{"id":2588,"date":"2019-05-30T12:15:21","date_gmt":"2019-05-30T16:15:21","guid":{"rendered":"https:\/\/venfort.com\/?p=951"},"modified":"2019-05-30T12:15:21","modified_gmt":"2019-05-30T16:15:21","slug":"loi-speciale-contre-la-criminalite-informatique","status":"publish","type":"post","link":"https:\/\/venfort.com\/fr\/ley-especial-contra-delitos-informaticos\/","title":{"rendered":"Aspects g\u00e9n\u00e9raux de la loi sp\u00e9ciale contre les d\u00e9lits informatiques au Venezuela"},"content":{"rendered":"<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>La loi sp\u00e9ciale contre les d\u00e9lits informatiques a \u00e9t\u00e9 publi\u00e9e au Journal officiel n\u00b0 37.313, le 30 octobre 2001, mais cet instrument juridique pr\u00e9voit, \u00e0 l'article 32, une p\u00e9riode d'attente de deux ans. <em>Vacatio legis<\/em> L'instrument juridique est entr\u00e9 officiellement en vigueur le 30 novembre 2001, malgr\u00e9 sa publication pr\u00e9alable au journal officiel. <\/p><\/blockquote>\n\n\n\n<p><strong>L'objectif de cet instrument juridique est la protection compl\u00e8te des syst\u00e8mes<\/strong> qui utilisent les technologies de l'information, ainsi que la pr\u00e9vention et la r\u00e9pression des d\u00e9lits commis contre ces syst\u00e8mes ou l'un de leurs composants, ou des d\u00e9lits commis par l'utilisation de ces technologies. En ce qui concerne l'application spatiale de la loi, le l\u00e9gislateur a envisag\u00e9 \u00e0 l'article 3 d'\u00e9tablir l'application extraterritoriale de cette loi pour les crimes commis en dehors du territoire, \u00e0 condition que l'acte punissable ait produit des effets.     <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Loi sp\u00e9ciale contre les d\u00e9lits informatiques<\/h2>\n\n\n\n<p><strong>Dans la ressource juridique, les technologies de l'information sont d\u00e9finies comme suit<\/strong> \u00ab<em>branche de la technologie consacr\u00e9e \u00e0 l'\u00e9tude, \u00e0 l'application et au traitement des donn\u00e9es, qui implique l'acquisition, la cr\u00e9ation, le stockage, la gestion, la modification, la manipulation, le mouvement, le contr\u00f4le, l'affichage, la transmission ou la r\u00e9ception automatiques d'informations, ainsi que le d\u00e9veloppement et l'utilisation de mat\u00e9riel, de microprogrammes et de logiciels.<\/em>\u00bb.<\/p>\n\n\n\n<p><strong>Cette loi prot\u00e8ge chacune des activit\u00e9s mentionn\u00e9es dans le paragraphe pr\u00e9c\u00e9dent.<\/strong>, Toutefois, l'instrument sanctionne les mauvaises pratiques li\u00e9es \u00e0 l'utilisation des technologies de l'information et \u00e0 l'utilisation des syst\u00e8mes informatiques.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Les vingt-et-une infractions p\u00e9nales pr\u00e9vues par la loi sont class\u00e9es en cinq cat\u00e9gories :<\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li>les infractions contre les syst\u00e8mes utilisant les technologies de l'information,<\/li><li>les crimes contre la propri\u00e9t\u00e9,<\/li><li>les crimes contre la vie priv\u00e9e des personnes et des communications,<\/li><li>les crimes contre les enfants et les adolescents, et<\/li><li>les infractions \u00e0 l'ordre \u00e9conomique.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Infractions les plus importantes<\/h2>\n\n\n\n<p><strong>Acc\u00e8s inappropri\u00e9. <\/strong>Le d\u00e9lit \u00e9tabli \u00e0 l'article 6 punit toute personne qui, sans autorisation, acc\u00e8de \u00e0 un syst\u00e8me utilisant des technologies de l'information ou l'utilise sans autorisation. Ce comportement est puni d'une peine d'emprisonnement d'un \u00e0 cinq ans et d'une amende selon les termes de la loi.<\/p>\n\n\n\n<p><strong>Sabotage ou endommagement des syst\u00e8mes.<\/strong> Le d\u00e9lit \u00e9tabli \u00e0 l'article 7 sanctionne quiconque d\u00e9truit, endommage, modifie ou alt\u00e8re intentionnellement le fonctionnement d'un syst\u00e8me utilisant les technologies de l'information ou l'un des \u00e9l\u00e9ments qui le composent, la peine \u00e9tant une peine d'emprisonnement de quatre \u00e0 huit ans et une amende correspondante. Si l'infraction d\u00e9crite est commise par imprudence, n\u00e9gligence, inexp\u00e9rience ou inobservation des r\u00e8gles \u00e9tablies, l'article 8 \u00e9tablit une att\u00e9nuation de la peine. <\/p>\n\n\n\n<p><strong>Possession de mat\u00e9riel ou fourniture de services de sabotage.