{"id":25488,"date":"2021-11-29T23:29:01","date_gmt":"2021-11-29T23:29:01","guid":{"rendered":"https:\/\/thecampbelllawgroup.com\/?p=25488"},"modified":"2025-10-15T13:10:05","modified_gmt":"2025-10-15T17:10:05","slug":"ley-de-fraude-y-abuso-informatico","status":"publish","type":"blog","link":"https:\/\/tclgfirm.com\/es\/blog\/computer-fraud-and-abuse-act\/","title":{"rendered":"El Tribunal Supremo limita el alcance de la Ley de Fraude y Abuso Inform\u00e1tico"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"h-what-does-that-mean-for-employers-now\"><strong>\u00bfQu\u00e9 significa eso para los empleadores ahora?<\/strong><\/h2>\n\n\n\n<p>En junio de 2021, la Suprema Corte de Justicia de los Estados Unidos emiti\u00f3 una decisi\u00f3n por 6 votos contra 3, redactada por la miembro m\u00e1s reciente de la Corte, la jueza Amy Barrett, en un caso relacionado con la cobertura de la Ley federal contra el fraude y el abuso inform\u00e1tico (Computer Fraud and Abuse Act, CFAA).\u00a0 <em>V\u00e9ase Van Buren contra Estados Unidos.<\/em>, 141 S. Ct. 1648 (2021). La CFAA impone responsabilidad penal a cualquier persona que \u201cacceda intencionalmente a una computadora sin autorizaci\u00f3n o exceda el acceso autorizado\u201d y, por lo tanto, obtenga informaci\u00f3n de la computadora.\u00a0 <em>Ver<\/em> 18 U.S.C. \u00a7 1030(a)(2). La ley define el t\u00e9rmino \u201cexceder el acceso autorizado\u201d como \u201cacceder a una computadora con autorizaci\u00f3n y utilizar dicho acceso para obtener o alterar informaci\u00f3n en la computadora que el usuario no tiene derecho a obtener o alterar\u201d.\u201d\u00a0 <em>Id.<\/em> \u00a7 1030(e)(6). Existen multas y sanciones penales significativas para las personas que infrinjan la ley, as\u00ed como la posibilidad de responsabilidad civil.<\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 En <em>Van Buren<\/em>, un funcionario estatal fue acusado de infringir la Ley de Fraude y Abuso Inform\u00e1tico (CFAA) al utilizar el ordenador de su coche patrulla para acceder a una base de datos policial con sus propias credenciales. Obten\u00eda informaci\u00f3n sobre las matr\u00edculas de determinados individuos para proporcion\u00e1rsela a otra persona a cambio de dinero en efectivo.\u00a0 La cuesti\u00f3n objeto del litigio era si el agente hab\u00eda excedido el uso autorizado en el sentido de la CFAA al tener acceso v\u00e1lido a la base de datos inform\u00e1tica, pero utilizar la informaci\u00f3n obtenida para un fin indebido, en lugar de para un fin leg\u00edtimo relacionado con su trabajo o con la aplicaci\u00f3n de la ley.\u00a0 No obstante, el Tribunal Supremo resolvi\u00f3 una divisi\u00f3n de opiniones sobre este tema y sostuvo que la conducta del agente no infring\u00eda la CFAA porque ten\u00eda autorizaci\u00f3n para acceder a la base de datos policial, aunque finalmente obtuviera y utilizara la informaci\u00f3n de dicha base de datos con fines indebidos.<\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Los empleadores y otras organizaciones que deseen proteger la integridad de la informaci\u00f3n contenida en sus sistemas inform\u00e1ticos y bases de datos deben prestar mucha atenci\u00f3n a la limitaci\u00f3n impuesta por el Tribunal al alcance de la Ley de Fraude y Abuso Inform\u00e1tico. Si un empleado tiene acceso v\u00e1lido a los sistemas o bases de datos de una empresa, es posible que la CFAA no le brinde protecci\u00f3n si accede a dichos sistemas, obtiene informaci\u00f3n y luego la utiliza de manera indebida.\u00a0 Las empresas deben considerar cuidadosamente la posibilidad de limitar el acceso a determinados sistemas y bases de datos \u00fanicamente a aquellos empleados que tengan una raz\u00f3n comercial v\u00e1lida para acceder a esa parte del sistema. Dicho de otro modo, no se debe dar a los empleados libertad total para acceder a todas las partes de los sistemas de registro de una empresa, sino que solo se les deben proporcionar credenciales v\u00e1lidas para aquellas partes espec\u00edficas del sistema que sean necesarias para el desempe\u00f1o de sus funciones laborales.