<div dir="ltr">Romina, you are everywhere and active everywhere which is fantastic! <div><br></div><div><br></div></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><font color="#000000">Hamza Ben Mehrez </font></div><div><font color="#000000">Policy Analyst Lead <br><span style="font-size:13.3333330154419px">Internet Governance MENA Region Program </span></font></div></div></div><div><div style="text-align:left"><font color="#000000"><b style="font-family:arial,helvetica,sans-serif;font-size:13.3333330154419px">T </b><span style="font-family:arial,helvetica,sans-serif;font-size:13.3333330154419px">+</span><b style="font-family:arial,helvetica,sans-serif;font-size:13.3333330154419px"> </b><span style="font-family:arial,helvetica,sans-serif;font-size:13.3333330154419px">216 21 415 833</span><b style="font-family:arial,helvetica,sans-serif;font-size:13.3333330154419px"> </b><span style="font-size:13.3333330154419px">|</span></font><span style="color:rgb(0,0,0);font-size:13.3333330154419px"> </span><b style="color:rgb(0,0,0);font-size:13.3333330154419px">I </b><a href="http://www.hivos.org/" style="color:rgb(17,85,204);font-size:13.3333330154419px" target="_blank">www.igmena.org</a> </div></div><div><div dir="ltr"><div><br></div></div></div></div></div></div></div></div>
<br><div class="gmail_quote">On Mon, May 9, 2016 at 8:21 PM, romina florencia Cabrera <span dir="ltr"><<a href="mailto:romicabrera83@gmail.com" target="_blank">romicabrera83@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Thank you.<br></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">2016-05-09 11:49 GMT-03:00 Manga Balbine <span dir="ltr"><<a href="mailto:babyambassa@yahoo.fr" target="_blank">babyambassa@yahoo.fr</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><div>You don't have to apologize </div><div>Renata , l will try with you give me </div><div>Thanks a lot</div><div>Regard</div><div>Balbine Manga</div><div><br>Sent from my iPhone</div><div><br>On 08 May 2016, at 23:35, romina florencia Cabrera <<a href="mailto:romicabrera83@gmail.com" target="_blank">romicabrera83@gmail.com</a>> wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr"><span lang="en"><span>Renata</span> <span>friend</span> <span>thanks</span> <span>for the help.</span></span><br><br>Sorry but we did not have an official outcome document in English. We<br>
hope these discussions evolve and we have more to show.<br>
<br>
However, my own personal view of this event is that there is still a<br>
lot to be discussed about cybersecurity and privacy and Argentina and<br>
many professionals with good work that the world should know about.<br>
<br>
Also I am sorry for having the program only in Spanish but I copy text<br>
I translated with the help of <a href="http://translate.google.com" rel="noreferrer" target="_blank">http://translate.google.com</a><br>
<br>
<br>
Provincial Program of the First Congress of Computer Law, Legal<br>
Informatics and Computer Experts - Province of Buenos Aires.<br>
Necochea, Friday 27 and Saturday 28 May 2016<br>
<br>
Organizers: Bar Necochea<br>
Location: Auditorium of the Bar of Necochea<br>
Calle 62 No. 2702 - Necochea BA - Tel. 02262-431185<br>
<a href="http://www.can.org.ar/sitio/" rel="noreferrer" target="_blank">http://www.can.org.ar/sitio/</a> - Information and Registration:<br>
<a href="mailto:secretaria@can.org.ar" target="_blank">secretaria@can.org.ar</a><br>
Cost: Professionals $ 400 - Students $ 250<br>
<br>
Friday, May 27: Computer Law<br>
- At 08:30 hs .: Opening of the First Provincial Congress of Computer<br>
Law, Legal Informatics and Computer Experts of the PBA, by Dr. Maria<br>
del Carmen Bellomo, President of the Bar Association and Dr. Necochea.<br>
Welcome Basalo Rodriguez, President of Colproba.<br>
- At 09:00 hs .: The Computer Law in Argentina. Its origin, evolution<br>
and current situation in the CCYC. Dr. Guillermo Manuel Zamora,<br>
Director of "<a href="http://xn--elderechoinformtico-4ub.com" target="_blank">Elderechoinformático.com</a>" and President of adiar.<br>
- At 10:00 hs .: The Digital Health Record. Dra. Florencia Romina Cabrera.<br>
- At 11:00 hs .: Coffee Break 30 minutes.<br>
- At 11:30 hs .: The Email and Electronic Document and Testing and<br>
CCYC. Its application to process. Dr. Horacio R. Granero.<br>
- At 12:30 pm .: Lunch and rest for 2 hours and 30 minutes.<br>
- At 15:00 hs .: Defense of Consumer Goods and IT Services.<br>
Dra. Bibiana Clara Luz.<br>
<br>