<\/strong> L'article 10 de la loi stipule que toute personne qui importe, fabrique, distribue, vend ou utilise des \u00e9quipements, des dispositifs ou des programmes dans le but de les utiliser pour violer ou \u00e9liminer <a href=\"https:\/\/venfort.com\/fr\/securite-juridique-amerique-latine\/\">s\u00e9curit\u00e9<\/a> de tout syst\u00e8me utilisant des technologies de l'information est passible d'une peine d'emprisonnement de trois \u00e0 six ans et d'une amende correspondante. <\/p>\n\n\n\n<p><strong>Espionnage informatique.<\/strong> L'article 11 stipule que toute personne qui obtient, divulgue ou diffuse ind\u00fbment des donn\u00e9es ou des informations contenues dans un syst\u00e8me utilisant des technologies de l'information est passible d'une peine d'emprisonnement de trois \u00e0 six ans et d'une amende. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">D'autres d\u00e9lits punissables par la loi et non moins importants sont :<\/h2>\n\n\n\n<p><strong>Falsification de documents, vol d'ordinateur, fraude informatique,<\/strong> l'obtention indue de biens et de services, la manipulation frauduleuse de cartes \u00e0 puce ou d'instruments similaires, l'appropriation de cartes \u00e0 puce ou d'instruments similaires, la fourniture indue de biens ou de services, la possession d'\u00e9quipements contrefaits. Violation de la confidentialit\u00e9 des donn\u00e9es ou des informations personnelles, violation de la confidentialit\u00e9 des communications, divulgation indue de donn\u00e9es ou d'informations personnelles, diffusion ou exposition de mat\u00e9riel pornographique, exposition pornographique d'enfants ou d'adolescents, appropriation de la propri\u00e9t\u00e9 intellectuelle, offre trompeuse.<\/p>\n\n\n\n<p><strong>Enfin, il convient de noter que, dans les articles 27 et 28 de la loi<\/strong>, L'article 29 \u00e9tablit les cas dans lesquels les peines pour les d\u00e9lits informatiques susmentionn\u00e9s peuvent \u00eatre aggrav\u00e9es lorsqu'il est \u00e9tabli que, outre les conduites indiqu\u00e9es dans chaque d\u00e9lit, l'agent a obtenu ind\u00fbment les mots de passe n\u00e9cessaires pour acc\u00e9der au syst\u00e8me ou qu'ils ont \u00e9t\u00e9 obtenus par l'abus de la position privil\u00e9gi\u00e9e du poste en raison de l'exercice ou de la fonction. De m\u00eame, l'article 29 \u00e9tablit des peines accessoires aux peines principales, telles que la confiscation du mat\u00e9riel, le travail d'int\u00e9r\u00eat g\u00e9n\u00e9ral et l'interdiction d'exercer un emploi public pendant une p\u00e9riode pouvant aller jusqu'\u00e0 trois ans. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sources consult\u00e9es<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" aria-label=\"informatica-juridica.com (ouvre un nouvel onglet)\" href=\"http:\/\/www.informatica-juridica.com\/legislacion\/venezuela\/\" target=\"_blank\">informatica-juridica.com<\/a><\/li><li><a rel=\"noreferrer noopener\" aria-label=\"monografias.com (ouvre un nouvel onglet)\" href=\"https:\/\/www.monografias.com\/trabajos82\/delito-informatico-venezuela\/delito-informatico-venezuela.shtml\" target=\"_blank\">monografias.com<\/a><\/li><li><a href=\"http:\/\/www.conatel.gob.ve\/ley-especial-contra-los-delitos-informaticos-2\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"conatel.gov.ve (ouvre un nouvel onglet)\">conatel.gov.ve<\/a><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>La Ley Especial Contra los Delitos Inform\u00e1ticos, fue publicada en gaceta oficial N\u00b0 37.313, en fecha en fecha 30 de Octubre de 2001, sin embargo, dicho instrumento legal estableci\u00f3 en su art\u00edculo 32, un per\u00edodo de Vacatio legis de treinta d\u00edas, por lo cual, a pesar de haberse publicado en gaceta oficial previamente, el instrumento [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2589,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","omw_enable_modal_window":"enable","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[35],"tags":[307,309,41],"class_list":["post-2588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-delitos-informaticos","tag-ley-especial","tag-venezuela","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aspectos de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela<\/title>\n<meta name=\"description\" content=\"Abordamos en este art\u00edculo los delitos m\u00e1s relevantes titpificados en la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/venfort.com\/fr\/loi-speciale-contre-la-criminalite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aspectos de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela\" \/>\n<meta property=\"og:description\" content=\"Abordamos en este art\u00edculo los delitos m\u00e1s relevantes titpificados en la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/venfort.com\/fr\/loi-speciale-contre-la-criminalite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"Venfort\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/venfortyabogados\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-30T16:15:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/venfort.com\/wp-content\/uploads\/2019\/05\/ley-especial-contra-delitos-informaticos-venezuela.