{"id":70818,"date":"2025-02-12T08:00:00","date_gmt":"2025-02-12T07:00:00","guid":{"rendered":"https:\/\/entelgy.com\/sin-categoria\/chile-aprueba-la-nueva-ley-de-proteccion-de-datos-un-cambio-historico-en-privacidad-digital\/"},"modified":"2025-02-12T08:00:00","modified_gmt":"2025-02-12T07:00:00","slug":"chile-aprueba-la-nueva-ley-de-proteccion-de-datos-un-cambio-historico-en-privacidad-digital","status":"publish","type":"post","link":"https:\/\/entelgy.com\/en\/present\/chile-aprueba-la-nueva-ley-de-proteccion-de-datos-un-cambio-historico-en-privacidad-digital\/","title":{"rendered":"Chile aprueba la nueva Ley de Protecci\u00f3n de Datos: un cambio hist\u00f3rico en privacidad digital"},"content":{"rendered":"\n<p>Desde <strong>Entelgy Security Am\u00e9rica<\/strong>, destacamos la importancia de la nueva <strong>Ley N\u00b0 21.719<\/strong>, publicada el 13 de diciembre de 2024, que moderniza la regulaci\u00f3n del tratamiento de datos personales en Chile. Esta normativa reemplaza a la antigua <strong>Ley N\u00b0 19.628<\/strong>, alineando al pa\u00eds con est\u00e1ndares internacionales y otorgando mayores derechos a los ciudadanos, adem\u00e1s de nuevas obligaciones para empresas y organismos p\u00fablicos.<\/p>\n\n\n\n<p>Este cambio representa un avance fundamental en ciberseguridad y privacidad, exigiendo a las organizaciones adoptar mejores pr\u00e1cticas en la gesti\u00f3n de datos personales para garantizar la transparencia y la seguridad digital.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u00bfQu\u00e9 implica esta nueva normativa?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creaci\u00f3n de la <strong>Agencia Nacional de Protecci\u00f3n de Datos<\/strong> para supervisar y sancionar incumplimientos.<\/li>\n\n\n\n<li>Aplicaci\u00f3n del principio de <strong>privacidad por dise\u00f1o y por defecto<\/strong>, obligando a las empresas a priorizar la seguridad de los datos desde el inicio.<\/li>\n\n\n\n<li>Nuevas bases legales para el tratamiento de datos personales, regulando su uso m\u00e1s all\u00e1 del consentimiento.<\/li>\n\n\n\n<li>Derechos avanzados para los ciudadanos, como <strong>portabilidad, rectificaci\u00f3n y supresi\u00f3n de datos<\/strong>.<\/li>\n\n\n\n<li>Facilidades para el flujo seguro de datos con mercados clave como la <strong>UE, EE.UU. y Jap\u00f3n<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u00bfC\u00f3mo deben prepararse empresas y organismos p\u00fablicos?<\/h3>\n\n\n\n<p>La nueva ley impone responsabilidades concretas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementar <strong>pol\u00edticas internas de protecci\u00f3n de datos<\/strong>.<\/li>\n\n\n\n<li>Evaluar y minimizar <strong>riesgos de privacidad<\/strong> antes de procesar informaci\u00f3n.<\/li>\n\n\n\n<li><strong>Actualizar contratos con terceros<\/strong> para asegurar el cumplimiento normativo.<\/li>\n\n\n\n<li>Aplicar medidas de <strong>ciberseguridad avanzadas<\/strong>, como encriptaci\u00f3n y protocolos de respuesta ante incidentes.<\/li>\n\n\n\n<li><strong>Capacitar al personal<\/strong> en gesti\u00f3n de datos y reportar cualquier brecha de seguridad de manera inmediata.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Plazo de adaptaci\u00f3n: 13 de diciembre de 2026<\/h3>\n\n\n\n<p>Las organizaciones tienen <strong>24 meses<\/strong> para adecuarse a la normativa. El tiempo corre y adelantarse a los cambios ser\u00e1 clave para evitar sanciones y fortalecer la confianza de clientes y usuarios.<\/p>\n\n\n\n<p>Chile avanza hacia un futuro digital m\u00e1s seguro y transparente. <strong>\u00bfTu empresa est\u00e1 lista para este cambio?<\/strong><\/p>\n\n\n\n<p>Desde <strong>Entelgy Security Am\u00e9rica<\/strong>, acompa\u00f1amos a las organizaciones en su proceso de adecuaci\u00f3n, garantizando el cumplimiento normativo y la protecci\u00f3n efectiva de la informaci\u00f3n.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"410\" height=\"1024\" src=\"https:\/\/entelgy.com\/wp-content\/uploads\/2025\/02\/1738065654645-1-410x1024.jpg\" alt=\"\" class=\"wp-image-53727\" srcset=\"https:\/\/entelgy.com\/wp-content\/uploads\/2025\/02\/1738065654645-1-410x1024.jpg 410w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/02\/1738065654645-1-120x300.jpg 120w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/02\/1738065654645-1-768x1920.jpg 768w, https:\/\/entelgy.com\/wp-content\/uploads\/2025\/02\/1738065654645-1.jpg 800w\" sizes=\"(max-width: 410px) 100vw, 410px\" \/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde Entelgy Security Am\u00e9rica, destacamos la importancia de la nueva Ley N\u00b0 21.719, publicada el 13 de diciembre de 2024, [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":69126,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8656,8653],"tags":[8695,8674,8696],"class_list":["post-70818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-entelgy-security-america-en","category-present","tag-ciberseguridad-2-en","tag-entelgy-en","tag-tecnologia-3-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/70818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/comments?post=70818"}],"version-history":[{"count":0,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/posts\/70818\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media\/69126"}],"wp:attachment":[{"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/media?parent=70818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/categories?post=70818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entelgy.com\/en\/wp-json\/wp\/v2\/tags?post=70818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}