" src=\"https:\/\/assets6.lottiefiles.com\/packages\/lf20_d6xl55tg.json\" autoplay loop count=\"0\" speed=\"1\" direction=\"1\" trigger=\"none\" width=\"300\" data-loop=\"true\" mode=\"normal\"><\/lottie-player>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-2c9686a5\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-c7f3d24b\">\n<h2 class=\"has-text-align-center has-white-color has-text-color has-large-font-size wp-block-heading\">What is a cybercrime or computer crime?<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\"><strong><strong><strong>Computers, smartphones, software, etc., are used in the commission of these crimes, such as the forgery of documents through a computer or the destruction of information contained in a computer.<\/strong><\/strong><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\"><strong><strong><strong>Computer crime is the illicit act in which Information and Communication Technologies are used as a means or as an end to carry them out, such as computer, electronic, technological resources, Internet, among others.<\/strong><\/strong><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-0d958e15\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-56b6a96e\">\n<h2 class=\"has-text-align-center has-white-color has-text-color has-large-font-size wp-block-heading\">Who commits computer crimes?<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\">The Penal Code for the state of Sinaloa provides that a person commits a computer crime who intentionally and without right:<\/p>\n\n\n\n<ul class=\"has-white-color has-text-color\"><li>Use or enter a database, computer system, or computer network for the purpose of damaging, executing, or altering a scheme, in order to defraud, obtain money, property, or information. Between business and consumer (B2C known as such in English)<\/li><li>Intercepts, interferes, receives, uses, alters, damages or destroys a software or computer program or the data contained therein, in the base, system or network.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color\"><a class=\"rank-math-link\" data-mode=\"drawer_right\" style=\"display: inline-block; text-decoration: none; background-color: #457a53; color: white; cursor: pointer; font-family: Helvetica,Arial,sans-serif; font-size: 20px; line-height: 50px; text-align: center; margin: 0; height: 50px; padding: 0px 33px; border-radius: 25px; max-width: 100%; white-space: nowrap; overflow: hidden; text-overflow: ellipsis; font-weight: bold; -webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale;\" href=\"https:\/\/citylaws.com.mx\/en\/iniciar-sesion\/\" target=\"_blank\" rel=\"noopener noreferrer\">Book Free Advice<\/a><\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-092e4253\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-80d236e5\">\n<h2 class=\"has-text-align-center has-white-color has-text-color has-large-font-size wp-block-heading\"><strong>What are the computer crimes provided for in Mexican criminal law?<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\">We will mention below some crimes typified in the Federal Criminal Code and in the criminal codes of the federal entities:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<ul class=\"has-white-color has-text-color\"><li>Disclosure of secrets and illicit access to computer systems and equipment<\/li><li>sexual harassment<\/li><li>Alteration or manipulation of electronic identification means<\/li><li>Crimes against the indemnity of privacy of sexual information<\/li><li>Copyright offenses<\/li><li>telephone hoax<\/li><li>Forgery of titles<\/li><li>Pornography<\/li><li>Identity fraud<\/li><li>Crime equal to robbery<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-dcb21722\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-2d1bcc54\">\n<h1 class=\"has-text-align-center has-black-color has-text-color has-large-font-size wp-block-heading\">In which special legislations are foreseen computer crimes?<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">Some computer crimes are provided for in the laws mentioned below:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n\n\n\n<ul class=\"has-black-color has-text-color\"><li>Credit Institutions Law<\/li><li>Insurance and Bond Institutions Law<\/li><li>Law of the marketc of values<\/li><li>General Law of Securities and Credit Operations<\/li><li>Federal Law on Protection of Personal Data Held by Private Parties<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n<\/div>\n\n\n\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-6d5a963a\">\n<lottie-player id=\"wp-block-themeisle-blocks-lottie-939a0d14\" class=\"wp-block-themeisle-blocks-lottie\" src=\"https:\/\/assets6.lottiefiles.com\/packages\/lf20_1cnyflje.json\" autoplay loop count=\"0\" speed=\"1\" direction=\"1\" trigger=\"none\" data-loop=\"true\" mode=\"normal\"><\/lottie-player>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-d43b9e95\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-7cfbe581\">\n<h2 class=\"has-text-align-center has-white-color has-text-color has-large-font-size wp-block-heading\">What is the crime of disclosure of secrets?<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\"><strong><strong><strong>The Federal Penal Code also sanctions whoever reveals, discloses or uses improperly or to the detriment of another, information or images obtained in a private communication intervention.