{"id":894,"date":"2023-04-04T19:52:54","date_gmt":"2023-04-04T19:52:54","guid":{"rendered":"https:\/\/grupotech.cl\/?p=894"},"modified":"2025-09-05T21:24:42","modified_gmt":"2025-09-05T21:24:42","slug":"el-hacking-etico-en-chile-ya-no-sera-un-delito","status":"publish","type":"post","link":"https:\/\/grupotech.cl\/en\/blog\/el-hacking-etico-en-chile-ya-no-sera-un-delito\/","title":{"rendered":"Ethical Hacking in Chile will NO longer be a crime"},"content":{"rendered":"<p>Cybersecurity continues to be a key issue in our country! It is essential that companies and organizations understand the importance of keeping their digital information secure, and that ethical hacking can be a valuable tool to achieve this.<\/p>\n<p>The recent approval of ethical hacking in the Framework Law on Cybersecurity and Critical Information Infrastructure is excellent news for all those who work in the field of information security. This new regulation will allow cybersecurity researchers to carry out security tests without fear of being penalized, as long as they meet certain conditions established by the National Cybersecurity Agency.<\/p>\n<p>This measure will promote research in computer security and help increase the level of cybersecurity in the country. In addition, it will allow companies to identify possible vulnerabilities in their systems and correct them before they are exploited by cybercriminals. This is especially important considering the constant increase in cyber attacks around the world.<\/p>\n<p>In short, the approval of ethical hacking in the Framework Law on Cybersecurity and Critical Information Infrastructure is an important step to protect digital information in our country. As experts in digital marketing, we must work so that companies understand the importance of cybersecurity and get involved in protecting their data and that of their customers. Only then can we meet the challenges posed by today&#039;s digital world.<\/p>\n<p>Anyone who, carrying out investigation work in computer security, has incurred in the acts typified in the first paragraph, will not be subject to a criminal sanction, provided that the following conditions are met:<\/p>\n<ol>\n<li>Have reported the access and vulnerabilities in your investigation to the person responsible for the affected computer networks or systems immediately and at the latest when you alert the National Cybersecurity Agency<\/li>\n<li>Having complied with the other conditions on responsible communication of vulnerabilities that the National Cybersecurity Agency has issued for that purpose<\/li>\n<li>That the access has not been made with the aim of seizing or using the information contained in the computer system or with fraudulent intent, nor may it have acted beyond what was necessary to verify the existence of a vulnerability, nor used methods that could lead to denial of service to physical evidence using malicious code, social engineering and tampering deletion exfiltration or destruction of data<\/li>\n<li>Not having publicly disclosed the information related to potential vulnerability, nor will the person who communicates to the agency information about a potential vulnerability of which they have become aware in their work context or during the provision of their services, be penalized. nor will they be considered to have complied with their obligation of professional secrecy.<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>\u00a1La ciberseguridad sigue siendo un tema clave en nuestro pa\u00eds! es fundamental que empresas y organizaciones comprendan la importancia de mantener segura su informaci\u00f3n digital, y que el hacking \u00e9tico puede ser una herramienta valiosa para lograrlo. La reciente aprobaci\u00f3n del hacking \u00e9tico en la Ley Marco de Ciberseguridad e Infraestructura Cr\u00edtica de la Informaci\u00f3n, es una excelente noticia para todos aquellos que trabajan en el \u00e1mbito de la seguridad inform\u00e1tica. Esta nueva regulaci\u00f3n permitir\u00e1 que los investigadores en ciberseguridad puedan realizar pruebas de seguridad sin temor a ser sancionados penalmente, siempre y cuando cumplan con ciertas condiciones establecidas por la Agencia Nacional de Ciberseguridad. Esta medida fomentar\u00e1 la investigaci\u00f3n en seguridad inform\u00e1tica y ayudar\u00e1 a aumentar el nivel de ciberseguridad del pa\u00eds. Adem\u00e1s, permitir\u00e1 a las empresas identificar posibles vulnerabilidades en sus sistemas y corregirlas antes de que sean explotadas por ciberdelincuentes. Esto es especialmente importante considerando el aumento constante de ataques inform\u00e1ticos en todo el mundo. En definitiva, la aprobaci\u00f3n del hacking \u00e9tico en la Ley Marco de Ciberseguridad e Infraestructura Cr\u00edtica de la Informaci\u00f3n es un paso importante para proteger la informaci\u00f3n digital en nuestro pa\u00eds. Como expertos en marketing digital, debemos trabajar para que las empresas comprendan la importancia de la ciberseguridad y se involucren en la protecci\u00f3n de sus datos y los de sus clientes. Solo as\u00ed podremos enfrentar los desaf\u00edos que plantea el mundo digital de hoy en d\u00eda. No ser\u00e1 objeto de sanci\u00f3n penal el que realizando labores de investigaci\u00f3n en seguridad inform\u00e1tica hubiera incurrido los hechos tipificados en el inciso primero siempre que se cumplan las siguientes condiciones: Haber reportado el acceso y las vulnerabilidades en su investigaci\u00f3n al responsable de las redes o sistemas inform\u00e1ticos afectados en forma inmediata y a m\u00e1s tardar en el momento en que alerte a la Agencia Nacional de Ciberseguridad Haber dado cumplimiento a las dem\u00e1s condiciones sobre comunicaci\u00f3n responsable de vulnerabilidades que al efecto hubiere dictado la Agencia Nacional de Ciberseguridad Que el acceso no haya sido realizado con el \u00e1nimo de apoderarse o usar la informaci\u00f3n contenida en el sistema inform\u00e1tico ni con intenci\u00f3n fraudulenta, tampoco podr\u00e1 haber actuado m\u00e1s all\u00e1 de lo que era necesario para comprobar la existencia de una vulnerabilidad, ni utilizados m\u00e9todos que pudieran conducir a denegaci\u00f3n de servicio a pruebas f\u00edsicas utilizando utilizaci\u00f3n de c\u00f3digo malicioso, ingenier\u00eda social y alteraci\u00f3n eliminaci\u00f3n exfiltraci\u00f3n o destrucci\u00f3n de data No haber divulgado p\u00fablicamente la informaci\u00f3n relativa a la potencial vulnerabilidad, tampoco ser\u00e1 objeto de sanci\u00f3n penal la persona que comunique a la agencia informaci\u00f3n sobre una vulnerabilidad potencial de la que haya tomado conocimiento en su contexto laboral o con ocasi\u00f3n de la prestaci\u00f3n de sus servicios, ni se considerar\u00e1 que hayan cumplido con ello su obligaci\u00f3n de secreto profesional.<\/p>","protected":false},"author":1,"featured_media":895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_joinchat":[],"footnotes":""},"categories":[7],"tags":[21,20],"class_list":["post-894","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cut-security","tag-delitos","tag-hacking-etico"],"_links":{"self":[{"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/posts\/894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/comments?post=894"}],"version-history":[{"count":1,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/posts\/894\/revisions"}],"predecessor-version":[{"id":896,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/posts\/894\/revisions\/896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/media\/895"}],"wp:attachment":[{"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/media?parent=894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/categories?post=894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupotech.cl\/en\/wp-json\/wp\/v2\/tags?post=894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}