
High Crimes and Offenses Technology.
EL CONFERENCE NATIONAL En Name of the Republic
CONSIDERING: That the Constitution of the Republic Dominican Republic establishes the derechos and fundamental duties of citizens among which is the freedom of expression, integrity and inviolability of correspondence and other private documents;
CONSIDERING: That the Act General Telecommunications Law No. 153-98, of May 27, 1998, establishes the legal obligation to respect the inviolability of telecommunications and prohibits the use of telecommunications contrary to the laws or that has as its object commit crimes or hinder the action of the Justice;
CONSIDERING: That the technologies of the insights and communication have experienced an impressive development, thus providing a new support for the commission of traditional crimes and create new types of infractions and acts not incriminated, affecting the patrimonial and extrapatrimonial interests of individuals and legal entities, as well as the State and the institutions that represent it;
CONSIDERING: That these crimes and offenses related to information technology insights and communication are not provided for in the legislation penal Dominican Republic, so the authors of such actions cannot be punished without the creation of a legislation prior, and consequently, its classification is necessary, and the adoption of sufficient mechanisms for its fight effective, facilitating the cooperation between State and the sector private for detection, research y sanction a level national of these new types of crimes, and establishing provisions that allow for a cooperation Diversification reliable and fast;
CONSIDERING: That the typing and prevention of the criminal acts to be punished have acquired great relevance level Diversification, because with the development of information technology, insights and communication have given rise to major security challenges; and that today, the Commission Inter-American Telecommunications Commission (CITEL), the Inter-American Committee against Terrorism (CICTE) and the Meeting of Minister, Justice o Attorneys General of the Americas (REMJA) are working on the adoption of a hemispheric strategy for cybersecurity in the region, as seen here as provided by the Litigation, Arbitration AG/RES. 2004 (XXXIV-0/04) of the General Assembly of the Organisation of American States (OAS) of when and where June 8, 2004, for the Adoption of a Comprehensive Inter-American Strategy to Combat Threats to Security
Cybernetics;
CONSIDERING: That in the current rd of the knowledge, The insights and the electronic instruments for channeling it have become increasingly important and transcendent in the processes of development, competitiveness and structural changes recorded in the economic, political, social, cultural and business aspects of the country.
VISTA: The Constitution of the Republic Dominican;
VISTA: The Act General Telecommunications No. 153-98, of May 27, 1998;
VISTA: The Act No. 126-02, of September 4, 2002, of Stores Electronic, Documents and Digital Signatures;
VISA: The Code Criminal law of the Republic Dominican, of August 20, 1884, and its modifications;
VISA: The New Code Criminal law of the Republic Dominican, approved by the Camera of Deputies of the Republic, on July 26th year and we will announce 2006;
VISA: The Code Procedural Criminal law of the Republic Dominican, Act No. 76-02, of July 19, 2002;
VISTA: The Act No.20-00, of May 8, 2000, of Intellectual Industrial;
VISTA: The Act No.65-00, of August 21, 2000, of Law School de Author;
VISTA: The Act No. 136-03, of August 7, 2003, Code of the Minor;
VISTA: The Act No.96-04, of January 28, 2004, Institutional of the Police;
VISTA: The Declaration Universal of Rights Humans of 1948 and the Convention of American about Rights Humans, signed in San José de Rib Rica, November 22, 1969;
VISTA: The Act No. 137-03, of August 7, 2003, on Traffic Illicit of Migrants and About of People;
VISTA: The Act No. 50-88, of May 30, 1988, on Drugs and Controlled Substances of the Republic Dominican;
VISTA: The Litigation, Arbitration AG/RES.2004 (XXXIV-0/04) of June 8, 2004 of the General Assembly of the Organisation of American States (OAS);
VISA: The German on Cybercrime Council of Europe, 23 November 2001.
HAS GIVEN THE FOLLOWING LAW:
TITLE I
GENERAL AND CONCEPTUAL PROVISIONS
SECTION I OBJECT, SCOPE AND PRINCIPLES
Article l.- Object of the Act. The present law has for object comprehensive protection of systems that use technologies insights and communication and its content, as well as the prevention y sanction of crimes committed against them or any of their components or those committed through the use of these technologies in damage of natural or legal persons, under the terms provided in this law. The integrity of the systems of insights and its components, the insights or the data, which are stored or transmitted through them, the transactions and commercial agreements or of any other nature that are carried out through them and the confidentiality of these, are all goods protected legal rights.
Article 2.- Scope of Application. This law will apply throughout the territorio of the Republic Dominican, to all person physical or moral, national or foreigner, who commits a done sanctioned by its provisions, in any of the following circumstances:
a) When the sujeto asset originates or orders the action criminal within the territorio national;
b) When the sujeto asset originates or orders the action criminal since the extranjero, producing effects at the territorio Dominican;
c) When the origin or the effects of the action occur in the extranjero, using means found in the territorio national; and finally,
d) When any is characterized type of complicity from the territorio Dominican.
Paragraph.- General Application. This law It is generally applicable to all individuals or legal entities, public or private, national or international.