- At 16:00 pm .: - The Cybercrime and Information Security.<br>
AIA. Maximiliano Macedo and Dr. Marcelo Temperini - sure and ODILA.<br>
- At 17:00 hrs .: Coffee Break 30 minutes.<br>
- At 17:30 hs .: Legal Issues for Business Enterprise and the<br>
Internet. The Bitcoin.Concepts. Dr. Miguel Sumer Elias.<br>
- At 18:30 hrs .: Workshop on Digital Signature and Digital Electronic<br>
Notification File.Lic. Alberto Spezzi (Secretary of Information<br>
Technology SCJBA) and Dr. Matthew Laborde de Colproba.<br>
- At 19:30 hs .: Coffee Break 30 minutes.<br>
- At 20:00 hs .: The Protection of Privacy and Personal Data on the<br>
Internet: Habeas Data; the responsibility of search engines in<br>
Argentina Jurisprudence and Freedom of Expression. Failure Analysis<br>
"Rodriguez vs. Google "of the Supreme Court. Dr. Eduardo Molina<br>
Quiroga.<br>
<br>
Saturday 28 May: Legal Informatics and Computer Experts<br>
- At 08:30 hs .: Mr. Gaston Semprini, Computer Forensics Team of the<br>
Province of Rio Black...<br>
Kidnapping and preserving computer evidence. Experiences based on<br>
specific cases.<br>
- At 09:30 hs .: Perito Computer Mg Dario Piccirilli and equipment<br>
(Moraña Emiliano Ing.):<br>
. The responsibilities of the office expert and the expert part.<br>
Technical Consultant concept. Forensia computer concepts. Features of<br>
computer expertise. Good practices to be applied (MRSA). Chain of<br>
custody and preservation of evidence.<br>
. Track: How is wise to ask a computer expertise and what you can<br>
expect from it.<br>
- At 10:30 hs .: Coffee Break 30 minutes.<br>
<br>
- At 11:00 hs .: Marcelo Romero, Gabriel Franco and Mr. Daniel<br>
Almada.. Pedophilia and Grooming in<br>
the Pcia. Bs.As. Experiences based on specific cases.<br>
<br>
- At 12:00 hs .: Mr. Daniel Almada.. Video recording of hearings.<br>
- At 12:30 hs .: Coffee Break 30 minutes.<br>
- At 13:00 hs .: Comprehensive Guide use of computer forensics in<br>
criminal proceedings.<br>
Dra. Sabrina Lamperti and Ing. Ariel Podesta Info-Lab.<br>
<br>
- At 13:30 hs .: Experiences Team Tech Crime Division - Depto. from<br>
Complex investigations of the Police of the Province. Del Chaco.<br>
<br>
- At 14:30 hs .: T.U. Juan Francisco Quaranta and Lic. Analía Martínez.<br>
Experiences based on specific cases. Province of Santa Fe.<br>
<br>
- Saturday at 15:30 pm .: Closing of the First Provincial Congress of<br>
Computer Law,<br>
Legal and Computer Experts by Dra. Maria del Carmen Bellomo Computers,<br>
President of the Bar Association of Necochea.<br>
<br>
- Saturday at 15:30 pm .: Certificates of Attendance will be awarded<br>
at the Registry of CAN.</div><div class="gmail_extra"><br><div class="gmail_quote">El 8 de mayo de 2016, 17:19, Manga Balbine via Ncuc-discuss <span dir="ltr"><<a href="mailto:ncuc-discuss@lists.ncuc.org" target="_blank">ncuc-discuss@lists.ncuc.org</a>></span> escribió:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><div>Hi Romania</div><div>Thank for sharing</div><div>Can we have the outcome</div><div>Of the congres in English </div><div>Please thanks</div><div>Regards</div><div>Balbine Manga<br><br>Sent from my iPhone</div><div><div><div><br>On 08 May 2016, at 14:23, Renata Aquino Ribeiro <<a href="mailto:raquino@gmail.com" target="_blank">raquino@gmail.com</a>> wrote:<br><br></div><blockquote type="cite"><div><div dir="ltr"><div><div><div><div>Hi Romina<br><br></div>I second Olévié, congrats! <br>And great to know about the variety of themes in cybersecurity and privacy being discussed in Argentina. <br></div>"Habeas data", keep us informed. :D<br><br></div>Best, <br><br></div>Renata<br><br></div><div class="gmail_extra"><br><div class="gmail_quote">2016-05-07 5:17 GMT-03:00 Olévié Kouami <span dir="ltr"><<a href="mailto:olivierkouami@gmail.com" target="_blank">olivierkouami@gmail.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div><div><div>Great Romina.<br></div>Kudos to you.<br></div>Warm regards<br></div>-Olévié-<br><br></div><div class="gmail_extra"><br><div class="gmail_quote"><div><div>2016-05-06 23:30 GMT+01:00 romina florencia Cabrera <span dir="ltr"><<a href="mailto:romicabrera83@gmail.com" target="_blank">romicabrera83@gmail.com</a>></span>:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div><div dir="ltr">
