<?xml version='1.0' encoding='UTF-8'?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=2&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=3&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=4&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=5&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=6&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=7&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=21&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=10&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=11&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=12&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=13&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=9&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=8&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=14&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=15&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=16&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=17&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=18&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=19&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=28&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=30&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=35&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=32&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=31&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=33&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=34&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?option=com_jdownloads&amp;view=category&amp;catid=20&amp;Itemid=504</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/293-alan-leibovich</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/273-alejandro-perez</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/295-alex-garcia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/160-ana-laura-rodriguez</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/290-andres-szewc</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/302-andres-tejedor</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/171-antonella-pelanda</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/161-antonella-di-gennaro</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/215-ayelen-taglioli</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/262-barbara-penaloza</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/286-belen-perez-ares</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/159-betino-perez-miranda</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/220-brunella-bertino</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/263-bryan-castaneda</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/253-cacho-flores</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/187-carla-schianchi</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/181-carlos-dionisio-aguirre</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/301-cear-elisa</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/212-cecilia-figueroa</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/304-cecilia-zanotti</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/285-christian-miller</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/179-claribel-lopez-arroyo</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/188-daiana-dajan</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/189-daniel-jose-asis</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/167-elisabeth-acosta</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/250-facundo-machin</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/162-federico-arnedo</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/174-federico-nino</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/258-felix-gabriel-olmedo</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/270-fernando-sisi</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/182-franco-iniaki-contin</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/254-gerardo-esperanza</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/299-gisela-rios</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/216-giselle-gomez</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/219-gonzalo-ferreras</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/211-gonzalo-sgarella</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/155-gustavo-limpias-chaves-diaz</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/154-hugo-f-perez-carretta</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/230-javier-pairola</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/218-javier-pallero</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/164-jessica-valeria-veron</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/255-jorge-luis-sosa</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/224-jose-iacona</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/256-juan-cruz-zucaria</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/251-juan-jose-paso</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/265-juan-juarez</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/170-karen-luz-berrocal</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/267-laura-leni</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/306-laureano-piccini</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/264-lorena-p-berber</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/158-luciana-rizza</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/210-macarena-belen-pereira</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/184-mailen-sala-sala</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/169-marcos-goy</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/165-maria-florencia-fuentes</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/168-maria-victoria-masachessi</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/271-marina-flego