{"id":244736,"date":"2025-12-02T16:54:13","date_gmt":"2025-12-02T16:54:13","guid":{"rendered":"https:\/\/www.internetsociety.org\/?page_id=244736"},"modified":"2026-03-02T14:05:51","modified_gmt":"2026-03-02T14:05:51","slug":"privacy","status":"publish","type":"page","link":"https:\/\/www.internetsociety.org\/es\/our-work\/privacy\/","title":{"rendered":"Privacidad"},"content":{"rendered":"\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-image uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-ffc93ebd uagb-columns__columns-1 uagb-columns__max_width-custom background-image-fallback-black uag-hide-tab uag-hide-mob\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-c95947c4\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading animated fadeIn has-neutral-white-color has-text-color\">Privacidad<\/h1>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-77f5da99 uagb-columns__columns-1 uagb-columns__max_width-theme animated fadeIn background-image-fallback-white\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-bf6c64fb\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-32-font-size uag-hide-tab\"><strong>La privacidad en l\u00ednea es fundamental para una Internet confiable.<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-depth-blue-color has-text-color has-48-font-size uag-hide-desktop\"><strong>La privacidad en l\u00ednea es fundamental para una Internet confiable.<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-b4c134c7 uagb-columns__columns-1 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-4e25c9ae\"><div class=\"uagb-column__overlay\"><\/div>\n<p class=\"has-18-font-size\">Depende de la capacidad de divulgar datos de manera consensuada y con expectativas claras sobre el contexto y el alcance del intercambio de datos. La identificabilidad, <a href=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\">la enlazabilidad (<em>linkability<\/em>)<\/a> y la miner\u00eda de datos plantean importantes preocupaciones sobre la privacidad. <\/p>\n\n\n\n<p class=\"has-18-font-size\">Nos dedicamos a promover la privacidad al abogar por tecnolog\u00edas y pol\u00edticas que la respeten. Tambi\u00e9n educamos a las comunidades sobre los beneficios de mantener una privacidad en l\u00ednea s\u00f3lida y c\u00f3mo gestionar sus identidades en l\u00ednea.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-de3d1d5d uagb-columns__columns-1 uagb-columns__max_width-theme uag-hide-desktop\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-f338041f\"><div class=\"uagb-column__overlay\"><\/div>\n<h1 class=\"wp-block-heading has-text-align-left\">Privacidad<\/h1>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading o-typing-faster has-depth-blue-color has-text-color\"><strong>La privacidad en l\u00ednea es fundamental para una Internet confiable.<\/strong><\/h2>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082.jpg\" alt=\"Una mujer sonriente sostiene y usa su tel\u00e9fono celular.\" class=\"wp-image-199877\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082.jpg 1000w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082-768x512.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/10\/Medium-20190405_CrystalFraser_0082-250x167.jpg 250w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Depende de la capacidad de divulgar datos de manera consensuada y con expectativas claras sobre el contexto y el alcance del intercambio de datos. La identificabilidad, <a href=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\" type=\"link\" id=\"https:\/\/www.internetsociety.org\/blog\/2024\/10\/understanding-digital-footprints\/\">la enlazabilidad (<em>linkability<\/em>)<\/a> y la miner\u00eda de datos plantean importantes preocupaciones sobre la privacidad. <\/p>\n\n\n\n<p class=\"has-18-font-size\">Nos dedicamos a promover la privacidad al abogar por tecnolog\u00edas y pol\u00edticas que la respeten. Tambi\u00e9n educamos a las comunidades sobre los beneficios de mantener una privacidad en l\u00ednea s\u00f3lida y c\u00f3mo gestionar sus identidades en l\u00ednea.<\/p>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-418cec14 uagb-columns__columns-1 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-d509319b\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>Enlaces clave sobre privacidad<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>Enlaces clave sobre privacidad<\/strong><\/h2>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-none uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-0c8abc1f uagb-columns__columns-3 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-c5cbb46e\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer.jpg\" alt=\"Un hombre sonriente sentado a un escritorio trabaja en una computadora port\u00e1til.