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><br><span lang="en"><span>Dear</span><span>,</span> <span>I leave the</span> <span>program</span> <span>of the First</span> <span>Provincial</span> <span>Congress of Computer Law</span><span>,</span> <span>Argentina</span><span>,</span> <span>where he participated</span> <span>as an exhibitor</span><span>,</span> <span>with</span> <span>pigtails</span> <span>brillanes</span><span>.</span> <span>All</span> <span>guests,</span> <span>cordial greetings and</span> <span>thanks for</span> <span>space</span> <span>forever.</span></span></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:12pt" lang="ES"><br></span></u></b></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:12pt" lang="ES"><br></span></u></b></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:12pt" lang="ES"><br></span></u></b></p><p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:12pt" lang="ES">Programa del Primer Congreso Provincial de Derecho
Informático, Informática Jurídica y de Peritos Informáticos – Pcia. de Buenos
Aires</span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:12pt" lang="ES">Necochea, Viernes 27 y Sábado 28 de Mayo del 2016</span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:8pt" lang="ES"><span style="text-decoration:none"> </span></span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span lang="ES">Organiza:
Colegio de Abogados de Necochea</span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span lang="ES">Lugar:
Auditorium del Colegio de Abogados de Necochea</span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span lang="ES">Calle
62 Nro. 2702 – Necochea BA – Tel: 02262-431185</span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><span lang="ES"><a href="http://www.can.org.ar/sitio/" target="_blank"><b><span>http://www.can.org.ar/sitio/</span></b></a><b><u> - Informes e Inscripción: </u></b><a href="mailto:secretaria@can.org.ar" target="_blank">secretaria@can.org.ar</a> </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span lang="ES">Costo: Profesionales $ 400 - Estudiantes $ 250</span></u></b><b><u><span lang="ES"></span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;text-align:center;line-height:normal" align="center"><b><u><span style="font-size:8pt" lang="ES"><span style="text-decoration:none"> </span></span></u></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><u><span style="font-size:12pt" lang="ES">Viernes
27 de Mayo: Derecho Informático</span></u></b><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><span style="font-size:12pt" lang="ES"> <b>-
A las 08:30 hs.:</b> Inauguración del Primer Congreso Provincial de Derecho
Informático, Informática Jurídica y de Peritos Informáticos de la PBA, a cargo
de la <b>Dra. María del Carmen Bellomo, Presidente del Colegio de Abogados de
Necochea y del Dr. Bienvenido Rodríguez Basalo, Presidente de Colproba.</b></span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><span style="font-size:12pt" lang="ES"> <b>-
A las 09:00 hs.:</b> El Derecho Informático en Argentina. Su origen, evolución
y situación actual en el CCyC. <b><i>Dr. Guillermo Manuel Zamora,
Director de “<a href="http://xn--elderechoinformtico-4ub.com" target="_blank">Elderechoinformático.com</a>” y Presidente de ADIAr.</i></b></span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES"> -
A las 10:00 hs.: </span></b><span style="font-size:12pt" lang="ES">La Historia Clínica Digital. <b><i>Dra. Romina
Florencia Cabrera.</i></b></span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><i><span style="font-size:12pt" lang="ES"> </span></i></b><b><span style="font-size:12pt" lang="ES">- A las 11:00 hs.: </span></b><span style="font-size:12pt" lang="ES">Coffee </span><span style="font-size:12pt" lang="ES">Break
de 30 minutos.</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES"> -
A las 11:30 hs.:</span></b><span style="font-size:12pt" lang="ES"> El
Correo Electrónico y el Documento Electrónico como Pruebas y el CCyC.</span><span style="font-size:12pt" lang="ES"> </span><span style="font-size:12pt" lang="ES">Su aplicación al
proceso. <b><i>Dr. Horacio R. Granero.</i></b></span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><i><span style="font-size:12pt" lang="ES"> </span></i></b><b><span style="font-size:12pt" lang="ES">- A las 12:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Almuerzo y descanso</span><span style="font-size:12pt" lang="ES"> de 2 horas y 30 minutos.</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES"> -
A las 15:00 hs.: </span></b><span style="font-size:12pt" lang="ES">Defensa del Consumidor de Bienes y Servicios Informáticos.