Article 3.- General Principles. This law will have as principles:
a) Principle de Territoriality. This law penal will apply to violations committed in the territorio of the Republic Dominican. However, the infringement shall be deemed to have been committed in the territorio national since any of the crimes or offenses provided for in this law, is committed outside the territorio of the Republic under the conditions expressed in literals b) and c) of the Article 2, leaving the sujeto asset, /// that it has not been court through sentences final By himself done or evaded the persecution penal in foreign courts, to the provision of the jurisdiction national;
b) Principle Reasonableness and Proportionality. Restrictions and prohibitions must be proportional to the ends and means of the danger they are trying to avoid, with the social consequences of the decision being carefully weighed. When applying the penalties imposed by this law, the competent judge must consider the seriousness of the done committed and take into account account that the penalties must have a effect social and regenerative, not only for the individual to whom it is applied but also for the society as a whole.
SECTION II DEFINITIONS
Article 4.- Definitions. For the purposes of this law, shall be understood as:
Access Illicit: The done to enter or the intention to enter without authorization, or through the access of a third, a work de insights, whether or not remaining in it.
Affect: Alter, cause anomalies in any of the operations to be performed by a program, software, work, network of work, or to the computer itself, preventing its use normal by part of the user.
Cloning: Exact duplication or reproduction of an electronic series, a number or work de identification of a device or a means of accessing a the service.
Code Access: Information or password that authenticates a user authorized in a work de insights, which allows you access private and protected to saying work.
Code de Identification: Information, key or similar mechanism, which identifies a user authorized in a work de insights.
Code Malicious: All programs, Valid identity document, message, instructions and/or sequence of any of these, in any programming language, which is activated by inducing the user who runs the program crafts involuntary and that is likely to cause some type de damage by means of the instructions with which it was programmed, without the permission nor knowledge of the user.
Computer: Any electronic device, regardless of its crafts, size, capacity, technology, able to process data and/or signals, which performs logical, arithmetic and memory functions by means of the manipulation of electronic, optical, magnetic, electrochemical or any other type of impulses, including all input, output, indictment, storage, programs, communication or any other facilities that are connected, related or integrated to it.
Cryptography: Foliage of applied mathematics and computer science that deals with the transformation of digital documents or data messages, from their presentation original to representation unintelligible and indecipherable that protects your confidentiality and prevents recovery of the insights, Valid identity document or message originalBy part from unauthorized persons.
Data: It's all insights that is transmitted, guard, record, process, copy or stored in a work de insights of any nature or in any of its components, such as those whose purpose is transmission, issue, storage, indictment and reception of electromagnetic signals, signs, signals, writings, still or moving images, video, voice, sounds, data by optical means, phone, radio, electromagnetic systems or any other means Useful for such purposes.
Data Relating to Users: All data will be understood as insights en crafts of computer data or any other crafts, which is owned by a service provider and which is related to the users of said services, excluding data on traffic or content, and which allows to determine:
him type de the service communications used, the technical provisions adopted in this regard and the period de the service;
b) The identity, The steer axle truck postal or geographic address and the telephone number of the user, as well as any other access number or insights about billing and paid that is available on a per-month basis contract or an agreement of benefit of services;
c) Any other insights relative to the location of communications equipment, available on a per-site basis. contract or a services agreement.
Crime High Technology: Those behaviors that are detrimental to the goods legal rights protected by the Constitution, laws, decrees, regulations and resolutions related to the systems of insights. They will be understood to be included within this definition electronic, computer, telematic, cyber and telecommunications crimes.
Diversion of Contracted Facilities: This occurs when large-scale traffic transmission facilities are contracted. capacity all with use private and subsequently, they are used for commercial purposes without the authorization of the service provider.
Service Diversion: This occurs whenever international facilities are irregularly connected to the public switched network to terminate traffic.
Device: Object, article, piece, bar code, used to commit high-risk crimes technology.
Access Device: It is any card, plate, bar code, number, or other means or forms of access, to a work o part of this, which can be used independently or in conjunction with other devices, to achieve access to a work de insights or any of its components.
Document Digital: It is the insights encoded in crafts digital on a logical or physical support, in which electronic, photolithographic, optical or similar methods are used, which constitute representation of acts, acts or data.
Interception: To seize, use, to affect, stop, divert, edit or mutilate, in any way crafts a data or data transmission belonging to another person physical or moral, on its own account or by order of another, to use in some way way or to know its content, through a work de insights or any of its components.
Internet: It is a work of computer networks linked together by a protocol común special global communication service, which facilitates data communication services such as Web content, record remote, file transfer, email, newsgroups and trade electronic, among others.
Pornography Children: All representation, by any means, of boys, girls and adolescents, dedicated to explicit sexual activities, real or simulated or any representation of the genital parts of children and adolescents for primarily sexual purposes. A boy or girl is considered to be any person since nacimiento up to twelve years of age, inclusive, and adolescents, at all ages person from the age of thirteen until reaching maturity mayoria de edad.
Computer Network: Interconnection between two or more computer systems or between computer systems and remote terminals, including microwave communication, optical, electronic or any other means of communication, which allows the exchange of files, transactions and data, in order to meet the needs of insights y indictment of data from a community, Company or particular.
Salary Minimum: For the purposes of this law, will be understood as the wage minimum national lowest perceived by workers in the sector private not sectorized for industrial, commercial and service companies, established by the Committee National of Salaries of the Secretariat of State de Work of the Republic Dominican.
Signal Shooting: Signal generated to a platform which returns the dial tone, whether coming from a work de insights or through an operator.