\" class=\"wp-image-239511\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/young-man-smiling-computer-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4be958dc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/action-plan\/online-trust-and-safety\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Confianza y seguridad en l\u00ednea<\/h3><\/div><p class=\"uagb-ifb-desc\">Las personas que se incorporan a Internet ingresan a un entorno digital complejo. Desarrollar habilidades de confianza y seguridad es fundamental para una experiencia en l\u00ednea m\u00e1s segura.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-74b7a2c7\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone.jpg\" alt=\"Tres hombres sentados a una mesa sonr\u00eden y miran juntos un video.\" class=\"wp-image-239520\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/Waimanalo-phone-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8afe33bc uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/action-plan\/encryption\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Cifrado<\/h3><\/div><p class=\"uagb-ifb-desc\">El cifrado es una herramienta esencial para la privacidad que protege nuestra informaci\u00f3n personal y ayuda a mantener a las personas seguras en nuestra sociedad digital.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-4d8f3576\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"758\" height=\"749\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training.jpg\" alt=\"Dos mujeres sentadas a una mesa miran sus tel\u00e9fonos con expresi\u00f3n concentrada.\" class=\"wp-image-220917\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training.jpg 758w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training-450x445.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/03\/two-women-training-250x247.jpg 250w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-142f9c5f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/our-work\/privacy\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Curso en l\u00ednea sobre privacidad<\/h3><\/div><p class=\"uagb-ifb-desc\">La privacidad es un derecho fundamental y un habilitador esencial de la autonom\u00eda, la dignidad y la autoexpresi\u00f3n. Aprenda m\u00e1s sobre la privacidad en l\u00ednea y la recopilaci\u00f3n de datos en la era digital.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign-top uagb-columns__gap-10 align uagb-block-5ddb0c47 uagb-columns__columns-3 uagb-columns__max_width-theme\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-3\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-914f3b48\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet.jpg\" alt=\"Una mujer sostiene una tablet y la observa atentamente con expresi\u00f3n concentrada y comprometida.\" class=\"wp-image-239507\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/woman-tablet-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-4fea2dee uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/learning\/huellas-digitales\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Huellas digitales<\/h3><\/div><p class=\"uagb-ifb-desc\">Las huellas digitales son los rastros de datos que dejamos cuando usamos Internet. Estos datos contribuyen a crear una imagen digital de qui\u00e9n somos en l\u00ednea.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-48a0fca8\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop.jpg\" alt=\"Varias personas miran una computadora port\u00e1til y comparten ideas.\" class=\"wp-image-239515\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop.jpg 600w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/MENA-advocacy-workshop-250x167.jpg 250w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-7475369c uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/es\/our-work\/privacy\/privacy-policy\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Pol\u00edticas de privacidad<\/h3><\/div><p class=\"uagb-ifb-desc\">Los formuladores de pol\u00edticas pueden apoyar o amenazar la privacidad en l\u00ednea. Explore c\u00f3mo las pol\u00edticas pueden afectar la capacidad de las personas de mantener su privacidad.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-color uagb-block-a02a5926\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-image size-full is-style-default margin-bottom-0 vertical-align-bottom\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen.jpg\" alt=\"Un joven recostado en su cama usa una computadora port\u00e1til.\" class=\"wp-image-239494\" style=\"aspect-ratio:3\/2;object-fit:cover\" srcset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen.jpg 640w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen-450x300.