<br>
</span><b><i><span style="font-size:12pt" lang="ES"> Dra.
Bibiana Luz Clara.</span></i></b><b><i><span style="font-size:12pt" lang="ES"><br>
</span></i></b><span style="font-size:12pt" lang="ES"> <br>
<b>- A las 16:00 hs.: </b>- El Cibercrimen y la Seguridad
Informática. <br>
</span><b><i><span style="font-size:12pt" lang="ES">AIA. <span> </span>Maximiliano Macedo y Dr. Marcelo
Temperini - AsegurarTe y ODILA.</span></i></b></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A
las 17:00 hs.: </span></b><span style="font-size:12pt" lang="ES">Coffee </span><span style="font-size:12pt" lang="ES">Break de 30 minutos.</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las
17:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Aspectos legales para </span><span style="font-size:12pt" lang="ES">Emprendimientos y Negocios en Internet. El
Bitcoin. Conceptos. <b><i><span> </span>Dr. Miguel
Sumer Elías.</i></b></span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A
las 18:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Taller de Firma Digital, Notificaciones
Electrónicas y Expediente Digital.<b><i> Lic. Alberto Spezzi (Subsecretario de
Tecnología Informática de la SCJBA)</i></b><i> <b>y Dr. Mateo Laborde de
Colproba.</b></i></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A
las 19:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Coffee </span><span style="font-size:12pt" lang="ES">Break de 30 minutos.</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A
las 20:00 hs.:</span></b><span style="font-size:12pt" lang="ES"> La Protección de la Intimidad y los Datos Personales en
Internet: Habeas Data; la responsabilidad de los buscadores en la
Jurisprudencia Argentina y la Libertad de Expresión. Análisis del Fallo “Rodriguez
vs. Google” de la CSJN. </span><b><i><span style="font-size:12pt" lang="ES">Dr. Eduardo Molina Quiroga.</span></i></b><b><span style="font-size:12pt" lang="ES"><br>
<br>
</span></b><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><b><u><span style="font-size:12pt" lang="ES">Sábado
28 de Mayo: Informática Jurídica y Peritos Informáticos</span></u></b><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las 08:30 hs.: </span></b><b><span style="font-size:12pt" lang="ES">Lic. Gastón Semprini,</span></b><span style="font-size:12pt" lang="ES"> Equipo de Informática
Forense de la <b>Pcia. de Río Negro.</b></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"><span> </span>Secuestro y preservación de la prueba informática.
Experiencias en base a casos concretos.</span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A
las 09:30 hs.:</span></b><span style="font-size:12pt" lang="ES"> </span><b><span style="font-size:12pt" lang="ES">Perito
Informático Mg Darío Piccirilli y Equipo (Ing. Emiliano Moraña)</span></b><span style="font-size:12pt" lang="ES">:</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><span style="font-size:12pt" lang="ES"> .