Shipping Costs Content: Without faculty o authority legal, statutory, regulatory or any other type for own, to use or do something, without having power legitimate. This includes the lack or total lack of authorization, express or implied, and the transgression of the limit of the authorization that is owned.
System de Information: Device or set of devices that use information technology insights and communication, as well as any work high technology, including, but not limited to electronic, computer, telecommunications and telematic systems, which separately or jointly serve to generate, send, to receive, archive or process insights, digital documents, data messages, among others.
System Electronic: Device or set of devices that use electrons in various media under the action of electric and magnetic fields, such as semiconductors or transistors.
System Computer: A device or set of related devices, whether connected or not, that include computers or other components such as input, output, transfer and storage, as well as data communication circuits and operating systems, programs and data, for the indictment and automated data transmission.
System Telecommunications: A set of related devices, connected or not, whose purpose is the transmission, issue, storage, indictment and reception of signals, electromagnetic signals, signs, writings, still or moving images, video, voice, sounds, data or information of any nature, by optical means, phone, radioelectric, electromagnetic or any other platform Useful for such purposes. This concept includes fixed and mobile telephone services, value aggregate, cable television, space services, satellite services and others.
System Telematic: System which combines telecommunications and computer systems as methodology and to transmit the insights.
Subject Active: It is the one who intentionally violates or attempts to violate, for action, omission or by mandate, any of the actions described herein law. For the purposes of this law is reputed to be sujeto asset to the accomplices, who will be liable to be sentenced to the same penalty that the actor principal of the acts.
Subject Liabilities: It is anyone who feels affected or threatened in any of their derechos awarded by the violation of the provisions of this law.
Electronic Transfer of Funds (TEF): It is any transfer of fondos initiated through an electronic, computer or other device that orders, instructs or authorizes a depositary o institution financial to transfer a certain sum to a account determined.
User: Human physical or legal entity that is acquired in a manner, legitimate goods or services of another.
TITLE II
EFFECTIVE REGULATIONS A LEVEL NATIONAL
CHAPTER I
CRIMES AND CRIME AGAINST CONFIDENTIALITY, INTEGRITY
AND AVAILABILITY OF DATA AND SYSTEMS INFORMATION
Article 5.- Access Codes. The done to disclose, generate, copy, record, capture, use, alter, traffic, decrypt, decode or in any way way decipher the access codes, insights or similar mechanisms, through which access is achieved illicit to a work electronic, computer, telematic or telecommunications, or its components, or falsify any type of access device to it, will be sanctioned with the penalty from one to three years prison y fine from twenty to one hundred times the wage minimum.
Paragraph.- Cloning of Access Devices. Cloning, for the sale, distribution or any other use of a device for accessing a the service o work computer, electronic or telecommunications, by copying or transferring, from one device to another similar one, the codes of identification, electronic series or other element of identification and/or access to the the service, which allows the operación parallel of a the service legitimately contracted or the carrying out of fraudulent financial transactions in detriment of the user authorized of the the service, will be punished with the penalty from one to ten years prison y fine from two to five hundred times the wage minimum.
Article 6.- Access Illicit. The done to access a work electronic, computer, telematic or telecommunications, or its components, whether or not using a identity alien, or exceeding a authorization, will be punished with penalties of three months to one year and we will announce de prison y fine from once to two hundred times the wage minimum.
Paragraph I.- Use Data per Access Illicit. When of saying access illicit results in the deletion or modification of data contained in the work, or improperly reveal or disseminate confidential data contained in the work accessed, the penalties will be raised from a year and we will announce three years after prison y fine from two to four hundred times the wage minimum.
Paragraph II.- Illegitimate Exploitation of Unintentional Access. done to illegitimately exploit the access gained by coincidence to a work electronic, computer, telematic or telecommunications, will be punished with the penalty a year and we will announce three years after prison y fine from two to four hundred times the wage minimum.
Article 7.- Access Illicit for Third Party Services. The done to use a program, equipment, material or device to gain access to a work electronic, computer, telematic or telecommunications, or any of its components, to offer
services that these systems provide to third parties, without paying the legitimate service providers, will be punished with penalty from three months to one year and we will announce de prison y fine from three to five hundred times the wage minimum.
Paragraph.- Our Mill of Activities of a Third. The done to take advantage of the fraudulent activities of a third described in this article and also to to receive illicitly benefit pecuniary or of any other nature, whether for oneself or for third parties, or to enjoy the services offered through any of these systems, will be punished with the penalty three to six months prison y fine from two to two hundred times the wage minimum.
Article 8.- Fraudulent Devices. The done de produce wear, own, traffic or distribute, without authority o cause legitimate, computer programs, equipment, materials or devices whose sole purpose is to use o use fundamental is to be used as a tool to commit crimes and high-level offenses technology, will be punished with the penalty from one to three years prison y fine from twenty to one hundred times the wage minimum.
Article 9.- Interception and Intervention of Data or Signals. The done to intercept, intervene, interfere, stop, to spy, listen to, divert, record or observe, in any way crafts, a fact, a signal or a transmission of data or signals, belonging to another person by own account or on behalf of another, without authorization prior to a competent judge, from, through or directed to a work electronic, computer, telematic or telecommunications, or the emissions originated by these, voluntarily and intentionally materializing the violation of the secret, the intimacy and privacy of individuals or corporations, will be punished with the penalty from one to three years prison y fine from twenty to one hundred times the wage minimum, without damage of administrative sanctions that may result from special laws and regulations.