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/kid-in-front-screen-250x167.jpg 250w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-8987a0a2 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/www.internetsociety.org\/blog\/2024\/01\/keeping-kids-safe-online-navigating-the-new-parents-guide-to-encryption\/ \" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Seguridad de los ni\u00f1os y ni\u00f1as en l\u00ednea<\/h3><\/div><p class=\"uagb-ifb-desc\">Los ni\u00f1os y ni\u00f1as viven en un mundo digital. El cifrado es una herramienta valiosa para mantener la privacidad de sus mensajes e informaci\u00f3n personal.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-mobile uagb-columns__valign- uagb-columns__gap-10 align uagb-block-774cf726 uagb-columns__columns-2 uagb-columns__max_width-custom\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-2\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-e1fd0b78\"><div class=\"uagb-column__overlay\"><\/div>\n<h3 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\">Proteja sus datos: talleres sobre confianza y seguridad<\/h3>\n\n\n\n<h3 class=\"wp-block-heading uag-hide-desktop\">Proteja sus datos: talleres sobre confianza y seguridad<\/h3>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-18-font-size\">Ante el aumento de los ciberdelitos a nivel mundial, contar con las habilidades para navegar por Internet de forma segura es m\u00e1s importante que nunca.<\/p>\n\n\n\n<p class=\"has-18-font-size\">El a\u00f1o pasado, nuestros talleres sobre confianza y seguridad promovieron la alfabetizaci\u00f3n digital, capacitaron a los participantes para identificar estafas y compartieron mejores pr\u00e1cticas para una experiencia en l\u00ednea segura. Vea el video completo para saber m\u00e1s.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-9ec2654d\"><div class=\"uagb-column__overlay\"><\/div>\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-wrapper\"><iframe loading=\"lazy\" title=\"Trust and Safety Workshops\" src=\"https:\/\/player.vimeo.com\/video\/1154697228?dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div>\n<\/div><\/figure>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"wp-block-uagb-columns uagb-columns__wrap uagb-columns__background-color uagb-columns__stack-tablet uagb-columns__valign- uagb-columns__gap-10 align uagb-block-29daa086 uagb-columns__columns-1 uagb-columns__max_width-custom grid-post-filter-view\"><div class=\"uagb-columns__overlay\"><\/div><div class=\"uagb-columns__inner-wrap uagb-columns__columns-1\">\n<div class=\"wp-block-uagb-column uagb-column__wrap uagb-column__background-undefined uagb-block-48634806\"><div class=\"uagb-column__overlay\"><\/div>\n<h2 class=\"wp-block-heading has-32-font-size uag-hide-tab uag-hide-mob\"><strong>\u00daltimas novedades<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-48-font-size uag-hide-desktop\"><strong>\u00daltimas novedades<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class='pt-cv-wrapper'> <div class='cvp-lf-wrapper '><div class=\"cvp-live-filter cvp-search-box \" id=\"\" data-name=\"_search\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label for='sf_1322' class=\"cvp-label\"><\/label><input type=\"text\" id=\"sf_1322\" name=\"_search\" value=\"\" data-nosubmit=\"true\" placeholder=\"Buscar por palabra clave\"\/><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_content_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_content_category\"><option value=\"\">Contenido<\/option><option value=\"blog-type\" >Blog<span class=\"cvp-count\"> (57)<\/span><\/option><option value=\"events-type\" >Eventos<span class=\"cvp-count\"> (8)<\/span><\/option><option value=\"news-type\" >Noticias<span class=\"cvp-count\"> (12)<\/span><\/option><option value=\"press-releases\" >&nbsp;&nbsp;&nbsp;Comunicados de prensa<span class=\"cvp-count\"> (10)<\/span><\/option><option value=\"declaraciones\" >&nbsp;&nbsp;&nbsp;Declaraciones<span class=\"cvp-count\"> (2)<\/span><\/option><option value=\"resources-type\" >Recurso<span class=\"cvp-count\"> (32)<\/span><\/option><option value=\"policy-briefs\" >&nbsp;&nbsp;&nbsp;Informes de pol\u00edticas p\u00fablicas<span class=\"cvp-count\"> (7)<\/span><\/option><option value=\"speeches-type\" >&nbsp;&nbsp;&nbsp;Discursos<span class=\"cvp-count\"> (1)<\/span><\/option><option value=\"stories-type\" >Historias<span class=\"cvp-count\"> (1)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_category\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_category\"><option value=\"\">Tema<\/option><option value=\"cifrado\" >Cifrado<span class=\"cvp-count\"> (54)<\/span><\/option><option value=\"privacidad\" >Privacidad<span class=\"cvp-count\"> (61)<\/span><\/option><\/select><\/div><div class=\"cvp-live-filter cvp-dropdown \" id=\"\" data-name=\"tx_region_news_regions\" data-sid=\"bu5bn556\" data-isblock=\"grid1\" data-postid=\"0\"><label