Cyber Security and Habeas Data: The Latin American response to information security and data protection

Cyber Security and Habeas Data: The Latin American response to information security and data protection

Contenido principal del artículo

Luisa Parraguez Kobek
Erick Caldera


Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their  information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.

Palabras clave:


Los datos de descargas todavía no están disponibles.

Detalles del artículo

Referencias (VER)

Anderson, R. & Moore, T. (2007). Information Security Economics – and Beyond. Advances in Cryptology – crypto 2007, 4622, pp. 68-91. Retrieved from

Anderson, B. & Schneier, B. (2004). Economics of Information Security. ieee Security & Privacy. Retrieved from

Banisar, D. (2011). The Right to Information and Privacy: Balancing Rights and Managing Conflicts. Retrieved from

Barrientos, A. & Santibañez, C. (2009). New Forms of Social Assistance and the Evolution of Social Protection in Latin America. Journal of Latin American Studies 41 (01), pp. 1-26

Bazan, V. (2011). Habeas Data in Comparative Law, with Particular Reference to the Bolivian Constitutional Reform. Comparative Media Law Journal (5). Retrieved from

Blind, P. K. (2006). Building Trust in Government in the Twenty-First Century: Review of Literature and Emerging Issues. 7th Global Forum on Reinventing Government. Retrieved from

Brigard & Urrutia Press (2013). Personal Data Regulations in Colombia: The New Legal Trend for Companies. Retrieved from

Carson, A. (2013). Consent is King in Latin America: Navigating the Eight Existing dpas with a Look to the Future. International Association of Privacy Professionals. Retrieved from

Chirino Sanchez, A. (1997). Las Tecnologías de la Información y el Proceso Penal. Nexos Costa Rica. Retrieved from

Cornell University Law School (n.d.). “Habeas Corpus.” Legal Information Institute. Retrieved from

Council of Europe (2001). Convention on Cybercrime. Retrieved from

Council of Europe. (1981). Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Retrieved from

Cruz, X. (2012). Data Protection and Privacy Issues in Latin America. Cloud Times. Retrieved from

Derechos Digitales (2016). Internet en México: Derechos humanos en el entorno digital. Mexico City: Derechos Digitales.

DeVries, W. T. (2003). Protecting Privacy in the Digital Age. Berkeley Technology Law Journal, 18 (1), pp. 283-310. Retrieved from

Dunn Cavelty, M. (2014). Breaking the Cyber-security Dilemma: Aligning Security Needs and Removing Vulnerabilities. Science and Engineering Ethics, 20 (3), pp. 701-715.

Falcon, E. (1996). Habeas Data: Concepto y Procedimiento. Buenos Aires: Abeledo Perrot.

García, C. (2016). Acepta MC que padrón en Amazon pertenece al partido. El Universal. Retrieved from>>

Genderen, R. (2008). Cybercrime investigation and the protection of personal data and privacy. CIUDAD: Economic Crime Division, Council of Europe. Retrieved from

Global Project on Cybercrime (2011). Cybercrime Strategies. Economic Crime Division, Council of Europe. Retrieved from

Gozon, F. E. & Orosa, T. J. (2007). The Sovereign Individual: The Writ of Habeas Data and the Right to Information Privacy. Ateneo Law Journal 52, pp. 648-664

Guadamuz, A. (2000). Habeas Data: The Latin-American Response to Data Protection. Journal of Information, Law, and Technology. Retrieved from

Gutierrez, H. & Korn, D. (2013). Facilitando the Cloud: Data Protection Regulation as a Driver of National Competitiveness in Latin America. University of Miami Inter-American Law Review, 45 (1). Retrieved from

Harding, L. (2016). What are the Panama Papers? A Guide to History’s Biggest Data Leak. The Guardian. Retrieved from

Higgott, R. (2005). The Theory and Practice of Global and Regional Governance: Accommodating American Exceptionalism and European Pluralism. garnet Working Paper, 1 (5). Retrieved from

International Telecommunication Union (2016). Itu Releases ict 2015 Figures. Retrieved from

Kirsh, E., Phillips, D. y D. McIntyre. (1996). Recommendations for the Evolution of Cyberlaw. Journal of Computer-Mediated Communication 2 (2).

Laurant, C. (2010). Recent Cyber-crime Court Decisions from Latin America Legal and Policy Developments. Retrieved from

Levi, M. & Stoker, L. (2000). Political trust and trustworthiness. Annual Review of Political Science 3, pp. 475-507.

Leiva, A. (2013). Data Protection Law in Spain and Latin America: Survey of Legal Approaches. American Bar Association. Retrieved from

Litwak, R. S. & King, M. (2015). Cybersecurity treaties may be nice but it’s really every country for itself. Digital Futures Project. Retrieved from

Martínez-Herrera, M. (2011). From Habeas Data Action to Omnibus Data Protection: The Latin American Privacy (R)Evolution. White & Case Technology Newsflash. Retrieved from http://

MicroMarket Monitor (2015). Latin America Cloud Analytics. Retrieved from

Morgan, S. (2015). Multibillion-Dollar Cybersecurity Markets in Asia Pacific and Latin America. Retrieved from,

Committee on Political and Juridical Affairs (2012). Comparative Study: Data Protection in the Americas Different existing legal regimes, policies and enforcement mechanisms for the protection of personal data, including domestic legislation, regulation, and self-regulation. Retrieved from

OAS, Department of International Law 1 (2012). Data Protection. Retrieved from

OAS, Department of International Law 2 (2012). Relation between Privacy Protection, Data Protection and Habeas Data. Retrieved from

OAS & Trend Micro (2013). Latin America and the Caribbean Cybersecurity Trends and Government Responses. Retrieved from

Permanent Council of the Organization of American States Committee on Political and Juridical Affairs (2012). Comparative Study: Data Protection in the Americas. Washington, D.C.

PwC. (2015). Cybersecurity in Mexico. Retrieved from file:///C:/Users/Administrator/Downloads/20150917-kc-cybersecurity.pdf

Raigada, A. T. (2009). Reutilización de información pública y protección de datos personales. Revista General de Información y Documentación, pp. 243-264.

Saavedra, B. (2016). Las infraestructuras críticas en América Latina: Conectada, dependiente y vulnerable. Perry Center Occasional Paper, pp. 3-21.

Saavedra, B. (2015). Inteligencia Estratégica en un mundo globalizado en Latinoamérica: Retos y desafíos en el siglo XXI, Revista Policía y Seguridad Pública, 5 (2), pp. 75-106. Retrieved from

Saavedra, B. (2015). Cybersecurity in Latin America and the Caribbean: The state of readiness for the defense of cyberspace. William J. Perry Center for Hemispheric Defense Studies, pp. 3-12. Retrieved from

Silva, A. C. (2011). El “Nivel Adecuado de Protección” para las transferencias Internacionales de Datos Personales desde la Unión Europea. Revista de Derecho (Valparaíso), pp. 327-356.

Thomas, B. (2007). Policy Brief: Habeas Data as a Policy Toward Corporate Data Aggregation. Retrieved from

Tschentscher, A. & Lehner, C. (2013). The Latin American Model of Constitutional Jurisdiction: Amparo and Judicial Review. Social Science Research Network. Retrieved from

Warren, S., & Brandeis, L. (1890). The Right to Privacy. Harvard Law Review 4 (5). Retrieved from

Westin, A. (1967). Privacy and Freedom. New York: The Bodley Head Ltd.

Citado por