Sections in the Dominican Republic's Crimes and High Technology Crimes (CHTC)

The Dominican Republic's Cyber Crime Act is the law that creates the offences and penalties for committing a cyber crime.

The Dominican Republic's cyber crime law covers several areas, summarised below.

Note: The original document being shared is the copyright of its respective owners, the government.

TÍTULO I - DISPOSICIONES GENERALES Y CONCEPTUALES - SECCIÓN I - OBJETO, ÁMBITO Y PRINCIPIOS

(English: Title 1 General And Conceptual Provisions - Section 1purpose, Scope And Principles)

SECCIÓN II - DEFINICIONES

(English: Section 2 - Definitions)

TÍTULO II - NORMATIVA EFECTIVA A NIVEL NACIONAL, SECCIÓN I - DERECHO PENAL SUSTANTIVO - , CAPÍTULO I - CRÍMENES Y DELITO CONTRA LA CONFIDENCIALIDAD, INTEGRIDAD Y DISPONIBILIDAD DE DATOS Y SISTEMAS DE INFORMACIÓN

(English: Title 2 - Effective Regulations At The National Level - Section 1 Substantive Criminal Law, Chapter 1 - Crimes And Offences Against Confidentiality, Integrity And Availability Of Data And Information Systems)

CAPÍTULO II - DELITOS DE CONTENIDO

(English: Chapter 2 Substantive Crimes)

CAPÍTULO III - DELITOS DE PROPIEDAD INTELECTUAL Y AFINES

(English: Chapter 3 - Intellectual Property And Related Crimes)

CAPÍTULO IV- DELITOS CONTRA LAS TELECOMUNICACIONES

(English: Chapter 4 - Crimes Against Telecommunications)

CAPÍTULO V - CRÍMENES, DELITOS CONTRA LA NACIÓN Y ACTOS DE TERRORISMO

(English: Chapter 5 - Crimes, Offenses Against The Nation And Acts Of Terrorism)

SECCIÓN II - ORGANISMOS COMPETENTES Y REGLAS DE DERECHO PROCESAL CAPÍTULO I - ORGANISMOS COMPETENTES

(English: Section 2 - Competent Bodies And Rules Of Procedural Law Chapter 1 - Competent Bodies)

CAPÍTULO II - MEDIDAS CAUTELARES Y PROCESALES

(English: Chapter 2 - Precautionary And Procedural Measures)

TÍTULO III - DISPOSICIONES FINALES

(English: Title 3 - Final Provisions)

Services we offer

G5 Cyber Security offers both Cyber Security and Data Privacy services to both businesses and individuals.

Cyber Security

Support to protect against cyber attacks.

  • Vulnerability Scans
  • Penetration Tests
  • Web App. Security Assessments
  • Cloud Security Audits
  • ... and more

Data Privacy

Support to comply with cyber security laws.

  • Outsourced DPOs
  • Data Protection Gap Analysis
  • Document Review and Drafting
  • Data Protection Impact Assessments (DPIA)
  • ... and more

Contact us

We'd love to hear from you. Please use the form below to send us a message.