class=\"cvp-label\"><\/label><select name=\"tx_region_news_regions\"><option value=\"\">Regi\u00f3n<\/option><option value=\"africa\" >\u00c1frica<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"asia-y-el-pacifico\" >Asia y el Pacifico<span class=\"cvp-count\"> (11)<\/span><\/option><option value=\"europa\" >Europa<span class=\"cvp-count\"> (19)<\/span><\/option><option value=\"global\" >Global<span class=\"cvp-count\"> (69)<\/span><\/option><option value=\"america-latina-y-el-caribe\" >America Latina y el Caribe<span class=\"cvp-count\"> (4)<\/span><\/option><option value=\"oriente-medio\" >Oriente Medio<span class=\"cvp-count\"> (0)<\/span><\/option><option value=\"america-del-norte\" >America del Norte<span class=\"cvp-count\"> (18)<\/span><\/option><\/select><\/div><\/div><div class=\"pt-cv-view pt-cv-blockgrid iscvblock iscvreal paging-noscroll grid1 layout3 cveffect-zoomin pt-cv-pgregular pt-cv-left cvp-lfres\" id=\"pt-cv-view-bu5bn556\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"241253\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/informe-de-politicas-seguridad-en-linea-y-restricciones-de-edad\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/policy-briefs\/' title='Informes de pol\u00edticas p\u00fablicas' class='pt-cv-tax-policy-briefs'>Informes de pol\u00edticas p\u00fablicas<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-12-04T12:01:00+00:00\">4 de diciembre de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/policybriefs\/2025\/informe-de-politicas-seguridad-en-linea-y-restricciones-de-edad\/\" class=\"_self\" target=\"_self\" aria-label=\"Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad\">Informe de pol\u00edticas: Seguridad en l\u00ednea y restricciones de edad<\/a><\/h2><div class=\"pt-cv-content\">Si bien suelen tener buenas intenciones, las pol\u00edticas que exigen la verificaci\u00f3n de edad crean riesgos para la privacidad, la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"227165\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"\u00bfQu\u00e9 es una puerta trasera de cifrado?\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"A bit of light spills out of a dark door.\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-768x320.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-450x188.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-1024x427.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door-250x104.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/05\/Ominous-Door.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-05-02T17:59:50+00:00\">2 de mayo de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/05\/what-is-an-encryption-backdoor\/\" class=\"_self\" target=\"_self\" aria-label=\"\u00bfQu\u00e9 es una puerta trasera de cifrado?\">\u00bfQu\u00e9 es una puerta trasera de cifrado?<\/a><\/h2><div class=\"pt-cv-content\">Una puerta trasera de cifrado es un tipo de acceso excepcional que una plataforma concede a terceros &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"223404\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"hands typing on a keyboard\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/04\/hands-on-keyboard.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-04-17T20:08:44+00:00\">17 de abril de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/04\/internet-trust-why-we-need-it-and-how-to-achieve-it\/\" class=\"_self\" target=\"_self\" aria-label=\"Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla\">Confianza en Internet: por qu\u00e9 la necesitamos y c\u00f3mo lograrla<\/a><\/h2><div class=\"pt-cv-content\">Veamos qu\u00e9 significa confianza en Internet, qu\u00e9 hace que Internet sea confiable y por qu\u00e9 deber\u00eda importarnos &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"218579\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/01\/entender-e-identificar-estafas-capacitar-digitalmente-a-los-adultos-mayores-en-mexico\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Entender e identificar estafas: Capacitar digitalmente a los adultos mayores en M\u00e9xico\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"Jeffry Fernandez speaks to a class\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/Jeffry-Speaking-1-768x352.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/Jeffry-Speaking-1-768x352.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/Jeffry-Speaking-1-450x206.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/Jeffry-Speaking-1-1024x469.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/Jeffry-Speaking-1-250x115.