Article 10.- Hurt or Data Alteration. The done to erase, to affect, introduce, copy, mutilate, edit, alter or eliminate data and components present in electronic, computer, telematic, or telecommunications systems, or transmitted through one of these, for fraudulent purposes, will be punished with penalties of three months to one year. year and we will announce de prison y fine from three to five hundred times the wage minimum.
Paragraph.- When this done be performed by a employee, formeremployee or a person that provides services directly or indirectly to the person physically or legally affected, the penalties will be increased from one to three years of prison y fine from six to five hundred times the wage minimum.
Article 11.- Sabotage. The done to alter, mistreat, jam, render useless, cause malfunction, damage or destroy a work electronic, computer, telematic or telecommunications, or the programs and logical operations that govern it, will be punished with penalties of three months to two years of prison y fine from three to five hundred times the wage minimum.
Article 12.- Attempt against Lifespan of the Human. It will be punished with the same penalties as homicide intentional or unintentional, the outrage against Life, or the provocation of the death of a person committed using electronic, computer, telematic or telecommunications systems, or their components.
Article 13.- Theft By Using High Technology. The robo, when it is committed through the use of electronic, computer, telematic or telecommunications systems or devices, to disable or inhibit the mechanisms of alarm o guard, or other similar ones; or when to gain access to houses, premises or furniture, the same means or means different from those intended by the person concerned are used. owner for such purposes; or by the use of cards, magnetic or perforated, or controls, or instruments for opening remotely or any other mechanism or tool that uses high technology, will be punished with the penalty from two to five years prison y fine from twenty to five hundred times the wage minimum.
Article 14.- Illegal Obtaining of Funds. The done to get fondos, credits or values the constraint of the user legitimate a the service financial computer, electronic, telematic or telecommunications, will be sanctioned with the penalty three to ten years of prison y fine from one hundred to five hundred times the wage minimum.
Paragraph.- Electronic Transfers of Funds. The realization of electronic transfers of fondos through the illicit use of access codes or any other similar mechanism, will be punished with penalty from one to five years prison y fine from two to two hundred times the wage minimum.
Article 15.- Fraud. The swindle carried out through the use of electronic, computer, telematic or telecommunications means, will be punished with penalty from three months to seven years prison y fine from ten to five hundred times the wage minimum.
Article 16.- chantaje. The blackmail carried out through the use of electronic, computer, telematic or telecommunications systems, or their components, and/or for the purpose of obtaining fondos, values, The company, delivery from some Valid identity document, whether digital or not, or from a bar code access or some other component of the systems insights, will be punished with the penalty from one to five years prison y fine from ten to two hundred times the wage minimum.
Article 17.- Theft de Identity. The done of a person to avail oneself of a identity other than his own, through electronic, computer, telematic or telecommunications means, will be punished with penalties of three months to seven years prison y fine from two to two hundred times the wage minimum.
Article 18.- From the Falsehood of Documents and Signatures. Anyone who falsifies, decrypts, decodes or in any way way decipher, disclose or traffic in documents, signatures, certificates, whether digital or electronic, will be punished with penalty from one to three years prison y fine from fifty to two hundred times the wage minimum.
Article 19.- Use of Privacy Invasion Equipment. The use, without cause legitimate o authorization of the entity legally competent, of electronic, computer, telematic, telecommunications systems, or devices that may be used to carry out operations that violate privacy in any of its forms, will be sanctioned with the penalty from six months to two years prison y fine from five to five hundred times the wage minimum.
Article 20.- Stores Illicit de Goods and Services. The unauthorized or illicit marketing of goods and services, through the Internet or any of the components of a work de insights, will be punished with the penalty from three months to five years prison y fine from five to five hundred times the wage minimum.
Paragraph.- The done of illegally trafficking humans or migrants, of committing the crime classified as treats of people or the sale of drugs or controlled substances, using as support work electronic, computer, telematic or telecommunications, shall be punished with the penalties established in the special legislation on these matters.
Article 21.- Defamation. The defamation committed through electronic, computer, telematic, telecommunications or audiovisual means, will be punished with penalty from three months to one year and we will announce de prison y fine from five to five hundred times the wage minimum.
Article 22.- Public Injury. Public injury committed through electronic, computer, telematic, telecommunications, or audiovisual means shall be punished with imprisonment. penalty from three months to one year and we will announce de prison y fine from five to five hundred times the wage pussycat.
Article 23.- Attempt Sexual. The done de exercise un outrage sexual against a child, girl, adolescent, disabled or mentally ill, through the use of a work de insights or any of its components, shall be punished with penalties of three to ten years prison y fine from five to two hundred times the wage minimum.
Article 24.- Pornography Children. The production, diffusion, sale and any type of marketing images and representations of a child or adolescent of a pornographic nature in the terms defined herein law, will be punishable by penalties of two to four years prison y fine from ten to five hundred times the wage minimum.
Paragraph – Acquisition y Possession de Pornography Children. The acquisition de pornography child through a work de insights for oneself or another person, and the possession intentional de pornography childish in a work de insights or any of its components, will be punished with the penalty from three months to one year and we will announce de prison y fine from two to two hundred times the wage minimum.