-eiras</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/213-marina-lenardon</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/287-martin-curi</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/185-matias-capdevila</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/214-micaela-queralt</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/260-natael-tolesano</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/175-nicolas-ricardo-rosales-rubio</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/291-omar-alejandri</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/266-pablo-brito</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/177-pablo-sebastian-arce</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/190-raul-gonzalo-barrenechea</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/272-romina-pederzoli</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/163-romina-picca-issolio</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/297-rosaria-devries</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/172-santiago-jamardo</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/209-sebastian-leoz-moreta</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/178-sheila-bonaldi</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/173-silvana-nicolas</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/183-tania-zapata</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/252-tomas-cagliero</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/257-turi-bornancini</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/259-valentina-hisse</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/156-valentina-marconetti-venturuzzi</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/198-valentina-peral</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/305-valeria-favaron</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/186-ventura-gabriel-correa-palmero</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/profile/166-veronica-boiero</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/1-cumbre-de-america-latina-en-buenos-aires-mli-group/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/2-icann-53-buenos-aires-meeting/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/9-curso-experto-en-gestion-de-ciberriesgos-y-ciberseguros/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/10-curso-online-derecho-procesal-electronico-practico/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/8-i-congreso-ia-perfilamiento/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/6-iii-jornada-de-prevencion-de-lavado-de-activos/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/4-lacdns-foro-2015/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/3-44-jaiio-jornadas-argentinas-de-informatica-rosario/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/events/5-webinar-icann-and-its-structure-on-07-july-2015-at-23-00-utc/item</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/programa-bibliografia/2015/05/04/acerca-del-modo-de-efectuar-las-citas-bibliograficas-en-las-publicaciones-de-la-academia-nacional-de-derecho-de-cordoba</loc>
<lastmod>2015-05-04T14:52:31Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/programa-bibliografia/2015/04/29/bibliografia-links-sugeridos-para-el-desarrollo-de-cada-unidad-tematica</loc>
<lastmod>2015-05-01T14:29:21Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/programa-bibliografia/2015/04/17/programa-2015</loc>
<lastmod>2015-04-17T03:52:23Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-i-nueva-economia/2015/04/30/columna-scientia-la-gobernanza-de-internet</loc>
<lastmod>2015-04-30T02:59:29Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-i-nueva-economia/2015/04/30/expertos-advierten-sobre-el-peligro-de-poner-cerrojos-al-uso-de-internet</loc>
<lastmod>2015-04-30T03:03:08Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/nueva-economia-conceptualizacion-diferencias-con-la-economia-tradicional-criticas/2015/04/17/kevin-kelly-6-conceptos</loc>
<lastmod>2015-04-17T05:36:28Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/nueva-economia-conceptualizacion-diferencias-con-la-economia-tradicional-criticas/2015/04/17/las-nuevas-reglas-para-la-nueva-economia-kk-resumen</loc>
<lastmod>2015-04-17T23:56:23Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/25/derecho-informatico-comentario-julio-tellez-valdes</loc>
<lastmod>2019-08-25T22:45:42Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/26/consejos-del-info-lab-para-evitar-una-estafa-electronica</loc>
<lastmod>2021-01-26T17:39:08Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-v-delitos-en-la-red-generalidades/2020/12/02/la-mal-llamada-pornografia-infantil</loc>
<lastmod>2020-12-02T15:54:45Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/02/22/las-estafas-online-mas-comunes-que-sufren-las-empresas-y-como-combatirlas</loc>
<lastmod>2021-02-22T13:46:34Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/legislacion/2020/12/18/ley-mica-ortega-ley-27590</loc>
<lastmod>2020-12-18T17:45:05Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/12/17/m-i-p-en-representacion-d-ela-menor-f-c-redes-sociales-twiter-whataspp-facebook-google-yahoo-y-o-usuarios-de-twitter-s-medida-autosatisfactoria</loc>
<lastmod>2020-12-17T17:52:16Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/02/17/owasp-top-10</loc>
<lastmod>2021-02-17T15:42:07Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xi-gobernanza-de-internet/2015/04/30/gobernanza-de-internet-video</loc>
<lastmod>2015-04-30T00:20:40Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xi-gobernanza-de-internet/2015/04/30/gobiernos-e-internet</loc>
<lastmod>2015-04-30T05:00:11Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/internet-corporation-for-assigned-names-and-numbers-icann-organizacion-estructura-iana-asignacion-de-direcciones-ip-ipv6-y-sus-consecuencias-legales/2015/06/01/el-defensor-del-pueblo-de-la-icann</loc>