<\/p>\n\n\n\n<p>Nuestro despacho ofrece consultas presenciales y virtuales. Si tiene alguna pregunta o duda sobre el tema de este art\u00edculo o sobre cualquier cuesti\u00f3n relacionada con el derecho corporativo, mercantil, laboral, familiar o de la construcci\u00f3n, no dude en llamar a nuestra oficina al <a href=\"tel:3054600145\">305-460-0145<\/a> o para programar una consulta <a href=\"https:\/\/tclgfirm.com\/es\/request-consultation\/\">aqu\u00ed<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>What Does That Mean For Employers Now? In June 2021, the U.S. Supreme Court issued a 6-3 decision authored by the Court\u2019s newest member, Justice Amy Barrett, in a case involving the coverage of the federal Computer Fraud and Abuse Act (the \u201cCFAA\u201d).\u00a0 See Van Buren v. United States, 141 S. Ct. 1648 (2021).\u00a0 TheCFAA [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":25489,"template":"","categories":[8,37],"tags":[],"class_list":["post-25488","blog","type-blog","status-publish","has-post-thumbnail","hentry","category-business-and-commercial-litigation","category-misappropriation-of-confidential-information"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Computer Fraud and Abuse Act - TCLG - The Campbell Law Group<\/title>\n<meta name=\"description\" content=\"The Court\u2019s limitation on the reach of the CFAA should be well-heeded by organizations who will want to protect the integrity of their data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tclgfirm.com\/es\/blog\/ley-de-fraude-y-abuso-informatico\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supreme Court Limits The Reach of the Computer Fraud and Abuse Act\" \/>\n<meta property=\"og:description\" content=\"The Court\u2019s limitation on the reach of the CFAA should be well-heeded by organizations who will want to protect the integrity of their data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tclgfirm.com\/es\/blog\/ley-de-fraude-y-abuso-informatico\/\" \/>\n<meta property=\"og:site_name\" content=\"TCLG - The Campbell Law Group\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/businessattorneymiami\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T17:10:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tclgfirm.com\/wp-content\/uploads\/2023\/04\/Computer-Fraud-and-Abuse-Act.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Campbelllawgrp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/\",\"url\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/\",\"name\":\"Computer Fraud and Abuse Act - TCLG - The Campbell Law Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/tclgfirm.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Computer-Fraud-and-Abuse-Act.jpeg\",\"datePublished\":\"2021-11-29T23:29:01+00:00\",\"dateModified\":\"2025-10-15T17:10:05+00:00\",\"description\":\"The Court\u2019s limitation on the reach of the CFAA should be well-heeded by organizations who will want to protect the integrity of their data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/#primaryimage\",\"url\":\"https:\\\/\\\/tclgfirm.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Computer-Fraud-and-Abuse-Act.jpeg\",\"contentUrl\":\"https:\\\/\\\/tclgfirm.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Computer-Fraud-and-Abuse-Act.jpeg\",\"width\":1280,\"height\":853,\"caption\":\"CFAA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/blog\\\/computer-fraud-and-abuse-act\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/tclgfirm.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supreme Court Limits The Reach of the Computer Fraud and Abuse Act\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/#website\",\"url\":\"https:\\\/\\\/tclgfirm.com\\\/\",\"name\":\"TCLG Business & Corporate Law\",\"description\":\"Business &amp; Corporate Law\",\"publisher\":{\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/tclgfirm.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/#organization\",\"name\":\"The Campbell Law Group\",\"alternateName\":\"TCLG\",\"url\":\"https:\\\/\\\/tclgfirm.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/tclgfirm.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo-yoast.png\",\"contentUrl\":\"https:\\\/\\\/tclgfirm.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo-yoast.png\",\"width\":696,\"height\":696,\"caption\":\"The Campbell Law Group\"},\"image\":{\"@id\":\"https:\\\/\\\/tclgfirm.