Article 25.- Crimes Related to the Intellectual Intellectual Property and Related Matters. When the violations established in the Act No.20-00, of May 8, year and we will announce 2000, about Intellectual Industrial, and the Act No.65-00, of August 21, year and we will announce 2000, about Law School de Author, are committed through the use of electronic, computer, telematic or telecommunications systems, or any of their components, will be punished with the penalties established in the respective legislation for these illegal acts.
CHAPTER IV CRIMES AGAINST TELECOMMUNICATIONS
Article 26.- Telecommunications Crimes. They incur penalties of prison from three months to ten years and fine from five to two hundred times the wage At least, those who commit one or more of the following: acts:
a) Call Back Type Fraudulent: The generación of traffic Diversification in the opposite direction to normal, for commercial purposes, through electronic, computer, telematic or telecommunications mechanisms and systems. This done includes, but is not limited to, any type Callback via bar code, assistance of operator, by un work computer, depending on the mechanism or work through which the transmission is made signal shooting;
b) Fraud From Suppliers of Service de Information Lines Type 1-976: The
auto-generation of calls by part from the supplier of the service de insights of lines type 1-976, so that the provider that offers you the service the service telephone company has to pay commissions for these calls will be considered a fraud, constituting a aggravating, when the authors of the crime They use advertising or any other means type and reduced prices, or ordinary telephone numbers for redirection to lines of the service de insights, or other similar means;
c) Long Distance Call Redirection: The fraud in the diversion or redirection of long-distance traffic from the route used by part of the carrier companies signal long distance, to avoid the cost part of the same, through switches placed in places other than the origin of the call;
d) Theft de Line: The use of a store existing, wired or wireless, of a customer legitimate, to establish any type of calls through a clandestine connection, physical or otherwise, at any point in the network;
e) Traffic Diversion: The diversion of traffic through unauthorized routes with the object to avoid or reduce payments that correspond to the nature of the diverted traffic, whether it is a diversion of services, diversion of contracted facilities, or any other type of detour illicit;
f) Illegal Manipulation of Telecommunications Equipment: The done to manipulate illegally, in any way crafts, telephone exchanges or other components of telecommunications networks, with the aim of making use of the services without incurring the corresponding charges;
g) Intervention of Private Exchanges: The use of means to penetrate private exchanges through the maintenance or special ports of the answering machine or any other means, which lead to the making of unauthorized calls. damage of the owner of the intervened plant.
CHAPTER V CRIMES, CRIMES AGAINST THE NATION
AND ACTS OF TERRORISM
Article 27.- Crimes and Offenses against the Nation. The acts that are carried out through a work computer, electronic, telematic or telecommunications, which threaten the fundamental interests and security of the Nation, Tales como el sabotage, the espionage or the provision of information, will be punished with sentences of fifteen to thirty years of seclusion y fine from three hundred to two thousand times the wage minimum.
Article 28.- Acts of Terrorism. Everyone who with the use of electronic, computer, telematic or telecommunications systems, performs acts of terrorism, will be punished with penalty from twenty to thirty years of age seclusion y fine from three hundred to one thousand minimum wages, of the sector public. Likewise, the order may be issued confiscation and destruction of the work de insights or its components, your property of the sujeto passive used to commit the crime.
SECTION II
COMPETENT BODIES AND RULES BY LAW PROCEDURAL
CHAPTER I COMPETENT BODIES
Article 29.- Dependence of the Ministry Public. The Ministry Public will have a dependence specialized in research y persecution of the crimes and offences contained herein law. The Department of Telecommunications, Intellectual Intellectual and Stores Electronic from the Attorney General's Office Republic or any department created for such purposes within the organizational chart of the Attorney General's Office Republic, will coordinate the operation of said dependence.
Article 30.- Creation and Composition of the Commission Interinstitutional against Crimes and High Crimes Technology (CICDAT). The Commission Interinstitutional against Crimes and High Crimes Technology, which will be composed of a representative of the following entities:
a) The Attorney General's Office Republic;
b) The Secretariat of State Plans Armed forces;
c) The Secretariat of State of Interior and Police;
e) The Address National Drug Control Agency (DNCD);
f) The Department National of Investigations (DNI);
g) The Institute Dominican Telecommunications Institute (INDOTEL);
h) The Superintendency of Banks of the Republic Dominican;
i) The Council National for Childhood and Adolescence (CONANI); and,
j) The Institute Technological Institute of the Americas (ITLA).
Article 31.- Presidency of the Commission. The Commission will be chaired by the Attorney General of the Republic or for a representative to be appointed by the Attorney General's Office Republic.
Article 32.- Functions of the Commission. The Commission will have as main functions:
a) Coordination and cooperation with authorities police, military, research and judicial, in their common efforts to improve and give cabal fulfillment to the provisions of this law;
b) Coordination and cooperation with national and foreign governments and institutions to prevent and reduce the commission of high-level illegal acts technology in the Republic Dominican Republic and the rest of the world, in coordination with the entity national competent;
c) Define policies, establish guidelines and develop proposals for strategies and plans to submit them to the The ability to Executive;
d) Promote the adoption of international conventions and treaties on this matter and ensure their implementation and compliance, when they are signed and ratified by the Republic Dominican; and,
e) Coordinate the representation Dominican through the entity national competent before the different international organizations in the area of high-risk crimes and offenses technology.