Las responsabilidades del perito de oficio y del perito de parte. Concepto de
Consultor técnico. <span> </span>Conceptos de forensia
informática. Características de la pericia informática. Buenas prácticas a
aplicar (EDRM). Cadena de custodia y preservación de la prueba.</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="line-height:normal"><span style="font-size:12pt" lang="ES">. Track:
cómo es conveniente pedir una pericia informática y qué se puede esperar
de ella.</span><span style="font-size:12pt" lang="ES"></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las 10:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Coffee </span><span style="font-size:12pt" lang="ES">B</span><span style="font-size:12pt" lang="ES">reak de 30 minutos.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"> </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- </span></b><b><span style="font-size:12pt" lang="ES">A las 11:00 hs.:</span></b><span style="font-size:12pt" lang="ES"> <b>Marcelo Romero, Gabriel Franco y Lic.
Daniel Almada.</b> Pedofilia y Grooming en</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"><span> </span>la <b>Pcia.
de Bs.As.</b> Experiencias en base a casos concretos.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"> </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las 12:00 hs.:</span></b><span style="font-size:12pt" lang="ES"> <b>Lic. Daniel Almada.</b> Video
grabación de Audiencias.</span></p>
<p class="MsoNormal" style="line-height:normal"><b><span style="font-size:12pt" lang="ES">- A
las 12:30 hs.:</span></b><span style="font-size:12pt" lang="ES"> </span><span style="font-size:12pt" lang="ES">Coffee </span><span style="font-size:12pt" lang="ES">B</span><span style="font-size:12pt" lang="ES">reak de 30 minutos. </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las 13:00 hs.: </span></b><span style="font-size:12pt" lang="ES">Guía Integral de empleo de la informática
forense en el proceso penal.</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"><span>
</span><b>Dra. Sabrina Lamperti e Ing.
Ariel Podestá de Info-Lab.</b></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES"> </span></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las 13:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Experiencias del Equipo de
la División de Delitos Tecnológicos - Depto. de</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"> Investigaciones
Complejas de la <b>Policía de la Pcia. del Chaco. </b></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"> </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- A las 14:30 hs.:</span></b><span style="font-size:12pt" lang="ES"> <b>T.U. Juan Francisco Quaranta
y Lic. Analía Martínez.</b><b> </b></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"><span> </span>Experiencias en base a casos concretos. <b>Provincia de Santa Fe.</b></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"> </span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- Sábado a las 15:30 hs.:</span></b><span style="font-size:12pt" lang="ES"> Cierre del Primer Congreso
Provincial de Derecho Informático,</span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><span style="font-size:12pt" lang="ES"> Informática Jurídica
y de Peritos Informáticos a cargo de la <b>Dra. María del Carmen Bellomo, </b></span></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES"><span> </span>Presidente del Colegio de Abogados de
Necochea.</span></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES"> </span></b></p>
<p class="MsoNormal" style="margin-bottom:0.0001pt;line-height:normal"><b><span style="font-size:12pt" lang="ES">- Sábado a las 15:30 hs.: </span></b><span style="font-size:12pt" lang="ES">Se
entregarán Certificados de Asistencia en la Secretaría del CAN.</span></p>
</div><div class="gmail_extra"><br><div class="gmail_quote">2016-05-06 18:11 GMT-03:00 romina florencia Cabrera <span dir="ltr"><<a href="mailto:romicabrera83@gmail.com" target="_blank">romicabrera83@gmail.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><br></div><div><br> <table style="border-top:1px solid #aaabb6">
<tbody><tr>
<td style="width:55px;padding-top:18px"><a href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail" target="_blank"><img src="https://ipmcdn.avast.com/images/2016/icons/icon-envelope-tick-round-orange-v1.png"></a></td>
<td style="width:470px;padding-top:20px;color:#41424e;font-size:13px;font-family:Arial,Helvetica,sans-serif;line-height:18px">Libre de virus. <a href="https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail" style="color:#4453ea" target="_blank">www.avast.com</a> </td>
</tr>