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/01\/Jeffry-Speaking-1.jpg 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><a href='https:\/\/www.internetsociety.org\/es\/content_category\/stories-type\/' title='Historias' class='pt-cv-tax-stories-type'>Historias<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2025-01-15T15:17:22+00:00\">15 de enero de 2025<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2025\/01\/entender-e-identificar-estafas-capacitar-digitalmente-a-los-adultos-mayores-en-mexico\/\" class=\"_self\" target=\"_self\" aria-label=\"Entender e identificar estafas: Capacitar digitalmente a los adultos mayores en M\u00e9xico\">Entender e identificar estafas: Capacitar digitalmente a los adultos mayores en M\u00e9xico<\/a><\/h2><div class=\"pt-cv-content\">Existe una brecha digital generacional, los adultos mayores a menudo carecen de la formaci\u00f3n necesaria para utilizar las herramientas digitales &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"214876\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2024\/estudio-de-caso-la-ley-de-noticias-en-linea-de-canada-perjudica-al-periodismo-a-la-competencia-y-a-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2024-09-24T13:00:25+00:00\">24 de septiembre de 2024<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2024\/estudio-de-caso-la-ley-de-noticias-en-linea-de-canada-perjudica-al-periodismo-a-la-competencia-y-a-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet\">Estudio de caso: la \u201cLey de Noticias en L\u00ednea\u201d de Canad\u00e1 perjudica al periodismo, a la competencia y a Internet<\/a><\/h2><div class=\"pt-cv-content\">Muchos pa\u00edses est\u00e1n evaluando nuevas leyes para apoyar a la industria de las noticias, que enfrenta dificultades debido a la &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"205179\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2023\/escaneo-del-lado-del-cliente\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Escaneo del lado del cliente\"><img decoding=\"async\" style=\"\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail not-found skip-lazy  cvplazy\" alt=\"Escaneo del lado del cliente\" data-cvpsrc=\"\/wp-content\/themes\/isoc\/dist\/images\/BLUE-NODE-DARK.png\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/resources-type\/' title='Recurso' class='pt-cv-tax-resources-type'>Recurso<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-12-13T15:05:02+00:00\">13 de diciembre de 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/resources\/doc\/2023\/escaneo-del-lado-del-cliente\/\" class=\"_self\" target=\"_self\" aria-label=\"Escaneo del lado del cliente\">Escaneo del lado del cliente<\/a><\/h2><div class=\"pt-cv-content\">Lea acerca de las recomendaciones de Internet Society al reglamento propuesto por el Parlamento Europeo para prevenir y combatir el &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"192069\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/05\/el-cifrado-protege-a-los-menores-en-internet\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"El cifrado protege a los menores en Internet\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a young girl using laptop with headphones\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-768x352.jpeg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-768x352.jpeg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-450x206.jpeg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-1024x470.jpeg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop-250x115.jpeg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2023\/05\/girl-using-laptop.jpeg 1199w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2023-05-03T23:43:29+00:00\">3 de mayo de 2023<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2023\/05\/el-cifrado-protege-a-los-menores-en-internet\/\" class=\"_self\" target=\"_self\" aria-label=\"El cifrado protege a los menores en Internet\">El cifrado protege a los menores en Internet<\/a><\/h2><div class=\"pt-cv-content\">Los responsables pol\u00edticos est\u00e1n proponiendo leyes que debilitar\u00e1n el cifrado. La Ley EARN IT, la Ley STOP CSAM y muchas &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"183211\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/11\/dos-cosas-que-ee-uu-debe-hacer-para-proteger-internet-y-la-seguridad-de-miles-de-millones-de-personas-en-la-red\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"Dos cosas que EE.UU. debe hacer para proteger Internet y la seguridad de miles de millones de personas en la red\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"330\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"a black\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-768x330.jpg\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-768x330.jpg 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-450x193.jpg 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-1024x440.jpg 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1-250x107.jpg 