{"id":2526,"date":"2024-09-25T09:56:27","date_gmt":"2024-09-25T12:56:27","guid":{"rendered":"https:\/\/ciberseguridad.uncoma.edu.ar\/?p=2526"},"modified":"2024-10-04T08:40:05","modified_gmt":"2024-10-04T11:40:05","slug":"conservatorio","status":"publish","type":"post","link":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/conservatorio\/","title":{"rendered":"Protecci\u00f3n de datos personales en las Universidades Nacionales . Conservatorio"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-2528 size-full\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/09\/CIN.png\" alt=\"\" width=\"599\" height=\"592\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/09\/CIN.png 599w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/09\/CIN-300x296.png 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>La Comisi\u00f3n de Conectividad y Sistemas de Informaci\u00f3n del Consejo Interuniversitario Nacional (CIN), a trav\u00e9s de su Subcomisi\u00f3n de Ciberseguridad, convoca a un conversatorio denominado \u201c\ud835\udc0f\ud835\udc2b\ud835\udc28\ud835\udc2d\ud835\udc1e\ud835\udc1c\ud835\udc1c\ud835\udc22\u00f3\ud835\udc27 \ud835\udc1d\ud835\udc1e \ud835\udc1d\ud835\udc1a\ud835\udc2d\ud835\udc28\ud835\udc2c \ud835\udc29\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc28\ud835\udc27\ud835\udc1a\ud835\udc25\ud835\udc1e\ud835\udc2c \ud835\udc1e\ud835\udc27 \ud835\udc25\ud835\udc1a\ud835\udc2c \ud835\udc2e\ud835\udc27\ud835\udc22\ud835\udc2f\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc22\ud835\udc1d\ud835\udc1a\ud835\udc1d\ud835\udc1e\ud835\udc2c \ud835\udc27\ud835\udc1a\ud835\udc1c\ud835\udc22\ud835\udc28\ud835\udc27\ud835\udc1a\ud835\udc25\ud835\udc1e\ud835\udc2c\u201d. Estar\u00e1 a cargo del Abog. Marcelo Temperini, especialista en Derecho Inform\u00e1tico y Ciberdelincuencia.<br \/>\nSe centrar\u00e1 en temas de inter\u00e9s alrededor de la protecci\u00f3n de la informaci\u00f3n, como la Ley de Protecci\u00f3n de Datos Personales N\u00b0 25.326 y las pol\u00edticas de privacidad y de almacenamiento.<\/p>\n<p>La actividad contar\u00e1 con transmisi\u00f3n en vivo y directo desde el canal oficial en YouTube de este Consejo.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=stBGL80tR6s&amp;t=15s\">Video de la Charla Completa<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conversatorio denominado \u201c\ud835\udc0f\ud835\udc2b\ud835\udc28\ud835\udc2d\ud835\udc1e\ud835\udc1c\ud835\udc1c\ud835\udc22\u00f3\ud835\udc27 \ud835\udc1d\ud835\udc1e \ud835\udc1d\ud835\udc1a\ud835\udc2d\ud835\udc28\ud835\udc2c \ud835\udc29\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc28\ud835\udc27\ud835\udc1a\ud835\udc25\ud835\udc1e\ud835\udc2c \ud835\udc1e\ud835\udc27 \ud835\udc25\ud835\udc1a\ud835\udc2c \ud835\udc2e\ud835\udc27\ud835\udc22\ud835\udc2f\ud835\udc1e\ud835\udc2b\ud835\udc2c\ud835\udc22\ud835\udc1d\ud835\udc1a\ud835\udc1d\ud835\udc1e\ud835\udc2c \ud835\udc27\ud835\udc1a\ud835\udc1c\ud835\udc22\ud835\udc28\ud835\udc27\ud835\udc1a\ud835\udc25\ud835\udc1e\ud835\udc2c\u201d<\/p>\n","protected":false},"author":4,"featured_media":2265,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,14],"tags":[19,36,38],"class_list":["post-2526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-campana","category-novedad","tag-argentina","tag-campana","tag-cin"],"_links":{"self":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/2526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/comments?post=2526"}],"version-history":[{"count":6,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/2526\/revisions"}],"predecessor-version":[{"id":2538,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/posts\/2526\/revisions\/2538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media\/2265"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media?parent=2526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/categories?post=2526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/tags?post=2526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}