<lastmod>2015-06-03T02:29:31Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/internet-corporation-for-assigned-names-and-numbers-icann-organizacion-estructura-iana-asignacion-de-direcciones-ip-ipv6-y-sus-consecuencias-legales/2015/04/29/la-iot-internet-de-las-cosas-y-sus-implicaciones-eticas-legales-y-de-seguridad</loc>
<lastmod>2015-04-29T01:35:31Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/internet-corporation-for-assigned-names-and-numbers-icann-organizacion-estructura-iana-asignacion-de-direcciones-ip-ipv6-y-sus-consecuencias-legales/2015/06/03/sobre-la-junta-directiva-de-la-icann</loc>
<lastmod>2015-06-03T02:12:12Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/internet-corporation-for-assigned-names-and-numbers-icann-organizacion-estructura-iana-asignacion-de-direcciones-ip-ipv6-y-sus-consecuencias-legales/2015/05/09/otra-internet-es-posible</loc>
<lastmod>2015-05-09T03:46:30Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/internet-corporation-for-assigned-names-and-numbers-icann-organizacion-estructura-iana-asignacion-de-direcciones-ip-ipv6-y-sus-consecuencias-legales/2015/06/03/que-es-la-icann</loc>
<lastmod>2015-06-03T02:08:29Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/los-gtld-y-cctld-marco-juridico-actual-de-internet-los-nuevos-gtld-y-su-especial-modo-de-asignacion-evaluacion-critica/2015/04/30/la-gobernanza-de-internet-y-la-nueva-agenda-mundial-de-los-recursos-tecnologicos</loc>
<lastmod>2015-04-30T14:07:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/10/13/m-r-e-c-m-l-a-s-cobro-de-honorarios</loc>
<lastmod>2020-10-13T18:10:17Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/e-commerce-concepto-y-elementos-segun-omc-e-bussines/2015/04/26/que-es-el-comercio-electronico-aproximaciones</loc>
<lastmod>2015-04-26T22:13:39Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tipos-de-comercio-electronico-directo-e-indirecto/2015/04/28/clasificacion-del-comercio-electronico</loc>
<lastmod>2015-04-28T01:44:48Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/contratacion-electronica/2015/04/28/que-es-el-contrato-electronico</loc>
<lastmod>2015-04-28T03:03:26Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/analisis-de-casos/2015/04/23/un-golpe-bajo-para-el-comercio-electronico</loc>
<lastmod>2015-04-23T14:42:31Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/30/4-cosas-acerca-del-cibercrimen-que-deben-saber-las-pyme</loc>
<lastmod>2020-11-30T14:07:01Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/30/5-formas-en-las-que-va-a-cambiar-la-ciberseguridad-en-2021</loc>
<lastmod>2020-11-30T15:27:03Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/04/6-consejos-que-deberias-seguir-al-momento-de-respaldar-tus-archivos</loc>
<lastmod>2015-06-04T02:04:59Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/06/01/anonymous-2020-quienes-son-y-que-hicieron-hasta-el-momento</loc>
<lastmod>2020-06-01T16:35:26Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/05/29/apple-y-google-lideran-ranking-de-las-marcas-mas-valiosas-del-mundo</loc>
<lastmod>2015-05-29T04:08:54Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/10/16/b-m-s-y-otro-c-l-m-p-e-s-alimentos</loc>
<lastmod>2020-10-16T18:21:28Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/08/04/banco-de-la-provincia-de-buenos-aires-c-dubois-christian-s-ejecutivo</loc>
<lastmod>2020-08-04T20:50:39Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/05/06/cables-submarinos-las-grandes-autopistas-de-informacion</loc>
<lastmod>2015-05-28T13:26:12Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2018/03/22/como-podes-irte-de-facebook-y-llevarte-tus-datos-con-vos</loc>
<lastmod>2018-03-22T16:28:07Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/14/como-proteger-a-los-ninos-de-la-sextorsion</loc>
<lastmod>2015-06-14T02:08:54Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/05/como-proteger-a-nuestros-ninos-de-los-acosadores-online</loc>
<lastmod>2015-06-05T16:59:40Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/01/31/consejos-contra-estafas-por-whatsapp</loc>
<lastmod>2020-01-31T15:02:07Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2018/03/19/quiero-desaparecer-de-internet-como-hacerlo-paso-a-paso</loc>
<lastmod>2018-03-19T15:06:20Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2017/01/20/descubren-nueva-tecnica-de-estafa-tipo-phishing-que-afecta-a-usuarios-de-gmail</loc>
<lastmod>2017-01-20T15:54:19Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/17/duckduckgo-crece-un-600-tras-hacerse-publica-la-vigilancia-de-la-nsa</loc>
<lastmod>2015-06-17T15:04:35Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/12/28/ee-uu-poderosa-herramienta-de-vigilancia-de-telefonos-moviles-opera-en-la-oscuridad-en-todo-el-pais</loc>
<lastmod>2020-12-28T13:50:11Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/05/20/el-gobierno-de-la-provincia-lanzo-el-programa-cordoba-mas-segura</loc>
<lastmod>2015-05-28T13:25:35Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/06/05/el-gobierno-reglamento-el-polemico-ciberpatrullaje</loc>
<lastmod>2020-06-05T13:32:46Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/07/07/el-manual-de-la-nsa-para-convertirte-en-maestro-de-las-busquedas-en-internet</loc>
<lastmod>2015-07-07T12:42:33Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/12/18/el-presidente-de-microsoft-califica-el-hack-de-solarwinds-como-un-acto-de-imprudencia</loc>
<lastmod>2020-12-18T15:48:10Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/30/el-primer-dictamen-europeo-sobre-drones-alerta-de-sus-riesgos-para-la-privacidad</loc>
<lastmod>2015-06-30T01:23:52Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/05/el-doxing-una-forma-de-venganza-a-traves-de-la-violacion-de-la-privacidad</loc>
<lastmod>2021-01-05T15:33:39Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/26/especialistas-advierten-sobre-una-ola-de-ciberataques-con-ransomware-que-ya-golpeo-a-ee-uu</loc>