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/11\/tobias-tullius-4dKy7d3lkKM-unsplash-1280x550-1.jpg 1280w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/blog-type\/' title='Blog' class='pt-cv-tax-blog-type'>Blog<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-11-22T21:48:45+00:00\">22 de noviembre de 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/blog\/2022\/11\/dos-cosas-que-ee-uu-debe-hacer-para-proteger-internet-y-la-seguridad-de-miles-de-millones-de-personas-en-la-red\/\" class=\"_self\" target=\"_self\" aria-label=\"Dos cosas que EE.UU. debe hacer para proteger Internet y la seguridad de miles de millones de personas en la red\">Dos cosas que EE.UU. debe hacer para proteger Internet y la seguridad de miles de millones de personas en la red<\/a><\/h2><div class=\"pt-cv-content\">Adoptar la pr\u00e1ctica de las evaluaciones del impacto de Internet no es solo una opci\u00f3n, es una obligaci\u00f3n para proteger &#8230;<\/div><\/div><\/div>\n<div class=\" pt-cv-content-item pt-cv-1-col\"  data-pid=\"179639\"><div class=\"pt-cv-thumb-wrapper  \"><a href=\"https:\/\/www.internetsociety.org\/es\/events\/global-encryption-day\/2022\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvp-lazy-container\" target=\"_self\" aria-label=\"D\u00eda Mundial del Cifrado 2022\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"352\" src=\"https:\/\/www.internetsociety.org\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail skip-lazy  cvplazy\" alt=\"navy background with white, blue, yellow squares on sides\" data-cvpsrc=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-768x352.png\" data-cvpset=\"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-768x352.png 768w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-450x206.png 450w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-1024x469.png 1024w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550-250x115.png 250w, https:\/\/www.internetsociety.org\/wp-content\/uploads\/2021\/07\/GEC_background_1200x550.png 1200w\" \/><\/a><div class=\"pt-cv-taxoterm over_top_right\"><a href='https:\/\/www.internetsociety.org\/es\/content_category\/events-type\/' title='Eventos' class='pt-cv-tax-events-type'>Eventos<\/a><\/div><\/div>\n<div class=\"pt-cv-remain-wrapper\"><div class=\"pt-cv-meta-fields\"><span class=\"entry-date\"> <time datetime=\"2022-10-19T14:04:00+00:00\">19 de \r\noctubre de 2022<\/time><\/span><\/div><h2 class=\"pt-cv-title\"><a href=\"https:\/\/www.internetsociety.org\/es\/events\/global-encryption-day\/2022\/\" class=\"_self\" target=\"_self\" aria-label=\"D\u00eda Mundial del Cifrado 2022\">D\u00eda Mundial del Cifrado 2022<\/a><\/h2><div class=\"pt-cv-content\">El cifrado fuerte nos mantiene seguros en l\u00ednea e incluso fuera de l\u00ednea. Este D\u00eda Mundial del Cifrado, personas de &#8230;<\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-left pt-cv-pagination-wrapper\"><ul class=\"pt-cv-pagination pt-cv-ajax pagination\" data-totalpages=\"13\" data-currentpage=\"1\" data-sid=\"bu5bn556\" data-unid=\"\" data-isblock=\"grid1\" data-postid=\"0\"><li class=\"active\"><a href=\"#\">1<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244736\/?_page=2\">2<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244736\/?_page=3\">3<\/a><\/li>\n\t<li ><a href=\"#\">&hellip;<\/a><\/li>\n\t<li ><a class=\"\" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244736\/?_page=13\">13<\/a><\/li>\n\t<li ><a class=\" \" href=\"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244736\/?_page=2\">&rsaquo;<\/a><\/li>\n\t<\/ul><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Cargando...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div> <\/div> <style>\n#pt-cv-view-bu5bn556 {text-align: left}\n#pt-cv-view-bu5bn556 .pt-cv-remain-wrapper { background-color: #eff2ec; }#pt-cv-view-bu5bn556 .pt-cv-content-item { background-color: #eff2ec;padding: 5% 5% 1% 5%;border-radius: 0px 0px 0px 0px; }#pt-cv-view-bu5bn556 .pt-cv-meta-fields {  }#pt-cv-view-bu5bn556 .pt-cv-meta-fields * { color: #0c1c2bcf;font-size: 16px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper:not(.miniwrap) {  }#pt-cv-view-bu5bn556 .pt-cv-thumbnail:not(.pt-cv-thumbnailsm) { height: 200px; }#pt-cv-view-bu5bn556 .pt-cv-thumb-wrapper {  }#pt-cv-view-bu5bn556[class*=\"cveffect\"] .pt-cv-thumb-wrapper, #pt-cv-view-bu5bn556:not([class*=\"cveffect\"]) .pt-cv-thumbnail { border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 .pt-cv-thumbnail {  }#pt-cv-view-bu5bn556 .pt-cv-title a { display: block;color: #24366e;margin: 0px 0px 0px 0px;padding: 10px 0px 10px 0px; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-weight: 300;text-decoration: none;font-size: 28px;line-height: 1em; }#pt-cv-view-bu5bn556 .pt-cv-titlesm a { font-weight: 600;font-size: 