PRESIDENCY OF THE SPANISH GOVERNMENT. 2013. National Cyber Security Strategy. 2013. In Accessed February 11, 2014. It is not voluntary to have it or not, the website must go, in the same way that the brake goes when you buy a vehicle, the brake pedal sets limits on the route that is made, legal standards set limits to the company and also protect companies from the use of data that they also contribute to the cloud or the digital society as the owner of the site. MEASURING COUNTRY PREPAREDNESS AND BUILDING CAPACITY TO WORK ON THE CYBERSECURITY FORUM at the ITU Conference, which opened from 30 March to 10 April 2015 in Dubai, United Arab Emirates. Businesses and website operators are at a higher level, but like users, they are also protected by legal regulations on cybersecurity and data management. All European legislation has tackled these issues and established certain aspects that these cybersecurity issues must have, the remaining legislation contains global legal obligations that companies must comply with, it is like selling cars without brakes, the vehicle for sale must contain everything that is necessary for the user who will use the vehicle. Here are some cybersecurity considerations and recommendations that businesses can consider when defining the strategy they will implement to combat COVID-19. Victor I think this article answers your question, otherwise, do not hesitate to consult José Cuervo again Article 110. The State recognizes the public interest in science, technology, knowledge, innovation and its applications, as well as the necessary information services, as fundamental tools for the economic, social and political development of the country, as well as for national security and sovereignty.

For the promotion and development of these activities, the State shall provide adequate resources and establish the national system of science and technology in accordance with the law. The private sector will have to provide them with resources. The State guarantees respect for the ethical and legal principles that should apply to scientific, humanistic and technological research activities. The law determines the means of complying with this guarantee. A national cybersecurity strategy aims to establish a position of the nation before a new conception of cybersecurity as part of a national security policy. The document should set out general guidelines and guidelines for action to address the challenge posed by the vulnerability of cyberspace in Canada. The strategy should design the governance model for national cybersecurity. NEWS 24. 2015. The Infogorbierno law aims at technological independence in Venezuela. In Consultation date 29 May 2015 Today, countries such as the United States, Japan, India and various countries of the European Union are developing and strengthening their cybersecurity structures in industrial systems, which are engines of growth and dynamism of nations.

The pandemic and digital transformation have given way to new and diverse attack vectors that threaten cybersecurity. The necessary encryption was the problem in this case and at the discretion of the authority, the measures had to be taken, suggesting that the necessary measures will protect your company from attacks and legal liabilities for omissions. That is, they are the owners of rights and obligations in society, and just as much of society is now in the cloud, legal norms and protective measures are also where every human being is, the object of that property and, therefore, of legal protection. In this context, it is visualized that from 1998 to the present day, the absence of a leading organization capable of promoting the creation of a national cybersecurity strategy has been noted; This shows the strategic vulnerability. The first results suggest that cybersecurity has an impact on national security and therefore affects the different areas that make it up: economic, social, political, cultural, geographical, environmental and military. The challenges are complex and addressing them requires the political will to foster a disruptive process leading to the development and implementation of a cybersecurity strategy to protect both information and operational technologies. In Venezuela, there are currently changes in accordance with the strategic orientations established in the National Development Plan 2019-2025, and in this context, the interactions between the actors are developing with extreme speed and inaccuracy, which leads to the fact that the decisions that must be taken in the organization of issues related to cybersecurity are developing at the different levels of recursivity of the state, takes longer than expected. The reality of the dynamics arising from cybersecurity incidents, which in many cases need to be monitored in real time, further hampers a consistent and robust response to the protection of industrial enterprises and critical infrastructure. INTERNATIONAL TELECOMMUNICATION UNION (ITU). Cybersecurity Guide for Developing Countries. 2007 Edition. “In all that there is a before and after, everything can affect the reputation of a brand, it is better to prevent and correct the legal aspects” Industrial cybersecurity is a real need and the Industrial Cybersecurity Center, with its presence in the region, tries to bring highly specialized experience and training to the development of cybersecurity in the industrial networks of our countries.

Cybersecurity involves complex problems, and solving them requires the political will to design and implement a digital infrastructure and services development plan that includes a multidisciplinary, coherent, effective and controllable cybersecurity strategy. The objective is to describe cybersecurity in Venezuela and trends in this field through exploratory-descriptive research based on documentary consultation. Venezuela offers a better position in the technical, training and cooperation fields, according to the points of the Cybersecurity Assessment Index of the International Telecommunication Union (ITU), so that the legal and organizational aspect can be better developed. However, this isn`t the only cybersecurity-related aspect that companies need to pay attention to. The current situation has also led many companies, in order to be able to actively respond to the health risks associated with COVID-19, to begin to migrate their usual mode of operation to an alternative mode based on remote collaboration and virtual offices. The data go according to the degree of risk, from personal data, it is a whole catalog that must be respected, currently in various legal processes sentences are established that sanction for the violation of simple standards that the supervisory authority analyzes. At the epicenter of cybersecurity is data, and at the center of that data is cookie policies, which have revealed how spiders or search engine text files work and analyze each of users` actions to determine patterns of behavior. Sentiment analysis, among others. Trying to understand the technical part is easier when considering the practical consequences, where preventing the systems of companies that have legal sanctions that pose a risk, such as Yahoo in 2019, has been the subject of data protection investigations that had alleged violations of the accounts of many people nearly 8 million user accounts. some of Argentina, it was a case of the year 2013, as you can see, the cases are long and tired.

The loss due to a virus in a company has potentially very fast losses, to replace data with the appropriate backups, you need to have cybersecurity measures taken to avoid the very rapid expansion power of cybersecurity attacks.