<lastmod>2019-08-26T19:43:45Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/21/estudio-de-caso-de-la-udrp-ciberocupacion-relacionada-con-el-coronavirus</loc>
<lastmod>2021-01-21T15:57:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/06/ex-nunc-ex-tunc-siempre-y-cuando-esotericas</loc>
<lastmod>2020-11-06T14:27:46Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/06/12/facebook-ayudo-a-hackear-a-uno-de-sus-propios-usuarios</loc>
<lastmod>2020-06-12T17:42:04Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/12/facebook-y-whatsapp-son-las-redes-sociales-mas-usadas-para-ciberataques</loc>
<lastmod>2020-11-12T14:42:10Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/09/25/fallo-llopart-ricard-jose-mensajes-de-whatsapp-validez-probatoria</loc>
<lastmod>2020-09-25T23:12:28Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/27/fraude-bancarioacusan-a-la-astronauta-anne-mcclain-de-cometer-el-primer-delito-en-el-espacio</loc>
<lastmod>2019-08-27T15:54:56Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/19/fue-condenada-a-indemnizar-a-su-exyerno-por-injuriarlo-en-facebook-e-instagram</loc>
<lastmod>2019-08-19T19:37:37Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/10/17/google-te-encuentra-una-cancion-con-solo-tararearla-o-silbarla</loc>
<lastmod>2020-10-17T15:55:09Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/12/guia-de-ciberseguridad-para-pequenas-empresas</loc>
<lastmod>2020-11-12T19:43:36Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/09/27/guia-para-publicar-o-no-fotos-de-ninos-en-facebook</loc>
<lastmod>2015-09-27T22:49:44Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/09/historia-clinica-digital-informacion-sensible-y-altos-riesgos</loc>
<lastmod>2020-11-09T22:53:24Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/07/iso-iec-27036-2013-tecnologia-de-la-informacion-tecnicas-de-seguridad-seguridad-de-la-informacion-para-las-relaciones-con-los-proveedores-cuatro-partes</loc>
<lastmod>2021-01-07T02:49:53Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/07/iso-27017-controles-de-seguridad-para-servicios-en-la-nube</loc>
<lastmod>2021-01-07T02:37:44Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/07/iso-27018-la-primera-normativa-para-la-privacidad-en-la-nube</loc>
<lastmod>2021-01-07T02:31:27Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/04/julian-assange-no-debe-ser-extraditado-a-ee-uu-reglamento-de-la-corte-de-londres</loc>
<lastmod>2021-01-04T15:10:57Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/30/kaspersky-10-amenazas-de-ciberseguridad-2021-latam</loc>
<lastmod>2020-11-30T16:44:47Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/07/15/la-adc-cuestiona-la-nueva-reglamentacion-del-acceso-a-la-informacion-en-jujuy</loc>
<lastmod>2015-07-15T15:40:16Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/06/05/la-cuarta-revolucion-industrial-que-significa-como-responder</loc>
<lastmod>2020-06-05T22:01:11Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/07/23/la-inteligencia-artificial-como-la-nueva-realidad-de-la-justicia-electronica</loc>
<lastmod>2020-07-23T19:46:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/17/la-reforma-del-copyright-en-europa-ya-esta-en-marcha</loc>
<lastmod>2015-06-17T15:20:42Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/06/la-ue-apoya-neutralidad-de-la-red-su-tribunal-supremo-falla-en-contra-de-las-tarifas-cero</loc>
<lastmod>2020-11-06T13:39:08Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/12/22/la-violacion-de-microsoft-azure-dejo-expuestos-miles-de-registros-de-clientes</loc>
<lastmod>2020-12-22T13:56:41Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/12/21/las-escuelas-de-ee-uu-estan-comprando-tecnologia-de-pirateria-telefonica-que-el-fbi-usa-para-investigar-a-terroristas</loc>
<lastmod>2020-12-21T20:58:52Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/03/01/lopdgdd-la-nueva-ley-organica-de-proteccion-de-datos-en-espana</loc>
<lastmod>2021-03-01T22:31:36Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/12/03/los-5-errores-mas-comunes-que-cometen-los-abogados-en-los-juicios</loc>
<lastmod>2020-12-03T14:03:35Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/19/los-buscadores-no-son-censores</loc>
<lastmod>2019-08-19T19:30:04Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/07/07/los-empleados-son-la-primera-linea-de-defensa-cibernetica</loc>
<lastmod>2015-07-07T03:49:00Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/07/03/los-hackers-mas-famosos-del-mundo</loc>
<lastmod>2015-07-03T15:03:39Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/13/mas-de-200-millones-de-perfiles-de-facebook-instagram-y-linkedin-expuestos-a-traves-de-una-base-de-datos-no-segura-en-poder-de-una-startup-china</loc>
<lastmod>2021-01-13T15:25:02Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/19/mobbing-por-sus-preferencias-sexuales</loc>
<lastmod>2019-08-19T19:35:35Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/07/02/navegando-por-la-deep-web-con-tor-el-buscador</loc>
<lastmod>2015-07-02T16:43:46Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/07/23/notificacion-al-usuario-de-facebook-deuna-prohibicion-de-acercamiento</loc>
<lastmod>2020-07-23T16:46:35Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/24/nuevo-documento-nacional-de-identidad-fisico-y-credencial-virtual-del-dni-para-dispositivos-moviles-inteligentes</loc>
<lastmod>2020-11-24T14:42:49Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/03/obama-promulga-la-ley-que-limita-el-espionaje-de-la-nsa</loc>
<lastmod>2015-06-03T13:24:03Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/25/obtener-ip-real-mediante-telegram</loc>
<lastmod>2021-01-25T19:38:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/06/05/onu-el-anonimato-y-el-cifrado-son-esenciales-para-la-libertad-de-expresion</loc>
<lastmod>2015-06-05T16:36:41Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/07/23/protocolo-general-parala-prevencion-policial-del-delito-con-usode-fuentes-digitales-abiertas-ciberpatrullaje</loc>
