<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-0578</journal-id>
<journal-title><![CDATA[Mexican law review]]></journal-title>
<abbrev-journal-title><![CDATA[Mex. law rev]]></abbrev-journal-title>
<issn>1870-0578</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Investigaciones Jurídicas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-05782020000200003</article-id>
<article-id pub-id-type="doi">10.22201/iij.24485306e.2020.1.14808</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cybersecurity and E-commerce in Free Trade Agreements]]></article-title>
<article-title xml:lang="es"><![CDATA[Ciberespacio; ciberseguridad; comercio electrónico; tratados]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Becerril]]></surname>
<given-names><![CDATA[Anahiby]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Autónoma de México  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<volume>13</volume>
<numero>1</numero>
<fpage>3</fpage>
<lpage>29</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-05782020000200003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-05782020000200003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-05782020000200003&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: We are facing a digital age characterized by constant flows of goods and services, financial assets, people, information and communication. As a consequence, the world economy is increasingly connected, and digitalization has spread to such an extent that today&#8217;s world economy is a digital one, which has come to break down commercial barriers that the traditional economy and politics were unable to. Security and trade policy concerns are nothing new. However, given the electronic nature of commercial transactions (e-commerce), this has taken on a new and urgent importance. Cyberspace is a space of flows, a virtual space that grows every day with the transactions that take place through the use of ICT. Governments of many countries have begun to develop cybersecurity strategies, while trying to promote the benefits of a hyperconnected and cyber-enabled world. This article analyzes how e-commerce policies promote the protection of cyberspace. Specifically regarding e-commerce, care must be taken so that the cybersecurity strategy does not become an obstacle or constraint to such electronic transactions. The protection of cyberspace must be carried out with a multi-stakeholder approach. These issues are also of public interest since threats to cyberspace can affect entire countries and societies.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Nos enfrentamos a una era digital caracterizada por flujos constantes de bienes y servicios, activos financieros, personas, información y comunicación. Como consecuencia de lo anterior, la economía mundial está cada vez más conectada, y la digitalización se ha extendido hasta tal punto que la economía mundial actual es una economía digital. Esta economía digital ha llegado a romper las barreras comerciales que la economía y la política tradicionales no habían logrado. Las preocupaciones sobre la seguridad y las políticas comerciales no son nuevas. Sin embargo, dada la naturaleza electrónica de las transacciones comerciales (comercio electrónico), esta ha adquirido una importancia nueva y urgente. El ciberespacio es un espacio de flujos, un espacio virtual que crece diariamente con las interacciones que se realizan con el uso de las TIC. Los gobiernos de muchos países han comenzado a desarrollar estrategias de ciberseguridad, mientras intentan promover los beneficios de un mundo hiperconectado y con acceso a Internet. En este artículo analizaremos cómo, a través de las políticas de comercio electrónico, se promueve la protección del ciberespacio. En relación con el comercio electrónico, se debe buscar que una estrategia de ciberseguridad no se convierta en un obstáculo o una barrera para estas transacciones electrónicas. La protección del ciberespacio debe llevarse a cabo con un enfoque de múltiples partes interesadas. Estos temas también son de interés público, ya que las amenazas al ciberespacio pueden afectar a países y sociedades enteras.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cyberspace]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[e-commerce]]></kwd>
<kwd lng="en"><![CDATA[treaties]]></kwd>
<kwd lng="es"><![CDATA[Ciberespacio]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[comercio electrónico]]></kwd>
<kwd lng="es"><![CDATA[tratados]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[Bruce]]></given-names>
</name>
</person-group>
<source><![CDATA[Secrets &amp; Lies, Digital Security in a Networked World]]></source>
<year>2004</year>
<volume>XXII</volume>
<publisher-loc><![CDATA[Indiana ]]></publisher-loc>
<publisher-name><![CDATA[Wiley Publishing Inc.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Becerril]]></surname>
<given-names><![CDATA[Anahiby]]></given-names>
</name>
<name>
<surname><![CDATA[Ortigoza Limón]]></surname>
<given-names><![CDATA[Samuel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Habilitadores tecnológicos y realidades del Derecho Informático Empresarial]]></article-title>
<source><![CDATA[IUS, Revista del Instituto de Ciencias Jurídicas de Puebla]]></source>
<year>2018</year>
<volume>11</volume>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<collab>United Nations Conference on Trade and Development (UNCTAD)</collab>
<source><![CDATA[Informe sobre la Economía de la Información, 2017. Digitalización, comercio y desarrollo. Panorama general]]></source>
<year>2017</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[United Nations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boatwright]]></surname>
<given-names><![CDATA[Kimberly]]></given-names>
</name>
<name>
<surname><![CDATA[Doherty]]></surname>
<given-names><![CDATA[Sean]]></given-names>
</name>
</person-group>
<source><![CDATA[5 Ways to Make Global E-Commerce Easier for Everyone]]></source>
<year>2017</year>
