El delito de fraude informático en el derecho penal peruano: análisis de sus problemas de susbsuncion
Fecha
Autores
Título de la revista
ISSN de la revista
Título del volumen
Editor
Pontificia Universidad Católica del Perú
Acceso al texto completo solo para la Comunidad PUCP
Resumen
El presente trabajo analiza críticamente la configuración del delito de fraude informático
previsto en el artículo 8º de la Ley 30096 del ordenamiento penal peruano, comparándolo con
la estafa agravada por acceso a datos de tarjetas, a fin de determinar si existen problemas de
subsunción y si el marco normativo vigente resulta técnicamente adecuado. Se parte del
reconocimiento de que ambos tipos penales —regulados en el artículo 8 de la Ley N.° 30096 y
el artículo 196-A.5 del Código Penal— comparten elementos estructurales, pero se aplican en
contextos disímiles, generando ambigüedades interpretativas y afectando la seguridad jurídica.
La investigación utiliza una metodología jurídico-dogmática, de enfoque cualitativo, basada en
el análisis normativo, jurisprudencial, doctrinario y comparado. Se concluye que muchas
conductas actualmente subsumidas en la estafa agravada, particularmente aquellas que no
implican engaño sino uso de destreza técnica, encajan con mayor coherencia en figuras como
el hurto con destreza. Asimismo, se evidencia que el fraude informático requiere una lesión
real al sistema o a los datos informáticos, lo cual no ocurre en todos los casos imputados como
tal. Se propone, por tanto, una revisión legislativa que reubique y redefina estos tipos penales
conforme a su naturaleza típica y al estándar del Convenio de Budapest.
This paper critically examines the legal configuration of the offense of computer fraud as defined in Article 8 of Law No. 30096 of the Peruvian criminal system, comparing it with the aggravated fraud involving access to card data, in order to determine whether there are problems of legal subsumption and whether the current regulatory framework is technically appropriate. The analysis begins by acknowledging that both criminal offenses—regulated under Article 8 of Law No. 30096 and Article 196-A.5 of the Penal Code—share structural elements but are applied in different contexts, leading to interpretative ambiguities and affecting legal certainty. The research follows a legal-dogmatic methodology with a qualitative approach, based on normative, jurisprudential, doctrinal, and comparative analysis. It concludes that many behaviors currently subsumed under aggravated fraud, particularly those that do not involve deception but rather the use of technical skill, align more coherently with offenses such as theft with special skill. Furthermore, it is demonstrated that computer fraud requires actual harm to the system or to data integrity, which is not present in all cases charged as such. A legislative review is therefore proposed to relocate and redefine these offenses in accordance with their typical nature and the standards of the Budapest Convention.
This paper critically examines the legal configuration of the offense of computer fraud as defined in Article 8 of Law No. 30096 of the Peruvian criminal system, comparing it with the aggravated fraud involving access to card data, in order to determine whether there are problems of legal subsumption and whether the current regulatory framework is technically appropriate. The analysis begins by acknowledging that both criminal offenses—regulated under Article 8 of Law No. 30096 and Article 196-A.5 of the Penal Code—share structural elements but are applied in different contexts, leading to interpretative ambiguities and affecting legal certainty. The research follows a legal-dogmatic methodology with a qualitative approach, based on normative, jurisprudential, doctrinal, and comparative analysis. It concludes that many behaviors currently subsumed under aggravated fraud, particularly those that do not involve deception but rather the use of technical skill, align more coherently with offenses such as theft with special skill. Furthermore, it is demonstrated that computer fraud requires actual harm to the system or to data integrity, which is not present in all cases charged as such. A legislative review is therefore proposed to relocate and redefine these offenses in accordance with their typical nature and the standards of the Budapest Convention.
Descripción
Palabras clave
Delitos informáticos--Legislación--Perú, Fraude--Legislación--Perú, Informática--Seguridad