</tbody></table>
<a href="#m_1534063135726393997_m_-6455257040419116169_m_-9101980220712108712_m_-7322789858526829818_m_-4669123755659074924_m_-7119238064212392110_DDB4FAA8-2DD7-40BB-A1B8-4E2AA1F9FDF2" width="1" height="1"></a></div>
</blockquote></div><br></div>
<br></div></div><span>_______________________________________________<br>
Ncuc-discuss mailing list<br>
<a href="mailto:Ncuc-discuss@lists.ncuc.org" target="_blank">Ncuc-discuss@lists.ncuc.org</a><br>
<a href="http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss" rel="noreferrer" target="_blank">http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss</a><br>
<br></span></blockquote></div><span><font color="#888888"><br><br clear="all"><br>-- <br><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><span style="font-family:times new roman,serif"><font size="1"><b>Olévié Ayaovi Agbenyo KOUAMI</b><br></font></span></div><div><span style="font-family:times new roman,serif"><font size="1"><i>Directeur-Adjoint de O and K IT SOLUTIONS sarl </i></font></span><span><span style="font-family:times new roman,serif"><font size="1"><i>Editeur de logiciels de gestion (PGI/ERP) S.I.G.E. (http://<a href="http://www.oandkit.com" target="_blank">www.oandkit.com</a>)</i></font></span></span></div><div><span style="font-family:times new roman,serif"><font size="1"><i>Président/CEO de l'INTIC4DEV (Institut des TIC pour le développement) <a href="http://www.intic4dev.org" target="_blank">http://www.intic4dev.org</a> <br></i></font></span></div><div><span style="font-family:times new roman,serif"><font size="1"><i>Eminent National Expert for the World Summit Award (<a href="http://www.wsis-award.org" target="_blank">http://www.wsis-award.org</a>) <br></i></font></span></div><div><span style="font-family:times new roman,serif"><font size="1"><i>Secrétaire Général de l'ESTETIC - Association Togolaise des professionnels des TIC (<a href="http://www.estetic.tg" target="_blank">http://www.estetic.tg</a>)<br></i></font></span></div><div><span style="font-family:times new roman,serif"><font size="1"><i>ICANN-GNSO-NCSG-NPOC Communications Committee Chair (<a href="http://www.npoc.org/" target="_blank">http://www.npoc.org/</a>)<br></i><i><span>ICANN - Fellow & Alumni<i> (<a href="http://www.icann.org" target="_blank">http://www.icann.org</a>) - </i></span>Membre de Internet Society (http://<a href="http://www.isoc.org" target="_blank">www.isoc.org</a>) </i></font></span></div><span style="font-family:times new roman,serif"><font size="1"><i>Membre fondateur du RIK-Togo (Réseau Interprofessionnel du Karité au Togo) </i></font></span><span><span style="font-family:times new roman,serif"><font size="1">(<a href="http://www.globalshea.com" target="_blank">http://www.globalshea.com</a>)</font></span></span></div><div><span style="font-family:times new roman,serif"><font size="1"><span><i>Skype : olevie1 FaceBook : @olivier.kouami.3 Twitter : #oleviek Lomé – Togo</i></span></font></span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</font></span></div>
<br>_______________________________________________<br>
Ncuc-discuss mailing list<br>
<a href="mailto:Ncuc-discuss@lists.ncuc.org" target="_blank">Ncuc-discuss@lists.ncuc.org</a><br>
<a href="http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss" rel="noreferrer" target="_blank">http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss</a><br>
<br></blockquote></div><br></div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>Ncuc-discuss mailing list</span><br><span><a href="mailto:Ncuc-discuss@lists.ncuc.org" target="_blank">Ncuc-discuss@lists.ncuc.org</a></span><br><span><a href="http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss" target="_blank">http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss</a></span><br></div></blockquote></div></div></div><br>_______________________________________________<br>
Ncuc-discuss mailing list<br>
<a href="mailto:Ncuc-discuss@lists.ncuc.org" target="_blank">Ncuc-discuss@lists.ncuc.org</a><br>
<a href="http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss" rel="noreferrer" target="_blank">http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss</a><br>
<br></blockquote></div><br></div>
</div></blockquote></div></blockquote></div><br></div>
</div></div><br>_______________________________________________<br>
Ncuc-discuss mailing list<br>
<a href="mailto:Ncuc-discuss@lists.ncuc.org">Ncuc-discuss@lists.ncuc.org</a><br>
<a href="http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss" rel="noreferrer" target="_blank">http://lists.ncuc.org/cgi-bin/mailman/listinfo/ncuc-discuss</a><br>
<br></blockquote></div><br></div>