Article 33.- Meetings. The Commission The plenary session will operate in plenary session or through delegated committees. The plenary session will meet at least four times a year. year and we will announce in an ordinary meeting or as many times as it is called by its President, on its own initiative or at the proposal of more than half of its members.
Article 34.- General Secretariat. He will act as General Secretary of the Commission, the representative of the Institute Technological Institute of the Americas (ITLA), who within its functions will convene and set the order of the to date of the meetings in accordance with the president; will draft the record of the meetings, carrying a record of the same; and will disclose the approved decisions to the members of the Commission, as well as to public and private persons deemed necessary.
Article 35.- Training. The Commission will coordinate the training Plans authorities competent by means of an agreement with the Institute Technological Institute of the Americas (ITLA) or any other entity that is considered necessary.
Article 36.- Creation of the Department de Research of Crimes and High Crimes Technology (DICAT). The Department de Research of Crimes and High Crimes Technology (DICAT), as entity subordinate to the Address Criminal Investigation Center of the Police National.
Article 37.- Research and Submission. Investigations of cases and submission to the Justice of the people involved will be supported by the Department de Research of Crimes and High Crimes Technology (DICAT), which will have liaison officers from the Division de Research of Computer Crimes (DIDI) of the Department National of Investigations, of the Secretariat of State Plans Armed forces and the Address National Drug Control.
Article 38.- Functions of DICAT. The main functions of DICAT will be:
a) Watch over the faithful fulfillment y execution of the provisions of this law;
b) Research All reports of crimes or offenses considered high technology;
c) Respond with capacity investigative of all threats and attacks to critical infrastructure national;
d) Develop strategic analysis of computer threats; and,
e) Ensure proper training of the unit's personnel. research.
Article 39.- DICAT Personnel. DICAT personnel, including its commander, must have certifications from the industry that endorse their expertise in areas of computing, research and related areas.
Article 40.- Requirements of the DICAT Commander. The commander of this department shall:
a) Be Official Top of the Police National;
b) Be a systems engineer or Experience of other frame who has certifications in specialized areas of computing;
c) Have at least 10 years of experience Experience;
d) Have a minimum of 12 years of police experience; and,
e) Have specializations in the different areas of the Crime Computer Science and Criminal Investigations.
Paragraph.- Irremovability of the DICAT Commander. The DICAT Commander must remain in the cargo a minimum of 2 years, except in cases of poor performance or incompetence duly verified, in which /// su dismissal must be approved by the Head of the Police National.
Article 41.- Interinstitutional Relations of DICAT. DICAT shall:
a) Work in coordination with the Commission Interinstitutional against Crimes and High Crimes Technology created by this law;
b) Be the point of contact official de Republic Dominican on the Net International 24/7 of Assistance in Crimes Involving High Technology belonging to the Subgroup of High Crimes Technology of the Group of Experts in Crimen G8 Transnational Organized; and,
c) Work in coordination with other national and international organizations research of crimes and high-level offenses technology.
Article 42.- Budget. The DICAT budget will consist of:
a) The proportion of the budget allocation that each year and we will announce must grant la Police National to Address Central Criminal Investigations;
b) The budgetary allocations that, in their ///, I assigned the Corporate Central; and
c) The fondos that can be obtained for any other reason legitimate.
Article 43.- Creation of the Division of Computer Crime Investigations (DIDI). The Division of Computer Crime Investigations (DIDI) as dependence of the Department National of Investigations (DNI).
Article 44.- Research and Submission. The Division de Research of Computer Crimes (DIDI) will work on cases related to: crimes against humanity; crimes and offenses against the Nation, the State and peace public; threats or attacks against the State Dominican, security national or that involve the figure of the president of the Republic, secretaries of State or elected officials. It will have liaison officers from the Department de Research of Crimes and High Crimes Technology (DICAT) of the Police National, of the Secretariat of State Plans Armed forces and the Address National Drug Control.
Article 45.- DIDI Functions. The Division de Research of Computer Crimes (DIDI) will have as its main functions:
a) Watch over the faithful fulfillment y execution of the provisions of this law;
b) Research All reports of crimes or offenses considered high technology within the scope of Article 46;
c) Respond with capacity investigative of all threats and attacks to critical infrastructure national;
d) Develop strategic analysis of computer threats; and,
e) Ensure proper training of the unit's personnel. research.
Article 46.- Staff of the Division de Research of Computer Crimes (DIDI).
The staff of the Division de Research of Computer Crimes (DIDI), including its manager, must have certifications from the industry that endorse their expertise in areas of computing, research and related areas.
Article 47.- Requirements of the Person in Charge of the Division de Research of Computer Crimes (DIDI). The person in charge of this division shall:
a) Be Official Top of the Armed forces and Police National;
b) Be a systems engineer or Experience of other frame that have certifications in specialized areas of IT;
c) Have at least five years of experience Experience;
d) Have specializations in the different areas of the crime computer scientist and
criminal investigations.
Article 48.- Budget. The budget of the Division de Research of Computer Crimes (DIDI) will be made up of:
a) The proportion of the budget allocation that each year and we will announce must grant you the Department National of Research;
b) The budgetary allocations that, in their ///, I assigned the Corporate Central; and
c) The fondos that can be obtained for any other reason legitimate.