<lastmod>2020-07-23T16:59:03Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/11/https-www-iproup-com-economia-digital-18143-bitcoin-como-es-el-proyecto-de-ley-de-criptomonedas</loc>
<lastmod>2020-11-11T00:29:43Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/05/30/putin-vs-el-internet-rusia-podria-prohibir-los-anonimizadores</loc>
<lastmod>2015-05-30T22:39:44Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2017/01/13/que-hacer-si-tras-comprar-un-producto-por-internet-no-lo-recibes-y-el-vendedor-desaparece</loc>
<lastmod>2017-01-13T13:16:55Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/07/que-son-los-informes-de-soc-y-por-que-son-importantes</loc>
<lastmod>2021-01-07T03:10:01Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/05/28/quien-mueve-los-hilos-de-internet-en-el-mundo</loc>
<lastmod>2015-05-28T13:21:30Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/12/22/registros-bancarios-de-las-islas-caiman-expuestos-en-open-azure-blob</loc>
<lastmod>2020-12-22T17:11:47Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/08/resolucion-enacom-1467-20-prestaciones-basicas-universales-pbu</loc>
<lastmod>2021-01-08T17:40:52Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/07/26/resucita-tu-antiguo-ordenador-con-este-sencillo-truco</loc>
<lastmod>2015-07-26T15:16:40Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/10/28/revista-cybersecurity-4-las-mujeres-en-ciberseguridad</loc>
<lastmod>2020-10-28T13:22:01Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2018/06/04/teamviewer-bajo-la-lupa-forense</loc>
<lastmod>2018-06-04T20:38:48Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/06/07/un-grupo-de-ransomware-amenaza-con-subastar-los-datos-legales-de-madonna</loc>
<lastmod>2020-06-07T02:02:45Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2015/09/14/whatsapp-un-virus-ataca-a-millones-de-usuarios</loc>
<lastmod>2015-09-14T12:21:20Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2019/08/19/easy-social</loc>
<lastmod>2019-08-19T19:29:31Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/08/01/por-que-estados-unidos-tiene-miedo-de-tiktok</loc>
<lastmod>2020-08-01T14:31:24Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/01/07/que-es-pci-dss</loc>
<lastmod>2021-01-07T02:56:31Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2020/11/15/reaccionar-o-no-reaccionar-cual-es-la-forma-correcta-de-enfrentarse-al-ciberbullying</loc>
<lastmod>2020-11-15T12:15:05Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet/2021/03/01/sabes-la-diferencia-entre-phishing-y-spoofing</loc>
<lastmod>2021-03-01T21:05:56Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/04/29/albanil-acusado-en-facebook-sin-pruebas-pedira-indemnizacion</loc>
<lastmod>2015-04-29T01:48:34Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/04/29/censura-online-en-china</loc>
<lastmod>2015-04-29T16:37:19Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2020/09/10/el-fraude-del-ceo-como-detectarlo-y-prevenirlo</loc>
<lastmod>2020-09-10T17:16:15Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/04/29/google-yahoo-y-microsoft-se-unen-por-la-libertad-de-expresion</loc>
<lastmod>2015-04-29T16:34:45Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/05/01/ix-congreso-argentino-de-derecho-informatico-adiar-2015</loc>
<lastmod>2015-05-01T14:35:37Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/04/29/la-onu-declara-el-acceso-a-internet-como-un-derecho-humano</loc>
<lastmod>2015-04-29T16:38:02Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/05/05/la-vida-dentro-de-10-anos-segun-microsoft</loc>
<lastmod>2015-05-05T23:20:42Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/04/29/los-hackeos-cuestan-dinero-y-reputacion-a-empresas-y-paises</loc>
<lastmod>2015-04-29T16:35:14Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/05/28/notas-primer-parcial</loc>
<lastmod>2015-05-28T15:06:56Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/05/09/onu-cuba-aboga-por-gobernanza-democratica-de-internet</loc>
<lastmod>2015-05-09T02:45:56Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/noticias-eventos/2015/05/06/como-se-repara-un-cable-submarino-de-telecomunicaciones</loc>
<lastmod>2015-05-06T03:22:22Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/derecho-digital-contenidos-generales/2020/10/21/declaracion-internacional-cifrado-de-extremo-a-extremo-y-seguridad-publica</loc>
<lastmod>2020-10-21T00:14:09Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/firma-digital-y-firma-electronica-concepto/2015/05/19/criptografia-firma-digital-seguridad-en-redes-avanzado</loc>
<lastmod>2015-05-19T03:57:01Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/firma-digital-y-firma-electronica-concepto/2015/05/19/firma-digital-primeras-aproximaciones</loc>
<lastmod>2015-05-19T03:50:03Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/ley-25506-y-normas-complementarias/2015/05/19/ley-25-506</loc>
<lastmod>2015-05-19T04:30:14Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/marco-normativo-argentino-autoridad-de-aplicacion-onti-pki-funcionamiento-general-del-sistema-de-firma-digital/2015/05/20/ente-licenciante-certificadores-licenciados</loc>
<lastmod>2015-05-20T16:48:04Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/marco-normativo-argentino-autoridad-de-aplicacion-onti-pki-funcionamiento-general-del-sistema-de-firma-digital/2015/05/19/la-infraestructura-pki</loc>
<lastmod>2015-05-19T15:41:07Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/recepcion-normativa-en-europa-y-aplicacion-en-argentina/2015/05/19/antecedentes-nacionales-e-internacionales-de-firma-digital</loc>
<lastmod>2015-05-19T16:08:59Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/recepcion-normativa-en-europa-y-aplicacion-en-argentina/2015/05/20/aplicacion-de-la-firma-digital-en-cordoba-nueva-obligacion-digital-para-registracion-laboral</loc>