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/businessattorneymiami\\\/\",\"https:\\\/\\\/x.com\\\/Campbelllawgrp\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ley sobre Fraude y Abuso Inform\u00e1tico - TCLG - The Campbell Law Group","description":"Las organizaciones que deseen proteger la integridad de sus datos deben prestar especial atenci\u00f3n a la limitaci\u00f3n impuesta por el Tribunal al alcance de la CFAA.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tclgfirm.com\/es\/blog\/ley-de-fraude-y-abuso-informatico\/","og_locale":"es_MX","og_type":"article","og_title":"Supreme Court Limits The Reach of the Computer Fraud and Abuse Act","og_description":"The Court\u2019s limitation on the reach of the CFAA should be well-heeded by organizations who will want to protect the integrity of their data.","og_url":"https:\/\/tclgfirm.com\/es\/blog\/ley-de-fraude-y-abuso-informatico\/","og_site_name":"TCLG - The Campbell Law Group","article_publisher":"https:\/\/www.facebook.com\/businessattorneymiami\/","article_modified_time":"2025-10-15T17:10:05+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/tclgfirm.com\/wp-content\/uploads\/2023\/04\/Computer-Fraud-and-Abuse-Act.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Campbelllawgrp","twitter_misc":{"Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/","url":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/","name":"Ley sobre Fraude y Abuso Inform\u00e1tico - TCLG - The Campbell Law Group","isPartOf":{"@id":"https:\/\/tclgfirm.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/#primaryimage"},"image":{"@id":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/#primaryimage"},"thumbnailUrl":"https:\/\/tclgfirm.com\/wp-content\/uploads\/2023\/04\/Computer-Fraud-and-Abuse-Act.jpeg","datePublished":"2021-11-29T23:29:01+00:00","dateModified":"2025-10-15T17:10:05+00:00","description":"Las organizaciones que deseen proteger la integridad de sus datos deben prestar especial atenci\u00f3n a la limitaci\u00f3n impuesta por el Tribunal al alcance de la CFAA.","breadcrumb":{"@id":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/#primaryimage","url":"https:\/\/tclgfirm.com\/wp-content\/uploads\/2023\/04\/Computer-Fraud-and-Abuse-Act.jpeg","contentUrl":"https:\/\/tclgfirm.com\/wp-content\/uploads\/2023\/04\/Computer-Fraud-and-Abuse-Act.jpeg","width":1280,"height":853,"caption":"CFAA"},{"@type":"BreadcrumbList","@id":"https:\/\/tclgfirm.com\/blog\/computer-fraud-and-abuse-act\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tclgfirm.com\/"},{"@type":"ListItem","position":2,"name":"Supreme Court Limits The Reach of the Computer Fraud and Abuse Act"}]},{"@type":"WebSite","@id":"https:\/\/tclgfirm.com\/#website","url":"https:\/\/tclgfirm.com\/","name":"Derecho mercantil y corporativo de TCLG","description":"Derecho mercantil y corporativo","publisher":{"@id":"https:\/\/tclgfirm.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tclgfirm.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/tclgfirm.com\/#organization","name":"El Grupo Jur\u00eddico Campbell","alternateName":"TCLG","url":"https:\/\/tclgfirm.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tclgfirm.com\/#\/schema\/logo\/image\/","url":"https:\/\/tclgfirm.com\/wp-content\/uploads\/2025\/11\/logo-yoast.png","contentUrl":"https:\/\/tclgfirm.com\/wp-content\/uploads\/2025\/11\/logo-yoast.png","width":696,"height":696,"caption":"The Campbell Law Group"},"image":{"@id":"https:\/\/tclgfirm.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/businessattorneymiami\/","https:\/\/x.com\/Campbelllawgrp"]}]}},"_links":{"self":[{"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/blog\/25488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/users\/3"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/media\/25489"}],"wp:attachment":[{"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/media?parent=25488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/categories?post=25488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tclgfirm.com\/es\/wp-json\/wp\/v2\/tags?post=25488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}