Article 49.- Interinstitutional Relations of DIDI. The Division de Research of Computer Crimes (DIDI) must:
a) Work in coordination with the Commission Interinstitutional against Crimes and High Crimes Technology created by this law;
b) Work in coordination with other national and international organizations research of crimes and high-level offenses technology.
Article 50.- Documentation y Procedure Research. Both DIDI and DICAT will have specialized representatives from the Ministry Public, who will document and process the investigations of these departments.
Article 51.- Regulation. The Division de Research of Computer Crimes (DIDI) and the Department de Research against Crimes and High Crimes Technology (DICAT), in coordination with its superior bodies, will administratively create the regulations corresponding to its organizational structure, which may include sections of links, intelligence, investigations, operations, evidence recovery, personnel, planning y training.
CHAPTER II PRECAUTIONARY AND PROCEDURAL MEASURES
Article 52.- Application of the Code Procedural Criminal law. The rules of the testing immediate and auxiliary means of Code Procedural Criminal law, Act No.76-02, will be applied to obtain and preserve the data contained in a work de insights or its components, traffic data, connection, access or any other insights de utility, In research of the crimes penalized in this law and for all procedures established in this Chapter.
Article 53.- Data Conservation. The authorities competent authorities will act with the speed required to preserve the data contained in a work de insights or its components, or traffic data of the work, mainly when they are vulnerable to their pérdida or modification.
Article 54.- Powers of the Ministry Public. Previous fulfillment of the formalities provided for in the Code Procedural Criminal law, the Ministry Public, who may be assisted by one or more of the following persons: research of the State, Tales como el Department de Research of Crimes and High Crimes Technology (DICAT) of the Police National; The Division de Research of Computer Crimes (DIDI) of the Department National of Investigations; experts; public or private institutions, or other authority competent, will have the faculty of :
a) Order a person physical or moral la delivery of the insights that is located in a work de insights or in any of its components;
b) Order a person physical or moral preserve and maintain the integrity of a work de insights or any of its components, by a period up to ninety (90) days, this may be order be renewed for successive periods;
c) Access or order access to saying work de insights or any of its components;
d) Order a service provider, including Internet service providers, to provide insights of the data relating to a user that you can have in your possession or control;
e) Take into account kidnapping or secure a work de insights or any of its components, in whole or in part part;
f) Perform and retain copy of the content of the work de insights or any of its components;
g) Order the maintenance of the integrity of the content of a work de insights or any of its components;
h) Make inaccessible or remove the content of a work de insights or any of its components, which has been accessed for the research;
i) Order to the person having knowledge about the operation of a work de insights or any of its components or the data protection measures in saying work a provide la insights necessary to carry out the relevant investigations;
j) Collect or record data from a work de insights or any of its components, through the application of technological measures;
k) Request the service provider to collect, extract or record data relating to a user, as well as data traffic in tiempo part, through the application of technological measures;
l) Carry out the intervention or interception of telecommunications in tiempo part, according to him proceedings established in the Article 192 del Code Procedural Criminal law for research all acts punishable in the present law; and,
m) Order any other measure applicable to a work de insights or its components to obtain the necessary data and ensure their preservation.
Article 55.- Best Practices of Compilation of Evidence. The Ministry Public, the Department de Research of High Crimes and Offenses Technology (DICAT) of the Police National, The Division de Research of Computer Crimes (DIDI) of the Department National of Research, and other auxiliary institutions, must seek the use of best practices and efficient methods during the processes of research for obtaining, recovering and preserving evidence.
Article 56.- Service Providers. Without damage of what is established in the literal b) of the Article 47 of this document law, the providers of the service They must retain traffic, connection, access or any other data insights that may be of utility to research, for period minimum of ninety (90) days. The Institute Dominican Telecommunications (INDOTEL) will create a regulation for the proceedings of obtaining and preserving data and information by part of service providers, in a Plazo 6 months from the date of promulgation of the present law. Such regulations must take into account account the importance of preserving the experiment, regardless of the number of providers involved in the transmission or communication.
Article 57.- Denaturation of Process Investigative. The denaturalization of acts of research by part Plans authorities competent will be punished with the dismissal immediate of cargo, prison from six months to five years and fine of no less than ten minimum wages. Among the acts of denaturalization, the following will be considered, among others:
a) The initiation or request for measures by any other means reason that is not the persecution part of one of the crimes or offenses established by this law;
b) The trafficking and marketing of the data obtained during the research;
c) The disclosure of personal and commercial data of the indicted different from the nature of the research, as well as the trafficking or marketing thereof.
Article 58.- Liability of the Custodian. To whom the preservation of the work de insights or any of its components, as well as its content, will maintain the confidentiality and integrity of the same, preventing third parties outside the authorities competent, have access and knowledge of them. Likewise, the person in charge of the custody will not be able to do use of the object en custody for purposes other than those concerning the proceedings investigative.
Article 59.- Confidentiality of Process Investigative. Anyone who collaborates with the proceedings de research, in the collection, interception and intervention of data from a work de insights or its components, or any other action, including service providers, will keep confidential the done of the execution of the acts carried out by part of the authority competent.
Paragraph.- The violation Articles 51 and 52 shall be punished with the penalties established for the disclosure of secrets in the Code Criminal law of the Republic Dominican.