18px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-weight: 300;font-size: 18px;line-height: 21px; }#pt-cv-view-bu5bn556 .pt-cv-rmwrap {  }#pt-cv-view-bu5bn556 .pt-cv-readmore { color: #fff;background-color: #0075ff;font-size: 14px; }#pt-cv-view-bu5bn556 .pt-cv-taxoterm {  }#pt-cv-view-bu5bn556 .pt-cv-taxoterm * { color: #222;background-color: #dedad0;font-size: 16px;padding: 8px 8px 8px 8px;border-radius: 5px 5px 5px 5px; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper { text-align: left; }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a { color: #0c1c2c;background-color: #eff2ec;font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] .cvp-label { text-align: right; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { text-align: left;font-size: 18px; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-submit { text-align: right; }.cvp-live-filter[data-sid='bu5bn556']~ .cvp-live-button .cvp-live-reset { text-align: right;color: #eff2ec;background-color: #24366e;font-weight: 600;font-size: 18px;padding: 10px 10px 10px 10px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(3, 1fr);grid-gap: 20px;}#pt-cv-view-bu5bn556 .pt-cv-title a:hover { color: #3a82e4; }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper:hover {  }#pt-cv-view-bu5bn556 + .pt-cv-pagination-wrapper a:hover { color: #24366e; }\n@media all and (max-width: 1024px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(2, 1fr);}\n} \n@media all and (max-width: 767px) { \n#pt-cv-view-bu5bn556 .pt-cv-title a {  }#pt-cv-view-bu5bn556 .pt-cv-title:not(.pt-cv-titlesm) a { font-size: 21px; }#pt-cv-view-bu5bn556 .pt-cv-content { font-size: 16px; }.cvp-live-filter[data-sid='bu5bn556'] input[type=\"text\"], .cvp-live-filter[data-sid='bu5bn556'] div > label, .cvp-live-filter[data-sid='bu5bn556'] select, .cvp-live-filter[data-sid='bu5bn556'] .irs-from, .cvp-live-filter[data-sid='bu5bn556'] .irs-to { font-size: 16px; }#pt-cv-view-bu5bn556 > .pt-cv-page {grid-template-columns: repeat(1, 1fr);}\n} <\/style><\/div>\n<\/div><\/section>\n\n\n\n<p class=\"has-text-align-center has-neutral-white-color has-ground-navy-background-color has-text-color has-background has-12-font-size\">Cr\u00e9dito de la imagen:&nbsp;<br>\u00a9 Candice Ward\/The Internet Society, \u00a9 Nyani Quarmyne, \u00a9 Elyse Butler, \u00a9 Victor Ndonnang\/Internet Society, \u00a9 Nyani Quarmyne, \u00a9 Urban Pixel Lebanon, \u00a9 Oleksandr Pidvalnyi from Pixabay, courtesy of Cat Easdon<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La privacidad en l\u00ednea es fundamental para una Internet confiable. Nos dedicamos a promover la privacidad al abogar por tecnolog\u00edas y pol\u00edticas que la respeten.<\/p>\n","protected":false},"author":1898,"featured_media":239499,"parent":47380,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[],"tags":[],"region_news_regions":[],"content_category":[],"ppma_author":[6074],"class_list":["post-244736","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",1500,750,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-450x225.jpg",450,225,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-768x384.jpg",768,384,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-1024x512.jpg",1024,512,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",1500,750,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",1500,750,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-250x125.jpg",250,125,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1-600x600.jpg",600,600,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",300,150,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",400,200,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2025\/12\/CrystalFraser_mobile-1.jpg",600,300,false]},"uagb_author_info":{"display_name":"Agustin Bianchi","author_link":"https:\/\/www.internetsociety.org\/es\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"La privacidad en l\u00ednea es fundamental para una Internet confiable. Nos dedicamos a promover la privacidad al abogar por tecnolog\u00edas y pol\u00edticas que la respeten.","_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1898"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=244736"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/244736\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/pages\/47380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/239499"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=244736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=244736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=244736"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=244736"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=244736"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=244736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}