{"id":3116,"date":"2026-03-15T19:29:41","date_gmt":"2026-03-15T22:29:41","guid":{"rendered":"https:\/\/wai.global\/?p=3116"},"modified":"2026-03-15T19:31:09","modified_gmt":"2026-03-15T22:31:09","slug":"digitalizar-sin-gobernanza-el-riesgo-que-los-estados-no-estan-viendo","status":"publish","type":"post","link":"https:\/\/wai.global\/en\/digitalizar-sin-gobernanza-el-riesgo-que-los-estados-no-estan-viendo\/","title":{"rendered":"Digitizing without governance, the risk that states are not seeing"},"content":{"rendered":"<p>Modern public management cannot work on paper. The citizens know it, the civil servants know it, the civil servants who still sign on paper eight times to approve a license also know it.<\/p>\n\n\n\n<p>The problem is not digitizing, on the contrary: digitizing is necessary. The problem is to do it without governance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Digitalization already has a legal framework. What is missing is criteria<\/strong><\/h2>\n\n\n\n<p>In Latin America, practically all countries have regulations that enable, if not require, the digitization of public administration. <strong>Argentina<\/strong> has Law 25,506 on digital signature and Decree 733\/2018 that drives the depapelization of the State. <strong>Uruguay<\/strong> has Law 18.220 on electronic documents and electronic signature. <strong>Chile, Colombia, Mexico, Peru and Brazil<\/strong> have their own equivalent frames.<\/p>\n\n\n\n<p><strong>There is no legal excuse for continuing to use paper.<\/strong> The authorization is there. What is missing, in most cases, is a serious implementation plan with real controls on how the data generated by these systems are safeguarded.<\/p>\n\n\n\n<p>Because when the state digitizes, it not only gains efficiency. It also concentrates sensitive information of millions of people in systems that, if not well protected, become targets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental-1024x585.jpg\" alt=\"\" class=\"wp-image-3119\" srcset=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental-1024x585.jpg 1024w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental-300x171.jpg 300w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental-768x439.jpg 768w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental-18x10.jpg 18w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/digitalizacion-gubernamental.jpg 1344w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What happens when digitalization lacks governance?<\/strong><\/h2>\n\n\n\n<p>In 2025, the organization Derechos Digitales published the report <em><a href=\"https:\/\/www.derechosdigitales.org\/wp-content\/uploads\/2026\/03\/Identidades-en-venta_ES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cIdentities for Sale\u201d.\u201d<\/a><\/em>, The results of empirical research conducted between October 2024 and February 2025 in Brazil, Peru and Argentina. What they found is hard to ignore.<\/p>\n\n\n\n<p>The researchers identified <strong>27 active groups and channels on Telegram dedicated to buying and selling personal data.<\/strong> We are not talking about names and e-mails. We are talking about ID photographs, fingerprints, vaccination records, credit status, family ties, addresses with a direct link to Google Maps. All accessible with a bot command, in a matter of seconds, upon payment of between 3 and 15 dollars.<\/p>\n\n\n\n<p>The most worrying aspect of the report is not the criminals operating these channels. <strong>The most worrying thing is where the information comes from.<\/strong><\/p>\n\n\n\n<p>The researchers observed that some of the data marketed have formats, coding and institutional watermarks that are compatible with the official records of Argentine, Peruvian and Brazilian agencies. In some cases, <strong>Peruvian judicial certificates were generated in real time<\/strong>, on the same date and time as the bot query. The hypothesis that the report does not rule out: in certain cases, bots could be operating with valid institutional credentials.<\/p>\n\n\n\n<p>In other words, the illegal market for Latin American identities may be functioning, at least in part, thanks to <strong>vulnerabilities in the State's own systems.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The structural problem is what happens inside<\/strong><\/h2>\n\n\n\n<p>Beyond the legal framework and regulatory bodies, there is a more everyday and more difficult problem to solve: what happens inside each public body when no one is watching.<\/p>\n\n\n\n<p>Agencies that manage large volumes of information often lack comprehensive risk management policies, regular technical audits and monitoring mechanisms on who accesses what information and when.<\/p>\n\n\n\n<p>Some simple questions that most public agencies in the region cannot answer today:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How many employees have active access to the agency's databases? <\/li>\n\n\n\n<li>Are those credentials revoked the same day someone changes areas or leaves their position? <\/li>\n\n\n\n<li>Are there alerts set up to detect bulk or unusual queries on this data? <\/li>\n\n\n\n<li>When was the last security audit of the systems that store citizen information?<\/li>\n<\/ul>\n\n\n\n<p>These are not complex technical questions. They are basic management questions. And the available evidence suggests that, in most public agencies in the region, no one is answering them in a systematic way.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni.jpg\"><img decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni-1024x585.jpg\" alt=\"\" class=\"wp-image-3118\" srcset=\"https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni-1024x585.jpg 1024w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni-300x171.jpg 300w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni-768x439.jpg 768w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni-18x10.jpg 18w, https:\/\/wai.global\/wp-content\/uploads\/2026\/03\/ciberseguridad-filtracion-datos-credenciales-id-dni.jpg 1344w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The municipalities are the most exposed link in the State.