Confidentiality of information
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 34
Confidentiality of information - Articles 4 and 5
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 34
Confidentiality of information - Articles 13 and 14
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 43
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 32
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 32
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 7
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Article 9
Access to and Electronic Exchange of Data, Information, and Documentation Between Government Bodies and Entities Act, Definitions section:11. Interoperable information service: A service that gathers, processes, recycles, and provides data, information, and documents, as required by the government bodies and entities, in an appropriate, reliable, timely, and easily accessible manner Article 35: Open standards and free software: Interoperable information systems and information services shall be developed using open standards and free software. Data Messages and Electronic Signatures Act, Article 27: Measures to ensure reliability: The Superintendency of Electronic Certification Services may take any necessary preventive or corrective measures to ensure the reliability of services provided by certification service providers. To this end, it may order, among other measures, the use of internationally accepted standards or practices for electronic certification services, or order providers to refrain from any activity that could compromise the integrity or proper use of the service.