AS
Bufete de abogados penalistas Alonso Sala
terminalPractice Area

Hacking & Intrusion

Defense against accusations of illicit access to computer systems. The distinction between ethical hacking and crime.

Digital Trespassing

The crime of computer intrusion punishes anyone who accesses or remains in an information system against the will of its owner. It is not necessary to cause damage or steal data; the mere fact of "entering" by breaking a password is already a crime.

Defense Strategies

  • check_circleAbsence of Security Measures: If the system was open or with default passwords ("admin/admin"), we argue that there was no security "breach", a necessary element of the offense.
  • check_circleTacit Authorization: Common in labor or partner conflicts. If the user had legitimate keys and they were not formally revoked, there is no illicit access.
terminal

Why Alonso & Sala for Hacking?

Specialized defense in illicit system access. Technical-legal mastery of vulnerabilities, pentesting, and forensic attribution.

  • securityForensic computer experts for log analysis and digital behavior evidence.
  • security'Open door' defense: absence of security measures as cause of atypicality.
  • securityTacit authorization strategy in labor conflicts (credentials not revoked).
  • securityWhite hat hacking experience: no harm + company collaboration.
quiz

FAQs

Is it a crime if there was no password?expand_more
This is a key defense. The crime requires 'breaching security measures'. If a system was open to the public (e.g., a shared folder without a password), access is not a crime, even if the information was private. The responsibility would lie with the owner for not protecting their data.
What if I guessed the password because it was '1234'?expand_more
Even if the password is weak, it is still a security measure. Bypassing it is breaching it, so technically it is a crime. However, the weakness of the key can be used to argue the lack of severity of the conduct.
What is 'ethical hacking'?expand_more
It's when a security expert looks for vulnerabilities in a system with the owner's authorization (pentesting). It is a legal and necessary activity. The problem arises with 'white hat hacking', when it's done without prior permission, even to report a flaw. Technically, it is a crime.
If I entered but didn't steal or delete anything, is there a crime?expand_more
Yes. Art. 197 bis punishes mere access ('digital trespassing'). It is not necessary to seize data or cause damage. The simple act of entering and 'looking' is already punishable.
An ex-employee used their old credentials to log in, is it a crime?expand_more
Yes. Even if the company forgot to revoke their credentials, they know they are no longer authorized to access. They commit a crime of illicit access, and if they also copy client data for their new company, also revelation of secrets.
What is the penalty for this crime?expand_more
The prison sentence is from 6 months to 2 years. If secrets are discovered or serious damage is caused, the penalties increase considerably.

Need Immediate and Expert Legal Assistance?

The judicial system is complex and can be relentless. Do not face it alone. We have the experience, technical knowledge, and human resources necessary to fight for you. Contact us today to schedule a confidential consultation and start building your defense.

Contact Alonso Sala

We use cookies to improve your experience. By continuing to browse, you accept our privacy policy.