TITLE III FINAL PROVISIONS
Article 60.- Liability Civil law y Criminal law of Legal Entities. In addition to the sanctions indicated below, legal entities are civilly liable for violations committed by their bodies or representatives. responsibility penal by acts and violations contained therein law, extends to those who order or arrange for its execution and to the legal representatives of legal entities who, knowing of the illegality of the done and having the power to prevent it, allow it, take it part in it, facilitate it or cover it up. The responsibility penal of legal entities does not exclude that of anyone person physical, Author or accomplice thereof acts. When legal entities are used as means or cover for the commission a crime or crime, or is incurred through it in a omission punishable, these will be punished with one, several or all of the following penalties:
a) One fine equal to or up to double that contemplated for the person physics for the done illicit contemplated in this law;
b) The dissolution, when it comes to a crime or crime sanctioned as far as natural persons are concerned with a penalty deprived of freedom more than five years;
c) The prohibition, title definitive or for a period No. Most five years old, exercise directly or indirectly one or more professional or social activities;
d) Subjection to the mass surveillance judicial for a period No. Most five years;
e) The closing final or for a period No. Most five years, from one or more of the establishments of the company, which have served to commit the acts incriminated;
f) Exclusion from participating in public competitions, title definitive or for a period No. Most five years;
g) The prohibition, in perpetuity or for a period No. Most five years, to participate in activities aimed at the catchment de values from savings public;
h) The confiscation of the thing that has served or was destined to commit the infringement, Or the thing what is your product;
i) The publication by posters of the sentences pronounced or its dissemination, whether by the written press or by other means of communication.
Paragraph.- Negligence u Omission of the Human Moral. Likewise, a person will be considered civilly liable person moral when the lack de mass surveillance or control of your representative legal o employee beech done possible the commission a act illicit provided for herein law.
Article 61.- Administrative Actions. Nothing in this document shall apply. law, prevents recourse to administrative actions that may result from applicable special laws and regulations.
Article 62.- Payment of Compensation. Without damage In addition to the criminal sanctions and administrative sanctions that may result from special laws and regulations, natural or legal persons may be sentenced to paid of civil compensation in favor of the sujeto passive.
Article 63.- Complementary Legislation. The terms not contemplated in this law will be governed by:
him Code Procedural Criminal law of the Republic Dominican, Act No. 76-02, of July 19, 2002;
b) The Code Criminal law Dominican;
c) The Act No.126-02, of September 4, 2002, of Stores Electronic, Documents, and Digital Signatures, and their regulations;
d) The Act General Telecommunications Act No. 153-98, of May 27, 1998, and its regulations;
e) Laws No. 65-00 and No. 20-00, of August 21, 2000 and May 8, 2000, on Law School de Author y Intellectual Industrial, respectively, for each of its subjects;
f) The Act No. 137-03, of August 7, 2003, on Traffic Illicit of Migrants and About of People;
g) The Act No. 136-03, of August 7, 2003, Code of the Minor;
h) The provisions of the right común and any applicable related legal provisions.
Article 64.- AGENDA Public. The violations provided for in this Chapter are considered to be action public to instance private, as seen here as provided for in the Code Procedural Criminal law. However, the Ministry Public may exercise ex officio la action public in the cases of pornography childish, which is an attack on the order public, the interests of the nation, derechos of an incapable person who does not have representation or when the crime o crime has been committed by one of the Parents, the tutor or representative legal of the sujeto passive.
Article 65.- Court Competent. Cases on high-level crimes and offences technology will be heard by the corresponding ordinary courts or by the Court of Boys, Girls and Adolescents, depending on the ///. Judges may use the presentation a expertise for knowledge of the fondo of the ///.
Article 66.- Entry into Validity. The present law will enter validity from the when and where of its publication.
Article 67.- Repeals. With the promulgation of the present law, is any repealed standard o provision that is contrary to it in this matter.
GIVEN in the Living Room of Sessions of the Camera of Deputies, Palace of Congress dome National, in Santo Domingo de Guzman, District National, capital of the Republic Dominican, on the seventeenth (17) day of the month January year and we will announce two thousand and seven; 163 years of the Independence and 144 of the Restoration.
Lucia Medina Sanchez,
Acting Vice President;
Maria Cleofia Sanchez Lora, Teodoro Ursino Reyes,
Secretary Secretary
GIVEN in the Living Room of Sessions of the Senate, Palace of the Congress dome National, in Santo Domingo de Guzman, District National, capital of the Republic Dominican, ten (10) days after month April of year and we will announce two thousand and seven (2007); 164 years of the Independence and 144 of the Restoration.
Reinaldo Walls Perez,
Amarilis Santana Cedano, Diego Aquino Acosta Rojas,
Secretary Secretary
LEONEL FERNANDEZ President of the Republic Dominican Republic
En exercise of the powers conferred upon me by the Article 55 of the Constitution of the Republic.
I PROMULGE this Act and I order that it be published in the Gazette Official, for your knowledge y fulfillment.
GIVEN in Santo Domingo de Guzmán, District National, capital of the Republic Dominican, on the twenty-third (23) day of the month April of year and we will announce two thousand and seven (2007); 163 years of the Independence and 144 of the Restoration.
We have the team of professionals of right more complete and effective in matters of crimes and high-level offenses technology in the Republic Dominican. In Carlos Felipe Law Firm SRL We offer you a completely free and timely consultation session without any commitments. We evaluate your /// free of charge and without commitment call us at Phone: 829 256 6865 or contact us at info@fc-abogados.com.