<\/strong><\/strong><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\"><strong><strong><strong>In accordance with the Federal Penal Code, the crime of revealing secrets is committed by a person who, without just cause, to the detriment of someone and without the consent of the person who may be harmed, reveals a secret or reserved communication that he or she knows by reason of his or her employment, position or put.<\/strong><\/strong><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-69c476fd\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-4c8a4cba\">\n<h2 class=\"has-text-align-center has-white-color has-text-color has-large-font-size wp-block-heading\">What is the crime of illegal access to computer systems and equipment?<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\">Criminal legislation refers to the fact that computer systems or equipment can be owned by individuals, the State or institutions that make up the financial system; and those who commit these crimes can be public servants, employees or officers of the institutions that make up the financial system.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\">According to the Federal Penal Code, the crime of illicit access to computer systems and equipment is committed by whoever, whether or not authorized to access them, accesses, and modifies, copies, destroys or causes the loss of information contained in those systems. or computer equipment.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color\"><a class=\"rank-math-link\" data-mode=\"drawer_right\" style=\"display: inline-block; text-decoration: none; background-color: #457a53; color: white; cursor: pointer; font-family: Helvetica,Arial,sans-serif; font-size: 20px; line-height: 50px; text-align: center; margin: 0; height: 50px; padding: 0px 33px; border-radius: 25px; max-width: 100%; white-space: nowrap; overflow: hidden; text-overflow: ellipsis; font-weight: bold; -webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale;\" href=\"https:\/\/citylaws.com.mx\/en\/iniciar-sesion\/\" target=\"_blank\" rel=\"noopener noreferrer\">Book Free Advice<\/a><\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-da8a3cf7\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-ad8e8436\">\n<h2 class=\"has-text-align-center has-white-color has-text-color has-large-font-size wp-block-heading\"><strong>What is the crime against the indemnity of privacy of sexual information?<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\">This crime is committed by the person who makes use of information technology, broadcasting, telecommunications, or any other means of data transmission to request images, audios or videos of explicit sexual activities, acts of sexual connotation or encounters of a sexual nature to a minor or who does not have the capacity to understand or resist the meaning of the fact.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-medium-font-size\">The Federal Penal Code provides that the crime against the indemnity of privacy of sexual information refers to the communication of sexual content with persons under eighteen years of age or persons who do not have the capacity to understand the meaning of the fact or who do not have the capacity to resist it.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-default\"\/>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-nogap-gap has-vertical-center\" id=\"wp-block-themeisle-blocks-advanced-columns-073288f0\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-bec36f85\">\n<h1 class=\"has-text-align-center has-black-color has-text-color has-large-font-size wp-block-heading\">Is it considered a crime to affect a computer program or software?<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\">The Federal Penal Code classifies as a crime in terms of copyright, the conduct consisting of manufacturing for profit, a device or system to deactivate the electronic protection devices of a computer program.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-black-color has-css-opacity has-black-background-color has-background is-style-default\"\/>\n<\/div>\n\n\n\n<div class=\"wp-block-themeisle-blocks-advanced-column\" id=\"wp-block-themeisle-blocks-advanced-column-40493fbd\">\n<lottie-player id=\"wp-block-themeisle-blocks-lottie-071432ce\" class=\"wp-block-themeisle-blocks-lottie aligncenter\" src=\"https:\/\/assets6.lottiefiles.com\/packages\/lf20_x1ikbkcj.json\" autoplay loop count=\"0\" speed=\"1\" direction=\"1\" trigger=\"none\" data-loop=\"true\" mode=\"normal\"><\/lottie-player>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":10983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[310],"tags":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/citylaws.com.mx\/wp-content\/uploads\/2022\/03\/maxim-hopman-PEJHULxUHZs-unsplash.jpg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/posts\/10969"}],"collection":[{"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/comments?post=10969"}],"version-history":[{"count":2,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/posts\/10969\/revisions"}],"predecessor-version":[{"id":12016,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/posts\/10969\/revisions\/12016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/media\/10983"}],"wp:attachment":[{"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/media?parent=10969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/categories?post=10969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/citylaws.com.mx\/en\/wp-json\/wp\/v2\/tags?post=10969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}