<publisher-name><![CDATA[World Economic Forum]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reveron]]></surname>
<given-names><![CDATA[Derek S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberspace and National Security Threats, Opportunities, and Power in a Virtual World]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Georgetown University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<collab>World Trade Organization</collab>
<source><![CDATA[Work Programme on electronic Commerce]]></source>
<year>1998</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castrillón y Luna]]></surname>
<given-names><![CDATA[Víctor Manuel]]></given-names>
</name>
<name>
<surname><![CDATA[Becerril]]></surname>
<given-names><![CDATA[Anahiby]]></given-names>
</name>
</person-group>
<source><![CDATA[Contratación Electrónica Civil Internacional. Globalización, Internet y Derecho]]></source>
<year>2015</year>
<page-range>167</page-range><publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Porrúa]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rifkin]]></surname>
<given-names><![CDATA[Jeremy]]></given-names>
</name>
</person-group>
<source><![CDATA[La era del acceso. La revolución de La nueva economía]]></source>
<year>2013</year>
<volume>32</volume>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Paidós]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bues]]></surname>
<given-names><![CDATA[Micha-Manuel]]></given-names>
</name>
<name>
<surname><![CDATA[Matthaei]]></surname>
<given-names><![CDATA[Emilio]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[LegalTech on the rise: technology changes legal work behaviors, but does not replace its profession]]></article-title>
<source><![CDATA[Liquid LegaL: transforming Legal into a Business savvy, information enabled and performance driven industry]]></source>
<year>2017</year>
<publisher-name><![CDATA[Springer Cham]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mayer-Schönberger]]></surname>
<given-names><![CDATA[Viktor]]></given-names>
</name>
<name>
<surname><![CDATA[Cukier]]></surname>
<given-names><![CDATA[Kenneth]]></given-names>
</name>
</person-group>
<source><![CDATA[Big data. La Revolución de Los datos Masivos]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Turner publicaciones S.A.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Puyol Montero]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
</person-group>
<source><![CDATA[Aproximación Jurídica y Económica al Big data 10]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Valencia ]]></publisher-loc>
<publisher-name><![CDATA[Ed. Tirant lo Blanch]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navas Navarro]]></surname>
<given-names><![CDATA[Susana]]></given-names>
</name>
<name>
<surname><![CDATA[Camacho Clavijo]]></surname>
<given-names><![CDATA[Sandra]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Market. Legal principles and rules 33]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Valencia ]]></publisher-loc>
<publisher-name><![CDATA[Tirant lo Blanch]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<collab>Government of Canada</collab>
<source><![CDATA[Canada&#8217;s Cybersecurity Strategy. For a stronger and more prosperous Canada]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>United States Government</collab>
<source><![CDATA[Cyberspace Policy Review. Assuring a Trusted and Resilient Information and Communications Infrastructure]]></source>
<year>2009</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mike]]></surname>
<given-names><![CDATA[Isaac]]></given-names>
</name>
<name>
<surname><![CDATA[Sheera]]></surname>
<given-names><![CDATA[Frenkel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Facebook Security Breach Exposes accounts of 50 Million Users]]></article-title>
<source><![CDATA[The New York Times]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<collab>National Institute of Standards and Technology (NIST)</collab>
<source><![CDATA[Glossary of Key Information Security Terms]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albert]]></surname>
<given-names><![CDATA[Mathias]]></given-names>
</name>
<name>
<surname><![CDATA[Buzan]]></surname>
<given-names><![CDATA[Barry]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securitization, sectors and functional differentiation]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2011</year>
<volume>413</volume>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kshetri]]></surname>
<given-names><![CDATA[Nir]]></given-names>
</name>
</person-group>
<source><![CDATA[The Quest to Cyber Superiority. Cybersecurity Regulations, Frameworks and Strategies of Major Economies]]></source>
<year>2016</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>Asean-Japan</collab>
<source><![CDATA[Joint Ministerial Statement of the Asean-Japan Ministerial Policy Meeting on Cybersecurity Cooperation]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sigmond]]></surname>
<given-names><![CDATA[Karen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El comercio electrónico en los tratados de libre comercio de México]]></article-title>
<source><![CDATA[IUS Revista del Instituto de Ciencias Jurídicas de Puebla]]></source>
<year>2018</year>
<page-range>372</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>Government of New Zealand</collab>
<source><![CDATA[Comprehensive and Progressive Agreement for Trans-Pacific Partnership. Chapter 14]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>National Assembly of the Socialist Republic of Vietnam</collab>
<source><![CDATA[Law on Network Information Security]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<collab>United Nations Conference on Trade and Development (UNCTAD)</collab>
<article-title xml:lang=""><![CDATA[Informe sobre la economía de la información, 2017. Digitalización, comercio y desarrollo]]></article-title>
<source><![CDATA[Panorama general]]></source>
<year>2017</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[United Nations]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