<lastmod>2015-05-20T01:17:16Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/recepcion-normativa-en-europa-y-aplicacion-en-argentina/2015/05/19/firma-digital-y-certificado-digital-aplicacion-por-afip</loc>
<lastmod>2015-05-19T04:27:54Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/recepcion-normativa-en-europa-y-aplicacion-en-argentina/2015/05/19/el-proceso-basico-de-firma-electronica</loc>
<lastmod>2015-05-19T04:18:26Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/recepcion-normativa-en-europa-y-aplicacion-en-argentina/2015/05/19/implicancias-legales-firma-manuscrita-sobre-un-papel-vs-firma-digital</loc>
<lastmod>2015-05-19T15:48:11Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-vi-delitos-informaticos-en-argentina/2020/10/22/tosco-nicolas-abraham-p-s-a-abuso-sexual-conacceso-carnal-etc</loc>
<lastmod>2020-10-22T20:05:10Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/proteccion-de-datos-personales/2015/06/11/ley-25-326-proteccion-de-los-datos-personales</loc>
<lastmod>2015-06-11T14:32:51Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/legislacion-vigente-ley-26-388-analisis-de-tipos-penales-dano-violacion-de-secretos-y-de-la-privacidad-dano-estafa-pornografia-infantil/2015/05/20/ley-26-388</loc>
<lastmod>2015-05-20T14:57:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-vii-propiedad-intelectual-en-la-sociedad-de-la-informacion/2015/06/01/material-de-estudio-sobre-propiedad-intelectual-tema-7</loc>
<lastmod>2015-06-01T19:28:13Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/nuevas-perspectivas-la-cultura-libre-el-copyleft-aspectos-filosoficos-economicos-y-juridicos-las-licencias-gpl/2015/06/15/que-hacen-y-como-se-justifican-las-licencias-creative-commons</loc>
<lastmod>2015-06-15T17:15:33Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xviii-derecho-penal-economico/2015/09/12/sujetos-obligados-a-generar-los-repotes-de-la-unidad-de-informacion-financiera</loc>
<lastmod>2015-09-12T23:10:05Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xix-informatica-forense-pericia/2020/10/12/diagrama-edrm-proceso-de-descubrimiento-electronico</loc>
<lastmod>2020-10-12T23:49:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xix-informatica-forense-pericia/2020/11/02/beneficios-de-la-iso-19011</loc>
<lastmod>2020-11-02T02:20:21Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xix-informatica-forense-pericia/2020/10/12/iso-iec-27037-2012-nueva-norma-para-la-recopilacion-de-evidencias</loc>
<lastmod>2020-10-12T21:39:39Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/tema-xix-informatica-forense-pericia/2020/10/23/j-a-y-otros-s-nulidad-det-asociacion-ilicita-y-otros</loc>
<lastmod>2020-10-23T23:10:58Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/informatica-forense/2020/10/23/las-7-mejores-alternativas-de-wayback-machine-internet-archive-en-2020</loc>
<lastmod>2020-10-23T21:09:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2021/01/07/violacion-de-la-privacidad-por-controlar-el-celular-en-perjuicio-de-la-victima-por-parte-del-agresor-de-genero</loc>
<lastmod>2021-01-07T16:39:43Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/doctrina/2020/06/07/doctrina-zoom-y-prueba-electronica</loc>
<lastmod>2020-06-07T01:46:27Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/10/19/arias-debora-anabel-c-fundagen-s-a-y-otro-s-despido-documental-conversaciones-de-whatsapp-y-relacion-laboral</loc>
<lastmod>2020-10-19T22:56:16Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/30/bartomioli-jorge-alberto-c-facebook-inc-s-medida-autosatisfactiva</loc>
<lastmod>2020-11-30T02:24:44Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/09/29/caso-memoli-vs-argentina-libertad-de-expresion-derecho-de-propiedad</loc>
<lastmod>2020-09-29T20:40:59Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/24/caso-valle-ambrosio-y-otro-vs-argentina</loc>
<lastmod>2020-11-24T16:06:17Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/30/diaz-ephima-maria-y-palacios-aldo-c-molina-monica-p-injurias-injurias-por-facebook</loc>
<lastmod>2020-11-30T17:27:12Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/30/fallo-da-cunha-virginia-c-yahoo-de-argentina-srl-s-danos-y-perjuicios</loc>
<lastmod>2020-11-30T02:22:59Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/18/giolito-c-google-argentina-srl-y-google-ll</loc>
<lastmod>2020-11-18T20:27:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/09/26/gonzalez-elisa-miriam-contra-santoro-carlos-horacio-y-otros-despido</loc>
<lastmod>2020-09-26T14:57:54Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/17/laferriere-ricardo-luis-c-martinez-eduardo-gonzalo-yotros-medida-cautelar-otras</loc>
<lastmod>2020-11-17T17:49:32Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/10/19/llopart-ricardo-jose-c-lombardich-luis-y-ot-p-cob-de-pesos</loc>
<lastmod>2020-10-19T23:14:17Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/30/martino-daniel-alejandro-s-estafa-csjn-23-05-2006</loc>
<lastmod>2020-11-30T02:26:50Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/30/n-n-s-violacion-de-correspondencia-cfp-5054-2016-1-cs1</loc>
<lastmod>2020-11-30T17:41:50Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2021/03/01/n-n-s-violacion-sist-informatico-arto-153-bis-1-parrafocsj-5901-2014-cs1</loc>
<lastmod>2021-03-01T23:00:36Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/11/30/trevino-susana-c-google-argentina-s-danos-antecedente-de-condena-a-buscadores</loc>
<lastmod>2020-11-30T02:23:27Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/jurisprudencia/2020/10/14/vartalitis-gisela-betiana-c-goocle-inc-y-otros-habeas-data-fake-news-y-censura</loc>
<lastmod>2020-10-14T16:53:30Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/legislacion/2021/02/22/jefatura-de-gabinete-de-ministros-direccion-nacional-de-ciberseguridad-disposicion-1-2021</loc>
<lastmod>2021-02-22T19:24:53Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/entry/legislacion/2020/12/18/ley-11-723-regimen-legal-de-la-propiedad-intelectual-mod-por-ley-27-588</loc>