<\/h2>\n\n\n\n<p>If there is one level of the State where this problem is most strongly concentrated, it is the municipal level.<\/p>\n\n\n\n<p>National and provincial governments, with all their limitations, have technology structures, systems areas, some level of specialized support. Municipalities, in general, do not. A municipality with a population of 50,000 inhabitants can be managing registers, commercial licenses, construction records, payroll and administrative files with a two-person systems team, outdated equipment and no formal information security policy.<\/p>\n\n\n\n<p>At the same time, that municipality has access to very sensitive data: tax information of its neighbors, health data if it manages primary care centers, civil status records, information on beneficiaries of social programs.<strong> The combination of high data exposure and low protection capability is exactly the scenario cybercriminals are looking for.<\/strong><\/p>\n\n\n\n<p>Size is not an excuse or a protection. <strong>A small municipality with poorly configured systems is just as vulnerable as any large agency, except that it has far fewer resources to respond if something goes wrong.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why agencies cannot improvise<\/strong><\/h2>\n\n\n\n<p><strong>There is an understandable temptation in the public sector: to look for a tailor-made solution.<\/strong> A system that adapts exactly to the procedures of the agency, as they are today, with all its steps, forms and inherited logics. The argument sounds reasonable, because each municipality, each secretariat, each entity has its own particularities.<\/p>\n\n\n\n<p>But <strong>A custom-developed system for a specific agency rarely has the resources for maintenance, security updates and ongoing support required for a digital environment that handles sensitive data. <\/strong>When a new vulnerability appears, when a regulation changes, when there is an incident, that system depends on the original vendor remaining available, interested and funded.<\/p>\n\n\n\n<p>Industry standards exist for a reason. Robust software, implemented by other agencies, with active support and regular security updates, is not a luxury. It is the minimum infrastructure to digitize responsibly.<\/p>\n\n\n\n<p>The question any official should ask before implementing a digital solution is not \u201cdoes it fit how we work today?\u201d. The right question is \u201cwho guarantees that this is going to be well maintained in three years, and how do you protect the data of the citizens who are going to live within this system?\u201d.<\/p>\n\n\n\n<p>To conform to a standard is not to resign oneself to it. It is exactly what organizations that digitize well do.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The cost of getting it wrong<\/strong><\/h2>\n\n\n\n<p>More than 116,000 photographs from Argentina's RENAPER were shared on Telegram in 2021. In the same year, another attack compromised the driver's license system database, leaving more than 6 million people at risk. In Brazil, a breach exposed data on more than 223 million people, including records of the deceased.<\/p>\n\n\n\n<p>These are not isolated accidents in large national systems. They are the predictable result of digitizing without the security and governance infrastructure that such a process requires, and the pattern is repeated in agencies of all sizes and countries.<\/p>\n\n\n\n<p><strong>The digitalization of the State is urgent. <\/strong>Citizens need it, efficiency justifies it and the law enables it. But doing it without criteria, without standards and without governance over the data generated is not digital transformation. It is building a bigger problem on top of an old one.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em>At Wai we accompany municipalities and public agencies throughout the region in digitalization processes that are secure, sustainable and aligned with the standards that this moment demands. If you are thinking of taking that step, <a href=\"https:\/\/wai.global\/en\/govlink\/\" data-type=\"page\" data-id=\"454\">we can help you get it right.<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>La gesti\u00f3n p\u00fablica moderna no puede funcionar en papel. La ciudadan\u00eda lo sabe, los funcionarios lo saben, los funcionarios que todav\u00eda firman en f\u00edsico ocho veces para aprobar una licencia tambi\u00e9n lo saben. El problema no es digitalizar, al contrario: digitalizar es necesario. El problema es hacerlo sin gobernanza. La digitalizaci\u00f3n ya tiene marco legal. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3117,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[31,8,10],"tags":[39,40,47],"class_list":["post-3116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-digitalizacion","category-software-para-gobiernos","tag-expedientes-digitales","tag-sistema-de-expedientes-digitales","tag-tramites-digitales"],"_links":{"self":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts\/3116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/comments?post=3116"}],"version-history":[{"count":2,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts\/3116\/revisions"}],"predecessor-version":[{"id":3121,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/posts\/3116\/revisions\/3121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/media\/3117"}],"wp:attachment":[{"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/media?parent=3116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/categories?post=3116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wai.global\/en\/wp-json\/wp\/v2\/tags?post=3116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}