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"VENFORT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Venfortabogados\" \/>\n<meta name=\"twitter:site\" content=\"@Venfortabogados\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"VENFORT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/\"},\"author\":{\"name\":\"VENFORT\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/person\\\/6c0e1de9015eb56bbbf307df50c9872e\"},\"headline\":\"Aspectos generales de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela\",\"datePublished\":\"2019-05-30T16:15:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/\"},\"wordCount\":857,\"publisher\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/ley-especial-contra-delitos-informaticos-venezuela.jpg\",\"keywords\":[\"delitos informaticos\",\"ley especial\",\"Venezuela\"],\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/\",\"url\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/\",\"name\":\"Aspectos de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/ley-especial-contra-delitos-informaticos-venezuela.jpg\",\"datePublished\":\"2019-05-30T16:15:21+00:00\",\"description\":\"Abordamos en este art\u00edculo los delitos m\u00e1s relevantes titpificados en la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/ley-especial-contra-delitos-informaticos-venezuela.jpg\",\"contentUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/ley-especial-contra-delitos-informaticos-venezuela.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/venfort.com\\\/ley-especial-contra-delitos-informaticos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/venfort.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aspectos generales de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#website\",\"url\":\"https:\\\/\\\/venfort.com\\\/\",\"name\":\"Venfort\",\"description\":\"Firma de Abogados | Derecho Penal Econ\u00f3mico, Derecho Penal Internacional, Derecho de Empresas, Derecho Financiero, Derecho Administrativo, Derecho Civil y Sucesiones Internacionales\",\"publisher\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#organization\"},\"alternateName\":\"VENFORT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/venfort.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#organization\",\"name\":\"Venfort Abogados\",\"alternateName\":\"VENFORT\",\"url\":\"https:\\\/\\\/venfort.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Logo_Venfort_Horizontal_Color.png\",\"contentUrl\":\"https:\\\/\\\/venfort.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Logo_Venfort_Horizontal_Color.png\",\"width\":1000,\"height\":237,\"caption\":\"Venfort Abogados\"},\"image\":{\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/venfortyabogados\",\"https:\\\/\\\/x.com\\\/Venfortabogados\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/venfort-aldana-abogados\",\"https:\\\/\\\/www.instagram.com\\\/venfortabogados\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/venfort.com\\\/#\\\/schema\\\/person\\\/6c0e1de9015eb56bbbf307df50c9872e\",\"name\":\"VENFORT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g\",\"caption\":\"VENFORT\"},\"url\":\"https:\\\/\\\/venfort.com\\\/fr\\\/author\\\/venfortadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aspects de la loi sp\u00e9ciale contre les d\u00e9lits informatiques au Venezuela","description":"Cet article traite des principaux d\u00e9lits couverts par la loi sp\u00e9ciale contre les d\u00e9lits informatiques au Venezuela.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/venfort.com\/fr\/loi-speciale-contre-la-criminalite-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Aspectos de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela","og_description":"Abordamos en este art\u00edculo los delitos m\u00e1s relevantes titpificados en la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela.","og_url":"https:\/\/venfort.com\/fr\/loi-speciale-contre-la-criminalite-informatique\/","og_site_name":"Venfort","article_publisher":"https:\/\/www.facebook.com\/venfortyabogados","article_published_time":"2019-05-30T16:15:21+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/venfort.com\/wp-content\/uploads\/2019\/05\/ley-especial-contra-delitos-informaticos-venezuela.jpg","type":"image\/jpeg"}],"author":"VENFORT","twitter_card":"summary_large_image","twitter_creator":"@Venfortabogados","twitter_site":"@Venfortabogados","twitter_misc":{"\u00c9crit