<lastmod>2020-12-20T05:15:21Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/amenazas-mas-frecuentes-con-el-correo-electronico-redes-sociales-comercio-electronico-uso-de-software-otros-aspectos-generales-sobre-la-navegacion-segura-en-internet</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/analisis-de-casos</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/analisis-de-casos-derecho-comparado-jurisprudencia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/caracteres-de-un-nuevo-derecho-flexibilidad-armonia-globalidad-transversalidad-transnacionalidad</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/caracteristicas-criminologicas-cifra-negra-peculiaridades-del-sujeto-activo-relativizacion-de-parametros-espaciales-y-temporales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/casos-regulados-y-no-regulados-robo-de-identidad-phishing-ciberbullying-cibersex-ciberocupacion-grooming-medidas-de-prevencion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/certificacion-de-identidad-integridad-autenticidad-y-completitud-de-un-documento-y-su-autor</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/ciberdelitos-internacionalizacion-tratados-internacionales-convenio-de-budapest-declaracion-fortalecimiento-de-la-seguridad-cibernetica-en-las-americas</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/clasificacion-del-comercio-electronico-segun-los-participantes-b2b-b2c-b2g-c2c-p2p</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/comparacion-con-otros-signos-similitudes-y-diferencias-con-las-marcas-registradas</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/concepto-de-cyber-delitos-caracteristicas-y-tipos-asociaciones-ilicitas-anonimas-usurpacion-de-id-online</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/conceptos-basicos-virus-hackers-crackers-sellos-de-confianza-bots-zombies-etc-cloud-computing-spam-servidores-ssl-otros-seguridad-informatica-y-seguridad-juridica</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/conceptos-y-definiciones-creatividad-bienes-y-servicios-creativos-industria-cultural-economia-cultural-industrias-creativas</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/contratacion-electronica</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/delitos-en-la-red-en-argentina-antecedentes-legislativos</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/delitos-en-la-red-problematica-internacional-criminalidad-en-internet-teorias</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/derecho-de-autor-marcas-y-patentes-de-invencion-nombres-de-dominio-similitudes-y-diferencias-con-las-marcas-registradas</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/derecho-digital-contenidos-generales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/derechos-de-autor-derechos-morales-y-patrimoniales-copia-distribucion-comunicacion-publica-transformacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/derechos-intelectuales-en-internet-2da-parte-la-crisis-de-los-derechos-de-autor-en-los-contenidos-digitales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/derechos-intelectuales-distinciones-conceptuales-dentro-de-la-propiedad-intelectual</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/doctrina</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/e-commerce-concepto-y-elementos-segun-omc-e-bussines</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/economia-y-negocios-en-la-sociedad-de-la-informacion-el-comercio-en-la-nueva-economia-ventajas-inconvenientes-y-desafios</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/el-copyright-y-su-proteccion-distintos-esquemas-de-licenciamiento-conceptos-fundamentos-incentivos-y-problematicas-actuales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/el-derecho-de-internet-el-cambio-paradigmatico</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/el-derecho-penal-en-la-red-nuevos-delitos-o-nuevas-modalidades-comisivas-debate-formas-de-legislacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/el-desafio-de-construir-un-modelo-operacional-de-la-economia-creativa</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/falta-de-autonomia-del-denominado-derecho-informatico-de-principios-legislativa-cientifica-y-didactica</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/firma-digital-y-firma-electronica-concepto</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/icann</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/informatica-forense</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/internet-corporation-for-assigned-names-and-numbers-icann-organizacion-estructura-iana-asignacion-de-direcciones-ip-ipv6-y-sus-consecuencias-legales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/internet-evolucion-caracteres-ambito-de-la-libertad-no-regulada</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/investigacion-procedimientos-forenses-actuales-la-prueba-digital</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/jurisprudencia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-brecha-digita-la-denominada-estratificacion-digital-la-inclusion-digital-conceptualizacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-direccion-nacional-de-derechos-de-autor-y-los-registros-efectos-las-sociedades-de-gestion-colectiva-fundamentos</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-fehaciencia-en-las-certificaciones-de-tiempo-los-sellados-de-tiempo-time-stamping-y-su-validez-juridica</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-necesidad-de-regulacion-necesidad-de-un-nuevo-derecho</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-necesidad-de-sistematizar-su-analisis</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-propiedad-intelectual-y-el-software</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/la-sociedad-de-la-informacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/legislacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/legislacion-internacional-convenio-de-berna-legislacion-argentina-ley-11-723-y-normativas-complementarias-la-constitucion-o-declaracion-del-derecho</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/legislacion-vigente-ley-26-388-analisis-de-tipos-penales-dano-violacion-de-secretos-y-de-la-privacidad-dano-estafa-pornografia-infantil</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/ley-25506-y-normas-complementarias</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/los-notarios-digitales-el-instituto-juridico-del-tercero-de-confianza-y-la-figura-del-depositario-casos-de-exito-uruguay</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/los-gtld-y-cctld-marco-juridico-actual-de-internet-los-nuevos-gtld-y-su-especial-modo-de-asignacion-evaluacion-critica</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/los-nombres-de-dominio-nombres-de-dominio-concepto-politicas-de-asignacion-su-naturaleza-juridica</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/marco-normativo-argentino-autoridad-de-aplicacion-onti-pki-funcionamiento-general-del-sistema-de-firma-digital</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/medidas-tecnologicas-de-proteccion-los-drm-y-sus-dificultades-de-aplicacion-la-proteccion-juridica-contra-la-elusion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/medios-de-prueba-electronicos-generalidades</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/metodos-de-resolucion-de-conflictos-en-materia-de-nombres-de-dominio-udrp-urs</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/multiple-dimension-de-la-economia-creativa-aspectos-sociales-economicos-y-culturales-desarrollo-sustentable</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/normas-iso-y-otras-reglamentaciones</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/noticias-eventos</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/nueva-economia-conceptualizacion-diferencias-con-la-economia-tradicional-criticas</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/nuevas-modalidades-de-gestion-y-proteccion-de-derechos-contenidos-dinamicos-en-la-web-2-0-la-herramienta-coloriuris-y-sus-caracteristicas-funcionamiento-eficacia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/nuevas-perspectivas-la-cultura-libre-el-copyleft-aspectos-filosoficos-economicos-y-juridicos-las-licencias-gpl</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/pretendida-conceptualizacion-del-derecho-informatico-concepto-caracterizacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/principios-del-derecho-y-nueva-realidad-la-neutralidad-tecnologica-equivalencia-funcional-la-lex-retialis</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/programa-bibliografia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/proteccion-de-datos-personales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/proteccion-del-software</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/recepcion-normativa-en-europa-y-aplicacion-en-argentina</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/regulaciones-regionales-e-internacionales-ley-modelo-cnumi-aplicabilidad-normativas-de-union-europea-directiva-de-ue-y-lssi-de-espana-y-mercosur</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/relaciones-con-el-concepto-de-globalizacion-tecnologia-concepto-su-evolucion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/revista-temas-generales-sobre-nuevas-tecnologias-derecho-e-internet</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/seguridad-informatica-e-impacto-en-la-eficiencia-de-gestion-de-las-organizaciones-consecuencias-legales</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/seguridad-informatica-consecuencias-de-la-inseguridad-juridica-seguridad-de-la-informacion-como-prevencion-integral-principios</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-i-nueva-economia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-ii-la-economia-creativa</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-iii-el-derecho-informatico-existe</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-iv-seguridad-informatica-en-la-red</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-v-delitos-en-la-red-generalidades</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-vi-delitos-informaticos-en-argentina</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-vii-propiedad-intelectual-en-la-sociedad-de-la-informacion</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-viii-propiedad-intelectual-en-la-sociedad-de-la-informacion-2da-parte</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-x-fehaciencia-juridica-en-la-red</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-xi-gobernanza-de-internet</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-xiv-comercio-electronico</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-xix-informatica-forense-pericia</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-xviii-derecho-penal-economico</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tema-xx-neurotecnologia-inteligencia-artificial-y-otros-relacionados</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog/categories/tipos-de-comercio-electronico-directo-e-indirecto</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/politicas-del-sitio/general/sobre-el-uso-de-cookies</loc>
<lastmod>2021-01-05T18:30:19Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/politicas-del-sitio/general/gnu-free-documentation-license</loc>
<lastmod>2015-06-09T07:17:36Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/politicas-del-sitio/general/politica-de-uso-privacidad-y-permanencia-pupp</loc>
<lastmod>2019-08-19T03:26:17Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/blog</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/glosario/words</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.informaticayderecho.com.ar/index.php?Itemid=504&amp;option=com_jdownloads&amp;view=categories&amp;id=0</loc>
<changefreq>daily</changefreq>
<priority>0.5</priority>
</url>
</urlset>