par":"VENFORT","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#article","isPartOf":{"@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/"},"author":{"name":"VENFORT","@id":"https:\/\/venfort.com\/#\/schema\/person\/6c0e1de9015eb56bbbf307df50c9872e"},"headline":"Aspectos generales de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela","datePublished":"2019-05-30T16:15:21+00:00","mainEntityOfPage":{"@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/"},"wordCount":857,"publisher":{"@id":"https:\/\/venfort.com\/#organization"},"image":{"@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#primaryimage"},"thumbnailUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2019\/05\/ley-especial-contra-delitos-informaticos-venezuela.jpg","keywords":["delitos informaticos","ley especial","Venezuela"],"articleSection":["Seguridad"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/","url":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/","name":"Aspects de la loi sp\u00e9ciale contre les d\u00e9lits informatiques au Venezuela","isPartOf":{"@id":"https:\/\/venfort.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#primaryimage"},"image":{"@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#primaryimage"},"thumbnailUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2019\/05\/ley-especial-contra-delitos-informaticos-venezuela.jpg","datePublished":"2019-05-30T16:15:21+00:00","description":"Cet article traite des principaux d\u00e9lits couverts par la loi sp\u00e9ciale contre les d\u00e9lits informatiques au Venezuela.","breadcrumb":{"@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#primaryimage","url":"https:\/\/venfort.com\/wp-content\/uploads\/2019\/05\/ley-especial-contra-delitos-informaticos-venezuela.jpg","contentUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2019\/05\/ley-especial-contra-delitos-informaticos-venezuela.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/venfort.com\/ley-especial-contra-delitos-informaticos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/venfort.com\/"},{"@type":"ListItem","position":2,"name":"Aspectos generales de la Ley Especial contra Delitos Inform\u00e1ticos en Venezuela"}]},{"@type":"WebSite","@id":"https:\/\/venfort.com\/#website","url":"https:\/\/venfort.com\/","name":"Venfort","description":"Cabinet : Droit p\u00e9nal \u00e9conomique, droit p\u00e9nal international, droit des soci\u00e9t\u00e9s, droit financier, droit administratif, droit civil et droit des successions internationales","publisher":{"@id":"https:\/\/venfort.com\/#organization"},"alternateName":"VENFORT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/venfort.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/venfort.com\/#organization","name":"Avocats de Venfort","alternateName":"VENFORT","url":"https:\/\/venfort.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/venfort.com\/#\/schema\/logo\/image\/","url":"https:\/\/venfort.com\/wp-content\/uploads\/2026\/03\/Logo_Venfort_Horizontal_Color.png","contentUrl":"https:\/\/venfort.com\/wp-content\/uploads\/2026\/03\/Logo_Venfort_Horizontal_Color.png","width":1000,"height":237,"caption":"Venfort Abogados"},"image":{"@id":"https:\/\/venfort.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/venfortyabogados","https:\/\/x.com\/Venfortabogados","https:\/\/www.linkedin.com\/company\/venfort-aldana-abogados","https:\/\/www.instagram.com\/venfortabogados"]},{"@type":"Person","@id":"https:\/\/venfort.com\/#\/schema\/person\/6c0e1de9015eb56bbbf307df50c9872e","name":"VENFORT","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d96769bd368e8f15c4aec9dce5b759ea0d3a49ad69242757e358a4ec75eba02?s=96&d=mm&r=g","caption":"VENFORT"},"url":"https:\/\/venfort.com\/fr\/author\/venfortadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/posts\/2588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/comments?post=2588"}],"version-history":[{"count":0,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/posts\/2588\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/media\/2589"}],"wp:attachment":[{"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/media?parent=2588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/categories?post=2588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/venfort.com\/fr\/wp-json\/wp\/v2\/tags?post=2588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}